Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
Bar Exam Toolbox Podcast Episode 298: Spotlight on Contracts (Part 2)
Bar Exam Toolbox Podcast Episode 274: Listen and Learn -- UCC Expectation Damages (Contracts)
JONES DAY TALKS®: UCC Proposed Amendments Address Crypto and Other Digital Assets
Podcast: DeFi and Digital Assets: What do the UCC Amendments Mean for Business Transactions? [More with McGlinchey, Ep. 46]
Tokenization of IP Rights and NFTs in Commercial Finance [More with McGlinchey, Ep. 32]
Advancing Agriculture: Security Interests and Article 9 Challenges (Part 1)
Law School Toolbox Podcast Episode 267: Listen and Learn -- UCC 2-207 ("The Battle of the Forms")
Bar Exam Toolbox Podcast Episode 98: Listen and Learn -- The "Battle of the Forms" under UCC 2-207
Bar Exam Toolbox Podcast Episode 71: Tackling an MEE Contracts Essay Question
Making Cents of Your Cash Management Agreements
In this episode of The Consumer Finance Podcast, Chris Willis is joined by veteran litigators and Troutman Pepper Locke Partners Mary Zinsner and Heryka Knoespel to dissect a groundbreaking Fourth Circuit decision on bank...more
Business email compromise (BEC) fraud, driven by technology and increasing sophistication by criminal organizations, has become a major issue for both consumers and financial institutions. According to a September 2024...more
On March 26, the U.S. Court of Appeals for the Fourth Circuit reversed a district court’s decision holding a credit union liable for a wire transfer in a business email compromise scam case where the credit union lacked...more
While at your place of business, you receive an email from a trusted source with an established vendor, notifying you that the vendor’s bank account information has changed. Do you note the change in your business records and...more
Threat actors have recently and significantly increased efforts to defraud organizations and individuals through business email compromise (BEC). In BEC and related scams, the threat actors trick unsuspecting targets into...more