Features

OFAC, Commerce, and DOJ Emphasize Pursuit Of Enforcement Actions Against Non-U.S. Persons and Entities
The guidance mirrors the recent, broader impulse among U.S. prosecutors and regulatory agencies to extend application of U.S. law to foreign persons and entities, even when those persons and entities have only threadbare connections to the U.S.
Features

Common Pitfalls In Personal Device Collection
Both the DOJ and the SEC have made it clear that they will look at company BYOD policies when assessing how to resolve matters under their purview. To avoid pitfalls — and sanctions — counsel must take proactive steps to ensure proper preservation and collection of personal mobile data and verify that clients comply.
Features

Decoding DOJ's New 'Justice AI' Initiative
The DOJ is likely to face many practical challenges and novel issues as it begins coding its own algorithm for AI-related enforcement. This article briefly examines three areas of AI-related enforcement where such practical challenges and novel issues may arise.
Features

Artificial Intelligence: The New Weapon of Insider Threats
It is imperative that every organization acknowledges and takes seriously the potential harm that can be caused by insiders who misuse AI as a weapon for personal gain or to settle scores.
Features

The Benefits of Utilizing a Written Joint Defense Agreement Properly Tailored to Limit Future Conflicts
A recent decision from the U.S. District Court for the Southern District of Florida illustrates a benefit of utilizing a written joint defense agreement properly tailored to limit future conflicts, rather than relying on the oral agreements that are common among many practitioners.
Features

Leveraging Data and Deal Terms to Meet the Demands of the DOJ's New M&A Safe Harbor
This article describes the DOJ's new M&A safe harbor policy and also provides practical insights on how companies engaged in M&A can meet the DOJ's expectations.
Features

Enhanced Oversight of Search Warrants and Title III Wiretaps
Search warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.
Features

The False Claims Act Seal: Does It Bind and Gag the Defendant?
<b><i>Part One of a Two-Part Article</i></b><p>A company that finds itself the target of a federal fraud investigation often faces the fraught question of whether it may, or even must, disclose the existence of that investigation to third parties, such as its investors, shareholders, major creditors, or insurers. The question can be even more complicated if that investigation is being pursued under the False Claims Act and arises as the result of a sealed <i>qui tam</i> complaint.
Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.
Features

The Rise of the Travel Act
The DOJ continues to prioritize health care anti-fraud enforcement through the aggressive use of different statutes and investigative methods. Now, the government is putting a 60-year-old tool to a new use: It is using the federal Travel Act to pursue criminal charges against health care entities in connection with health care bribery/kickback schemes. This article discusses these recent actions and the potential ramifications of the expansion of the scope of the Travel Act.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- Germany: More on The Enforceability Of GPL ProvisionsOnce again, a German court has ruled on the GNU (programs of all-free software) General Public License ('GPL') and confirmed its enforceability in Germany. The judgment was handed down on July 24 (Landgericht Mnchen I, decision of 24th July 2007 - 7 O 5245/07 - not final); still, it is noteworthy that the GPL provisions so far have received positive evaluation by German courts.Read More ›