On May 16, 2016, the U.S. Supreme Court held in Spokeo, Inc. v. Robins that a bare procedural violation of a statutory requirement, divorced from any concrete harm, does not establish the injury-in-fact necessary to maintain a lawsuit in federal court.  The Court acknowledged, however, that an alleged violation of a procedural statutory right could

The FCA’s implied certification theory is based on the concept that every time a payee submits a claim to the government it has impliedly certified compliance with all contractual, statutory, and regulatory obligations, and therefore, is entitled to payment. While the courts are currently divided on whether implied certification is a valid theory of liability, the courts that

Electronic I-9 software can be very attractive to companies looking for efficiency and ensuring compliance. Not to mention the elimination of file drawers that once housed these voluminous paper I-9 files. However, buyers beware, not all electronic I-9 software meets the federal regulations’ requirements. And the problem for well-meaning companies: ICE will still hold the

We originally wrote in 2014 about charges that had been brought in September of that year by the UK’s Serious Fraud Office against the French Multinational’s UK subsidiary, Alstom Network UK Ltd, and two former employees and British nationals for corruption offences (under pre-Bribery Act era legislation) relating to transport projects in India, Poland, and Tunisia.

The False Claims Act’s “public disclosure bar” calls for dismissal of complaints by qui tam plaintiffs (or “relators”) whose allegations have already been publicly disclosed. The primary aim of the bar is preventing parasitic suits based on public information. Courts generally agree that disclosure to the government alone does not count as disclosure to the

On March 2, 2016, the Consumer Financial Protection Bureau (CFPB) filed the first consent order (Order) addressing data privacy since the CFPB’s inception in 2010. The Order serves as a warning to all companies that collect, store and use sensitive customer information that misrepresentation of security practices, as well as noncompliant data protection procedures, will