Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,319 results for "Business Crimes Bulletin"...

Data Breaches and Insurance Coverage
August 02, 2014
When a breach of the data occurs and confidential information is accessed by unauthorized persons, the financial consequences to the business entity may be substantial. But when that business seeks defense and indemnification from its insurer, the insurer just might push back.
Business Crimes Hotline
August 02, 2014
In-depth discussion of several key cases.
In the Courts
August 02, 2014
Analysis of a decision in which the D.C. Circuit ruled on attorney-client privilege protections for corporate internal Investigations
Business Crimes Hotline
July 02, 2014
Question on Appeal: Can Federal Prosecutors Reach Electronic Communications Abroad?
Cyberattacks Push Companies to Specialty Insurance Policies
July 02, 2014
As insurers refine coverage defenses and expand exclusions for cyber events, business will have to turn to specialty cyber policies for protection against data theft or loss.
General Schemes vs. Specific Claims
July 02, 2014
The <I>qui tam</I> provisions of the False Claims Act, which allow private individuals ("relators") to bring suit on behalf of the federal government and keep a percentage of the proceeds, continue to be some of the most potent weapons in the government's antifraud arsenal.
Bank Fraud Defined
July 02, 2014
The U.S. Supreme Court recently held that the provision of the federal bank fraud statute which makes it a crime to "knowingly execut[e] a scheme ' to obtain" property owned by, or under the custody of, a bank "by means of false or fraudulent pretenses," does not require the government to prove that a defendant intended to defraud a bank into paying him or her money.
Coverage Disputes over Data Breaches
July 02, 2014
Each day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.
In the Courts
July 02, 2014
Analysis of two pivotal rulings.
Business Crimes Hotline
June 02, 2014
Analysis of a case out of Nevada.

MOST POPULAR STORIES