Features

Fourth Circuit: Shareholders Face High Bar In Demonstrating Scienter
A recent Fourth Circuit decision held that shareholders must meet a high bar in demonstrating scienter to avoid early dismissal of the case. The decision also shows the fact-intensive approach courts use to distinguish fraudulent statements from those that, even if mistaken, were made innocently.
Features

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)
The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.
Features

Biden Administration Corporate Enforcement Policies More Symbolism than Effective Reform
By undoing some of the higher profile policy changes of the prior administration that many perceived as business-friendly, the current administration has served notice on the business and financial community of a return to practices characteristic of a more aggressive enforcement regime.
Features

Enforcement of Obligations Imposed In SEQRA Findings Statements
When, at the culmination of environmental review under the State Environmental Quality Review Act (SEQRA), a municipality resolves to require a developer to ameliorate environmental impacts, can anyone other than the municipality itself enforce the requirement?
Features

With 'Great Resignation', Corporations Need to Prepare for the Great Investigation
Major crisis events, such as political uprisings or financial downturns, are typically followed by an increase in fraud in the business sector and heightened risk to corporate IP and other sensitive information. Anecdotally, this seems to be proving out again in the recent and ongoing fallout from the pandemic. Even before this Great Resignation movement, corporations across the globe were reporting increases in suspicious activity, data leakage, IP theft and other data risks stemming from departing employees and remote workers.
Features

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds
It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.
Features

'Never Trust, Always Verify': Zero Trust Security
Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.
Features

Potential Criminal and Civil Penalties of Digital Asset Exchanges
This article discusses the potential criminal and civil penalties that companies can face if their employees engage in insider trading in digital assets, and suggests several measures that exchanges can take to reduce their exposure from such risks.
Features

Feds Jumping Into Corporate Privacy and Cybersecurity Enforcement
The past 12 months have seen a steady drumbeat of action by federal law enforcement and regulatory agencies of which in-house counsel should take note. Whether new guidance, regulation, investigations, or enforcement activity, the message is clear: The federal government is paying close attention to how companies are handling and protecting their data — especially consumer and sensitive data.
Features

What You Need to Know About China's New Privacy Law
The Personal Information Protection Law of the People's Republic of China (PIPL) went into effect on Nov. 1 and brought with it a suite of new requirements and lingering questions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›