Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Chapter 15 Practice: U.S. Venue Selection Clause Does Not Trump Distribution Scheme in Italian Restructuring Plan Image

Chapter 15 Practice: U.S. Venue Selection Clause Does Not Trump Distribution Scheme in Italian Restructuring Plan

Dan T. Moss & Mark G. Douglas

The U.S. Bankruptcy Court for the District of Delaware recently ruled that choice of law and venue selection provisions in a contract between a U.S. creditor and Italian debtor did not trump the debt restructuring plan approved by an Italian bankruptcy court.

Features

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?' Image

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'

Stacey Garrett

U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?

Features

Vendor Risk Management for Law Firms: 7 Steps to Success Image

Vendor Risk Management for Law Firms: 7 Steps to Success

Ishan Girdhar

Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.

Features

You're Going to Need a Bigger Boat Image

You're Going to Need a Bigger Boat

Mark Sangster

<b><i>Small Law Firms Face Large Regulatory Requirements</b></i><p>Unlike large firms with comparable resources with which to protect client non-public information, small firms can find themselves trapped between cyberattacks, like ransomware, that don't prejudice based on the size of firm, and regulators who are indifferent to your size, when investigating a potential violation.

Features

How the New UST Fee Schedule Is a Ticking Tax-Bomb for Middle Market Debtors Image

How the New UST Fee Schedule Is a Ticking Tax-Bomb for Middle Market Debtors

Jacob H. Marshall & Randall Klein

As of Jan. 1, 2018, each jointly administered debtor with quarterly disbursements of at least $1,000,000 must pay a fee of 1% of all disbursements, up to $250,000 per quarter. Although this change in the law was only intended to address shortfalls in UST funding, it has taken a little-noticed component of bankruptcy and magnified it into a ticking tax-bomb for unsuspecting debtors and their lenders.

Features

SEC Releases New Guidance on Cybersecurity Disclosures and Controls Image

SEC Releases New Guidance on Cybersecurity Disclosures and Controls

David F. Katz

On Feb. 21, 2018, the SEC voted unanimously to approve a statement and interpretive guidance to assist the public in preparing disclosures about cybersecurity risks and incidents. The new guidance expands upon previous guidance provided in October of 2011.

Features

<i>A Roundtable Discussion:</i> How Evolving Media Types and Cybersecurity Concerns Are Impacting e-Discovery Image

<i>A Roundtable Discussion:</i> How Evolving Media Types and Cybersecurity Concerns Are Impacting e-Discovery

ssalkin &

In this roundtable discussion, two law firm partners and two GCs share their experience and insight on the evolving nature of e-discovery and its intersection with AI, cybersecurity and privacy.

Features

Compliance Officers and Law Enforcement: Friends or Foes? Image

Compliance Officers and Law Enforcement: Friends or Foes?

Jonathan B. New & Patrick T. Campbell

<b><i>Part Two of a Two-Part Article</b></i><p>As we saw in Part One, regulators have recently shown a tendency to focus on compliance officers who they deem to have failed to ensure that the compliance and anti-money laundering (AML) programs that they oversee adequately prevented corporate wrongdoing, and there are several indications that regulators will continue to target compliance officers in 2018 in actions focused on Bank Secrecy Act/AML compliance.

Features

Supreme Court Ties SEC's Hands in Whistleblower Case Image

Supreme Court Ties SEC's Hands in Whistleblower Case

Janice G. Inman

With its decision in <i>Digital Realty v. Somers</i>, the U.S. Supreme Court dealt a blow to companies interested in learning of their own securities violations before the government gets the heads-up. The case's outcome means whistleblowers who might have reported violations internally will be incentivized to bypass their own companies' compliance mechanisms in favor of immediate reporting to the SEC.

Features

Cyber Risk Assessments are a Critical Component of All Cybersecurity Programs Image

Cyber Risk Assessments are a Critical Component of All Cybersecurity Programs

Collin J. Hite

Many companies remain overwhelmed by the prospect of developing a cybersecurity program. Too many still see cyber crime as an IT issue, and simply defer to that department. Cybersecurity is most definitely an information security issue and it must be treated as such. Failure to recognize this concept almost ensures a weak cybersecurity program that remains highly vulnerable to breaches.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES