Features
FinTech: The Emerging Financial Crime Compliance Minefield
The proliferation of so-called "FinTech" ' particularly by startups outside the financial sector ' raises a host of thorny FCC issues for regulators and financial institutions required to comply with the Bank Secrecy Act (BSA) and its anti-money laundering (AML) mandates.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Checklist and Commentary on Defenses for Right of Publicity Claims
This article is Part Two of a two-part series. Part One appeared in the April issue of <i>Entertainment Law & Finance</i>. Part Two starts with a continuation of the author's discussion of First Amendment defenses to right of publicity claims.
Features
<b><i>Online Extra:</b></i> Nonprofits Ask Copyright Office to Reform DMCA Takedown Procedures
At the end of 2015, the U.S. Copyright Office announced that it would take comments to determine the effectiveness of the safe harbor provisions in the Digital Millennium Copyright Act. It's clear that the Copyright Office will hear some complaints that the DMCA doesn't offer enough of a deterrent against abusive takedown notices.
Features
Equity Crowdfunding
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
Features
When May a Director Inspect the Company's Books and Records?
It is well settled under Section 220(d) of the Delaware General Corporation Law (DGCL), a director's access to corporate books and records is broader than that of stockholders. However, in contrast to the broad scope of discovery permitted in a plenary action under the Delaware Court of Chancery Rule 26, Section 220 limits inspection (even by directors) to documents and communications that fall within its more limited "contemplation of 'books and records,'" which correlates with the "summary nature of a Section 220 proceeding."
Features
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Features
10th Circuit Upholds Tax Reporting Law
Because of a controversial U.S. Supreme Court ruling from 1992, online retailers don't charge sales tax in states where they don't have a physical presence. It's a situation that traditional retailers have bemoaned for years. To their dismay, the U.S. Congress hasn't done a thing about it.
Features
What Non-Delaware Lawyers Need to Know About e-Discovery in Delaware
Many non-Delaware lawyers will, at some point in their careers, find themselves practicing in a Delaware court after being admitted pro hac vice. For those that do, it is important to note that the Delaware courts take e-discovery seriously and have a sophisticated understanding of it. This article serves as a primer on conducting e-discovery in the Delaware courts.
Features
Mitigating Data Breach Risk
Today's legal departments are undergoing fundamental changes thanks in part to the imminent threat of ongoing cyberattacks. Given the massive breaches at some of the world's visible brands ' Anthem, Blue Cross Blue Shield, Experian and Sony Pictures Entertainment, to name just some of the most notorious recent victims ' it is increasingly clear that cybersecurity can no longer be regarded as the exclusive domain of IT.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Law Firms and the Rise of HospitalityThe law firm office cannot remain unchanged, as if frozen in time set to some date prior to the onset of pandemic, when the terms and meaning have all changed. In fact, the office must now provide benefits or an experience the lawyers and staff cannot get at home.Read More ›
- From the PTO to the FDA: What to Consider When Branding Clinical TrialsThe legal implications of branding generally arise initially for companies during the process of selecting a company name and any initial product or service names. For drug development companies, however, careful consideration should also be paid to the implications of branding a clinical trial.Read More ›
- Disconnect Between In-House and Outside Counsel'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.Read More ›