Dewonkify – Hastert Rule

DrinkerBiddle

Term: Hastert Rule

Definition: An informal governing principle used by Republican Speakers of the House of Representatives since the 1990s to only allow bills to come up for a vote on the House floor that have support from the “the majority of the majority” of Members of Congress. In practice, if Speaker Boehner follows the Hastert Rule it would mean that he would not bring legislation for a vote unless it would have the support of the majority of the current House majority party, the Republicans.

Used In a Sentence:  “That’s what the Hastert rule is really about, Feehery, now a lobbyist and consultant, told me recently — political survival. It’s just common sense: The speaker is elected by a majority vote of his caucus; if he does things a majority of his caucus doesn’t like, they can vote him out.” From “Even the Aide Who Coined the Hastert Rule Says the Hastert Rule Isn’t Working,” by Molly Ball, The Atlantic, July 21, 2013

History: According to John Feehery, the staffer who coined the phrase, former Speaker Dennis Hastert is often credited with inventing the rule but Newt Gingrich, who preceded him as Speaker, followed it as well.

Why It’s Relevant: Following the Hastert Rule makes it is very difficult to have legislative successes if the majority caucus is divided. Speaker Boehner has invoked the Hastert Rule during the recent fiscal debates leading up to the current government shutdown.  Some suggest that the House of Representatives could pass clean (no added legislative language or provisions) legislation to reopen the government or raise the debt ceiling because most of the Democrats and 20 or so of the Republicans would vote for it, giving it enough votes to pass.  However, bringing that legislation up would violate the Hastert Rule since at this point it would not have the support of the majority of the Republicans (the majority party).

 of

Cyber Security Summit – October 22-23, 2013

The National Law Review is pleased to bring you information about the upcoming Cyber Security Summit.

cyber security

When:

Where:

Need Ideas for Your Legal Blog? Here's a Bunch

The Rainmaker Institute mini logo (1)

If there is one thing I hear over and over again from attorneys when it comes to blogging, it’s this:   “What do I blog about?”

The reason to have a blog is to establish your authority as an expert in your field of practice. You must keep your target market in mind at all times when writing a blog – it needs to be about topics your clients and prospects are interested in, providing good in-depth information on each topic (now more important than ever for SEO) that they can’t find anywhere else.

Still, the creative juices do run dry at times. Which is why it’s so great that the LexisNexis Law Marketing blog has started highlighting monthly events, anniversaries, holidays and observances that have a legal connection.

Here is their list for October/November, categorized by practice area:

Civil Rights Law:

  • October is National Disability Employment Awareness Month
  • October is Gay and Lesbian History Month
  • Oct. 14: Native American Day
  • Oct. 17: United Nations’ International Day for the Eradication of Poverty
  • Oct. 20-26: Freedom from Bullies Week
  • Oct. 21-27: Freedom of Speech Week
  • November is National American Indian Heritage Month

Corporate Law:

  • October is National Crime Prevention Month
  • October is National Cyber Security Month
  • October is National Disability Employment Awareness Month
  • Oct. 16: National Boss’s Day
  • Oct. 16: Support Your Local Chamber of Commerce Day
  • Nov. 3-9: International Fraud Awareness Week

Education Law:

  • October is National Bullying Prevention Month
  • Oct. 20-26: Freedom from Bullies Week
  • Oct. 21-25: National School Bus Safety Week

Elder Law:

  • October is Health Literacy Month
  • October is Long-Term Care Planning Month
  • October is National Organize Your Medical Information Month
  • Oct. 15: Medicare open enrollment begins
  • Oct. 20-26: National Save for Retirement Week
  • November is National Alzheimer’s Disease Awareness Month
  • November is National Family Caregivers Month
  • November is National Home Care and Hospice Month
  • November is National Long-Term Care Awareness Month
  • Nov. 1-7: National Patient Accessibility Week

Environmental Law:

  • Oct. 18: Forty-first anniversary of the passing of the Water Pollution Control Act

Estate Planning:

  • October is Long-Term Care Planning Month
  • Oct. 20-26: National Save for Retirement Week
  • November is National Alzheimer’s Disease Awareness Month

Family Law:

  • October is Antidepressant Death Awareness Month
  • October is Breast Cancer Awareness Month
  • October is Domestic Violence Awareness Month
  • October is Gay and Lesbian History Month
  • October is National Bullying Prevention Month
  • October is National Organize Your Medical Information Month
  • Oct. 17: Get Smart About Credit Day
  • November is Military Family Appreciation Month
  • November is National Adoption Month
  • November is National Alzheimer’s Disease Awareness Month
  • November is National Family Caregivers Month
  • Nov. 1: National Family Literacy Day

Health Care Law:

  • October is Antidepressant Death Awareness Month
  • October is Breast Cancer Awareness Month
  • October is Health Literacy Month
  • October is Long-Term Care Planning Month
  • October is National Organize Your Medical Information Month
  • Oct. 15: Medicare open enrollment begins
  • Oct. 17-24: Food and Drug Interaction Education and Awareness Week
  • Oct. 24-31: Prescription Errors Education and Awareness Week
  • November is National Home Care and Hospice Month
  • November is National Long-Term Care Awareness Month
  • Nov. 1-7: National Patient Accessibility Week

Insurance Law:

  • October is National Crime Prevention Month

Intellectual Property Law:

  • Oct. 29: 44th anniversary of the creation of the Internet

Labor Law:

  • October is National Disability Employment Awareness Month
  • Oct. 16: National Boss’s Day

Personal Injury Law:

  • October is Antidepressant Death Awareness Month
  • Oct. 21-25: National School Bus Safety Week
  • Oct. 24-31: Prescription Errors Education and Awareness Week

Real Estate Law:

  • October is National Crime Prevention Month

New Employee Wellness Program Rules for 2014

Poyner Spruill

Employers continue to look for ways to manage the cost of employee health care coverage as they navigate the turbulent waters of healthcare reform, and wellness programs continue to be a popular strategy.  However, adoption and expansion of these programs have been hampered somewhat by questions about their effectiveness, cost, and the risk of noncompliance with the uncoordinated web of laws and regulations governing these programs.  While evidence seems to be emerging that at least some wellness program designs can be an effective means for cost control and long-term savings due to improved health, recently issued final regulations under the Health Insurance Portability and Accountability Act (HIPAA) effective beginning in 2014 only add additional burdens to employers’ compliance efforts.

HIPAA amended ERISA to generally prohibit discrimination against individual participants and beneficiaries in eligibility, benefits or premiums based on “health status-related factors,” including physical and mental illnesses, claims experience, receipt of health care, medical history, genetic information, evidence of insurability, and disability.  However, under the wellness program exception to HIPAA group health plans may offer premium discounts, rebates, reduced co-payments and/or lower deductibles (generally referred to as ‘rewards’) to participants and beneficiaries who take part in “programs of health promotion and disease prevention.”

The final HIPAA nondiscrimination regulations, effective for plan years beginning after 2013, create two categories of programs under the wellness program exception: ‘participatory wellness programs’ and ‘health-contingent wellness programs.’

Participatory wellness programs either provide no reward  or do not condition a reward on the achievement of a health standard.  Examples of participatory wellness programs include:

  • Reimbursing all or part of the cost of a fitness center membership;
  • Reimbursing costs of participation or rewarding participation in a smoking cessation program regardless of whether the individual quits smoking; and
  • Rewarding participation in a no-cost health education seminar, a health risk assessment, or a diagnostic testing program, regardless of outcomes and without requirement for further actions.

A participatory wellness program must be available to all similarly situated individuals regardless of health status, but otherwise is not required to comply with the more strenuous requirements applicable to health-contingent wellness programs.

Health-contingent wellness programs require an individual to satisfy a standard related to a health factor to obtain a reward or require an individual to undertake more than a similarly situated individual based on a health factor in order to receive the same reward.  Health-contingent wellness programs are divided into two subcategories: ‘activity-only wellness programs’ and ‘outcome-based wellness programs.’

Activity-only wellness programs require an individual to perform or complete an activity related to a health factor in order to obtain a reward, but do not require the individual to attain or maintain a specific health outcome.  Examples of activity-only wellness programs include walking, diet, or exercise programs.  If an individual cannot participate in the activity due to a health factor, then a reasonable alternative (or waiver of the otherwise applicable standard) must be provided in order to qualify for the reward.

Outcome-based wellness programs require an individual either to attain a specific health standard or complete an activity or other requirement related to the health factor in order to obtain a reward.  These programs usually have two tiers: a measurement, test or screening, followed by a program that targets individuals who do not meet a pre-specified standard.  Examples of outcome-based wellness programs include:

  • Reward for non-tobacco use, or participate in a tobacco use cessation program; and
  • Reward for cholesterol, blood pressure or body mass index below a specified level, or take additional steps, such as complying with a prescribed plan of care or participating in a exercise program.

An individual who does not meet the specified health standard must be provided a reasonable alternative (or waiver of the otherwise applicable standard) in order to qualify for the reward.

Both activity-only wellness programs and outcome-based wellness programs must satisfy the following five additional requirements:

  • Individuals eligible for the program must be given the opportunity to qualify for the reward at least once per year.
  • The size of the reward(s) under all health-contingent wellness programs is limited to a maximum of 30% (50% for tobacco nonuse/cessation programs) of the total cost of elected coverage.
  • The program has a reasonable chance of improving the health of, or preventing disease in, participating individuals, is not overly burdensome, is not a subterfuge for discrimination based on a health factor, and is not highly suspect in the method chosen to promote health or prevent disease.
  • The full reward must be available to all similarly situated individuals and, as previously discussed, a reasonable alternative must be provided for obtaining a reward.   The plan is permitted to seek verification from the individual’s physician only that a health factor makes it unreasonably difficult or medically inadvisable for the individual to participate in an activity, and not whether the individual can satisfy a specified health standard.  Alternatives do not have to be determined in advance but must be provided upon request within a reasonable time.
  • Notice of the availability of a reasonable alternative must be provided in all plan materials that describe the terms of the health-contingent wellness program, and include contact information for obtaining the alternative and a statement that recommendations of an individual’s personal physician will be accommodated.

Add to these new rules the alphabet soup of other rules that impact wellness programs, including HIPAA privacy and security, GINA, ADA, ADEA, Title VII, FLSA, and COBRA, and it becomes clear that plan sponsors would be well-served to have even the most seemingly simple program reviewed by legal counsel for compliance.

Article By:

 of

2013 National Law Review Law Student Writing Competition

The National Law Review is pleased to announce their 2013 Law Student Writing Competition

NLR-Writing-Competition-Ad2 (1)

The National Law Review (NLR) consolidates practice-oriented legal analysis from a variety of sources for easy access by lawyers, paralegals, law students, business executives, insurance professionals, accountants, compliance officers, human resource managers, and other professionals who wish to better understand specific legal issues relevant to their work.

The NLR Law Student Writing Competition offers law students the opportunity to submit articles for publication consideration on the NLR Web site.  No entry fee is required. Applicants can submit an unlimited number of entries each month.

  • Winning submissions will be published according to specified dates.
  • Entries will be judged and the top two to four articles chosen will be featured on the NLR homepage for a month.  Up to 5 runner-up entries will also be posted in the NLR searchable database each month.
  • Each winning article will be displayed accompanied by the student’s photo, biography, contact information, law school logo, and any copyright disclosure.
  • All winning articles will remain in the NLR database for two years (subject to earlier removal upon request of the law school).

In addition, the NLR sends links to targeted articles to specific professional groups via e-mail. The NLR also posts links to selected articles on the “Legal Issues” or “Research” sections of various professional organizations’ Web sites. (NLR, at its sole discretion, maydistribute any winning entry in such a manner, but does not make any such guarantees nor does NLR represent that this is part of the prize package.)

Congratulations to our 2013, 2012 and 2011 Law Student Writing Contest Winners

Spring 2013:

Winter 2013:

Fall 2012: 

Spring 2012:

Winter 2012:

Fall 2011:

Why Students Should Submit Articles:

  • Students have the opportunity to publicly display their legal knowledge and skills.
  • The student’s photo, biography, and contact information will be posted with each article, allowing for professional recognition and exposure.
  • Winning articles are published alongside those written by respected attorneys from Am Law 200 and other prominent firms as well as from other respected professional associations.
  • Now more than ever, business development skills are expected from law firm associates earlier in their careers. NLR wants to give law students valuable experience generating consumer-friendly legal content of the sort which is included for publication in law firm client newsletters, law firm blogs, bar association journals and trade association publications.
  • Student postings will remain in the NLR online database for up to two years, easily accessed by potential employers.
  • For an example of  a contest winning student written article from Northwestern University, please click here or please review the winning submissions from Spring 2011.

Content Guidelines and Deadlines

Content Guidelines must be followed by all entrants to qualify. It is recommended that articles address the following monthly topic areas:

October 2013 Suggested Topic:

  1. Immigration Law Reform
  • Submission Deadline:  Monday, October 14, 2013

Articles covering current issues related to other areas of the law may also be submitted. Entries must be submitted via email to lawschools@natlawreview.com by 5:00 pm Central Standard Time on the dates indicated above.

Articles will be judged by NLR staff members on the basis of readability, clarity, organization, and timeliness. Tone should be authoritative, but not overly formal. Ideally, articles should be straightforward and practical, containing useful information of interest to legal and business professionals. Judges reserve the right not to award any prizes if it is determined that no entries merit selection for publication by NLR. All judges’ decisions are final. All submissions are subject to the NLR’s Terms of Use.

Students are not required to transfer copyright ownership of their winning articles to the NLR. However, all articles submitted must be clearly identified with any applicable copyright or other proprietary notices. The NLR will accept articles previously published by another publication, provided the author has the authority to grant the right to publish it on the NLR site. Do not submit any material that infringes upon the intellectual property or privacy rights of any third party, including a third party’s unlicensed copyrighted work.

Manuscript Requirements

  • Format – HTML (preferred) or Microsoft® Word
  • Length Articles should be no more than 5,500 words, including endnotes.
  • Endnotes and citations Any citations should be in endnote form and listed at the end of the article. Unreported cases should include docket number and court. Authors are responsible for the accuracy and proper format of related cites. In general, follow the Bluebook. Limit the number of endnotes to only those most essential. Authors are responsible for accuracy of all quoted material.
  • Author Biography/Law School Information – Please submit the following:
    1. Full name of author (First Middle Last)
    2. Contact information for author, including e-mail address and phone number
    3. Author photo (recommended but optional) in JPEG format with a maximum file size of 1 MB and in RGB color format. Image size must be at least 150 x 200 pixels.
    4. A brief professional biography of the author, running approximately 100 words or 1,200 characters including spaces.
    5. The law school’s logo in JPEG format with a maximum file size of 1 MB and in RGB color format. Image size must be at least 300 pixels high or 300 pixels wide.
    6. The law school mailing address, main phone number, contact e-mail address, school Web site address, and a brief description of the law school, running no more than 125 words or 2,100 characters including spaces.

To enter, an applicant and any co-authors must be enrolled in an accredited law school within the fifty United States. Employees of The National Law Review are not eligible. Entries must include ALL information listed above to be considered and must be submitted to the National Law Review at lawschools@natlawreview.com. 

Any entry which does not meet the requirements and deadlines outlined herein will be disqualified from the competition. Winners will be notified via e-mail and/or telephone call at least one day prior to publication. Winners will be publicly announced on the NLR home page and via other media.  All prizes are contingent on recipient signing an Affidavit of Eligibility, Publicity Release and Liability Waiver. The National Law Review 2011 Law Student Writing Competition is sponsored by The National Law Forum, LLC, d/b/a The National Law Review, 4700 Gilbert, Suite 47 (#230), Western Springs, IL 60558, 708-357-3317. This contest is void where prohibited by law. All entries must be submitted in accordance with The National Law Review Contributor Guidelines per the terms of the contest rules. A list of winners may be obtained by writing to the address listed above. There is no fee to enter this contest.

Who’s Afraid of Website Data Migration?

Great Jakes-logo

Does the phrase “data migration” send chills up your spine? Would the fear of moving content from your old website to a new one hold you back from pulling the trigger on a website project?

If you nodded “yes” to either of those questions, you’re not alone.

The topic of data migration can be scary for marketers. Simply put, trained communicators are not database jockeys, and the prospect of ones and zeros flying back and forth can cause discomfort. But comfort level aside, should the fear of data migration warrant the keeping of a crummy website?

What can go wrong?

Everything, right?! There’s a chance that data could get lost, or content could end up in the wrong places, causing countless hours of aggravation for the marketing department…

Or not.

Professionals who do this all the time are well practiced in the art of handling the various challenges associated with data migration. But how can marketers be assured that their migration won’t go awry

How to do data migration

Data migration is not rocket science – or magic. At its simplest, it can be summed up as matching database fields from the old website, with the new. The actual act of migrating data (also called “data mapping”) can vary in its level of difficulty, depending on the condition, structure and size of the firm’s current website database. But irrespective of how old your website is or how it was built, the basic steps involved are the same.

Here’s a simplified version of the process that we use at Great Jakes:

  1. Analysis: The first step involves requesting a “data dump” of all the text content of the website and of the headers for each data table. We analyze the data to determine how much of the migration can be automated.

    We also investigate whether it would be more practical and/or cost efficient to not automate the migration and instead configure a “data-entry” website to have the data manually moved from the old website into the new. It’s not as hard as it sounds, and it’s not unusual that we end up recommending a combination of automated data-migration and “data-entry” website methods. It all depends on how the old website’s data are formatted.

  2. Transfer setup: The next step involves planning the “field-mapping” – writing the appropriate scripts necessary to move the data into the proper fields of the new website.
  3. Migration: A month prior to delivering a finished website, we migrate the data from the old website to the new, using data from a second data dump that contains all of the most current content (text, photos, PDFs, videos, presentations, audio files, etc.).
  4. Testing: Finally, we rigorously review the data migration results to ensure that everything moved as planned.

Better the devil you know – right?

While the steps outlined are straightforward, data migration is a time-consuming but doable process. Consequently, larger websites with more data will require more time to analyze, set up, migrate and then test.

So, the best way to ensure that everything goes smoothly is to take a peek under the hood. Have a pro examine your existing website. They might find some issues, like embedded tables or miscellaneous image files tucked in strange places. You’ll probably need to make some decisions about how to migrate these items. But most likely, they’ll probably find that the hurdles to moving the content are a lot lower than you might think.

Don’t let those two little words “data migration” keep you from advancing your firm’s business goals! There’s too much to be gained from having a properly conceived website.

Article By:

 of

Federal Energy Regulatory Commission (FERC) Delays Electric Quarterly Reports (EQRs) Filing Deadline

Bracewell & Giuliani Logo

On October 10, after many weeks of speculation, the Commission issued an order extending the filing deadline of the 2013 Q3 Electric Quarterly Reports (EQRs) filings from October 31 to “a date to be determined.”  This extension follows a series of similar delays and significant technical issues associated with the revised EQR filing requirements put in place by Order Nos. 768768-A, and 770.

As part of the preparation for the new filing requirements, FERC had made available to the public an EQR Sandbox Electronic Test Site (Sandbox) that was meant to be a testing platform to help users acclimate to and prepare for the new filing requirements and system.  The Sandbox was made available on July 12 and was meant to be available until September 1.  Following the testing period, the Sandbox would be taken offline to prepare it to go live well in advance of the original October 31 filing deadline.  Commission Staff encouraged filers to utilize the Sandbox “as often as possible” and to contact Staff with questions and concerns during the planned six week testing period.  From the beginning of the testing period, there were significant and wide-ranging problems encountered with the Sandbox.  After vocal feedback from industry, the Commission extended the Sandbox availability from September 1 to September 15.  It was hoped that this extension would allow ample time to address and resolve the problems and allow filers additional time to test a functioning Sandbox.  Unfortunately, the issues were not resolved, and on September 13 the Commission extended the availability of the Sandbox “until further notice.”

Since the indefinite extension of the Sandbox availability, filers have continued to experience difficulties.  As a result of these ongoing issues, the Commission has implemented a similar indefinite extension of the filing deadline.

Article By:

 of

Information Governance in Legal – The Real Payoff is Litigation, E-Discovery, and Audit Readiness

180x180-w-tagline

Information governance (IG) in the modern day legal landscape addresses multiple functions from cyber threats, to compliance, to interdepartmental communication to document retention to e-discovery. Affecting businesses across the legal, compliance and IT realms, the ideal IG framework will insert processes and procedures into place that will allow law firms and businesses to consistently manage and asses the flow of information. Browning Marean, co-chair of the Electronic Discovery Readiness and Response Group at DLA Piper and speaker at the ARMA International 2013 Conference and Expo, offers his expertise on law firm IG and why data can and should be controlled in the legal field.

Q: What is the impact an IG framework can have on a law firm and business?

A: The impact of IG on a business in momentous. Legislation like the SarbanesOxley Act of 2002 requires that businesses have controls in place.  Law firms must keep up with the ever-increasing number of compliance regulations for their clients. In addition, the average Fortune 500 companies have 125 lawsuits at any given point. If law firms and compliance departments have control of the information, they will know where to look and be able to preserve the information during discovery. IG can therefore also serve as an organizational tool during litigation.

Q: How would you describe the relationship among technology, the law & IG?

A: There is a complicated relationship among the three entities. I believe that the computer revolution yields two classes of people, both the foot soldiers and the victims. It is the same with the practice of law– technology can cause disruption but if attorneys take advantage of technology and use it to guide their IG, they will flourish.

Q: Can you cover the top risk associated with governance gaps in litigation and e-discovery?

A:In a lawsuit, parties must produce documents during discovery. When litigation is reasonably anticipated parties will have to put a legal hold on discovery documents in electronic form, also known as e-data. If parties are unable to do so or unable to preserve the documents, they will suffer the consequences, including losing the case outright and monetary sanctions and adverse interference instructions from the courts. In that way, IG can mitigate the problems associated with the identification, preservation, collection and production of e-data.

Q: What would be some of the solutions you would recommend for this risk?

A: The amount of data that is available will be multiplied by 50 by the year 2020. The only way to accommodate all of that information is to have proper practices and policies in place. I believe law firms and business should prepare an “IT readiness program.” Organizations must look at themselves from the top-down to see what resources are available to help at each level. There is a great checklist from the Department of Justice (DOJ) that covers may aspects of how law firms and businesses can ensure that there their discovery material will remain intact, from document management systems to disaster recovery backup. In addition, I recommend that law firms and businesses maintain a record retention policy.

Q: E-discovery is one of the hot topics in the legal world. Why do you think it has become so widely covered and debated?

A: About 95% of all data is viewed in electronic form.  This means that in order to prove your side in a lawsuit, we will have to see where the evidence is based, which is usually in some kind of electronic format. We are going from an analogue world to a digital world so we must create and preserve electronically stored information (ESI) to evaluate the evidence. The pervasiveness of e-discovery has resulted in several additions to the Federal Rules of Civil Procedure as well as state laws.

Q: Can you provide a background on the evolution of e-discovery?

A: In the modern era, a series of cases in the early 2000s from federal courts established the beginning of modern e-discovery litigation.  In particular, Zubulake v. UBS Warburg LLC from the United States District Court for the Southern District of New York paved the way. Judge Shira Scheindlin presided over the case and made several ruling effectively establishing the duty of businesses and their counsel to preserve documents and refrain from practices that may result in the destruction of documents.. Through an effective IG framework, law firms and compliance departments will be able to keep up with ESI in litigation and e-discovery.

New SEC Rule Helps Entrepreneurs Raise Capital

GT Law

Start-ups, small businesses, venture capi- talists and hedge funds can for the first time in 80 years begin openly advertising to raise money in private offerings. The change by the Securities and Exchange Commission is part of the JOBS Act requirement to amend Rule 506 of Regulation D to permit general solicitation. While opening the gates for general solicitation, the SEC has simultaneously tightened rules to protect investors.

Prior to the new rules that be- came effective Sept. 23, companies seeking to sell securities to raise capital had to either register the offerings or qualify for exemptions from registration. The costs and complexities of public offerings often were beyond the reach of many small businesses. The new public solicitation rules make it possible for startups, small businesses, venture capitalists and hedge funds to search for investors via the internet, newspaper and other ads, social media and other general solicitation methodologies — previously forbidden territory. At the same time, they avoid the challenges and costs that come with the full registration process.

The new rules are complex, and ensuring compliance will invariably require advice from securities lawyers and investment bankers who can help companies raise capital safely. This includes ensuring they qualify for the traditional exemption or are in the “safe harbor” of the new rule. While this involves cost and time commitments, the new avenues for fund raising are still less complex and ex- pensive than traditional registered offerings. For example, offerings under the original Rule 506 exemption (now retained as a Rule 506(b) offering) allowed companies to raise an un- limited amount of capital from an unlimited number of accredited investors, but not from more than 35 nonaccredited investors. The new alternative, Rule 506(c), allows companies to generally solicit potential investors, gaining access to wider au- diences through solicitation and advertising methods previously unavailable – good news for startups and small companies.

Other changes require issuers to provide ad- ditional information about the 506(c) offerings and require companies using the new rule to take “reasonable steps” to ensure every inves- tor is qualified. The definition of a “reasonable step” is not clear under the new rule. It will take time to fully understand what the SEC views as a “reasonable step.” Practitioners will want issu- ers to document in their files that the companies did more than just take the investors’ word that the investors are accredited. It is generally understood that tax returns, certifications from tax accountants, review of bank account statements or other independent confirming information about potential investors will suffice to meet the “reasonable steps” standard.

Another change imposed by the new rules: a “bad actor” disqualification. This means issuers and other market participants will be disquali- fied from relying on Rule 506 when felons or other bad actors participate in Rule 506 offerings. As part of the adoption of these new rules, the SEC also voted to issue new companion rules containing stronger investor protections. Theseinclude requiring entrepreneurs who take advantage of the new general solicitation rules to (i) provide additional information about their capital raising offerings, (ii) provide more information about the in- vestors who are participating in the offerings, and (iii) require companies to file Form D with the SEC at least 15 calendar days before engaging in general solicitation and within 30 days of completing the offerings to update the informa- tion contained in the Form D and indicate that the offerings have ended.

Although it remains to be seen whether these rules will make it easier for entrepreneurs to raise money, the new rule changes will certainly allow companies to reach more potential inves- tors in a more cost-effective manner. If handled properly, entrepreneurs should have a powerful new vehicle at their disposal to support the de- velopment and growth of their companies.

This article was previously publsihed in Daily Business Review.

Article By:

 of

Will a New California Ballot Initiative Usher in the Next National Shift in Privacy Law?

Poyner Spruill

Just 10 years ago, California enacted the first breach notification law and unwittingly transformed the landscape of American privacy and data security law. To date, 45 other states, multiple federal agencies, and even local governments have followed suit. California residents may soon find themselves voting on a ballot initiative that could have an equally dramatic effect on this area of law.

computer broadcast world

The ballot initiative, known as the California Personal Privacy Initiative, is designed to remove barriers to privacy and data security lawsuits and also would promote stronger data security and an “opt-in” standard for the disclosure of personal information. Specifically, the initiative would amend the California Constitution to:

  1. Create a presumption that “personally identifying information” collected for a commercial or governmental purpose is confidential

  2. Require the person collecting such information to use all reasonably available means to protect it from unauthorized disclosure

  3. Create a presumption of harm to a person whenever her confidential personally identifying information has been disclosed without her authorization.

Notwithstanding the presumption of harm, the amendment would permit the disclosure of confidential personally identifying information without authorization “if there is a countervailing compelling interest to do so (such as public safety or protected non-commercial free speech) and there is no reasonable alternative for accomplishing such compelling interest.”

Turning first to the impact on litigation, plaintiffs have largely been unsuccessful in privacy and data security litigation because they have failed to show harm resulting from an alleged unlawful privacy practice or security breach. The obligation to show harm arises at two stages when a case is litigated in federal court: first, the plaintiff must establish that he has suffered an “injury in fact” in order to meet the requirements for Article III standing, and second, the plaintiff must satisfy the harm requirement that applies to the relevant cause of action (e.g., negligence). If the case is litigated in state court, the standing requirement does not apply, but most, if not all, privacy and data security breach class actions have been litigated in federal court.

The ballot initiative would create a presumption of harm that could allow more lawsuits to satisfy the injury-in-fact standard (step one, above) and the harm requirement for the underlying cause of action (step two, above). Without that barrier, business would be stripped of the most effective means of prevailing on a motion to dismiss for certain causes of action. And in some scenarios, business would be forced to rely on untested or tenuous defenses, making companies more likely to settle, rather than fight, previously unsustainable causes of action.

Other components of the initiative would exacerbate the uptick in litigation, including the presumption that personally identifying information collected for a commercial purpose is confidential and the requirement that organizations use reasonable measures to prevent unauthorized disclosure of that information. Plaintiffs’ claims are sometimes based on an allegation that promises made in the defendant’s privacy notice regarding security measures are deceptive. Currently, companies can protect themselves against these claims by making only conservative representations about privacy and security. But the ballot initiative could create a general duty to adopt reasonable privacy and security measures, raising the prospect that plaintiffs could more successfully pursue negligence-style claims, which companies cannot deter solely by adopting conservative privacy notices.

The initiative also employs a very broad definition of personally identifying information: “any information which can be used to distinguish or trace a natural person’s identity, including but not limited to financial and/or health information, which is linked or linkable to a specific natural person.” (The definition does not cover publicly available information lawfully made available to the public from government records.) This expansive definition would force organizations to apply stricter security to types of information that might not otherwise receive those protections. Furthermore, the definition is particularly problematic when considered in conjunction with the presumption of harm discussed above because identifiable data such as names, email addresses, and device identifiers are routinely shared by businesses without consent. If this initiative succeeds, the increased threat of litigation will incentivize businesses to default to an opt-in standard for disclosures of information.

There is, however, at least one reason to believe that the initiative may not be as detrimental to business interests as some are predicting. Showing a nominal harm for the underlying cause of action does not necessarily equate to an award of damages so, even if the ballot initiative is successful, there would in some cases remain a practical limitation on the plaintiff’s ability to recoup money damages. Where statutory damages are available, or where a plaintiff can show some actual monetary harm, money awards would be possible. But in cases where statutory damages are not available and a plaintiff must show actual monetary harm to procure a monetary award, the ballot initiative may not save such claims. For example, the damages award flowing from a negligence claim is generally based on the actual damages incurred by a plaintiff. Therefore, even if the plaintiff could state a cause of action for the purpose of defeating a motion to dismiss, the plaintiff may not be entitled to anything more than a nominal damages award if the plaintiff cannot demonstrate monetary damage such as the cost of credit monitoring, identity theft insurance, or perhaps even therapy bills. On the other hand, courts could interpret the amendment as requiring recognition of a new type of harm, similar to emotional distress, that is compensable through money damages—even without a showing of some concrete financial harm to the plaintiff.

The ballot initiative’s proponents must obtain 807,615 signatures before Californians would have the opportunity to vote on it. If the signatures are collected, then the initiative will appear on the ballot without further opportunity to seek amendments to address business concerns. If the initiative appears on the ballot, it would require only a simple majority vote to pass. Interested organizations should work to ensure that public debate over the initiative includes a discussion of the heavy burden on business that could result from the initiative.

 
 of