Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Cybersecurity has been a high priority topic for the SEC the past few years. In September 2017, the SEC created a Cyber Unit within its Enforcement Division. This Cyber Unit had over 225 active investigations at the SEC's 2018 fiscal year end. The SEC has focused in particular on cybersecurity risks facing public companies.
The SEC twice issued cybersecurity guidance to public companies in 2018. The SEC used one of these pronouncements to opine on the need for insider trading policies to account for cyber-related incidents. Specifically, in February 2018, the SEC issued "Commission Statement and Guidance on Public Company Cybersecurity Disclosures" ("Cybersecurity Release") outlining its views on cybersecurity disclosure requirements for public companies under the federal securities laws. The Cybersecurity Release reinforced and expanded upon cybersecurity disclosure guidance issued by the SEC's Division of Corporation Finance in 2011. It further addressed a new topic — the application of insider trading prohibitions in the cybersecurity context. Later in 2018, the SEC issued a Report of Investigation that emphasized the need for public companies to implement a system of adequate internal accounting controls to address cyber-related fraud and to calibrate those controls to the current risk environment.
The Cybersecurity Release advised that information about a company's cybersecurity risks and incidents may constitute material nonpublic information. Directors, officers and other corporate insiders therefore could violate the insider trading laws, should they trade their company's securities in breach of their duty of trust or confidence while in possession of such material nonpublic information. As a result, the SEC recommended companies have policies and procedures crafted to prevent trading on the basis of material nonpublic information relating to cybersecurity risks and incidents.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.