Choosing a Trustee: Navigating the Complexities and Key Considerations
Five Tips for a New Public Company Director
Sunday Book Review: June 15, 2025. The Books on Corporate Governance Edition
PODCAST: Williams Mullen's Benefits Companion - Forfeitures Under Fire
PODCAST: Williams Mullen's Benefits Companion - Navigating Fiduciary Responsibilities in a Tide-Turning ESG Era
How ERISA Litigators Strengthen Plan Compliance and Risk Management: One-on-One with Jeb Gerth
What happens when a majority owner makes a bad-faith capital call?
#WorkforceWednesday®: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week®
John Wick - What You Need To Know about the Corporate Transparency Act
PODCAST: Williams Mullen's Benefits Companion - ERISA Forfeiture Litigation
Once Removed Episode 24: Expressing Goals and Intent for the Trust
Episode 322 -- Checking in on Caremark Cases
What Can A Tax Attorney Do For You? A Podcast With Janathan Allen
PODCAST: Williams Mullen's Benefits Companion - New Federal Rule Aims to Hold Investment Advisors to a Higher Standard
A Primer On Trusts - A Podcast with Janathan Allen
Podcast - Deberes fiduciarios de los administradores
New SEC Private Funds Rules – What Is Happening and What You Need to Know - Troutman Pepper Podcast
Podcast Episode 189: Adding Context to Compliance and Color To Your Legal Practice
BVI Companies and M&A
Basics of Impact Investing: A Conversation About Investment Policies and Evaluation Metrics For ESG Investors
Cybercriminals look for two things when seeking a victim—access and opportunity. ERISA retirement plans offer both. Cybercriminals exploit weaknesses in systems, software, or human behavior to find opportunities for easy...more
In its most recent step to combat cybersecurity risks to employee benefit plans, the U.S. Department of Labor (DOL) clarified on September 6, 2024, that its guidance on cybersecurity applies to health and welfare plans as...more
On February 9, the SEC proposed new cybersecurity risk management regulations for investment advisers, registered investment companies (funds), and business development companies....more
The Department of Labor (DOL) recently issued new guidance on best practices for maintaining cybersecurity in connection with ERISA plans (the Guidance). The Guidance, which is intended for sponsors, fiduciaries, record...more
On April 14, 2021, the Department of Labor’s (DOL) Employee Benefits Security Administration issued guidance on cybersecurity for the first time to help plan sponsors, fiduciaries, service providers, and participants protect...more
There has been an increasing focus in recent years on the intersection of ERISA’s fiduciary duties and the issues of cybersecurity and data (including participant data) protection. Beyond the potential for pecuniary and...more
Cybersecurity continues to be an important fiduciary responsibility as the threat for security breaches grows with fraud, hacking or phishing schemes. During this COVID-19 pandemic, cybersecurity for your ERISA retirement...more
• The signing of the California Consumer Privacy Act (CCPA) into law in June 2018 imposed significant new privacy obligations on businesses that have personal information about California residents and set off a burst of...more
New York’s state legislature is considering a new data privacy law that would set the standard for data privacy in the U.S. The New York Privacy Act (the “NYPA” or the “Act”), which is currently being considered by the state...more
In this episode, the third of three building on Akin Gump’s annual Top 10 Topics for Directors report, partner Michelle Reed discusses the critical question of cybersecurity and the corporate world. Among the topics covered: ...more
Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more
New Rules, Proposed Rules, Guidance and Alerts – SEC STAFF GUIDANCE AND ALERTS - SEC Staff Issues Guidance on Cryptocurrency-related Holdings - On January 18, 2018, the staff of the SEC’s Division of Investment...more
Originally published in Haig, Business and Commercial Litigation in Federal Courts, Fourth Edition §§ 87:1 et seq. © 2016 American Bar Association. This chapter discusses federal court litigation relating to health care...more
- AXA Prevails at First Post-Jones v. Harris Excessive Fee Trial - Potential Secondary Effects of Regulatory Examinations: Evidentiary Issues and Preclusion in Parallel Litigation - On The Horizon: Global...more
A continuing frequent question from public companies is how a board should be constituted to oversee cybersecurity. Many public companies foist this additional burden on the audit committee. Those large enough to have a...more
An Illinois circuit court judge has dismissed five of six claims in a consolidated class action against Advocate Health and Hospital Corporation arising from a data breach in July 2013. The judge’s dismissal with prejudice...more
A recent Delaware Chancery Court decision dismissing derivative fiduciary duty claims has significance for public companies with board members who are associated with venture capital firms. ...more
Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more
Shortly after the massive 2013 Target data breach, shareholders filed four derivative lawsuits against the company’s directors and some of its officers (13 CARE 624, 3/20/15). The shareholders alleged that the defendants had...more
Everyone remembers the Target Corporation data breach, one of the worst in history. In late 2013, hackers forced their way into Target’s computer system, accessing the information of approximately 70 million customers,...more
If a corporation is the target of a cyberattack resulting in a data breach, its board may be the target of a shareholder derivative action claiming breach of fiduciary duty. A recent example is Palkon v. Holmes, No....more
With data breaches, cyberterrorism and governmental enforcement of the protection of privacy on the rise, corporations are facing an increased likelihood of claims, legal proceedings and costs. Without a proper understanding...more
Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more