Blogs
Clock 3 minute read

The Court has decided the latest in a series of important cases interpreting the reach of the Federal Arbitration Act (FAA), 9 U. S. C. §§ 1 et seq.

On March 31, in Badgerow v. Walters, by an 8-1 majority (opinion written by Justice Kagan, and a lone dissent by Justice Breyer), the Court reversed an order of the Fifth Circuit and held that the federal courts do not have authority to “look through” an arbitration dispute for a federal question that would establish jurisdiction to confirm or deny an arbitral award.

Blogs
Clock 3 minute read

The Court issued opinions in two cases today, both interesting in their particular factual circumstances, but neither controversial, with one unanimously decided and the other with a lone dissent.

Blogs
Clock less than a minute

In an unsigned per curiam order, the Court today reversed a decision of the Supreme Court of Wisconsin that, in a dispute about the assignment of the number of so-called minority-majority districts, chose an electoral map drawn by the governor over several other such proposals. Wisconsin Legislature v. Wisconsin Election Commission.

Blogs
Clock 6 minute read

On March 15, 2022, President Biden signed into law the 2022 Consolidated Appropriations Act containing the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (the “Cyber Incident Reporting Act”). While President Biden’s remarks highlighted the $13.6 billion in funding “to address Russia’s invasion of Ukraine and the impact on surrounding countries,” the 2022 Consolidated Appropriations Act contained numerous other laws, including the Cyber Incident Reporting Act, which should not be overlooked. The Cyber Incident Reporting Act puts in motion important new cybersecurity reporting requirements that will likely apply to businesses in almost every major sector of the economy, including health care, financial services, energy, transportation and commercial facilities. Critical infrastructure entities should monitor the upcoming rule-making by the Cybersecurity and Infrastructure Security Agency (“CISA”), as the final regulations will clarify the scope and application of the new law.

Blogs
Clock less than a minute

On a single evening, William Dale Wooden went on a spree, burglarizing 10 units in the same storage facility. The question resolved in the Supreme Court’s somewhat unanimous decision in Wooden v. United States is whether, under the Armed Career Criminal Act, 18 U. S. C. §924(e)(1) (ACCA), Wooden’s prior convictions were for offenses occurring on different “occasions,” because the burglary of each unit happened at a distinct point in time, rather than simultaneously. All of the Justices (Kagan, J., writing the definitive majority opinion) agreed that the answer is “no.” Convictions arising from a single criminal episode can only count once under ACCA.

Blogs
Clock 7 minute read

Recently I was going back and forth with a colleague about training programs for our developing lawyers. This colleague, a respected friend, looked at the list I proudly provided of the various advocacy, writing, presentation and positioning lessons filling the educational schedule, and responded with the pith of perception “Not a word about listening.” I immediately saw the gap absent in my perception only moments before. And, I knew the truth of which Oliver Wendell Holmes (not the judge, but the judge’s father) wrote in Chapter X of The Poet At The Breakfast Table (1872), when he said "It is the province of knowledge to speak. And it is the privilege of wisdom to listen." What a great lesson for lawyers, especially trial lawyers, to remember.

Blogs
Clock 3 minute read

The Supreme Court decided two more cases today, one unanimously, the other anything but so.

Yesterday, in United States v. Zubaydah, the Court upheld the government’s assertion of the state secrets privilege, rejecting an al Qaeda terrorist leader’s discovery request for information concerning his torture by the CIA. The Court continued its interest in the privilege in today’s unanimous opinion, authored by Justice Alito, in Federal Bureau of Investigation v. Fazaga.

Blogs
Clock 5 minute read

The Court has decided two important cases today, United States v. Zubaydah, upholding the government’s assertion of the state secrets privilege and rejecting the al Qaeda terrorist leader’s discovery request for information concerning his torture by the CIA, and Cameron v. EMW Women’s Surgical Center, P.S.C., allowing the intervention of the Kentucky attorney general to assume the defense of the state’s abortion law after the official who had been defending the law decided not to seek further review. Both cases are, at root, about significant issues of public interest and policy—the torture of terrorists and restrictive abortion policies—but neither opinion resolves any such question. Indeed, the lessons learned from each of these cases are essentially procedural, and though the outcomes are determined by significant margins, the alliances of Justices on the multiple opinions published are also instructive.

Blogs
Clock 6 minute read

Interesting question: Can someone trademark another person’s name without that person’s consent? The answer to that is usually “no,” but, hey, we would not be the first people to say that we live in interesting times. And if we said that, we would not be infringing on anyone’s rights. That aside, the answer to the first question this week is “yes,” at least when the person is a public figure, and the trademark is viewed as an exercise of free speech critical of that public figure.

Blogs
Clock 6 minute read

The U.S. Cybersecurity and Infrastructure Agency (CISA) has urged a “Shields Up” defense in depth approach, as Russian use of wiper malware in the Ukrainian war escalates. The Russian malware “HermeticWiper” and “Whispergate” are destructive attacks that corrupt the infected computers’ master boot record rendering the device inoperable. The wipers effectuate a denial of service attack designed to render the device’s data permanently unavailable or destroyed. Although the malware to date appears to be manually targeted at selected Ukrainian systems, the risks now escalate of a spillover effect to Europe and the United States particularly as to: (i) targeted cyber attacks including on critical infrastructure and financial organizations; and (ii) use of a rapidly spreading indiscriminate wiper like the devastating “NotPetya” that quickly moves across trusted networks. Indeed, Talos researchers have found functional similarities between the current malware and “NotPetya” which was attributed to the Russian military to target Ukranian organizations in 2017, but then quickly spread around the world reportedly resulting in over $10 billion dollars in damage.[1] The researchers added that the current wiper has included even further components designed to inflict damage.

Search This Blog

Blog Editors

Recent Updates

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Commercial Litigation Update posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.