Chris Taufatofua, Partner, Vinson & Elkins, explains how technology innovation to identify alternatives to critical minerals ...
The DOL’s fiduciary regulation will be effective on September 23 of this year. As a result, beginning on September 23 one-time recommendations to retirement investors can be fiduciary advice and, ...
In this blog post, we will focus on the identification of “high-risk AI systems” under the Artificial Intelligence Act (“AI ...
While reversing a grant of summary judgment in favor of an employer based on the de minimis doctrine, the Ninth Circuit held ...
Find this week’s updates on 340B litigation to help you stay in the know on how 340B cases are developing across the country.
When can you rely on a positive drug test to terminate an employee? If the employee suggests a reason for a false positive, like hemp use, can you still side with the drug test? The Sixth Circuit’s ...
JAMS has released its second annual global caseload statistics report. This report captures the volume and types of international matters handled in 2023, reflecting the growing demand for alternative ...
The Supreme Court issued several momentous decisions last term that will have a lasting impact on employer practices. The Justices continued to shape the workplace law landscape by ruling on an array ...
Yesterday, July 17, 2024, Pennsylvania joined more than 30 states that have enacted anti-SLAPP laws, providing protection to journalists and media outlets from meritless claims. Pennsylvania’s new ...
On June 17, the Department of Justice (DOJ) announced settlements of alleged False Claims Act (FCA) violations associated with cybersecurity requirements in contracts to provide a secure environment ...
SpaceX is challenging whether the National Labor Relations Board should continue to exist as we know it. In two separate lawsuits, the aerospace company has asked a federal court to strike down the ...
On July 17, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) issued an Alert adding three vulnerabilities to its Known Vulnerabilities Catalog. The three vulnerabilities related to ...