Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Wage Hour Laws Provide Traps for the Unwary Image

Wage Hour Laws Provide Traps for the Unwary

Mark Blondman & Brooke Iley

It has often been said that the most frequently violated federal employment-related statute is the Fair Labor Standards Act ('FLSA'), 29 U.S.C. '' 201-19 (Supp. 2006). This law, enacted in 1938, regulates, among other things, the payment of overtime to employees who work for employers. Our experience indicates that most, if not all, employers do not intend to violate the provisions contained in the FLSA but, instead, do so out of ignorance of its requirements. This article highlights some of the key provisions of the FLSA, makes reference to recent pronouncements by the United States Department of Labor (the federal agency principally responsible for interpretation of the statute) and presents advice on how to avoid the pitfalls inherent in the FLSA.

Features

Paddling Down Esopus Creek Image

Paddling Down Esopus Creek

Jonathan Friedland & Mazen Asbahi

An end-of-year (Nov. 29) Delaware Chancery Court decision, <i>Esopus Creek Value LP v. Hauf</i>, No. 2487-N (Del. Ch. Nov. 29, 2006), is receiving a great deal of attention from corporate transactional and corporate restructuring attorneys alike. In <i>Esopus</i>, the Delaware Chancery Court prevented a financially sound company that was prohibited by federal securities law from holding a shareholder vote, because it failed to meet its reporting requirements, from executing an agreement outside of bankruptcy to sell substantially all of its assets under Section 363 of the Bankruptcy Code without first obtaining common stockholder approval as required under Section 271(a) of the Delaware General Company Law ('DGCL').

Features

Enforcement Under State Security Breach Notification Laws Image

Enforcement Under State Security Breach Notification Laws

Melissa J. Krasnow

Thirty-four states have enacted security breach notification laws. And Michigan passed such a law with an effective date of July 2, 2007. These laws cover the notification that a company must make in the event of a breach of security of its system with respect to computerized personal information. How are these laws enforced in the event of a violation? These laws vary in terms of enforcement and penalties, as more particularly described below. This article provides an overview of the enforcement of these laws and describes examples of penalties.

Features

Document Discovery Image

Document Discovery

James D. Sherman & Lori E. Steidl

In today's litigation world, corporate counsel struggle to contain the ever-increasing costs of document discovery. The explosion of electronically stored information ('ESI') is often a huge contributor to the expense of discovery. Consultants, vendors, and e-discovery software can help bring greater efficiencies and cost-savings to the process. But while there is a dizzying array of options available, they are not all created equal. Finding the right solution requires that you do your homework.

COPA Struck Down By Federal Judge Image

COPA Struck Down By Federal Judge

ALM Staff & Law Journal Newsletters

A federal judge sitting in Philadelphia has struck down the 1998 Child Online Protection Act ('COPA') on March 22. The Act was challenged as unconstitutionally vague by health Web sites and the American Civil Liberties Union ('ACLU').

An Overview of the New FTC Rule Image

An Overview of the New FTC Rule

Kenneth R. Costello

On Jan. 22, 2007, after more than a decade of study, the FTC released its long-anticipated new Federal Trade Commission Rule on Franchising. This article outlines the key elements of the New Rule. The New Rule changes the coverage of the existing FTC Rule.

Features

Television Shows and Trademark Protection Image

Television Shows and Trademark Protection

ALM Staff & Law Journal Newsletters

Recent rulings that may affect your business.

Features

How to Reduce Your Exposure to Lawsuits Image

How to Reduce Your Exposure to Lawsuits

Bill Wortel

Employers go to great lengths and expense to reduce their potential exposure to employment-related claims. Most employers implement policies to address the myriad and growing federal, state, and local employment laws; regularly conduct employee EEO training; hire qualified human resources professionals and in-house attorneys with expertise in employment law; and regularly seek advice and assistance from outside counsel concerning these prophylactic measures. The purpose of this article is to apprise readers of a fast, simple, and inexpensive way to reduce their exposure to certain types of employment-related claims through the inclusion of an express waiver ('Waiver') in an employment application or other document signed by applicants or employees. The Waiver contractually reduces to six (6) months the time period within which certain types of employment-related claims must be filed and waives any statute of limitations to the contrary, thereby significantly reducing the number of timely-filed claims and, consequently, the employer's potential exposure.

Features

Disclosing Information Security Breaches Under Privacy and Securities Laws Image

Disclosing Information Security Breaches Under Privacy and Securities Laws

ALM Staff & Law Journal Newsletters

The Privacy Rights Clearinghouse estimates that over 100 million records containing sensitive personal information have been involved in security breaches. This non-profit consumer organization has tracked these breaches on its website (www.privacyrights.org) beginning with the significant and well-publicized ChoicePoint breach in February 2005. As a result, over two-thirds of states enacted security breach notification laws governing the notification that a company must make in the event of a security breach. This article outlines the requirements for providing notification of a security breach under state security breach notification law by any company and the factors that a public company needs to take into account regarding whether to disclose a security breach under federal securities law.

Features

FLSA Collective Action Litigation Image

FLSA Collective Action Litigation

Jennier Blum Feldman

When the dust settles from the current round of discussions on increasing the federal minimum wage, the lowest paid of the country's non-exempt employees may or may not be earning an additional dollar or two per hour. Either way, the debate will have drawn the country's ' and the plaintiffs' bars' ' attention toward the lowest paid of our country's workers, and the climate will be right for those attorneys to begin focusing not only on how much non-exempt employees are being paid per hour, but also on whether these workers are being paid in a manner that is consistent with every intricate (and often contrary-to-common-sense) twist and turn of federal and state law.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›