Features
FinTech: The Emerging Financial Crime Compliance Minefield
The proliferation of so-called "FinTech" ' particularly by startups outside the financial sector ' raises a host of thorny FCC issues for regulators and financial institutions required to comply with the Bank Secrecy Act (BSA) and its anti-money laundering (AML) mandates.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Checklist and Commentary on Defenses for Right of Publicity Claims
This article is Part Two of a two-part series. Part One appeared in the April issue of <i>Entertainment Law & Finance</i>. Part Two starts with a continuation of the author's discussion of First Amendment defenses to right of publicity claims.
Features
<b><i>Online Extra:</b></i> Nonprofits Ask Copyright Office to Reform DMCA Takedown Procedures
At the end of 2015, the U.S. Copyright Office announced that it would take comments to determine the effectiveness of the safe harbor provisions in the Digital Millennium Copyright Act. It's clear that the Copyright Office will hear some complaints that the DMCA doesn't offer enough of a deterrent against abusive takedown notices.
Features
Equity Crowdfunding
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
Features
When May a Director Inspect the Company's Books and Records?
It is well settled under Section 220(d) of the Delaware General Corporation Law (DGCL), a director's access to corporate books and records is broader than that of stockholders. However, in contrast to the broad scope of discovery permitted in a plenary action under the Delaware Court of Chancery Rule 26, Section 220 limits inspection (even by directors) to documents and communications that fall within its more limited "contemplation of 'books and records,'" which correlates with the "summary nature of a Section 220 proceeding."
Features
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Features
10th Circuit Upholds Tax Reporting Law
Because of a controversial U.S. Supreme Court ruling from 1992, online retailers don't charge sales tax in states where they don't have a physical presence. It's a situation that traditional retailers have bemoaned for years. To their dismay, the U.S. Congress hasn't done a thing about it.
Features
What Non-Delaware Lawyers Need to Know About e-Discovery in Delaware
Many non-Delaware lawyers will, at some point in their careers, find themselves practicing in a Delaware court after being admitted pro hac vice. For those that do, it is important to note that the Delaware courts take e-discovery seriously and have a sophisticated understanding of it. This article serves as a primer on conducting e-discovery in the Delaware courts.
Features
Mitigating Data Breach Risk
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands ' Anthem, Blue Cross Blue Shield, Experian and Sony Pictures Entertainment, to name just some of the most notorious recent victims ' it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›