Features
FinTech: The Emerging Financial Crime Compliance Minefield
The proliferation of so-called "FinTech" ' particularly by startups outside the financial sector ' raises a host of thorny FCC issues for regulators and financial institutions required to comply with the Bank Secrecy Act (BSA) and its anti-money laundering (AML) mandates.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Checklist and Commentary on Defenses for Right of Publicity Claims
This article is Part Two of a two-part series. Part One appeared in the April issue of <i>Entertainment Law & Finance</i>. Part Two starts with a continuation of the author's discussion of First Amendment defenses to right of publicity claims.
Features
<b><i>Online Extra:</b></i> Nonprofits Ask Copyright Office to Reform DMCA Takedown Procedures
At the end of 2015, the U.S. Copyright Office announced that it would take comments to determine the effectiveness of the safe harbor provisions in the Digital Millennium Copyright Act. It's clear that the Copyright Office will hear some complaints that the DMCA doesn't offer enough of a deterrent against abusive takedown notices.
Features
Equity Crowdfunding
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
Features
When May a Director Inspect the Company's Books and Records?
It is well settled under Section 220(d) of the Delaware General Corporation Law (DGCL), a director's access to corporate books and records is broader than that of stockholders. However, in contrast to the broad scope of discovery permitted in a plenary action under the Delaware Court of Chancery Rule 26, Section 220 limits inspection (even by directors) to documents and communications that fall within its more limited "contemplation of 'books and records,'" which correlates with the "summary nature of a Section 220 proceeding."
Features
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Features
10th Circuit Upholds Tax Reporting Law
Because of a controversial U.S. Supreme Court ruling from 1992, online retailers don't charge sales tax in states where they don't have a physical presence. It's a situation that traditional retailers have bemoaned for years. To their dismay, the U.S. Congress hasn't done a thing about it.
Features
What Non-Delaware Lawyers Need to Know About e-Discovery in Delaware
Many non-Delaware lawyers will, at some point in their careers, find themselves practicing in a Delaware court after being admitted pro hac vice. For those that do, it is important to note that the Delaware courts take e-discovery seriously and have a sophisticated understanding of it. This article serves as a primer on conducting e-discovery in the Delaware courts.
Features
Mitigating Data Breach Risk
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands ' Anthem, Blue Cross Blue Shield, Experian and Sony Pictures Entertainment, to name just some of the most notorious recent victims ' it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›