Contributor Page
DLA Piper Rudnick Gray Cary
 
Email  |  Articles
Contact Details
Tel: +1 410 5804660
Fax: +1 410 5803001
6225 Smith Avenue
Baltimore
Maryland
21209-3600
United States
By Henry Lesser
The tender offer is an acquisition structure frequently identified with hostile takeover bids because it does not require a negotiated acquisition agreement approved by the target's board of directors.
By Jeffrey Shohet
The Federal Trade Commission has announced that Valassis Communications, a public company, has settled charges that it used its quarterly earnings call to attempt to collude with its only competitor.
By Lisa Prager, Joshua Holzer
After March 9, 2006, Section 402 of the Act amended IEEPA by increasing the penalties for both civil and criminal violations. Now, each willful violation of a license, order, or regulation issued under IEEPA carries with it a possible maximum civil penalty of $50,000, up from the previous level of $10,000.
By Barry Heller, John Dwyer
When a party contests the enforceability of an agreement containing an arbitration clause, should the issue be determined by an arbitrator or a court?
By John Tifford
The Federal Trade Commission will shortly publish in the Federal Register a Notice of Proposed Rulemaking for the FTC’s long-awaited business opportunity rule (Bus Opp Rule). The Bus Opp Rule, if and when promulgated, will replace the business opportunities coverage under the current and proposed amended Franchise Rule.
By Steven Shimberg
Throughout the world, dedicated teams of scientists and engineers at companies large and small are making remarkable progress as they work to realize the potential of nanotechnology. As companies invest resources in the development of this promising technology, they should not ignore the need to navigate around the legal and policy potholes that will become larger and more significant with each new success in the laboratory.
By Dov Grunschlag
The federal Computer Fraud and Abuse Act (CAFA), the "anti-hacker" law, prohibits the unauthorized transmission of a program, information, code, or command intended to impair the integrity or availability of data on a computer.
By Alisa Bergman, Alisa Bergman
On March 15, 2006, the Federal Trade Commission (Commission or FTC) published its decision to retain its Children’s Online Privacy Protection Rule (Rule) in its current form. This decision followed a review of the Rule in which the public was invited to comment
By John Veroneau, John Veroneau
Asian investors in America, beware: The U.S. Congress is mulling tighter controls on foreign direct investment. This time, it’s serious.
By John Veroneau, John Veroneau, Katherine Mueller, Katherine Mueller, Katherine Mueller, Katherine Mueller
China’s World Trade Organization (WTO) accession agreement includes two safeguards that allow WTO members, under certain conditions, to restrict the quantity of imports specifically from China. One safeguard—limited to textile and apparel products— has been used by both the United States and the European Union in recent years.
By Paul Novak, Paul Novak, Leeann Kelly-Judd, Leeann Kelly-Judd, Leeann Kelly-Judd, Leeann Kelly-Judd, Edward Levin, Edward Levin, Edward Levin, Edward Levin
Under the Uniform Commercial Code (the UCC) in effect before July 1, 2001 (the Old UCC), financing statements filed in Maryland were effective for 12 years. Secured parties that filed financing statements in Maryland under the Old UCC would not have needed to continue those filings for 12 years.
Contributor's Topics
More...