We are pleased to announce the release of the third and final video in our India anti-bribery compliance video series. As noted previously, Foley partner David W. Simon and Sherbir Panag, of Panag & Babu in New Delhi, India have produced these videos to educate lawyers, compliance professionals, and business managers on the basics of anti-bribery compliance in India. This video, “What is the FCPA?,” provides basic terms and definitions that comprise the Foreign Corrupt Practices Act, helping viewers understand what constitutes a violation and what does not. To view it, please click on this link: What is the FCPA?
If you missed the first two videos in our series, you can access them by clicking on these links: Typical Compliance Risks in India and Anti-Corruption Investigation Tips.
If you missed the first two videos in our series, you can access them by clicking on these links: Typical Compliance Risks in India and Anti-Corruption Investigation Tips.
Author(s)
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.