Features
Sticking a Hand in the Internet Cookie Jar
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some…
Features
U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise
The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.
Columns & Departments
Business Crimes Hotline
Head of International NGO Convicted of Bribery, Money Laundering Crimes
Features
Fighting Biometric Fraud on the Blockchain
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Features
10 Common Mistakes When Dealing With DOJ Antitrust Criminal Prosecutors
Corporate counsel should be aware of the following 10 common mistakes that practitioners make when representing clients in criminal antitrust matters.
Features
Confronting the Company: Corporate Guilty Pleas as Evidence in Criminal Trials
This article reviews the history of the admission of individual co-conspirator plea allocutions in criminal cases and discuss why the admission of a corporate guilty plea, despite the opportunity to cross-examine a corporate employee who signed the plea agreement, does not provide the type of cross-examination guaranteed by the Confrontation Clause.
Columns & Departments
In the Courts
Sentencing for Two Bankers in Zürcher Kantonalbank of Switzerland Case
Features
Conducting Due Diligence Today
There is no one-size-fits-all approach to due diligence, but some methods are significantly cheaper and more aligned to the business than others.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›