Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

IRS Keeps Hold On Employee Retention Credit Claims to Protect Small Businesses from Fraud Image

IRS Keeps Hold On Employee Retention Credit Claims to Protect Small Businesses from Fraud

Julie Potts

While the IRS has new ERC claims on pause and works to investigate possible fraud, business owners still have the opportunity to protect themselves from potential civil and criminal penalties.

Features

What Effective Cooperation With the SEC Looks Like, According to SEC Enforcement Director  Image

What Effective Cooperation With the SEC Looks Like, According to SEC Enforcement Director 

Maria Dinzeo

Companies should be going above and beyond what's legally required to earn leniency from the SEC, its top enforcement official said at a gathering of white collar defense attorneys and in-house counsel

Features

Worldwide Regulations Increasing Compliance Challenges Image

Worldwide Regulations Increasing Compliance Challenges

Chris O'Malley

Regulators worldwide — not just in the United States — are putting in place new programs and policies that will make steering clear of enforcement bunkers even more difficult. And one of the most worrisome, according to corporate attorneys, is a new DOJ pilot program that will provide stronger incentives for whistleblowers to rat out their co-workers and employers for misconduct.

Features

China Finalizes New Regulations to Relax Personal Data Exports from China Image

China Finalizes New Regulations to Relax Personal Data Exports from China

Lindsay Zhu, Scott Warren, Haowen Xu & Charmian Aw

Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.

Features

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement Image

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement

Daniel Garrie, David Cass & Jennifer Deutsch

In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.

Features

Is Genetic Information the Next Privacy Battleground? Image

Is Genetic Information the Next Privacy Battleground?

Jeffrey N. Rosenthal & Amanda M. Noonan

GIPA litigation remains in its early stages, but the possibility of exorbitant statutory damages could make GIPA the next major trend in privacy class action litigation.

Features

OFAC, Commerce, and DOJ Emphasize Pursuit Of Enforcement Actions Against Non-U.S. Persons and Entities Image

OFAC, Commerce, and DOJ Emphasize Pursuit Of Enforcement Actions Against Non-U.S. Persons and Entities

Harry Sandick & Sarah Hardtke

The guidance mirrors the recent, broader impulse among U.S. prosecutors and regulatory agencies to extend application of U.S. law to foreign persons and entities, even when those persons and entities have only threadbare connections to the U.S.

Features

NIL Regulation: Can the NCAA Recover and Advance Its Own Fumble? Image

NIL Regulation: Can the NCAA Recover and Advance Its Own Fumble?

Howard Mulligan

With a view toward injecting some modicum of clarity into the volatile arena of NIL, a plethora of legislation has been enacted at the state level and proposed at the federal level.

Features

Navigating the SEC's New Cybersecurity Disclosure Rules Image

Navigating the SEC's New Cybersecurity Disclosure Rules

Olivia J. Greer, Catherine Kim & Jeeyoon Chung

With the first cybersecurity rule for public companies, and the landscape of ongoing scrutiny and enforcement, SEC registrants should not lose time in reviewing their cybersecurity postures and policies to ensure compliance and, even ahead of formal adoption of certain still-pending rules, align with best practices.

Features

Understanding the Difference Between Advocacy and Obstruction When Facing Government Investigations Image

Understanding the Difference Between Advocacy and Obstruction When Facing Government Investigations

Christopher D. Carusone

Corporate counsel must understand the difference between advocacy and obstruction when facing government investigations.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›