Sorry for interrupting, but there is something we need to tell you...

We have updated our Cookie Policy to reflect changes in the law on cookies used on websites in Europe. This website uses cookies to maximize your experience and help us to understand how we can improve it. To find out more click here.

Cookies are text files containing small amounts of data which are downloaded to your computer, or other device, when you visit a website. Cookies allow us to recognize your computer and improve your experience on our website. Some cookies are also necessary for the technical operation of our website. Please read our Cookie Policy which provides important information about the cookies we use, how we use them and how they can be deleted. Please remember that deleting cookies may affect your experience of our website.

Show less.

Accept and hide this message
Pillsbury Pillsbury Pillsbury
Pillsbury
Email Page Print Friendly Version Text Size
RSS
Subscribe

Publications & Presentations

We encourage you to peruse this Publications & Presentations section for timely analysis and industry insights, including bylined articles, client alerts, white papers, practice and industry newsletters, audio and video broadcasts, featuring interviews with our lawyers, as well as case studies highlighting compelling legal challenges our clients have faced.

Also, please visit our Events page to learn more about upcoming seminars, CLE programs, and other presentations which may be of interest.

Recent Publications


5/4/2016
When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues
Authors: Joseph D. Jean, Brian E. Finch, Carolina A. Fornos, Sheila McCafferty Harvey, Benjamin D. Tievsky

Are criminal cyberattacks increasing in sophistication and frequency? Yes.

Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks? Yes.

Has there been an increase in cyberattacks that interrupt a company’s ability to conduct business? Yes.

Can a victim of a cyberattack, or even a potential victim, also become the target of a government investigation and face fines and other penalties? Yes.

Can these investigations extend to whether a company’s cybersecurity programs are “reasonable,” even with respect to software or products they sell? Yes.

Is there insurance coverage? Maybe.

5/2/2016
Delaware Announces Support for Blockchain-based Corporate Shares
Pillsbury named “Legal Ambassador,” “Gold Standard in the Blockchain Space”
Author: Marco A. Santori

On May 2, 2016, at the second annual Consensus conference in New York, Delaware Governor Jack Markell will announce his support for the creation of a new method of representation of corporate share ownership. In addition to traditional certificated and uncertificated shares, all Delaware corporations (including a majority of the Fortune 500) would have the ability to issue shares using the same technology that underlies the virtual currency Bitcoin.

5/2/2016
Blockchain Basics: A Primer
Blockchain, the technology underlying the cryptocurrency Bitcoin, is poised to revolutionize how all commercial transactions are conducted.
Authors: Marco A. Santori, Craig A. deRidder, James M. Grosser

Blockchain Defined
You have probably heard of Bitcoin, a peer-to-peer, non-governmental currency. Bitcoin is the first money that is its own payment system. That is, no bank, money transmitter or intermediary of any kind is required to clear and settle its transactions, which complete in mere seconds. The technology upon which Bitcoin is built ensures this work is done in a decentralized manner.

This technology, called “blockchain technology,” “distributed ledger technology,” or simply “DLT,” is just as good at clearing and settling transactions in other assets as for bitcoins. Indeed, it might be even better. What other assets? Securities, commodities, deeds to property, ownership of artwork, even medical records. The potential of this technology has been widely recognized.

5/2/2016
National People’s Congress of China Approves Law on Foreign NGOs
Authors: David A. Livdahl, Jenny (Jia) Sheng, Chunbin Xu

On April 28, 2016, the 20th meeting of the 12th Standing Committee of the National People's Congress (NPC) of China approved The Law on the Administration of Activities by Foreign Non-Governmental Organizations within the People’s Republic of China (Foreign NGO Law). Foreign NGOs will need to understand the new law's tighter policing provisions, reporting requirements (including annual reports on planned activities for the coming year) and restrictions on fundraising and recruiting within China, among other changes. The new law does clarify some uncertainties regarding how foreign NGOs in China can operate, but it also engenders new questions about how the relevant authorities will apply its provisions. Foreign NGOs ought to maintain close cooperation with their Chinese partners in efforts to comply with the new rules.

April 2016
FCC Enforcement Monitor
Authors: Scott R. Flick, Jessica T. Nyman, Joseph A. Cohen

Headlines:

  • Class A TV Licensee Hit With $89,200 Fine for Dodging FCC Inspectors
  • Student-Run FM Station Faces $12,000 Fine and Shortened License Term for Public Inspection File Violations
  • Wireless Synchronized Clock Company Agrees to Pay $12,000 for Violating License Terms

Keyword
Type
Professional
Practice / Industry
Focus Teams
From Date
To Date
Pillsbury
Pillsbury Pillsbury Pillsbury