Features
Safe Harbor Shields Shareholders In Tribune Fraudulent Transfer Litigation
The U.S. District Court for the Southern District of New York denied a litigation trustee's motion for leave to file a sixth amended complaint that would have asserted constructive fraudulent transfer claims against 5,000 Tribune Company shareholders. The safe harbor of Bankruptcy Code §546(e) barred the trustee's proposed claims.
Features
"Spoofing" as Fraud: A Novel and Untested Theory of Prosecution
The DOJ has signaled its intent to pursue prosecutions for spoofing — which the law defines as "bidding or offering with the intent to cancel the bid or offer before execution" — aggressively. This article begins with a brief discussion of the elements that the government must prove to establish commodities fraud and wire fraud. It then examines recent spoofing prosecutions that raise important questions about the applicability of the traditional fraud statutes to spoofing-related activity. How the federal courts answer these open questions will have significant implications for participants in the commodities markets.
Columns & Departments
Business Crimes Hotline
Securities Commission Malaysia Issues Maximum Fine for Deloitte Related to 1MDB Audits
Columns & Departments
Business Crimes Hotline
Securities Commission Malaysia Issues Maximum Fine for Deloitte Related to 1MDB Audits
Features
Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
Cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year. These cutting-edge problems intersect in interesting ways with companies' existing fraud and anti-money laundering concerns, but it all starts with the cryptocurrency "wallet."
Features
Secured Creditors Beware of Your Descriptions, Nomenclature and Terminations
Secured creditors can learn a great deal from a few recent bankruptcy cases involving the Uniform Commercial Code that remind us that the “devil is in the details.” These cases show that it is unrealistic to expect forgiveness by a court after a misstep involving Article 9 of the UCC.
Features
Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.
Features
Fifth Circuit Affirms Shareholder Veto of Chapter 11 Petition
“Federal law does not prevent a bona fide shareholder from exercising its right to vote against a bankruptcy petition just because it is also an unsecured creditor,” held the U.S. Court of Appeals for the Fifth Circuit in <i>In re Franchise Services of North America, Inc.</i> According to the court, applicable Delaware law would not “nullify the shareholder's right to vote against the bankruptcy petition.”
Features
When Is a Bid or Offer a 'Spoof'?
<b><i>U.S. Supreme Court Denial of Cert Leaves Statute Vague</i></b><p>This article analyzes the confusion faced by commodity futures traders in assessing whether their trading strategies constitute illegal spoofing and examines whether the CFTC and Seventh Circuit have provided sufficient guidance on the distinction between spoofing and legitimate trading activity.
Features
Preparing for Proxy Season 2018: A Primer for General Counsel
As we enter 2018, public companies across the United States will begin, in earnest, their preparations for this year's proxy season and annual shareholder meetings. It is not an understatement to say that 2017 was a tumultuous year on many fronts — economically, politically and globally. As a result, general counsel should have several issues on their radar that could play a role in 2018's proxy season.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Surveys in Patent Infringement Litigation: The Next FrontierMost experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
