2012 Wealth Transfer Tax Laws: The Window of Opportunity is Rapidly Closing

An article by Glen T. EichelbergerMary Elizabeth MasonBridget O’Toole Purdie, and Brian P. Teaff of Bracewell & Giuliani LLP recently had an article featured in The National Law Review regarding Wealth Transfer:

The window of opportunity to take advantage of the currently applicable wealth transfer tax laws is rapidly closing, and once shut, it is possible that we may never see such generous estate planning opportunities again.

The unique estate planning opportunities currently available are a result of the “Tax Relief, Unemployment Insurance Authorization, and Job Creation Act of 2010” (2010 Act). The 2010 Act introduced the following:

  • $5,120,000 exemption per person for Federal estate, gift and generation-skipping transfer (GST) taxes
    • Highest exemptions ever available
  • 35% maximum marginal rate for the estate, gift and GST taxes
    • Lowest rate in decades
  • “Reunification” of estate, gift and GST tax exemptions
    • Greater Planning Flexibility
    • Acting together, a couple can give up to $10,240,000 of assets (outright or in trust)

In addition, President Obama’s 2013 Budget Proposal contains proposed rules which would restrict a person’s ability to transfer wealth to their children and more remote descendants. The 2013 Budget Proposal includes the following rules:

Restrict grantor retained annuity trusts (GRATs) to a minimum of 10 years

Elimination of the availability of certain valuation adjustments associated with family limited partnerships

The generous provisions of the 2010 Act are temporary and without further Congressional action, these provisions will expire on December 31, 2012.  Act now before it is too late, so that you can benefit from the current advantageous estate opportunities and ensure you are not affected by the proposed rules from the 2013 Budget Proposal.

© 2012 Bracewell & Giuliani LLP

IP Law Summit – September 13-15, 2012

The National Law Review is pleased to bring you information about the upcoming IP Law Summit:

The IP Law Summit will highlight the current challenges and opportunities through visionary conference sessions and keynote presentations delivered by your most esteemed peers and thought leaders from Americas leading corporations. The one-on-one meetings with leading service providers will offer vast expertise in the area of intellectual property law. All this, seamlessly integrated with informal networking opportunities over three days, will provide a unique interactive forum. Do not miss this opportunity to network, establish new connections, exchange ideas and gain knowledge.

Evaluating Political Candidates

The National Law Review recently published an article by the Health Government Relations Team of Drinker Biddle & Reath LLP regarding Evaluating Political Candidates:

With Election Day less than 100 days away, primary season is winding down and the candidates for the general elections (Presidential, Congressional, state, and local) in November have become more apparent. As the choices for November’s election are clearer, how does one go about evaluating the candidates? Voting is an important civic responsibility and making an informed choice when voting is essential. Below are some tips and resources to help you research candidates’ positions on issues that are of importance to you.

  • First, decide what issues and qualities are most important to you. You may deem health care, the economy, foreign policy, or something else most important, but it is essential to evaluate your priorities and stances before attempting to evaluate the candidates’ positions. Also, think about what personal qualities you think are important – past experience, previous leadership or political positions, personality, etc.
  • Visit the candidates’ websites – either their official website if they already hold office or their campaign website – to find out their positions. Candidates generally have an “issues” section where they address major policy topics.
    • To research the Presidential candidates, visit the campaign websites of Barack Obama and Mitt Romney.
    • If you do not already know who represents you in Congress, visit the U.S. House of Representatives and U.S. Senate websites and search by your zip code or state to find the Members of Congress representing your state and district. These official websites can give you an idea of issues important to each Member and past actions they have taken. Those running for reelection will also have a separate campaign website, which can be found by searching for the Member on the internet. The title of these websites is usually something such as “Eric Cantor for Congress” or “Tammy Baldwin for Senate” while the official website will generally have a title along the lines of “Rep. Eric Cantor,” “Congresswoman Tammy Baldwin,” or “Max Baucus: U.S. Senator from Montana.”
    • Likewise, to find your state representatives, your state’s official government page should have a search function to find out who represents you more locally.
    • To find out who is challenging these incumbents, either search the internet or visit a site such as the League of Women Voter’s “Vote411” site. Vote411 allows you to enter your address and find your local, state, federal district numbers, which can then be used to search for candidates running in those races.

In addition to checking out issues, official and campaign websites also usually have a biographical section, which can provide information on the candidates’ previous experience, family, and civic involvement. These personal factors may also weigh on your decision.

  • Look up candidates’ records, or any statements they have made or how they have previously voted, on your selected issues. This may be harder to find (or may not be possible) if a candidate has never held elected office before. For current U.S. House and Senate members, visit Thomas, the Library of Congress’ website, to look up cosponsorship of bills. Additionally, the “issues” section on both official and campaign websites can provide information on previous support or opposition and actions the candidate has taken on an issue. Campaign literature can also provide insight.
  • Look to see who has endorsed the candidates. Websites like Open Secrets also will provide clues as to where candidates’ campaign funding is coming from – possibly from people or organizations you trust (or disagree with).
  • Carefully consider what others – opposing candidates, the news, even your friends and relatives – say about the candidate. Monitor the news and listen to what others are saying but be on the lookout for any bias or “spin.” Be wary of any TV ad tactics appealing to emotions – look for any buried messages about issues beneath the “attacks.”
  • Finally, evaluate and match your findings with the issues and qualities you outlined as important to you. In some cases, a clear choice that matches your criteria may be evident early on in your research, other times a distinction between candidates or one candidate who obviously identifies with your views may not be as clear.

Researching candidates does not need to be an extremely time consuming activity – using the resources and tips above, look into candidates in as much or as little detail as you feel is necessary. The important thing is to make a knowledgeable choice aligned with your values going into the voting booth on November 6th!

©2012 Drinker Biddle & Reath LLP

Consumer Financial Services Basics – ABA Conference

The National Law Review is pleased to bring you information regarding the upcoming Consumer Financial Services Basics Conference sponsored by the ABA:

When

October 08 – 09, 2012

Where

American University

Washington College of Law

Washington, DC

Program Description

Facing the most comprehensive revision of federal consumer financial services (CFS) law in 75 years, even experienced consumer finance lawyers might feel it is time to get back in the classroom. This live meeting is designed to expose practitioners to key areas of consumer financial services law, whether you need a primer or a refresher.It is time to take a step back and think through some of these complex issues with a faculty that combines decades of practical experience with law school analysis. The classroom approach is used to review the background, assess the current policy factors, step into the shoes of regulators, and develop an approach that can be used to interpret and evaluate the scores of laws and regulations that affect your clients.Program FocusThis program will explain each of the major sources of regulation of consumer financial products in the context of the regulatory techniques and policies that are the common threads in a complex pattern, including:

  • Price regulation and federal preemption of state price limitations
  • Truth in lending and disclosure requirements
  • Marketing, advertising and unfair or deceptive conduct
  • Account servicing and collections
  • Regulating the “fairness” of financial institution conduct
  • Data security, fraud prevention and identity protection
  • Consumer reporting: FCRA & FACT Act
  • Fair lending and fair access to financial services
  • Remedies: regulators and private plaintiffs
  • Regulatory and legislative priorities for 2012 and beyond

Who Should Attend…The learning curve for private practitioners, in-house lawyers and government attorneys to understand the basics and changes to CFS law is very steep. This program is a great way to jump up that curve for:

  • Private practitioners with 1-10 years of experience who focus on CFS products or providers
  • In-house counsel at financial institutions and non-bank lenders
  • Government attorneys, in financial practices regulatory agencies
  • Compliance officers (who may be, but need not be, attorneys)

Illinois Employers Beware: New Law Prohibits Employers from Seeking Social Media Password Information

The National Law Review recently published an article regarding Social Media Passwords and Illinois Employers written by Norma W. Zeitler of Barnes & Thornburg LLP:

Employers in Illinois will be prohibited from seeking social networking password information from employees and applicants starting Jan. 1, 2013, now that Illinois Governor Pat Quinn has signed into law Public Act 097-0875, which is an amendment to the Right to Privacy in the Workplace Act, 820 ILCS 55/10.

As we previously reported , the legislation makes it unlawful for an employer to require an employee or applicant to disclose passwords or other related social networking account information in order for the employer to access information that might otherwise be considered private by the employee or applicant. However, employers are not barred from accessing information that is in the public domain

Illinois becomes the second state, after Maryland, to enact such a law, according to a press release from Governor Quinn’s office announcing that he signed the legislation into law on August 1. The new law does not limit an employer’s right to promulgate and maintain otherwise lawful workplace policies regarding the use of the employer’s computer equipment, Internet use, social networking site use, and electronic mail use.

Illinois employers should consider reviewing existing policies and practices with an eye toward ensuring compliance with this new law.

© 2012 BARNES & THORNBURG LLP

Chief Litigation Officer Summit – September 13-15, 2012

The National Law Review is pleased to bring you information about the upcoming Chief Litigation Officer Summit:

The Chief Litigation Officer Summit will highlight the current challenges and opportunities through visionary conference sessions and keynote presentations delivered by your most esteemed peers and thought leaders from America’s leading corporations. The one-on-one meetings with leading service providers will offer vast expertise in the area of litigation. All this, seamlessly integrated with informal networking opportunities over three days, will provide a unique interactive forum. Do not miss this opportunity to network, establish new connections, exchange ideas and gain knowledge.

Vacation Pay at Termination: What’s your Policy?

Recently W. Chapman Hopkins of McBrayer, McGinnis, Leslie and Kirkland, PLLC had an article, Vacation Pay at Termination: What’s your Policy?, featured in The National Law Review:

For many employers, the summer season brings with it an increase in employee vacations. With that in mind, now may be a good time to re-visit vacation pay policies as they pertain to employee separation. In particular, how does your company handle accrued, but unused, vacation pay at the time of separation?

Kentucky’s wage statutes expressly require employers to pay, in full, all “wages or salary earned” at the time of separation.  KRS 337.055.  The term “wages” includes “any compensation due to an employee by reason of his or her employment, including…vested vacation pay.”  KRS 337.010.  In order to know how much vacation pay must be paid at separation, it is therefore necessary to determine how much of an employee’s vacation pay has “vested.”

Based on the interplay of those two statutes, failing to include language in your employment policy addressing vesting could force you to have to litigate the issue should the employee sue to recover unpaid vacation benefits.  The best approach, therefore, is to specifically define when and how vacation pay vests.  An employment policy should articulate that annual paid vacation is earned as labor is performed throughout the year, and therefore “vests” as it is earned.  This ensures that an employee who has only worked for part of the year at separation will receive only the proportionate share of his or her vacation pay.  Considering that Kentucky courts have consistently held vacation pay to be a matter of contract between employers and employees, it may be a good idea to have employees sign an acknowledgment of the vacation pay policy.

As always, consulting your attorney and HR professional before making any changes is advisable.

© 2012 by McBrayer, McGinnis, Leslie & Kirkland, PLLC

Class Actions National Institute October 24-25, 2012

The National Law Review is pleased to bring you information about the upcoming ABA Class Actions National Institute:

Attendees of the program will:

  • Gain practical knowledge on how judges view class-action lawsuits
  • Review class-action lawsuits in the Supreme Court
  • Learn trial techniques to sharpen their skills as class-action litigators

Who should attend?

  • Attorneys who litigate class-action lawsuits
  • In-house counsel and litigators interested in learning about the current state of class actions, including recent Supreme Court class-action decisions
  • Lawyers who litigate class-certification motions

When

October 24 – 25, 2012

Where

  • Sax Chicago
  • 333 N Dearborn St
  • Chicago, IL, 60654-4956
  • United States of America

Theft of Employee Data from Third-Party Vendor Exposes Employer and Vendor to Privacy Class Action

The National Law Review recently published an article by Kevin M. McGinty of Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. regarding Employee Data Theft:

A recently-filed class action lawsuit asserts claims against the Winn-Dixie supermarket chain and a third-party vendor, Purchasing Power, LLC, in connection with the alleged theft of employee data provided to Purchasing Power in order to administer a discount purchasing program offered to Winn-Dixie employees.  The claims advanced against Winn-Dixie and Purchasing Power highlight the potential risks associated with sharing employee or customer data with third party vendors, and underscore the need for companies to ensure that the data security practices of third-party vendors are consistent with those of the companies themselves.  The complaint also demonstrates how failure to make prompt disclosure of data breaches to affected individuals can increase the risk of class action litigation.

According to the complaint in Burrows v. Purchasing Power, LLC, Case No. 1:12-cv-22800 (S.D. Fla.), Winn-Dixie either transferred or permitted Purchasing Power to access personally identifiable information (“PII”) of Winn-Dixie employees for the purpose of making a discount purchasing program available to Winn-Dixie’s employees.  The complaint alleges that Winn-Dixie notified employees on January 27, 2012 that Winn-Dixie employee data had been inappropriately accessed by an employee of Purchasing Power.  The notice further stated that Winn-Dixie first learned of the data theft in October 2011.  According to the complaint, Winn-Dixie did not explain the reason for its delay in providing notice, and Purchasing Power has never, at any time, provided notice of the breach to Winn-Dixie employees.

One unique aspect of Burrows that distinguishes it from the typical privacy class action is an allegation that the named plaintiff suffered actual injury by reason of a data breach.  Specifically, plaintiff alleges that the Internal Revenue Service refused to accept his 2011 federal income tax return, stating that a return had already been filed in his name.  Plaintiff claims that someone who had access to the PII stolen from Purchasing Power filed the return, thereby depriving plaintiff of an anticipated refund.  He seeks damages associated with the lost refund, in addition to other damages associated with the risk of further misuse of his PII.

The complaint asserts claims for negligence, violation of the federal Stored Communications Act, 18 U.S.C. § 2702, violation of the Florida Unfair and Deceptive Trade Practices Act, and breach of the common law right to privacy.  Plaintiff asserts these claims on behalf of a putative class of all Florida employees of Winn-Dixie whose PII was provided to or accessed by Purchasing Power.

The complaint in Burrows has some evident flaws.  The Stored Communications Act only applies to conduct by entities such as Internet service providers that are engaged in the “provision to the public of computer storage or processing services by means of an electronic communications system.”  18 U.S.C. § 2711(2).  Neither the defendants nor the conduct alleged facially meet this requirement.  Further, the particularized harm allegedly suffered by the named plaintiff allows defendants to argue that determining whether class members suffered actual injury would raise highly individualized questions of fact that preclude certification of a plaintiff class to seek money damages under Fed. R. Civ. P. 23(b)(3).

Nonetheless, certain aspects of Burrows pose challenges for the defendants.  Where, as here, the data breach allegedly resulted from a targeted effort to steal PII – unlike cases involving thefts of laptops, in which any data theft is incidental – courts have been more receptive to claims that class members’ costs to mitigate risk of identity theft constitute cognizable injury.  The actual injury allegedly suffered by the named plaintiff supports the argument that the threat of misuse of the stolen data is not speculative and, therefore, warrants monetary and injunctive relief.

Burrows provides a timely reminder that it is critical that any company that shares customer or employee PII with a vendor must ensure that the vendor can adequately protect such data.  Executing a written agreement specifying the company’s and the vendor’s respective data security obligations is a necessary, but not sufficient step.  The contract will not be worth the paper on which it is written if the vendor lacks the capability to comply with its obligations.  Individuals responsible for the company’s data security practices must engage in sufficient due diligence to assure the company that the vendor’s data security practices are at least commensurate with the company’s practices and otherwise comply with the legal requirements of all applicable states and jurisdictions.  In addition, to provide proper incentives to adhere to contract requirements, the agreement should indemnify the company for any losses caused by the vendor’s failure to satisfy its data security obligations.

Finally, Burrows illustrates the critical importance of prompt notification whenever a data breach occurs.  If plaintiff was indeed victimized by someone who filed a bogus return using the plaintiff’s stolen PII, notice to employees in October 2011, perhaps combined with proactive steps to protect affected employees from misuse of data, might have forestalled such an injury.  Absent such an occurrence, it is unlikely that a lawsuit would ever have been filed.  Ultimately, providing prompt notice whenever a data breach occurs avoids violating state law notice requirements and discourages the filing of class action lawsuits.

©1994-2012 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

ABA Margaret Brent Women Lawyers of Achievement Awards Luncheon – August 5, 2012

The National Law Review is pleased to bring you information about the upcoming ABA event:

The Margaret Brent Women Lawyers of Achievement Award, established by the ABA Commission on Women in the Profession in 1991, recognizes and celebrates the accomplishments of women lawyers who have excelled in their field and have paved the way to success for other women lawyers.

2012 Luncheon

Sunday, August 5th – Noon – 2:00 p.m.

Hyatt Regency Chicago in Chicago, Illinois
(ABA Annual Meeting)


Honorees

  • The Honorable Tani G. Cantil-Sakauye, Chief Justice of California, Supreme Court of California, San Francisco, CA
  • Marcia Devins Greenberger, Co-President, National Women’s Law Center, Washington, DC
  • Joan M. Hall, Retired Partner, Jenner & Block LLP, Chicago, IL
  • Arlinda Locklear, Attorney, Arlinda Locklear Law Office, Washington, DC
  • Amy W. Schulman, Executive Vice President & General Counsel of Pfizer, President of Pfizer Nutrition, New York, NY