Today the Treasury Inspector General released a Report titled “The Whistleblower Program Helps IdentifyTax Noncomplicane; However, Improvements Are Needed to Ensure That Claims Are Processed Appropriately and Expeditiously” about the IRS Whistleblower Program.
Just in late last week: Netflix counters the Fox lawsuit with a jab of its own – Netflix claims that the employment agreements that Fox utilizes and its practices concerning those term agreements run afoul of California law.
In a long-awaited decision (at least by the parties and fidelity law practitioners) the Fifth Circuit Court of Appeals has held that a “Computer Fraud” Insuring Agreement in a Crime Insurance Policy does not cover the insured’s loss after its employees were tricked into wiring approximately $7 million to a fraudulent bank account set up by criminals posing as one of the insured’s trusted vendors.
Under the Small Business Administration’s regulations, two firms may partner as a joint venture to perform a small business set-aside contract, provided that each partner is a small business under the size standard assigned to the contract.
Now that you understand what prompts an agency subpoena or CID, the next step is to have a strategy, which involves answering the question, “what should I do?” Taking the right approach from the outset is critical to protecting your company’s interests.
We’ve written extensively on cannabis trademarks and the unique issues posed by the fact that cannabis remains a Schedule I controlled substance under federal law.
Few countries match the expropriatory model of revolutionary Cuba.
With the presidential election fast approaching, businesses may be wondering what the next administration is likely to do with respect to sanctions and export controls.
China’s New Foreign Investment Law: The “Actually Controlling Person” Requirement is Going to Be Tough
One of the features of China’s new Foreign Invested Enterprise (FIE) online filing registration for is the requirement that the foreign investor state who will be the WFOE’s “actually controlling person.”
Computer Fraud Provision of Crime Policy Does Not Cover Loss from Business Email Compromise and Social Engineering Scheme
Applying Texas law, the United States Court of Appeals for the Fifth Circuit has held that a business email compromise loss involving social engineering did not “result directly from the use of any computer to fraudulently cause a transfer” and thus did not trigger Computer Fraud coverage under a commercial crime insurance policy.