Features
Wage Hour Laws Provide Traps for the Unwary
It has often been said that the most frequently violated federal employment-related statute is the Fair Labor Standards Act ('FLSA'), 29 U.S.C. '' 201-19 (Supp. 2006). This law, enacted in 1938, regulates, among other things, the payment of overtime to employees who work for employers. Our experience indicates that most, if not all, employers do not intend to violate the provisions contained in the FLSA but, instead, do so out of ignorance of its requirements. This article highlights some of the key provisions of the FLSA, makes reference to recent pronouncements by the United States Department of Labor (the federal agency principally responsible for interpretation of the statute) and presents advice on how to avoid the pitfalls inherent in the FLSA.
Features
Paddling Down Esopus Creek
An end-of-year (Nov. 29) Delaware Chancery Court decision, <i>Esopus Creek Value LP v. Hauf</i>, No. 2487-N (Del. Ch. Nov. 29, 2006), is receiving a great deal of attention from corporate transactional and corporate restructuring attorneys alike. In <i>Esopus</i>, the Delaware Chancery Court prevented a financially sound company that was prohibited by federal securities law from holding a shareholder vote, because it failed to meet its reporting requirements, from executing an agreement outside of bankruptcy to sell substantially all of its assets under Section 363 of the Bankruptcy Code without first obtaining common stockholder approval as required under Section 271(a) of the Delaware General Company Law ('DGCL').
Features
Enforcement Under State Security Breach Notification Laws
Thirty-four states have enacted security breach notification laws. And Michigan passed such a law with an effective date of July 2, 2007. These laws cover the notification that a company must make in the event of a breach of security of its system with respect to computerized personal information. How are these laws enforced in the event of a violation? These laws vary in terms of enforcement and penalties, as more particularly described below. This article provides an overview of the enforcement of these laws and describes examples of penalties.
Features
Document Discovery
In today's litigation world, corporate counsel struggle to contain the ever-increasing costs of document discovery. The explosion of electronically stored information ('ESI') is often a huge contributor to the expense of discovery. Consultants, vendors, and e-discovery software can help bring greater efficiencies and cost-savings to the process. But while there is a dizzying array of options available, they are not all created equal. Finding the right solution requires that you do your homework.
COPA Struck Down By Federal Judge
A federal judge sitting in Philadelphia has struck down the 1998 Child Online Protection Act ('COPA') on March 22. The Act was challenged as unconstitutionally vague by health Web sites and the American Civil Liberties Union ('ACLU').
An Overview of the New FTC Rule
On Jan. 22, 2007, after more than a decade of study, the FTC released its long-anticipated new Federal Trade Commission Rule on Franchising. This article outlines the key elements of the New Rule. The New Rule changes the coverage of the existing FTC Rule.
Features
Television Shows and Trademark Protection
Recent rulings that may affect your business.
Features
How to Reduce Your Exposure to Lawsuits
Employers go to great lengths and expense to reduce their potential exposure to employment-related claims. Most employers implement policies to address the myriad and growing federal, state, and local employment laws; regularly conduct employee EEO training; hire qualified human resources professionals and in-house attorneys with expertise in employment law; and regularly seek advice and assistance from outside counsel concerning these prophylactic measures. The purpose of this article is to apprise readers of a fast, simple, and inexpensive way to reduce their exposure to certain types of employment-related claims through the inclusion of an express waiver ('Waiver') in an employment application or other document signed by applicants or employees. The Waiver contractually reduces to six (6) months the time period within which certain types of employment-related claims must be filed and waives any statute of limitations to the contrary, thereby significantly reducing the number of timely-filed claims and, consequently, the employer's potential exposure.
Features
Disclosing Information Security Breaches Under Privacy and Securities Laws
The Privacy Rights Clearinghouse estimates that over 100 million records containing sensitive personal information have been involved in security breaches. This non-profit consumer organization has tracked these breaches on its website (www.privacyrights.org) beginning with the significant and well-publicized ChoicePoint breach in February 2005. As a result, over two-thirds of states enacted security breach notification laws governing the notification that a company must make in the event of a security breach. This article outlines the requirements for providing notification of a security breach under state security breach notification law by any company and the factors that a public company needs to take into account regarding whether to disclose a security breach under federal securities law.
Features
FLSA Collective Action Litigation
When the dust settles from the current round of discussions on increasing the federal minimum wage, the lowest paid of the country's non-exempt employees may or may not be earning an additional dollar or two per hour. Either way, the debate will have drawn the country's ' and the plaintiffs' bars' ' attention toward the lowest paid of our country's workers, and the climate will be right for those attorneys to begin focusing not only on how much non-exempt employees are being paid per hour, but also on whether these workers are being paid in a manner that is consistent with every intricate (and often contrary-to-common-sense) twist and turn of federal and state law.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Restrictive Covenants Meet the Telecommunications Act of 1996Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.Read More ›
