Raising the Stakes
February 28, 2015
The government has become increasingly aggressive in pursuing criminal claims not only against corporations, but also against in-house counsel and compliance personnel, for conduct once treated almost exclusively as civil.
In the Courts
February 28, 2015
In-depth analysis of two major rulings.
When Your Data Goes Viral
February 28, 2015
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.
Time to Define InsiderTrading
February 28, 2015
The average person probably believes it is illegal for a corporate insider to purchase or sell stock based on confidential information or provide the information to an outside trader. However, a bombshell ruling by an influential federal appeals court could make such conduct perfectly legal.
Data Security Breaches
February 28, 2015
In April 2014, the U.S. District Court for the District of New Jersey decided that the FTC could pursue a claim that a hotel company's failure to have adequate data security measures is an unfair trade practice. The agency believes that data security is a basic responsibility of any company that accepts consumer personal information.
Your International Compliance Playbook
January 31, 2015
As companies expand, the regulatory burden can become onerous. And compliance and legal departments are being asked to do more with less, making well-designed compliance programs all the more critical.
In the Courts
January 31, 2015
In-depth analysis of a recent case in which the Second Circuit ruled that "Tipping" liability for insider trading requires knowledge of the tipper's benefit.
When Your Data Goes Viral
January 31, 2015
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. The discussion concludes herein.