Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the login-customizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131
The National Law Forum - Page 460 of 753 - Legal Updates. Legislative Analysis. Litigation News.

Failure to Investigate Could Mean “Game-Set-and-Match” for EB-5 Investors: SEC Case against Brother-in-Law of Tennis Star Andre Aggasi Shows Risk for Would-be Immigrant Investors

On August 25, 2015, the U.S. Securities and Exchange Commission (SEC) filed a civil fraud suit against Lobsang Dargey, a Bellevue, Washington-based real estate developer and alleged fraudster, who also happens to be a brother-in-law of tennis star Andre Agassi. Dargey had ventured into the EB-5 Program as a developer and regional center owner, securing designation by United States Citizenship and Immigration Services (USCIS) for two regional centers, Path America SnoCo and Path America KingCo. The complaint is relevant to both investors and regional centers in the EB-5 industry, as well as to lawyers advising issuers in EB-5 offerings.

SEC-logoGOLD

Dargey has now landed in hot water for engaging in fraud and deceit in the EB-5 offering process, as well as for using related Path America companies to siphon investor funds into his own pockets. The SEC has charged him for making false and misleading statements in EB-5 offering documents, alleging that since 2012 Dargey has exploited the EB-5 Program to defraud investors seeking investment returns and a lawful path to U.S. permanent residency. Among the allegations is misappropriation of $17.6 million in investor funds.

Summary of the SEC’s Complaint

The SEC alleges that Dargey, through his solely owned and controlled entity Path America, LLC, had diverted to himself and for his own personal benefit millions of dollars he had raised from Chinese nationals for EB-5 projects sponsored by Path America-owned regional centers. Path America had raised money for projects including the proposed Potala Farmers Market (a hotel, apartment and retail project in Everett, Washington), as well as the Potala Tower (a proposed 440 foot, 40-story hotel-and-apartment tower) in Seattle. Path America serves as the managing member of both USCIS designated regional centers and had unfettered control over the entire EB-5 investment process for the offerings.

In bringing the suit, the SEC also obtained a temporary asset freeze against Dargey and numerous related corporate defendants to prevent Dargey from pursuing his recently-announced plans to raise an additional $95 million from investors. According to the SEC, Dargey spent some of the siphoned funds on a $2.5 million home in Bellevue as well as at various gambling casinos. He also diverted EB-5 funds to projects that were unrelated to those disclosed in his offering documents to investors, meaning that the green card petitions pursued by EB-5 investors would be infirm.

A Path to America Fraught with Securities Fraud

The Path America case raises questions about investments buttressed by stories that seem to-good-to-be-true: Dargey left his Tibetan homeland and goat-herding profession in 1997 to pursue opportunities in the United States, as a house painter though he didn’t speak a word of English, and later rose to become a successful real estate developer. Dargey’s personal biography was almost certainly a lure to investors, and he conditioned the EB-5 market with his life story. In the media, Dargey touted his personal journey from Buddhism to capitalism, creating a background narrative for his real estate ventures and perceived success. Dargey’s story should caution investors to thoroughly examine the organizations backing the EB-5 projects in which they invest despite any personal affinity or connectivity with the background of a project promoter. Although the SEC has not directly asserted that this case involved affinity fraud, it is clear that Dargey targeted Chinese investors who may have felt an affinity with him. This is a common tactic employed by a schemer in affinity fraud.

If true, the allegations levied by the SEC make a strong case against Dargey for securities fraud, which is at the heart of the complaint. An element of any claim of securities fraud is the defendant’s state of mind, specifically, whether the defendant acted with “scienter” or “fraudulent intent.” Frequently, aggrieved investors in actions to recover their investment losses have tried to establish scienter by pointing to a defendant’s “motive and opportunity” to commit fraud. The Dargey case illustrates how control of numerous related entities involved in this EB-5 financing program may give a defendant ample “opportunity” to siphon off investor funds and commit fraud, while keeping investors in the dark about material changes to how he used investor funds. Nine different corporate entities were named as defendants in this case, and, according to the SEC’s Complaint, Dargey maintained control over all of them to such a degree that he was able to repeatedly transfer funds between the entities and into accounts that he controlled, eventually withdrawing large sums of cash which he used to gamble and purchase real estate. A quick records search on the State of Washington’s Secretary of State’s corporate records database reveals that Dargey (or a member of his executive team listed on his company website) is in fact the registered agent for each of these companies.

The Dargey case serves as a reminder to investors in EB-5 regional center projects (or any other investment vehicle) to be thorough and circumspect in evaluating the organizational structure of any enterprises set up to achieve the advertised goals, particularly where numerous inter-related projects are involved and particularly where the entire enterprise appears to be under the control of just one individual. Unlike Mr. Dargey’s rags-to-riches success story, some opportunities are just too good to be true.

Related Party Transactions Can Be Traps for Unwary EB-5 Regional Centers and Issuers

Regional centers and issuers of EB-5 investments should also consider carefully the lessons in Dargey’s case about potential SEC scrutiny of related party transactions.

USCIS designated regional centers that handle investor funds and that facilitate offerings also need to be cautious, even when they think they are doing everything properly. The SEC is showing an increased interest in the EB-5 Program, and this interest appears to be here to stay.

One hot topic is related party transactions that, when improperly concealed, keep investors in the dark about the economic relationships among multiple related entities in a deal. Disclosures about related party transactions should not be buried in a Private Placement Memo (PPM), but should be identifiable and written in clear language. If a regional center, developer and general partner are essentially one and the same party in your deal, your offering could be subject to a higher level of scrutiny later particularly with respect to whether all material disclosures were properly presented in offering documents. Related party transactions require careful and robust disclosures so that investors can evaluate the substance of potential conflicts. Such disclosures belong to the total mix of information that a reasonable investor would need to know in order to make an investment decision. The omission of such disclosures can lead to litigation later with the SEC and investors.

While transparency to investors is paramount, so too is fairness. If you are conducting an offering with related party transactions, ensure that you have a commercially reasonable basis for the economics of your deal. Also have objective controls on how investor funds are managed and spent. One practice tip is to engage an auditor that provides annual or even semi-annual or quarterly reports to investors. Even regional center owners or managers who don’t engage in criminal or egregious conduct can find the SEC knocking at the door and alleging fraud when material facts in a deal are not disclosed to investors, or when there are questions about how investor funds were handled.

Another strategic tip: hire qualified securities counsel to understand what you need to disclose in your offering documents when you have a related party transaction. What constitutes a material disclosure is complex. Suffice it to say that counsel needs to be engaged in all aspects of an offering’s preparation to guide an issuer on whether disclosures are sufficient when a deal goes to market. An omission could result in allegations or findings later that offering documents contained false or misleading statements. An omission of a material fact about related party transactions can have dire consequences including rescission in favor of investors, an SEC finding of securities fraud under Section 10(b) of the 1933 Securities Act and exposure under Rule 10b-5, one of the most important rules promulgated by the SEC with respect to securities fraud. Allegations by the SEC that an issuer or regional center has made false and misleading statements in an offering process can lead to assets being frozen and costly civil fraud litigation, particularly where the SEC can show opportunity to commit fraud through related party dealings.

How Can Regional Centers and Issuers of EB-5 Securities Mitigate Litigation Risks?

Every EB-5 regional center or issuer should consider adding a securities litigator to the offering team before introducing a deal into the marketplace. In the current climate, guidance on risk mitigation in an offering is critical. Having counsel involved early on during drafting sessions of an offering is an effective way to understand your disclosure obligations as you prepare a PPM. A securities litigator following the lifecycle of your offering – from inception of a business plan to closing of a deal – can serve as an excellent advisor to issuers in preventing problems and miscommunications with investors and government agencies. In the current climate, risk mitigation is an important component of EB-5 regional center business planning and operations.

Conclusion

The SEC is the ultimate referee in an EB-5 deal. Playing ball by the rules matters, especially when it comes to ensuring that material facts are disclosed to investors. Disclosures are the “sweetspot” of a PPM. A PPM without the right disclosures is about as effective as tennis racquet with no sweetspot. You’ve lost the match before the first serve.

If SEC litigation increases in the EB-5 realm, then we expect that otherwise lawabiding and compliant regional centers could be inadvertently swept up into costly litigation. This will be true even with regional centers who make a good faith effort to comply with the law. An SEC complaint against your regional center could seriously impede your ability to do business, even if you have the law and facts in your court. Therefore, now’s the time to add securities litigation counsel to your EB-5 team, if you haven’t done so already. Securities litigation counsel experienced in the purchase and sale of securities, the Foreign Corrupt Practices Act (FCPA), disputes with the SEC over what constitutes materiality in an offering, and other relevant areas can help you mitigate risk, protect investors and raise funds as you intended.

©1994-2015 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

Getting Serious about Palcohol: Powdered Alcohol

“Imagine a Margarita on a counter. And then imagine if you could snap your fingers and it would turn into powder.  That’s Palcohol….without the magic.”

So says Mark Phillips, the creator of Palcohol.  Phillips created Palcohol, a witty play on “Powdered Alcohol,” so that he could have a drink while “hiking, biking, camping and kayaking” without carrying a heavy bottle around.  According to the product’s website, “Palcohol is just a powder version of vodka, rum and three cocktails….with the same alcoholic content.” The powder is available in vodka, rum, cosmopolitan, “powderita” and lemon drop flavors.  The site discusses applications in medicine, energy, hospitality, the military, and manufacturing. Phillips’ company, Lipsmark, says the product is expected to hit store shelves later this summer.

Palcohol is sold in a flat 1-ounce pouch measuring approximately 4 inches by 6 inches.  Consumers would mix this powder into a glass of water, soda or juice to create an instant mixed drink.  Critics warn that the product’s main feature — how easy it is to store and carry — is also its biggest flaw.  For example, Dr. Pat Charles, the Superintendent of Middletown, CT Schools  stated, in support of a Connecticut ban of the product, “[t]he ability to conceal powdered alcohol is problematic for schools and law enforcement.  The ease of transporting it and the flavors proposed also make me concerned that it would lead to abuse, not just by young people but even for those of age.  This product must not be allowed to come into our state.”

After federal regulators approved Palcohol nationally in March, a number of states also moved to regulate Palcohol. According to the National Conference of State Legislatures, 39 states and Washington, D.C. have either passed bills or have bills under debate to restrict powdered alcohol.

“With packets small enough to fit into a child’s pocket, it will be harder for schools and parents to identify and confiscate this substance from our youth,” said Grace Barnett, spokeswoman for Texans Standing Tall, at a House Licensing and Administrative Procedures Committee hearing in March.  Texans Standing Tall is a nonprofit that advocates against youth drug and alcohol use.  Educators are fearful that youth may abuse powdered alcohol.  For example, NASPA, Student Affairs Administrators in Higher Education, recently hosted a series of seminars titled, “Addressing Palcohol: Comprehensive Prevention Tactics for Novel Alcohol and Substance Abuse Concern.”

State regulators have voiced concerns over the ease in which Palcohol can be inconspicuously sprinkled onto food or snuck into venues such as concert halls and stadiums. Vermont Liquor Control director Bill Goggins recently expressed this in an interview with a New York news station, adding that this feature adds to the appeal of powdered alcohol to underage individuals.

Senator Chuck Schumer (D, N.Y.) has even asked the Food and Drug Administration for an outright ban on the substance, calling it “the Kool-Aid of teenage binge drinking,” and said the product “is nearly guaranteed to promote unsafe drinking among teenagers and young adults, among others.”

Concertgoers, underage students, spiking drinks, snorting powder – can somebody please tell me what does any of that has to do with insurance?

In a post-palcohol world, consider whether any of the following are far-fetched:

  • What coverage exists for a concert venue when a concertgoer is injured by someone who ingested Palcohol that security did not confiscate, and sues the arena.  Does it matter that it is nearly impossible to control covert smuggling?

  • What claims will arise if a school finds that teens bring Palcohol to school to get intoxicated in class? Are any of them covered?

Palcohol may be a paradigm shifting product. Society is all too aware of the methods and problems of underage drinking and excessive drinking among adults.  All these current problems with alcohol are based upon a highly regulated liquid that is also hard to conceal in any material quantity.  Palcohol, and certainly additional products that will mimic Palcohol’s design, disrupts that model.  With this disruption arrives new realities of unexpected liability for companies, municipalities, schools and others.  We all know where they will turn next.

©2015 Drinker Biddle & Reath LLP. All Rights Reserved

Employers Who Permit After-Hours Work Should Exercise Caution in Light of an Anticipated Increase in Nonexempt Workers

Following the directive issued in March 2014 by President Obama, the U.S. Department of Labor published a proposed new rule in the Federal Register and is accepting comments through September 4, 2015. The new rule would extend overtime protections to nearly five million workers by raising the minimum salary threshold to $50,440 per year for employees to qualify for “white collar” exemptions in 2016, with automatic future adjustments. According to a 2013 report published by the Economic Policy Institute, in 2013 only 11 percent of salaried employees in the United States qualied for overtime pay.

If enacted, the Department of Labor’s proposed changes would raise the overtime salary ceiling for qualied employees to sweep millions of Americans into the overtime system.

Continue Reading.

© 2015 Wilson Elser

Recent IT Outsourcing Study Finds Continued Growth Led by Large Organizations

A recently released study assessing current trends in the use of IT outsourcing found that spending on IT outsourcing is rising at a rate in step with IT operational budgets as a whole, led by large organizations (those with IT operating budgets of $20 million or greater) that spend 7.8% of their IT budgets on outsourcing at the median. The study’s findings also highlight a number of trends within organizations’ IT outsourcing priorities:

  • Shifting Trends in Some IT Outsourcing Functions. The study found that the outsourcing of some IT functions is growing, while outsourcing of other functions is shrinking. For example, more organizations are outsourcing IT security, e-commerce systems, and application hosting, while fewer organizations are outsourcing help desk, desktop support, and application maintenance functions.

  • Continued Growth of Software as a Service. Application hosting was the most frequently outsourced IT function identified in the study. It found that 65% of organizations that currently outsource application hosting intend to increase the amount of work outsourced for that function.

  • Outsourcing Versus In-House. Among organizations that outsource IT functions, the study showed help desk and web/e-commerce operations were the IT functions with the largest percentage of work moved to outside service providers. Application hosting and IT security were the IT functions for which organizations tend to perform the most work in-house.

  • Potential for Cost Savings and Value. Among the functions examined by the study, outsourcing of disaster recovery and desktop support were found to have the greatest potential for reducing costs. The outsourcing of web/e-commerce, desktop support, disaster recovery, and IT security were found to deliver the best overall value for organizations by saving money and improving service levels

Copyright © 2015 by Morgan, Lewis & Bockius LLP. All Rights Reserved.

FDA’s Proposed Naming Convention for Biologics

On August 27, 2015, the Food and Drug Administration (FDA) released draft guidance on nonproprietary naming of biological products. The agency’s draft guidance proposes that the core nonproprietary name for originator biological products, related biological products, and biosimilar products be appended with a unique, four-letter suffix designated by the FDA in order to distinguish each product and minimize inadvertent substitution of products that are not interchangeable.

A New Naming Convention

The proposed framework for the naming convention includes the nonproprietary name — otherwise known as the proper name — of the originator biological product along with a designated four-letter suffix attached to the core name with a hyphen. Importantly, a related, biosimilar, or interchangeable product will share a core name with the originator biological product, but will also include a distinct four-letter suffix. This convention will indicate a relationship among the products while highlighting the unique identification of each product.

For example, two products sharing the core name of replicamab might have the following nonproprietary names:

  • replicamab-cznm

  • replicamab-hixf

The FDA has not yet decided whether the nonproprietary name for an interchangeable product should also include a unique four-letter suffix or whether it should be assigned the same proper name and suffix as its reference product. The draft guidance notes that the agency is seeking comment on these alternative approaches.

Which Products Are Covered?

The FDA’s proposed naming convention would apply both prospectively and retrospectively to biological products licensed under sections 351(a) and 351(k) of the Public Health Service Act, although the agency is still considering how the convention should apply to interchangeable products. As indicated in the draft guidance, the FDA believes that the designated suffix is warranted for both newly and previously licensed biological products in order to advance a number of goals, including (1) ensuring that patients only receive the biological products intended to be prescribed to them, (2) facilitating manufacturer-specific pharmacovigilance, (3) encouraging the routine use of designated suffixes, and (4) avoiding any inaccurate perceptions of the safety and effectiveness of biological products based on their path to licensure.

Designating a Suffix

Applicants and current license holders may propose their own suffix, which should consist of four lowercase letters devoid of any meaning. Proposed suffixes should not be promotional, include any abbreviations commonly used in clinical practice, contain or suggest the name of any drug substance, or look too similar to the name of a currently marketed product or another product’s suffix designation. The FDA will evaluate a proposed suffix and notify the applicant of its determination. Given the FDA’s previous selection of “sndz” for Sandoz’s Zarxio (filgrastim-sndz), it will be interesting to see the approach and development of these suffixes.

Comments and suggestions on the draft guidance are due by October 27, 2015, at www.regulations.gov. (Docket No. FDA-2013-D-1543).

Relatedly, the FDA issued a proposed rule to be published in the Federal Register on August 28, 2015, that would designate “the official names and the proper names” for six biological products that qualify as either a reference product, a related biological product, or a biosimilar product. As the agency explains, its proposed action with respect to the six products covered by the rule is meant to encourage the routine usage of designated suffixes.

© 2015 Foley & Lardner LLP

DOD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services

On August 26, 2015, the Department of Defense (DoD) issued an interim rule that imposes expanded obligations on defense contractors and subcontractors with regard to the protection of “covered defense information” and the reporting of cyber incidents occurring on unclassified information systems that contain such information.  Nearly three years in the making, this interim rule replaces the DoD’s prior Unclassified Controlled Technical Information (“UCTI”) Rule, imposing new baseline security standards and expanding the information that is subject to safeguarding and can trigger the reporting requirements.  Additionally, the interim rule implements policies and procedures for safeguarding data and reporting cyber incidents when contracting for cloud computing services.

© 2015 Covington & Burling LLP

Part II: Legal Insights on Ashley Madison Hack

As more names emerge from the dark web data dump of Ashley Madison customers, lawyers around the globe have found a very willing group of would-be plaintiffs. Interestingly, all of these plaintiffs are named “Doe,” which must only be a coincidence, and certainly has nothing to do with the backlash that certain well-known ALM clients have experienced. All kidding aside, the size of the claims against ALM is staggering with one suit alleging more than $500 million in damages. How these plaintiffs will prove their damages is a question for another day, but the fact that ALM — which reported earnings of $115 million in 2014 — may soon face financial ruin must give any spectator pause.

The plaintiffs’ bar is certainly not the lone specter haunting ALM’s corridors these days. Although the company touts its cooperation with government officials in attempting to bring criminal charges against the Impact Team, that cooperation will be punctuated by the all-but-certain FTC enforcement action to come — assuming that the FTC’s data breach enforcement team were not among the 15,000 email addresses registered to a .mil or .gov account.

How will that enforcement action proceed? In many cases, the FTC initiates its investigation with a letter, sometimes called an “Access Letter” or an “Informal Inquiry Letter.” Although there is no enforceable authority behind such a letter, companies typically conclude that cooperation is the best course. For more formal investigations (or when the access letter is ignored), the FTC will issue “Civil Investigative Demands,” which are virtually the same as a subpoena, and are enforceable by court order. After collecting materials, the investigators will – in order from best case scenario to worst – drop the matter altogether, negotiate a consent decree, or begin a formal enforcement action via a complaint.

There is, of course, a lot more to an action than what I’ve listed above, which deserves a series of posts of their own. For today, the pressing question is – what’s going to happen to ALM when the FTC calls? Under the circumstances, it would make sense for ALM to push as hard as it can for a consent order, given that the likelihood of succeeding in litigation against the Commission is vanishingly low – there is little doubt that ALM failed to comply with its own promised standards for protecting customer data. And, in light of recent revelations about what really happened when customers paid to “delete” their Ashley Madison accounts, ALM will want to forestall the threat of a separate, non-data breach related unfair business practices suit any way it can.

Every consent order looks different, but the FTC has made a few requirements staples of its agreements with offending businesses over the last two decades. These include:

  • Establishing and maintaining a comprehensive information security program to protect consumers’ sensitive personal data, including credit card, social security, and bank account numbers.

  • Establishing and reporting on yearly data security protocol updates and continuing education for decision makers and data security personnel.

  • Working to improve the transparency of data, so that consumers can access their PII without excessive burdens.

  • Guaranteeing that all public statements and advertisements about the nature and extent of a company’s privacy and data security protocols are accurate.

 ALM will undoubtedly offer to take all of these steps, and more, in negotiations with the Commission. But as I mentioned above, the torrent of lawsuits ALM faces in the next year or so may moot any consent decree with the FTC. If ALM liquidates in the face of ruinous lawsuits and legal bills, the FTC’s demands will be meaningless. ALM, then, is likely an example of a company that would have benefited from a more minor security breach and subsequent FTC imposition of the kind of remedial measures that may have stopped this summer’s catastrophic data breach. An ounce of prevention is worth a pound of cure, they say, and ALM may learn that lesson at the cost of its business.

© 2015 Bilzin Sumberg Baena Price & Axelrod LLP

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website — which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair — has already been named in several class action lawsuits, with claims ranging from breach of contract to negligence. As more names are unearthed (and more personal data divulged), additional lawsuits are sure to follow. For those lucky enough to be watching this spectacle from the sidelines, there are some important questions to ask. In the next few posts, I’ll consider some of these issues.

It seems clear that the Impact Team (the group responsible for breaking into Ashley Madison’s servers) were singularly focused on exposing embarrassing personal information as well as sensitive financial data. What is less clear is why they chose Ashley Madison’s parent company Avid Life Media (“ALM”) as the target. Certainly, the general public’s reaction to the data breach was muted if not downright amused, likely because the “victims” here were about as unsympathetic as they come. Still, the choice of Ashley Madison, and the way the hack was announced, demonstrates an important point about data security: self-described “hacktivists” may target secure information for reasons other than financial gain.

The Impact Team appears to be more motivated by shaming than any identifiable monetary benefit, although it is entirely possible that money was a factor. Interestingly, the intended damage from the leak was designed to flow in two directions. The first, and most obvious, was to Ashley Madison users, who clearly faced embarrassment and worse if their behavior were made public. The second direction was to ALM itself, for “fraud, deceit, and stupidity.” In particular, the Impact Team referred to ALM’s promises to customers that it would delete their data permanently, and keep their private information safe. Obviously, that didn’t happen. ALM made matters far worse for itself when it scrambled to provide a response to Impact Team’s threat, and made promises of security it could not keep. Now, in addition to a class action lawsuit alleging half a billion dollars in damages, ALM faces the wrath of a recently emboldened FTC.

One takeaway from this situation from a legal perspective is how ALM was targeted. Black hat groups often solicit suggestions for whom to attack, but typically in a secure fashion that would prevent early warning. LulzSec, responsible for the data breach at Sony Pictures in 2011, made a habit of seeking input as to what government entity or business to target, but kept those suggestions, and the contributors, secret. The Impact Team broke from that pattern, and announced before the breach, that they would release private information unless ALM shut down Ashley Madison and sister site “Established Men.” Other than a similar demand made to Sony Pictures Studios regarding the film The Interview, I can think of no other instances where hackers/hacktivists telegraphed that a cyber attack was coming.

Realizing this, a few questions immediately sprang to mind:

  • What do you do if your company gets a warning from a web group?
  • How many businesses have received such warnings and silently complied, just to avoid loss of sensitive information or damage to their reputation?
  • What happens to officers and directors who receive these warnings and do nothing? Is that a breach of fiduciary duties? Negligence? A civil conspiracy?

Ultimately, all of these questions merge into the two ongoing themes of data security: How do you protect critical information, and what do you do if you can’t?

In my upcoming articles I will get into the particulars of how some companies respond to cyberattacks, but for now, it makes sense to highlight the importance of planning ahead for your business. Even a basic cyber security protocol is better than a haphazard, post hoc response, and there are many resources that provide guidance about best practices. Longer-term planning requires expertise and commitment, but education can begin any time.

I’ll paraphrase Ashley Madison — Life is short: make a plan.

© 2015 Bilzin Sumberg Baena Price & Axelrod LLP

Federal District Court sets aside 30-Year Eagle Take Permit

On August 11, 2015, a United States District Court judge halted a years-long effort by the United States Fish & Wildlife Service (“FWS”) to smooth the federal permitting path for wind energy. Shearwater et al. v. Ashe, No. 14-CV-02830-LHK (N. D. Cal.)(August 11, 2015). Specifically, the judge set aside a rule allowing for activities such as wind energy projects to kill bald eagles and golden eagles for up to 30 years.

FWS’s efforts began back in the current administration’s first year with the first ever authorization for either individual or programmatic take permits of bald or golden eagles under the Bald and Golden Eagle Protection Act (“BGEPA”) of 1940. (Decision at p. 6) The FWS explained at the time that “the rule limits permit tenure to five years or less because factors may change over a longer period of time such that a take authorized much earlier would later be incompatible with the preservation of the bald eagle or the golden eagle.” (Decision at p. 7, citing 74 Fed. Reg. at 46,856). As explained in the court’s decision, the FWS downplayed anticipated use of the new permits for wind energy projects, stating that “the wind power facility could obtain a programmatic permit only ‘[i]f [advanced conservation practices] can be developed to significantly reduce the take’ resulting from ‘the operation of turbines.’” (Decision at p. 8, citing 74 Fed. Reg. 46,842)(emphasis supplied).

Shortly after adopting its new 5-year rule, however, there was a significant increase in wind energy projects. Decision at p. 9. In response, the FWS developed its Eagle Conservation Plan Guidance, a voluntary guidance, which introduced advanced conservation practices or ACPs for the wind energy sector, including experimental ACPs (i.e., scientifically unproven). Id.

The wind energy industry, although undoubtedly pleased to have secured a programmatic take permit for the accidental or incidental killing of bald and golden eagles, commented on the 5-year permit program, complaining that a 5-year permit was unworkable in that projects were developed for a useful life of twenty to thirty years, and the shorter permit term made financing difficult. As a result of its concern that wind energy projects were not able to get permits as a result of the uncertainty of potential future regulatory changes regarding the killing of eagles, FWS proceeded with efforts to move to a 30-year permit “as soon as possible.” Decision at p. 10. The court notes that “[a]t bottom, FWS issued the Proposed 30-Year Rule ‘[b]ecause the industry has indicated that it desires a longer permit.’” Id.(emphasis supplied).

Internal debate ensued at the FWS regarding the proposed 30-year permit rule. Despite concerns and staff opinions that an EIS would be needed to support the rule, FWS Director Dan Ashe instructed his staff not to conduct further NEPA work, that an NGO lawsuit was unlikely, and to proceed. Id. at p. 13-16. The rule was finalized and effective as of January 8, 2014. A lawsuit followed five months later.

The FWS’s efforts to accommodate wind energy development and facilitate additional permitting through its 5-year and 30-year eagle take permits appear to pre-date the recent Clean Power Plan, which notably incentivizes the development of wind and other non-emitting energy sources. The effort, though, certainly is consistent with the Clean Power Plan and this administration’s encouragement of renewable energy sources.

In its August 11th ruling, the court concluded that FWS failed to comply with NEPA, set aside the 30-year rule and remanded the rule for further consideration by FWS. During the remand of the rule, the 5-year permit should still be available as an option for applicants.

© Steptoe & Johnson PLLC. All Rights Reserved.

Uncertain Future of Extended Employment Authorization for STEM Graduates

In 2008, the Department of Homeland Security (DHS) issued an emergency regulation that added 17 months of employment eligibility to recent graduates holding student visas who received a degree in Science, Technology, Engineering and Mathematics (STEM). This 17-month period was in addition to the 12-month period of employment authorization that applies to all recent college graduates holding student immigration status.

Recently, a federal court vacated the 17 month additional employment eligibility period for STEM graduates.Washington Alliance of Technology Workers v. U.S. Department of Homeland Security, U.S. District Court, District of Columbia. The Court upheld DHS’s authority to issue the regulation but vacated the regulation itself because no notice and comment period was provided before the regulation was issued. Furthermore, the Court stayed its decision until February 12, 2016, in order to allow DHS to issue a regulation using the appropriate notice and comment process. The Technology Workers Union, which filed the lawsuit challenging the 17 month addition of employment eligibility, is appealing the case to the D.C. Circuit Court of Appeals.

The President had noted in his November 2014 announcement regarding administrative steps to improve the immigration system that DHS would issue regulations expanding the employment authorization opportunities of recent college graduates. The result in the Washington Alliance case may encourage DHS to timely issue its new regulation using a notice and comment period so as to allow people already enjoying the use of a 17-month STEM graduate employment authorization period to continue working without interruption.

A component of the President’s proposed administrative steps to improve the immigration system referenced an enhanced role for colleges/universities in ensuring a connection between a student’s field of study and the job held by the recent graduate. We do not yet know what that additional role will be, nor do we know whether the Court of Appeals will agree with the lower court with regard to the authority of DHS to allow post-graduation employment authorization or at least the extended STEM authorization. Further, we do not know whether DHS will complete its work in time to avoid a disruptive gap in regulations after February 12, 2016. Given the fact that tens of thousands of people are currently working pursuant to extended employment authorization for STEM graduates, there is great interest in bringing clarity to this issue. If you have an employee working on extended employment authorization for recent graduates, please keep an eye on developments in this area. You may need to perform an I-9 re-verification in February of 2016.