Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
Bar Exam Toolbox Podcast Episode 298: Spotlight on Contracts (Part 2)
Bar Exam Toolbox Podcast Episode 274: Listen and Learn -- UCC Expectation Damages (Contracts)
JONES DAY TALKS®: UCC Proposed Amendments Address Crypto and Other Digital Assets
Podcast: DeFi and Digital Assets: What do the UCC Amendments Mean for Business Transactions? [More with McGlinchey, Ep. 46]
Tokenization of IP Rights and NFTs in Commercial Finance [More with McGlinchey, Ep. 32]
Advancing Agriculture: Security Interests and Article 9 Challenges (Part 1)
Law School Toolbox Podcast Episode 267: Listen and Learn -- UCC 2-207 ("The Battle of the Forms")
Bar Exam Toolbox Podcast Episode 98: Listen and Learn -- The "Battle of the Forms" under UCC 2-207
Bar Exam Toolbox Podcast Episode 71: Tackling an MEE Contracts Essay Question
Making Cents of Your Cash Management Agreements
On March 26, 2025, the U.S. Court of Appeals for the Fourth Circuit issued an important decision addressing a depository institution’s liability for wire transfer losses resulting from a business email compromise scam....more
On March 26, the U.S. Court of Appeals for the Fourth Circuit reversed a district court’s decision holding a credit union liable for a wire transfer in a business email compromise scam case where the credit union lacked...more
Business email compromise (“BEC”) occurs when a payee’s business email account is compromised or impersonated. The threat actor, posing as the payee or its representative (e.g., the head of the accounting department), sends...more
While at your place of business, you receive an email from a trusted source with an established vendor, notifying you that the vendor’s bank account information has changed. Do you note the change in your business records and...more
Threat actors have recently and significantly increased efforts to defraud organizations and individuals through business email compromise (BEC). In BEC and related scams, the threat actors trick unsuspecting targets into...more