Last month, the Obama Administration's Fiscal Year 2016 Budget was published, along with the Department of Treasury's Greenbook, a detailed explanation of the President's proposed budget. Because the proposed legislation must pass a Republican led Congress, the President's budget may be "aspirational." It is a good indicator of the tools the Administration is prepared to use to fund its wish list.
- February 28, 2015Lawrence L. Bell
The government has become increasingly aggressive in pursuing criminal claims not only against corporations, but also against in-house counsel and compliance personnel, for conduct once treated almost exclusively as civil.
February 28, 2015Marjorie J. Peerce, Charles A. Stillman and Elizabeth J. LeeAn anonymous pro se defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.
February 28, 2015Saranac Hale SpencerObtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.
February 28, 2015Emily T. Acosta and Eric P. ConnNoise complaints have long been an occupational hazard for venue operators, musicians and concert promoters. The surge in the electronic dance music scene has added to the number of complaints. What might be enjoyable entertainment to one person may sound like a thunderous racket to another.
February 28, 2015Jay StapletonAlthough law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
February 28, 2015Jason StraightCompanies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
February 28, 2015Rebekah MintzerIt's 10 p.m. Do you know what your children are posting online?
February 28, 2015Jeffrey N. RosenthalIn June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.
February 28, 2015Alan G. MinskThis article reviews the recommended due diligence efforts of the purchaser's counsel with respect to leased commercial property, and elaborates on the pre- and post-closing rationales for completing such diligence review. The main focus of this article is the due diligence activities and rationale of counsel to a potential purchaser of all of the stock of a selling entity. Where relevant, it incorporates the alternate considerations that might arise in the context of an asset purchase or merger structure.
February 28, 2015Jackie M. Burkhardt

