Columns & Departments
Verdicts
Analysis of a case in which it was ruled that a bankruptcy trustee can seek med-mal damages .
Features
Internet Content Changes White-Collar Criminal Litigation Tactics
The federal government engages in certain tactics to reduce the effort associated with white-collar criminal litigation. Among the most criticized are the government's efforts to pressure corporations to waive the attorney-client privilege or work-product protection.
Features
Tallying States' Activity on Fantasy Sports
New York Attorney General Eric Schneiderman had declared online fantasy sports a form of illegal gambling, ordering industry giants DraftKings and FanDuel to shut down operations in a state that generated about 10% of the companies' revenues. The companies countered by suing. Then, faced with enormous legal costs, the companies chose a second course of action. They would pursue state legislation to legitimize their operations while offering consumer protection language ' and a cut in revenues ' in return.
Features
Website Arbitration Clauses
In a recent U.S. Eastern District decision, the court compelled arbitration of a dispute based on language contained in the Terms of Use on an Internet access provider's website. The language contained an operative arbitration clause that the court found binding on the plaintiffs. Plaintiffs claimed the clause was not apparent to them and therefore they never provided any consent to arbitrate.
Features
New York Rejects Federal Trend, Limits Common Interest Doctrine
Full and frank communication with another party's legal counsel is often necessary effectively to defend a client and to ensure compliance with the law. Thus, the question, "Under what circumstances may a company share privileged information with a third party?" is an important one.
Features
The Internet Is Not a Consequence-Free Zone
The widespread use of social media, and the corresponding ability to create, share, and misappropriate content ' all in an instant ' has radically increased the number of unwitting copyright owners and infringers.
Features
<b><i>Online Extra:</b></i> Convict Seeks New Trial Over Use of Facebook Evidence
A man convicted of murder in New Haven, CT, is asking the state Supreme Court for a new trial on grounds that the judge should not have allowed evidence from Facebook at trial. The defendant argues that photos from his Facebook profile that were presented to the jury were used to portray him as a "thug" and improperly swayed the jury. Police were also able to locate the defendant, Derrick Bouknight, through his Facebook page. '
Features
<b><i>Online Extra:</b></i> Yahoo Security Breach Sparks Class Actions
At least six class actions have been filed against Yahoo! Inc. in the wake of last month's announcement of a security breach that compromised an estimated 500 million account holders.
Features
<b><i>Online Extra:</b></i> British Billionaire's Suit Over Alleged Leak Offers First Test of Privacy Law
Gilbert Chagoury, a British billionaire and philanthropist was denied a visa last year to enter the United States because, according to the U.S. government, he was suspected of supporting terrorism. Chagoury denies the allegation, saying the U.S. Department of State relied on bad intelligence. And now he's suing federal agencies that he claims leaked information about him to a reporter. His suit is thought to be the first case brought under the Judicial Redress Act, which President Barack Obama signed in February.
Columns & Departments
<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever
Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
