Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Compliance, Ethics and the Multi-generational Workforce Image

Compliance, Ethics and the Multi-generational Workforce

Daniel de Juan

This article outlines two key tactics for effectively executing and nurturing a strong workplace compliance and ethics strategy. The first is fostering employee engagement. The second involves deploying the right technology tools to drive and support this.

Features

UK Serious Fraud Office Annual Report Image

UK Serious Fraud Office Annual Report

Andre Bywater & Jonathan Armstrong

As readers might be aware, a few years ago the UK introduced a new legal regime to tackle corruption under the UK Bribery Act 2010, with some describing it as the toughest anti-corruption legislation in the world. Here are some results of the Act.

Features

Google Accounts to Kids May Harm Their Privacy Image

Google Accounts to Kids May Harm Their Privacy

Bradley S. Shear

Recently, multiple media outlets reported that Google plans to offer accounts for their wide array of services to children under 13 years of age. While the details regarding this alleged plan have not been publicized, it has already created a lot of concern with multiple privacy advocates.

Features

Loud and Clear: FinCEN Demands a Culture of Compliance Image

Loud and Clear: FinCEN Demands a Culture of Compliance

Daniel R. Alonso

The onslaught of civil and criminal enforcement actions against financial institutions for violating anti-money laundering and counter-terrorist financing laws has continued its brisk pace in the past few months, with enforcement of the AML provisions of the Bank Secrecy Act and the sanctions regulations administered by the Office of Foreign Assets Control showing no signs of slowing down.

Features

Efficient Review In a Time-Sensitive Government Investigation Image

Efficient Review In a Time-Sensitive Government Investigation

Sanjay Manocha

Over the past 10 years, government investigations have become increasingly sophisticated in analyzing electronically stored information (ESI). Federal executive departments and agencies have made substantial investments in advanced analytical systems that help investigators and prosecutors filter voluminous amounts of incoming ESI. Respondents to Civil Investigative Demands (CIDs) must recognize that the information provided will be analyzed using these powerful tools.

Features

Cross-Border Cybercrime and the Cybersecurity Wars Image

Cross-Border Cybercrime and the Cybersecurity Wars

Sue Reisinger

The Home Depot data breach may be the largest in the U.S. yet, affecting not only millions of customers in the U.S., but also shoppers at its 180 stores in Canada. Home Depot said customers who shopped at its U.S. and Canadian stores as far back as April were exposed, meaning the breach extended for more than four months including the busy summer season.

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Features

<i>Jancik v. Redbox Automated Retail</i> Image

<i>Jancik v. Redbox Automated Retail</i>

Robert A. Naeve

Congress enacted the ADA "to remedy widespread discrimination against disabled individuals." The salutary effect of the ADA cannot be understated. However, many business owners and operators might, at the same time, rightly ask whether there are any limits to the Act's reach.

Features

Online Consumer Privacy Image

Online Consumer Privacy

Ana Tagvoryan & Joshua Briones

Online service providers often collect user data for marketing, which frequently includes sharing the information with third parties. Consumers and web users who find this transmission of data an invasion of privacy can, with the help of the plaintiffs' bar, sue under various privacy statutes for alleged damages arising out of this practice.

Features

Time to Upgrade 28-Year-Old Electronic Privacy Law? Image

Time to Upgrade 28-Year-Old Electronic Privacy Law?

Andrew Ramonas

Apple Inc., Google Inc. and Microsoft Corp. are putting new pressure on Congress to update a 28-year-old law that governs how the federal government can obtain U.S. citizens' electronic data.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›