Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,307 results for "Business Crimes Bulletin"...

When Your Data Goes Viral: Insurance for Data Breaches
December 31, 2014
This article explains the traditional insurance products that may provide a policyholder with insurance coverage for data breaches, and some of the newer products available to policyholders for these risks.
Business Crimes Hotline
December 31, 2014
Discussion of two key rulings.
When Your Data Goes Viral: Insurance for Data Breaches
December 31, 2014
Data breaches are part of the technological age. Indeed, 2013 was dubbed the year of the "mega breach," and in 2014, as of October, there had been 621 publicly reported data breaches, exposing 77,890,487 records. In early October 2014, JPMorgan Chase reported a data breach affecting as many as 76 million households and 7 million small businesses, making it one of the largest data breaches ever reported.
Recent Developments In Restitution Law
December 31, 2014
The Supreme Court, recently settled an important question on the valuation of loan collateral and, at the opposite end of the complexity spectrum, it addressed restitution under the Violence Against Women Act for possession of child pornography, generating multiple dissents, and offering at least a flavor of how the justices might be inclined to approach the general restitution statutes.
The Territorial Barrier To Commodity Exchange Act Suits
December 31, 2014
While judicial ink has long been spilled on the extraterritoriality of the securities laws, growing attention is being paid to the overseas reach of the antifraud provisions of the Commodity Exchange Act (CEA).
In the Courts
December 31, 2014
In-depth discussion of a case in which investors won a Madoff 'fictitious profits' appeal.
Business Crimes Hotline
November 30, 2014
A look at a key ruling.
Global Corruption Enforcement
November 30, 2014
Counsel, directors and managers of multinational companies that have corporate compliance programs and codes of conduct in place may think the company has done all it can to reduce the risks posed by potential corrupt employee actions. But these things may not go far enough.
In the Courts
November 30, 2014
Analysis of a case in which a restitution bid failed in wire fraud involving Kyrgyzstan.
Defining Protected Activity Under SOX
November 30, 2014
In <I>Nielsen v. AECOM Technology</I>, the Second Circuit became the latest circuit to hold that employees need not "definitively and specifically" identify a particular securities law or category of fraud in order to be protected from retaliation. This is a significant victory for employees.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›