<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://www.lexisnexis.com/authorcenter/utility/feedstylesheets/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Ashley Erazo's Groups Activities</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo</link><description>Recent activity for people in Ashley Erazo's group</description><dc:language>en-US</dc:language><generator>Telligent Community 9</generator><item><title>Taxation of Carried Interest</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=a3a8a706-0f84-4fb8-bb9f-bbda75b20452</link><pubDate>Wed, 12 Apr 2017 16:44:18 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:a3a8a706-0f84-4fb8-bb9f-bbda75b20452</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/robert-d-starin.page" target="_blank"&gt;Robert D. Starin&lt;/a&gt;, K&amp;amp;L Gates LLP.&lt;/p&gt;
&lt;p&gt;The tax treatment of carried interest has for many years been a high-profile target for potential reform. &amp;ldquo;Carried interest&amp;rdquo; refers to the share of profits or gains from investment received by a manager of a private equity fund, hedge fund, or similar investment vehicle, which is typically unrelated to any capital investment by the manager.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;UNDER EXISTING LAW APPLICABLE TO ENTITIES TREATED&lt;/strong&gt; as partnerships for U.S. income tax purposes, carried interest is generally taxed at favorable long-term capital gain rates. Many lawmakers view this treatment as inequitable, under the premise that long-term capital gains should apply to returns from the investment of capital, rather than receipts for the provision of services. In the private equity world, proposed legislation to close the carried interest &amp;ldquo;loophole&amp;rdquo; could have a profound impact on the economics and structure of investment funds and their portfolio companies. This article addresses the U.S. federal income tax treatment of carried interest paid to private equity fund managers, as well as potential changes in the law that could impact this treatment.&lt;/p&gt;
&lt;h3&gt;Economics of Carried Interest&lt;/h3&gt;
&lt;p&gt;Carried interest is designed to reward fund managers for identifying and managing investments. While fund managers receive a fixed management fee, the bulk of their profits is typically derived from carried interest that is contingent on the success of the underlying investments. Private equity funds are generally structured as limited partnerships, with the capital investors holding limited partner interests and the manager setting up a special purpose vehicle as the general partner. Because of the beneficial tax treatment described in more detail below, fund managers&amp;rsquo; &amp;ldquo;carry&amp;rdquo; is structured as a special class of equity in the underlying investment partnership rather than a contingent success-based fee.&lt;/p&gt;
&lt;p&gt;There are two primary methodologies for calculating carried interest: net profits and gross profits. Under the more common net profits methodology, carried interest is calculated as a percentage (usually 20%) of the profits generated from the fund&amp;rsquo;s investments less expenses, which typically include management fees and other overhead expenses that are not capitalized into the costs of investments.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;crid=b9d1f0bf-4e34-45e9-a8c7-ea325f1eb83c&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5SD8-TTJ1-FH4C-X2N7-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5SD8-TTJ1-FH4C-X2N7-00000-00&amp;amp;pdcontentcomponentid=500744&amp;amp;pdteaserkey=sr0&amp;amp;pditab=allpods&amp;amp;ecomp=dtrg&amp;amp;earg=sr0&amp;amp;prid=91792c9a-4c77-4a22-8d3d-528c75c7650f" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/robert-d-starin.page" target="_blank"&gt;Robert D. Starin &lt;/a&gt;is a partner at K&amp;amp;L Gates LLP. Mr. Starin&amp;rsquo;s practice emphasizes federal, state, and international tax issues and general corporate issues for both foreign and domestic clients. He has worked on numerous transactions involving mergers and acquisitions (U.S. domestic and cross-border), divestitures, complex joint ventures, and inbound and outbound investments. He advises public and private corporations, limited liability companies and partnerships on various tax matters, including choice of entity, structuring of international operations, and executive compensation issues.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on tax considerations for private equity funds and managers, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/2f3c15b5-3194-4777-887f-36c1886d55e9/?context=1000522" target="_blank"&gt;&amp;gt; UNRELATED BUSINESS TAXABLE INCOME&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/741d06b5-ab5a-44cb-a9e8-4473ca6a6b0e/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Private Equity &amp;gt; Tax Matters &amp;gt; Practice Notes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an analysis of the U.S. Foreign Account Tax Compliance Act, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a7be1b31-d73f-4911-bc40-f79dc0a94d59/?context=1000522" target="_blank"&gt;&amp;gt; FATCA AND PRIVATE EQUITY&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/741d06b5-ab5a-44cb-a9e8-4473ca6a6b0e/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Private Equity &amp;gt; Tax Matters &amp;gt; Practice Notes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Examining Harassment Claims</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=4e8a81aa-f85e-4ed3-b6d4-771cffa0ca9b</link><pubDate>Wed, 12 Apr 2017 16:45:19 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:4e8a81aa-f85e-4ed3-b6d4-771cffa0ca9b</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/615x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ17_2D00_Spring_5F00_PracticePointers_5F00_11.png" alt=" " border="0" /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;a href="/en-us/practice-advisor-authors/profiles/Richard-D-Glovsky.page" target="_blank"&gt;Richard D. Glovsky&lt;/a&gt;, Locke Lord LLP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;THIS ARTICLE ADDRESSES PROTECTED STATUS HARASSMENT&lt;/strong&gt; issues, a subset of discrimination claims that arise where an employee alleges that he or she was subjected to unwelcome conduct in the workplace due to the employee&amp;rsquo;s protected status (race, sex/gender, age, disability, national origin, etc.). It&amp;nbsp;focuses on the elements of these claims and defenses to them. It also provides practical tips that employers can follow to address, defend, and avoid harassment claims.&lt;/p&gt;
&lt;p&gt;Most harassment allegations assert that the employer created a hostile work environment that negatively impacted the terms and conditions of an employee&amp;rsquo;s employment. But it is important for employers to remember that not all harassment is illegal. Most federal and state laws only prohibit harassment that is &amp;ldquo;severe or pervasive.&amp;rdquo; One, or even a few, questionable incidents do not usually amount to unlawful harassment.&lt;/p&gt;
&lt;h3&gt;Not All Harassment Is Illegal&lt;/h3&gt;
&lt;p&gt;Many employees do not understand that not all harassment is illegal; it must be premised upon a particular protected category. Federal law, for example, prohibits harassment based on the following grounds:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Race&lt;/li&gt;
&lt;li&gt;Color&lt;/li&gt;
&lt;li&gt;Religion&lt;/li&gt;
&lt;li&gt;Gender/sex&lt;/li&gt;
&lt;li&gt;Age&lt;/li&gt;
&lt;li&gt;Disability&lt;/li&gt;
&lt;li&gt;National origin&lt;/li&gt;
&lt;li&gt;Ethnicity&lt;/li&gt;
&lt;li&gt;Citizenship status&lt;/li&gt;
&lt;li&gt;Genetic information&lt;/li&gt;
&lt;li&gt;Military status&lt;/li&gt;
&lt;li&gt;Qualified medical leave&lt;/li&gt;
&lt;li&gt;Reporting discrimination&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Many state jurisdictions have their own equal employment opportunity (EEO) laws that protect employees who fall into additional protected categories. For example, many states and the District of Columbia have enacted laws prohibiting discrimination on the basis of sexual orientation. To cite another example, Michigan bans discrimination on the basis of&amp;nbsp;height and weight.&lt;/p&gt;
&lt;p&gt;Localities have also adopted categorical protections. For instance, New York City protects the unemployed from discrimination, while Broward County in Florida prohibits discrimination on the basis of political affiliation.&lt;/p&gt;
&lt;p&gt;Because protected classifications vary from state to state and even city to city, when advising employers about potential harassment claims, you should be familiar with the laws of each state, county, and municipality where the employer is&amp;nbsp;located.&lt;/p&gt;
&lt;h3&gt;Types of Harassment Claims&lt;/h3&gt;
&lt;p&gt;Generally, there are two types of unlawful harassment:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Hostile work environment.&lt;/strong&gt; A hostile work environment exists when an employee&amp;rsquo;s workplace is so permeated with discriminatory intimidation, ridicule, abuse, and/or insult that it alters the terms and conditions of the employee&amp;rsquo;s employment and creates a hostile work environment.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Quid pro quo&lt;/strong&gt;&lt;/em&gt;&lt;strong&gt; harassment&lt;/strong&gt;. &lt;em&gt;Quid pro quo&lt;/em&gt; harassment occurs where conditions of employment or job benefits are dependent upon an employee submitting to unwelcome conduct (usually sexual advances) or where an employer retaliates against an employee who rejected such unwelcome conduct.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5D48-HRS1-JP4G-61JJ-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5D48-HRS1-JP4G-61JJ-00000-00&amp;amp;pdcontentcomponentid=126170&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0&amp;amp;crid=5a6ed2a6-2328-4317-a6a1-e4bce16fc544" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Richard D. Glovsky&lt;/strong&gt;, a partner in Locke Lord&amp;rsquo;s Boston office, co-chairs the firm&amp;rsquo;s robust Labor and Employment Practice Group. He handles employment litigation, including class actions, wage and hour issues, and discrimination and retaliation claims; prosecutes cases for Fortune 500 companies and other businesses to protect their trade secrets and to prevent former employees from violating non-competition and non-solicitation obligations; and is a valued counselor on employment related matters. He is a former Assistant United States Attorney and Chief of the Civil Division of the United States Attorney&amp;rsquo;s Office for the District of Massachusetts.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a discussion of state EEO laws, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f5f00fb0-40cf-4efb-8e18-433444624424/?context=1000522" target="_blank"&gt;&amp;gt; CHART &amp;ndash; STATE PRACTICE NOTES (DISCRIMINATION AND RETALIATION)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/54ef38e1-81ad-4036-8695-25a604e2612c/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; Claims and Investigations &amp;gt; Practice Notes &amp;gt; State Discriminationand Retaliation Practice Notes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information on best practices for complying with Title VII of the Civil Rights Act of 1964, see&lt;/em&gt;&lt;/p&gt;
&lt;a href="https://advance.lexis.com/api/permalink/3c62515e-55a9-4da0-bfe3-29306148f525/?context=1000522" target="_blank"&gt;&amp;gt; COMPLYING WITH TITLE VII&lt;/a&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f74e0bd3-d09e-4bb5-9a4e-f93217403892/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; EEO Laws and Protections &amp;gt; Practice Notes &amp;gt; Title VII and the Pregnancy Discrimination Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance for employers to comply with the Age Discrimination in Employment Act (ADEA), see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/53f63c51-2f69-4383-8129-5721bcd53ba6/?context=1000522" target="_blank"&gt;&amp;gt; ADDRESSING THE ADEA&amp;rsquo;S MANDATES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f74e0bd3-d09e-4bb5-9a4e-f93217403892/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; EEO Laws and Protections &amp;gt; Practice Notes &amp;gt; Age Discrimination inEmployment Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an examination of the scope of the protection against discrimination found in 42 U.S.C. &amp;sect; 1981 and the damages available to successful plaintiffs, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://advance.lexis.com/api/document?collection=analytical-materials&amp;amp;id=urn:contentItem:5DHR-06V1-JKHB-654P-00000-00&amp;amp;context=" target="_blank"&gt;&amp;gt; SECTION 1981 EMPLOYMENT DISCRIMINATION CLAIMS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f74e0bd3-d09e-4bb5-9a4e-f93217403892/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; EEO Laws and Protections &amp;gt; Practice Notes &amp;gt; Section 1981&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For a thorough discussion on the claims under, defenses available, and compliance with and enforcement of the Americans with Disabilities Act of 1990 (ADA), see&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/c9ec2b4b-69ee-4dba-9451-5d5248f43c08/?context=1000522" target="_blank"&gt;&amp;gt; AMERICANS WITH DISABILITIES ACT: NAVIGATING EMPLOYER REQUIREMENTS ANDMAKING REASONABLE ACCOMMODATIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f74e0bd3-d09e-4bb5-9a4e-f93217403892/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; EEO Laws and Protections &amp;gt; Practice Notes &amp;gt; Americans with Disabilities Act&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more detail on disparate treatment claims, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/8a4c1a6f-f603-4e6b-ac03-fcbdcdd36251/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING DISPARATE TREATMENT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f74e0bd3-d09e-4bb5-9a4e-f93217403892/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Discrimination and Retaliation &amp;gt; EEO Laws and Protections &amp;gt; Practice Notes &amp;gt; Disparate Treatment&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>The Recharacterization of Loan Agreements under Applicable Bankruptcy and Non-Bankruptcy Law</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=df864a35-931e-4910-90f4-e2e2fa8acc6c</link><pubDate>Wed, 12 Apr 2017 16:46:56 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:df864a35-931e-4910-90f4-e2e2fa8acc6c</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/bankruptcy.page#ira-herman" target="_blank"&gt;Ira L. Herman&lt;/a&gt;, Blank Rome, LLP&lt;/p&gt;
&lt;h3&gt;The Statutory Predicate for Recharacterization&lt;/h3&gt;
&lt;p&gt;To increase their share of a finite bankruptcy pie, creditors, debtors and other parties in interest in a case will seek to reduce or eliminate competing claims. This objective may be accomplished using various provisions of the Bankruptcy Code. Section 502(b)(1) is the statutory provision providing for the objection to, and disallowance of, claims based on the applicable laws and rules and by the enforcement of any agreement between or among the relevant parties. Section 510(c) is the statutory provision that governs the equitable subordination of claims where the claim arises from or is tainted by the inequitable conduct of a party as a result of such bad conduct. Subordination does not eliminate claims; rather, it results in the subordinated claim being removed from one class of claims and placed in a class that is afforded a lower priority in the pecking order of the payments to be made in a bankruptcy case. In many instances, a subordinated claim receives no distribution. By virtue of the subordination, the claimants remaining in the class formerly occupied by the subordinated claim may benefit essentially by receiving a proportionate share of a distribution that would otherwise have been paid to the now subordinated claim.&lt;/p&gt;
&lt;p&gt;The Bankruptcy Code, however, is silent with regard to the recharacterization of a purported claim&lt;sup&gt;1&lt;/sup&gt; as something less (i.e., an equity security interest). Because no section of the Bankruptcy Code expressly provides for recharacterization, it has been left to the courts to determine whether or not they have the authority to recharacterize.&lt;/p&gt;
&lt;p&gt;Most courts, when asked to consider recharacterization, have held that the bankruptcy courts have the authority to do so. A majority of the courts authorizing recharacterization, including the Third, Fourth, Sixth, and Tenth Circuits, have found that bankruptcy courts may recharacterize pursuant to the broad equitable powers granted by Section 105(a) of the Bankruptcy Code. &lt;em&gt;In re&lt;/em&gt; SubMicron Sys., 432 F.3d 448, 454 (3d Cir. 2006); Dornier Aviation (North America), Inc.&amp;nbsp;v.&amp;nbsp;Official Comm. of Unsecured Creditors (&lt;em&gt;In re&lt;/em&gt; Dornier Aviation), 453 F.3d 225, 231 (4th Cir. 2006); Sender v. Bronze Group, Ltd. (&lt;em&gt;In re&lt;/em&gt; HedgedInvestments Assocs., Inc.), 380 F.3d 1292, 1297 (10th Cir. 2004); &lt;em&gt;In re&lt;/em&gt; &lt;em&gt;AutoStyle&lt;/em&gt; Plastics, Inc.,&amp;nbsp;269 F.3d 726, 748, 750 (6th Cir. 2001). The &amp;ldquo;bankruptcy court&amp;rsquo;s equitable powers have long included the ability to look beyond form to substance.&amp;rdquo; &lt;em&gt;In re&lt;/em&gt; Dornier Aviation (North America), Inc., 453 F.3d at 233. In fact, the equitable power of the court to recharacterize is viewed as essential to effectuating the Bankruptcy Code&amp;rsquo;s priority scheme. Id. at 233; &lt;em&gt;In re&lt;/em&gt; &lt;em&gt;AutoStyle&lt;/em&gt; Plastics, Inc., 269 F.3d at 748; &lt;em&gt;In re&lt;/em&gt; Hedged-Investments Assocs., Inc., 380 F.3d at 1298.&lt;/p&gt;
&lt;p&gt;The Fifth and Ninth Circuits have found that recharacterization is required in appropriate circumstances by Butner v. United States, 440 U.S. 48, 54 (1979), when applicable non-bankruptcy law would characterize something that at first glance may look like a loan as a contribution to capital. &lt;em&gt;In re&lt;/em&gt; &lt;em&gt;Lothian Oil&lt;/em&gt;, Inc., 650 F.3d 539, 542&amp;ndash;43 (5th Cir. 2011); Official Comm. of Unsecured Creditors v. Hancock Park Capital II, L.P. (&lt;em&gt;In re&lt;/em&gt; Fitness Holdings Int&amp;rsquo;l, Inc.), 714 F.3d 1141, 1148&amp;nbsp;(9th&amp;nbsp;Cir.&amp;nbsp;2013).&lt;/p&gt;
&lt;p&gt;In &lt;em&gt;Lothian Oil&lt;/em&gt;, the Fifth Circuit held that recharacterization of a purported debt as a capital contribution is permitted and that recharacterization is not limited to claims of insiders.&lt;sup&gt;2&lt;/sup&gt; As stated above, the Fifth Circuit&amp;rsquo;s approach to recharacterization differs from the several circuits that rely upon the equitable powers of a bankruptcy court as the basis for recharacterization. Rather than relying on the Section 105(a) &amp;ldquo;all writs&amp;rdquo; provision of the Bankruptcy Code, the Fifth Circuit applied state law to recharacterize a claim as an equity security interest by employing Section 502(b)(1) of the Bankruptcy Code&amp;mdash;the Bankruptcy Code section that provides for the allowance and disallowance of claims. The Fifth Circuit reasoned that resorting to the general equitable powers of the bankruptcy court was inappropriate because it was unnecessary to do so, since Section 502(b)(1) explicitly grants authority to bankruptcy courts to allow and disallow claims. Thus, the Fifth Circuit&amp;rsquo;s analysis focused on the governing agreement and applicable state law, and not bankruptcy law, when deciding what rights were actually created by the agreement of the parties, despite any descriptive labels used by the parties (i.e.,&amp;nbsp;substance over form).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5MY4-SY71-F06F-22F2-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5MY4-SY71-F06F-22F2-00000-00&amp;amp;pdcontentcomponentid=382153&amp;amp;pdteaserkey=sr2&amp;amp;ecomp=y21g&amp;amp;earg=sr2&amp;amp;crid=3891732b-00a4-4201-af5a-b629c4e2c24f" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/bankruptcy.page#ira-herman" target="_blank"&gt;Ira L. Herman&lt;/a&gt; is a partner at Blank Rome, LLP. He concentrates his practice on distressed public debt issues, insolvency matters involving upstream and midstream oil and gas companies, and distressed M&amp;amp;A, in addition to traditional bankruptcy and insolvency matters.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on recharacterization, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/23ddf1bb-376b-452a-9917-b37826b7ceb4/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING RECHARACTERIZATION&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/70d9697c-6eab-4780-8e92-17ba304a7b8b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Bankruptcy &amp;gt; Case Administration and the Estate &amp;gt; Proofs of Claim &amp;gt; Practice Notes &amp;gt; Proofs of Claim&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on subordination, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/0f39d82e-c6f9-40a8-b448-9196fc32ba5f/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING SUBORDINATION&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/70d9697c-6eab-4780-8e92-17ba304a7b8b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Bankruptcy &amp;gt; Case Administration and the Estate &amp;gt; Proofs of Claim &amp;gt; Practice Notes &amp;gt; Proofs of Claim&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;small&gt;&lt;strong&gt;1.&lt;/strong&gt; A &amp;ldquo;claim&amp;rdquo; under Section 101(5) of the Bankruptcy Code includes the &amp;ldquo;right to payment, whether or not such right is reduced to judgment, liquidated, unliquidated, fixed, contingent, matured, unmatured, disputed, undisputed, legal, equitable, secured, or unsecured.&amp;rdquo; &lt;strong&gt;2.&lt;/strong&gt; An &amp;ldquo;equity security&amp;rdquo; is defined as either &amp;ldquo;(A) share in a corporation, whether or not transferable or denominated &amp;lsquo;stock&amp;rsquo;, or similar security; (B) interest of a limited partner in a limited partnership; or (C) warrant or right, other than a right to convert, to purchase, sell, or subscribe to a share, security, or interest of a kind specified in subparagraph (A) or (B) of this paragraph.&amp;rdquo; 11 U.S.C. &amp;sect; 101(16). &lt;/small&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Real Estate Due Diligence in Corporate and M&amp;amp;A Transactions</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=a9cb7c93-283f-4cec-9431-f287630afc76</link><pubDate>Wed, 12 Apr 2017 16:48:09 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:a9cb7c93-283f-4cec-9431-f287630afc76</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ17_2D00_Spring_5F00_PracticeNotes.png" alt=" " border="0" /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;strong&gt;Joseph M. Marger&lt;/strong&gt;, Reed Smith LLP.&lt;/p&gt;
&lt;p&gt;In almost every asset purchase, stock purchase, and merger transaction (generally referred to in this article as M&amp;amp;A transactions), the purchaser will acquire an ownership or leasehold interest in at least one real estate asset. However, the real estate asset(s) do not drive a typical M&amp;amp;A transaction. In most cases, a particular real estate asset will only have significance because of how it will be used in the purchaser&amp;rsquo;s business operations after closing (i.e., the real estate only has incidental value).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;IF REAL ESTATE IS NOT DRIVING THE TRANSACTION&lt;/strong&gt;, the&amp;nbsp;purchaser may be inclined to forego, substantially limit, or postpone the real estate due diligence commonly performed in a real estate transaction. This article provides general guidance and practice tips for a real estate attorney assisting with the real estate due diligence in such an M&amp;amp;A transaction.&lt;/p&gt;
&lt;h3&gt;Preliminary Items&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Timing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The real estate component of an M&amp;amp;A transaction runs more smoothly if real estate due diligence is addressed in the early stages of the transaction. M&amp;amp;A transaction agreements rarely include a due diligence period, and much of the due diligence is performed before contract signing. By addressing real estate due diligence early in the transaction, the purchaser can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify real estate costs (e.g., transfer taxes) that may be material in the purchaser&amp;rsquo;s pricing decision&lt;/li&gt;
&lt;li&gt;Gain negotiating leverage on real estate issues&lt;/li&gt;
&lt;li&gt;Modify the deal structure to mitigate real estate issues&lt;/li&gt;
&lt;li&gt;Account for real estate due diligence items requiring significant lead time in the deal timeline&lt;/li&gt;
&lt;li&gt;Otherwise factor real estate due diligence considerations into&amp;nbsp;its decision-making process&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Confirm the Transaction Structure&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The real estate due diligence process varies depending upon how the M&amp;amp;A transaction is structured. At the outset, make sure you completely understand the applicable transaction structure. The three most common structures are asset purchases, stock purchases, and mergers.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Asset purchase&lt;/strong&gt;. In an asset purchase, the purchaser acquires all (or a portion) of the seller&amp;rsquo;s assets. Unless successor liability is imposed pursuant to applicable laws, the purchaser is only liable for those obligations of the seller (if any) that the purchaser expressly assumes under the transaction documents.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Stock purchase.&lt;/strong&gt; In a stock purchase, the purchaser acquires all of the ownership interests in the target company, and the target company&amp;rsquo;s assets and liabilities remain the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Merger&lt;/strong&gt;. In a merger, two companies are combined, and the surviving company succeeds to all assets and liabilities of the disappearing company.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For a complete understanding of the applicable transaction structure, you must confirm specific factual information. For stock purchases and mergers, confirm whether the purchaser is acquiring an entire company or a division. For asset purchases, confirm the specific real estate assets to be acquired and how the purchaser intends to take title to those assets; for example, the purchaser may want each asset to be transferred to a separate single-purpose subsidiary company. For mergers, confirm the type of merger and whether the surviving entity is the target, the purchaser, or a subsidiary of the purchaser. Ask whether pre- and post-transaction structure charts are available. Structure charts provide a clear and concise summary of the transaction and are likely to include the above factual information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5MB8-MKM1-JKHB-632R-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5MB8-MKM1-JKHB-632R-00000-00&amp;amp;pdcontentcomponentid=126180&amp;amp;pdteaserkey=sr1&amp;amp;ecomp=y21g&amp;amp;earg=sr1&amp;amp;crid=53796074-746e-4738-8cb6-2ec2aa055255" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Joseph Marger&lt;/strong&gt; is a Partner in Reed Smith&amp;rsquo;s Real Estate group. He has substantial experience in all aspects of the sale and acquisition of real estate, both single asset and portfolio transactions, including industrial and commercial single-user facilities, shopping centers, hotels, office buildings and multi-family residential properties. He is equally experienced in real estate finance, including saleleaseback and build-to-suit financing transactions, traditional loan documentation for borrowers and institutional lenders for construction and development and stabilized assets, including securitized transactions.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed discussion on the salient benefits and drawbacks when choosing a transaction structure, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d9fd82d5-ddfa-4b17-adbe-3c7367550556/?context=1000522" target="_blank"&gt;&amp;gt; BENEFITS AND DRAWBACKS OF ASSET PURCHASE, STOCK PURCHASE AND MERGER STRUCTURES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/ce855a21-158a-42af-aaf3-afc1d2236b27/?context=1000522" target="_blank"&gt;RESEARCH PATH: Real Estate &amp;gt; Corporate Transactions &amp;gt; Due Diligence &amp;gt; Practice Notes &amp;gt; Structuring and Planning&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a basic form of a lease abstract, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/3b9759b1-d118-4574-9518-a884739ba923/?context=1000522" target="_blank"&gt;&amp;gt; LEASE ABSTRACT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/214a80b0-9f42-4278-b460-00884355d4cd/?context=1000522" target="_blank"&gt;RESEARCH PATH: Real Estate &amp;gt; Office Leasing &amp;gt;Closing and Other Ancillary Documents &amp;gt; Forms &amp;gt; Lease Abstract&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on environmental due diligence in corporate transactions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/4561aec0-a7f4-437d-8d08-4a57704eba73/?context=1000522" target="_blank"&gt;&amp;gt; ENVIRONMENTAL DUE DILIGENCE IN M&amp;amp;A TRANSACTIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d9d50e6a-609d-4587-b645-b8d79328d54b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Real Estate &amp;gt; Corporate Transactions &amp;gt; Due Diligence &amp;gt; Practice Notes &amp;gt; Environmental Due Diligence&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance in understanding and allocating environmental liabilities in a transaction agreement, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7c6b7544-7c44-408f-880f-9a1f662a3dc0/?context=1000522" target="_blank"&gt;&amp;gt; ALLOCATING ENVIRONMENTAL RISKS IN THE TRANSACTION AGREEMENT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/853ad4ad-7c45-4a8a-afc3-6ef345c5c464/?context=1000522" target="_blank"&gt;RESEARCH PATH: Real Estate &amp;gt; Corporate Transactions &amp;gt; Transaction Documents &amp;gt; Practice Notes &amp;gt; Transaction Documents&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a more thorough discussion on the environmental risks that are encountered in real estate transactions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/b19c225f-0329-41af-8769-4a3a43509643/?context=1000522" target="_blank"&gt;&amp;gt; ENVIRONMENTAL DUE DILIGENCE IN REAL ESTATE TRANSACTIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/979f3670-407f-4f88-a9a9-0cfe97f0293c/?context=1000522" target="_blank"&gt;RESEARCH PATH: Real Estate &amp;gt; Corporate Transactions &amp;gt; Due Diligence &amp;gt; Practice Notes &amp;gt; Environmental Due Diligence&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on choosing a transaction structure, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/51f6bf4e-9f91-4722-b6e1-0c114705cb7a/?context=1000522" target="_blank"&gt;&amp;gt; SELECTING A STRUCTURE&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/979f3670-407f-4f88-a9a9-0cfe97f0293c/?context=1000522" target="_blank"&gt;RESEARCH PATH: General Practice &amp;gt; General Commercial and Contract Boilerplate &amp;gt; Contract Boilerplate and Clauses &amp;gt; Secondary Materials &amp;gt; Termination and Cancellation&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Market Trends: High Yield Debt Offerings</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=004acf87-2f14-467f-846f-1276e268e18a</link><pubDate>Wed, 12 Apr 2017 16:51:06 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:004acf87-2f14-467f-846f-1276e268e18a</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/615x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ17_2D00_Spring_5F00_PracticeProjections_5F00_13.png" alt=" " border="0" /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;a href="/en-us/practice-advisor-authors/profiles/david-azarkh.page" target="_blank"&gt;David Azarkh&lt;/a&gt; and &lt;strong&gt;John O&amp;rsquo;Connell&lt;/strong&gt;, Simpson Thacher &amp;amp; Bartlett LLP.&lt;/p&gt;
&lt;h3&gt;Overview: The High Yield Roller Coaster Continues&lt;/h3&gt;
&lt;p&gt;The most appropriate word to describe the high yield market in 2016 is volatility. There were some rough patches when few issuers tested the waters&amp;mdash;particularly during the first quarter&amp;mdash;but over the course of the year, a number of windows opened up with favorable market backdrops for issuing new high yield bonds. For example, in February 2016 the United States saw a meager $8.6 billion of new high yield issuances, whereas April 2016 saw a robust $31.8 billion. The ebb and flow of 2016 was no different from 2015, with $38.4 billion of new high yield issuances in April 2015 and just a sparse $3.1 billion in December 2015.&lt;/p&gt;
&lt;p&gt;After record issuance levels in North America and Europe in 2013 and 2014, the high yield market turned volatile in 2015 and into 2016, due in large part to falling oil prices and increased political and financial instability both in the United States and abroad. In the United States, new high yield issuance in 2016 declined for the fourth consecutive year to $229 billion, primarily due to commodity concerns, particularly with respect to defaults in the energy sector, which increased in 2015 and continued to rise in 2016. Throughout the year, investors remained concerned about macroeconomic weakness in many leading economies, the ever-present uncertainly around the timing of interest rate increases, and the potential for continued increased default levels in certain sectors exposed to commodity price unpredictability such as oil, natural gas, coal, and iron ore.&lt;/p&gt;
&lt;p&gt;In addition, the Federal Reserve&amp;rsquo;s 2013 guidance to banks regarding limiting credit to finance acquisitions with high debt-to-EBITDA ratios continued to affect acquisition financing structures in 2016 and dampened the market for high yield bonds used to fund leveraged buy outs (LBOs). This policy has had a particularly disproportionate impact on acquisition financing strategies for private equity firms and their portfolio companies, which have historically relied on financing from banks as the primary source of acquisition funding, with such debt often refinanced in the high yield market. U.S. high yield issuers also grappled with important court decisions that have affected the ability of issuers to restructure their bonds outside of bankruptcy. The high-profile bankruptcy of Caesar&amp;rsquo;s Entertainment in January 2015, for one, gave investors heightened reason to proceed with caution before investing in bonds related to highly leveraged buyouts.&lt;/p&gt;
&lt;p&gt;But 2016 also showed signs of promise for a high yield rebound in 2017. Notably, as issuers and investors adjusted to recent interest rate increases in the United States and stimulus measures from the European Central Bank, new high yield issuance volumes increased over the latter part of 2016. Notwithstanding widespread market volatility in December 2015 following the first interest rate increase by the Federal Reserve since the financial crisis, the U.S. economy has continued to expand and unemployment figures have continued to decline. In December 2016, another rate increase by the Federal Reserve signaled confidence in continued growth in the U.S. economy. Such rate increases are expected to continue in 2017. In addition, in the aftermath of the highly contentious U.S. presidential election, bond yield prices increased significantly, with investors seeming to show initial consensus that the incoming administration and Republican Congress could stimulate the U.S. economy if they follow through on their promises to invest in infrastructure, deregulate, and cut corporate tax rates. The effect of the new administration, however, remains to be seen. On the whole, most banks on the street expect an uptick in high yield volume in 2017, with the average consensus forecasting $237 billion in new issuances. In sum, the latter half of 2016 showed a few promising signs of life for the 2017 high yield market.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5N4F-3M31-F2TK-24YF-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5N4F-3M31-F2TK-24YF-00000-00&amp;amp;pdcontentcomponentid=101206&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0&amp;amp;crid=438b0545-1fcf-4145-adb5-5cee784251ff" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="/en-us/practice-advisor-authors/profiles/david-azarkh.page" target="_blank"&gt;David Azarkh &lt;/a&gt;is a Partner in Simpson Thacher&amp;rsquo;s New York office and a member of the Firm&amp;rsquo;s Corporate Department. David&amp;rsquo;s primary area of concentration is capital markets. David regularly represents underwriters, corporate clients, and private equity sponsors in securities offerings ranging from high yield and investment grade debt offerings, leveraged buyouts, initial public offerings and other capital markets transactions. He also assists companies with compliance, reporting, and establishing corporate governance programs.&lt;strong&gt; John O&amp;rsquo;Connell&lt;/strong&gt; focuses his practice at Simpson Thacher &amp;amp; Bartlett LLP on advising clients on capital markets transactions. He regularly represents investment banks, corporate issuers, and private equity sponsors in connection with securities offerings ranging from initial public offerings, follow-on and secondary offerings, high yield debt offerings, and investment grade debt offerings.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed discussion on the use of high yield covenants, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f8ec4fde-8263-4c97-be35-5e56418bc131/?context=1000522" target="_blank"&gt;&amp;gt; COVENANTS: HIGH YIELD VS. INVESTMENT GRADE&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9fa1c9c0-9b68-4bad-9b3c-cad298e8b2ba/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; Debt Securities Offerings &amp;gt; Rule144A/Regulation S Debt Offerings &amp;gt; Practice Notes &amp;gt; Key Documents and Provisions&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance on the drafting of restrictive covenants and transfer provisions of indentures governing debt securities issued in Rule 144A (17 C.F.R. &amp;sect; 230.144A)/Regulation S transactions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/e471ccd8-be00-4f06-a112-13492aa6b8f8/?context=1000522" target="_blank"&gt;&amp;gt; DRAFTING AN INDENTURE FOR A RULE 144A/REGULATION S ISSUANCE&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9fa1c9c0-9b68-4bad-9b3c-cad298e8b2ba/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; Debt Securities Offerings &amp;gt;Rule 144A/Regulation S Debt Offerings &amp;gt; Practice Notes &amp;gt; Key Documents and Provisions&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For assistance in drafting a closed end indenture, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/44a70a3a-d29f-4419-84f3-23017d932b4d/?context=1000522" target="_blank"&gt;&amp;gt; INDENTURE (RULE 144A AND/OR REGULATION S DEBT OFFERING)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/52c0b17e-c747-4374-a071-c3bc160cdc1b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; Debt Securities Offerings &amp;gt; Rule144A/Regulation S Debt Offerings &amp;gt; Forms &amp;gt; Transaction Documents&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Guidance on Emerging Growth Companies</title><link>https://www.lexisnexis.com/authorcenter/members/alainna-nichols/activities?ActivityMessageID=c20d0db0-1897-4d3f-8fc4-fb86e9a6158b</link><pubDate>Wed, 12 Apr 2017 16:49:32 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:c20d0db0-1897-4d3f-8fc4-fb86e9a6158b</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;h2&gt;Q&amp;amp;A with &lt;a href="/en-us/practice-advisor-authors/profiles/michael-labriola.page" target="_blank"&gt;Michael Labriola&lt;/a&gt;, &lt;a href="/en-us/practice-advisor-authors/profiles/michael-nordtvedt.page" target="_blank"&gt;Michael Nordtvedt&lt;/a&gt;, and &lt;a href="/en-us/practice-advisor-authors/profiles/megan-baier.page" target="_blank"&gt;Megan Baier&lt;/a&gt;, Partners at Wilson Sonsini Goodrich &amp;amp; Rosati LLP.&lt;/h2&gt;
&lt;h3&gt;What is an Emerging Growth Company (EGC)?&lt;/h3&gt;
&lt;p&gt;Under the Jumpstart Our Business Startups Act (the JOBS Act) (112 P.L. 106, 126 Stat. 306), which was passed in April 2012, a company qualifies as an emerging growth company (EGC) if at the time of its initial public offering (IPO) total annual gross revenues were less than $1 billion during its most recently completed fiscal year. EGC status affords an issuer the ability to enjoy certain reduced disclosure requirements, including providing fewer years of historical audited financials and reduced compensation disclosure, and reduced corporate governance requirements, particularly around internal controls over financial reporting and say-on-pay advisory votes. A&amp;nbsp;company will retain EGC status until the earliest of the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fifth anniversary of the company&amp;rsquo;s IPO&lt;/li&gt;
&lt;li&gt;Last day of the first fiscal year in which its annual gross revenue exceeds $1 billion&lt;/li&gt;
&lt;li&gt;Date it becomes a large accelerated filer, meaning the last day of the fiscal year in which it (1) has a public equity float held by non-affiliates of $700 million or more (measured as of the last business day of its second fiscal quarter of such year); and (2) has been a reporting company under the Securities Exchange Act of 1934, as amended (the Exchange Act), for at least 12 calendar months&lt;/li&gt;
&lt;li&gt;Date on which the company has issued more than $1 billion in non-convertible debt during the preceding three-year period&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Other than excluding certain types of issuers, such as issuers of asset-backed securities and investment companies registered under the Investment Company Act of 1940, there are no restrictions on companies qualifying for EGC status. In addition, companies organized in foreign jurisdictions as well&amp;nbsp;as in the United States can qualify as EGCs.&lt;/p&gt;
&lt;h3&gt;What are the relevant statutes and regulations governing securities offerings by EGCs?&lt;/h3&gt;
&lt;p&gt;A securities offering by an EGC is generally governed by the same statutes and regulations as those by non-EGCs, with the exception of the additional provisions of the JOBS Act and the Fixing America&amp;rsquo;s Surface Transportation Act (the FAST Act) that apply to EGCs. The following key statutes and regulations govern a typical securities offering by an EGC:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Securities Act of 1933 (the Securities Act) and the rules and regulations promulgated thereunder.&lt;/strong&gt; The Securities Act regulates the offer and sale of securities, including those of EGCs. Generally speaking, any securities offered or sold in the United States must be registered or otherwise exempt from registration under the Securities Act.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Exchange Act and the rules and regulations promulgated thereunder.&lt;/strong&gt; The Exchange Act addresses the ongoing obligations attendant with listing a class of securities on a national stock exchange, including periodic reporting and the initial registration of the class. In addition, a company with a large number of stockholders (excluding holders of most compensatory equity) may also be subject to the reporting requirements of the Exchange Act. Companies (other than banks and bank holding companies or savings and loan holding companies) with either (1) 2,000 or more stockholders or (2) 500 or more stockholders who are not accredited investors are required to register.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Regulation S-K promulgated under the Exchange Act.&lt;/strong&gt; This set of rules interplays with the Securities Act forms on which the offering is filed to provide specific disclosure requirements. Regulation S-K is also the framework for non-accounting-specific disclosures in reporting under the Exchange Act.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Regulation S-X promulgated under the Exchange Act&lt;/strong&gt;. This set of rules addresses the various accounting-specific disclosures required in Securities Act forms. Regulation S-X is also the framework for accounting-specific disclosures in reporting under the Exchange Act.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The JOBS Act&lt;/strong&gt;. The JOBS Act specifically amended the Securities Act and Exchange Act to provide for certain reduced disclosure, reporting, and governance requirements for EGCs. Most notably, the JOBS Act reduced the audited financial statements required in a Securities Act filing from three prior fiscal years to two, deferred internal control reporting for up to five years following an IPO, reduced the executive compensation disclosures required, permitted testing-the-waters communications outside of the offering, and allowed EGCs to review their Securities Act registration statements with the SEC on a confidential basis.&lt;/li&gt;
&lt;li&gt;The FAST Act. The FAST Act further enhanced certain benefits under the JOBS Act for EGCs. Most notably, the FAST Act provided further flexibility for EGCs to begin the SEC review process on Securities Act registration statements without all the required years of audited financial statements if those statements would not be required later when the registrant planned to launch the offering.&lt;/li&gt;
&lt;li&gt;Regulation G promulgated under the Exchange Act. This set of rules addresses a registrant&amp;rsquo;s use of financial measures not calculated in accordance with generally accepted accounting principles (non-GAAP financial measures). Regulation S-K also addresses the use of non-GAAP financial measures included in a registration statement filed under the Securities Act for an offering by an EGC, but Regulation G extends broadly to any public disclosure of material information made by the registrant that contains a nonGAAP financial measure.&lt;/li&gt;
&lt;li&gt;Regulation FD promulgated under the Exchange Act. This set of rules addresses the selective disclosure of material nonpublic information.&lt;/li&gt;
&lt;li&gt;Regulation M promulgated under the Exchange Act. This often overlooked set of rules addresses the timing of certain purchases and sales by a registrant in its own securities. This is relevant to EGCs that are already listed and may be engaged in any activity, including activity by affiliates, to repurchase its securities at a time proximate to a distribution of securities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What is the typical process for securities offerings by EGCs, including general steps, timeline, key transaction documents, due diligence process, and required regulatory and stock exchange filings?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;The IPO Process for EGCs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;EGCs receive key accommodations during the IPO process. The IPO on-ramp contemplated by the JOBS Act relaxed certain regulatory barriers that policy-makers believed were keeping EGCs from accessing the public markets. These accommodations include, among other benefits, confidential submission and review of IPO registration statements, reduced financial statement audit and disclosure requirements, and the ability to engage in oral or written test-the-waters communications with certain types of sophisticated investors before filing a registration statement with the Securities and Exchange Commission (SEC). This response focuses on the IPO process for an EGC, which is the principal point in its lifecycle where an EGC first benefits from its differentiated status as an EGC.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align:center;"&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5N6D-2NT1-F4W2-62MG-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5N6D-2NT1-F4W2-62MG-00000-00&amp;amp;pdcontentcomponentid=101206&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0&amp;amp;crid=d5606962-4bda-4453-b90f-c7023bd9c64f" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="/en-us/practice-advisor-authors/profiles/michael-labriola.page" target="_blank"&gt;Michael Labriola&lt;/a&gt; is a partner working in Wilson Sonsini Goodrich &amp;amp; Rosati&amp;#39;s Washington, D.C., and New York City offices, where he counsels public and private technology and emerging growth companies through all stages of their growth. His practice focuses on corporate and securities law, including general corporate representation, public offerings, venture capital financings, and mergers and acquisitions. &lt;a href="/en-us/practice-advisor-authors/profiles/michael-nordtvedt.page" target="_blank"&gt;Michael Nordtvedt&lt;/a&gt; is a partner at Wilson Sonsini Goodrich &amp;amp; Rosati, focusing on the representation of public and private technology, medical device, and life sciences companies through all stages of their growth, as well as investment banks and venture capital and private equity firms. Michael specializes in corporate and securities law, including general corporate representation, public offerings, private placements, and mergers and acquisitions. &lt;a href="/en-us/practice-advisor-authors/profiles/megan-baier.page" target="_blank"&gt;Megan Baier&lt;/a&gt; is a partner at Wilson Sonsini Goodrich &amp;amp; Rosati, specializing in corporate and securities transactions, with a focus on the life sciences, health care, and technology sectors. She also has considerable experience counseling publicly held companies on general corporate representation, SEC compliance, disclosure matters, and complex securities law issues. Assistance provided by Mark Bass, Keegan Drake, and Michael Moesel, Wilson Sonsini Goodrich &amp;amp; Rosati LLP.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance on the drafting and completion of a preliminary prospectus for an initial public offering (IPO), see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/2b660161-3fc5-4334-91c7-4090714fec94/?context=1000522" target="_blank"&gt;&amp;gt; PREPARING THE REGISTRATION STATEMENT AND PRELIMINARY PROSPECT US FOR AN IPO&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9f0aebfd-151d-4559-be04-cd707436765b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; IPOs &amp;gt; Drafting the Registration Statement &amp;gt; Practice Notes &amp;gt; The Registration Statement and SEC Review&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on the SEC registration statement review process, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/442822e8-22c2-4f50-b4e1-bd8a7ccb3b7d/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING THE SEC REVIEW PROCESS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9f0aebfd-151d-4559-be04-cd707436765b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; IPOs &amp;gt; Drafting the Registration Statement &amp;gt; Practice Notes &amp;gt; The Registration Statement and SEC Review&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For assistance in drafting risk factors for the registration statement of the IPO of an emerging growth company (EGC), see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a2d6ea91-1769-44cc-8dca-70a3a6f3583b/?context=1000522" target="_blank"&gt;&amp;gt; HOW TO DRAFT RISK FACTORS FOR A REGISTRATION STATEMENT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9f0aebfd-151d-4559-be04-cd707436765b/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; IPOs &amp;gt; Drafting the Registration Statement &amp;gt; Practice Notes &amp;gt; The Registration Statement and SEC Review&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed explanation about conducting the due diligence review for an IPO, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f6802d32-a125-4abf-8562-207cd7364ade/?context=1000522" target="_blank"&gt;&amp;gt; MANAGING THE DUE DILIGENCE PROCESS FOR AN IPO&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="https://advance.lexis.com/api/permalink/da78be1b-d0bb-4ac4-b777-13bb32d72811/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; IPOs &amp;gt; Conducting an IPO &amp;gt; Practice Notes &amp;gt; Offering Mechanics&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a checklist of the IPO requirements for an EGC, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/eedfb9e8-3fb8-469a-8589-76535b66a053/?context=1000522" target="_blank"&gt;&amp;gt; IPO REQUIREMENTS FOR EMERGING GROWTH COMPANIES CHECKLIST&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/db9f3241-769c-434a-b3c7-b15201bc1841/?context=1000522" target="_blank"&gt;RESEARCH PATH: Capital Markets &amp;amp; Corporate Governance &amp;gt; IPOs &amp;gt; Conducting an IPO &amp;gt; Forms &amp;gt; Checklists&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Patent Litigation Strategies Against Patent Trolls</title><link>https://www.lexisnexis.com/authorcenter/members/evansj5/activities?ActivityMessageID=163f1b8c-d17d-4326-9e97-7ffae35222f1</link><pubDate>Thu, 09 Feb 2017 20:13:11 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:163f1b8c-d17d-4326-9e97-7ffae35222f1</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="padding-bottom:2em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/6888.LPAJ16_2D00_patent_2D00_litigation_2D00_strategies.png" alt=" " border="0" /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/matthew-bernstein.page" target="_blank"&gt;Matthew Bernstein&lt;/a&gt;, Perkins Coie LLP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;THE MAJORITY OF PATENT CASES ARE BROUGHT BY&lt;/strong&gt; non-practicing entities (NPEs), also called patent trolls or patent assertion entities (PAEs). These parties litigate or license their patents but have no real products or services. NPE Lawsuits are commonly brought against U.S. companies and pose unique challenges. For example, many NPEs are represented on a contingent fee basis, and because NPEs do not have products, a defendant typically cannot level the playing field by asserting its own patents against the NPE. Whether you should litigate aggressively through trial or try to negotiate a quick settlement depends on your view of NPEs and the circumstances of the case.&lt;/p&gt;
&lt;p&gt;This article discusses possible ways to respond to an NPE presuit notice letter and complaint, discovery considerations, and how to approach settlement negotiations.&lt;/p&gt;
&lt;h3&gt;The NPE Assertion&lt;/h3&gt;
&lt;p&gt;A target company typically learns of an NPE assertion through either a pre-suit notice letter or a complaint. Regardless of the method of notice, you should immediately research:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The asserted patent&lt;/li&gt;
&lt;li&gt;The NPE&lt;/li&gt;
&lt;li&gt;The court, if applicable&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Research the Patent&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You should research whether the asserted patent has been the subject of a federal court case or a proceeding before the United States Patent and Trademark Office (USPTO) including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inter partes review (IPR)&lt;/li&gt;
&lt;li&gt;Covered business method patent review (CBM)&lt;/li&gt;
&lt;li&gt;Post-grant review (PGR)&lt;/li&gt;
&lt;li&gt;Ex Parte Reexamination&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Prior litigation documents may provide useful insight into the strength and weakness of the patent, as well as indicate a successful defensive strategy against the NPE. The NPE&amp;rsquo;s history of litigation may also provide some guidance as to how it will approach the current matter. In particular, you should check relevant dockets and proceeding histories for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Early dismissals.&lt;/strong&gt; Dismissals in federal litigation before responsive pleadings suggest the NPE is likely looking for a quick, nuisance value settlement.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dispositive motions. &lt;/strong&gt;Motions to dismiss and summary judgment motions may indicate potential arguments relevant in the current matter.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Claim construction filings.&lt;/strong&gt; Claim construction filings can provide insight into the scope of the asserted patent (i.e., how broadly it is being applied).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Invalidity contentions.&lt;/strong&gt; Obtaining invalidity contentions from earlier proceedings, and the underlying prior art, may jump-start your invalidity case.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expert reports.&lt;/strong&gt; Knowing that the previous case reached the expert report stage means that the NPE is willing to litigate instead of just looking for a quick settlement. The existence of expert reports means that defenses were investigated to their final or near final form, and obtaining these reports through the discovery process could jump-start or at least help your case.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Other accused infringers&lt;/strong&gt;. Defendants in other pending cases who share a common interest with your client (defeating the NPE) may be willing to pool resources and share the costs of the defense. See Joint Defense Groups later in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5KS3-KDG1-FGCG-S0G6-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5KS3-KDG1-FGCG-S0G6-00000-00&amp;amp;pdcontentcomponentid=126220&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0&amp;amp;crid=4fa93254-2b87-4048-a433-c41df51598ec" target="_blank"&gt;follow this link&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/Matthew-Bernstein.page" target="_blank"&gt;Matthew Bernstein&lt;/a&gt; is the managing partner of Perkins Coie&amp;#39;s San Diego Office, co-managing partner of the Taipei office, and a partner in the firm&amp;#39;s Patent Litigation Group. His practice focuses on patent litigation and patent trial work. The views and opinions set forth herein are the personal views or opinions of the authors; they do not necessarily reflect the views or opinions of the law firm with which they are associated.&lt;/p&gt;
&lt;hr /&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a more detailed discussion on PTAB proceedings, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/b320e224-ec3a-4c09-994a-45f20c08a1fb/?context=1000516" target="_blank"&gt;&amp;gt; THE FUNDAMENTALS OF POST-ISSUANCE CHALLENGE PROCEDURES: IPR, PGR &amp;amp; CBM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/be3ef8f1-dd7d-4da9-a91a-1d6cd920bf8f/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; PTAB Proceedings &amp;gt; Post-Issuance &amp;gt; Practice Notes &amp;gt; Post-Issuance Challenge Procedures&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information on patent pre-litigation notification letters, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/79cb15a8-49cd-4446-8f68-8eb3b2592c8e/?context=1000522" target="_blank"&gt;&amp;gt; PATENT INFRINGEMENT CEASE AND DESIST OR NOTIFICATION LETTERS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/0f2224f5-1da2-4b6a-886d-51fa61a95143/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; IP Litigation &amp;amp; Enforcement &amp;gt; Patent &amp;gt; Practice Notes &amp;gt; Notification Letters&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For detailed information on responding to a patent notice letter, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/32da4312-1656-4b17-b2e9-71944de48f26/?context=1000522" target="_blank"&gt; &amp;gt; RESPONDING TO PATENT NOTICE LETTERS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/0f2224f5-1da2-4b6a-886d-51fa61a95143/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp;Technology &amp;gt; IP Litigation &amp;amp; Enforcement &amp;gt; Patent &amp;gt; Practice Notes &amp;gt; Notification Letters&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed list of the steps to take upon the receipt of a pre-litigation notification letter, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d5d7275e-0006-4bb7-ba5e-ab0affec3635/?context=1000522" target="_blank"&gt;&amp;gt; CHECKLIST&amp;mdash;RESPONDING TO PATENT NOTICE LETTERS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/ee2b7fc0-94c8-4d90-883d-bd04def5dbb4/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; IP Litigation &amp;amp; Enforcement &amp;gt; Patent &amp;gt; Forms &amp;gt; Pre-Litigation Actions&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;For a sample response letter to a patent notice letter, see&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/275e70d3-a5b4-45da-882a-f66fe26c6d57/?context=1000522" target="_blank"&gt;&amp;gt; RESPONSE TO PATENT INFRINGEMENT CEASEAND DESIST OR NOTICE LETTER&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/ee2b7fc0-94c8-4d90-883d-bd04def5dbb4/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp;Technology &amp;gt; IP Litigation &amp;amp; Enforcement &amp;gt; Patent &amp;gt; Forms &amp;gt; Pre-Litigation Actions&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a comprehensive explanation about post-grant proceedings for challenging the validity of patents before the PTAB, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/bd485ff0-e267-4d59-91ce-9ab94a29cce3/?context=1000522" target="_blank"&gt;&amp;gt; NAVIGATING PTAB TRIAL PROCEDURES IN AIAPROCEEDINGS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/be3ef8f1-dd7d-4da9-a91a-1d6cd920bf8f/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp;Technology &amp;gt; PTAB Proceedings &amp;gt; Post-Issuance &amp;gt; Practice Notes &amp;gt; Post-Issuance Challenge Procedures&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Best Practices to Reduce Litigation Risks When Hiring From A Competitor</title><link>https://www.lexisnexis.com/authorcenter/members/evansj5/activities?ActivityMessageID=c1e978b9-d454-4930-a560-fca4126be181</link><pubDate>Thu, 09 Feb 2017 20:01:11 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:c1e978b9-d454-4930-a560-fca4126be181</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="padding-bottom:2em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ16_2D00_best_2D00_practices_2D00_reduce_2D00_litigation_2D00_risks.png" alt=" " border="0" /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/Michael-Pappas.page" target="_blank"&gt;Michael P. Pappas&lt;/a&gt;, Michael P. Pappas Law Firm, P.C.&lt;/p&gt;
&lt;p&gt;This article discusses ways to reduce the risk of litigation when hiring someone away from a competitor. Litigation involving trade secrets, non-compete agreements, and other postemployment restrictive covenants has grown exponentially, roughly doubling every decade since 1980. Often, these lawsuits are directed not only at the departing employee, but also at the employee&amp;rsquo;s new employer. Many unsuspecting employers have found themselves roped into costly and time-consuming litigation after hiring a competitor&amp;rsquo;s former employee.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;ALTHOUGH IT IS IMPOSSIBLE TO COMPLETELY ELIMINATE&lt;/strong&gt; the risk of litigation when hiring from a competitor, below are key issues to consider and steps to take to reduce that risk and be better prepared to defend any legal action that might arise:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Consider how litigious the industry is&lt;/li&gt;
&lt;li&gt;Consider who you are hiring&lt;/li&gt;
&lt;li&gt;Advise interviewers on interviewing candidates from competitors&lt;/li&gt;
&lt;li&gt;Seek full disclosure from job candidates&lt;/li&gt;
&lt;li&gt;Obtain written protections&lt;/li&gt;
&lt;li&gt;Make sure the new hire leaves his or her former employer without incident&lt;/li&gt;
&lt;li&gt;Create institutional protections (i.e., ethical walls)&lt;/li&gt;
&lt;li&gt;Understand potential claims against the hiring employer&lt;/li&gt;
&lt;li&gt;Effectively handle cease and desist letters&lt;/li&gt;
&lt;li&gt;Consider pre-litigation settlement strategies&lt;/li&gt;
&lt;li&gt;Ensure continued compliance&lt;/li&gt;
&lt;li&gt;Leave the hiring employer an out&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Know How Litigious the Industry Is&lt;/h3&gt;
&lt;p&gt;If an organization frequently hires from competitors, it should familiarize itself with general hiring customs in the industry, including how aggressively (if at all) employers seek to enforce post-employment restrictive covenants. In many industries, there is a general understanding that employees jump from employer to employer, or that employees take their personal clients with them when changing employers. In those industries (e.g., advertising, retail), enforcement of restrictive covenants is not a high priority, and litigation is relatively rare. Conversely, in hyper-competitive industries where information and clients are jealously guarded (e.g., technology, insurance), the risk of becoming embroiled in restrictive covenant litigation is significantly higher. In other fields, such as the financial sector, competitors have joined together to reduce costly litigation by establishing written protocols governing the recruitment and hiring of each other&amp;rsquo;s employees. See &lt;a href="http://www.bressler.com/DE0ED6/assets/files/Documents/Copy_of_Broker_Protocol.pdf" target="_blank"&gt;Protocol for Broker Recruiting&lt;/a&gt;. An understanding of restrictive covenant litigation practices in a particular industry can help an employer better evaluate the potential risks of hiring someone from one of its competitors.&lt;/p&gt;
&lt;p&gt;To read the full practice note in Lexis Practice Advisor, &lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;crid=fbac7334-cce4-44a6-9f6b-f9093e5f50a4&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5M9D-9CV1-F1H1-23Y0-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5M9D-9CV1-F1H1-23Y0-00000-00&amp;amp;pdcontentcomponentid=126170&amp;amp;pdteaserkey=sr16&amp;amp;pdcatfilters=UHJhY3RpY2VBcmVhXnVybjp0b3BpYzozM0ZFM0ExQTgxRjkzNUY0ODRGRDE5ODBCMjQyMzREN3xUYXNrXnVybjp0b3BpYzo1MzVDQkMyQ0IwNDk0Q0E4ODdCOUJDMEI0NDEzRTQ4MQ&amp;amp;config=00JABiZGRlNjVhMS00MTFkLTQ0MzQtOWViMS0wYmUwZDVkZTBhMzgKAFBvZENhdGFsb2dDmnYtQa0SsbRh7SXUV25a&amp;amp;pditab=allpods&amp;amp;ecomp=_t2hkkk&amp;amp;earg=sr16&amp;amp;prid=c855ce5d-7333-488f-9dfd-43d387319987" target="_blank"&gt;follow this link&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/profiles/Michael-Pappas.page" target="_blank"&gt;Michael P. Pappas&lt;/a&gt; is the principal and founder of the Michael P. Pappas Law Firm, P.C., specializing in employment litigation, counseling, compliance, and administrative charge response. Prior to starting his own firm, Mr. Pappas practiced at the nation&amp;rsquo;s leading employment law firms for more than 25 years. He is also the President and C.E.O. of Employment Compliance Advisors, LLC, a legal consulting firm.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table style="width:100%;" border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance on obtaining social media information about employees, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/04f68e3e-df35-49fb-b790-548eb68d6363/?context=1000522" target="_blank"&gt; &amp;gt; OBTAINING INFORMATION REGARDING JOB APPLICANTS AND EMPLOYEES FROM SOCIAL MEDIA WEBSITES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/abe4e32e-a5fe-48a8-89e7-7ea48689db76/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Privacy, Technology, and Social Media &amp;gt; Monitoring and Testing Employees &amp;gt; Practice Notes &amp;gt; Monitoring Employees&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed list of state laws that regulate employer access to employees&amp;rsquo; social media accounts, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/2698374a-98c5-4763-b92a-63f3a2d7ae1a/?context=1000522" target="_blank"&gt;&amp;gt; STATE LAWS ON EMPLOYER ACCESS TO SOCIAL MEDIA ACCOUNTS CHART&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7c768526-b0b0-472d-bb61-9b9d06039c3d/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Policies &amp;gt; Company Property and Electronic Information &amp;gt; Practice Notes &amp;gt; ElectronicInformation Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on state laws concerning employer access to social media accounts, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/2698374a-98c5-4763-b92a-63f3a2d7ae1a/?context=1000522" target="_blank"&gt;&amp;gt; THE &amp;ldquo;REFERENCES AND BACKGROUND CHECKS&amp;rdquo; COLUMN OF CHART &amp;ndash; STATE PRACTICE NOTES(SCREENING AND HIRING)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7c768526-b0b0-472d-bb61-9b9d06039c3d/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Jurisdictional Considerations &amp;gt; State Charts and Surveys &amp;gt; Practice Notes &amp;gt; State Practice Note Charts&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For assistance on assessing whether a restrictive covenant is valid, see the section entitled&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/abe6c428-bab7-40f8-9221-1bb09adda213/?context=1000522" target="_blank"&gt; &amp;gt; &amp;ldquo;DETERMINING THE SCOPE OF THE EMPLOYER&amp;rsquo;S PROTECTIONS&amp;rdquo; IN PRE-LITIGATION STEPS IN TRADE SECRET MISAPPROPRIATION AND BREACH OF RESTRICTIVE COVENANT LITIGATIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a00ecfcf-830c-480f-863a-33e8a0a029cc/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Litigation &amp;gt; Restrictive Covenants and Trade Secrets &amp;gt; Practice Notes &amp;gt; Enforcing Restrictive Covenants&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a discussion on the fundamental aspects of restrictive covenants, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/73cd344f-2536-4ff4-98a5-64c747bcfa07/?context=1000522" target="_blank"&gt; &amp;gt; UNDERSTANDING RESTRICTIVE COVENANT BASICS (INCLUDING ADEQUATE CONSIDERATION, PROTECTABLE INTERESTS, GEOGRAPHIC AND TIME RESTRICTIONS, AND PERMISSIBLE SCOPE)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/528436dd-457a-4f81-9513-1373a5fed9b5/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Noncompetes and Trade Secret Protection &amp;gt; Restrictive Covenants &amp;gt; Practice Notes &amp;gt; Restrictive Covenant Fundamentals&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a list of the steps to follow to draft an enforceable noncompete agreement, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/cc5b6ddb-ac30-4400-971b-19c214480db7/?context=1000522" target="_blank"&gt; &amp;gt; UNDERSTANDING, NEGOTIATING, AND DRAFTING NON-COMPETES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/528436dd-457a-4f81-9513-1373a5fed9b5/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Noncompetes and Trade Secret Protection &amp;gt; Restrictive Covenants &amp;gt; Practice Notes &amp;gt; Non-competes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information on the requirements for employee and customer non-solicitation agreements, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7ef8ba65-8630-4b5e-944e-9afd9f5c719f/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING, NEGOTIATING, AND DRAFTING CUSTOMER AND EMPLOYEE NON-SOLICITATION AGREEMENTS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/528436dd-457a-4f81-9513-1373a5fed9b5/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Noncompetes and Trade Secret Protection &amp;gt; Restrictive Covenants &amp;gt; Practice Notes &amp;gt; Non-solicitation Agreements&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a step-by-step approach to creating a non-disclosure agreement, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7ef8ba65-8630-4b5e-944e-9afd9f5c719f/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING, NEGOTIATING, AND DRAFTING NON-DISCLOSURE AGREEMENTS ON BEHALF OF EMPLOYERS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/528436dd-457a-4f81-9513-1373a5fed9b5/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Non-competes and Trade Secret Protection &amp;gt; Restrictive Covenants &amp;gt; Practice Notes &amp;gt; Confidentiality/Non-disclosure Agreements&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For advice on applying restrictive covenants at all stages of the enforcement process, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/b8d9d7c4-8169-4250-827c-ee701372da1b/?context=1000522" target="_blank"&gt; &amp;gt; ENFORCING RESTRICTIVE COVENANTS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a00ecfcf-830c-480f-863a-33e8a0a029cc/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Litigation &amp;gt; Restrictive Covenants and Trade Secrets &amp;gt; Practice Notes &amp;gt; Enforcing Restrictive Covenants&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information concerning the return of employer property, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/5cfca89a-5f6b-4fd5-8d92-a743eb68d598/?context=1000522" target="_blank"&gt; &amp;gt; DRAFTING EXIT INTERVIEW AND RETURN OF COMPANY PROPERTY POLICIES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f2916e93-0ce5-42ff-9b9f-73735424174e/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Policies &amp;gt; Separation of Employment &amp;gt; Practice Notes &amp;gt; Post-Termination Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a sample separation-of-employment policy, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/0707ac0c-2e01-44a2-9f87-7925980a3356/?context=1000522" target="_blank"&gt; &amp;gt; EXIT INTERVIEWS AND RETURN OF COMPANY PROPERTY POLICY&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/bdef67f1-53d2-4d64-85d0-df3fdd680e4e/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Policies &amp;gt; Separation of Employment &amp;gt; Forms &amp;gt; Exit Interview and Return of Company Property Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information on garden leave periods, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/121c0033-f917-45a4-b802-42c3757f2d2f/?context=1000522" target="_blank"&gt;&amp;gt; UNDERSTANDING, NEGOTIATING, AND DRAFTING GARDEN LEAVE PROVISIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/528436dd-457a-4f81-9513-1373a5fed9b5/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Noncompetes and Trade Secret Protection &amp;gt; Restrictive Covenants &amp;gt; Practice Notes &amp;gt; Non-competes&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on cease and desist letters, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/04a66ea6-7c76-48c4-8c1a-6f8c0770cc95/?context=1000522" target="_blank"&gt; &amp;gt; PRE-LITIGATION STEPS IN TRADE SECRET MISAPPROPRIATION AND BREACH OF RESTRICTIVE COVENANT LITIGATIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a00ecfcf-830c-480f-863a-33e8a0a029cc/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Litigation &amp;gt; Restrictive Covenants and Trade Secrets &amp;gt; Practice Notes &amp;gt; Trade Secret Enforcement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an annotated cease and desist letter to a new employer, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/2e4c247c-1786-413b-ba9a-bbb240db77a3/?context=1000522" target="_blank"&gt;&amp;gt; CEASE AND DESIST LETTER TO NEW EMPLOYER REGARDING POST-EMPLOYMENT RESTRICTIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/bcfb5bf7-76a0-4c52-af04-4a2614a4b91f/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Litigation &amp;gt; Restrictive Covenants and Trade Secrets &amp;gt; Forms &amp;gt; Preparing for Potential Restrictive Covenant Litigation&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance in drafting a letter to a former employee who may be violating his or her post-employment restrictions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/cba61d6a-6e6e-451c-a02a-d32b5afbd8ca/?context=1000522" target="_blank"&gt;&amp;gt; CEASE AND DESIST LETTER TO FORMER EMPLOYEE REGARDING POST-EMPLOYMENT RESTRICTIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/bcfb5bf7-76a0-4c52-af04-4a2614a4b91f/?context=1000522" target="_blank"&gt; RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employment Litigation &amp;gt; Restrictive Covenants and Trade Secrets &amp;gt; Forms &amp;gt; Preparing for Potential Restrictive Covenant Litigation&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Corporate Counsel Oversight of the Risk Assessment Process</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=79aae755-fb38-47c4-ad7c-c3e7c011382f</link><pubDate>Wed, 12 Apr 2017 16:42:05 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:79aae755-fb38-47c4-ad7c-c3e7c011382f</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;img style="padding-bottom:2em;" src="/lexis-practice-advisor/resized-image.ashx/__size/615x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ17_2D00_Spring_5F00_GCAdvisory_5F00_10.png" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;By: &lt;strong&gt;Gary Deutsch&lt;/strong&gt; M.B.A, C.P.A.&amp;ensp; &amp;ensp; &amp;ensp; &amp;ensp;&amp;ensp; &amp;ensp; &amp;ensp; &amp;ensp;&amp;ensp; &amp;ensp; &amp;ensp; &amp;ensp;&amp;ensp; &amp;ensp; &amp;ensp; &amp;ensp;&amp;ensp; &amp;ensp; &amp;ensp;&amp;ensp; &amp;ensp; &amp;ensp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;AS COUNSEL FOR ONE OR MORE BUSINESSES TYPES&lt;/strong&gt; (for-profit and/or non-profit), you are often asked to advise on many different types of legal and regulatory compliance issues, but how well prepared is any business to incorporate your advice into its daily routine? At issue is the process a business uses to manage legal risk. Here are some key questions to consider:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the board&amp;rsquo;s (or owner&amp;rsquo;s) perspective on risk? Are they risk takers or risk averse?&lt;/li&gt;
&lt;li&gt;What is their tolerance for risk? How much are they prepared to lose if they don&amp;rsquo;t follow your advice? Have they factored risk tolerance into their annual budget and strategic planning projections?&lt;/li&gt;
&lt;li&gt;Do they establish controls over risks? Do they make sure that those controls are tested periodically to ensure the organization is adequately protected within their risk tolerance?&lt;/li&gt;
&lt;li&gt;How do they communicate the controls that need to be in place? Do they include the controls in policies and procedures? If they do, are the policies and procedures routinely updated to ensure they include the most current controls needed to prevent or detect risks?&lt;/li&gt;
&lt;li&gt;Do they receive routine reports from management indicating that employees responsible for implementing controls are doing so per updated policies and procedures?&lt;/li&gt;
&lt;li&gt;Do they receive periodic risk assessments from management to identify risks inherent in the business as well as the effectiveness of management&amp;rsquo;s efforts in risk management and actions to mitigate risks when necessary to keep the organization moving toward the board&amp;rsquo;s plans within their risk tolerance?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The answers to these questions may expose some weaknesses in the risk management process that could lead to increased exposure to losses. Even if the answers do not expose significant risk management process weaknesses, attorneys need to review management&amp;rsquo;s risk assessments to form their own conclusions about the adequacy of the risk management process. Furthermore, even with a well-functioning risk management process, organizations are exposed to unexpected losses. For instance, significant changes in laws and regulations may be difficult to factor into plans until the structure of the changes have become clear. Risks that rarely occur, like natural disasters, or those occurring unexpectedly, like hacker attacks, cannot easily be included in plans except as contingency or reserve factors. Transferring those types of risks through insurance may be advisable if the transfer is cost-effective.&lt;/p&gt;
&lt;h3&gt;What Corporate Attorneys Need to Understand about Risk Assessments&lt;/h3&gt;
&lt;p&gt;Risk assessments evaluate an organization&amp;rsquo;s inherent risks or the risks that are imbedded in the nature of the business. Here are some examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hospitals are at risk for violating HIPAA laws, medical billing errors, spreading diseases, and many other risks unique to the medical field.&lt;/li&gt;
&lt;li&gt;Retailers are at risk for massive data breaches, exposing customers to fraud, and theft such as shoplifting.&lt;/li&gt;
&lt;li&gt;Manufacturers are at risk for workplace accidents and OSHA violations.&lt;/li&gt;
&lt;li&gt;Non-profits are at risk for fraud that could lead to tarnished reputations and reduced contributions.&lt;/li&gt;
&lt;li&gt;Financial institutions are at risk for regulatory safety and soundness violations that could lead to onerous controls over operations.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Of course, this list is only a sampling of the types of risk that are unique to (inherent in) various organizations. Understanding risk assessments can help attorneys assess the legal risks that the board (or owner) needs to consider in their planning and risk tolerance determination.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Risk Assessment Process&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before discussing the risk assessment process, it&amp;rsquo;s important to understand that even small organizations need to consider the interaction among the various functions, departments, divisions, products, and services that operate within an organization.&lt;/p&gt;
&lt;p&gt;This interaction requires an enterprise approach to the risk management process (called enterprise risk management or ERM).&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s an example.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ABC Corp. makes widgets. They decide to launch a new widget and outsource the manufacturing process to XYZ LLC. The new widgets start selling well and ABC&amp;rsquo;s accounts receivable grow accordingly. However, shortly after the new widgets reached customers, there was feedback that the widgets weren&amp;rsquo;t operating as ABC marketed. After an investigation, it was determined that XYZ LLC had a defect in a component part of the widget. While the investigation was underway, ABC&amp;rsquo;s accounts payable department paid XYZ under the contract provisions for the new widget. The accounts receivable department, credit department, supply management function, and accounts payable did not communicate with one another, resulting in accounts payable paying an XYZ invoice that should have been withheld pending the results of the investigation. If accounts receivable, credit, or supply management had provided accounts payable with a copy of the manufacturing agreement with XYZ as well as a notification that there was a defect part investigation, accounts payable would have been alerted to the defect part provision, allowing for payment to be withheld pending investigation.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;An assessment of payment risks focused solely on the accounts payable department may have identified the weakness noted in this example after the payment had been made to XYZ. However, an ERM risk assessment may have identified the lack of communications among the accounts receivable department, credit department, supply management function, and accounts payable as a control weakness that if corrected could have prevented the payment to XYZ.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sample ERM Risk Assessment Questionnaire&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This sample ERM risk assessment questionnaire for outsourced vendor contracts may have helped identify the payment issue discussed above. This assessment is not a legal review&amp;mdash;it is a review of operational and security-related provisions to ensure that the organization&amp;rsquo;s interests are continuing to be protected.&lt;/p&gt;
&lt;p&gt;When evaluating ABC&amp;rsquo;s outsourcing arrangement with XYZ, the following operational and technology contract issues should be considered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Does ABC&amp;rsquo;s internal auditor have the right to periodically review vendor activities? This review should identify the areas of risk and the levels of risk to be reviewed and recommend and perform audit procedures as needed that may require the vendor&amp;rsquo;s cooperation.&lt;/li&gt;
&lt;li&gt;Does the contract provide for ABC&amp;rsquo;s right to perform updates to due diligence to ensure that the vendor has a sufficient number of qualified staff members to perform the contracted work?&lt;/li&gt;
&lt;li&gt;Does ABC have the right to receive timely notice from the vendor of any key staffing changes?&lt;/li&gt;
&lt;li&gt;Does the contract adequately define the expectations and responsibilities for both parties based on the current operating environment?&lt;/li&gt;
&lt;li&gt;Are the scope, frequency, and cost of work to be performed by the vendor subject to change as necessary to protect the operations and security of ABC?&lt;/li&gt;
&lt;li&gt;Does the contract provide for the opportunity to reset responsibilities for providing and receiving information, such as the manner and frequency of reporting to senior management and the board about the status of contract work?&lt;/li&gt;
&lt;li&gt;Does the contract establish the protocol for changing the terms of the service contract, especially for expansion of work if significant issues are found, and stipulations for default and termination of the contract?&lt;/li&gt;
&lt;li&gt;Does the contract state that any information pertaining to ABC must be kept confidential?&lt;/li&gt;
&lt;li&gt;Does the contract specify the reports and the related documents needed to evaluate the performance of contractual obligations?&lt;/li&gt;
&lt;li&gt;Does the contract specify the period that vendors must maintain the reports and documents?&lt;/li&gt;
&lt;li&gt;Does the contract state that outsourced services provided by the vendor may be subject to regulatory review and that examiners will be granted full and timely access to the appropriate reports and related documents prepared by the outsourcing vendor?&lt;/li&gt;
&lt;li&gt;Does the contract state that reports are the property of ABC, that ABC will be provided with any copies of the related documents it deems necessary, and that employees authorized by ABC will have reasonable and timely access to the documents prepared by the vendor?&lt;/li&gt;
&lt;li&gt;Does the contract prescribe a process (arbitration, mediation, or other means) for resolving problems and for determining who bears the cost of consequential damages arising from errors, omissions, and negligence?&lt;/li&gt;
&lt;li&gt;Does the contract state that the vendor will not perform management functions, make management decisions, or act or appear to act in a capacity equivalent to that of an employee or a member of management of the institution, and will comply with professional and regulatory independence guidance?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This risk assessment together with a policy stating that all affected parties within ABC must be notified of outsourced contract provisions, changes to contracts, and violations of terms, if any, could have prevented the payment issue in this example. The discussion below will focus on an overview of the ERM risk assessments process.&lt;/p&gt;
&lt;h3&gt;Conducting ERM Risk Assessments&lt;/h3&gt;
&lt;p&gt;The Committee of Sponsoring Organizations (COSO) issued the &amp;quot;Enterprise Risk Management - Integrated Framework&amp;quot; in 2004 to assist organizations worldwide with principles-based guidance for designing and implementing effective enterprise wide approaches to risk management or enterprise risk management (ERM) as this process is appropriately named.&lt;/p&gt;
&lt;p&gt;COSO defines its ERM framework as &amp;quot;a process, effected by an organization&amp;rsquo;s board of directors, management, and other personnel, which is applied in strategy setting and across the enterprise. The goal of ERM is to provide reasonable assurance regarding the achievement of organizational objectives by identifying events that may affect the organization and managing risk to be within the organization&amp;rsquo;s risk appetite.&amp;quot;&lt;/p&gt;
&lt;p&gt;The COSO framework provides guidance in the following general areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Definitions for essential ERM components&lt;/li&gt;
&lt;li&gt;Key ERM principles and concepts&lt;/li&gt;
&lt;li&gt;Ideas for developing a common language to communicate ERM risks&lt;/li&gt;
&lt;li&gt;A development path for ERM&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;COSO&amp;rsquo;s ERM guidance moves beyond theory to explain how ERM integration into processes can help to balance risks and rewards. Consider the following risk assessment issues&amp;mdash;does the institution&amp;rsquo;s ERM approach:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Align risk appetite and strategy&lt;/li&gt;
&lt;li&gt;Identify and manage cross-enterprise risks&lt;/li&gt;
&lt;li&gt;Provide integrated response to multiple risks&lt;/li&gt;
&lt;li&gt;Link growth, risk, and return&lt;/li&gt;
&lt;li&gt;Seize opportunities&lt;/li&gt;
&lt;li&gt;Ration capital based on risk appetite&lt;/li&gt;
&lt;li&gt;Enhance risk-response decisions&lt;/li&gt;
&lt;li&gt;Minimize operational surprises and losses&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The traditional non-ERM approach to conducting risk assessments is to have the organization&amp;rsquo;s financial function carry them out on a monthly, quarterly, or yearly basis. During the process, errors are detected and corrected and people are considered the primary source of risk. Operational plans focus on short-term risks.&lt;/p&gt;
&lt;p&gt;Following the ERM performance approach, risk assessments are continuous and performed by management of the various organization functions. ERM stresses that everyone controls and achieves the organization&amp;rsquo;s strategic plan and controls are focused on all risks, not just a risk selected in isolation. Errors are prevented and processes are the primary source of risk, not people.&lt;/p&gt;
&lt;p&gt;The strategic plan focuses on long-term risk. Therefore, a wellfunctioning ERM program will provide for the systematic internal assessment of risks based on the following criteria:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Place limited reliance on third-party risk assessments.&lt;/li&gt;
&lt;li&gt;Identify and plan for contingent risks.&lt;/li&gt;
&lt;li&gt;Create incentive for organizational units to minimize contingent risks.&lt;/li&gt;
&lt;li&gt;Use multiple risk management tools and metrics.&lt;/li&gt;
&lt;li&gt;Develop flexible and adaptive risk models.&lt;/li&gt;
&lt;li&gt;Aggregate net and gross loss exposures in addition to plans for expected (routine) losses.&lt;/li&gt;
&lt;li&gt;Implement credible stress testing that is actionable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The ERM program should also provide for open communications among organizational units, risk management staff, senior management, and board members, as well as corporate counsel, to enhance enterprise level decision-making about major risks and to react faster to emerging issues.&lt;/p&gt;
&lt;p&gt;However, look for signs that the ERM program is not working. Here are some signs to consider:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Increasing risk concentrations are not disclosed in reports to management and the board.&lt;/li&gt;
&lt;li&gt;Organizational units use different risk models that do not produce consistent results.&lt;/li&gt;
&lt;li&gt;There is a lack of buy-in that risk issues and assessments should be shared.&lt;/li&gt;
&lt;li&gt;Risk models are rarely updated to reflect evolving risks.&lt;/li&gt;
&lt;li&gt;The mindset that someone else will be performing the risk analysis and assessment.&lt;/li&gt;
&lt;li&gt;Contingent risks and unintended consequences of risks are not identified.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To ensure that the organization&amp;rsquo;s ERM program is functioning as intended, ask management and the board the following questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Are risk-and-capital concepts used to quantify risk/return tradeoffs, in dollars where possible?&lt;/li&gt;
&lt;li&gt;Does the ERM program quantify the destructive power of correlated risk factors across the enterprise?&lt;/li&gt;
&lt;li&gt;Are operational risk ERM resources directed toward big risks?&lt;/li&gt;
&lt;li&gt;Is out of the box thinking used on ERM to see all business risks and interactions?&lt;/li&gt;
&lt;li&gt;Is ERM information embedded in business metrics (risk-adjusted pricing/performance)?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Although ERM may sound like a risk management approach that is best suited to large organizations, keep in mind that smaller organizations may be practicing ERM without a formal ERM program. In smaller organizations, owners, the board, and management may be the same people or certainly a small group who can recognize risks more easily due to the small size of the organization. Corporate counsel can also help by providing an objective combined legal and business perspective on risks that the others may not recognize as they are immersed in daily activities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Core Risk Assessment Components&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There are two core components of ERM risk assessments. The components should be designed to answer the following questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the organization&amp;rsquo;s inherent level of risk?&lt;/li&gt;
&lt;li&gt;How well is risk being managed within the organization?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Below is a brief overview of each of these components.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Inherent Risk Assessment&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Inherent risk is defined as the possible damage to earnings, capital, or reputation because of an organization&amp;rsquo;s involvement in a certain line of business. This risk exists in each line of business, regardless of the level of management control in place. For example, credit risk associated with attracting new business is typically higher than the risk of extending additional credit to existing customers. When a risk is inherent, the frequency with which a risk event occurs and results in a loss, and the extent of exposure to such losses, can be managed. The risk frequency and severity of exposure can be directly managed through the processes the organization uses to identify, measure, monitor, and control risk. The inherent risk assessment is intended to identify those risks that are specific to a line of business. The management of risk assessment discussed in the next section is designed to evaluate the processes the organization uses to identify, measure, monitor, and control risk.&lt;/p&gt;
&lt;p&gt;The inherent risk assessment is divided into three main sections: historic, predictive, and impact. The first section, historic, is intended to assess past loss experience within the industry as well as the organization&amp;rsquo;s actual historical loss experience. Since the past is often a poor guide to what might happen in the future, the predictive part of the assessment is intended to assess the potential for future adverse events in each risk category. The impact section addresses the expected result from significant adverse events.&lt;/p&gt;
&lt;p&gt;Exhibit A includes sample assessment standards and a rating system to measure inherent risk. In this exhibit, a rating of 9 indicates that there is a strong likelihood of an adverse impact on earnings, capital, or reputation, but only if management controls are not in place or functioning properly. Since effective management controls can mitigate risks, the assessment should evaluate the organization&amp;rsquo;s total inherent risk exposure separately from the assessment of current management policies and processes in place to control the risk as discussed in the following section.&lt;/p&gt;
&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/750x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/exhibita.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;It is important to assign a score for each category of risk. Any categories that are not applicable should be scored zero. Also, comment on reasons for assigning any score of 7 to 9 since those risks will need to be evaluated for risk mitigation controls.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Management of Risk Assessment&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Organizations profit by taking measured risks. However, they can lose money or even fail by not managing those risks. Effective risk management means integrating several elements, including strategy, organization, policies and procedures, process and controls, measurement/monitoring, technology, and reporting.&lt;/p&gt;
&lt;p&gt;Management of risk can significantly reduce volatility and the potential damage to earnings, capital, or reputation. Management cannot, however, eliminate risk, especially when an organization assumes levels of inherent risk associated with their line of business.&lt;/p&gt;
&lt;p&gt;In the preceding section, we discussed the need to assess an organization&amp;rsquo;s inherent risks. The second core risk assessment component is to evaluate the quality of the management of those inherent risks.&lt;/p&gt;
&lt;p&gt;Exhibit B includes sample assessment standards and a rating system for the management of risk assessment. A rating of 9 indicates that there is a strong likelihood of an adverse impact on earnings, capital, or reputation, but only if current management controls are not in place or functioning properly. Accordingly, as with the inherent risk assessment, evaluate the organization&amp;rsquo;s total risk exposure separately from the management policies and processes that are currently in place to control the risk.&lt;/p&gt;
&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/750x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/riskrating.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;It is important to assign a rating for each category of risk. Also, comment on reasons for assigning a grade of 7 to 9 since those risks will need to be evaluated for risk mitigation controls.&lt;/p&gt;
&lt;h3&gt;Corporate Counsel&amp;rsquo;s Role in Risk Assessment Compliance&lt;/h3&gt;
&lt;p&gt;Corporate counsel can have a significant impact on compliance with the board&amp;rsquo;s objectives through oversight of the ERM risk assessment process in the following manner:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Communicate the legal implications of business (for-profit and nonprofit) risk issues to risk managers to assist them in preparing ERM risk assessments.&lt;/li&gt;
&lt;li&gt;Provide effective guidance to the board and management on how to implement and enforce strong corporate governance to protect shareholders, stakeholders, members, and donors.&lt;/li&gt;
&lt;li&gt;Review policies and procedures (which include risk management controls) to ensure the documents are properly vetted from a legal perspective.&lt;/li&gt;
&lt;li&gt;Assist with quantifying risks through an understanding of regulatory fines, costs of litigation, and other related costs.&lt;/li&gt;
&lt;li&gt;Provide routine risk management guidance to risk managers throughout the organization based on the results of court cases.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To accomplish these and other related roles, counsel must participate as an advisor to the risk management team that creates and implements the periodic ERM risk assessments. Counsel should:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Review all risk assessment questionnaires to ensure they incorporate legal guidance and risk trends.&lt;/li&gt;
&lt;li&gt;Monitor the results of risk assessments to evaluate the potential implications for meeting the board&amp;rsquo;s strategic objectives within their risk tolerance.&lt;/li&gt;
&lt;li&gt;Provide guidance to the board on risk trends and ranking risk priorities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Counsel&amp;rsquo;s oversight role should be objective as well as a routine part of the oversight process, which traditionally includes the internal and external audit functions as well as other oversight positions such as the chief risk officer. In addition, the board should allow counsel to work directly with the oversight functions and human resource and regulatory compliance managers to assist with evaluating risks inherent in the organization and the effectiveness of management in managing those risks.&lt;/p&gt;
&lt;h3&gt;Identifying Trending Risks&lt;/h3&gt;
&lt;p&gt;Corporate counsel can assist the board and management in identifying trending risks that should be considered in ERM risk assessments. Below are some examples of the types of risks that counsel might consider.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Invasion of Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A hacker accesses ABC, Inc.&amp;rsquo;s account information through a financial institution&amp;rsquo;s website and sells the information to a third party. ABC sues the institution, alleging that it was negligent in safeguarding the account information and that ABC suffered economic loss as a result of the account breach.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Loss or Damage to Electronic Customer Data&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC, Inc. applies for a loan on an institution&amp;rsquo;s website. A loan officer sends an e-mail to ABC concerning the status of the application. ABC later alleges that the e-mail contained a virus that deleted all financial records from one of ABC&amp;rsquo;s servers. ABC demands that the institution compensate them for the cost of reconstructing the data and for losses suffered when ABC could not access data to file tax returns on time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial, Impairment, or Interruption of Service&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A hacker institutes a denial of service attack on ABC, Inc.&amp;rsquo;s website, shutting down the site for more than 24 hours. During that time, a customer attempts to access his account to pay an outstanding invoice. Because ABC&amp;rsquo;s website is down, the payment is deemed late before the customer can complete the electronic payment. The customer alleges that the delay caused by the denial of service caused a loss of service from ABC that resulted in a loss of business for which ABC is responsible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unauthorized Access to a Customer Account&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A hacker accesses ABC, Inc.&amp;rsquo;s account through their financial institution&amp;rsquo;s website and uses personal information in the account records to obtain credit cards in ABC&amp;rsquo;s name. When the credit card issuers attempt to hold ABC liable for the unpaid charges, ABC sues their financial institution for failing to safeguard their confidential information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Loss of Business Opportunity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC, Inc. wires funds online from their corporate account at Bank A to their payroll account at Bank B. The funds are not transferred due to a systems malfunction at Bank A. When ABC&amp;rsquo;s payroll processor cannot verify that ABC has sufficient funds on deposit to pay employees through direct deposit, ABC is late paying its employees. ABC sues Bank A, alleging that their business was adversely impacted when their employees were not paid on time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Libel, Slander, and Defamation, or Other Actionable Oral or Written Disparagement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC states on its website that its product is superior to competitor products. A customer sues ABC after he purchases a product from them, alleging that he could have obtained a better product from a competing vendor. Although ABC obtains dismissal of the complaint, significant defense costs are incurred.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Infringement of Copyright, Misappropriation of Ideas, or Plagiarism&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC, Inc. obtains a report from a consultant concerning issues facing ABC&amp;rsquo;s market to support their claims of superior service. In preparing the report, the consultant copies extensively from another report, written by the consultant&amp;rsquo;s former partner. ABC places the report on its website for informational purposes, along with other information ABC provides to attract new customers. The consultant&amp;rsquo;s former partner sues ABC, alleging that ABC plagiarized his work.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Infringement of Trademark, Trade Name, or Service Mark&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC, Inc.&amp;rsquo;s marketing department develops several slogans and phrases to emphasize the quality of their new service. ABC includes these slogans on the home page of its website. However, the marketing department neglects to seek the advice of an intellectual property attorney as to whether any of the slogans are already in use by other companies. A national corporation, which has registered two of the slogans as service marks, sues ABC.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Extortion&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC, Inc. terminates an employee who feels he has been unjustly treated. In retaliation, he threatens to disseminate confidential information over the Internet unless a year&amp;rsquo;s salary is wired to a specified account within 24 hours.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ransomware&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ransomware is malware that restricts access to an infected computer system until the user pays a ransom to the malware operators to remove the restriction. For instance, ransomware might systematically encrypt files on ABC, Inc.&amp;rsquo;s server hard drives. The drives become difficult or impossible to decrypt without paying the ransom for the encryption key.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Payment Systems&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;ABC Inc.&amp;rsquo;s financial institution incurs credit risk in different forms, depending on the type of transaction and the institution&amp;rsquo;s role in the transaction. Here are examples:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ACH Credit Entries&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;For ACH credit entries, the Originating Depository Financial Institution (ODFI) incurs credit risk upon initiating the entries until ABC funds the account at settlement. The Receiving Depository Financial Institution (RDFI) incurs credit risk if it grants ABC funds availability prior to settlement of the credit entry.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ACH Debit Entries&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;For ACH debit entries, the ODFI incurs credit risk from the time it grants ABC funds availability until the ACH debit can no longer be returned by the RDFI. ODFIs generally charge back a returned ACH debit to the originator. But the ODFI may suffer a loss if, for example, the originator&amp;rsquo;s account has insufficient funds or has been closed. The RDFI&amp;rsquo;s credit risk from a debit entry arises if it allows the debit to post and overdraw its customer&amp;rsquo;s account.&lt;/p&gt;
&lt;p&gt;Institutions implement credit-risk controls that:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establish underwriting standards&lt;/li&gt;
&lt;li&gt;Require analysis of originators&amp;rsquo; creditworthiness&amp;ndash;and&amp;ndash;&lt;/li&gt;
&lt;li&gt;Set appropriate credit exposure limits&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Institutions with more complex ACH programs or institutions that do not mitigate credit risk through holdbacks or reserve accounts have more expansive credit-risk management systems. These credit risk issues can adversely impact ABC&amp;rsquo;s ability to maintain its banking relationships.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Human Resources&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The risk assessment of Human Resources (HR) functions requires input from leaders in all disciplines within the organization. Leaders in marketing, sales, operations, finance, etc.&amp;mdash;all should be asked for their opinions, ideas, and thoughts on risk areas such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hiring and selection&lt;/li&gt;
&lt;li&gt;Training and development&lt;/li&gt;
&lt;li&gt;Productivity&lt;/li&gt;
&lt;li&gt;Organizational planning&lt;/li&gt;
&lt;li&gt;Reward and recognition&lt;/li&gt;
&lt;li&gt;Administration&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It may be helpful to have an HR expert participate or provide leadership in the process, but it would be a mistake to hand off assessment of the HR functions to one or two HR staff people when the assessment questions and considerations require input from many disciplines within the organization.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Theft Risk Mitigation Example&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The risks described above would require an assessment of their potential impact on the organization (ABC, Inc. in the examples). In addition, the assessment should identify and prioritize risks and provide for risk mitigation controls where necessary. Since this type of risk assessment is focused on specific risks, it is less comprehensive than the organization-wide ERM risk assessments previously described.&lt;/p&gt;
&lt;p&gt;Below is an example of a risk assessment that is focused on a specific risk. This risk topic is data theft technology risks. When evaluating how to protect against technology risks, it is important to identify the ways that an organization can be attacked. Attacks take many forms, from breaking into a computer room and stealing data files to a trusted employee who gets around controls because of their trusted position. A summary follows of the typical ways that hackers and thieves carry out their attacks and typical risk mitigation control procedures that may prevent the attacker from succeeding.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Posing as a Customer&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Risks&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A thief uses an assumed or stolen identity to pose as a customer of ABC, Inc. and attempts to open an account with ABC.&lt;/li&gt;
&lt;li&gt;A thief uses a stolen credit card number from ABC to illegally purchase goods and services from ABC.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Procedures&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Implement, update, and manage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Customer identification procedures&lt;/li&gt;
&lt;li&gt;User signup procedures&lt;/li&gt;
&lt;li&gt;Transaction limitation procedures&lt;/li&gt;
&lt;li&gt;Dollar limits per transaction&lt;/li&gt;
&lt;li&gt;Credit lines access limits&lt;/li&gt;
&lt;li&gt;Cash management user approval criteria&lt;/li&gt;
&lt;li&gt;Wire limitations&lt;/li&gt;
&lt;li&gt;ACH origination limits&lt;/li&gt;
&lt;li&gt;Transaction settlement procedures&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Using Technology to Launch an Attack&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Risks&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A thief attempts to break through Internet security measures to illegally gain access to ABC&amp;rsquo;s online banking services.&lt;/li&gt;
&lt;li&gt;A thief attempts to steal data from ABC&amp;rsquo;s customer databases, using hacker tools over the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Procedures&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Install, update, and manage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network perimeter controls (firewalls and intruder detection)&lt;/li&gt;
&lt;li&gt;Data integrity controls (encryption)&lt;/li&gt;
&lt;li&gt;Virus prevention management&lt;/li&gt;
&lt;li&gt;Software patch management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Taking Advantage of a Trusted Employee Position&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Risks&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;An ABC employee uses his or her knowledge of network security weaknesses to access systems and steal customer data.&lt;/li&gt;
&lt;li&gt;An employee does not enforce security controls and allows another person to steal customer data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration:underline;"&gt;Procedures&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Manage and monitor:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Human access controls (passwords)&lt;/li&gt;
&lt;li&gt;System overload and capacity management&lt;/li&gt;
&lt;li&gt;Backup and recovery procedures (protection from unexpected shutdowns)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Identifying Industry-Specific Inherent Risks&lt;/h3&gt;
&lt;p&gt;In addition to identifying risk trends as discussed above, counsel can assist the board and risk managers with identifying industry-specific risks. These risks are the inherent risks that were discussed earlier in this article. Below are some examples of the risks inherent in a sampling of industries. Counsel should work with the board of each organization they represent to understand, monitor, and evaluate through ERM risk assessments the risks inherent in those industries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Banking&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Credit risk is the current and prospective risk to earnings or capital arising from an obligor&amp;rsquo;s failure to meet the terms of any contract with the bank or otherwise to perform as agreed. Credit risk is found in all activities in which success depends on counterparty, issuer, or borrower performance. It arises any time bank funds are extended, committed, invested, or otherwise exposed through actual or implied contractual agreements, whether reflected on or off the balance sheet.&lt;/p&gt;
&lt;p&gt;Risk assessments should consider both the quantity of credit risk and the quality of credit risk management. Quantity of credit risk is derived from the absolute amount of credit exposure and the quality of that exposure. How much credit exposure a bank has is a function of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The level of loans and other credit/credit-equivalent exposures relative to total assets and capital&amp;ndash;and&amp;ndash;&lt;/li&gt;
&lt;li&gt;The extent to which earnings are dependent on loan or other credit/credit-equivalent income sources&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Quality of credit risk management involves the adequacy of controls over the process of originating, funding, and overseeing loans until they are paid according to the loan agreement.&lt;/p&gt;
&lt;p&gt;All else being equal, banks that have higher loans-to-assets and loans-to-equity ratios and that depend heavily on the revenues from credit activities will have a higher quantity of credit risk. The quality of exposure is a function of the risk of default and risk of loss in assets and exposures comprising the credit exposure. However, the risk of default and loss is not always apparent from currently identified problem assets. It also includes the potential default and loss that will be affected by factors such as bank risk selection and underwriting practices; portfolio composition; concentrations; portfolio performance; and global, national, and local economic and business conditions.&lt;/p&gt;
&lt;p&gt;To determine the quantity of credit risk, risk assessments must consider an array of quantitative and qualitative risk indicators. These indicators can be leading (rapid growth), lagging (high pastdue levels), static (greater/less X%), relative (exceeds peer/historical norms), or dynamic (trend or change in portfolio mix). Many of these indicators are readily available from call report and Uniform Bank Performance Report information. Other indicators, such as a bank&amp;rsquo;s risk tolerance or underwriting practices, are more subjective.&lt;/p&gt;
&lt;p&gt;It is important to note that banks can exhibit an increasing or high level of credit risk even though many, or all, traditional lagging indicators or asset quality indicators are low. Although a qualitative indicator may have the opposite effect on credit risk that a quantitative indicator has (the one may mitigate the other&amp;rsquo;s effect), the indicators can also work together (the one may add to the other&amp;rsquo;s effect). While each type of measure can provide valuable insights about risk when viewed individually, they become much more powerful for assessing the quantity of risk when viewed together.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Health Care Workers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Every health care worker can influence the risks related to the health, safety, and welfare of patients. Health care workers are defined as everyone that works within a health care facility.&lt;/p&gt;
&lt;p&gt;A risk assessment within a health care facility should provide for a thorough evaluation of the workplace to identify anything that may cause harm to patients. The assessment should consider how probable and severe the risk is and determine what measures should be taken to prevent or control the harm from occurring.&lt;/p&gt;
&lt;p&gt;Here is a sample outline of the typical risk assessment:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify hazards to patient health.&lt;/li&gt;
&lt;li&gt;Decide what patients are at risk and how the risk might arise.&lt;/li&gt;
&lt;li&gt;Conduct and evaluate the seriousness of the risks identified.&lt;/li&gt;
&lt;li&gt;Document assessment findings.&lt;/li&gt;
&lt;li&gt;Propose action steps to improve patient safety.&lt;/li&gt;
&lt;li&gt;Identify who will be responsible for implementing revised policies, procedures, and personnel training.&lt;/li&gt;
&lt;li&gt;As risks are identified, update the risk assessment and take corrective action.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The outcome of the risk assessment should be to create awareness of hazards and risks, identify who may be at risk, and determine if existing control measures are adequate or if alternative controls should be implemented. Ideally, controls will be designed to prevent injuries or illnesses based on a prioritization of the seriousness of health hazards.&lt;/p&gt;
&lt;p&gt;Health care facilities have a legal obligation to limit unprotected exposures to pathogens, the transmission of infections associated with procedures, and the transmission of infections associated with use of medical equipment, devices, and supplies. Risk assessments should address the adequacy of control measures to manage the facility&amp;rsquo;s obligations to safely care for patients.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Retailers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Retailers are exposed to many risks due to the need to provide customers with direct physical and online access to their products and services. One access point that has resulted in losses for many retailers is incidents in which a skimming device is physically implanted (tampering) on an asset that reads magnetic stripe data from a payment card (e.g., ATMs, gas pumps, POS terminals, etc.).&lt;/p&gt;
&lt;p&gt;Some of the risk assessment issues to consider are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Does the retailer design (or buy) tamper-resistant terminals?&lt;/li&gt;
&lt;li&gt;Do they use tamper-evident controls?&lt;/li&gt;
&lt;li&gt;Do they have cameras to watch for tampering?&lt;/li&gt;
&lt;li&gt;Are consumers encouraged to protect their PINs?&lt;/li&gt;
&lt;li&gt;Are consumers encouraged to let the retailer know if something looks out of the ordinary at an ATM, payment terminal, or gas pump?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The objective for risk mitigation controls is to make it harder for criminals to carry out their plans or to detect the heist more quickly if prevention isn&amp;rsquo;t possible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Cybersecurity Insurance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cybersecurity has become a significant risk issue for all organizations. Hackers can attack from throughout the world and mostly remain undetected. These criminals are well funded and can attack for profit or to achieve political objectives. Often the risk implications of successful attacks can be debilitating and can result in reputational damage. There is also the potential for significant costs related to remediating these attacks, which is why the insurance industry has created cybersecurity insurance policies.&lt;/p&gt;
&lt;p&gt;Since there is presently little actuarial basis for underwriting these policies, actual underwriting requires a due diligence investigation into an organization&amp;rsquo;s internal risk management practices and external business dependencies, including vulnerabilities related to the organization&amp;rsquo;s suppliers, sub-suppliers, and vendors. In addition, the underwriter&amp;rsquo;s risk analysis considers threats arising from insiders, inadequate physical security, and international travel. Underwriting also evaluates how consistently the organization has adopted, implemented, and enforced an engaged cybersecurity culture that works toward risk prevention and prompt detection if prevention fails.&lt;/p&gt;
&lt;p&gt;The results from the insurer&amp;rsquo;s underwriting provide an objective look at the organization&amp;rsquo;s enterprise risk including potential highpriority vulnerabilities. Once the insurance is in place, the insurer will conduct periodic risk assessments to gain insight into evolving cybersecurity risks.&lt;/p&gt;
&lt;p&gt;Even if the organization decides not to purchase cybersecurity insurance, the insight gained from participating in the underwriting process may uncover invaluable cyber risk insight based on the insurer&amp;rsquo;s exposure to multiple industries.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Gary M. Deutsch&lt;/strong&gt;, CPA, MBA, CMA, CBA, CIA, has worked extensively with financial institutions in audit, lending, financial, and operational areas. He has served in senior positions for regional banks as VP of Finance, Real Estate Loan Officer, and Senior Audit Manager. Mr. Deutsch served as a consultant to financial institutions in strategic planning, profit improvement, financial management, and merger- and acquisition-related studies while working at KPMG. Mr. Deutsch is the President of BRT Publications LLC, a professional authoring company serving the financial industry. He has written numerous financial industry books and guides, including &lt;a href="https://store.lexisnexis.com/categories/shop-by-jurisdiction/national-194/risk-assessments-for-financial-institutions-skuusSku-us-03H" target="_blank"&gt;Risk Assessments for Financial Institutions&lt;/a&gt;, a LexisNexis/Sheshunoff publication.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path:&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5N4W-GDG1-FC1F-M2XR-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5N4W-GDG1-FC1F-M2XR-00000-00&amp;amp;pdcontentcomponentid=102983&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0" target="_blank"&gt;RESEARCH PATH: Corporate Counsel &amp;gt; Compliance Risk Assessment and Governance &amp;gt; Compliance Programs and Risk Assessment &amp;gt; Articles &amp;gt; Risk Assessment&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1" style="width:100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional information on performing risk assessments, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7932a9ee-90b8-49b3-bc90-438a0c94c991/?context=1000522" target="_blank"&gt;&amp;gt; RISK ASSESSMENT&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f03bc81a-5a6b-43e0-8312-d15c623e5eaa/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate Counsel &amp;gt; Compliance Risk Assessment and Governance &amp;gt; Compliance Programs and Risk Assessment &amp;gt; Practice Notes &amp;gt; Risk Assessment&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance on creating a compliance program, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/892f0720-80d5-431d-a306-cea4ff2fd99d/?context=1000522" target="_blank"&gt;&amp;gt; CREATING A COMPLIANCE PROGRAM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f03bc81a-5a6b-43e0-8312-d15c623e5eaa/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate Counsel &amp;gt; Compliance Risk Assessment and Governance &amp;gt; Compliance Programs and Risk Assessment &amp;gt; Practice Notes &amp;gt; Compliance and Ethics Programs&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Market Trends: Indemnification Provisions in Asset Purchase Transactions</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=e67b17f1-910f-4956-afe6-36d4ce978749</link><pubDate>Thu, 09 Feb 2017 20:12:39 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:e67b17f1-910f-4956-afe6-36d4ce978749</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;Indemnification provisions are among the most highly negotiated and critical deal points in private M&amp;amp;A transactions. In general, the parties provide mutual indemnification to each other for breaches of representations, warranties, and covenants. In practice, indemnification provisions are a tool to allocate the risk of known and unknown liabilities between the buyer and seller.&lt;/p&gt;
&lt;p&gt;Key terms that are typically negotiated are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;De minimis threshold&lt;/li&gt;
&lt;li&gt;Baskets &amp;amp; deductibles&lt;/li&gt;
&lt;li&gt;Caps&lt;/li&gt;
&lt;li&gt;Survival period of representations and warranties&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following analysis is based on asset acquisitions announced between January 1, 2016 and September 30, 2016 involving companies valued at $100 million and higher, generated by Lexis&lt;sup&gt;&amp;reg;&lt;/sup&gt; Market Tracker, lexismarkettracker.lexisnexis.com.*&lt;/p&gt;
&lt;h3&gt;Indemnification by Seller and Acquirer&lt;/h3&gt;
&lt;p&gt;&lt;img src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/indemenication_2D00_seller_2D00_acquirer.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:15em;"&gt;For the nine-month period ending September 30, 2016, data are available for a total of 154 asset purchase transactions involving companies valued at $100 million and higher. Of these, indemnification data were available for 148 transactions, of which 141, or 95%, contained indemnification obligations by the seller. Of the 148 transactions for which data on indemnification were available, 131, or 89%, contained indemnification obligations by the acquirer. Of the 148 transactions for which indemnification data were available, 142, or 96% transactions included indemnification obligations of either party or both parties.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indemnification as Exclusive Remedy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The parties to the transaction may agree that indemnification will be the sole and exclusive remedy for any claims arising out of the purchase agreement. Certain claims, such as fraud and knowing or willful misconduct, are typically carved out from the exclusivity, giving the indemnified party the right to pursue other legal or equitable remedies for those claims. Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 85, or 60%, provided for indemnification as the exclusive remedy.&lt;/p&gt;
&lt;h3&gt;De Minimis Threshold&lt;/h3&gt;
&lt;p&gt;Indemnification packages may include a requirement that claims brought for indemnification exceed a de minimis threshold or minimum claim amount. This threshold prevents acquirers from bringing immaterial claims. Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 45, or 32%, contained a de minimis threshold or minimum claim amount.&lt;/p&gt;
&lt;h3&gt;Baskets and Deductibles&lt;/h3&gt;
&lt;p&gt;Beyond a de minimis claim amount, many deals include a &amp;ldquo;tipping&amp;rdquo; basket or a deductible, both of which require that the aggregate amount of all claims exceed a specified dollar threshold before the indemnifying party becomes obligated to compensate the other party for the claims. With a basket, once the threshold is reached, the indemnifying party becomes liable for the full amount of claims. In contrast, with a deductible, once the threshold is reached, the indemnifying party becomes liable for only the amount in excess of the deductible. Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 43, or 30%, contained a basket.&lt;/p&gt;
&lt;p&gt;For the deals with a basket, the minimum basket amount expressed as a percentage of the deal value was 0.01%, the maximum basket was 6%, the median was 0.1%, and the mean was 0.55%.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/basket_2D00_amount_2D00_as_2D00_purchaseprice.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:10em;"&gt;Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 74, or 52%, contained a deductible.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/indemnification_2D00_deductible.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:15em;"&gt;For the deals with a deductible, the minimum deductible amount expressed as a percentage of the deal value was 0.06%, the maximum deductible was 10%, the median was 0.67%, and the mean was 0.94%.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/deductibleamount_2D00_purchaseprice.PNG" border="0" alt=" " /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="padding-top:10em;"&gt;&lt;strong&gt;Exceptions&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Most deals contain exceptions to the basket and deductible limitations. While the exceptions may be specific to each deal, so-called &amp;ldquo;fundamental&amp;rdquo; representations (e.g., due organization, authorization, capitalization, noncontravention, etc.) and tax and environmental representations may be excluded from the limitations of the basket and deductible. Of 117 transactions with a basket or deductible, 67, or 57%, contained exceptions for certain breaches of representations from the basket or deductible.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/repswarranties.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;h3 style="padding-top:15em;"&gt;Indemnity Caps&lt;/h3&gt;
&lt;p&gt;Indemnifying parties typically impose a limit on the total claims amount that they will indemnify. This limit, or cap, is generally calculated as a percentage of the overall deal price. Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 126, or 89%, contained a cap.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/indemenity_2D00_cap.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:15em;"&gt;Among the deals with a cap, the minimum cap was 0.06% of the purchase price, the maximum cap was 100% of the purchase price, the median cap was 9% of the purchase price, and the mean was 8.89% of the purchase price.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/cap_2D00_percentage_2D00_price.jpg" border="0" alt=" " /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="padding-top:10em;"&gt;&lt;strong&gt;Exceptions&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As with baskets and deductibles, indemnity caps may be subject to certain exceptions for specified types of claims, such as fraud, willful misconduct, or breaches of certain representations and warranties. Of the 126 transactions that contained an indemnity cap, 83 transactions, or 66%, included exceptions to the cap. The most common kind of exception was fraud, which appeared in 46 transactions. Note that many transactions contain multiple exceptions to the indemnity cap.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/types_2D00_indemnity_2D00_cap_2D00_exemptions.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;h3 style="padding-top:15em;"&gt;Survival Period&lt;/h3&gt;
&lt;p&gt;Indemnifying parties will also limit their indemnification obligations by imposing a time period during which the other party may bring a claim for indemnification for a breach of a representation or warranty. Most deals will typically include multiple survival periods, including a shorter period for breaches of general representations, with longer periods for claims arising out of breaches of fundamental representations (e.g., due formation, authorization, capitalization) and tax and environmental representations.&lt;/p&gt;
&lt;p&gt;Of the 142 asset purchase deals announced between January 1, 2016 and September 30, 2016 with indemnification provisions, 51, or 36%, had a single survival period for claims arising out of breaches of representations and warranties.&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:6em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/single_2D00_survival_2D00_period.jpg" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:15em;"&gt;For this set of deals with a single survival period, the minimum length was 159 days, the maximum was 730 days, the median was 270 days, and the mean was 284.56 days (approximately 10 months).&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-left:2em;" src="/lexis-practice-advisor/resized-image.ashx/__size/625x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/selected_2D00_representations.PNG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p style="padding-top:15em;"&gt;For the same period, 87 transactions contained extended or unlimited survival periods for at least some representations and warranties. The most common extended representations are with respect to organization, authorization, and taxes (appearing in 90%, 92%, and 70% of transactions, respectively).&lt;/p&gt;
&lt;h3&gt;Key Considerations for Indemnification Provisions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When negotiating an indemnification provision, it is important to keep in mind that indemnification is designed to allocate risks between parties to a transaction. Therefore, it is essential to have a full understanding of the risks inherent in the assets or business being purchased in the transaction, whether you are representing the seller or the acquirer. Counsel should also weigh the potential magnitude of the risks to be indemnified versus the economics of the transaction, so that the scope of its client&amp;rsquo;s indemnification obligations is appropriate to the benefits to be conferred upon the parties in the deal. Typically, indemnification in M&amp;amp;A agreements covers losses resulting from breaches of representations and warranties and breaches of covenants. Depending on the nature of the assets or business being acquired, the parties may also agree to indemnification obligations for losses resulting from deal-specific liabilities. The purchase agreement should specify whether thirdparty claims are covered under the indemnification.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Parties&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As counsel, you should ensure that the right parties are subject to, and beneficiaries of, indemnification obligations. In an asset purchase transaction, the seller and acquirer typically indemnify each other for losses arising from the agreement. Each party may also add their directors, officers, employees, and other affiliates and subsidiaries as indemnified parties. The circumstances of the transaction may dictate that parties other than the seller and acquirer provide indemnification. For example, if the seller will liquidate and dissolve after the asset purchase, the acquirer may require the seller&amp;rsquo;s shareholders or other affiliated parties to provide indemnification for losses that might arise post-closing. In this circumstance, the seller will want to limit the number of parties obligated to indemnify the acquirer as well as the scope of the indemnification and the maximum potential liability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Limits on Indemnification&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As discussed above, indemnification provisions often include baskets, deductibles, and caps to limit the overall amount for which the indemnifying party will be held liable. Survival periods also limit a party&amp;rsquo;s indemnification obligation by setting a time limit on when claims may be brought. Counsel should negotiate these limits with an understanding of the potential liabilities associated with the assets or business being purchased and the economic realities of the transaction for the seller and acquirer. With respect to survival periods, the length of time can vary depending on the nature of the claim. For example, claims arising out of contract breaches can have a shorter survival period than environmental liabilities, which may not manifest for many years. Counsel should also take into account the statutes of limitations for various types of claims when determining the appropriate length of indemnification obligations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Procedures and Dispute Resolution&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The purchase agreement should set forth the procedures for asserting an indemnification claim. If part of the purchase price will be set aside in escrow, the purchase agreement should specify whether the escrow covers indemnification claims. If so, the agreement should include procedures for satisfying indemnified claims out of the escrow account (or refer to the escrow agreement for such procedures). The purchase agreement should also include provisions for resolving disputes relating to indemnification&amp;mdash; whether such disputes will be resolved through litigation or alternative dispute resolution.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path:&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5MDY-CHF1-JNY7-X13H-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5MDY-CHF1-JNY7-X13H-00000-00&amp;amp;pdcontentcomponentid=101241&amp;amp;pdteaserkey=sr1&amp;amp;ecomp=y21g&amp;amp;earg=sr1" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Private Asset Acquisitions &amp;gt; Asset Purchase Agreement &amp;gt; Articles &amp;gt; Indemnification &amp;gt; Market Trends: Indemnification in Asset Purchase Transactions&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1" style="width:100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on indemnification provisions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/be15ebb5-3886-4645-9374-e8f701c239b2/?context=1000522" target="_blank"&gt;&amp;gt; INDEMNIFICATION PROVISIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/ae659994-870b-47a2-afe2-c4cd322b1a57/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; M&amp;amp;AProvisions &amp;gt; Indemnification &amp;gt; Practice Notes &amp;gt;Indemnification&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For examples of indemnification provisions, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a12dba9b-e2e1-4675-8157-faac9278f0d7/?context=1000522" target="_blank"&gt;&amp;gt; INDEMNIFICATION PROVISION&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9e248246-4f0d-476d-a3d2-f3d043842e95/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; M&amp;amp;A Provisions &amp;gt; Indemnification &amp;gt; Forms &amp;gt;Indemnification Provision&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance in drafting an agreement for the purchase of the assets of a private company, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/7b144d6d-1743-4e30-88d3-23e8c3447ba0/?context=1000522" target="_blank"&gt;&amp;gt; ASSET PURCHASE AGREEMENT (PRO-SELLER)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/cf021c40-5050-447b-b460-ba710afc8a9f/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Acquisition Agreements &amp;gt; Asset Purchase Agreement &amp;gt; Forms &amp;gt;Asset Purchase Agreement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For assistance in creating a similar agreement for the purchase of the assets of a private company, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/c20266d2-f8b4-4856-96a1-d092634b91d8/?context=1000522" target="_blank"&gt;&amp;gt; ASSET PURCHASE AGREEMENT (PRO-BUYER)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/cf021c40-5050-447b-b460-ba710afc8a9f/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Acquisition Agreements &amp;gt; Asset Purchase Agreement &amp;gt; Forms &amp;gt;Asset Purchase Agreement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a detailed sample of an agreement for the purchase of a division of a company, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/715b65d9-d543-471f-a77a-05f73f571977/?context=1000522" target="_blank"&gt;&amp;gt; ASSET PURCHASE AGREEMENT (PURCHASE OF ASSETS OF DIVISION)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a6b9064a-bbf7-47b8-8bf2-56d966914f16/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt;Divestitures of Divisions and Subsidiaries &amp;gt; Sales of Divisions and Subsidiaries &amp;gt; Forms &amp;gt; The Purchase Agreement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For assistance in drafting an agreement for the acquisition of all of the outstanding shares of a private company, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/dd534598-c85b-4b36-adaf-da7ae73bbb12/?context=1000522" target="_blank"&gt;&amp;gt; STOCK PURCHASE AGREEMENT (PRO-SELLER)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/298c7761-3ba8-4fde-a5cf-928c67718832/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Acquisition Agreements &amp;gt; Stock Purchase Agreement &amp;gt; Forms &amp;gt;Stock Purchase Agreement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidance in drafting a similar agreement for the acquisition of all of the outstanding shares of a private company, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a3e2ed28-5361-46cf-918d-6c7dfc5ccb77/?context=1000522" target="_blank"&gt;&amp;gt; STOCK PURCHASE AGREEMENT (PRO-BUYER)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/298c7761-3ba8-4fde-a5cf-928c67718832/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; Acquisition Agreements &amp;gt; Stock Purchase Agreement &amp;gt; Forms &amp;gt;Stock Purchase Agreement&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information about ADR and its potential benefits and drawbacks, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/f01fd9f0-b670-4252-96aa-e15d8771882b/?context=1000522" target="_blank"&gt;&amp;gt; ARBITRATION PROVISIONS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/27820ed1-50fc-43a9-a88b-3cc679ff4aea/?context=1000522" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; M&amp;amp;A Provisions &amp;gt; Practice Notes &amp;gt; Arbitration&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;small&gt;*The analyses in this article were generated by Lexis&lt;sup&gt;&amp;reg;&lt;/sup&gt; Market Tracker, &lt;a href="https://lexismarkettracker.lexisnexis.com/"&gt;https://lexismarkettracker.lexisnexis.com/&lt;/a&gt;, which is a transactional search tool that enables users to find and compare M&amp;amp;A transactions across hundreds of deal points. The Lexis&lt;sup&gt;&amp;reg;&lt;/sup&gt; Market Tracker database is populated by filings from EDGAR and includes asset acquisitions valued at $100 million and up. Accordingly, transactions not filed on EDGAR and transactions valued at under $100 million are excluded from this analysis.&lt;/small&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Attorney Cloud Computing for Technology Clients: A Patent and Trade Secret Perspective</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=a8090b81-f19c-43af-b5ce-d20c5e766b0a</link><pubDate>Tue, 08 Nov 2016 14:59:01 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:a8090b81-f19c-43af-b5ce-d20c5e766b0a</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;&lt;a href="/lexis-practice-advisor/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ16_2D00_IP_5F00_PracticeNotes_5F00_LI_5F00_16.png"&gt;&lt;img src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/LPAJ16_2D00_IP_5F00_PracticeNotes_5F00_LI_5F00_16.png" border="0" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;By: &lt;strong&gt;Eric M. Dobrusin, Kristen L. Pursley, and Daniel P. Aleksynas&lt;/strong&gt;, The Dobrusin Law Firm.&lt;/p&gt;
&lt;p&gt;A broad range of attorneys represent technology companies in some capacity, and therefore, potentially handle and store sensitive information related to patents or trade secrets.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;FOR EXAMPLE, YOU MAY BE A PRODUCT LIABILITY&lt;/strong&gt; attorney engaged in discovery about product redesign by a client. You may be a mergers and acquisition attorney conducting due diligence concerning assets of a technology company. You may be a corporate counsel engaged in drafting warranties for a product or a technology offered for sale by a client. You may be an environmental attorney seeking permits for a manufacturing plant. You may be a banking attorney negotiating a security agreement in technology of a client. For all of the above, and for attorneys in other disciplines as well, the likelihood that you will encounter issues involving confidential technical information affecting trade secrets or patent rights of a client continues to increase. Additionally, it is likely that you will be faced with handling sensitive privileged information affecting the enforcement of patent or trade secret rights. This article provides insights for counsel, such as those listed above, who represent technology companies and whose firms plan to migrate to the cloud.&lt;sup&gt;1&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The list of ethical considerations you and your firm will face as you transition your practice to cloud computing continues to grow. The manner in which you handle client technical information and privileged information in the cloud may affect your clients&amp;rsquo; patent and trade secret rights. In this era of cloud computing infancy, various ethics governing bodies have stepped in to urge caution in the handling of sensitive client information.&lt;/p&gt;
&lt;p&gt;Cloud computing, often referred to as simply the cloud, is Internetbased computing in which large groups of remote servers are networked to allow sharing of data-processing tasks, centralized data storage, and online access to computer services or resources.&lt;sup&gt;2&lt;/sup&gt; Traditional data storage means involved the use of on-site servers. In using traditional storage methods, the location of data is always certain. Use of the cloud, however, means that the exact location of data is never certain.&lt;/p&gt;
&lt;p&gt;This article looks at the trend toward cloud computing from the eyes of attorneys who represent technology clients in patent and trade secret matters. This article further hopes to provide guidance to those involved in commercial litigation and corporate practice by identifying where cloud-based data storage could present risks to sensitive trade secret and patent-related information that may be encountered during litigation or corporate work. Attorneys practicing in all disciplines are likely to encounter and be expected to handle various aspects of client confidential technical information in the course of rendering legal advice. It therefore may be prudent for any attorney representing clients in the technology sector to be aware of the issues that could arise when dealing with client technical information involving trade secret, patent, or attorney-client privilege considerations.&lt;/p&gt;
&lt;p&gt;As a practical matter, precautions taken to protect against a data breach generally will likely not impact the patent and trade secret rights of your clients, especially if steps are taken to make clients aware of how and where their data is being stored. Plus, there are a number of provisions in the law to help mitigate consequences of a data breach. However, in the intellectual property field of practice, it can be argued that a sea change has occurred in the law, with the America Invents Act and a patent-active Supreme Court.&lt;sup&gt;3&lt;/sup&gt; As a result, there may be some uncertainty for technology companies based upon the new &amp;ldquo;first to file&amp;rdquo; provisions of the America Invents Act, among others. Thus, as attorneys move to the cloud, it may be worth keeping these patent and trade secret considerations in mind.&lt;sup&gt;4&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Cloud computing has some potential pitfalls, but the pitfalls are analogous to those historically faced by counsel before the advent of the cloud. This article addresses:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ethical obligations that may impact your practice via the cloud&lt;/li&gt;
&lt;li&gt;Certain patent and trade secret considerations related to attorney client privilege, and the potential for loss of rights resulting from client confidentiality breaches in the cloud&lt;/li&gt;
&lt;li&gt;Assistance in identifying potential cross-border implications of cloud computing in regard to technology export laws&lt;/li&gt;
&lt;li&gt;Guidance for structuring your practices to mitigate potential issues in the coming generation of cloud computing law practice&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;The Ethics&lt;/h3&gt;
&lt;p&gt;Legions of articles have been written about the ethical obligations of attorneys who utilize cloud-based data storage. In general, the focal point of the analysis has centered on American Bar Association (ABA) Model Rule 1.1 which states: &amp;ldquo;A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.&amp;rdquo; Particular attention has been paid to Comment 8, which requires attorneys &amp;ldquo;[t]o maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Even more prevalent of late has been Model Rule 1.6 (c), stating that &amp;ldquo;[a] lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Since the advent of the computer age, the ethics governing bodies have been relatively liberal in conforming ethical obligations with changing technologies. For example, the ABA in 1999 (Formal Opinion No. 99-413) paved the way for attorneys to utilize e-mail correspondence while still maintaining compliance with ethical obligations. As with e-mail, the initial response of the ethics governing bodies is that there should be no bar forbidding cloud computing.&lt;sup&gt;5&lt;/sup&gt; Rather, opinions so far have been permissive, while expressing an expectation that attorneys approach the issue with a certain amount of prudence, by using &amp;ldquo;reasonable precautions&amp;rdquo;. Additional discussion on these reasonable precautions can be found in the Survey of Ethical Considerations set forth below.&lt;/p&gt;
&lt;h3&gt;Attorney-Client Privilege Considerations&lt;/h3&gt;
&lt;p&gt;As with the representation of any client, a data breach resulting from storage of privileged subject matter in the cloud may invite possible consequences affecting the attorney client privilege for technology clients.&lt;sup&gt;6&lt;/sup&gt; For such technology clients, at least in the patent area, the attorney-client privilege has historically served a unique role.&lt;/p&gt;
&lt;p&gt;Section 284 of the Patent Act&lt;sup&gt;7&lt;/sup&gt; authorizes a U.S. District Court to award up to treble damages for certain patent infringement undertaken willfully. From the advent of the Court of Appeals for the Federal Circuit, it has been a common practice for an accused infringer to rely upon an advice of counsel defense to avoid the increased damages.&lt;sup&gt;8&lt;/sup&gt; This practice has evolved and moderated over the years, to a point where a party need not have secured an opinion of counsel to obviate the risk of increased damages.&lt;sup&gt;9&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;However, if a party relies upon advice of counsel, then the party must waive the privilege as to all communications surrounding the advice.&lt;sup&gt;10&lt;/sup&gt; In some instances, the risk of such waiver may be unpalatable to a party. For instance, the waiver may be sufficiently broad that it would disclose positions against the interest of a party or the proverbial smoking gun. Thus, a party may rely upon other factors to defend against a claim of increased damages.&lt;/p&gt;
&lt;p&gt;It has become the law that no adverse inference can be drawn if a party is unwilling to waive the privilege and rely upon an advice of counsel defense.&lt;sup&gt;11&lt;/sup&gt; Though it is not mandated that clients obtain advice of counsel to avoid a risk of increased damages,&lt;sup&gt;12&lt;/sup&gt; many clients still observe this as a preferred practice and may depend upon preservation of confidentiality of counsel&amp;rsquo;s communications regarding his or her opinion. That is, though a client may invariably waive privilege in any event, many clients likely have a desire to choose if and when they will invoke the waiver.&lt;sup&gt;13&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;In addition to the above, the behavior of a party to patent litigation (patent owner or accused infringer) has become and will continue to grow as a focal point based upon recent Supreme Court decisions.&lt;sup&gt;14&lt;/sup&gt; In these cases, the Court liberalized the standards for fee shifting. Litigation conduct of a party is a relevant factor. Proofs regarding that conduct might require discovery of litigation strategies and other privileged communications stored by litigation counsel in the cloud.&lt;/p&gt;
&lt;p&gt;From the above, some of the primary concerns that law firms may have pertain to the security of the privileged matter in the cloud and the potential for breaches. Additionally, law firms may want to consider the long term viability of its cloud service provider. The need for access to privileged matter and the full scope of potentially waived privileged information may not arise for many years after the communications are created and transmitted to the cloud (many patent risks may last for the duration of a patent&amp;mdash;in many instances, 20 or more years). It may be important to ensure that the service provider will remain in business or that future access to the information is otherwise assured.&lt;/p&gt;
&lt;h3&gt;Confidential Technical Information&lt;/h3&gt;
&lt;p&gt;Another consideration that may arise when representing technology clients is the relative frequency with which confidential technical information is shared between client and attorney. Such information may be contained in any of a number of electronic documents (whether in draft form or final form) that clients share with counsel, and the relative sensitivity of the documents may not be immediately apparent to client or counsel. It is quite possible that the legal advice sought may not even be related to patenting. Indeed, as mentioned in the introduction, these documents may enter the cloud files of counsel in the course of drafting routine non-patent business filings. However, they may also be relate to shareholder reports, documents produced during discovery of a non-patent commercial litigation, environmental permits, land use considerations in real estate transactions, employee safety, product liability, regulatory approvals, securities, or other matters. The confidential technical information may be embodied in strategic plans, competitive analyses, test reports, intellectual property committee meeting minutes, formula sheets, process control sheets, and even more ordinary documents like invoices, shippers, and the like.&lt;/p&gt;
&lt;p&gt;A relatively well-known consideration affecting protection of intellectual property of technology clients depends upon the transition of technical information from a confidential state to a publicly available state. Under the Uniform Trade Secrets Act, adopted in most states, a trade secret is defined as:&lt;/p&gt;
&lt;p&gt;(4) &amp;ldquo;Trade secret&amp;rdquo; means information, including a formula, pattern, compilation, program, device, method, technique, or process, that:&lt;/p&gt;
&lt;p&gt;(i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and&lt;/p&gt;
&lt;p&gt;(ii) &lt;strong&gt;is the subject of efforts that are reasonable under the circumstances to maintain its secrecy&lt;/strong&gt;.&lt;sup&gt;15&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Similar language is employed in the newly adopted Defend Trade Secrets Act.&lt;sup&gt;16&lt;/sup&gt; As is apparent, upon losing its secrecy, a trade secret may cease to exist.&lt;sup&gt;17&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Under patent law, in the United States and elsewhere around the world, a party may lose the right to patent upon public disclosure of technical information. Section 102(a) of the United States Patent Act states:&lt;/p&gt;
&lt;p&gt;(a) &lt;strong&gt;Novelty; Prior Art&lt;/strong&gt;.&amp;mdash;A person shall be entitled to a patent unless&amp;mdash;&lt;/p&gt;
&lt;p&gt;(1) the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.&lt;sup&gt;18&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;As can be appreciated, a breach of security that results in public accessibility to confidential technical information can thus be seen as a risk with potential to jeopardize both trade secret and patent rights.&lt;sup&gt;19&lt;/sup&gt; Note that &amp;ldquo;public&amp;rdquo; is arguably broad enough to encompass any third party.&lt;sup&gt;20&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;Data Subject to Export Laws&lt;/h3&gt;
&lt;p&gt;Yet another consideration that might arise when representing a technology client relates to a law firm receiving data that is the subject of restrictions against export without an export license. Perhaps the two most prominent sources of restrictions of concern for U.S. firms arise from the International Traffic in Arms Regulations (ITAR)&lt;sup&gt;21&lt;/sup&gt; and the Export Administration Regulations (EAR).&lt;sup&gt;22&lt;/sup&gt; Also of potential relevance may be the restriction against filing abroad certain patent applications for U.S. inventions before obtaining a foreign filing license.&lt;sup&gt;23&lt;/sup&gt; To illustrate, the definition of technical data under ITAR is broad:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&amp;sect;120.10 Technical data.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;(a) Technical data means, for purposes of this subchapter:&lt;/p&gt;
&lt;p&gt;(1) Information, other than software as defined in &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5FM3-3F40-008G-Y0FY-00000-00?context=1000516" target="_blank"&gt;&amp;sect;120.10(a)(4)&lt;/a&gt;, which is required for the design, development, production, manufacture, assembly, operation, repair, testing, maintenance or modification of defense articles. This includes information in the form of blueprints, drawings, photographs, plans, instructions or documentation.&lt;/p&gt;
&lt;p&gt;(4) Software (&lt;a href="https://advance.lexis.com/api/permalink/8b5d68ca-f928-40ac-8944-fc7067f56f82/?context=1000516" target="_blank"&gt;see &amp;sect;120.45(f))&lt;/a&gt; directly related to defense articles.&lt;/p&gt;
&lt;p&gt;In the most general sense, the U.S. technology and data export restrictions are structured to prevent dissemination of the restricted subject matter to foreign countries, as well as to foreign citizens, even those within the United States.&lt;sup&gt;24&lt;/sup&gt; In recognition of the growing trend of cloud computing,&lt;sup&gt;25&lt;/sup&gt; on June 3, 2016, updated rules for the EAR were published (effective September 1, 2016) with an eye towards &amp;ldquo;update[ing] and clarify[ing] application of controls to electronically transmitted and stored technology and software, including by way of cloud computing.&amp;rdquo; That same date, amended ITAR rules were also published.&lt;sup&gt;26&lt;/sup&gt; Among amendments in those rules was an amendment to &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K03-HT00-008G-Y1BB-00000-00?context=1000516" target="_blank"&gt;22 C.F.R. &amp;sect; 125.4(b)(9)(ii)&lt;/a&gt;, in which security precautions are mandated to prevent unauthorized release of exported, re-exported, or retransferred technical data. The amended provision states:&lt;/p&gt;
&lt;p&gt;Such security precautions may include encryption of the technical data; the use of secure network connections, such as virtual private networks; the use of passwords or other access restrictions on the electronic device or media on which the technical data is stored; and the use of firewalls and other network security measures to prevent unauthorized access.&lt;/p&gt;
&lt;p&gt;As can be seen, law firms that represent technology clients may encounter technology or technical data subject to export restrictions. To the extent such firms engage in cloud computing, they may have obligations to assure that any cloud computing servers employed are located within the United States, are secure from access by foreign persons, and employ one or more access restrictions (e.g., encryption, passwords, firewalls, etc.).&lt;/p&gt;
&lt;h3&gt;Survey of Ethical Considerations from Various Jurisdictions&lt;/h3&gt;
&lt;p&gt;As discussed above, as more and more law firms move from storing data on servers that are located within the law firm to storing data in the cloud, ethics committees around the country have rendered opinions and have provided attorneys with recommendations. Provided below are a few such illustrative recommendations. While there are a plethora of differing suggestions, as will be seen, the general themes and requirements so far tend to be fairly consistent. The following table provides some of the factors attorneys may want to consider when choosing a vendor and implementing their cloud computing. As will be seen, so much of whether counsel is in compliance will depend upon reasonableness.&lt;sup&gt;27&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Given the potential pitfalls identified above and the guidelines that have been enumerated by ethics governing bodies, there are a few steps that an attorney or law firm may take in an effort to more safely navigate the storage options for client information:&lt;/p&gt;
&lt;h3&gt;Safeguards to Consider&lt;/h3&gt;
&lt;p&gt;1. As seen from the discussion on attorney-client privilege, at least in the context of patent situations, the consequences of an unintended disclosure potentially may be obviated, or there may be no consequence at all if the privilege is to be waived. However, to preserve the choice of if or when to waive for the client, opinions of counsel can be stored in a segregated location within the cloud or even in a local storage location that is not shared with other client information and possibly in a location not accessible via the Internet. For some situations, such opinions may also be the subject of additional precautions (e.g., password protection of a file, encrypted email communication, or otherwise).&lt;/p&gt;
&lt;p&gt;2. It may prove valuable to investigate the ability to retrieve documents from the cloud at a subsequent date. As attorneys of technology clients are no doubt aware, many years may pass before a client document must be accessed. In the patent and trade secret context, needs for accessing data may not arise until many years after an opinion is rendered. It is therefore important to know where your data will be if your service provider ceases to exist.&lt;/p&gt;
&lt;p&gt;3. It may be worth exploring with a provider the identity of the provider&amp;rsquo;s employees to which your data may be exposed. It may be important to ensure they are U.S. citizens for technology export purposes. It may also help assure you that the provider is sensitive about its customers&amp;rsquo; security concerns and that the provider will take measures to prevent a rogue employee from accessing and disseminating data.&lt;/p&gt;
&lt;p&gt;4. It may prove helpful to communicate with technology clients about the sensitivity of the client&amp;rsquo;s data and remind the client to be proactive to inform you when sensitive technical information is to be provided. Affording the client an active role to participate in the decisions regarding the destiny of the data may allow you to identify opportunities for clients to select alternative storage if they have concerns.&lt;/p&gt;
&lt;p&gt;5. It is possible that your data storage service provider contracts with additional facilities for space. It may be useful to understand what obligations (if any) these facilities have for maintaining the security of your client data.&lt;/p&gt;
&lt;p&gt;6. It may be worth exploring if data storage providers include any contract language that claims ownership of some or all data stored on its servers or access to such data (such as for analytics use).&lt;/p&gt;
&lt;p&gt;7. It may be worth exploring the possible ongoing maintenance of on premises data storage, which may have only limited or no access to the Internet, or the possibility of local storage of a backup of your cloud-based files. The move to cloud computing does not necessarily mean that attorneys must immediately abandon local storage media.&lt;/p&gt;
&lt;h3&gt;Conclusions&lt;/h3&gt;
&lt;p&gt;As the article describes, in the course of migrating to cloud computing, attorneys who represent technology clients may encounter conventional concerns for data security, as well as some potential concerns unique to patents and trade secrets of the technology clients. Notwithstanding the concerns, the way is being paved for these attorneys to employ cloud computing. After all, many such concerns also existed before the computer age, but were deemed acceptable risks (e.g., it was a standard practice to use conventional postal services for many communications and store documents in third party off-site facilities). Ethics opinions of various governing bodies have supported cloud computing for attorney use when reasonable precautions are employed. In the context of representing technology clients, additional sensitivity to issues of attorney-client privilege and the consequences of public dissemination of confidential technical information may encourage these attorneys to adopt appropriate safeguards for that information. Though a data breach remains a relatively low frequency occurrence (e.g., as compared with instances of conventional viruses and malware), exercise of at least some of the reasonable precautions identified in this article will hopefully mitigate the potential severity of a breach.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Eric M. Dobrusin , Kristen L. Pursley&lt;/strong&gt;, and &lt;strong&gt;Daniel P. Aleksynas&lt;/strong&gt; are shareholders in The Dobrusin Law Firm, PC, Pontiac, Michigan, where they concentrate their practice in Intellectual Property Law. They are coauthors of &lt;strong&gt;Intellectual Property Culture: Strategy and Compliance&lt;/strong&gt; (Matthew Bender 2015 Ed.). Bryan Lemanski provided research and support for this article.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5M19-J391-JB7K-244N-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5M19-J391-JB7K-244N-00000-00&amp;amp;pdcontentcomponentid=126164&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=3h7g&amp;amp;earg=sr0" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology&amp;gt; Software Information Technology &amp;gt; Cloud Computing &amp;gt;Articles &amp;gt; Cloud Computing in General&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1" style="width:100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an examination of cloud computing arrangements, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a18a6754-8976-4e86-bad3-ddf88bb35adb/?context=1000522" target="_blank"&gt;&amp;gt; INITIAL CONSIDERATIONS IN CLOUD COMPUTING AGREEMENTS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/3fcf0331-5a91-42cd-aa49-aecd2e0c9fd6/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; Software &amp;amp; Information Technology &amp;gt; Cloud Computing &amp;gt; Practice Notes &amp;gt; Cloud Computing&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For information on securely protecting data when working with cloud computing vendors, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/4514626a-11dd-4f60-aace-e6c6a791ae66/?context=1000522" target="_blank"&gt;&amp;gt; DRAFTING AND NEGOTIATING EFFECTIVE CLOUDCOMPUTING AGREEMENTS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/3fcf0331-5a91-42cd-aa49-aecd2e0c9fd6/?context=1000522" target="new"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; Software &amp;amp; Information Technology &amp;gt; Cloud Computing &amp;gt; Practice Notes &amp;gt; Cloud Computing&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an explanation on the fundamentals of patent law, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/8d7cca78-6b30-46c4-bc41-b921668a0065/?context=1000522" target="_blank"&gt;&amp;gt; PATENT FUNDAMENTALS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/88706b57-d71f-4498-87da-719c87641ab6/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; Types of IP Protection &amp;gt; Patent Basics &amp;gt; Practice Notes &amp;gt; Patent Basics&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For an overview on trade secrets, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/98cadfe5-3cdf-458f-ab07-47be136c67af/?context=1000522" target="_blank"&gt;&amp;gt; TRADE SECRET FUNDAMENTALS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d9666097-6fab-47c9-a431-082947d120b1/?context=1000522" target="_blank"&gt;RESEARCH PATH: Intellectual Property &amp;amp; Technology &amp;gt; Types of IP Protection &amp;gt; Trade Secret Basics &amp;gt; Practice Notes &amp;gt; Trade Secret Basics&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;small&gt;&lt;strong&gt;1. &lt;/strong&gt;For purposes of this article, technology clients include any client that engages in manufacturing, research and development, new product development, or any other technology related practice. &lt;strong&gt;2. &lt;/strong&gt;http://www.dictionary.com/browse/cloud--computing (accessed August 3, 2016). &lt;strong&gt;3. &lt;/strong&gt;Further, with Inter Partes Reviews and Post Grant Reviews on the rise, it is possible that a Petitioner may argue &amp;ldquo;public use&amp;rdquo; or &amp;ldquo;publication&amp;rdquo; on the basis of a data breach. &lt;strong&gt;4. &lt;/strong&gt;In July 2016, Consero Group published an article entitled &amp;ldquo;Global IP Management Data Survey Facts &amp;amp; Analysis&amp;rdquo; in which in-house Chief IP counsel from fortune 1000 corporations were polled. On page 8, the article discusses cybersecurity and threats to intellectual property where &amp;ldquo;two-thirds of respondents do not believe their company is protected from cybersecurity threats to its intellectual property.&amp;rdquo; &lt;strong&gt;5. &lt;/strong&gt;Technology is a constantly evolving ball of clay such that the standards of yesterday may have changed today and the standards of today may change tomorrow, but periodically lawyers should look at their systems and the standards to keep up with the changes in technology. &lt;strong&gt;6. &lt;/strong&gt;Generally, technology clients are sophisticated and may have confidentiality requirements imposed on them (e.g., a defense contractor), and these clients may independently request a level of security on their data. However, lawyers may consider consulting these clients with regards to their data so that the client retains some responsibility for the storage of their information. &lt;strong&gt;7. &lt;/strong&gt;35 U.S.C. &amp;sect; 284. &lt;strong&gt;8. &lt;/strong&gt;Underwater Devices Inc. v. Morrison-Knudsen Co., Inc., 717 F.2d 1380 (Fed. Cir. 1983). &lt;strong&gt;9. &lt;/strong&gt;35 U.S.C. &amp;sect; 298 (&amp;ldquo;The failure of an infringer to obtain the advice of counsel with respect to any allegedly infringed patent, or the failure of the infringer to present such advice to the court or jury, may not be used to prove that the accused infringer willfully infringed the patent or that the infringer intended to induce infringement of the patent.&amp;rdquo;). &lt;strong&gt;10. &lt;/strong&gt;In re Echo Star Commc&amp;rsquo;ns Corp., 448 F.3d 1294, 1299 (Fed. Cir. 2006). &lt;strong&gt;11. &lt;/strong&gt;See 35 U.S.C. &amp;sect; 298 and Knorr-Bremse Systeme Fuer Nutzfahrzeuge GMBH v. Dana Corp., 383 F.3d 1337, 1344&amp;ndash;45 (Fed. Cir. 2004). &lt;strong&gt;12. &lt;/strong&gt;Most recently, the Supreme Court has sought to clarify the standards upon which a District Court may make a determination of increased damages. In the case of &lt;em&gt;Halo Electronics v. Pulse Electronics, Inc., &lt;/em&gt;the Court held that &amp;ldquo;[district] courts should continue to take into account the particular circumstances of each case in deciding whether to award damages and, in what amount,&amp;rdquo; and that &amp;ldquo;such punishment should generally be reserved for egregious cases typified by willful misconduct.&amp;rdquo; Halo Elecs. v. Pulse Elecs., Inc., 136 S. Ct. 1923, 1933&amp;ndash;43 (2016). &lt;strong&gt;13. &lt;/strong&gt;Depending upon the circumstances, ethical obligations may dictate mitigation of potential consequences when adverse counsel receives privileged information resulting from a data breach. American Bar Association Model Rule 4.4(b) states: &amp;ldquo;(b) A lawyer who receives a document or electronically stored information relating to the representation of the lawyer&amp;rsquo;s client and knows or reasonably should know that the document or electronically stored information was inadvertently sent shall promptly notify the sender.&amp;rdquo; &lt;strong&gt;14. &lt;/strong&gt;Highmark Inc. v. Allcare Health Mgmt. Sys., Inc., 134 S. Ct. 1744 (2014) and Octane Fitness, LLC v. ICON Health &amp;amp; Fitness, Inc., 134 S. Ct. 1749 (2014). &lt;strong&gt;15. &lt;/strong&gt;Uniform Trade Secrets Act with 1985 Amendments (emphasis added). &lt;strong&gt;16. &lt;/strong&gt;Under the Defend Trade Secrets Act of 2016, &amp;ldquo;the term &amp;lsquo;trade secret&amp;rsquo; means all forms and types of financial business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if the owner thereof has taken reasonable measured to keep such information secret&amp;rdquo;. 18 U.S.C. &amp;sect; 1839(3)(A). &lt;strong&gt;17. &lt;/strong&gt;Once a trade secret has been publicly disclosed, a quarantine that restricts its further dissemination and use may be possible, particularly with the aid of a court and injunctive relief. However, such a process can be difficult, require expensive resources, and take valuable time during which the risk of further dissemination may remain. &lt;strong&gt;18. &lt;/strong&gt;35 U.S.C. &amp;sect; 102(a)(1). &lt;strong&gt;19. &lt;/strong&gt;The patent rights, in the event of a breach, may be salvageable under 35 U.S.C. &amp;sect; 102(B)(1). &lt;strong&gt;20. &lt;/strong&gt;It is possible that, even in the event of a breach causing an item to no longer be confidential, the item can be isolated and dissemination curtailed before it becomes a &amp;ldquo;public use&amp;rdquo; or &amp;ldquo;printed publication&amp;rdquo; that is sufficiently publicly accessible to jeopardize patent rights. &lt;em&gt;See generally, &lt;/em&gt;SRI International Inc. v. Internet Security Systems Inc., 511 F.3d 1186 (Fed. Cir. 2008). &lt;strong&gt;21. &lt;/strong&gt;22 C.F.R. &amp;sect; 120 et seq. &lt;strong&gt;22. &lt;/strong&gt;15 C.F.R. &amp;sect; 730 et seq. Note: &amp;sect; 734.10 excludes certain patent information from EAR. &lt;strong&gt;23. &lt;/strong&gt;&lt;em&gt;See generally, &lt;/em&gt;35 U.S.C. &amp;sect; 181 et seq. &lt;strong&gt;24. &lt;/strong&gt;&lt;em&gt;See &lt;/em&gt;United States v. Lachman, 387 F.3d 42, 44 (1st Cir. 2004). The EAA is designed &amp;lsquo;to restrict the export of goods and technology which would make a significant contribution to the military potential of any other country&amp;hellip;[and] which would prove detrimental to the national security of the United States.&amp;rdquo; &lt;strong&gt;25. &lt;/strong&gt;81 Fed. Reg. 107 at 35586. &lt;strong&gt;26. &lt;/strong&gt;81 Fed. Reg. 107 at 35611. &lt;strong&gt;27. &lt;/strong&gt;Because the technology remains very new, and there are relatively few precedential scenarios to guide conduct, it is simply not possible at present to define a standard with any certainty. The accompanying summary, therefore, must be regarded as merely a compilation without expressing any opinion as to the applicability of the consideration to a particular fact scenario at hand.&lt;/small&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>EEOC&amp;#39;S Final Rules on Wellness Programs</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=42b397dd-9401-463b-b2b1-93c7f3e3293f</link><pubDate>Fri, 02 Sep 2016 16:05:51 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:42b397dd-9401-463b-b2b1-93c7f3e3293f</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/contributing-authors.page#jonathan-r-mook" target="_blank"&gt;Jonathan R. Mook&lt;/a&gt;, DiMuroGinsberg, P.C.&lt;/p&gt;
&lt;p&gt;Given concerns over rising health care costs and missed workdays by employees suffering from various illnesses, many employers have implemented employee wellness programs and activities to promote healthier lifestyles or to prevent disease with the expectation that such programs will reduce healthcare costs.&lt;sup&gt;1&lt;/sup&gt; However, these programs must be appropriately designed so as not to run afoul of existing anti-discrimination laws, including laws prohibiting discrimination based on disability or genetic information, among others.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;ON MAY 16, 2016, THE U.S. EQUAL EMPLOYMENT&lt;/strong&gt; Opportunity Commission (EEOC) took a big step forward by providing guidance on how wellness programs should be fashioned to comply with the requirements of the Americans with Disabilities Act (ADA) and the Genetic Information Nondiscrimination Act (GINA) by issuing Final Rules on the application of both laws to employer wellness programs.&lt;sup&gt;2&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;ADA Final Rule&lt;/h3&gt;
&lt;p&gt;The ADA contains a number of exceptions to its general rule prohibiting employers from making disability-related inquiries or requiring medical examinations. One of the exceptions applies to certain voluntary wellness programs.&lt;sup&gt;3&lt;/sup&gt; The ADA Final Rule makes it clear that medical inquiries or medical examinations as part of an employee health or wellness program are allowed under the ADA as long as the inquiries and examinations are conducted in connection with an &amp;ldquo;employee health program&amp;rdquo; (as defined below) and are truly voluntary, and the information obtained is used only for purposes of the program and satisfies confidentiality requirements.&lt;sup&gt;4&lt;/sup&gt; While employees may not be required to participate in an employer&amp;rsquo;s wellness program, the ADA Final Rule allows a company to offer incentives to encourage employees to participate. However, the incentives must be consistent with the nondiscrimination provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended by the Affordable Care Act (ACA),&lt;sup&gt;5&lt;/sup&gt; which generally limits incentives to 30% of the total cost of employeeonly coverage.&lt;sup&gt;6&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The ADA Final Rule specifically revises Section 1630.14 of its regulations&lt;sup&gt;7&lt;/sup&gt; in the following manner to address when and how medical examinations and inquiries are permitted in the context of an employee health or wellness program.&lt;/p&gt;
&lt;h3&gt;Definition of Employee Health Program&lt;/h3&gt;
&lt;p&gt;The EEOC, for the first time, defines what constitutes an employee health program that may rely on the wellness program exception to the ADA&amp;rsquo;s prohibition on requiring medical examinations and making health-related inquiries: it is a program &amp;ldquo;reasonably designed to promote health or prevent disease.&amp;rdquo; Under the regulations, a program will satisfy this standard if the program (1) has a reasonable chance of improving the health of, or preventing disease in, participating employees; (2) is not overly burdensome nor a subterfuge for violating the law; and (3) is not highly suspect in the method chosen to promote health or prevent disease.&lt;sup&gt;8&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;According to the EEOC, this definition is satisfied if an employer institutes a program to conduct a health risk assessment or biometric screening of employees for the purpose of alerting them to health risks of which they may not be aware. An employer&amp;rsquo;s use of aggregate information from employees&amp;rsquo; health risk assessments to design and offer health programs aimed at specific conditions that are prevalent in the workforce will also pass regulatory muster. On the other hand, the EEOC explains that if an employer collects medical information on a health questionnaire without providing employees any follow-up programs, information, or advice, this activity will not satisfy the definition of an employee health program and will not be eligible for the wellness program exception to the ADA rules.&lt;sup&gt;9&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Also excluded from the definition are programs designed mainly to shift costs from the employer to targeted employees based on their health and programs where an employer imposes overly burdensome amounts of time for participants to achieve a reward, requires unreasonably intrusive procedures, or places on the employee significant costs related to medical examinations.&lt;sup&gt;10&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;When an Employee Health Program Is Voluntary&lt;/h3&gt;
&lt;p&gt;Under the ADA, medical inquiries or required medical examinations in connection with a wellness program must be voluntary. The ADA Final Rule sets forth four factors that must be met for employee medical inquiries or medical examinations to be voluntary. These factors are as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The employer does not require employees to participate in the program.&lt;/li&gt;
&lt;li&gt;The employer does not deny coverage under any of its health insurance or benefit plans for employees who do not participate.&lt;/li&gt;
&lt;li&gt;The employer does not take any adverse action or retaliate against any employee for not participating (or for participating).&lt;/li&gt;
&lt;li&gt;The employer provides employees with a written notice, which is reasonably likely to be understood, that describes (1) what medical information will be obtained as part of the wellness program; (2) who will receive the information; (3) how the medical information will be used; and (4) the restrictions on its disclosure.&lt;sup&gt;11&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To ensure that participation in an employee wellness program is truly voluntary, the Final Rule makes clear that it would be unlawful for an employer that offers both a traditional preferred provider health plan and a high deductible plan to limit the traditional plan coverage only to those employees who participate in a wellness plan that includes a health risk assessment. It would also be unlawful for an employer to condition participation in the employer&amp;rsquo;s group health plan on an employee completing a health risk assessment.&lt;sup&gt;12&lt;/sup&gt;&lt;/p&gt;
&lt;h4&gt;Incentives Offered for Employee Health Programs&lt;/h4&gt;
&lt;p&gt;Read in isolation, the requirement that participation in a wellness program must be voluntary might be construed as preventing employers from offering rewards to their employees for their participation or imposing penalties for non-participation in wellness programs (at least to the extent they are not de minimis). However, as the EEOC explained in discussing its Final Rule, the ADA, as interpreted in light of the HIPAA non-discrimination rules, as amended by the ACA, &amp;ldquo;does not prohibit the use of incentives to encourage participation in employee health plans,&amp;rdquo; although the ADA &amp;ldquo;does place limits on them.&amp;rdquo;&lt;sup&gt;13&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Accordingly, the ADA Final Rule clarifies that the use of incentives in an employee health program, either in the form of a reward or penalty, does not render the program involuntary.&lt;sup&gt;14&lt;/sup&gt; In doing so, the EEOC concluded that regulatory limits on incentives to participate in wellness programs &amp;ldquo;cannot be so substantial as to be coercive.&amp;rdquo;&lt;sup&gt;15&lt;/sup&gt; In general conformity with HIPAA&amp;rsquo;s regulations, the ADA Final Rule, therefore, allows an employer to offer incentives of up to 30% of the total cost of employee-only coverage under the employer&amp;rsquo;s group health plan (or, in the absence of an employer plan, an ACA Exchange plan), whether in the form of a reward or penalty, to promote an employee&amp;rsquo;s participation in a wellness plan that includes disability-related inquiries or medical examinations.&lt;sup&gt;16&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The incentive rule applies to all employee health programs whether they are offered only to employees enrolled in an employer sponsored group health plan, offered to all employees whether or not they are enrolled in such a plan, or offered as a benefit of employment where an employer does not sponsor a group health plan or group health insurance coverage. The 30% limit is in reference to the cost of employee-only coverage (including both the employee&amp;rsquo;s and the employer&amp;rsquo;s contribution) under, as applicable: (1) the wellness program offered if it is a stand-alone group health plan; (2) the group health plan in connection with which the wellness program is offered; (3) the employer&amp;rsquo;s lowest-cost group health plan if the wellness program is not offered in connection with a particular plan and the employer has more than one plan; or (4) if the employer does not offer health insurance, the second-lowest-cost Silver Plan on the ACA Exchange for the jurisdiction of the employer&amp;rsquo;s principal place of business (applicable to a 40-year-old non-smoker).&lt;sup&gt;17&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Significantly, the ADA Final Rule goes beyond the existing HIPAA requirements, which impose a 30% limit on incentives for health contingent wellness programs (i.e., programs where the incentive is contingent in part on an activity or outcome related to a health factor). The ADA Final Rule&amp;rsquo;s incentive limit applies to both health contingent and participatory wellness programs that include a health risk assessment (in a participatory program, the reward or penalty is based only on participation). The HIPAA rule places no limits on incentives for participatory wellness programs.&lt;/p&gt;
&lt;h4&gt;Confidentiality of Employee Health Program Information&lt;/h4&gt;
&lt;p&gt;The EEOC&amp;rsquo;s proposed ADA wellness program regulations already required that medical records developed in the course of providing voluntary health services to employees, including wellness programs, be maintained in a confidential manner, be kept separately from other records, and not be used for any purpose violative of the statute.&lt;sup&gt;18&lt;/sup&gt; The ADA Final Rule includes added confidentiality protections by limiting the information received by an employer as part of an employee health program only to aggregated data in a format that does not disclose, nor is reasonably likely to disclose, the identity of specific individuals, except to the extent necessary to administer the plan.&lt;sup&gt;19&lt;/sup&gt; Additionally, medical information collected from employees as part of a wellness program that is part of a group health plan also comes within the confidentiality protections of HIPAA as protected health information.&lt;sup&gt;20&lt;/sup&gt; Thus, in the Interpretive Guidance to the ADA Final Rule, the EEOC opines that a wellness program governed by HIPAA &amp;ldquo;likely will be able to comply with its [confidentiality] obligations under [the ADA] by complying with the HIPAA privacy rule.&amp;rdquo;&lt;sup&gt;21&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The Interpretive Guidance also sets forth various steps the Commission believes an employer should take in order to protect the confidentiality of employee medical information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Properly train individuals who handle medical information about the confidentiality requirements of applicable laws, including HIPAA and the ADA.&lt;/li&gt;
&lt;li&gt;Promulgate clear privacy policies and procedures related to the collection, storage, and disclosure of medical information.&lt;/li&gt;
&lt;li&gt;Ensure that online systems and other technology have safeguards against unauthorized access, such as encryption.&lt;sup&gt;22&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Importantly, the EEOC suggests that, as a best practice, those individuals who are privy to medical information disclosed as part of an employee health program be separate from those persons responsible for making decisions relating to a worker&amp;rsquo;s employment, such as hiring, termination, or discipline. The EEOC opines that the use of a third party vendor to administer a wellness program may reduce the risk for employers that medical information may be disclosed improperly to individuals who make employment decisions.&lt;sup&gt;23&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;Reasonable Accommodation Obligations&lt;/h3&gt;
&lt;p&gt;Although not specifically referenced in the text of the ADA Final Rule, the EEOC&amp;rsquo;s Interpretive Guidance makes it clear that even if a wellness program is deemed voluntary and provides incentives of no more than 30% of the total cost of employee-only coverage, this does not end an employer&amp;rsquo;s obligations under the ADA. That is because, in addition to prohibiting discrimination on the basis of disability and the collection of disability-related information, the ADA requires employers to provide reasonable accommodations to employees with disabilities. This statutory obligation includes assisting disabled employees in participating in wellness programs as well as achieving any health-related goals and incentives that the plan may incorporate. As the EEOC&amp;rsquo;s Interpretive Guidance states, an employer must provide &amp;ldquo;reasonable accommodations . . . , absent undue hardship, to enable employees with disabilities to earn whatever financial incentive an employer or other covered entity offers.&amp;rdquo;&lt;sup&gt;24&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;For example, the EEOC advises that in a situation where an employer may offer employees a financial incentive to attend a nutrition class, the employer will need to provide a sign language interpreter for an employee who is deaf and needs an interpreter to understand the information communicated in the class. The only exception is if providing the interpreter would create an undue hardship for the employer. If a wellness program distributes written materials, an employer will also need to provide the materials in an alternative format, such as enlarged print or on a computer disk, to an employee with a vision impairment. Additionally, the EEOC&amp;rsquo;s Interpretive Guidance opines that if an employee has a disability that makes drawing blood dangerous, the employer must exempt that employee from any biometric screening that includes a blood draw or provide an alternative test that the employee can safely undergo.&lt;sup&gt;25&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;Smoking Cessation Programs&lt;/h3&gt;
&lt;p&gt;As with reasonable accommodation, the ADA Final Rule does not specifically address smoking cessation programs. In its Interpretive Guidance, however, the EEOC explains that because these rules apply only to employee health programs that include disability related inquiries or medical examinations, a smoking cessation program that merely asks employees whether or not they use tobacco is not a program that implicates the ADA&amp;rsquo;s limitations on disability-related inquiries or medical examinations. Thus, the EEOC takes the position that the ADA Final Rule does not apply to incentives that an employer may offer in connection with a smoking cessation program. Accordingly, the EEOC opines that an employer can offer incentives as high as 50% of the cost of employee coverage under such a program, pursuant to the HIPAA regulations, without implicating or running afoul of the disability-related inquiries or medical examinations provision of the ADA.&lt;sup&gt;26&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;EEOC&amp;rsquo;s Final GINA Regulations&lt;/h3&gt;
&lt;p&gt;Like its ADA Final Rule, the EEOC&amp;rsquo;s GINA Final Rule clarifies the limited circumstances in which an employer can offer incentives under a wellness program. In particular, the regulations permit an inducement for an employee&amp;rsquo;s spouse who participates in the program to voluntarily provide medical information.&lt;sup&gt;27&lt;/sup&gt; The GINA Final Rule does not allow an employer to ask for the spouse&amp;rsquo;s genetic information, nor to seek either the genetic information or the current or past health status of the employee&amp;rsquo;s children.&lt;sup&gt;28&lt;/sup&gt; Instead, the GINA Final Rule limits the type of information that may be sought in a health risk assessment solely to the spouse&amp;rsquo;s manifestation of disease or disorder.&lt;sup&gt;29&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;More specifically, the GINA Final Rule provides that an employer&amp;rsquo;s wellness plan may offer a limited incentive (either in the form of a reward or penalty) for an employee&amp;rsquo;s spouse to provide information about the spouse&amp;rsquo;s manifestation of disease or disorder as part of a health risk assessment if (1) the health or genetic services offered under the program to the employee&amp;rsquo;s spouse are &amp;ldquo;reasonably designed&amp;rdquo; to promote health or prevent disease,&lt;sup&gt;30&lt;/sup&gt; and (2) the spouse gives prior, knowing, voluntary, written authorization to collect the information.&lt;sup&gt;31&lt;/sup&gt; Additionally, the Final Rule adds a provision stating that employers may not require employees (or employees&amp;rsquo; spouses or dependents covered by the employer&amp;rsquo;s health plan) to agree to the sale or waive the confidentiality of their genetic information as a condition for receiving an incentive or participating in a wellness program.&lt;sup&gt;32&lt;/sup&gt; The Final Rule also includes a provision, not specifically contained in the proposed regulations, stating that it is a violation of Title II of GINA for an employer to deny access to health insurance or health benefits, or to retaliate against an employee, because the employee&amp;rsquo;s spouse declined to provide information as to the spouse&amp;rsquo;s manifestation of disease or disorder.&lt;sup&gt;33&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The GINA Final Rule provides that where an employer provides an incentive for an employee&amp;rsquo;s spouse to participate in an employer sponsored wellness program with a health risk assessment, the inducement for the spouse to complete the assessment may not exceed over 30% of the total employee-only cost of the employer&amp;rsquo;s relevant group health plan (where the relevant plan is determined under similar rules as for the ADA Final Rule limitation discussed above).&lt;sup&gt;34&lt;/sup&gt; As with the ADA Final Rule, where the employer provides no group health plan, the 30% limit is in reference to the cost of insuring a 40-year-old non-smoker on the ACA Exchange&amp;rsquo;s secondleast- costly Silver Plan.&lt;sup&gt;35&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Note that the GINA limitation is applied separately from the ADA limitation, so that the total incentive value can be up to 60% of the employee-only coverage if both apply. Thus, if an employer offers a health plan at a total cost of $14,000 (including both employer and employee contributions) for family coverage, and the plan costs $6,000 for self-only coverage, the inducement to the employee to participate and to the employee&amp;rsquo;s spouse to provide information about a manifested disease or disorder in a wellness program may not exceed $1,800 to the employee and $1,800 to the spouse.&lt;sup&gt;36&lt;/sup&gt; The value of any inducement is taken into account for this purpose whether it is in the form of financial or in-kind rewards, such as paid time off for the employee, prizes, or other items of value, or penalties, such as increased medical plan premiums.&lt;/p&gt;
&lt;p&gt;The GINA Final Rule 30% inducement limit generally parallels the limitations set forth in HIPAA, as amended by the Affordable Care Act, for health contingent wellness program inducements. The limit is also in line with the ADA Final Rule, which authorizes employers to provide incentives for employees to participate in a wellness program that collects information about the current or past health status of the employee. In promulgating that rule, the EEOC determined that allowing &amp;ldquo;incentives in excess of 30% of the cost of self-only coverage . . . would be coercive.&amp;rdquo;&lt;sup&gt;37&lt;/sup&gt; As the EEOC explained, it could &amp;ldquo;see no reason for adopting a different threshold where the employee&amp;rsquo;s spouse is the individual whose health information is being sought.&amp;rdquo;&lt;sup&gt;38&lt;/sup&gt;&lt;/p&gt;
&lt;h3&gt;Effective Date of Final ADA and GINA Rules&lt;/h3&gt;
&lt;p&gt;The EEOC considers many of the changes in the ADA and GINA Final Rules to be mere clarifications of the existing rules, and these have immediate effect. However, the new rules specifically concerning (1) the notice that must be provided to employees under the ADA Final Rule regarding the information being sought through medical inquiries or medical examinations and (2) the level of incentives permissible under GINA to induce an employee&amp;rsquo;s spouse to provide information about the spouse&amp;rsquo;s manifestation of disease or disorder apply only prospectively to employer wellness programs. The applicability date is the first day of the first plan year of the group health plan used to calculate the level of incentives that begins on or after January 1, 2017.&lt;sup&gt;39&lt;/sup&gt; Thus, if the plan year for the health plan used to calculate the permissible incentive limit begins on January 1, 2017, that is the date on which those provisions of the Final Rules apply to the wellness program.&lt;/p&gt;
&lt;h3&gt;Importance of the EEOC&amp;rsquo;s Final Rules&lt;/h3&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="/lexis-practice-advisor/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/6786.LPAJ16_2D00_Fall_5F00_PracticeTrends_5F00_Wellness_5F00_12.png"&gt;&lt;img src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/6786.LPAJ16_2D00_Fall_5F00_PracticeTrends_5F00_Wellness_5F00_12.png" border="0" alt=" " /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The EEOC&amp;rsquo;s rules recognize that wellness plans can have an important role to play in health care, both in terms of promoting employee health as well as in controlling healthcare costs. Additionally, by allowing incentives in line with those allowed under HIPAA, the Commission&amp;rsquo;s regulations are particularly good news for employers.&lt;/p&gt;
&lt;p&gt;The ADA Final Rule provides some necessary clarity as to how the EEOC views wellness programs and how the programs should be structured to be consistent with the ADA.&lt;/p&gt;
&lt;p&gt;The GINA Final Rule also represents a significant step in eliminating past uncertainty as to whether offering an inducement to obtain health information from an employee&amp;rsquo;s spouse violates the requirements of the statute. The Final Rule clarifies that an employer will avoid GINA liability if it limits inducements to those permitted under the rule, which like the ADA Final Rule are in line with the HIPAA requirements. As the EEOC has said, &amp;ldquo;allowing inducements in return for a spouse providing information about his or her manifestations of disease and disorder, while limiting inducements to prevent economic coercion, is the best way to effectuate the purposes of the wellness provisions of GINA and HIPAA.&amp;rdquo;&lt;sup&gt;40&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, one of the major benefits that should flow from implementation of the EEOC&amp;rsquo;s Final Rules will be its assistance to practitioners in drafting effective wellness plans that include health risk assessments for both employees and spouses, yet still pass EEOC scrutiny. Accordingly, all practitioners who advise employers on health and benefit plan matters should carefully review the ADA and GINA Final Rules and take appropriate steps to ensure that wellness plans are drafted in a manner that conforms to the regulatory requirements.&lt;/p&gt;
&lt;p&gt;In this regard, practitioners should consider the following guidance for their clients implementing wellness programs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Do not require employees to participate in the wellness program.&lt;/li&gt;
&lt;li&gt;Do not deny health insurance to employees who do not participate in the program.&lt;/li&gt;
&lt;li&gt;Do not take any adverse action or retaliate against employees who do not participate in the wellness program or who fail to achieve certain health outcomes.&lt;/li&gt;
&lt;li&gt;Provide reasonable accommodations to allow disabled employees to participate in the wellness program and to obtain any incentives offered for certain health outcomes.&lt;/li&gt;
&lt;li&gt;If the program seeks medical information or requires medical examinations, provide employees with a notice that:
&lt;ul&gt;
&lt;li&gt;Is written in a way the employee is likely to understand&lt;/li&gt;
&lt;li&gt;Describes the type of medical information that will be obtained and the purposes for which the information will be used&lt;/li&gt;
&lt;li&gt;Describes the restrictions on the disclosure of medical information, the parties with whom it will be shared, and the methods the employer will use to ensure confidentiality&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;If the program uses inducements, either in the form of a reward or penalty, to encourage employees to participate in the program or to encourage employee spouse&amp;rsquo;s to provide information regarding a manifested disease or disorder, limit the value of the inducement to a maximum of 30% of the total cost of self-only coverage under the employer&amp;rsquo;s group health plan (including both the employee&amp;rsquo;s and the employer&amp;rsquo;s contribution).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By following this guidance, practitioners can help ensure that the wellness plans they draft will not only lead to a healthier workforce, but also not become subject to a successful legal charge under the ADA or GINA.&lt;sup&gt;41&lt;/sup&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/contributing-authors.page#jonathan-r-mook" target="_blank"&gt;Jonathan R. Mook&lt;/a&gt; is a partner at DiMuroGinsberg, P.C. He represents employers and businesses on matters relating to employment law, business torts, and business disputes. He frequently counsels employers on issues involving compliance with the ADA and accommodating disabled employees, as well as other employment related matters. Mr. Mook is a nationally recognized practitioner in employment law and has written two treatises on the Americans with Disabilities Act, &lt;strong&gt;Americans with Disabilities Act: Employee Rights&lt;/strong&gt; and &lt;strong&gt;Employer Obligations and Americans with Disabilities Act: Public Accommodations and Commercial Facilities&lt;/strong&gt;, both published by LexisNexis.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path:&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5KGV-PCN1-JS5Y-B4FC-00000-00&amp;amp;pdcomponentid=126171&amp;amp;ecomp=5v8g" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employee Benefits &amp;gt; Health and Welfare Plans &amp;gt; Articles &amp;gt; Fringe Benefit and Wellness Programs&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1" style="width:100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on designing and operating an employer wellness program, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/13b23984-25d4-4a0c-9b16-46fbbf7e73b6/?context=1000522" target="_blank"&gt;&amp;gt; IMPLEMENTING COMPLIANT WELLNESS PROGRAMS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/e5ac10a4-ab3c-4969-af29-45078a338314/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employee Benefits &amp;gt; Health and Welfare Plans &amp;gt; Practice Note &amp;gt;Other Welfare Benefit Issues&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For additional discussion about how employers can collect and use certain genetic and medical information, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/861ccc8c-e869-48f7-826e-9a3f6e31602d/?context=1000522" target="_blank"&gt;&amp;gt; FULFILLING THE REQUIREMENTS OF TITLE II OFTHE GENETIC INFORMATION NON-DISCRIMINATIONACT (GINA)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/e5ac10a4-ab3c-4969-af29-45078a338314/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employee Benefits &amp;gt; Health and Welfare Plans &amp;gt; Practice Note &amp;gt;Other Welfare Benefit Issues&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For guidelines designed to assist you in implementing a compliant wellness plan, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/9847d7e9-14ac-4af2-b355-86d729b5b385/?context=1000522" target="_blank"&gt;&amp;gt; DESIGNING AND IMPLEMENTING COMPLIANT WELLNESS PROGRAMS&amp;mdash;CHECKLIST&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/6fe3ea36-2421-4294-8d7e-d600c800a0c7/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employee Benefits &amp;gt; Health and Welfare Plans &amp;gt; Forms &amp;gt; Fringe Benefit &amp;amp; Wellness Programs&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;To see a sample notce form containing model clauses, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/460809dc-8d25-46c6-a876-bd76c364a48e/?context=1000522" target="_blank"&gt;&amp;gt; &amp;gt; HIPAA NONDISCRIMINATION NOTICE FOR WELLNESS PROGRAMS&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fforms%2Furn%3AcontentItem%3A5GNM-WV71-JJYN-B1VP-00000-00&amp;amp;pdcomponentid=126280&amp;amp;ecomp=5v8g" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Employee Benefits &amp;gt; Health and Welfare Plans &amp;gt; Forms &amp;gt; HIPAA and HITECH&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;small&gt;&lt;strong&gt;1. &lt;/strong&gt;See &lt;a href="https://advance.lexis.com/api/document/collection/analytical-materials/id/5J59-2YV0-00CV-B0VF-00000-00?context=1000516"&gt;Kristin Madison, &lt;em&gt;Reconciling Policy Objectives, &lt;/em&gt;51 Willamette L. Rev. 407, 412&amp;ndash;13 (2015). &lt;/a&gt;An annual survey conducted by the Kaiser Family Foundation Health Research and Educational Trust indicated that 55% of large firms that offered wellness programs said that most of their wellness benefits &amp;nbsp;were provided by a group health plan. &lt;em&gt;S&lt;/em&gt;&lt;em&gt;ee &lt;/em&gt;Karen Pollitz &amp;amp; Matthew Rae, Kaiser Family Foundation, &lt;em&gt;W&lt;/em&gt;&lt;em&gt;orkplace &lt;/em&gt;&lt;em&gt;W&lt;/em&gt;&lt;em&gt;ellness Programs Characteristics and Requirements &lt;/em&gt;5 (2016), &lt;a href="http://kff.org/private-insurance/issue-brief/workplace-wellness-programs-characteristics-and-requirements/"&gt;http://kff.org/private-insurance/issue-brief/workplace-wellness-programs-characteristics-and-requirements/. &lt;/a&gt;&lt;strong&gt;2. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8256-00000-00?context=1000516"&gt;EEOC, Final Rule, &amp;ldquo;Regulations &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8256-00000-00?context=1000516"&gt;Under the Americans with Disabilities Act,&amp;rdquo; 81 Fed. Reg. 31126 (May 17, 2016); &amp;nbsp;&lt;/a&gt;EEOC, Final Rule, &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;&amp;ldquo;Genetic Information Nondiscrimination &amp;nbsp;Act,&amp;rdquo; 81 Fed. Reg. 31143 (May 17, 2016). &lt;/a&gt;The ADA Final Rule and GINA Final Rule apply regardless &amp;nbsp;of whether the wellness program is related &amp;nbsp;to a group health plan. &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8256-00000-00?context=1000516"&gt;81 Fed. Reg. at 31132; &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. at 31152. &lt;/a&gt;&lt;strong&gt;3. &lt;/strong&gt;The ADA Final Rule does not pertain to wellness programs &amp;nbsp;that&amp;nbsp; do not request or require &amp;nbsp;medical information &amp;nbsp;from employees, such as programs &amp;nbsp;that&amp;nbsp; merely provide employees with information &amp;nbsp;about &amp;nbsp;health &amp;nbsp;matters &amp;nbsp;and healthy lifestyles. The rule also does not pertain to similar types of wellness plans that may be offered by entities &amp;nbsp;other than those &amp;nbsp;subject to Title I of the ADA, such as social service agencies covered &amp;nbsp;under Title II of the statute, &lt;a href="https://advance.lexis.com/api/document/collection/statutes-legislation/id/4YF7-GVG1-NRF4-41T6-00000-00?context=1000516"&gt;42 U.S.C.&lt;/a&gt; &lt;a href="https://advance.lexis.com/api/document/collection/statutes-legislation/id/4YF7-GVG1-NRF4-41T6-00000-00?context=1000516"&gt;&amp;sect; 12131, &lt;em&gt;et seq., &lt;/em&gt;&lt;/a&gt;or public accommodations subject to &lt;a href="https://advance.lexis.com/api/document/collection/statutes-legislation/id/4YF7-GVM1-NRF4-43H5-00000-00?context=1000516"&gt;Title III, 42 U.S.C. &amp;sect; 12181, &lt;em&gt;et seq., &lt;/em&gt;&lt;/a&gt;which may provide similar programs&amp;nbsp; to individuals who are considered volunteers. &lt;strong&gt;4. &lt;/strong&gt;29 C.F.R. &amp;sect; 1630.14(d). &lt;strong&gt;5. &lt;/strong&gt;See Titles I and IV of the Health&amp;nbsp; Insurance Portability and Accounting Act of 1996, &amp;nbsp;&lt;a href="https://advance.lexis.com/api/document/collection/statutes-legislation/id/3RHC-V3R0-0019-T0Y9-00000-00?context=1000516"&gt;Pub. L. 104-191, &lt;/a&gt;adding Section &amp;nbsp;9802 of the Internal Revenue &amp;nbsp;Code and Section &amp;nbsp;2702 the Employee Retirement Income Security Act, and Section 2705 of the Public Health Service Act (PHS Act). The nondiscrimination provisions originally enacted in HIPAA set forth eight health&amp;nbsp; status &amp;nbsp;related &amp;nbsp;factors, which the HIPAA final regulations refer to as &amp;lsquo;&amp;lsquo;health factors.&amp;rsquo;&amp;rsquo; &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/4MJR-NYT0-006W-81WT-00000-00?context=1000516"&gt;71 FR 75014 (Dec. 13, 2006). &lt;/a&gt;Under HIPAA and the final regulations, &amp;nbsp;as well as under PHS Act Section 2705 (as added &amp;nbsp;by the Affordable Care Act), the eight health factors &amp;nbsp;are: health &amp;nbsp;status, &amp;nbsp;medical condition &amp;nbsp;(including both &amp;nbsp;physical and mental illnesses), claims experience, receipt &amp;nbsp;of health &amp;nbsp;care, medical history, genetic &amp;nbsp;information, &amp;nbsp;evidence &amp;nbsp;of Final Rule, &amp;ldquo;Incentives for Nondiscriminatory Wellness Programs in Group Health Plans,&amp;rdquo; &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/58JV-T650-006W-84XD-00000-00?context=1000516"&gt;78 Fed. Reg. 33158 (June 3, 2013). &lt;/a&gt;&lt;strong&gt;7. &lt;/strong&gt;29 C.F.R &amp;sect; 1630.14. &lt;strong&gt;8. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(1). &lt;/a&gt;This standard is similar to the standard under the regulations jointly issued by the Departments of Labor, Treasury, and HHS in implementing the Affordable Care Act amendments to HIPAA. See &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5J2H-H260-008G-Y4RN-00000-00?context=1000516"&gt;26 CFR 54.9802-1(f)(3)(iii); &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K62-SXF0-008H-02X9-00000-00?context=1000516"&gt;29 CFR 2590.702(f)(3)(iii); &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5BP3-NBF0-008H-04TJ-00000-00?context=1000516"&gt;45 CFR 146.121(f)(3)(iii). &lt;/a&gt;&lt;strong&gt;9. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(1).&lt;/a&gt;&lt;strong&gt; 10. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;11. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(1). &lt;/a&gt;The EEOC has published a sample notice form that employers&amp;nbsp; may use to comply with their written notice obligations under the Final Rule. The sample notice is available at &lt;a href="https://www1.eeoc.gov/laws/regulations/ada-wellness-notice.cfm"&gt;https://www1.eeoc.gov//laws/regulations/ada-wellness-notice.cfm. &lt;/a&gt;&lt;strong&gt;12. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;13. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JYP-G7S0-008H-016X-00000-00?context=1000516"&gt;29 C.F.R. 1630 Appendix &amp;sect; 1630.14(d)(3). &amp;nbsp;&lt;/a&gt;&lt;strong&gt;14. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;15. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;16. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(3)(iv). &lt;/a&gt;For the limitations under HIPAA, see &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5J2H-H260-008G-Y4RN-00000-00?context=1000516"&gt;26 CFR 54.9802-1(f)(3)(ii) and (4)(i); &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K62-SXF0-008H-02X9-00000-00?context=1000516"&gt;29 CFR 2590.702(f)(3)(ii) and (4)(ii); &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5BP3-NBF0-008H-04TJ-00000-00?context=1000516"&gt;45 CFR 146.121(f)(3)(ii) and (f)(4)(ii). &lt;/a&gt;A special rule under HIPAA permits an incentive &amp;nbsp;of up to 50% for participation in tobacco cessation programs &amp;nbsp;as part of a wellness plan. See &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5J2H-H260-008G-Y4RN-00000-00?context=1000516"&gt;26 CFR 54.9802-1(f)(5); &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K62-SXF0-008H-02X9-00000-00?context=1000516"&gt;29 CFR 2590.702(f)(5); &amp;nbsp;&lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5BP3-NBF0-008H-04TJ-00000-00?context=1000516"&gt;45 CFR 146.121(f)(5). &lt;/a&gt;&lt;strong&gt;17. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d &lt;/em&gt;&lt;strong&gt;18. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(4) &amp;nbsp;&lt;/a&gt;(formerly &amp;sect; 1630.14(d)(1) &amp;nbsp;and (2)). &lt;strong&gt;19. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K8J-8JS0-008H-0392-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1630.14(d)(4)(ii) &lt;/a&gt;The disclosure exceptions under the proposed rules for relaying information &amp;nbsp;about &amp;nbsp;necessary restrictions on work duties and necessary accommodations, appropriate disclosure to first aid and safety personnel, and agency compliance audits also apply to this enhanced provision. &lt;em&gt;Id. &lt;/em&gt;&lt;strong&gt;20. &lt;/strong&gt;See &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K62-T050-008H-040M-00000-00?context=1000516"&gt;45 C.F.R. Parts 160 &lt;/a&gt;and &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5K62-SXD0-008H-02WN-00000-00?context=1000516"&gt;164 &amp;nbsp;&lt;/a&gt;(HIPAA Privacy, Security, and Breach Notification&amp;nbsp; Rules). &lt;strong&gt;21. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JYP-G7S0-008H-016X-00000-00?context=1000516"&gt;29 C.F.R. 1630 Appendix &amp;sect; 1630.14(d)(4). &amp;nbsp;&lt;/a&gt;&lt;strong&gt;22. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;23. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;24. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JYP-G7S0-008H-016X-00000-00?context=1000516"&gt;29 C.F.R. 1630 Appendix &amp;sect; 1630.14(d)(3). &amp;nbsp;&lt;/a&gt;&lt;strong&gt;25. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;then &amp;nbsp;the ADA&amp;rsquo;s financial incentive &amp;nbsp;rules will apply, and in that &amp;nbsp;instance, &amp;nbsp;the ADA&amp;rsquo;s 30% rule will trump &amp;nbsp;the 50% HIPAA provision. &lt;em&gt;Id. &lt;/em&gt;&lt;strong&gt;27. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. 31143 (May 17, 2016). &amp;nbsp;&lt;/a&gt;&lt;strong&gt;28. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 C.F.R. &amp;sect; 1635.8(b)(2) &lt;/a&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;(iii). &lt;/a&gt;According to the EEOC, prohibiting incentives &amp;nbsp;to obtain the genetic &amp;nbsp;or health information &amp;nbsp;of children is important to preventing discrimination against the employee. &amp;nbsp;The Commission believes that the possibility of discrimination is greater &amp;nbsp;where &amp;nbsp;the employer has access &amp;nbsp;to information &amp;nbsp;about &amp;nbsp;the health status &amp;nbsp;of the employee&amp;rsquo;s children as opposed to the person&amp;rsquo;s spouse, &amp;nbsp;due to the fact that information about an employee&amp;rsquo;s genetic make-up or predisposition to disease&amp;nbsp; may be gleaned from information about the current &amp;nbsp;or past health status &amp;nbsp;of the employee&amp;rsquo;s children. &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. at 31147. &lt;/a&gt;&lt;strong&gt;29. &lt;/strong&gt;A spouse&amp;rsquo;s health &amp;nbsp;risk assessment may include a questionnaire or a medical examination, &amp;nbsp;such as a blood pressure test &amp;nbsp;or blood test, to detect high cholesterol or high glucose levels. &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 CFR 1635.8(b)(2)(iii). &lt;/a&gt;&lt;strong&gt;30. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29&lt;/a&gt; &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;CFR 1635.8(b)(2)(i)(A). &lt;/a&gt;According to the EEOC, this means &amp;nbsp;that&amp;nbsp; the service has a reasonable chance &amp;nbsp;of improving the health &amp;nbsp;of, or preventing disease &amp;nbsp;in, participating &amp;nbsp;persons. Thus, collecting information on a health &amp;nbsp;questionnaire without &amp;nbsp;providing follow-up &amp;nbsp;information &amp;nbsp;or advice is not &amp;nbsp;allowed unless &amp;nbsp;the &amp;nbsp;information &amp;nbsp;collected &amp;nbsp;is actually used &amp;nbsp;to design a program &amp;nbsp;that &amp;nbsp;addresses at least a subset of the conditions &amp;nbsp;identified. Additionally, a program is not reasonably &amp;nbsp;designed &amp;nbsp;to promote health or prevent disease &amp;nbsp;if it imposes, as a condition &amp;nbsp;for obtaining a reward, an overly burdensome amount &amp;nbsp;of time for participation, &amp;nbsp;requires &amp;nbsp;unreasonably intrusive procedures, or places significant costs &amp;nbsp;related &amp;nbsp;to medical examinations &amp;nbsp;on employees. Nor is a program &amp;nbsp;reasonably &amp;nbsp;designed &amp;nbsp;when &amp;nbsp;it exists just to shift costs from the employer &amp;nbsp;to particular employees based &amp;nbsp;on their health. Importantly, GINA&amp;rsquo;s existing prohibition on use of genetic &amp;nbsp;information &amp;nbsp;for employment-based decisions is maintained. &amp;nbsp;Thus, it is unlawful for an employer to use health information &amp;nbsp;provided by a spouse &amp;nbsp;to make an employment decision related &amp;nbsp;to the employee. &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. at 31152. &lt;/a&gt;&lt;strong&gt;31. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 CFR 1635.8(b)(2)(i)(A). &lt;/a&gt;&lt;strong&gt;32. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 CFR 1635.8(b)(2)(iv).&lt;/a&gt; &lt;strong&gt;33. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 C.F.R. 1635.8(b)(2)(v). &lt;/a&gt;&lt;strong&gt;34. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JVK-X9N0-008H-00J8-00000-00?context=1000516"&gt;29 C.F.R. 1635.8(b)(2)(iii). &lt;/a&gt;&lt;strong&gt;35. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;36. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;at &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;31154. &lt;/a&gt;&lt;strong&gt;37. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. at 31154. &lt;/a&gt;&lt;strong&gt;38. &lt;/strong&gt;&lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;&lt;strong&gt;39. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8256-00000-00?context=1000516"&gt;81 Fed. Reg. at 31129 &lt;/a&gt;(ADA); &lt;em&gt;I&lt;/em&gt;&lt;em&gt;d. &lt;/em&gt;at &lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;31147 &lt;/a&gt;(GINA). When an ACA Exchange Plan is used as a reference for the limitation, the plan year is the calendar year. &lt;em&gt;Id. &lt;/em&gt;&lt;strong&gt;40. &lt;/strong&gt;&lt;a href="https://advance.lexis.com/api/document/collection/administrative-codes/id/5JSY-P7D0-006W-8257-00000-00?context=1000516"&gt;81 Fed. Reg. at 31146. &lt;/a&gt;&lt;strong&gt;41. &lt;/strong&gt;For additional information &amp;nbsp;on the EEOC&amp;rsquo;s ADA and GINA rules see J. Mook, &amp;ldquo;EEOC Issues Proposed Rule on Wellness Programs,&amp;rdquo; 15 Bender&amp;rsquo;s Lab. &amp;amp; Empl. Bull. 213 &amp;nbsp;(July, 2015); &amp;nbsp;J. Mook, &amp;ldquo;EEOC Proposes Amending GINA Regs for Wellness &amp;nbsp;Plans.&amp;rdquo; 16 Bender&amp;rsquo;s Lab. &amp;amp; Empl. Bull. 1 (Jan., 2016); &amp;nbsp;J. Mook, &amp;ldquo;EEOC Issues Final ADA and GINA Rules on Wellness &amp;nbsp;Programs,&amp;rdquo; 16 Bender&amp;rsquo;s Lab. &amp;amp; Empl. Bull. 203 &amp;nbsp;(July, 2016). This EIA is adapted from the article, &amp;ldquo;EEOC Issues Final ADA and GINA Rules,&amp;rdquo; 16 Bender&amp;rsquo;s Lab. &amp;amp; Empl. Bull. 203 &amp;nbsp;(July, 2016).&lt;/small&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Introduction to Acquisition Financing &amp;amp; Recent Trends</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=64cffcda-0277-4bb8-a4ea-9ced4486c983</link><pubDate>Wed, 03 Aug 2016 14:02:24 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:64cffcda-0277-4bb8-a4ea-9ced4486c983</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;By: &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/contributing-authors.page#linda-l-curtis" target="_blank"&gt;Linda Curtis&lt;/a&gt; and &lt;a href="http://www.lexisnexis.com/en-us/practice-advisor-authors/contributing-authors.page#andrew-w-cheng" target="_blank"&gt;Andrew Cheng&lt;/a&gt;, Gibson, Dunn &amp;amp; Crutcher LLP.&lt;/p&gt;
&lt;p&gt;Business acquisitions vary widely in terms of size and structure, the parties involved, and the nature of the financing involved. The parties typically involve one or more buyers, one or more sellers, and one or more lenders.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A STANDARD ACQUISITION STRUCTURE IS THE PURCHASE&lt;/strong&gt; of the target company&amp;rsquo;s equity, but acquisitions by merger are also common. An acquisition may also be structured as the purchase of all or substantially all of the target company&amp;rsquo;s assets. Even within each structure category there may be variations, and these variations may drive the structure and terms of the financing.&lt;/p&gt;
&lt;p&gt;A leveraged buyout (or LBO) can be loosely defined as an acquisition that is funded all or in part with a material amount of debt, usually where the target&amp;rsquo;s assets and business are used as a source of potential repayment for the debt. Often, the buyer in an LBO is a private equity fund. A variant of the leveraged buyout is the management buyout (or MBO), where the target company&amp;rsquo;s management team, alone or with the help of a private equity partner, participates in the buyer side of the acquisition. A strategic acquisition typically refers to a transaction where the buyer is an operating company rather than a private equity firm. Given that the buyer in a strategic acquisition operates an independent business (unlike the buyer in an LBO, which is often a shell acquirer with no real assets or revenue formed by a private equity firm), the lender for the acquisition financing will often have a potential source of repayment from the old business as well as from the acquisition target. Although this article focuses primarily on debt acquisition financing for leveraged buyouts, a significant part of the discussion is relevant to strategic acquisitions, because many common LBO terms and conditions have crept into acquisition financings involving strategic buyers in the past few years.&lt;/p&gt;
&lt;h3&gt;Recent Trends in Acquisition Financing&lt;/h3&gt;
&lt;p&gt;A number of trends in acquisition financing have become evident since the 2008 financial crisis. First, the low interest rate environment since 2008 (that continues as of the date of this article) has made debt financing a very attractive source of funds for potential acquirors, both private equity funds and strategic buyers. Second, certain funds-type financing commitments (and acquisition agreements that do not contain financing conditions) have become standard in U.S. acquisition finance during this time period. Another general development since the financial crisis has been an increase in the sheer complexity of acquisition financing terms through the inclusion of incremental loan (also called accordion) and related provisions, amend and extend provisions, equity cures, and other innovations. For a sample incremental facility provision, see &lt;a href="https://advance.lexis.com/document/documentlink/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fforms%2Furn%3AcontentItem%3A5C8D-9D31-JN6B-S10V-00000-00&amp;amp;pdcontentcomponentid=126260&amp;amp;pddoctitle=Sample+Provisions%3A+Incremental+Facility+(Credit+Agreement)&amp;amp;ecomp=-_xtk" target="_blank"&gt;Sample Provisions: Incremental Facility (Credit Agreement)&lt;/a&gt;. For a sample amend and extend provision, see &lt;a href="https://advance.lexis.com/api/permalink/3dc564c5-5687-4cdf-81c8-57d55a153fe4/?context=1000522" target="_blank"&gt;Sample Provisions: Amendand Extend (Credit Agreement)&lt;/a&gt;. For a sample equity cure provision, see &lt;a href="https://advance.lexis.com/api/permalink/7a758d96-52fb-4cbc-8773-24fad7ee0c0e/?context=1000522" target="_blank"&gt;Sample Provisions: Equity Cure Right (Credit Agreement)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;A final general development is the increasing scrutiny of debt financings, including acquisition financings, by U.S. financial institution regulators&amp;mdash;including, most importantly, the implementation of the interagency guidance on leveraged lending initially proposed by the Federal Reserve, the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency in March 2013. 78 Fed. Reg. 17766 (Mar. 22, 2013). In November 2014, the agencies jointly published supplemental guidance on the issue of leveraged lending practices along with their answers to certain frequently asked questions by banks regarding the March 2013 guidance report, available at &lt;a href="http://www.federalreserve.gov/newsevents/press/bcreg/bcreg20141107a3.pdf" target="_blank"&gt;http://www.federalreserve.gov/newsevents/press/bcreg/bcreg20141107a3.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In effect, in the November 2014 guidance, the agencies confirmed and clarified their position on expected underwriting practices for regulated financial institutions and reiterated their position that they expect compliance with these standards. Since the 2014 supplemental guidance, both anecdotal evidence and league tables support the proposition that regulated lenders are now taking seriously the regulators&amp;rsquo; concerns about excessive leverage; however, as of the date of this article, the full implications of such regulatory developments are yet to be determined. See also &lt;a href="https://advance.lexis.com/document/documentlink/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5J50-4691-F7ND-G04P-00000-00&amp;amp;pdpinpoint=_0QYQ_1524160&amp;amp;pdcontentcomponentid=126166&amp;amp;pddoctitle=The+Impact+of+Dodd-Frank+and+Capital+Requirements+on+Commercial+Lending&amp;amp;ecomp=-_xtk" target="_blank"&gt;The Impact of Dodd-Frank and Capital Requirements on Commercial Lending&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path:&lt;/h3&gt;
&lt;p&gt;For &lt;strong&gt;Finance&lt;/strong&gt; Subscribers:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5JC3-3RS1-JW09-M1MN-00000-00&amp;amp;pdcomponentid=126166&amp;amp;ecomp=cv8g" target="_blank"&gt;RESEARCH PATH: Finance &amp;gt; Acquisition Finance &amp;gt;Sources of Acquisition Financing&amp;gt; Practice Notes &amp;gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For &lt;strong&gt;Corporate and M&amp;amp;A&lt;/strong&gt; Subscribers:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5JC3-3RS1-JW09-M1MN-00000-00&amp;amp;pdcomponentid=126166&amp;amp;ecomp=cv8g" target="_blank"&gt;RESEARCH PATH: Corporate and M&amp;amp;A &amp;gt; AcquisitionFinance &amp;gt; Sources of Acquisition Financing &amp;gt; Practice Notes&amp;gt; Introduction&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a sample incremental facility provision, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/be044ac4-13a2-4d31-89f0-cb10603da5ba/?context=1000522" target="_blank"&gt;&amp;gt; SAMPLE PROVISIONS: INCREMENTAL FACILITY(CREDIT AGREEMENT)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d4b4b3ed-3c90-422a-a15e-50e86b5ba9f2/?context=1000522" target="_blank"&gt;RESEARCH PATH: Finance &amp;gt; The Credit Agreement&amp;gt; The Loan &amp;gt; Forms &amp;gt; Credit Agreement Provisions &amp;gt; Sample Provisions: Incremental Facility (Credit Agreement)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a sample amend and extend provision, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/70618338-4602-475d-970c-146a7c385be2/?context=1000522" target="_blank"&gt;&amp;gt; SAMPLE PROVISIONS: AMEND AND EXTEND(CREDIT AGREEMENT)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/8afbc49d-9c2d-4d64-b89a-27c14b7c6a1c/?context=1000522" target="_blank"&gt;RESEARCH PATH: Finance &amp;gt; The Credit Agreement&amp;gt; Events of Default and Miscellaneous Provisions&amp;gt; Forms &amp;gt; Amendments, Consents and Waivers &amp;gt; Sample Provisions: Amend and Extend (Credit Agreement)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For a sample equity cure provision, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/035dd35a-81fb-449d-9fa3-b3c490d78887/?context=1000522" target="_blank"&gt; &amp;gt; SAMPLE PROVISIONS: EQUITY CURE RIGHT(CREDIT AGREEMENT)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/1d3bfc7f-49a2-446f-81f2-d516b82f24f8/?context=1000522" target="_blank"&gt;RESEARCH PATH: Finance &amp;gt; The Credit Agreement &amp;gt; Events of Default and Miscellaneous Provisions &amp;gt; Forms &amp;gt; Equity Cure Right &amp;gt; Sample Provisions: Equity Cure Right (Credit Agreement)&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;For more information on banking capital requirements for commercial lending, see&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d0d710c0-397a-459d-bd4a-881ae9f7f202/?context=1000522" target="_blank"&gt;&amp;gt; THE IMPACT OF DODD-FRANK AND CAPITAL REQUIREMENTS ON COMMERCIAL LENDING&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/e68b1aba-642c-44e8-b7c6-cd2faa896fc2/?context=1000522" target="_blank"&gt;RESEARCH PATH: Finance &amp;gt; Fundamentals of Financing Transactions &amp;gt; Regulations Affecting Credit &amp;gt; Practice Notes &amp;gt; Other Regulatory Issues &amp;gt; The Impact of Dodd-Frank and Capital Requirements on Commercial Lending&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Employee GPS Tracking: There&amp;#39;s an App for That</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=46ee5f97-161a-4492-9b3e-2186f791e4c4</link><pubDate>Fri, 11 Mar 2016 07:49:26 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:46ee5f97-161a-4492-9b3e-2186f791e4c4</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;By: Courtney King, Ice Miller&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5J5R-FGH1-JYYX-63NJ-00000-00&amp;amp;pdcomponentid=126171&amp;amp;ecomp=dvtg" target="_blank"&gt;LEXIS PRACTICE ADVISOR RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Privacy, Technology, and Social Media &amp;gt; Monitoring and Testing Employees &amp;gt; Articles &amp;gt; Video and Audio Surveillance and Eavesdropping of Employees &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Utilizing global positioning system tracking to monitor employees&amp;rsquo; on-duty conduct is not uncommon. This article discusses a recently filed lawsuit that presents questions about the balance between an employer&amp;rsquo;s right to monitor and an employee&amp;rsquo;s right to privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;WITH THE TOUCH OF A SMARTPHONE APP, WE NOW HAVE&lt;/strong&gt; instant access to otherwise inaccessible information. Like the rest of society, employers frequently take advantage of the benefits of recent technological advances. Many companies now provide employees with cell phones, laptops, or other electronic devices to increase efficiency. Certain apps allow employees to clock in and out from their smartphones, communicate with supervisors and clients, and participate in meetings from remote locations via video conferencing software. Some employers&amp;mdash;particularly employers with field or mobile employees&amp;mdash;also use smartphone apps to monitor employee productivity and performance during work hours. Utilizing global positioning system (GPS) tracking to monitor employees&amp;rsquo; on-duty conduct is not uncommon. However, a recently filed lawsuit presents questions about the balance between an employer&amp;rsquo;s right to monitor and an employee&amp;rsquo;s right to privacy.&lt;/p&gt;
&lt;h3 style="color:#ed1c24;"&gt;The Lawsuit&lt;/h3&gt;
&lt;p&gt;A woman recently filed a lawsuit in California state court alleging that her former employer fired her for uninstalling a GPS tracking app from a company-issued smartphone. Prior to her termination, plaintiff Myrna Arias worked as a sales executive for Intermex Wire Transfer, LLC. Arias&amp;rsquo;s job consisted of traveling throughout central California to persuade business owners to install the company&amp;rsquo;s money transfer machines. In April 2014, Intermex required employees to download &amp;ldquo;Xora,&amp;rdquo; a smartphone timecard app with a GPS function that &amp;ldquo;tracked the exact location of the person possessing the smartphones on which it was installed.&amp;rdquo; Arias alleges in her complaint that Intermex required employees to leave their smartphones powered on at all times.&lt;/p&gt;
&lt;p&gt;Arias claims that when she and other employees questioned a manager about Intermex&amp;rsquo;s use of the app&amp;rsquo;s tracking data, the manager admitted that Intermex would monitor the employees&amp;rsquo; off-duty movement. According to Arias, the manager even bragged that whenever Arias drove her car, he could tell how fast she was driving. Arias told the manager that she had no issue with the company monitoring her on-duty activity, but monitoring her location during non-work hours served as an illegal invasion of privacy. She likened the app to a prisoner&amp;rsquo;s ankle bracelet. In response, the manager advised Arias that she should simply accept that Intermex would monitor her activity because Intermex paid Arias more than NetSpend Corporation&amp;mdash;a rival company where Arias worked part-time. According to the complaint, Arias ultimately uninstalled the Xora app from her company-issued smartphone &amp;ldquo;in order to protect her privacy.&amp;rdquo; Intermex terminated Arias&amp;rsquo;s employment a few weeks later. Arias also claims that NetSpend fired her because Intermex&amp;rsquo;s CEO told NetSpend&amp;rsquo;s vice president that Arias was disloyal because she had also worked for Intermex.&lt;/p&gt;
&lt;p&gt;Arias&amp;rsquo;s lawsuit accuses Intermex of invading her privacy, wrongful termination, unfair business practices, retaliation, and other related claims. She seeks $500,000 in lost wages.&lt;/p&gt;
&lt;h3 style="color:#ed1c24;"&gt;GPS Tracking and the Law&lt;/h3&gt;
&lt;p&gt;Generally, courts have found that an employer&amp;rsquo;s use of GPS tracking technology is reasonable and not necessarily an invasion of an employee&amp;rsquo;s legitimate expectation of privacy. These decisions have essentially been based on the rationale that employers are expected to monitor employee performance in the workplace, so it follows that an employer would monitor an employee whose workplace happens to be her car. However, does this type of monitoring turn from reasonable to invasive when it extends to an employee&amp;rsquo;s offduty conduct?&lt;/p&gt;
&lt;p&gt;No federal statute directly regulates private employers&amp;rsquo; use of GPS tracking to monitor employees, and only a few states have enacted laws directly on this point (including California, Connecticut, Delaware, and Texas). However, GPS surveillance could possibly implicate certain state tort laws, including laws prohibiting the invasion of privacy. Unionized employees could also challenge GPS monitoring as an unfair labor practice or an infringement on the right to engage in protected concerted activity under the National Labor Relations Act.&lt;/p&gt;
&lt;h3 style="color:#ed1c24;"&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In light of the pending &lt;em&gt;Intermex&lt;/em&gt; case, employers with existing GPS related policies (and those considering implementing such policies) should take the following points into consideration:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Ensure that GPS monitoring is justified by a legitimate business need&lt;/em&gt;. The &lt;em&gt;Intermex&lt;/em&gt; case demonstrates the potential ramifications of implementing an employee GPS tracking program. Due to the substantial costs of litigation, employers should consider whether tracking employees is necessary for work-related purposes, e.g., a need to monitor employee productivity, the use of an employer&amp;rsquo;s resources (such as a company car), security and safety concerns, etc.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Ensure that the GPS tracking policy sets forth monitoring parameters&lt;/em&gt;. Due to potential disputes regarding employees&amp;rsquo; privacy expectations, an employer that uses GPS tracking software should implement a sound policy that outlines the purpose of the company&amp;rsquo;s use of GPS monitoring, the manner in which the employer will monitor its workers, and how the employer will use the data. The policy should also explain the logistics related to tracking employees, including when an employee should expect to be monitored and when employees may turn off an app&amp;rsquo;s tracking function. If disabling a device&amp;rsquo;s tracking function could result in discipline, notify the employees of this consequence in advance.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Effectively communicate the policy&lt;/em&gt;. GPS tracking could convey a essage that an employer lacks trust in its employees, which could negatively affect employee morale. An employer should communicate honestly with its employees about its GPS monitoring program and welcome questions about how the employer will use it. This could help build rapport with employees to enlist collaboration as opposed to resistance. To alleviate potential privacy concerns, employers may consider certain timecard apps that automatically disable the GPS function when the employee is off the clock.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To avoid legal ramifications that could result from tracking employee activity using GPS software (or any form of electronic monitoring), employers are encouraged to consult legal counsel to ensure that your monitoring policies do not run afoul of applicable laws.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Courtney King&lt;/strong&gt; is an associate in Ice Miller&amp;rsquo;s Labor and Employment Group and Data Security and Privacy Group. Resident in the firm&amp;rsquo;s Indianapolis office, the author may be reached at courtney.king@ icemiller.com.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Article Courtesy of Pratt&amp;rsquo;s Privacy &amp;amp; Cybersecurity Law Report, Volume 1, Issue 3.&lt;/p&gt;
&lt;p style="font-size:10px;"&gt;Copyright &amp;copy; 2016. Matthew Bender &amp;amp; Company, Inc., a member of the LexisNexis Group. All rights reserved. Materials reproduced from Pratt&amp;rsquo;s Privacy &amp;amp; Cybersecurity Law Report with permission of Matthew Bender &amp;amp; Company, Inc. No part of this document may be copied, photocopied, reproduced, translated or reduced to any electronic medium or machine readable form, in whole or in part, without prior written consent of Matthew Bender &amp;amp; Company, Inc.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5J5R-FGH1-JYYX-63NJ-00000-00&amp;amp;pdcomponentid=126171&amp;amp;ecomp=dvtg" target="_blank"&gt;LEXIS PRACTICE ADVISOR RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Privacy, Technology, and Social Media &amp;gt; Monitoring and Testing Employees &amp;gt; Articles &amp;gt; Video and Audio Surveillance and Eavesdropping of Employees &lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>Guidance for Employers on Navigating Paid Sick Leave Laws</title><link>https://www.lexisnexis.com/authorcenter/members/ashley-erazo/activities?ActivityMessageID=cc4b3c47-5f6b-4dc1-8525-04391e0de803</link><pubDate>Wed, 12 Apr 2017 16:50:23 GMT</pubDate><guid isPermaLink="false">fece22ea-7d63-4b19-bce2-c58691c9b64e:cc4b3c47-5f6b-4dc1-8525-04391e0de803</guid><dc:creator>Ashley Erazo</dc:creator><description>&lt;p&gt;This chart summarizes state paid sick leave laws and notes which states do not have such laws. It does not discuss municipal ordinances but does indicate local governments that do have such laws where there is no statewide law. This chart is intended for private employers.&lt;/p&gt;
&lt;p&gt;Note also that while no federal statute requires that employers provide paid sick leave for employees, &lt;a href="https://www.federalregister.gov/documents/2015/09/10/2015-22998/establishing-paid-sick-leave-for-federal-contractors" target="_blank"&gt;Executive Order 13706&lt;/a&gt; mandates that, effective January 1, 2017, covered federal contractors give employees up to seven days of paid sick leave each year. See &lt;a href="https://advance.lexis.com/api/permalink/9d51c28c-997a-4b2a-b8a0-7d261910701b/?context=1000522" target="_blank"&gt;80 FR 54697&lt;/a&gt;. It remains to be seen if the Trump Administration will rescind this executive order.&lt;/p&gt;
&lt;p&gt;The chart covers the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Jurisdictions that have paid sick leave laws&lt;/li&gt;
&lt;li&gt;Employers and employees who are covered under paid sick leave laws&lt;/li&gt;
&lt;li&gt;How employees accrue sick leave and when they can use it&lt;/li&gt;
&lt;li&gt;Whether unused paid sick leave carries over from year to&amp;nbsp;year&lt;/li&gt;
&lt;li&gt;Notice and posting requirements under paid sick leave laws Penalties for non-compliance&lt;/li&gt;
&lt;li&gt;For more information on sick leave requirements, see Additional Resources below.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/arizona.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/illinois.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="margin-right:20em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/oregon.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img style="padding-right:2em;" src="/lexis-practice-advisor/resized-image.ashx/__size/620x0/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-03/ds.JPG" border="0" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;The following states have no applicable state law: Alabama, Alaska, Arkansas, Colorado, Delaware, Florida, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Michigan, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Virginia, West Virginia, Wisconsin, and Wyoming&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;To find this article in Lexis Practice Advisor, follow this research path:&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/open/document/lpadocument/?pdmfid=1000522&amp;amp;pddocfullpath=%2Fshared%2Fdocument%2Fanalytical-materials%2Furn%3AcontentItem%3A5KT5-CY21-JG02-S37H-00000-00&amp;amp;pddocid=urn%3AcontentItem%3A5KT5-CY21-JG02-S37H-00000-00&amp;amp;pdcontentcomponentid=126170&amp;amp;pdteaserkey=sr0&amp;amp;ecomp=y21g&amp;amp;earg=sr0" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Attendance, Leaves,and Disabilities &amp;gt; Other Types of Leave &amp;gt; Practice Notes &amp;gt;Miscellaneous Leaves under State Law or Employer Policy&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;
&lt;table border="1" style="width:100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;NON-JURISDICTIONAL RESOURCES&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/d96f507a-6269-4de5-a3f4-6d417fa7facd/?context=1000522" target="_blank"&gt;&amp;gt; DEVISING EMPLOYEE SICK LEAVE POLICIES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/e8e11eae-7916-41b8-bc04-3b54086495e8/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Attendance, Leaves, and Disabilities &amp;gt; Attendance and Time Off &amp;gt; Practice Notes &amp;gt; Drafting Attendance and Time-Off Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/59ae6f0f-f9b2-4b47-9192-322f7c19dea5/?context=1000522" target="_blank"&gt;&amp;gt; CHECKLIST &amp;ndash; DRAFTING PAID SICK LEAVE POLICIES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/790dd20d-b013-40ca-9878-b5ab8f405436/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Attendance, Leaves, and Disabilities &amp;gt; Attendance and Time Off &amp;gt; Forms &amp;gt; Sick Leave Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/81cf6e52-aaf2-4021-9412-a53d4fa1f551/?context=1000522" target="_blank"&gt;&amp;gt; SICK LEAVE POLICY&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/790dd20d-b013-40ca-9878-b5ab8f405436/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Attendance, Leaves, and Disabilities &amp;gt; Attendance and Time Off &amp;gt; Forms &amp;gt; Sick Leave Policies&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;Additional Resources by state can be found on Lexis Practice Advisor&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://advance.lexis.com/api/permalink/a8e72c52-82be-407c-b700-ab867e90efa2/?context=1000522" target="_blank"&gt;RESEARCH PATH: Labor &amp;amp; Employment &amp;gt; Attendance, Leaves, and Disabilities &amp;gt; Other Types of Leave &amp;gt; Practice Notes &amp;gt; Complying with State and Local Paid Sick Leave Laws Chart&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>