Features

Protecting Privacy and Sensitive Data In Era of Neurotechnologies
Scientists have been collecting neural data from the brain for medical reasons for years, with myriad regulatory constraints in place. But in 2024, technologies are moving fast and furiously into the realm of consumer products.
Features

How Will Criminal Law Enforcement Be Able to Police the Improper Use of AI?
Given the DOJ's limited tools to prosecute AI crimes where no one intended for the AI to violate the law, effective compliance likely will be the best defense for companies to avoid criminal charges for AI-based crimes.
Features

IRS Keeps Hold On Employee Retention Credit Claims to Protect Small Businesses from Fraud
While the IRS has new ERC claims on pause and works to investigate possible fraud, business owners still have the opportunity to protect themselves from potential civil and criminal penalties.
Features

What Effective Cooperation With the SEC Looks Like, According to SEC Enforcement Director
Companies should be going above and beyond what's legally required to earn leniency from the SEC, its top enforcement official said at a gathering of white collar defense attorneys and in-house counsel
Features

Worldwide Regulations Increasing Compliance Challenges
Regulators worldwide — not just in the United States — are putting in place new programs and policies that will make steering clear of enforcement bunkers even more difficult. And one of the most worrisome, according to corporate attorneys, is a new DOJ pilot program that will provide stronger incentives for whistleblowers to rat out their co-workers and employers for misconduct.
Features

China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Features

Is Genetic Information the Next Privacy Battleground?
GIPA litigation remains in its early stages, but the possibility of exorbitant statutory damages could make GIPA the next major trend in privacy class action litigation.
Features

OFAC, Commerce, and DOJ Emphasize Pursuit Of Enforcement Actions Against Non-U.S. Persons and Entities
The guidance mirrors the recent, broader impulse among U.S. prosecutors and regulatory agencies to extend application of U.S. law to foreign persons and entities, even when those persons and entities have only threadbare connections to the U.S.
Features

NIL Regulation: Can the NCAA Recover and Advance Its Own Fumble?
With a view toward injecting some modicum of clarity into the volatile arena of NIL, a plethora of legislation has been enacted at the state level and proposed at the federal level.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Litigating Redesigns At the ITCAn overview of redesigns at the ITC, a discussion of the ITC's recent determination in Certain Audio Players and Controllers, and identifies some considerations to keep in mind when litigating redesigns at the ITC.Read More ›
- Applying Merger By Deed Doctrine to Real Estate TransactionsSince a deed is a subsequent writing between the parties, there is some logic to the terms of the deed taking precedence over the terms of the prior contract of sale, at least as to the subject matter of the deed.Read More ›