Front Line Interview Episode 1. Alison Taylor: Organizations, Compliance & Corruption
An FCPA Journey to the Darkside & Steps to Protect Your Organization
From Behind the Bribe: The Sharp End of Compliance
Legal Minute - SEC Enforcement Actions: Federal Court vs. In-House Proceedings
FCPA Compliance and Ethics Report-Episode 176-Tim Treanor on the PetroTiger Declination
FCPA Compliance and Ethics Report-Episode 168-Dan Cogdell on criminal procedure issues in defending an individual prosecuted criminally under the FCPA
Bribery & Corruption in the Military. A Front-Line View (Part II)
BakerHostetler Attorneys James Mastracchio and Jay Nanavati Discuss Global Tax Enforcement
Bribery & Corruption in the Military. A Front-Line View (Part I)
Richard Bistrong Weighs in on the FIFA Scandal and Takedowns
What if I am pulled over and suspected of driving under the influence?
Front-Line Video: An Interview with Jane Ellis, Anti-Bribery and Compliance Expert
A Moment of Simple Justice - Felony Everything
Understanding the Different Mandates Between Legal and Compliance February 3 2015
Investment Management Update - January 2015
Government's Health Care Fraud "Cash Cow" Keeps Mooing
Cullen & Dykman Sees Colleges Calling for Title IX Help v
What is a PBT? Do I have to cooperate?
BigLaw Recruiter: We Didn't Kill Dewey & LeBoeuf
How the Rise in Undercover Investigations is Changing the Law
Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
Overview: The Ninth Circuit Court of Appeals recently found that probable cause supported a warrant authorizing the electronic search of computer equipment and digital storage devices belonging to a suspected child...more
People v. Kucharski, 2013 WL 1281844 (Ill. App. 2nd Dist. Mar. 29, 2013).
In this harassment through electronic communications case, the defendant allegedly posted lewd comments and offensive remarks on the victims...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
When someone subpoenas subscriber information from an internet service provider, does the subscriber have an expectation of privacy? In California, at least, the answer seems to be: No.
In People v. Stirpo, (Second District...more
This decision is the subject of the grant of certiorari by the United States Supreme Court in United States v. Jones, 10-1259.
Maynard and Jones were co-defendants. All legal issues have either been resolved or abandoned...more
The South Africa Law Reform Commission has approved the publication of its Issue Paper on “Electronic Evidence in Criminal and Civil Proceedings: Admissibility and Related Issues” for general information and comment. The...more
In People v. McInnis, the Defendant was convicted of attempted witness bribery. The Defendant attempted to keep witnesses from testifying against the Defendant’s nephew, in the nephew’s trial for robbery and kidnapping. ...more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Criminal Law Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top