Features

Crowdfunding, Reg D and Reg A
The New Routes for Access to Capital and the Potential Legal and Regulatory Risks Although the business community lauded the arrival of new crowdfunding laws, the enforcement community has had a different take on them. As stated in 2017 by then Deputy Attorney General Rod Rosenstein: "The potential downside of crowdfunding is that it occurs outside the watchful eye of a regulated banking and financial industry. Unregulated websites therefore provide a platform for criminals to defraud potential investors."
Features

The 'Silly Season'
That term refers to the months of October through December. It's a way of pointing out to partners that the necessary activities of practice management that so many of them had avoided for the first nine or 10 months of the year now had to be addressed. Clients that had not been billed now had to be invoiced. Outstanding invoices, many issued in the cold days of early March and April, now had to be collected and current work would not only have to be billed but collected as well.
Features

Data Privacy Reviews: The Cornerstone of a Data Breach Response
Including a managed document review vendor in your incident response plan is critical.
Features

Fifth Circuit Subordinates Claim for Deemed Dividends
"… [P]ayments owed to a shareholder by a bankrupt debtor, which are not quite dividends but which certainly look a lot like dividends, should be treated like the equity interests of a shareholder and subordinated to claims by creditors of the debtor," held the U.S. Court of Appeals for the Fifth Circuit.
Features

"Mismarking": Developments in Valuation Fraud
As the DOJ expands its mismarking inquiries beyond stocks and bonds and into areas like private equity, recent cases illuminate the increasing need for robust internal controls designed to eliminate the incentives for an employee or manager to overvalue assets.
Features

What Is Your Dashboard Report Telling You? Chances Are, Not Much.
Firms are struggling to capture compelling business intelligence about themselves. Until recently, most operated with a cadre of legacy operating systems, financial platforms and reporting technologies from different manufacturers that have no mechanism for connecting with each other. The disparate nature of these technologies has exacerbated the struggle to leverage data and display results in a reporting mechanism that helps direct the firm's decision-making.
Features

A Tenant's Perspective on SNDAs: Non-Disturbance Is Not Enough
Part Two of a Two-Part Article Part One of this article outlined the basic elements of a subordination, non-disturbance and attornment agreement (SNDA), which regulates two competing interests in the same property — tenant's right to possess its premises pursuant to its lease and mortgage lender's security interest in that same premises. Part Two explains the differences between the concepts of "non-disturbance" and "recognition," while contending that lease recognition is more important to the tenant than not having its possession disturbed.
Features

Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers
In Its Motion To Dismiss, Marriott Insisted the Breach Caused No Harm to Its Guests and Attached a Declaration By a Former Government Official Who Wrote: "A U.S. Passport Is Virtually Impossible to Forge Successfully." Marriott is insisting that last year's cyberattack did no harm to its hotel guests, not least of which because hackers cannot use stolen passport numbers.
Features

8th Circuit Affirms Dismissal of Lawsuit Attacking Approved Bankruptcy Sale
Sales of substantially all of a debtor's assets are commonplace in corporate Chapter 11 bankruptcies. The sale is supervised and approved by the Bankruptcy Court. Purchasers desire to know that if the sale is consummated, they will be protected from subsequent attacks on the sale and the sale process and presumably more bidders will participate, resulting in greater returns for the estates and creditors. Issues surrounding the finality of a bankruptcy sale were recently reviewed by the U.S. Court of Appeals for the Eighth Circuit.
Features

Producing Breakthroughs in Client Development
It is easy to understand why many lawyers feel that only certain special individuals are blessed with the qualities necessary to be rainmakers. But almost anyone willing to develop the qualities necessary can become a rainmaker.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›