Features
SEC Releases New Guidance on Cybersecurity Disclosures and Controls
On Feb. 21, 2018, the SEC voted unanimously to approve a statement and interpretive guidance to assist the public in preparing disclosures about cybersecurity risks and incidents. The new guidance expands upon previous guidance provided in October of 2011.
Features
<i>A Roundtable Discussion:</i> How Evolving Media Types and Cybersecurity Concerns Are Impacting e-Discovery
In this roundtable discussion, two law firm partners and two GCs share their experience and insight on the evolving nature of e-discovery and its intersection with AI, cybersecurity and privacy.
Features
Compliance Officers and Law Enforcement: Friends or Foes?
<b><i>Part Two of a Two-Part Article</b></i><p>As we saw in Part One, regulators have recently shown a tendency to focus on compliance officers who they deem to have failed to ensure that the compliance and anti-money laundering (AML) programs that they oversee adequately prevented corporate wrongdoing, and there are several indications that regulators will continue to target compliance officers in 2018 in actions focused on Bank Secrecy Act/AML compliance.
Features
Supreme Court Ties SEC's Hands in Whistleblower Case
With its decision in <i>Digital Realty v. Somers</i>, the U.S. Supreme Court dealt a blow to companies interested in learning of their own securities violations before the government gets the heads-up. The case's outcome means whistleblowers who might have reported violations internally will be incentivized to bypass their own companies' compliance mechanisms in favor of immediate reporting to the SEC.
Features
Cyber Risk Assessments are a Critical Component of All Cybersecurity Programs
Many companies remain overwhelmed by the prospect of developing a cybersecurity program. Too many still see cyber crime as an IT issue, and simply defer to that department. Cybersecurity is most definitely an information security issue and it must be treated as such. Failure to recognize this concept almost ensures a weak cybersecurity program that remains highly vulnerable to breaches.
Features
DOL's New Rules on ERISA Claims Procedure for Disability Benefits
The Department of Labor (DOL) issued regulations that revise the ERISA claims procedure regulations for employee benefit plans that provide disability benefits. The scope of the new regulations are broader than you may realize and apply to any plan, regardless of how it is characterized, that provides benefits or rights that are contingent on whether the plan determines an individual to be disabled.
Features
The Struggle to Keep Up With Data Privacy Regulations
Data privacy is one of the most important issues facing corporations, and amidst the challenges of protecting customer data, the regulatory landscape that oversees it is shifting on an almost daily basis. With changes occurring at such a rapid pace across all corners of the globe, it's not surprising that organizations are increasingly finding themselves inadequately prepared to deal with these regulations.
Features
Hiring Practices and the FCPA
While laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.
Features
Regulating Interior Landmarks: New York Court Says Duties Don't End
What powers does the New York City Landmarks Preservation Commission have to require a building owner to maintain a mechanical clock located in the interior of a building? In <i>Save America's Clocks, Inc. v. City of New York</i>, New York's Appellate Division, First Department, held that the Commission had power to require maintenance of the clock, and to require public access to it.
Features
Sexual Harassment & the Legal Industry
For members of a conservative industry that — literally — wrote the rulebook on sexual harassment, law firms need to be ready for a day of reckoning that seems inescapable.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
