Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

The Scope of the Dodd-Frank's Whistleblower Protection Image

The Scope of the Dodd-Frank's Whistleblower Protection

Joseph M. McLaughlin & Yafit Cohn

Is a corporate employee who reports an employer's possible violation of the securities laws to a supervisor or internal compliance officer — but not to the SEC — considered a "whistleblower" entitled to protection from retaliation under Dodd-Frank? Courts that have considered this question have reached differing conclusions.

Features

Senate Votes to Repeal FCC Internet Privacy Rules Image

Senate Votes to Repeal FCC Internet Privacy Rules

Lora Hollien

The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.

Features

In Light of Recent FTC Actions, Review Your Privacy Policy Image

In Light of Recent FTC Actions, Review Your Privacy Policy

Devika Kornbacher, Scott Breedlove, Janice Ta & Aislinn Affinito

Every day, billions of mobile and Internet-enabled computers, smartphones, watches, drones and even coffee machines are collecting vast amounts of geolocation…

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at legislation of interest to corporate lawyers that recently went into effect, and looks at some recent decisions of interest from courts in Delaware, New York, and California.

Features

The Internal Audit Function Image

The Internal Audit Function

William Floyd

The International Professional Practices Framework released last year by the IIA is intended to provide guidance for internal auditors, by seeking to focus on core principles. The framework identifies 10 core principles that describe or guide what an effective internal audit function should focus upon and to what it should adhere.

Features

The Clock Is Ticking Image

The Clock Is Ticking

Jonathan B. New & Marco Molina

<b><I>Courts Check Government Attempts to Extend the Statute of Limitations</b></i><p><b><i>Part Two of a Two-Part Article</I></b><p>When the SEC and other government regulatory agencies pursue civil enforcement actions against those accused of financial fraud, they often attempt to recover monetary penalties and fines for periods of time even outside the limitations period. This effort is being met with resistance by the courts. The authors conclude their discussion herein.

Features

Information Security: The Human Factor Image

Information Security: The Human Factor

Michael Kemps & Kimberly Pease

Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.

Features

SEC Takes Aim at Political Contributions by Investment Advisers Image

SEC Takes Aim at Political Contributions by Investment Advisers

Joseph F. Savage, Jr. & Stephanie M. Aronzon

While it remains unclear both when the regulators will invoke their authority to enforce the nearly limitless strict liability provision of the rules and how they will determine the appropriate remedy, the recent settlements and the SEC's handling of exemptive relief petitions may provide some clues.

Features

<b><i>Yellowstone</i></b> Injunctions When Prompt Cure Is Impossible Image

<b><i>Yellowstone</i></b> Injunctions When Prompt Cure Is Impossible

Alexander Lycoyannis

Most real estate practitioners are well acquainted with the <b><I>Yellowstone</I></b> injunction and its importance in preserving the status quo while allegations that a commercial tenant has breached its lease are litigated. But the third Yellowstone prong — timeliness of the motion — is especially important.

Features

New York State's Financial Services Cybersecurity Regulation Image

New York State's Financial Services Cybersecurity Regulation

Elizabeth B. Vandesteeg & Kathryn C. Nadro

The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›