Fourth Amendment Concerns in a Digital Age
Because the information obtained by means of a sealed order may become evidence in criminal actions against business entities, companies and their advisers need to understand the law, its consequences and the development of case law concerning privacy rights.
The FCPA and AML Statutes
Although criminal prosecutions under the FCPA and the U.S. anti-money laundering (AML) laws have developed differently over the years, a review of recent enforcement actions reveals that prosecutions under these criminal schemes have started to converge.
Features
Third Circuit Weighs in on the Extortion Defense to Bribery
In a recent decision in a domestic bribery case, the United States Court of Appeals for the Third Circuit, after canvassing the law relating to extortion as a defense to federal bribery charges, identified the principal reasons why extortion is so rarely raised, and even more rarely effective, as a defense.
Features
Third Circuit Revives Committee's Deepening Insolvency and Breach of Fiduciary Duty Claims
In a recent opinion issued in the Chapter 11 case of <i>In re Lemington Home for the Aged</i>, the Third Circuit revived claims of breach of fiduciary duty and deepening insolvency against directors and officers of a nonprofit Pennsylvania corporation.
Successor Liability
An asset sale under section 363(f) of the Bankruptcy Code is becoming an increasingly popular mechanism to improve a company's financial condition as an alternative to a traditional plan of reorganization.
The Mighty Sword of PACA in Bankruptcy
Special creditor protection is not located in title 11 of the United States Code; instead, one needs to refer to 7 U.S.C. '' 499a through 499t in order to discover the special protections set forth for "claims" arising under the Perishable Agricultural Commodities Act ("PACA").
Recent Cases Illustrate That Family Law Is Fascinating
Three recent cases, one in Tennessee and two in Florida, are discussed for no reason other than that they are interesting.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›