Features

Shifting Crypto and Cyber Priorities In SEC Enforcement
When the SEC issues the next annual enforcement report for fiscal year 2025, we expect securities offering actions and investment adviser actions will almost certainly be up, and the “crypto” and “cyber” cases will almost certainly be down. Public statements by the new SEC administration have said as much, but even more telling than public statements are the allocation of limited enforcement resources.
Features

What the Future Holds for the False Claims Act
What does the second Trump administration augur for the False Claims Act? The question remains how, not if, the Trump DOJ will change DOJ’s enforcement policies, whether they will maintain current enforcement policies, and what the impact will be, especially for the FCA.
Features

FOIA In 2025: Beat the Backlog and Avoid Lawsuits
The Freedom of Information Act (FOIA) stands at a critical juncture heading into 2025. Federal agencies are grappling with mounting backlogs, increasingly complex data landscapes, and rising cybersecurity threats. As a new administration takes office, the urgency to adopt innovative, effective solutions has never been greater.
Features

Does Your Corporate Compliance Program Reasonably Prevent Fraud? New UK Guidance Demands It
This article first discusses the legal backdrop of the UK’s new strict liability law and then summarizes what companies need to know about the new UK guidance, with particular emphasis on the areas where it expands on the ECCP.
Features

High Court May Limit the Reach of the Wire Fraud Statute
On Dec. 9, 2024, the Supreme Court will hear argument in Kousisis v. United States, a case that will again review the reach of the federal mail and wire fraud statutes. At issue this time is the so-called “fraudulent inducement” theory of property fraud — namely, whether deception to induce a commercial exchange can constitute mail or wire fraud, even if the infliction of economic harm on the alleged victim was not the object of the scheme.
Features

Compliance and Third-Party Risk Management
To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.
Features

Navigating the SEC's Marketing Rule: Compliance Challenges and Legal Insights
The Securities and Exchange Commission (SEC) has underscored the critical importance of Marketing Rule compliance through a series of recent enforcement actions and risk alerts. This article delves into the challenges that investment advisers must navigate when marketing their services. It also explores how legal counsel and compliance consultants can effectively support their clients in adhering to both the explicit requirements and nuanced aspects of the Marketing Rule.
Features

The DOJ's Whistleblower Pilot Program Adds Incentives for Robust Corporate Compliance Programs
By incentivizing individuals to report misconduct through its Whistleblower Pilot Program, the DOJ has expanded its arsenal and the means by which it can identify misconduct. So wrongdoers beware — although this is not the Old West, everybody loves a good bounty.
Features

Why High-Quality Data is Crucial to Fighting Financial Crime
The fight against financial crime is becoming increasingly complex. The increasing prominence of AI also means that firms may leave themselves exposed to unexpected risks if they do not carefully consider the quality of the data that fuels the AI system.
Features

DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps Ringing
DOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Settlement Between Gaga and Manager To Stay Out of Public ViewLady Gaga and her former producer, Rob Fusari, won a court order that keeps a lid on the terms of a 2010 settlement agreement between them that has become pertinent to another case now headed for trial.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›