What are the implications of having child pornography on the premises? In businesses, child pornography generally is discovered by IT personnel. Or, if a corporation undergoes an unrelated internal investigation in which all computers, hard drives, e-mail servers, etc. are frozen and searched for responsive material, such a search can to lead to the discovery of child pornography stored on the corporation's server or on an individual's hard drive. What can/must/should be done as a result?
- October 28, 2010Marjorie J. Peerce and Carolyn Barth Renzin
In June, the Supreme Court unanimously held that Enron's former CEO Jeffrey Skilling did not commit "honest services" fraud, ruling that the statute under which he was convicted must be limited to bribery and kickback schemes to avoid constitutional concerns over vagueness. The decision should curtail prosecution of a variety of conduct that the government would otherwise seek to criminalize through the statute. In contrast, the courts are expanding the reach of other criminal statutes to encompass conduct previously regarded as outside their scope.
October 28, 2010Stanley A. Twardy, Jr. and Doreen KleinThe U.S. District Court for the Eastern District of New York dismissed a federal RICO claim that alleged the defendants took the basis for their TV program The Great American Road Trip from a TV show idea created by the plaintiffs.
October 28, 2010Stan SoocherFederal statutes protecting whistleblowers are on the rise. Most recently, the Dodd-Frank Act, meant to overhaul and strengthen federal oversight of the financial system, included workplace protections for whistleblowers in the financial services industry. But that is not the only new law to include whistleblower protections.
October 27, 2010Wayne N. Outten and Cara E. GreeneDespite huge technological advancements in the 25 years since passage of the SCA, and the ever-increasing prominence of electronic communication in our society, Congress has not amended the SCA to keep pace with changing technology. Rather, courts have had to lead the charge in applying the decades-old statute to modern Internet technology and electronic communication disclosure issues.
October 27, 2010Mark S. Sidoti, Philip J. Duffy and Paul E. AsfendisFamily care issues permeate the workplace, arising in the context of employee recruitment, growth, development and career advancement, and employee requests for time off, flexible schedules and other benefits.
October 27, 2010Karla GrossenbacherThe new UK Bribery Act comes into force in April 2011. It has been described by some as the most draconian anti-corruption law in the world.
October 27, 2010Barry VitouSection 922 of Dodd-Frank created awards of 10%-30% of monetary sanctions for whistleblowers who report to the SEC original information leading to securities law enforcement actions that recover more than $1 million. Here are 10 actions organizations might take to help mitigate the increased regulatory risk this change may create.
September 29, 2010Toby J.F. Bishop and Mohammed AhmedAs with domain names, social networking user names are often an extension of a person's or an organization's identity. Businesses, for example, use social networking identities to promote themselves as a source of goods and services. And the flip side of that coin is that abusive use of social networking user names allows a third party to benefit from the goodwill by-product endorsement. But here's the problem: Such abusive behavior constitutes intellectual property infringement.
September 28, 2010Jonathan BickAs students returned to school recently, many may have been looking ahead to their next day off. And today, there are so many online schools that e-commerce executives are turning the chorus of Alice Cooper's classic 1972 schoolboy anthem "School's Out" ' "School's out forever" ' into reality by turning school into another form of e-commerce.
September 28, 2010Stanley Jaskiewicz

