Foley Partner Ivonne Mena King is speaking at Foreign Corrupt Practices Act 2008: Coping with Heightened Enforcement Risks hosted by Practising Law Institute (PLI), April 16, 2008 in San Francisco, CA. The program featuring faculty of leading practitioners and government regulators, will provide background and tools needed to spot issues early, develop workable risk management processes and implement effective compliance programs.
Ms. King will present in a panel discussion titled, “Implementing a Compliance Program in the Real World” at 1:00 p.m. Topics to be covered include:
- How large, small and medium-sized companies address compliance issues
- What is an effective compliance program?
- How to establish a compliance culture
- How to monitor and measure the effectiveness of a compliance program
- What level of due diligence is enough?
For more information or to register for the program, visit the Event page.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.