Conducting a Privacy Audit
A glance at the headlines reveals that data privacy breaches are increasingly common, and the consequences to corporations are increasingly dire. To avoid those consequences, any corporate entity that collects, uses or transfers personal information must take steps to ensure it is complying with legal requirements for maintaining data privacy.
Features
Increased Fraud Penalties Are on the Horizon
The guidelines governing the sentencing of fraud offenses ' long criticized as irrational, unduly severe, and the product of overt political pressure ' require wholesale reform.
To Disclose or Not to Disclose
Whether to self-report serious misconduct is a complicated question that requires investigating the facts and assessing legal, business and reputation implications. Following are critical issues to consider with outside counsel and other professional advisers before making a decision.
Features
<b><i>BREAKING NEWS:</b></i> Supreme Court Upholds Health Care Law
In a stunning victory for the Obama administration, the U.S. Supreme Court on June 29 upheld the centerpiece of the nation's new health care law ' the so-called individual mandate to buy insurance ' as a constitutional exercise of Congress' taxing authority.
Third Parties: The Achilles' Heel of FCPA Compliance
The alleged use of third-party intermediaries to pay bribes to foreign government officials soared from 42% of FCPA enforcement actions in 2005 to 100% in 2011. Nevertheless, some companies may not be adapting their FCPA compliance programs quickly enough.
Features
How to Gain and Exert More Influence in the 'New Normal'
Ways that a leader at any level can directly influence the climate for high performance and creativity/innovation in an organization.
Features
The E.U. Data Protection Law
What it takes to do business in a E.U. Member State, and why you need to know.
IRS Tax Exams in the Legal Industry
Ever wonder what the IRS looks for when auditing tax returns of law firms and their owners? Here are the answers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›