By: Kenneth D. Kleinman and Brad M. Kushner, STEVENS & LEE This article addresses strategies for responding to and defending against whistleblower complaints filed under Section 11(c) of the Occupational Safety and Health Act (the OSH Act). 1 The OSH Act...
By: Ellen MacDonald Farrell and Rachel P. Raphael Crowell & Moring Today, billions of different devices are connected to the internet, and the internet-capability of everyday objects is expected to grow exponentially in the years to come. The Internet of...
By: Marcia E. Goodman and Lori Zahalka , Mayer Brown LLP LEXIS PRACTICE ADVISOR RESEARCH PATH: Labor &Employment > Privacy, Technology, and Social Media > Navigating Social Media > Practice Notes > Understanding the NLRB’s Positions on Regulating...
By: Rebecca K. Myers , Vandenberg & Feliu, LLP LEXIS PRACTICE ADVISOR RESEARCH PATH: Business & Commercial > Commercial Contracts > Confidentiality and Non-Disclosure Agreements > Practice Notes > Confidentiality Agreements CONFIDENTIALITY...
By: Eric M. Dobrusin, Kristen L. Pursley, and Daniel P. Aleksynas , The Dobrusin Law Firm. A broad range of attorneys represent technology companies in some capacity, and therefore, potentially handle and store sensitive information related to patents or trade...
By: Angela Bozzuti Product Manager, Lexis Practice Advisor. THE CHILDREN’S ONLINE PRIVACY PROTECTION ACT AND Rule ( COPPA ) is a federal law that places parents and legal guardians in control over the collection, use, and disclosure of their children’s...
By: Mark W. Brennan , Hogan Lovells US LLP. AS THE USE OF MOBILE DEVICES SUCH AS SMARTPHONES and tablets has become increasingly prevalent, mobile applications (mobile apps or apps) have also proliferated. Consumers use mobile apps to access social networks,...
By Mark W. Brennan , Hogan Lovells US LLP The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), 15 U.S.C. §§ 7701–7713 , imposes a number of detailed requirements on persons and entities that initiate...
By: Thomas G. Maira , Reed Smith LLP. As funds raised in the 2006–2008 heyday of private equity reach the ends of their 10 year terms, there has been a surge of restructurings of those funds utilizing a stapled secondarystructure. The widely publicized...
By: Stuart H. Gelfond and Burcin Eren. THE NEW YORK STOCK EXCHANGE (NYSE) HAS SPECIFIC requirements applicable to listed companies to receive shareholder approval in connection with certain transactions, including issuing equity and convertible securities, which...
By: Linda Curtis and Andrew Cheng , Gibson, Dunn & Crutcher LLP. IN RECENT YEARS, THE NEGOTIATION OF AN ACQUISITION agreement and related acquisition financing commitment has become increasingly complicated, involving multiple parties. The buyer, of course...
By: Linda Curtis and Andrew Cheng , Gibson, Dunn & Crutcher LLP. Closing on Terms of the Purchase Agreement (Amendments) Because the buyer typically chooses specific lenders with the understanding that their commitment letter will be subject to minimal...
By: Linda Curtis and Andrew Cheng , Gibson, Dunn & Crutcher LLP. Acquisition Financing: Buyer and Seller General Perspectives It is understandable that before lenders will agree to lend millions, and sometimes billions, of dollars to fund an acquisition...
By: Linda Curtis and Andrew Cheng , Gibson, Dunn & Crutcher LLP. TAX CONSIDERATIONS—FEDERAL, STATE, LOCAL, AND foreign income taxes, as well as other types of taxes such as transfer and property taxes—are a major consideration when determining...
By: Linda Curtis and Andrew Cheng , Gibson, Dunn & Crutcher LLP. ACQUISITION FINANCINGS INVOLVE CERTAIN COLLATERAL security and intercreditor issues, including: The extent and perfection of collateral security for the borrowing The scope of guarantees...