Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the login-customizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131
The National Law Forum - Page 499 of 753 - Legal Updates. Legislative Analysis. Litigation News.

It’s H-1B Season! Employers Urged to Begin Preparation of New H-1B Visa Petitions for April 1st Filing

Michael Best Logo

On April 1st each year, United States Citizenship & Immigration Services (USCIS) begins accepting petitions from employers seeking to employ newH-1B workers during the next fiscal year. The number of available new H-1Bs is capped at 65,000 per fiscal year, with an additional 20,000 slots available to foreign nationals holding advanced degrees from U.S. institutions. This fixed number of H-1Bs available per fiscal year is known as the “H-1B cap.”

If, during the first five business days of April, USCIS receives more H-1B petitions than it is allowed to adjudicate, USCIS will randomly select H-1B petitions for adjudication among all of the petitions received during the five-day filing window. In 2014, USCIS received more than 172,000 petitions within the brief filing window; we anticipate that the number of petitions filed during this year’s five-day window will again exceed the H-1B cap. To ensure that H-1B petitions are included within the random selection process, we recommend that employers make hiring decisions for foreign national workers and job applicants as soon as possible and prepare to file petitions for new H-1B employment so that the petitions are received by USCIS on or about April 1, 2015.

In most cases, individuals who currently have H-1B status, whether with you or another employer, need not worry about the annual H-1B cap. However, other individuals, including those who are currently in F-1 (student) or J-1 (exchange visitor) status may need new H-1B petitions filed on their behalf in order to transition to H-1B employment and avoid gaps in employment authorization. Please note that the H-1B cap does not apply to employees of (i) colleges and universities; (ii) nonprofit organizations related to or affiliated with a nonprofit college or university; or (iii) nonprofit or governmental research organizations.

ARTICLE BY

Real Estate Joint Venture Tips

recent New York Times article described the increased presence of New York developers in the South Florida condominium market. The fact is that Miami real estate market has always been a seductive one for out of state developers, and the upside in the development opportunities in the South Florida real estate market simply continues to proliferate. Best of all, more interest in South Florida means more opportunities for local developers to partner with or enter into joint ventures with those venturing into this market.

As South Florida developers look to partner with real estate firms and investors to develop projects in South Florida, South Florida developers should pay particular attention to the removal provisions of the joint venture agreements or management agreements entered into with these firms and investors.  Typically, the removal of the developer should be limited to “cause,” such as  the developer committing some kind of “bad act” or materially breaching an agreement. Developers should be cautious about agreeing to any “performance standards” or similar removal triggers, which can allow a developer to be removed from the deal through no fault of its own. In connection with a breach of the agreement, developers should negotiate materiality standards and notice and cure rights. In addition, developers should negotiate the right to cure any default caused by any employee by firing that employee and having the opportunity to cure any damage caused by the employee.

Finally, the developer should make sure to have its removal conditioned on the developer being released from any guarantees related to the project or, if the release cannot be obtained, being indemnified from a credit-worthy affiliate of the joint venture partner for such guarantees. The developer should not continue to be on the hook for the project guarantees after the developer is no longer involved with the management of the project.

ARTICLE BY

OF

European Union’s New Regulation to Attach Bank Accounts Pre and Post Judgment

HMB Chartered B

Applicable as of January 18, 2017, a recently adopted European regulation facilitates cross-border debt recovery by enabling creditors to obtain a “European Account Preservation Order” (the “EAPO”) given by one judge in a member state and attach a debtor’s bank accounts in another EU member state without further court proceeding. The EAPO will enable creditors to obtain an order (i) before the creditor initiates proceedings on the merits against the debtor, (ii) at any stage during the proceedings until a judgment or settlement is entered, and (iii) after a judgment or court settlement that requires the debtor to pay a claim. Before a judgment is entered, the national courts that have jurisdiction to rule on the merits will also have jurisdiction to issue an EAPO. If the creditor has already obtained a judgment, then jurisdiction lies with the courts of the member state where the judgment was obtained.

An EAPO is an alternative remedy. The order will only be available in matters that have cross-border implications and may only serve preservation purposes. This means the debtor’s bank account is provisionally frozen and the amount seized is transferred to a dedicated account kept by the competent enforcement authority. To get the pre-judgment order, the creditor must show that he will probably obtain a favorable judgment against the debtor in the proceedings on the merits. No notice is given in seeking the order. The debtor may also not be informed of the order before it is enforced. An EAPO will not apply where claims are against a debtor in bankruptcy and where funds are exempt from attachment under the laws of the member state of enforcement.

OF

Hospital Antitrust Skirmish Over Economist

IMS_expert_blktype-transparent

Antitrust law is designed to help the Davids of the world maintain a level playing field with the Goliaths. That objective was realized when Boise, Idaho-based hospital operator St. Alphonsus Health System, Inc. (“St. Al’s”) sued rival St. Luke’s Health System, Ltd. (“St. Luke’s”), to block St. Luke’s acquisition of the Saltzer Medical Group (“Saltzer”), one of Idaho’s largest and oldest independent medical groups.

St. Al’s argued that St. Luke’s acquisition of Saltzer would give St. Luke’s such a dominant market share of the adult primary care market in Nampa, Idaho that it could raise prices and block referrals to St. Al’s by having Saltzer steer patients to St. Luke’s. St. Al’s fears certainly seemed well-founded: Saltzer accounted for 43% of the adult primary care physicians, and about 90% of the pediatric physicians in the Nampa market. Since St. Luke’s accounted for about 24% of the primary care physicians in Nampa, the combined entity would have about 67% of the adult primary care physicians in Nampa.

The Federal Trade Commission (FTC) and Idaho Attorney General (AG) launched their own investigations and ultimately joined St. Al’s lawsuit. Things didn’t go well initially for St. Al’s as the judge refused to preliminarily enjoin the acquisition, concluding that St. Al’s was unlikely to suffer irreparable harm before a trial could be held in the case. St. Luke’s proceeded to complete the transaction.

However, in January 2014, after a bench trial, the judge concluded that the deal would have anti-competitive effects in terms of raising health care costs due to the increased negotiating leverage of the combined entity. The judge directed St. Luke’s to unwind the transaction, and divest itself of Saltzer’s assets. St. Luke’s has appealed to the Ninth Circuit. At oral argument, St. Luke’s contended that the trial court had failed to adequately consider the deal’s benefits.

Along the way, the trial court had an opportunity to decide a motion by the FTC and Idaho AG to exclude the testimony of St. Luke’s economist, Dr. Alain Enthoven, concerning the quality-related benefits of the acquisition. Saint Alphonsus Med. Ctr. – Nampa, Inc. v. St. Luke’s Health Sys., Ltd., No. 1:12-CV-00560-BLW, 2013 WL 5637743 (D. Idaho Oct. 15, 2013). A major thrust of the objection was that Dr. Enthoven had not read any of St. Luke’s physician service agreements (“PSA’s”), and therefore could not credibly testify as to “whether the acquisition creates the requisite integration to achieve the purportedly greatest benefits of integrated patient care.”

The Court denied the motion. After reviewing the facts shared in the decision, the argument seems like a stretch and we feel the Court reached the right result. As the Court observed, despite not having read the PSA’s, Dr. Enthoven interviewed six top executives from St. Luke’s and Saltzer, and reviewed thirty depositions. The Court believed this effort enabled Dr. Enthoven to testify credibly concerning the quality-enhancing benefits of moving away from the fee-for-service model of compensation and toward the quality-based model of compensation.

The judge also rejected the FTC’s contention that Dr. Enthoven was unqualified to testify regarding how the use of health information technology, such as electronic medical records, promotes higher quality care in light of Dr. Enthoven’s admission at his deposition that he was not a “healthcare IT expert.” Observing that Dr. Enthoven was testifying as an economist, not a programmer, the judge ruled that Dr. Enthoven was qualified to explain how various healthcare IT tools promoted higher  quality care even if he didn’t understand the mechanics of how those tools worked. This conclusion also seems correct, and not really a close call at all.

Do you agree with our conclusion that the Court made the right call in denying the motion to exclude Dr. Enthoven’s expert testimony?

ARTICLE BY

OF

FCC to Issue Net Neutrality Rules–Federal Communications Commission

Armstrong Teasdale Law firm

In February, Federal Communications Commission Chairman Tom Wheelerwill circulate a draft order regarding Net Neutrality to his four fellow commissioners. The Net Neutrality rules will govern whether Internet service providers (ISPs), such as Comcast or Verizon, can block access to websites or give preferential treatment to traffic from websites that pay for such treatment. To sustain the rules, the commission may change the regulatory classification of broadband service, subjecting it to rules, known as Title II, that apply to traditional phone service, rather than the less restrictive Title I rules that currently cover broadband. 47 U.S.C. §§ 153–621.

This will be the FCC’s third attempt at imposing Net Neutrality obligations. The U. S. Circuit Court reversed the commission’s first two attempts, finding that the rules were inconsistent with the classification of broadband as a Title I service. Comcast Corp. v. FCC, 600 F.3d 642 (D.C. Cir. 2010); Verizon v. FCC, 740 F.3d 623 (D.C. Cir. 2014). In the most recent opinion, the court struck down two rules, one prohibiting ISPs from blocking access to websites and one prohibiting them from unreasonably discriminating against traffic from websites or applications.

In response, the FCC published a proposal to reinstate the rules with small changes to address the Court’s concerns. The proposal was roundly criticized by Net Neutrality proponents, because it did not flatly outlaw discrimination. President Obama weighed in with a statement in favor of Net Neutrality rules. Recently, Chairman Wheeler has strongly indicated that the new proposal will reclassify broadband as a Title II service and include a rule banning unreasonable discrimination. The Chairman plans to circulate a draft order to the other commissioners, giving them a chance to comment on the draft and vote on the proposal at the FCC’s open meeting on February 26.

The effect of the rules is uncertain. Rules banning discrimination have been in place for only three of the 12 years since Net Neutrality was first proposed. Even though discrimination was allowed for more than nine years of that time, ISPs have not been able to convince content providers to pay for priority treatment. The new rules may outlaw activities that the ISPs do not have the market power to engage in anyway. But the rules will give content providers comfort that the ISPs will not be able to charge them for priority service in the future.

The bigger (and more uncertain) impact will arise if the FCC reclassifies broadband as a Title II service. If this happens, the Commission will probably forbear from applying most sections of Title II to broadband.  But the FCC’s authority to forbear from applying the statute in these circumstances is uncertain. Such a  decision  will be challenged on each section of Title II and the myriad of regulations under it. Litigation will last for years. If the FCC’s decision to forbear is reversed, the ISPs may be subject to some very onerous Title II regulations, such as obligations to resell their services, obligations to sell out of tariffs, and price restrictions. The outcome could be a messy hodge-podge of regulations that apply to some services and providers but not others.

ARTICLE BY

Three Lessons for Mitigating Network Security Risks in 2015: Bring Your Own Device

Risk-Management-Monitor-Com

Not too long ago, organizations fell into one of two camps when it came to personal mobile devices in the workplace – these devices were either connected to their networks or they weren’t.

But times have changed. Mobile devices have become so ubiquitous that every business has to acknowledge that employees will connect their personal devices to the corporate network, whether there’s a bring-your-own-device (BYOD) policy in place or not. So really, those two camps we mentioned earlier have evolved – the devices are a given, and now, it’s just a question of whether or not you choose to regulate them.

This decision has significant implications for network security. If you aren’t regulating the use of these devices, you could be putting the integrity of your entire network at risk. As data protection specialist Vinod Banerjee told CNBC, “You have employees doing more on a mobile device and doing it ad hoc here and there and perhaps therefore not thinking about some of the risks that are apparent.” What’s worse, this has the potential to happen on a wide scale – Gartner predicted that, by 2018, more than half of all mobile users will turn first to their phone or tablet to complete online tasks. The potential for substantial remote access vulnerabilities is high.

So what can risk practitioners within IT departments do to regain control over company-related information stored on employees’ personal devices? Here are three steps to improve network security:

1. Focus on the Increasing Number of Endpoints, Not New Types

Employees are expected to have returned from holiday time off with all sorts of new gadgets they received as gifts, from fitness trackers to smart cameras and other connected devices.

Although these personal connected devices do pose some network security risk if they’re used in the workplace, securing different network-enabled mobile endpoints is really nothing special for an IT security professional. It doesn’t matter if it’s a smartphone, a tablet or a smart toilet that connects to the network – in the end, all of these devices are computers and enterprises will treat them as such.

The real problem for IT departments involves the number of new network-enabled endpoints. With each additional endpoint comes more network traffic and, subsequently, more risk. Together, a high number of endpoints has the potential to create more severe remote access vulnerabilities within corporate networks.

To mitigate the risk that accompanies these endpoints, IT departments will rely on centralized authentication and authorization functions to ensure user access control and network policy adherence. Appropriate filtering of all the traffic, data and information that is sent into the network by users is also very important. Just as drivers create environmental waste every time they get behind the wheel, network users constantly send waste – in this case, private web and data traffic, as well as malicious software – into the network through their personal devices. Enterprises need to prepare their networks for this onslaught.

2. Raise the Base Level of Security

Another way that new endpoints could chip away at a network security infrastructure is if risk practitioners fall into a trap where they focus so much on securing new endpoints, such as phones and tablets, that they lose focus on securing devices like laptops and desktops that have been in use for much longer.

It’s not difficult to see how this could happen – information security professionals know that attackers constantly change their modus operandi as they look for security vulnerabilities, often through new, potentially unprotected devices. So, in response, IT departments pour more resources into protecting these devices. In a worst-case scenario, enterprises could find themselves lacking the resources to both pivot and mitigate new vulnerabilities, while still adequately protecting remote endpoints that have been attached to the corporate network for years.

To offset this concern, IT departments need to maintain a heightened level of security across the entire network. It’s not enough to address devices ad hoc. It’s about raising the floor of network security, to protect all devices – regardless of their shape or operating system.

3. Link IT and HR When Deprovisioning Users

Another area of concern around mobile devices involves ex-employees. Employee termination procedures now need to account for BYOD and remote access, in order to prevent former employees from accessing the corporate network after their last day on the job. This is particularly important because IT staff have minimal visibility over ex-employees who could be abusing their remote access capabilities.

As IT departments know, generally the best approach to network security is to adopt policies that are centrally managed and strictly enforced. In this case, by connecting the human resources database with the user deprovisioning process, a company ensures all access to corporate systems is denied from devices, across-the-board, as soon as the employee is marked “terminated” in the HR database. This eliminates any likelihood of remote access vulnerabilities.

Similarly, there also needs to be a process for removing all company data from an ex-employee’s personal mobile device. By implementing a mobile device management or container solution, which creates a distinct work environment on the device, you’ll have an easy-to-administer method of deleting all traces of corporate data whenever an employee leaves the company. This approach is doubly effective, as it also neatly handles situations when a device is lost or stolen.

New Risks, New Resolutions

As the network security landscape continues to shift, the BYOD and remote access policies and processes of yesterday will no longer be sufficient for IT departments to manage the personal devices of employees. The New Year brings with it new challenges, and risk practitioners need new approaches to keep their networks safe and secure.

OF

President Obama Seeks to Strengthen and Clarify Cybercrime Law Enforcement

Covington_NL

On Tuesday, President Obama introduced a legislative proposal on privacy and data security that seeks to strengthen and clarify law enforcement’s ability to investigate and prosecute cybercrimes.

The first section of the proposed legislation would expand the definition of “racketeering activity” under the Racketeering Influenced and Corrupt Organizations (“RICO”) Act to include felony offenses under the Computer Fraud and Abuse Act (“CFAA”)—the federal anti-hacking statute.  The second section would amend existing law to deter “the development and sale of computer and cell phone spying devices.”  The third section proposes substantial changes intended to modernize the CFAA.  Finally, the proposal’s fourth section is aimed at strengthening the government’s ability to disrupt and shut down botnets—networks of computers often deployed to commit crimes, such as spreading malware.

Although much of the proposal is modeled off a similar proposal advanced by the White House in 2011, there are key differences, including making clear that it is a crime to access a computer in breach of a use restriction, while at the same time limiting the scope of liability for such access to cases that the Administration believes are serious enough to warrant prosecution under the CFAA.

Updating and Expanding the RICO Act to Include CFAA Offenses

The White House proposal would include felony violations of the CFAA in the definition of “racketeering activity” under the RICO Act.  This would provide for increased penalties for cybercrimes and afford prosecutors the ability to more easily charge certain members of organized criminal groups engaged in computer network attacks and related cybercrimes.

Deterring the Development and Sale of Computer and Cell Phone Spying Devices

The White House proposal seeks to deter the development and sale of computer and cell phone spying devices by instituting two changes.  First, the legislative proposal would amend 18 U.S.C. § 1956 to “enabl[e] appropriate charges for defendants who engage in money laundering to conceal profits from the sale of surreptitious interception devices.”  Second, it would amend 18 U.S.C. § 2513 “to allow for the criminal and civil forfeiture proceeds from the sale of surreptitious interception devices and property used to facilitate the crime.”  This would expand the scope of section 2513, which currently provides for the forfeiture of only the surreptitious devices themselves.

Modernizing the CFAA

According to the White House, the goal of the proposal’s third section is to “enhance [the CFAA’s] effectiveness against attackers on computers and computer networks, including those by insiders.”  The proposed legislation contains several key amendments to various CFAA provisions:

First, the proposal would make access in violation of certain use restrictions an illegal act under the CFAA by amending the definition of “exceeds authorized access” to include instances in which a user accesses a computer with authorization to obtain or alter information “for the purpose that the accessor knows is not authorized by the computer owner.”  Language of this sort would address, at least in part, an existing circuit split on the meaning of the language “exceeds authorized access,” as used in the CFAA.  Some commentators, however, have questioned whether the proposed language will resolve the current ambiguity over the CFAA’s reach.  For example, if an employee accessed a computer for a non-work-related purpose, it would be obvious that the employee would be violating the CFAA (as amended by the White House’s proposed language) if there were a written policy that states “company computers can be accessed only for work-related purposes.”  However, if a non-employee accessed the computer, there may not be a clear violation of the CFAA because the non-employee is not bound by—and thus would not be breaching—the employer’s policy.  As a result, the courts may still have disagreements about the scope of the phrase “exceeds authorized access” even with the new language.

The White House’s proposal would also add a new provision to the CFAA by amending 18 U.S.C. § 1030(a)—the subsection of the CFAA that lists the punishable offenses under the statute.  The added provision would provide new threshold requirements for criminal offenses resulting from users exceeding their authorized access.  The proposal would punish a user who “intentionally exceeds authorized access to a protected computer, and thereby obtains information from such computer” if one of three conditions are met: “(i) the value of the information obtained exceeds $5,000; (ii) the offense was committed in furtherance of any felony violation of the laws of the United States or of any State, unless such violation would be based solely on obtaining the information without authorization or in excess of authorization; or (iii) the protected computer is owned or operated by or on behalf of a governmental entity.”  While courts must still interpret the meaning of these conditions, they provide a clearer framework for prosecution of offenses under the statute and, in theory, would constrain the government’s ability to prosecute individuals under the CFAA for minor offenses.

Additionally, the White House proposal would amend the CFAA “to enable the prosecution of the sale of a ‘means of access’ such as a botnet.”  Further, instead of requiring the government to prove “intent to defraud” under this subsection (the intent standard applicable to violations motived by financial gain), the legislation would require prosecutors only to establish “willfulness,” so as to criminalize unlawful trafficking of access to “other types of wrongdoing perpetrated using botnets” and not just password and similar information.

The proposal would also enhance CFAA penalties and enforcement mechanisms by raising penalties for circumventing technological barriers to access a computer (e.g., hacking into or breaking into a computer), and by making such violations felonies  carrying a prison term of up to ten years.  This is a significant change from the current law, which allows for either a misdemeanor or a felony carrying a maximum prison term of only five years.  The proposal would also create civil forfeiture procedures, “clarify that the ‘proceeds’ forfeitable [under the CFAA] are gross proceeds, as opposed to net proceeds,” and in appropriate circumstances, allow for the forfeiture of real property used to facilitate offenses under the statute.  And the proposal would clarify “that both conspiracy and attempt to commit a computer hacking offense are subject to the same penalties as completed, substantive offenses.”

Shutting Down Botnets

Finally, the legislative proposal would add to existing civil remedies by explicitly providing courts with the authority to issue injunctions aimed at disrupting or shutting down botnets.  Under the proposal, the Attorney General would be authorized to seek injunctive relief under 18 U.S.C. § 1345 if the government can show that the criminal conduct alleged would affect 100 or more protected computers during a one-year period.  Criminal conduct under the proposal would include “denying access to or operation of the computers [denial of services attacks], installing unwanted software on the computers [malware], using the computers without authorization, or obtaining information from the computers without authorization.”  The legislation would also protect from liability individuals or entities that comply with courts orders and would allow courts to order the government to reimburse those individuals or entities for costs directly incurred in complying with such orders.

This post was written with contributions from Jim Garland.

ARTICLE BY

OF

Havana Hold Your Hand: Reaching Out to Cuban Entrepreneurs

Sheppard Mullin Law Firm

New regulations on Cuba enter into force today, only 29 days after President Obama promised them. The liberalized provisions focus on support for private sector actors in Cuba.

As we described here, the President announced on December 17, 2014 that his administration would release regulations liberalizing the rules on travel, financial services, remittances, and other areas. Today those provisions are a reality. Both the U.S. Departments of Commerce and Treasury issued regulations today. The Commerce Federal Register notice is available here; OFAC’s notice is available here.

CubaAs a result, the United States is now “one step closer to replacing out-of-date policies” on Cuba, said Treasury Secretary Jacob Lew. Specifically, the new regulations include these provisions:

  • New general license for exports of goods to entrepreneurs. The newly created License Exception SCP (for “Support for the Cuban People”) includes specific authorization to export to Cuba the following items so long as the items are designated as EAR99 or are controlled on the U.S. Commerce Control List for antiterrorism reasons only:

(1) Building materials, equipment, and tools for use by the private sector;

(2) Tools and equipment for private sector agricultural activity; or

(3) Tools, equipment, supplies, and instruments for use by private sector entrepreneurs.

  • General license for telecommunication equipment. License Exception SCP also permits export of items for telecommunications, including access to the Internet, use of Internet services, infrastructure creation and upgrades.

  • Financial transactions. Accepting payment for authorized exports is permitted. Under existing OFAC regulation, all transactions ordinarily incident to lawful exports are authorized.

  • Travel to Cuba: Transactions incident to travel within 12 categories are permitted, including travel for educational activities (including people-to-people travel), journalistic and religious activities, professional meetings, and humanitarian projects. The travel must fulfill all the explicit provisions of the general licenses set forth in the regulations. Travel for tourist activities remains prohibited by statute, and will not be permitted under these general licenses.

  • Travel services: Travel agents and airlines may provide authorized travel and carrier services.

  • Credit and Debit Cards: U.S. credit and debit cards may be used in Cuba for travel-related and other transactions, and U.S. financial institutions are permitted to enroll merchants and process such transactions.

  • Per Diems: The per diem limitation on authorized travelers’ spending in Cuba has been eliminated.

  • Imports: Authorized travelers may import into the United States up to $400 worth of goods from Cuba (including up to a total of $100 in alcohol or tobacco products).

  • Microfinancing: Microfinancing projects for humanitarian purposes are permitted, so long as they do not violate the existing ban on certain loans involve Cuban-government confiscated property.

  • Family remittances:  Remittances of up to $2,000 in any consecutive three-month period are now permitted.  Authorized travelers to Cuba may carry up to $10,000 in total remittances. Additionally, banking institutions, including U.S.-registered brokers or dealers in securities and U.S.-registered money transmitters, are authorized to provide services in connection with the collection or forwarding of remittances to Cuba.

  • Correspondent Accounts: U.S. depository institutions are authorized to open correspondent accounts at Cuban financial institutions to facilitate the processing of authorized transactions.

  • “Cash in Advance” Interpretation: The regulatory interpretation of “cash in advance” is revised from “cash before shipment” to “cash before transfer of title or control” to allow expanded financing options for authorized exports to Cuba.

  • Telecommunications: Transactions to provide commercial telecommunications services that link third countries to Cuba and within Cuba are generally authorized.

  • Transactions with Cuban Nationals Outside of Cuba: U.S.-owned or -controlled entities in third countries may provide, with some limitations, services (and goods) to Cuban nationals in third countries.  The accounts of Cuban nationals who have permanently relocated outside of Cuba are unblocked.

  • Insurance: A new interpretation permits the provision of health insurance, life insurance, and travel insurance and related services to authorized travelers.

Some critics in Congress have questioned the legality of the President’s actions, citing the myriad statutes that constitute the Cuban embargo (including things like the Trading with the Enemy Act, the LIBERTAD Act, and the Cuban Democracy Act). But all the new provisions published today appear carefully crafted to stay within the President’s powers, and not to fall afoul of those many statutory boundaries of the decades-old embargo. For more fundamental change, we must await legislative action.

ARTICLE BY

OF

Will The EEOC Get its Wings Clipped? Mach Mining's Challenge to the EEOC Before the Supreme Court

On Jan. 13, during oral argument, U.S. Supreme Court Justice Antonin Scalia echoed businesses’ skepticism about the EEOC’s pre-suit settlement strategy, saying  “there is considerable incentive on the EEOC to fail in conciliation so that it can bring a big­deal lawsuit and get a lot of press and put a lot of pressure on this employer and on other employers. There are real incentives to have conciliation fail.”

Justice Scalia made his comments in the case of Mach Mining L.L.C. v. Equal Employment Opportunity Commission. In the Mach Mining case, the EEOC sued the company for sex discrimination on behalf of a class of women who were denied jobs. The EEOC’s pursuit of high-profile litigation (accelerated during the Obama Administration and intended to “send a message to employers”)  is supposed to come after the EEOC has attempted to conciliate discrimination charges. But that conciliation process, and–in particular, court review of that process—is now before the Supreme Court.

By law, the EEOC is to “conciliate” cases after having found “reasonable cause” that a violation of the law has occurred, andbefore filing a lawsuit against the employer. Importantly, the language of Title VII specifically requires the EEOC to “endeavor to eliminate” alleged discrimination by “informal methods of conference, conciliation, and persuasion.”

But, after the EEOC filed suit against Mach Mining, the company accused the EEOC of failing to conciliate in good faith. The battle over the “good faith” conciliation has derailed the underlying case and for nearly two years, the case has been mired in a mini-battle about whether the EEOC has discretion on conciliation, or its conduct should be reviewed by a court. The EEOC’s position is that it has the discretion and should not be second-guessed; Mach Mining insists that “conference, conciliation, and persuasion” must be done in good faith, and subject to court review.

During the oral argument, Chief Justice Roberts said, “I am very troubled by the idea that the government can do something and we can’t even look at whether they’ve complied with the law.” Justice Kennedy noted that he couldn’t find another situation in which a court “has essentially declined to review a statutory precondition” to filing a lawsuit.

Yet, some justices were sympathetic to the EEOC’s position that companies are turning conciliation tactics into a legal strategy– to fight the EEOC about “good faith” conciliation to avoid and prolong the underlying discrimination case.

In the end, there seemed to be some agreement that judicial review of the conciliation process is appropriate, but, as Justice Breyer queried, “the issue is how much.” The lawyers and justices hinted at several options, even including directing the EEOC to issue regulations. Mach Mining and its supporters hope that the prospect of court review will cause the EEOC to be reasonable in its demands to employers before rushing to the Courthouse.

For more detailed legal analysis, visit the Supreme Court blog.

OF

Study Quantifies Agency Costs in Fuel Pass-Throughs

Lewis Roca Rothgerber

2015 American Economic Review Paper highlights the higher fuel costs passed through by regulated coal-fired power plants versus their deregulated counterparts. The paper looked at regulated power plants that have become deregulated, and found that the deregulated plants “save about $1 billion a year compared to those that remained regulated . . . because a lack of transparency, political influence and poorly designed reimbursement rates led the regulated plants to pursue inefficient strategies when purchasing coal.” The study attributes the savings to the fact that the deregulated plants have a strong incentive to shop around on price.

Interestingly, however, natural gas power plants in the study that became deregulated did not experience the same drop in fuel procurement costs:

Although power plants that burned natural gas were subject to the exact same regulations as the coal-fired plants, there was no drop in the price paid for gas after deregulation. Cicala attributed the difference to the fact that natural gas is sold on a transparent, open market. This prevents political influences from sneaking through and allows regulators to know when plants are paying too much.

There’s also a lesson about the air-quality compliance choices that utilities face at the margin:

What’s different about the buying strategy of deregulated coal plant operators? Cicala dove deep into two decades of detailed, restricted-access procurement data to answer this question. First, he found that deregulated plants switch to cheaper, low-sulfur coal. This not only saves them money, but also allows them to comply with environmental regulations. On the other hand, regulated plants often comply with regulations by installing expensive “scrubber” technology, which allows them to make money from the capital improvements.

Ultimately, Dr. Cicala draws the correct conclusion:

“Regulations are not created equal. Instead of debating for or against ‘regulation’ in general, it would be more productive to figure out how to separate the good from the bad,” said the author of the study, Asst. Prof. Steve Cicala from the Energy Policy Institute at Chicago. “If we know what forces make a regulation unsuccessful, then we can avoid designing new ones in a similar way.”