Dean: Law Schools Use Merit Scholarships To Boost Rankings
White House, Senate Reach Compromise that Brings NLRB & CFPB Appointments Near
Stealth Lawyer: Ruchi Bhowmik, Deputy Cabinet Secretary
President Obama Appoints Three Members to NLRB, but Will They Be Confirmed?
What You Need to Know About New Secretary of Labor Thomas Perez
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
As Expected, Noel Canning v. NLRB Headed to the Supreme Court
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Obama Administration Calls for Free Access to Federally Funded Research
How to Respond to President Obama's Cybersecurity Executive Order
$300 Million Dairy Settlement Will Bring Reform, Lawyer Says
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
A New World for Mortgage Banking – What You Need to Know About the CFPB’s Final Mortgage Servicing Rules
Should Wall Street Fear Mary Jo White?
What Next for the NLRB?
Same-Sex Marriage Cases in 90 Seconds
Obama's SCOTUS Shortlist
What to Expect from the Supreme Court During Obama’s Second Term
In January 2017, the President's Council of Advisors on Science and Technology (PCAST) issued a report to then President Barack Obama titled "Ensuring Long-Term U.S. Leadership in Semiconductors."1 The report assesses the...more
Throughout the eight years of the Obama administration, the development and implementation of economic sanctions was a key element of U.S. foreign and national security policy. This strategy continued into the post-election...more
President Obama issued an executive order on December 2, 2016 blocking the sale of the U.S. business of Aixtron SE (“Aixtron”), a German semiconductor manufacturer, to a German subsidiary of a Chinese fund, Fujian Grand Chip...more
Former U.S. Secretary of State, Madeleine Albright, sent the below message to the White House ahead of President Obama’s remarks at a U.N. Refuge Summit: I came to the United States as a refugee when I was 11 years old....more
On August 11, 2015, a group of 19 U.S. business groups, including the U.S. Chamber of Commerce and the US-China Business Council, sent a letter to President Barack Obama urging him to push China to change its cybersecurity...more
On June 4, 2015, President Obama and his administration signed into law the U.S.A. Freedom Act, which “reform[s] the authorities of the Federal Government to require the production of certain business records, conduct...more
On April 1, 2015, President Obama issued a groundbreaking Executive Order (E.O.) enabling the United States to sanction persons that have (1) participated in malicious cyber-enabled activities constituting a “significant...more
Executive Order 13694 is the Obama Administration’s latest tool to combat cybersecurity threats. On April 1, 2015, President Obama declared a national emergency to address the “increasing prevalence and severity of malicious...more
On April 1, President Obama signed an Executive Order to combat the "national emergency" sparked by a rapidly evolving global cybercrime environment. The Executive Order directs the U.S. Treasury Department to impose...more
On April 1, 2015, the Obama Administration issued an Executive Order that will sanction individuals and entities that attempt, carry out or support malicious cyber-enabled activities that pose a significant threat to U.S....more
Calling cyber threats “one of the most serious economic and national security challenges to the United States” and declaring a national emergency relating to those threats, on April 1, 2015, President Obama issued an...more
On April 1, 2015, President Obama signed an executive order authorizing the first sanctions program to combat malicious cyber activity. The order permits the U.S. Department of the Treasury to freeze the assets of...more
As part of a series of measures aimed at increasing preparedness and defenses against international cyberattacks on U.S. industries and government agencies, on April 1, President Obama issued Executive Order No. 13694,...more
Obama Executive Order Targets International Cyberattacks Against U.S. with New Sanctions - New Sanctions Are Part of U.S. Escalation of Efforts to Bolster Cyber-Security: As part of a series of measures aimed at...more
Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects formal recognition that,...more
The executive order enables US government agencies to block the assets of any foreign person determined to have engaged in malicious cyber-enabled activities....more
Cyber threats are one of the U.S.’s top security threats. In just the past year, there has been a significant increase in the frequency, scale and sophistication of cyber intrusions and attacks – many of them originating...more
Nearly two years ago, Edward Snowden, a contractor working with the U.S. National Security Agency (“NSA”), revealed startling details of widespread surveillance practices by the U.S. government into telephone and Internet...more
On March 9, 2015, following failed diplomatic efforts to bring Venezuela in line with its human rights commitments under international law, President Obama issued an Executive Order (E.O.) declaring Venezuela a national...more
U.S. economic sanctions, by their nature, often change without warning. Since sanctions reflect U.S. foreign and national security policy, they must evolve rapidly with world events. Often, it seems that when one door is...more
On July 15, the United States Court of Appeals for the District of Columbia Circuit ruled that the President violated the due process rights of Ralls Corporation, a U.S. company owned by two Chinese nationals when, pursuant...more
On July 15, 2014, the United States Court of Appeals for the District of Columbia remanded Ralls Corporation’s (Ralls) precedent-setting case against the Committee on Foreign Investment in the United States (CFIUS or the...more
The U.S. State and Commerce Departments have published amendments to the International Traffic in Arms Regulations (“ITAR”) and Export Administration Regulations (“EAR”) as a major step in implementing changes to export...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more