Features

Sticking a Hand in the Internet Cookie Jar
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some…
Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise
The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.
Columns & Departments
Business Crimes Hotline
Head of International NGO Convicted of Bribery, Money Laundering Crimes
Features

Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features

10 Common Mistakes When Dealing With DOJ Antitrust Criminal Prosecutors
Corporate counsel should be aware of the following 10 common mistakes that practitioners make when representing clients in criminal antitrust matters.
Features

Confronting the Company: Corporate Guilty Pleas as Evidence in Criminal Trials
This article reviews the history of the admission of individual co-conspirator plea allocutions in criminal cases and discuss why the admission of a corporate guilty plea, despite the opportunity to cross-examine a corporate employee who signed the plea agreement, does not provide the type of cross-examination guaranteed by the Confrontation Clause.
Columns & Departments
In the Courts
Sentencing for Two Bankers in Zürcher Kantonalbank of Switzerland Case
Features

Conducting Due Diligence Today
There is no one-size-fits-all approach to due diligence, but some methods are significantly cheaper and more aligned to the business than others.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›