Features
FinTech: The Emerging Financial Crime Compliance Minefield
The proliferation of so-called "FinTech" ' particularly by startups outside the financial sector ' raises a host of thorny FCC issues for regulators and financial institutions required to comply with the Bank Secrecy Act (BSA) and its anti-money laundering (AML) mandates.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Checklist and Commentary on Defenses for Right of Publicity Claims
This article is Part Two of a two-part series. Part One appeared in the April issue of <i>Entertainment Law & Finance</i>. Part Two starts with a continuation of the author's discussion of First Amendment defenses to right of publicity claims.
Features
<b><i>Online Extra:</b></i> Nonprofits Ask Copyright Office to Reform DMCA Takedown Procedures
At the end of 2015, the U.S. Copyright Office announced that it would take comments to determine the effectiveness of the safe harbor provisions in the Digital Millennium Copyright Act. It's clear that the Copyright Office will hear some complaints that the DMCA doesn't offer enough of a deterrent against abusive takedown notices.
Features
Equity Crowdfunding
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
Features
When May a Director Inspect the Company's Books and Records?
It is well settled under Section 220(d) of the Delaware General Corporation Law (DGCL), a director's access to corporate books and records is broader than that of stockholders. However, in contrast to the broad scope of discovery permitted in a plenary action under the Delaware Court of Chancery Rule 26, Section 220 limits inspection (even by directors) to documents and communications that fall within its more limited "contemplation of 'books and records,'" which correlates with the "summary nature of a Section 220 proceeding."
Features
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Features
10th Circuit Upholds Tax Reporting Law
Because of a controversial U.S. Supreme Court ruling from 1992, online retailers don't charge sales tax in states where they don't have a physical presence. It's a situation that traditional retailers have bemoaned for years. To their dismay, the U.S. Congress hasn't done a thing about it.
Features
What Non-Delaware Lawyers Need to Know About e-Discovery in Delaware
Many non-Delaware lawyers will, at some point in their careers, find themselves practicing in a Delaware court after being admitted pro hac vice. For those that do, it is important to note that the Delaware courts take e-discovery seriously and have a sophisticated understanding of it. This article serves as a primer on conducting e-discovery in the Delaware courts.
Features
Mitigating Data Breach Risk
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands ' Anthem, Blue Cross Blue Shield, Experian and Sony Pictures Entertainment, to name just some of the most notorious recent victims ' it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Availability of Self-Help Evictions to Commercial LandlordsA landlord may re-enter leased commercial premises peaceably, without resorting to court process, in those states where it is permitted, if the right to do so is expressly reserved in a commercial lease, either a) upon the tenant's defaulting on the payment of rent or other lease terms, or b) upon termination of the lease or the tenant's abandoning the premises.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›
- Bankruptcy Court Cannot Surcharge Credit Bidding Asset Buyer with Expenses of SaleExplaining that the "bankruptcy court had no jurisdiction to take such action," the Fifth Circuit also vacated the district's court's improper ruling that the bankruptcy judge could enter a personal judgment against the asset buyer.Read More ›
- Second Circuit Rejects Arbitration of Debtor's Asserted Discharge ViolationA bankruptcy court properly denied a bank's motion to compel arbitration of a debtor's asserted violation of the court's discharge injunction, the U.S. Court of Appeals for the Second Circuit held.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›