Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or secu...
We have the answers
Search Results
Many employers have begun using artificial intelligence (AI) tools supplied by third-party vendors. On May 18, 2023, the Equal Employment Opportunity Commission (EEOC) provided guidance indicating that, in its view, employers are generally liable for the outcomes of using selection tools to make employment decisions. Learn more about what tool...
Single family offices should understand Lender Bagel structures and consider using them if they are not already. Knowledge of this structure has spread like wildfire since the landmark case, Lender Management LLC v. Comm’s. This article equips the reader with an understanding of the core principles of what Lender Bagel structures and how to investi...
In this 10-minute interview, attorney Bryan House of Foley & Lardner joins Brian Lucareli to discuss the SEC enforcement for family offices. During the interview, Bryan explained who is subject to the Investment Advisers Act, and provided a real-life example of the SEC getting involved with a family office.
Extreme winter weather is responsible for hundreds of deaths and substantial financial losses in North America each year. By taking proactive measures, you can ensure you’re better equipped to handle the challenges winter storms present. Stay safe and use this checklist as part of your risk management plan to help you prepare, respond, and recover ...