Features

The Scope of the Dodd-Frank's Whistleblower Protection
Is a corporate employee who reports an employer's possible violation of the securities laws to a supervisor or internal compliance officer — but not to the SEC — considered a "whistleblower" entitled to protection from retaliation under Dodd-Frank? Courts that have considered this question have reached differing conclusions.
Features

Senate Votes to Repeal FCC Internet Privacy Rules
The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.
Features

In Light of Recent FTC Actions, Review Your Privacy Policy
Every day, billions of mobile and Internet-enabled computers, smartphones, watches, drones and even coffee machines are collecting vast amounts of geolocation…
Features

Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at legislation of interest to corporate lawyers that recently went into effect, and looks at some recent decisions of interest from courts in Delaware, New York, and California.
Features

The Internal Audit Function
The International Professional Practices Framework released last year by the IIA is intended to provide guidance for internal auditors, by seeking to focus on core principles. The framework identifies 10 core principles that describe or guide what an effective internal audit function should focus upon and to what it should adhere.
Features

The Clock Is Ticking
<b><I>Courts Check Government Attempts to Extend the Statute of Limitations</b></i><p><b><i>Part Two of a Two-Part Article</I></b><p>When the SEC and other government regulatory agencies pursue civil enforcement actions against those accused of financial fraud, they often attempt to recover monetary penalties and fines for periods of time even outside the limitations period. This effort is being met with resistance by the courts. The authors conclude their discussion herein.
Features

Information Security: The Human Factor
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Features

SEC Takes Aim at Political Contributions by Investment Advisers
While it remains unclear both when the regulators will invoke their authority to enforce the nearly limitless strict liability provision of the rules and how they will determine the appropriate remedy, the recent settlements and the SEC's handling of exemptive relief petitions may provide some clues.
Features

<b><i>Yellowstone</i></b> Injunctions When Prompt Cure Is Impossible
Most real estate practitioners are well acquainted with the <b><I>Yellowstone</I></b> injunction and its importance in preserving the status quo while allegations that a commercial tenant has breached its lease are litigated. But the third Yellowstone prong — timeliness of the motion — is especially important.
Features

New York State's Financial Services Cybersecurity Regulation
The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Availability of Self-Help Evictions to Commercial LandlordsA landlord may re-enter leased commercial premises peaceably, without resorting to court process, in those states where it is permitted, if the right to do so is expressly reserved in a commercial lease, either a) upon the tenant's defaulting on the payment of rent or other lease terms, or b) upon termination of the lease or the tenant's abandoning the premises.Read More ›
- Redefining Attorney-Client Collaboration with Technology That Delivers Greater ValueIf savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.Read More ›
- 'Customary Operations' or A Vacant Building?Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›