Trade Secret Theft: Protecting the Crown Jewels March 25, 2015
|
|
- Jodie Floyd
- 6 years ago
- Views:
Transcription
1 Trade Secret Theft: Protecting the Crown Jewels March 25, 2015 Presented by: Dan Rubinstein
2 Today s elunch Presenter Dan Rubinstein Litigation Chicago, Los Angeles drubinstein@winston.com 2
3 Trade Secret Theft: Protecting the Crown Jewels Background on the Legal Terrain Federal and State Protecting Your Trade Secrets Conducting a Trade Secret Theft Investigation Working with the FBI and Law Enforcement Remedies 3
4 Background on the Legal Terrain
5 Key Federal Statutes Computer Fraud and Abuse Act, 18 U.S.C Unauthorized Access Civil Remedy Economic Espionage Act, 18 U.S.C Theft 5
6 Computer Fraud and Abuse Act (CFAA) 18 U.S.C Protects information on computer systems Applies even if data is not a trade secret or not well-protected 6
7 CFAA Elements and Remedies The defendant has: Accessed a protected computer Virtually every business computer system with Internet access Without authorization or by exceeding such authorization as was granted Knowingly and with intent to defraud Furthered the intended fraud and obtained anything of value 7
8 CFAA Penalties Criminal Penalties 3 tiers: Tier 1: Simple violations punished as misdemeanors, imprisonment for not more than one year and fine of not more than $100,000 Tier 2: Imprisonment not more than 5 years and/or fine of not more than $250,000 Done for commercial advantage or private financial gain Offense committed in furtherance of criminal or tortious act Value of information exceeds $5,000 Tier 3: For repeat offenders imprisonment not more than 10 years and/or fine of not more than $250,000 Possibility of forfeiture, restitution 8
9 CFAA Civil Suits There is a private cause of action for compensatory damages and injunctive relief for victims of 1030 violations, where: Aggregate $5,000 loss Physical harm or threat to public health or safety Damage affecting 10 or more protected computers during any 1-year period Must be brought within two years of the offense 9
10 Economic Espionage Act 18 U.S.C Purpose: to provide greater protection for proprietary and economic information of corporate and governmental entities from foreign as well as domestic theft Covers trade secrets, which the statute defines broadly to include both tangible and intangible property 10
11 Trade Secreted Definition Information Not generally known From which the owner derives economic value from its secrecy Reasonable efforts have been made to protect its secrecy Information must have a nexus with interstate or foreign commerce 11
12 Economic Espionage Act - Penalties Provides criminal and civil penalties for theft of trade secrets Enhanced penalties if intellectual property is taken with an intent to benefit a foreign government Punishable by imprisonment for not more than 10 years and/or a large fine 12
13 Other Claims National Stolen Property Act (18 U.S.C. 2314) Transports, transmits, or transfers (in interstate commerce) Goods, wares, merchandise, securities or money, valued at $5,000 or more Knowing the same to have been stolen, converted, or taken by fraud Some state law claims complement federal civil claims Breach of confidentiality or non-disclosure agreements State trade secrets acts e.g., Illinois Trade Secrets Act, 765 ILCS 1065 Breach of fiduciary duty Conversion 13
14 Protecting Your Trade Secrets
15 Protecting Trade Secrets Implement robust confidentiality agreements and IP policies Tiered policies based on access level Enforce policies (and document enforcement) Regular training where employees re-acknowledge the restrictions Limit the physical/electronic access to confidential IP Eliminate duplicates Compartmentalize sensitive information Restrict access to core group of employees Implement tiered access levels 15
16 Protecting Trade Secrets Use restrictions Portable devices/storage Private Remote connectivity Monitoring Network monitoring Filters/screens Employee monitoring 16
17 Conducting a Trade Secret Theft Investigation
18 Goals of an Investigation Conduct a thorough, expeditious, and independent investigation that can withstand scrutiny General factual resolution, legal analysis, root cause analysis, remediation, and proportionate discipline while assessing liability and improving internal controls Protect the reputation of the reporters and accused employees and the integrity of the investigation Minimize business disruption Manage internal communications and expectations Recommend discipline (where necessary) with a consistent approach 19
19 The Benefits of Outside Counsel Tested protocol for ensuring relevant materials are preserved and interviews are properly conducted Investigation appears more independent and credible than a purely internal team Beneficial relationship with law enforcement Interviewing and investigative techniques If allegations implicate senior management, unaffiliated counsel is preferable Single-purpose interaction (maintains relationships) 20
20 Components of a Successful Internal Investigation Teamwork Tailored Engagement Letters Evidence-gathering Documents Witness interviews Documenting the Investigation Maintaining Privilege 21
21 Teamwork Investigations require effective communications between in-house counsel, compliance officers, employees, and outside counsel In-house Counsel Facilitates communication between outside counsel and employees and assists with the preservation and collection of documentary evidence Compliance Officer Determines the veracity of an internal allegation of wrongdoing and whether a corporate compliance policy was violated Outside Investigation Counsel Takes the lead in gathering evidence, reviewing the facts, interviewing witnesses, and preparing conclusions for the client Other internal resources: IT, Corporate Audit, Human Resources, Corporate Secretary, Corporate Security, Finance, Brand Integrity, and others 22
22 Well-Tailored Engagement Letters Must tailor engagement to the task at hand Describe: Goals and scope of the investigation Anticipated costs involved Client s expectation from outside investigation counsel at the end of the investigation Key language in the engagement letter or memo to file stating that outside counsel will be conducting an investigation so that counsel can develop the factual information necessary to render legal advice 23
23 Document Collection Before interviewing witnesses, need an understanding of relevant documentary evidence In-house counsel plays key role Identifies document custodians and helps to define a targeted search Distributes document preservation memo Avoid obstruction of justice allegations 24
24 Witness Interviews Schedule in manner to minimize collusion Conduct in private area where employee feels comfortable Administer an UpJohn warning Two-person interview teams Request interviewee to bring relevant documents in possession Document the interview 25
25 Documenting the Investigation All written communications re: the investigation must include the caption, Attorney-Client Communication, Attorney Work Product Write interview memos Always document that UpJohn was given and acknowledged Include who was present, as well as location and time of interview Include the following disclaimer: This memorandum contains attorney thoughts and mental impressions. The information provided herein is organized by topic and is not in chronological order. The memorandum is not a verbatim transcript or witness statement and it is expected that this memorandum will be treated as privileged and confidential attorney work product. This memorandum is not for distribution Details, details, details 26
26 Maintaining Privilege Maintaining attorney-client privilege over the investigation is paramount Interviews conducted, forensic audit analysis, digital forensic examinations, and respective documentation by non-attorneys must be done at the direction of counsel to keep the privilege intact Discuss with non-attorneys so that all team members are clear Helps to avoid potential disputes, and provides flexibility, about whether privileged information should be disclosed in response to requests from the government, regulators, or private litigants 27
27 Concluding an Investigation Better is the enemy of good Exhaust all reasonable measures in fact-gathering process Closing Report Likely reviewed by members of the board, General Counsel, CEO, and C- suite executives, and possibly government regulators or law enforcement Review past precedent to ensure recommended remediation and discipline (if any) is appropriate Consult with in-house counsel prior to communicating findings to relevant stakeholders 28
28 Working with the FBI and Law Enforcement
29 Whether to Make a Federal Criminal Referral Referral is letting the lion out of the cage Publicity risk (USAO press release, media attention) Potential privilege waiver by disclosing work product created during the investigation Lerman v. Turner, 2011 WL (N.D. Ill. 2011) (requiring an attorney who had conducted the internal investigation to turn over a memo summarizing certain employee interviews when the attorney had already disclosed to the government an investigation report that included summaries of other employee interviews) SEC v. Berry, No , 2011 WL (N.D. Cal. Mar. 7, 2011) (ordering production of 5 witness interview memos, substance of which had ben disclosed to the government orally; though no waiver with respect to counsel s notes on basis that waiver as to final product does not waive privilege as to drafts) 30
30 Benefits of a Criminal Referral Creates an atmosphere where employees know that trade secrets are highly valued by the company Law enforcement bring investigative tools and resources (subpoenas, search warrants, wire-taps, arrests) Recent examples Chicago-based financial firm: Twenty-three-count superseding indictment against two former employees, alleging scheme to defraud, theft of trade secrets, violation of the CFAA, and obstruction of justice Internal investigation into anomalies on an employee s user account uncovered use of virtual machines and transferring of company files via removable storage devices Both employees eventually pleaded guilty one received 3 years in prison followed by three years supervised release, and the other received 3 years probation Both defendants were ordered to pay restitution for the cost of its internal investigation - $759,
31 Benefits of a Criminal Referral (cont d) Examples (cont d) CME: The USAO indicted a former software engineer for CME Group, Inc. for allegedly downloading and removing computer source code and other proprietary information while also pursuing business plans to improve an electronic trading exchange in China. The stolen code was estimated to cost $2.1 million The employee pleaded guilty to two counts of trade secrets theft and was sentenced to four years of probation Valspar (David Lee) A former Valspar Corp. chemist used his access to Valspar s secure internal computer network to steal roughly 160 secret formulas for paints and coatings to use at his new job with a competitor. He also took raw materials information, chemical formulas and calculations, sales and cost data, product research, marketing data, internal memos, and other materials He pleaded guilty to stealing trade secrets worth approximately $20 million. He received 15 months in federal prison. Also ordered to pay $31,000 to reimburse Valspar for the cost of its internal investigation 32
32 Remedies for Trade Secret Theft
33 Trade Secret Theft Remedies Return of stolen property Restitution: Repayment of money spent on investigation Civil remedies Enhances perception of company s protection of trade secrets 34
34 Questions?
35 Today s elunch Presenter Dan Rubinstein Litigation Chicago, Los Angeles drubinstein@winston.com 37
Ten Questions About Internal Investigations
Ten Questions About Internal Investigations Robert S. Litt Arnold & Porter 202-942-6380 robert_litt@aporter.com 1. When should a company do an internal investigation? 2. What should the goals be? 3. Who
More informationIssues In Internal Investigations for Company Counsel in the Post-Enron Era September 13, 2006
Issues In Internal Investigations for Company Counsel in the Post-Enron Era September 13, 2006 2005 Morrison & Foerster LLP All Rights Reserved Overview Risks and benefits of internal investigations When
More informationCode of Conduct. This Code of Conduct covers all associates. When appropriate, it also covers all members of the Company's Board of Directors.
Code of Conduct This Code of Conduct has been adopted for the purpose of ensuring that the Company's "Associates" (Officers and Employees) conduct themselves and operate the Company's business in accordance
More informationAnti-Fraud Policy. The following non-exhaustive list provides a few examples of fraud that this Policy is designed to prevent and detect:
Introduction Anti-Fraud Policy In some instances, Medicaid pays for some or all of the services provided. It is the policy of Helper s Inc. to comply with all applicable federal, state and local laws and
More informationHow to Conduct an Internal Investigation
How to Conduct an Internal Investigation The Web Conference Series for Corporate Counsel September 12, 2007 Addressing Trends Sharing Solutions Today s summary in November InsideCounsel Advance copy for
More informationContractors in the Crosshairs: Investigations Passing Government Scrutiny
Westlaw Journal Government Contract Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 29, issue 4 / june 22, 2015 Expert Analysis Contractors in the Crosshairs: Investigations
More information[Carrier name] FIDUCIARY LIABILITY COVERAGE ENHANCEMENTS ENDORSEMENT (EP PORTFOLIO)
ENDORSEMENT/RIDER [Print Coverage Section description on Endorsements] Effective date of this endorsement/rider: [Transaction Effective Date] [Carrier name] Endorsement/Rider No. [Endorsement number that
More informationInternal Investigation A - Z
Internal Investigation A - Z HCCA West Coast Local Conference Los Angeles, CA Cheryl Wagonhurst, Partner (cwagonhurst@foley.com) Pam Johnston, Partner (pjohnston@foley.com) June 29, 2007 Attorney Advertising
More informationRESPONDING TO A SANCTIONS VIOLATION Lessons Learned from Recent Enforcement Matters
1 RESPONDING TO A SANCTIONS VIOLATION Lessons Learned from Recent Enforcement Matters Canadian Forum on Sanction Compliance & Enforcement October 6, 2016 Thad McBride, Bass Berry & Sims 2 Discovery of
More informationSEC. 2. FINDINGS AND STATEMENT OF PURPOSE.
Organized Retail Crime Act of 2008 (Introduced in House) HR 6491 IH 110th CONGRESS 2d Session H. R. 6491 To amend title 18, United States Code, to combat, deter, and punish individuals and enterprises
More informationFRAUD EXAMINERS MANUAL INTERNATIONAL EDITION
TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...
More informationThe Practice and Pitfalls of Internal Investigations:
The Practice and Pitfalls of Internal Investigations: How to Keep Both Your License and Your Sanity Mark Bartlett Davis Wright Tremaine LLP 1 When Do You Need to Investigate? Red Flags Questionable accounting
More informationD E B R A S C H U C H E R T, C O M P L I A N C E O F F I C E R
D E B R A S C H U C H E R T, C O M P L I A N C E O F F I C E R INTEGRATED CARE ALLIANCE, LLC CORPORATE COMPLIANCE PROGRAM It is the policy of Integrated Care Alliance to comply with all laws governing
More informationTexas State Statutes Regulating Debt Collection / Debt Collectors FINANCE CODE: CHAPTER 392. DEBT COLLECTION
Texas State Statutes Regulating Debt Collection / Debt Collectors FINANCE CODE: CHAPTER 392. DEBT COLLECTION SUBCHAPTER A. GENERAL PROVISIONS 392.001. DEFINITIONS. In this chapter: (1) "Consumer" means
More informationCENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS
CENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS Effective June 1, 2014 The following terms and conditions apply to electronic and online delivery and presentation of your invoices by CenturyLink
More informationPresentation follows
May 30, 2003 THE INCREASED NEED FOR INTERNAL INVESTIGATIONS BY PUBLIC COMPANIES AND THEIR AUDIT COMMITTEES by Gerald E. Boltz Presented at the Rocky Mountain Securities Conference (May 30, 2003) Copyright
More informationHONORABLE SERVICE. All Funds
HONORABLE SERVICE All Funds New Jersey law (N.J.S.A. 43: 1-3 et seq.) stipulates that the receipt of retirement benefits is expressly conditioned upon the rendering of honorable service by the member (i.e.
More informationMENTAL HEALTH MENTAL RETARDATION OF TARRANT COUNTY. Board Policy. Number A.3 July 31, 2001 COMPLIANCE PLAN
MENTAL HEALTH MENTAL RETARDATION OF TARRANT COUNTY Board Policy Board Policy Adopted: Number A.3 July 31, 2001 OVERVIEW COMPLIANCE PLAN As adopted by the Board of Trustees on July 31, 2001 The Board of
More informationFrom the Office Suite to Cell Block C: Potential Criminal and Regulatory Implications of Pharma/Biotech/Device Products Liability Lawsuits
From the Office Suite to Cell Block C: Potential Criminal and Regulatory Implications of Pharma/Biotech/Device Products Liability Lawsuits BUTLER SNOW 1 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT
More informationDOJ Issues New FCPA Corporate Enforcement Policy
November 30, 2017 DOJ Issues New FCPA Corporate Enforcement Policy Introduction On Wednesday, November 29, 2017, United States Deputy Attorney General Rod J. Rosenstein announced a new Justice Department
More informationTHE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL
PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 0 Session of 0 INTRODUCED BY M. QUINN, ELLIS, D. COSTA, DeLUCA, DOWLING, EVERETT, PHILLIPS-HILL, McNEILL, MILLARD, NEILSON, C. QUINN, READSHAW,
More informationLICENSE AGREEMENT. Security Software Solutions
LICENSE AGREEMENT Security Software Solutions VERIS ACTIVE ID SERVICES AGREEMENT between Timothy J. Rollins DBA Security Software Solutions, having an office at 5215 Sabino Canyon Road and 4340 N Camino
More informationPERSHING RESOURCES COMPANY CODE OF ETHICS AND BUSINESS CONDUCT. Adopted as of April 9th, 2018
PERSHING RESOURCES COMPANY CODE OF ETHICS AND BUSINESS CONDUCT Adopted as of April 9th, 2018 The business of Pershing Resources Company Inc. (the Company ) shall be conducted with honesty and integrity
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2013 SESSION LAW SENATE BILL 140
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2013 SESSION LAW 2013-337 SENATE BILL 140 AN ACT TO INCREASE THE RECOGNITION, REPORTING, AND PROSECUTION OF THOSE WHO WOULD DEFRAUD OR FINANCIALLY EXPLOIT DISABLED
More informationSafeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker
Safeguarding Your HIPAA and Personal Health Information Data Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker 1 Overview» Patient information confidentiality Grant requirements
More informationKERNS, PITROF, FROST & PEARLMAN, L.L.C.
KERNS, PITROF, FROST & PEARLMAN, L.L.C. ATTORNEYS AT LAW 333 WEST WACKER DRIVE SUITE 1840 CHICAGO, ILLINOIS 60606 DIRECT DIAL: 312-261-4552 TEL. 312-261-4550 E-MAIL: epitrof@kpfplaw.com FAX: 312-261-4565
More informationSEC Proposes Rules To Implement Dodd-Frank Whistleblower Provisions
Litigation Department White Collar Defense and Investigations Practice Advisory SEC Proposes Rules To Implement Dodd-Frank Whistleblower Provisions by Robert R. Stauffer and Andrew D. Kennedy Background
More information2017 Copyright The Sequoia Project. All rights reserved.
Exhibit 1 Carequality Connection Terms As used herein, Organization refers to the Carequality Connection upon which these Carequality Connection Terms are binding and Sponsoring Implementer refers to the
More informationTHIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY.
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. MEDIA LIABILITY COVERAGE INTEGRATED TECH CLAIMS MADE CLAIM EXPENSES INCLUDED WITHIN THE LIMITS OF INSURANCE This endorsement modifies the
More informationACNB CORPORATION CODE OF ETHICS
ACNB CORPORATION CODE OF ETHICS The directors, officers and employees of ACNB Corporation and all its subsidiaries and affiliates (the Company ) hold an important and elevated role in corporate governance.
More informationSummary Comparison of Current Senate Data Security and Breach Notification Bills
Data Security reasonable Standards measures Specific Data Security Requirements Personal Information Definition None (a) First name or (b) first initial and last name, in combination with one of the following
More informationSTURM, RUGER & COMPANY, INC. CODE OF BUSINESS CONDUCT AND ETHICS
STURM, RUGER & COMPANY, INC. CODE OF BUSINESS CONDUCT AND ETHICS Sturm, Ruger & Company, Inc. (the "Company") maintains an extensive "Corporate Compliance Program" which governs the obligation of all employees,
More informationINFORMATION TECHNOLOGY SERVICES AGREEMENT
INFORMATION TECHNOLOGY SERVICES AGREEMENT This Information Technology Services Agreement ("Agreement") is made this day of 20 between Sycure Corp, d/b/a Columbia Basin Information Technology, a Washington
More information[Carrier name] FIDUCIARY LIABILITY COVERAGE ENHANCEMENTS ENDORSEMENT (FOREFRONT PORTFOLIO 3.0 sm )
ENDORSEMENT/RIDER [Print Coverage Section description on Endorsements] Effective date of this endorsement/rider: [Transaction Effective Date] [Carrier name] Endorsement/Rider No. [Endorsement number that
More informationAMERICAN INTERNATIONAL SPECIALTY LINES INSURANCE COMPANY 175 Water Street Group, Inc. New York, NY 10038
AIG COMPANIES AIG MERGERS & ACQUISITIONS INSURANCE GROUP SELLER-SIDE R&W TEMPLATE AMERICAN INTERNATIONAL SPECIALTY LINES INSURANCE COMPANY 175 Water Street Group, Inc. New York, NY 10038 A Member Company
More informationAGENCY POLICY. IDENTIFICATION NUMBER: CCD001 DATE APPROVED: Nov 1, 2017 POLICY NAME: False Claims & Whistleblower SUPERSEDES: May 18, 2009
IDENTIFICATION NUMBER: CCD001 DATE APPROVED: Nov 1, 2017 POLICY NAME: False Claims & Whistleblower SUPERSEDES: May 18, 2009 Provisions OWNER S DEPARTMENT: Compliance APPLICABILITY: All Agency Programs
More informationThis policy applies to all employees, including management, contractors, and agents. For purpose of this policy, a contractor or agent is defined as:
Policy and Procedure: Corporate Compliance Topic: Purpose: Choice of NY is committed to prompt, complete, and accurate billing of all services provided to individuals. Choice of NY and its employees, contractors,
More informationELECTRONIC TRADING PARTNER AGREEMENT
ELECTRONIC TRADING PARTNER AGREEMENT This Agreement is by and between all provider practices wishing to submit electronic claims to University Health Alliance ( UHA ). RECITALS WHEREAS, UHA provides health
More informationProducer Agreement DDWA Product means an Individual or Group dental benefits product offered by Delta Dental of Washington.
Producer Agreement This agreement, effective the day of is between DELTA DENTAL OF WASHINGTON, referred to as DDWA in this agreement, and, referred to as Producer in this agreement. In consideration of
More informationNASDAQ Futures, Inc. Off-Exchange Reporting Broker Agreement
2. Access to the Services. a. The Exchange may issue to the Authorized Customer s security contact person, or persons (each such person is referred to herein as an Authorized Security Administrator ),
More informationCorporate Compliance Topic: False Claims Act and Whistleblower Provisions
Purpose: INDEPENDENT LIVING, Inc. (also referred to as ILI, ) is committed to prompt, complete and accurate billing of all services provided to individuals. ILI and its employees, contractors and agents
More informationUNITED STATES DISTRICT COURT WESTERN DISTRICT OF KENTUCKY AT LOUISVILLE. INDICTMENT v. NO. 18 U.S.C. 2
UNITED STATES OF AMERICA UNITED STATES DISTRICT COURT WESTERN DISTRICT OF KENTUCKY AT LOUISVILLE INDICTMENT v. NO. 18 U.S.C. 2 JAMESY HAVENS 18 U.S.C. 981(a)(1)(C) DAVID FARNSWORTH 18 U.S.C. 982(a)(1)
More informationCutting Edge Legal Issues Relating To Mobile Devices Nick Akerman Dorsey & Whitney LLP
Cutting Edge Legal Issues Relating To Mobile Devices Nick Akerman Dorsey & Whitney LLP akerman.nick@dorsey.com www.computerfraud.us 212-415-9217 Companies can mitigate their risk by re-evaluating 7 areas
More informationReferral Agreement. 2.7 Under Xennsoft s direction, assist in the setup, training and support of the Products with
Referral Agreement This Referral Agreement ( Agreement ) grants to the person or entity Referring Party identified below ( Contractor ) the right to refer to Xennsoft LLC, a Utah Limited Liability Company
More informationWhite Collar Crime: An IRS-CI Perspective. Focused on ID Theft
White Collar Crime: An IRS-CI Perspective Focused on ID Theft Special Agents Bill Beckham Brooke Tetzlaff What is IRS-CI? OBJECTIVES Divisions, Mission, Workforce Types of Investigations Tax Evasion, Money
More informationRob Bell Assistant Special Agent in Charge U.S. Department of Agriculture Office of Inspector General
Rob Bell Assistant Special Agent in Charge U.S. Department of Agriculture Office of Inspector General 72 statutory Offices of Inspectors General (OIGs) across the Federal Government Primary mission detect
More informationConducting Effective Compliance Investigations
Conducting Effective Compliance Investigations Roberto M. Braceras February 12, 2016 Damian Wilmot Vice President, Litigation Vertex Pharmaceuticals Incorporated OVERVIEW There are real-life scenarios
More informationLimited Data Set Data Use Agreement For Research
Limited Data Set Data Use Agreement For Research This Data Use Agreement is dated,, and is between the ( Recipient ) and University of Miami, ( Covered Entity ). This Data Use Agreement is made in accordance
More informationDAVID MAKOL, being duly sworn, deposes and says that he is a Special Agent of the Federal Bureau of Investigation, and charges as follows: COUNT ONE
Approved: MICHAEL S. SCHACHTER Assistant United States Attorney Before: HONORABLE GABRIEL W. GORENSTEIN United States Magistrate Judge Southern District of New York - - - - - - - - - - - - - - - - - -
More informationCompliance with Laws (HR-685)
1.0 PURPOSE: All directors, officers, employees, agents, suppliers, and contractors of Microchip Technology Incorporated and its subsidiaries (Microchip Technology Incorporated and its subsidiaries together,
More informationAn appeal from an order of the Department of Management Services.
IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA KENNETH C. JENNE, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO. 1D09-2959
More informationFRAUD EXAMINERS MANUAL
TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...
More informationSUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE. No:
SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE Subject: Complying with the Deficit Reduction Act of 2005: Detection & Prevention of Fraud, Waste & Abuse Page 1 of 4 Prepared by: Shoshana Milstein Original
More informationLEGAL DEFENSE FUND. Program Document and Summary Program Description CCPOA. Benefit Trust Fund
LEGAL DEFENSE FUND Program Document and Summary Program Description CCPOA Benefit Trust Fund CCPOA LEGAL DEFENSE FUND and certain other Legal Service Benefits PLAN DOCUMENT AND SUMMARY PLAN DESCRIPTION
More informationIN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT
Case: 18-10240 Document: 00514900211 Page: 1 Date Filed: 04/03/2019 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT UNITED STATES OF AMERICA, v. Plaintiff - Appellee JULISA TOLENTINO, Defendant
More informationMulti-State Investigations: Effective and Efficient Strategies
Multi-State Investigations: Effective and Efficient Strategies Katherine Combs EXELON CORPORATION Lisa L. Tharpe FOLEY & LARDNER LLP To ask a question using the question pane Enter your question into the
More informationCompliance Program. Investigation Policy. Purpose. Applicability. Policy. Unity House of Troy, Inc.
Investigations Policy Purpose To thoroughly respond to and investigate all potential compliance violations of federal, state, and local laws and regulations as well as policies and procedures as they apply
More informationCase 1:12-cr WYD Document 1 Filed 10/24/12 USDC Colorado Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:12-cr-00447-WYD Document 1 Filed 10/24/12 USDC Colorado Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Criminal Case No. 12-cr-00447-WYD UNITED STATES OF AMERICA Plaintiff,
More informationWhistleblowing in the Dodd- Frank Era: The Perfect Storm
Whistleblowing in the Dodd- Frank Era: The Perfect Storm February 2017 Renee Phillips Orrick (212) 506-5153 rphillips@orrick.com The Perfect Storm of Whistleblower Activity Massive statutory and regulatory
More informationPRIVATE CHOICE PREMIER SM POLICY FOR COMMUNITY BANKS
PRIVATE CHOICE PREMIER SM POLICY FOR COMMUNITY BANKS BANKERS PROFESSIONAL LIABILITY COVERAGE PART I. INSURING AGREEMENT Banking Services Liability The Insurer shall pay Loss on behalf of an Insured resulting
More informationEVEREST NATIONAL INSURANCE COMPANY FIDUCIARY LIABILITY INSURING AGREEMENT SPECIMEN
EVEREST NATIONAL INSURANCE COMPANY EEO 40 614 (03 17) Policy Number: FIDUCIARY LIABILITY INSURING AGREEMENT In consideration of the premium paid and in reliance upon all statements made and information
More informationFAST BREAK: GOVERNMENT ENFORCEMENT OF INDIVIDUAL ACCOUNTABILITY. Katie McDermott Jacob Harper February 28, Morgan, Lewis & Bockius LLP
FAST BREAK: 2015 Morgan, Lewis & Bockius LLP GOVERNMENT ENFORCEMENT OF INDIVIDUAL ACCOUNTABILITY Katie McDermott Jacob Harper February 28, 2017 2015 Morgan, Lewis & Bockius LLP Discussion Agenda Individual
More informationImportance of Disclosures and Cooperation During and After Internal Investigations
Companion Material to OOPS Investigations Seminar - Part II Importance of Disclosures and Cooperation During and After Internal Investigations By: David Robbins, David Hammond and Kelly Currie The rules,
More informationExperienced, Talented, Trusted.
Experienced, Talented, Trusted. Bates Group s internationally recognized AML, KYC, BSA and Financial Crimes Consultants & Experts Barry Koch Martin Feuer Susan Berger Ali Ansari Penny Borgerding Timothy
More informationU.S. Department of Agriculture Food and Nutrition Service Administrative Review Branch Alexandria, VA 22302
U.S. Department of Agriculture Food and Nutrition Service Administrative Review Branch Alexandria, VA 22302 Ocean Live Poultry Market Appellant, v. Case Number: C0191192 Retailer Operations Division, Respondent.
More informationCertifying Employee Training Navicent Health s Corporate Integrity Agreement Year Two
Certifying Employee Training Navicent Health s Corporate Integrity Agreement Year Two Corporate Integrity Agreement Effective 4/23/2015 Term of five years Basic Requirement: Maintain a Compliance Program
More informationBerkley Insurance Company
ExecSuite Proposal Form for Employment Practices Liability CLAIMS MADE WARNING FOR APPLICATION: This Proposal Form is for a Claims Made and Reported Policy, relating to claims made against the Insureds
More informationPrivate Investment Fund Liability Insurance Management and Professional Liability Coverage Part
I. Insuring agreements We will pay loss in excess of any applicable retention resulting from claims against you for a wrongful act as follows, provided the claim is first made against you and reported
More informationSTATE OF OREGON DEPARTMENT OF CONSUMER AND BUSINESS SERVICES INSURANCE DIVISION
STATE OF OREGON DEPARTMENT OF CONSUMER AND BUSINESS SERVICES INSURANCE DIVISION In the Matter of Guy G. Cardinale ) FINAL ORDER ) Case No. INS 08-12-013 History of the Proceeding The Director of the Oregon
More informationWhat s On Tap? Who Are the Players? 4/3/2017. Healthcare Enforcement Trends What To Do When the Government Comes Knocking?
Healthcare Enforcement Trends What To Do When the Government Comes Knocking? Holly Logan Craig Sieverding 1 What s On Tap? Enforcement landscape, generally Fraud and Abuse Update o Brief primer on major
More informationLOGIS Code of Business Conduct and Ethics
LOGIS Code of Business Conduct and Ethics A. Scope This Code of Business Conduct and Ethics applies to all LOGIS directors, officers and employees, as well as to directors, officers and employees of each
More informationIn an environment of heightened federal enforcement
THE GOVERNANCE COUNSELOR CAPITAL MARKETS & CORPORATE GOVERNANCE Ocean Photography/Veer Board-Driven Internal Investigations In her regular column on corporate governance issues, Holly Gregory discusses
More informationAccountant Liability in the Current Regulatory Environment: Risk Control Is a Full Time Job!
Accountant Liability in the Current Regulatory Environment: Risk Control Is a Full Time Job! THOMAS P. VARTANIAN FRIED, FRANK, HARRIS, SHRIVER & JACOBSON LLP WASHINGTON, DC vartath@ffhsj.com Risk Exposures
More informationBAY-ARENAC BEHAVIORAL HEALTH AUTHORITY POLICIES AND PROCEDURES MANUAL
Page: 1 of 10 Policy It is the policy of Bay-Arenac Behavioral Health Authority (BABHA) to conduct corporate compliance investigations when a complaint is received and/or there is reasonable cause to suspect
More informationCase 1:15-cr RMB Document 353 Filed 11/20/17 Page 1 of 1
Case 1:15-cr-00867-RMB Document 353 Filed 11/20/17 Page 1 of 1 Boston Brussels Chicago Dallas Düsseldorf Frankfurt Houston London Los Angeles Miami Milan Munich New York Orange County Paris Rome Seoul
More informationACELL, INC. Code of Business Conduct and Ethics Chairman s Message. August 25, 2015
ACELL, INC. Code of Business Conduct and Ethics Chairman s Message Dear Fellow Directors and Employees: August 25, 2015 You will find our Code of Business Conduct and Ethics in the booklet included with
More informationFourteenth Court of Appeals
Affirmed and Memorandum Opinion filed December 16, 2010. In The Fourteenth Court of Appeals NO. 14-09-00868-CR NO. 14-09-00869-CR ARRINGTON FLOYD BURLEY, Appellant V. THE STATE OF TEXAS, Appellee On Appeal
More informationTexas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300
Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300 Training Module provided as a component of the Stericycle HIPAA Compliance Program Goals for Training Understand how Texas
More information503 SURVIVING A HIPAA BREACH INVESTIGATION
503 SURVIVING A HIPAA BREACH INVESTIGATION Presented by Nicole Hughes Waid, Esq. Mark J. Swearingen, Esq. Celeste H. Davis, Esq. Regional Manager 1 Surviving a HIPAA Breach Investigation: Enforcement Presented
More informationFRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)
TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial
More informationInternal Revenue Service Criminal Investigation
Tax Refund Fraud and Identity Theft IRS - Criminal Investigation John Collins Acting Special Agent In Charge Boston Field Office Internal Revenue Service Criminal Investigation Criminal Investigation serves
More informationCONDUCTING EFFECTIVE INTERNAL INVESTIGATIONS
CONDUCTING EFFECTIVE INTERNAL INVESTIGATIONS A CORPORATE COUNSEL S GUIDE AUTHORS: JENNIFER L. CHUNIAS AND ROBERTO M. BRACERAS, 1 This article sets a framework of best practices for conducting internal
More informationBogies: Federal Anti- Kickback Law & EMS Contracting - Emerging Issues Pamela L. Johnston Foley & Lardner LLP Partner, Los Angeles.
Bogies: Federal Anti- Kickback Law & EMS Contracting - Emerging Issues Pamela L. Johnston Foley & Lardner LLP Partner, Los Angeles May 2018 Agenda Big Picture Quick Refresher on the AKS Emerging Issues
More informationGOVERNMENT REPRESENTATIVES IN CRIMINAL TAX ENFORCEMENT
DID YOU GET YOUR BADGE SCANNED? GOVERNMENT REPRESENTATIVES IN CRIMINAL TAX ENFORCEMENT #TaxLaw #FBA Username: taxlaw Password: taxlaw18 Panelists Edward Ted F. Cronin, Division Counsel/Associate Chief
More informationREPORT OF THE OFFICE OF THE INSPECTOR GENERAL
OFFICE OF THE INSPECTOR GENERAL CHICAGO HOUSING AUTHORITY REPORT OF THE OFFICE OF THE INSPECTOR GENERAL 2016 FOURTH QUARTER REPORT OCTOBER 1, 2016 THROUGH DECEMBER 31, 2016 ELISSA RHEE-LEE INSPECTOR GENERAL
More informationE-Discovery and Data Management. Managing Litigation in the Digital Age
E-Discovery and Data Management Managing Litigation in the Digital Age Every day, 12 billion corporate e-mails are created. That number doubles annually. Litigation success starts with a sound ediscovery
More informationE-Discovery and Data Management. Managing Litigation in the Digital Age
E-Discovery and Data Management Managing Litigation in the Digital Age Every day, 12 billion corporate e-mails are created. That number doubles annually. Litigation success starts with a sound ediscovery
More informationFY 05 Actual FY 06 Budget FY 07 Budget
Judicial Department Judicial GENERAL FUND Percent Positions Change 2006-07 FY 06 Budget FY 07 Budget Circuit/County Court $2,990,898 $2,318,360 $1,729,340 (25)% 1 1 Legal Aid $419,800 $419,800 $419,800
More informationCOVERED, A CLAIM MUST BE. Instructions: the following. areas: Real Estate Plaintiff Litigation Entertainment Financial Institutionss.
LAWYERS PROFESSIONAL LIABILITY INSURANCE NEW BUSINESS APPLICATION THE POLICY FOR WHICH THIS APPLICATION IS MADE IS WRITTEN ON A CLAIMS MADE AND REPORTED BASIS. TO BE COVERED, A CLAIM MUST BE FIRST MADE
More informationDoes the Applicant provide data processing, storage or hosting services to third parties? Yes No
BEAZLEY BREACH RESPONSE APPLICATION NOTICE: THIS POLICY S LIABILITY INSURING AGREEMENTS PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY TO CLAIMS FIRST MADE AGAINST THE INSURED DURING
More informationRESOLUTE ENERGY CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
RESOLUTE ENERGY CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS (adopted 08-27-09 and amended 08-05-10 and 11-01-17) This code of business conduct and ethics (this Code ) has been adopted by Resolute Energy
More informationDEPARTMENT OF HEALTH AND HUMAN SERVICES. Office of Inspector General s Use of Agreements to Protect the Integrity of Federal Health Care Programs
United States Government Accountability Office Report to Congressional Requesters April 2018 DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of Inspector General s Use of Agreements to Protect the Integrity
More informationDevelopments in Government Investigations
Mark J. Stein, Paul Curnin & Jamie Gamble Simpson Thacher & Bartlett LLP Developments in Government Investigations December 6, 2006 2 Recent Government Investigations Industry Wide Investigations IPO allocation
More information13. JUSTICE - ALTERNATIVE DISPUTE RESOLUTION PROGRAM FOR COMPENSATION OF VICTIMS OF ABUSE AT PROVINCIAL YOUTH INSTITUTIONS
OF ABUSE AT PROVINCIAL YOUTH INSTITUTIONS 143. JUSTICE - ALTERNATIVE DISPUTE RESOLUTION PROGRAM FOR COMPENSATION OF VICTIMS OF ABUSE AT PROVINCIAL YOUTH INSTITUTIONS BACKGROUND.1 On November 2, 1994 government
More informationSTREAMGUYS, Inc. Authorized Streaming Agent Agreement Please complete and fax back entire agreement to us at
StreamGuys.com P.O. Box 828 Arcata California 95521 (707) 667-9479 Fax (707) 516-0009 info@streamguys.com STREAMGUYS, Inc. Authorized Streaming Agent Agreement Please complete and fax back entire agreement
More informationOperator Of Unlawful Bitcoin Exchange Sentenced To More Than 5 Years In Prison For Leading Multimillion-Dollar Money Laundering And Fraud Scheme
Search SEARCH HOME ABOUT U.S. ATTORNEY DIVISIONS NEWS PROGRAMS EMPLOYMENT CONTACT U.S. Attorneys» Southern District of New York» News» Press Releases Department of Justice U.S. Attorney s Office Southern
More informationFive Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims
Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims By Andrew M. Reidy, Joseph M. Saka and Ario Fazli Lowenstein Sandler Companies spend hundreds of millions of dollars annually to
More informationSALLY BEAUTY HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. General Policy and Procedures
SALLY BEAUTY HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS General Policy and Procedures Sally Beauty Holdings, Inc. and its subsidiaries (herein collectively referred to as the Company ) are committed
More informationStudy Abroad Program - Code of Conduct and Guidelines
Study Abroad Program - Code of Conduct and Guidelines While enrolled in a JCC Study Abroad Program, you are an ambassador for the US and JCC at all times. You agree to abide by the Code of Conduct. You
More informationTexas Finance Code, Chapter 393
Texas Finance Code, Chapter 393 Title 5. Protection of Consumers of Financial Services Chapter 393. Credit Services Organizations Subchapter A. General Provisions 393.001. DEFINITIONS. In this chapter:
More information