Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Mystery Subpoena Case at High Court Could Expand U.S. Authority Image

Mystery Subpoena Case at High Court Could Expand U.S. Authority

Peter B. “Bo” Rutledge & Amanda W. Newton

Rare Supreme Court holiday activity and ongoing news coverage about special counsel Robert Mueller's investigation has drawn much attention to the enigmatic case of <i>In Re Grand Jury Subpoena</i>. The matter is unremarkable, presenting familiar issues of international litigation. Upon further examination, however, the case may have the potential to expand the authority of United States courts over foreign states and their agencies or instrumentalities.

Columns & Departments

In the Courts Image

In the Courts

Colleen Snow

New Charges in Insurance Corporation of Barbados Limited Bribery Case

Columns & Departments

Business Crimes Hotline Image

Business Crimes Hotline

Colleen Snow

Securities Commission Malaysia Issues Maximum Fine for Deloitte Related to 1MDB Audits

Columns & Departments

Business Crimes Hotline Image

Business Crimes Hotline

Colleen Snow

Securities Commission Malaysia Issues Maximum Fine for Deloitte Related to 1MDB Audits

Features

Beyond the FCPA: M&A Due Diligence Under the Expanded DOJ Corporate Enforcement Policy Image

Beyond the FCPA: M&A Due Diligence Under the Expanded DOJ Corporate Enforcement Policy

Jonathan B. New & Elias D. Trahanas

Over the past few years, the U.S. Department of Justice (DOJ) has taken notable steps to advance the axiom that the business community and law enforcement are "partners, not adversaries." DOJ has now taken its guidance one step further, announcing that the FCPA Corporate Enforcement Policy would apply to all potential wrongdoing discovered by an acquirer in the course of a merger or acquisition, not just to FCPA violations.

Features

Sticking a Hand in the Internet Cookie Jar Image

Sticking a Hand in the Internet Cookie Jar

Jeffrey Higel, Michael Bahar & Mike Nelson

As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some…

Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise Image

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise

Phillip Bantz

The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.

Columns & Departments

In the Courts Image

In the Courts

Dennis Mahoney

Fifth Circuit Reverses Ponzi Funds Ruling

Columns & Departments

Business Crimes Hotline Image

Business Crimes Hotline

Dennis Mahoney

Head of International NGO Convicted of Bribery, Money Laundering Crimes

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›