The SOX 'Clawback' Provision
In the wake of this renewed interest in executive compensation issues, a recent SEC enforcement action involving Section 304 of the Sarbanes Oxley Act ' also known as the compensation "clawback" provision ' has generated a flurry of attention.
Anti-Takeover Measures in Ebay v. Craigslist
The courts have sought to create a level playing field for hostile takeover such disputes, emphasizing that "a corporation does not have unbridled discretion to defeat any perceived threat." Where does it stand now?
Technology in Marketing: Got 'G' Cred?
Believe it or not, there is actually a term describing the impression that's created when someone types your name into the Google search box and results appear (or not appear as the case may be).
Features
The Best of MLF 2009: More Fabulous Articles
Here is the rest of "The Best of MLF 2009," from July through December.
The Place to Network: How to Get Started
Networking is and always has been about achieving two primary goals: increasing visibility and demonstrating credibility. It's that simple. So how do we measure success?
How to Lose a Client in 10 Days, Really?
James King, in-house counsel of The Boeing Company in Ridley Township, PA, recently introduced six ways lawyers can lose a client ' and steps to avoid those landmines.
NY Divorce Rule Freezes Couple's Assets Without Court Order
As of Sept. 1, 2009, divorcing couples in New York no longer need to seek a temporary restraining order prohibiting their spouse from the unauthorized spending, transfer or concealment of assets under a rule established by court administrators.
Children's Best Interests and Coached Custody Litigants
Though empirical data are not available, many who work in the family law field have come to a disturbing conclusion: Mental health professionals (MHPs) are engaging in activities, the objective of which is to assist litigants in presenting themselves to evaluators in deceptive ways.
Features
Trusts and Divorce
Matrimonial practitioners need to have some understanding of common long-standing trust techniques and some of the new ones in order to advise clients through a divorce involving such trusts.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›