Features
Does Your Corporate Compliance Program Reasonably Prevent Fraud? New UK Guidance Demands It
This article first discusses the legal backdrop of the UK’s new strict liability law and then summarizes what companies need to know about the new UK guidance, with particular emphasis on the areas where it expands on the ECCP.
Features
High Court May Limit the Reach of the Wire Fraud Statute
On Dec. 9, 2024, the Supreme Court will hear argument in Kousisis v. United States, a case that will again review the reach of the federal mail and wire fraud statutes. At issue this time is the so-called “fraudulent inducement” theory of property fraud — namely, whether deception to induce a commercial exchange can constitute mail or wire fraud, even if the infliction of economic harm on the alleged victim was not the object of the scheme.
Features
Compliance and Third-Party Risk Management
To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.
Features
Navigating the SEC's Marketing Rule: Compliance Challenges and Legal Insights
The Securities and Exchange Commission (SEC) has underscored the critical importance of Marketing Rule compliance through a series of recent enforcement actions and risk alerts. This article delves into the challenges that investment advisers must navigate when marketing their services. It also explores how legal counsel and compliance consultants can effectively support their clients in adhering to both the explicit requirements and nuanced aspects of the Marketing Rule.
Features
The DOJ's Whistleblower Pilot Program Adds Incentives for Robust Corporate Compliance Programs
By incentivizing individuals to report misconduct through its Whistleblower Pilot Program, the DOJ has expanded its arsenal and the means by which it can identify misconduct. So wrongdoers beware — although this is not the Old West, everybody loves a good bounty.
Features
Why High-Quality Data is Crucial to Fighting Financial Crime
The fight against financial crime is becoming increasingly complex. The increasing prominence of AI also means that firms may leave themselves exposed to unexpected risks if they do not carefully consider the quality of the data that fuels the AI system.
Features
DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps Ringing
DOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.
Features
Second Circuit Holds No Special Standard for Charging Campaign Contributions As Bribes, Reinstates Charges Against Former NY Lieutenant Governor
We now have an opportunity to see whether the volume of campaign contribution bribery cases in the Second Circuit increases, and whether the government brings any cases that appear to infringe on the First Amendment interests of campaign contributors and candidates.
Features
OFAC, Commerce, and DOJ Emphasize Pursuit Of Enforcement Actions Against Non-U.S. Persons and Entities
The guidance mirrors the recent, broader impulse among U.S. prosecutors and regulatory agencies to extend application of U.S. law to foreign persons and entities, even when those persons and entities have only threadbare connections to the U.S.
Features
Common Pitfalls In Personal Device Collection
Both the DOJ and the SEC have made it clear that they will look at company BYOD policies when assessing how to resolve matters under their purview. To avoid pitfalls — and sanctions — counsel must take proactive steps to ensure proper preservation and collection of personal mobile data and verify that clients comply.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›