<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Legal Intelligencer Tag Archives &#8212; Kang Haggerty News</title>
	<atom:link href="https://www.khflaw.com/news/tag/legal-intelligencer/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Published By Kang Haggerty LLC</description>
	<lastBuildDate>Wed, 08 Apr 2026 23:42:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Legal Intelligencer: Taking a Plaintiff’s Case to the Next Level, Part II: It Does Not Always Take Two—Why Naming Individuals as Defendants Is Not Always the Best Strategy</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-taking-a-plaintiffs-case-to-the-next-level-part-ii-it-does-not-always-take-two-why-naming-individuals-as-defendants-is-not-always-the-best-strategy/</link>
		
		<dc:creator><![CDATA[Edward T. Kang and Kandis Kovalsky]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 23:32:11 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7309</guid>

					<description><![CDATA[While suing individual owners, officers, or directors alongside their corporate entities can work to a plaintiff’s advantage, this strategy carries a distinct risk: juries may personalize the corporate defendants, leading to smaller verdicts. In the March 26, 2026 edition of The Legal Intelligencer, Edward Kang and Kandis Kovalsky co-authored, &#8220;Taking a Plaintiff’s Case to the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>While suing individual owners, officers, or directors alongside their corporate entities can work to a plaintiff’s advantage, this strategy carries a distinct risk: juries may personalize the corporate defendants, leading to smaller verdicts.</em></p>
<p>In the March 26, 2026 edition of <a href="https://www.law.com/thelegalintelligencer/">The Legal Intelligencer</a>, Edward Kang and Kandis Kovalsky co-authored, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/03/26/taking-a-plaintiffs-case-to-the-next-level-part-ii-it-does-not-always-take-twowhy-naming-individuals-as-defendants-is-not-always-the-best-strategy/">Taking a Plaintiff’s Case to the Next Level, Part II: It Does Not Always Take Two—Why Naming Individuals as Defendants Is Not Always the Best Strategy</a>.&#8221;<span id="more-7309"></span></p>
<div class="mb-4">
<div class="article-font-size">
<p>A month ago, we published a <a href="https://www.khflaw.com/news/legal-intelligencer-taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/">column</a> about a topic we are passionate about, particularly in our qui tam practice: holding individuals liable for their misconduct alongside corporate defendants. But naming individuals alongside corporate entities is not always the optimal strategy for achieving the result your plaintiff-client deserves. Knowing when to name an individual as a defendant—and when not to—is essential, especially in matters destined for a jury rather than a bench trial. While suing individual owners, officers, or directors alongside their corporate entities can work to a plaintiff’s advantage, this strategy carries a distinct risk: juries may personalize the corporate defendants, leading to smaller verdicts.</p>
<p>As we discussed in our recent <a href="https://www.khflaw.com/news/legal-intelligencer-taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/">column</a>, if a plaintiff names an individual defendant under Pennsylvania’s participation theory, a necessary prerequisite is that the individual actually participated in the wrongful conduct. See <i>Wicks v. Milzoco Builders,</i> 470 A.2d 86 (Pa. 1983). But beyond that threshold requirement lie critical strategic considerations about case presentation at trial—particularly jury trials—that determine whether naming an individual is wise.</p>
<p><b>The Juror Psychology of Corporate versus Individual Defendants</b></p>
</div>
</div>
<div class="mb-4">
<div class="article-font-size">
<p>It is no secret that jurors, particularly those in Philadelphia, often view corporations with skepticism and are willing to return substantial verdicts against them, especially when those corporations have deep pockets. In October 2019, a Philadelphia jury awarded $8 billion in punitive damages against a Johnson &amp; Johnson subsidiary for illegally marketing the antipsychotic drug Risperdal, exposing young boys to the risk of developing gynecomastia. No comparable award against an individual defendant comes close. (The Risperdal award was later reduced by a judge to $6.8 million, but the initial verdict underscored juror sentiment toward large corporations.)</p>
<p>Empirical data support this intuition. In 1989, Valerie P. Hans and David M. Ermann conducted a landmark study presenting mock jurors with identical factual scenarios involving toxic exposure at a workplace. The only variable was whether the defendant was an individual or a corporation. The sample jury awarded $151,584 against the individual and $247,610 against the corporate defendant—a differential of more than 60%.</p>
<p>Similarly, in 2013, Chris Denove conducted a study for Plaintiff Magazine using three mock trials based on the same trip-and-fall fact pattern. The sole variable was the defendant’s identity: an individual, a local store, or a national retail chain. Perhaps unsurprisingly, the jurors awarded $100,000 against the national chain, $70,000 against the local store, and only $22,000 against the individual.</p>
<p>These studies confirm what experienced trial lawyers suspect: jurors calibrate damages not only to harm suffered but also to their perception of who should bear the loss and who can afford to pay.</p>
<p><b>Calibrating the Decision: Key Factors to Consider</b></p>
<p>Before adding an individual defendant, practitioners should assess three intersecting factors: the level and nature of the individual’s involvement, the egregiousness of the conduct, and whether the individual is likely to be seen as likable or sympathetic. These factors exist on a spectrum.</p>
<p>The faces behind Purdue Pharma’s manufactured opioid crisis—which injured hundreds of thousands for financial gain—bear little resemblance to the owner of a mom-and-pop corner shop where a customer slipped on a wet floor. The former involves masterminds who engaged in a pattern of intentional, systematic misconduct over many years; the latter involves an unintentional, isolated incident arising from potentially negligent conduct. These contrasting scenarios highlight two crucial distinctions: systematic pattern versus isolated incident, and intentional misconduct versus negligence.</p>
<p>A systematic pattern need not span years; it can simply involve an individual engaging in a repeated pattern of misconduct. Egregiousness matters, and egregious misconduct often involves multiple acts and repetition over time. Regarding the distinction between intentional misconduct and negligence, juries—as collections of human beings—are naturally more forgiving of individuals who made a single mistake, even if that negligence caused significant harm, than of individuals who engaged in repeated intentional wrongdoing. That said, the analysis is not straightforward even with negligence claims. Significant verdicts against individuals for medical malpractice, for example, are common, but there, plaintiffs often have no choice but to name the individual responsible if they are to obtain compensation.</p>
<p>Because jurors naturally resist ruining or punishing an individual for a simple mistake, naming an individual defendant in a scenario where negligence produced an unfortunate, isolated incident can easily backfire, particularly if the individual is likable and sympathetic. Adding an individual defendant allows the corporate defendant to be humanized (something defense counsel will attempt anyway) and may cause juries to hesitate before returning a larger verdict that will be joint and several against both individual and corporate defendants. In these scenarios, if the jury is likely to want to make the injured plaintiff “whole” and the corporate defendant has sufficient funds, foregoing the individual defendant may be the wiser course.</p>
<p><b>When Individual Liability Serves the Case</b></p>
<p>Conversely, in situations resembling Purdue’s OxyContin distribution, the calculus shifts. While the Sackler family was never held civilly or criminally liable by a jury, public sentiment strongly favored holding them responsible. The Purdue scenario exhibits all the hallmarks of a case where individual liability is appropriate: the individuals directed the misconduct, the misconduct was egregious, and the individuals involved are unsympathetic, perceived as having acted for financial gain. In such cases, naming individuals can be powerful. Jurors are weary of corporations—which are run by and can act only through humans—hiding behind the corporate veil when their misconduct is exposed, and paying damages that amount to little more than a slap on the wrist. We explored this concept in our recent column, discussing the 2015 Yates Memorandum and what inspired it. Without humans, corporations cannot act, and where repeated corporate misconduct occurs, people want to see individuals held accountable.</p>
<p><b>The Role of Corporate Size and Type</b></p>
<p>Another important consideration is the size and financial wherewithal of corporate defendants. Denove’s 2013 study demonstrated that juries are more likely to return larger verdicts against national companies than smaller regional ones. This reflects a perception that large companies have deep pockets and the ability to pay. Individuals often lack the same capacity, so juries may be less inclined to issue large joint-and-several verdicts unless the individual is unlikable or engaged in egregious misconduct. Conversely, if your case involves a smaller company that may not be able to satisfy a full verdict, adding an individual may have strategic benefit—or it may not.</p>
<p>The type of company also matters. While juries may inherently distrust large pharmaceutical companies like Johnson &amp; Johnson, other entities—nonprofits, for example, or retailers like Trader Joe’s—enjoy greater public goodwill. In those situations, it may be preferable to name the individual defendant actually responsible for the plaintiff’s injuries, rather than rely on the corporate defendant’s favorable reputation.</p>
<p>Practitioners should keep in mind whether adding an individual is an option that is only available when the facts support adding the individual as a defendant. In many situations, this option may not exist.</p>
<p><b>Conclusion</b></p>
<p>Determining whether to add an individual as a defendant is a complex strategic decision requiring analysis of multiple factors. When preparing a case for initial filing, it may be tempting to name every involved individual as a way to maximize recovery. But before doing so, take a step back and analyze whether that approach will actually produce the result you want. Just because you can name an individual as a defendant under the facts does not mean you should. Sometimes the best way to hold a corporation accountable is to let the corporation stand alone—and let the jury decide what justice requires.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><b>Kandis L. Kovalsky</b><i>, a member with the firm, focuses her practice on a broad range of high stakes business-related civil litigation in Pennsylvania, New Jersey, and New York state and federal courts and arbitral tribunals, and representing relators in high stakes qui tam actions filed under the federal and state False Claims Acts. <em>Contact her at <a href="mailto:kkovalsky@kanghaggerty.com">kkovalsky@kanghaggerty.com</a>. </em></i></p>
<div class="content">
<div class="entry-content">
<p><strong><em>Reprinted with permission from the March 26, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7309</post-id>	</item>
		<item>
		<title>Legal Intelligencer: AI Systems and the Question of Confidentiality</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-ai-systems-and-the-question-of-confidentiality/</link>
		
		<dc:creator><![CDATA[Kelly Lavelle]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 14:44:18 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[ediscovery]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7304</guid>

					<description><![CDATA[Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable. In the March 19, 2026 edition of The Legal Intelligencer, Kelly Lavelle writes, &#8220;AI Systems [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable.</em></p>
<p>In the March 19, 2026 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Kelly Lavelle writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/03/19/ai-systems-and-the-question-of-confidentiality/?slreturn=20260319103703">AI Systems and the Question of Confidentiality</a>.&#8221;<span id="more-7304"></span>Much of the attention surrounding generative AI in litigation has focused on hallucinated authorities and AI-generated filings. But a different litigation risk arises when lawyers, or even clients themselves, enter client information into an AI platform. Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable.</p>
<p>The U.S. District Court for the Southern District of New York’s decision in <i>United States v. Heppner</i> brings that issue into focus. Although the case has been described as a privilege ruling, the court’s analysis turned on a more basic issue: whether the information was confidential when it was entered into the AI platform. If client information is submitted to a system under terms that allow the provider to access, retain, or disclose it, the protections that depend on confidentiality, including attorney-client privilege and work product, may never attach.</p>
<p>In <i>Heppner,</i> a corporate executive under criminal investigation used the publicly available generative AI platform “Claude” to generate written analyses of potential defenses after receiving a grand jury subpoena. He later shared those documents with counsel. Following his arrest, FBI agents executed a search warrant at Bradley Heppner&#8217;s home and seized numerous documents and electronic devices. Heppner&#8217;s counsel later informed the government that among the seized materials were approximately thirty-one documents memorializing Heppner’s communications with the AI platform.</p>
<p>Through his counsel, Heppner asserted privilege over these documents, arguing that the information entered into the AI platform was learned, that he created the documents to facilitate discussions with counsel and obtain legal advice, and that he subsequently shared the AI outputs with his attorneys. His counsel acknowledged, however, that they did not direct Heppner to conduct the AI searches. The court rejected those claims. It held that the documents were not communications with an attorney, were not prepared by or at the direction of counsel, and, critically, were not confidential in light of the platform’s privacy policy.</p>
<p>The court’s analysis centered on the conditions under which the information was entered into the system. The provider’s terms stated that user inputs and outputs were collected and retained and that the company reserved the right to disclose data to third parties, including governmental authorities. Under those conditions, the court concluded that Heppner lacked a reasonable expectation of confidentiality at the moment of disclosure.</p>
<p>The court also rejected Heppner’s contention that he communicated with Claude for the “express purpose of talking to counsel.” In doing so, the court looked to the platform’s own representations. Claude expressly disclaimed providing legal advice. When asked whether it could provide such advice, the system responded that it was not a lawyer, could not offer formal legal recommendations, and advised users to consult a qualified attorney.</p>
<p>The court acknowledged that the implications of artificial intelligence for the law are only beginning to be explored. The court emphasized that AI’s novelty does not place it outside established legal principles, including those governing attorney-client privilege and the work-product doctrine. AI does not change the basic rules.</p>
<p>The opinion highlights a familiar but often underemphasized principle that privilege attaches only when communications are intended to be confidential and were, in fact, kept confidential. In the AI context, if a platform’s terms allow provider use beyond delivering the requested service, such as model training, analytics, affiliate sharing, or extended retention, the user may be acting inconsistently with the intent to preserve confidentiality at the moment of disclosure. The issue is not a subsequent waiver. It is that the platform itself may defeat confidentiality at inception.</p>
<p>This reasoning extends beyond generative AI. Courts have consistently held that employees may waive attorney-client privilege when using employer email systems to communicate with counsel, with the analysis turning on whether the employee had an objectively reasonable expectation of confidentiality. In those cases, the inquiry focuses on whether the intent to communicate in confidence was objectively reasonable under the circumstances. <i>Heppner</i> suggests that AI platforms may be subject to similar scrutiny. The terms governing data retention and disclosure may determine whether any protection exists at all.</p>
<p>The court also reaffirmed that privilege remains grounded in professional accountability. Recognized privileges depend on a relationship with a licensed professional who owes fiduciary duties and is subject to discipline. Generative AI does not occupy that role. Even if an output resembles legal advice, it is not a communication with counsel.</p>
<p>However, the court suggested that if counsel had directed the use of the AI tool within a structured framework, the analysis might have been different. That distinction highlights the importance of control. When AI use is integrated into a counsel-directed process under defined terms, protection arguments may be stronger. When it is independent and unsupervised, confidentiality may fail at the start.</p>
<p>Platform terms of service are therefore central. Many providers claim licenses to user inputs and outputs broader than a confidentiality-preserving relationship would tolerate, sometimes including rights to use content for service improvement, analytics or model training. However, this concern does not apply in the same way to all AI tools. Paid legal research platforms or firm-licensed systems are often governed by professional services agreements that include confidentiality obligations and defined data controls. In those contexts, the vendor functions more like a traditional litigation support provider than a public AI service. Even there, however, the analysis may turn on the contract. Courts will look at the terms to determine what they permit and how the provider handles user content.</p>
<p>These issues directly affect attorney-client privilege. Privilege protects confidential communications made for the purpose of obtaining or providing legal advice. The problem is not simply waiver. It is that the basic requirements for privilege may never have been satisfied. The work-product doctrine raises a similar issue. Work product protects materials prepared in anticipation of litigation. If those materials are created on a public nonconfidential platform, it weakens the argument that they reflect protected legal strategy shielded from disclosure.</p>
<p><i>Heppner</i> reinforces the basic rule that privilege depends on confidentiality at the time the communication is made. It does not arise simply because a document is later shared with counsel. In the AI context, that means platform terms, data handling practices, and professional controls must align with confidentiality requirements before client information is entered. The focus should be less on whether AI interactions are discoverable and more on whether confidentiality ever attached. As <i>Heppner</i> shows, confidentiality is not assumed simply because a document resembles legal analysis. It depends on the conditions under which the information was created and maintained.</p>
<p><b>Kelly A. Lavelle</b> <i>is Senior Counsel at Kang Haggerty. She focuses on e-discovery and information management, from preservation and collection to review and production of large volumes of electronically stored information. Contact her at <a href="mailto:klavelle@kanghaggerty.com">klavelle@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the March 19, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7304</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Taking a Plaintiff’s Case to the Next Level: Holding Individuals Liable Under Pennsylvania Law</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/</link>
		
		<dc:creator><![CDATA[Edward T. Kang and Kandis Kovalsky]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 22:24:12 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7298</guid>

					<description><![CDATA[Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape. In the February 19, 2026 edition of The Legal Intelligencer, Edward Kang and Kandis Kovalsky [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape.</em></p>
<p>In the February 19, 2026 edition of <a href="https://www.law.com/thelegalintelligencer/">The Legal Intelligencer</a>, Edward Kang and Kandis Kovalsky co-authored, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/02/19/taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/?slreturn=20260219170528">Taking a Plaintiff’s Case to the Next Level: Holding Individuals Liable Under Pennsylvania Law</a>.&#8221;<span id="more-7298"></span></p>
<p>For plaintiffs counsel, winning a verdict against a corporate entity is often only the opening act. The real contest begins post-judgment, when the defendant reveals itself to be a shell: a defunct LLC, a dissolved partnership, or a corporation with nominal assets. The plaintiff, having prevailed on liability, is left holding a judgment that is legally pristine but could be practically worthless.</p>
<p>This outcome is avoidable. Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape. It expands the pool of recoverable assets, concentrates the minds of defense counsel, and aligns the case with the core purpose of civil liability: meaningful accountability against wrongdoers.</p>
<h3>Why Individual Liability Matters</h3>
<p>The pursuit of individual liability is not a secondary consideration; it is a force multiplier for three distinct reasons.</p>
<p>First, individual exposure changes behavior. A corporate entity, insulated by limited liability and defense counsel, often litigates with strategic detachment. An individual whose personal assets, reputation, and future earnings are at risk does not. Cases involving individual defendants often settle differently—earlier, at higher values, and with fewer procedural hurdles. Personal risk concentrates attention in ways that corporate liability rarely does.</p>
<p>Second, the assets often reside with the individuals. Commercial general liability policies carry limits and exclusions. Directors and officers (D&amp;O) policies, by contrast, frequently provide broader coverage that follows the individual, not the entity. A dissolved corporation cannot respond to a judgment; a former officer with a D&amp;O tail policy can. General partners remain personally liable for partnership obligations—a fact often forfeited when plaintiffs name only the partnership in the complaint.</p>
<p>Third, accountability is the product. The Department of Justice’s 2015 Yates Memo recognized that corporate enforcement is incomplete when it stops at the entity level. Civil plaintiffs experience this reality firsthand. A family suing a nursing home chain is not made whole by a judgment against a corporate shell. They seek accountability from the individuals who made the decisions that caused the harm. That impulse is not merely human—it is legally and strategically sound.</p>
<h3>Direct Liability Under Pennsylvania Statutes</h3>
<p>It is well known that general partners are jointly liable for the debts of a partnership. This most straightforward path to individual liability is often statutory—and frequently overlooked at the pleading stage. Under the Pennsylvania Uniform Partnership Act, a judgment against a partnership is not, by itself, a judgment against any individual partner. See 15 Pa.C.S. Section 8437. Pennsylvania Rule of Civil Procedure 2132 reinforces this principle: a judgment entered against a partnership sued only in its firm name supports execution only against partnership property. To reach a partner’s individual assets, the partner must be named and served in the lawsuit.</p>
<p>The same logic applies to limited partnerships, under 15 Pa.C.S. Section 8645. General partners are jointly and severally liable for partnership obligations, but only if they are properly joined. A judgment against the limited partnership alone does not reach them. This is not a substantive limitation on liability; it is a pleading requirement. Plaintiffs who fail to name individual partners at the outset may forfeit the ability to collect from them entirely.</p>
<p>The lesson is elementary: name the partners when warranted. The cost of doing so is negligible; the cost of failing to do so can be fatal to recovery.</p>
<h3>Participation Theory: Liability Through Conduct</h3>
<p>Beyond statutory partnership liability, Pennsylvania recognizes a common-law doctrine that imposes individual liability on corporate officers and directors based on their personal involvement in tortious conduct. This is the participation theory, articulated most clearly in the Pennsylvania Supreme Court case <em>Wicks v. Milzoco Builders</em>, 470 A.2d 86 (Pa. 1983). Under Wicks, a corporate officer is individually liable for torts committed in the course of employment if the officer personally participated in the wrongful conduct or directed it to occur. See our earlier article on this topic, <a href="https://www.khflaw.com/news/legal-intelligencer-a-primer-on-pennsylvanias-participation-theory/">here</a>.</p>
<p>Participation theory is not veil-piercing. It does not require proof of fraud, undercapitalization, or disregard of corporate formalities. It does not attack the corporate structure. Instead, it reflects a bedrock principle: individuals remain liable for their own torts, even when acting on behalf of a corporation.</p>
<p>But the doctrine has limits. Alleging that a defendant held a corporate title or signed a document is insufficient. Plaintiffs must plead specific facts demonstrating personal involvement: directing the conduct, approving the scheme, making the misrepresentation, or physically engaging in the wrongful act. Courts are skeptical of boilerplate allegations of “participation.” Overreaching invites dismissal and damages credibility.</p>
<p>Participation theory applies only to individuals, not affiliated entities. To reach parent companies or sister corporations, plaintiffs must turn to other doctrines, such as alter ego or enterprise liability.</p>
<h3>Contractual Liability: The Signatory Problem</h3>
<p>In contract cases, the path to individual liability is narrower and more nuanced. The general rule is familiar: an agent who signs a contract on behalf of a disclosed principal is not personally liable on that contract (unless the agent specifically agrees to assume liability). See <em>Vernon D. Cox &amp; Co. v. Giles</em>, 406 A.2d 1107, 1110 (Pa. Super. 1979). But the exceptions are where cases are won or lost.</p>
<p>One common exception arises from ambiguity. If a contract does not clearly indicate the signatory’s representative capacity, parol evidence may be admissible to determine whether the parties intended individual liability. See <em>Trenton Trust v. Klausman</em>, 296 A.2d 275, 277 (Pa. Super. 1972). Ambiguous signature blocks, inconsistent use of letterhead, or vague agency language can expose individuals to personal liability. See <em>Hazer v. Zabala</em>, 26 A.3d 1166, 1170 (Pa. Super. 2011).</p>
<p>Another fertile theory is misrepresentation of authority. An agent who warrants they have authority to bind a principal—but does not—may be personally liable for breach of warranty of authority. See <em>Kribbs v. Jackson</em>, 129 A.2d 490, 496 (Pa. 1957) Similarly, an individual who makes material misrepresentations to induce a contract may face tort liability for fraudulent inducement, even if the contract itself binds only the entity. See <em>Felix v. Fraternal Order of Police</em>, Philadelphia Lodge No. 5, 759 A.2d 34, 39 (Pa. Commw. Ct. 2000).</p>
<p>These theories should be explored early. Discovery into the signatory’s knowledge, the entity’s financial condition at the time of contracting, and the parties’ communications can reveal evidence of individual intent and responsibility. In the right case, contractual individual liability is not ancillary; it is central.</p>
<h3>Alter Ego and Piercing the Corporate Veil</h3>
<p>The most demanding—and most powerful—path to individual liability is veil piercing. Pennsylvania law requires a showing that the corporation was a mere alter ego or business conduit of the individual and that respecting the corporate form would sanction fraud, illegality, or fundamental unfairness. Put simply, veil-piercing is most viable when someone uses a corporate form to perpetrate fraud.</p>
<p>Unlike participation theory, veil piercing attacks the corporate structure itself. It can also extend beyond individuals to affiliated entities under enterprise liability theories. In <em>Mortimer v. McCool</em>, 255 A.3d 261 (Pa. 2021), the Pennsylvania Supreme Court recognized the viability of enterprise liability while declining to apply it on the facts. More recently, in <em>Dewberry Group v. Dewberry Engineers</em>, 604 U.S. 321 (2025), the U.S. Supreme Court reaffirmed the presumption of corporate separateness but left room for traditional veil piercing and equitable adjustments where corporate forms obscure economic reality. See our latest article on this topic, <a href="https://www.khflaw.com/news/legal-intelligencer-no-end-run-piercing-lessons-from-mortimer-and-dewberry/">here</a>.</p>
<p>These decisions offer both caution and opportunity. Courts will not disregard corporate form lightly, but they remain receptive to well-supported claims involving commingling, asset shifting, undercapitalization, and artificial inter-company transactions. Discovery into inter-company transfers, pricing practices, and the use of shell entities can provide the factual foundation necessary to overcome the presumption of separateness.</p>
<p>As a practical matter, veil piercing should rarely be pled in an initial complaint. The necessary facts are almost never available pre-discovery, and premature allegations risk early dismissal under Pennsylvania’s fact-pleading standards, and potentially, a loss of credibility with the court. A more effective strategy is to plead viable individual claims under participation theory and statutory liability, then develop the evidentiary record to support alter ego claims as the case progresses.</p>
<h3>Choosing the Right Theory</h3>
<p>Each individual liability doctrine serves a distinct function, and understanding their interplay is critical to effective case management.</p>
<ul>
<li>Partnership liability is mandatory, not discretionary. Name the partners.</li>
<li>Participation theory is the primary tool for holding officers and managers accountable for their own tortious conduct.</li>
<li>Contractual liability theories apply where ambiguity, misrepresentation, or extra-contractual conduct creates individual exposure.</li>
<li>Veil piercing and enterprise liability are reserved for cases involving manipulation of corporate form to evade responsibility or to perpetuate fraud.</li>
</ul>
<p>Used together, these doctrines transform litigation strategy. They expand the defendant pool, increase settlement leverage, and protect plaintiffs from the all-too-common scenario of winning on liability but losing on collectability.</p>
<h3>Conclusion</h3>
<p>The shift from entity liability to individual accountability is not merely tactical; it reflects the economic realities of modern commerce. Corporate entities can be created, dissolved, and restructured with ease. Individuals endure. They hold assets, carry insurance and bear responsibility for their conduct. On many occasions, individuals are the wrongdoers.</p>
<p>Plaintiffs who treat the corporate defendant as the endpoint of litigation will continue to obtain judgments against shell companies and wonder why their clients remain uncompensated. Plaintiffs who integrate individual liability into their strategy from the outset—by naming partners, pleading participation, scrutinizing contractual authority, and preserving alter ego theories—are likely to recover more. They will fulfill the fundamental promise of civil law: that wrongdoing leads to meaningful accountability, not empty judgments.</p>
<p><strong>Edward T. Kang</strong> <em>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>. </em></p>
<p><strong>Kandis L. Kovalsky</strong><em>, a member with the firm, focuses her practice on a broad range of high stakes business-related civil litigation in Pennsylvania, New Jersey, and New York state and federal courts and arbitral tribunals, and representing relators in high stakes qui tam actions filed under the federal and state False Claims Acts. Contact her at <a href="mailto:kkovalsky@kanghaggerty.com">kkovalsky@kanghaggerty.com</a>. </em></p>
<p><strong><em>Reprinted with permission from the February 19, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7298</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Authenticity Under Pressure: Rethinking Rule 901 in the Age of AI</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-authenticity-under-pressure-rethinking-rule-901-in-the-age-of-ai/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 19:42:48 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7278</guid>

					<description><![CDATA[This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies. In the January 7, 2026 edition of The Legal Intelligencer, Edward Kang [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies.</em></p>
<p>In the January 7, 2026 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/01/07/authenticity-under-pressure-rethinking-rule-901-in-the-age-of-ai/">Authenticity Under Pressure: Rethinking Rule 901 in the Age of AI.</a>&#8220;<span id="more-7278"></span></p>
<p>For decades, Federal Rule of Evidence 901 has been a pillar of evidentiary stability. Its intentionally flexible standard—requiring only “evidence sufficient to support a finding that the item is what the proponent claims it is”—easily accommodated evidence from handwritten letters to surveillance footage. Authentication disputes were rarely dispositive, typically resolved through minimal foundation and common sense.</p>
<p>Enter the age of artificial intelligence (AI). The advent of generative artificial intelligence—specifically, tools capable of producing hyper-realistic audio, video, images and text (deepfakes)—has fractured the rule’s foundational assumptions. When synthetic media can replicate a person’s likeness or voice with near-perfect fidelity, traditional authenticity markers become unreliable. Evidence can be entirely fabricated yet appears genuine, leaving opposing parties without meaningful tools to prove manipulation.</p>
<p>This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies. The result is a critical convergence: the mechanics of authentication are now inseparable from counsel’s duty of competence under ABA Model Rule 1.1.</p>
<h2>Rule 901’s Analog Assumption in a Digital World</h2>
<p>Rule 901 was conceived in an era where forgery was typically crude, detectable, and difficult to scale. Its illustrative examples—testimony based on personal knowledge, distinctive characteristics, chain of custody—presume authenticity can be assessed through human perception and circumstantial context.</p>
<p>Generative AI dismantles this logic. Modern models produce videos of individuals saying things they never uttered, audio clips indistinguishable from real recordings, and documents that mimic unique writing styles—often complete with consistent metadata and artifacts that evade casual scrutiny. In this context, a witness’ assurance that evidence “looks real” offers scant probative value.</p>
<p>Courts are sensing this mismatch. While few opinions directly confront deepfakes, judicial unease with superficial digital authentication is growing. See, e.g., <em>Alford v. Commonwealth</em>, No. 2022-SC-0278-MR, 2024 WL 313431, at *6 (Ky. Jan. 18, 2024) (stating that the emergence of artificial intelligence, with the capacity and initiative to manipulate digital media, “will only serve to further compromise our determinations of authenticity unless such advancements are both recognized and addressed by our courts”). Some courts are “mindful” that the rules of evidence “may need to adapt,” yet still apply the same “low threshold for authentication” of electronic evidence as instructed by the current rules. See <em>State v. Ziolkowski</em>, 329 A.3d 939, 950 (Conn. 2025). The result is unpredictability: similar evidence may be admitted in one courtroom and excluded in another, based largely on a judge’s comfort with the technology rather than a consistent doctrinal framework. “As artificial intelligence progresses, battles over the accuracy of computer images and manipulation of deepfakes can be expected to intensify.” See <em>Pegasystems v. Appian</em>, 904 S.E.2d 247, 279 (Va. App. 2024), appeal granted (Mar. 7, 2025); see also <em>People v. Smith</em>, 969 N.W.2d 548, 565 (Mich. App. 2021) (“we are mindful that in the age of &#8230; so-called deep fakes, a trial court faced with the question whether a social-media account is authentic must itself be mindful of these concerns”).</p>
<h2>The Case for Reforming Rule 901: Asymmetry and Reliability</h2>
<p>The push for reform centers on two flaws exposed by AI: asymmetry and compromised reliability. A proponent of synthetic evidence needs only to clear Rule 901’s low bar of plausibility. The opponent, however, may bear an impossible burden to prove falsity without access to proprietary tools, training data, or generation logs. The current rule relies on adversarial testing, but the technology itself can obscure any meaningful test.<br />
Proposed reforms vary. Some suggest amending Rule 901’s examples to explicitly reference AI-generated evidence, signaling that courts may demand technical proof. Others advocate a more structural shift, placing an affirmative burden on the proponent of AI-susceptible evidence to demonstrate authenticity through forensic analysis.</p>
<p>Skeptics warn that rewriting Rule 901 risks complexity and could disadvantage less-resourced litigants. They argue that judicial discretion and evolving common law—which have adapted the rule to include email and digital photos—can suffice. Yet even skeptics acknowledge deepfakes present a qualitative leap: unlike prior technologies, generative AI is designed to evade detection. This reality fuels the argument for a more targeted solution.</p>
<h2>Proposed Rule 707: A Surgical Response to Synthetic Evidence</h2>
<div class="mb-4">
<div class="article-font-size">
<p>The most direct proposal is a new Federal Rule of Evidence 707. While formulations vary, a leading draft proposes: “Rule 707. Machine-Generated Evidence. When machine-generated evidence is offered without an expert witness and would be subject to Rule 702 if testified to by a witness, the court may admit the evidence only if it satisfies the requirements of Rule 702(a)-(d).” In essence, Rule 707 would do three things: Mandate disclosure when a party offers AI-generated or altered evidence. Authorize courts to demand technical proof of authenticity (e.g., expert testimony, metadata analysis, system documentation). Empower judges to exclude evidence if the risk of deception substantially outweighs its probative value, even if Rule 901 is nominally satisfied.Proponents argue that Rule 707 restores balance by aligning standards with technological risk, providing courts with a clear doctrinal framework. Opponents fear line-drawing problems (what counts as “AI-generated”?) and worry it could chill legitimate technological uses. Regardless of its adoption, the proposal signals a consensus: deepfake evidence cannot be treated as just another digital exhibit.</p>
<h2>The New Authentication Battleground: From Lay Perception to Expert Analysis</h2>
<div class="mb-4">
<div class="article-font-size">
<p>A practical consequence is the forensic turn in authentication. Detecting AI-generated media often requires specialized tools and knowledge that extend beyond a lay understanding. Following trends under Daubert and Rule 702, courts are increasingly treating authenticity as a gatekeeping question, resolved at the time of admissibility, rather than a weight question for the jury.This raises the stakes for practitioners. Authentication is no longer a box-checking exercise but an architectural component of case strategy. It demands early investigation, strategic expert selection, and targeted discovery (e.g., requests for native files, generation logs, model training data). Practitioners who fail to meet these requirements risk exclusion or adverse credibility findings. Conversely, unsupported accusations of “deepfake” manipulation may be seen as speculative or dilatory.</p>
<h2>Model Rule 1.1: The Ethical Imperative of AI Literacy</h2>
<div class="mb-4">
<div class="article-font-size">
<p>These evidentiary shifts directly implicate ABA Model Rule 1.1 (Competence). Comment 8 explicitly requires understanding the “benefits and risks associated with relevant technology.” While once applied to e-discovery, this now encompasses generative AI.Competence does not demand that lawyers become engineers. It does require baseline AI literacy: understanding the capabilities and limits of these tools, recognizing red flags for synthetic evidence, knowing when to consult an expert, and appreciating the limits of detection technologies. A lawyer who introduces digital media without considering manipulation risk or who fails to investigate credible challenges—may breach the duty of thorough preparation.</p>
</div>
</div>
<div class="mb-4">
<div class="article-font-size">
<p>Similarly, a lawyer who reflexively cries “deepfake!” without factual grounding risks violating duties of candor and professionalism. Courts show diminishing tolerance for unfounded technological skepticism. Bar ethics opinions now emphasize the duty to supervise litigation technology, vet experts, and advise clients on associated risks. AI competence is transitioning from a niche specialty to a core component of general litigation practice.</p>
<h2>Strategic Imperatives for the Modern Litigator</h2>
<div class="mb-4">
<div class="article-font-size">
<p>The convergence of Rules 901, proposed 707, and Model Rule 1.1 demands a strategic recalibration. Lawyers must treat potentially AI-generated evidence with the rigor applied to expert testimony: early planning, documented methodology and a clear explanatory narrative.Key questions must guide the process: Provenance: Who created the evidence and using what tools/models? Process: What data trained the system? What safeguards were in place? Verification: What independent, technical verification exists (metadata, hash values, audit logs)?</p>
<p>Discovery should be tailored to answer these questions. Equally crucial is judicial education. Many judges are still developing fluency with AI. Clear, restrained explanations of the technology and its uncertainties are more persuasive than alarmism. The goal is to provide courts with a principled framework for decision-making, not to sow indiscriminate doubt.</p>
</div>
</div>
<div class="mb-4">
<div class="article-font-size">
<h2>Conclusion: Competence Redefined</h2>
<div class="mb-4">
<div class="article-font-size">
<p>Whether Rule 901 is amended or Rule 707 adopted remains uncertain. (The public comment period for proposed Rule 707 is open until February 16, 2026.) Yet the trajectory is clear. Authentication doctrine is being reshaped by a technology that challenges bedrock assumptions about truth and reliability. In parallel, professional norms are evolving to mandate a responsible and informed understanding of the same technology.In this new environment, legal competence is comprised of three components: technical, strategic and ethical. Practitioners who integrate AI literacy into their practice and treat authentication as a substantive battleground will protect both their clients and their credibility. Those who do not may find the most persuasive evidence in their case is also the most vulnerable to attack.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the January 7, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7278</post-id>	</item>
		<item>
		<title>Legal Intelligencer: From Vulnerability to Liability: Understanding Today’s Cyber Claims and Enforcement</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-from-vulnerability-to-liability-understanding-todays-cyber-claims-and-enforcement/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 20:06:58 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7274</guid>

					<description><![CDATA[The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility. In the November 26, 2025 edition of The Legal Intelligencer, Edward Kang writes, &#8220;From [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility.</em></p>
<p>In the November 26, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/26/from-vulnerability-to-liability-understanding-todays-cyber-claims-and-enforcement/?slreturn=20251126150203">From Vulnerability to Liability: Understanding Today&#8217;s Cyber Claims and Enforcement</a>.&#8221;<span id="more-7274"></span></p>
<p>On Oct. 31, mass spam emails were sent from multiple university-affiliated accounts to members of the University of Pennsylvania community. The messages, sent from compromised “@upenn.edu” addresses, criticized the university’s data security practices and its institutional purpose, and suggested that internal systems had been infiltrated. Although UPenn’s Office of Information Security quickly disabled the compromised accounts and initiated a forensic investigation, the extent of any unauthorized access to personal information remained uncertain.</p>
<p>Only three days later, a class action was filed in the U.S. District Court for the Eastern District of Pennsylvania by a putative class of students, applicants, alumni and employees. The complaint alleges that UPenn failed to maintain reasonable cybersecurity measures despite collecting and storing personally identifiable information. Plaintiffs further allege that UPenn disregarded known cyber risks, failed to implement adequate monitoring and intrusion-detection systems, and did not act with sufficient urgency once the unauthorized access was discovered. The lawsuit seeks damages and injunctive relief, requiring UPenn to strengthen its data security practices. Several other class action lawsuits soon followed within a few days.</p>
<p>While the factual investigation is ongoing, the speed with which the lawsuits followed the incident illustrates how rapidly cybersecurity events now trigger litigation and how strongly plaintiffs view institutional cybersecurity as an affirmative legal obligation rather than a technical aspiration.</p>
<h2>When a Cybersecurity-Related Claim May Be Brought</h2>
<p>Whether a cybersecurity incident becomes actionable depends on when plaintiffs can demonstrate that a lapse in these duties resulted in a concrete injury or created a substantial risk of imminent harm. Recent U.S. Court of Appeals for the Third Circuit and U.S. Supreme Court decisions provide a clear framework for this threshold.</p>
<p>The Supreme Court’s decision in <i>TransUnion v. Ramirez, </i>594 U.S. 413 (2021), reshaped the standing landscape for data-related harm. In <i>Ramirez</i>, the putative class action against TransUnion alleged violations of the Fair Credit Reporting Act, including the defendant’s failure to follow reasonable procedures to ensure credit files were accurate. The court held that the plaintiffs seeking damages must demonstrate a concrete injury. Without demonstrating the likelihood that their information would be disseminated, that the risk of harm materialized, or that the risk of harm itself independently harmed them, the plaintiffs whose information was not disseminated, therefore, did not meet the concrete injury requirement. Although the case did not involve a cyber breach, its reasoning has become the foundation for evaluating modern data-security claims.</p>
<p>The Third Circuit has built on this framework in <i>Clemens v. ExecuPharm,</i> 48 F.4th 146 (3d Cir. 2022), which clarifies how the concreteness of a data-related injury can be assessed and when cyber-related harms become actionable within the circuit. <i>Clemens</i> involved a ransomware attack in which a criminal hacking group exfiltrated a trove of highly sensitive information, including Social Security numbers, bank-account details, and tax records, and then posted that information publicly on the dark web. The trial court dismissed the plaintiff’s complaint, reasoning that allegations of any speculative identity theft due to a data breach are insufficient to establish standing. The Third Circuit reversed, holding that the plaintiff had standing to sue because the publication of her data created a substantial risk of identity theft. The court emphasized that the nature of the compromised information, its availability to criminal actors, and the plaintiff’s mitigation efforts together satisfied the requirement of injury-in-fact.</p>
<p>Importantly, misuse is not always required. Plaintiffs may also pursue claims where an institution has made specific cybersecurity commitments, such as promises in admissions materials, donor communications, privacy policies, research data management plans, or federal grant certifications, and has failed to honor them. In these circumstances, claims based on breach of contract, negligent misrepresentation, or deceptive practices can attach even in the absence of confirmed misuse. The key question becomes whether the institution represented that it would implement certain controls and whether its actual practices fell short of these representations.</p>
<p>In practice, a cybersecurity claim becomes viable when unauthorized access is paired with any combination of: actual misuse or publication of data; demonstrable, nonspeculative mitigation efforts; emotional or reputational harm resulting from the breach; or the breach of specific, identifiable promises regarding cybersecurity practices. Courts are increasingly sophisticated in evaluating these elements, treating cybersecurity duties as enforceable components of institutional governance.</p>
<h2>The False Claims Act and Cybersecurity: An Expanding Enforcement Frontier</h2>
<p>While private plaintiffs increasingly turn to negligence and consumer-protection theories in the wake of cyber incidents, federal enforcement trends indicate that cybersecurity lapses are increasingly carrying implications far beyond private civil litigation. In particular, the Department of Justice’s civil cyber-fraud initiative has brought cybersecurity to the forefront of False Claims Act (FCA) enforcement—a development with significant implications for universities that receive federal funding.</p>
<p>Formally launched to address systemic underinvestment in cybersecurity among government contractors and grantees, the civil cyber-fraud initiative targets entities that knowingly misrepresent their cybersecurity practices or compliance with federal requirements; fail to implement cybersecurity controls that are express conditions of payment; or fail to report cyber incidents as required by federal regulations or contract terms.</p>
<p>Crucially, a breach is not required for there to be an FCA violation. Under the DOJ’s theory, the core wrong is the misrepresentation: if an institution certifies compliance with cybersecurity requirements, such as NIST SP 800-171 for controlled unclassified information or federal reporting requirements for cyber incidents, but has not actually implemented those measures, the certification itself may be a false claim.</p>
<p>Recent cases illustrate how this theory is applied in practice. In 2025, Illumina, Inc. paid nearly $10 million to resolve allegations that it had misrepresented compliance with federal cybersecurity requirements for medical device software, despite no breach having occurred. Earlier cases involving defense contractors similarly turned not on the theft of data but on failures to implement required controls under Department of Defense contracts.</p>
<p>This enforcement posture has sweeping implications. Any organization that contracts with the federal government or receives federal funds, whether in healthcare, defense, manufacturing, research, technology, or public services, may be subject to cybersecurity-related FCA scrutiny. Even complex, decentralized organizations must ensure that their internal practices align with the cybersecurity commitments outlined in contracts, bids, compliance certifications, or grant submissions. A gap between policy and practice, or between what is certified and what is actually implemented, can expose the organization to significant financial penalties and reputational harm.</p>
<p>Unlike class actions, which are made public, an FCA action is filed under seal. Such an action is kept under seal for months and sometimes years. That means, given the number and speed of class actions filed against the University of Pennsylvania, it would not be surprising that an FCA action has already been filed against the university.</p>
<h2>Conclusion</h2>
<p>Viewed together, the UPenn incident, the court’s standing jurisprudence, and DOJ’s expanding FCA enforcement signal that cybersecurity is now a critical legal and governance obligation. Underinvestment can quickly translate into legal exposure.</p>
<p>Incident response has also taken on heightened legal significance. The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility.</p>
<p>Ultimately, these developments underscore the need for proactive oversight. Effective cybersecurity now requires coordinated action across IT, legal, compliance, and administrative domains. Budgeting, staffing, vendor management, and periodic audits are no longer technical concerns; they are components of an institution’s legal risk profile.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 26, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7274</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Understanding and Applying Local Rules When Drafting ESI Protocols</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-understanding-and-applying-local-rules-when-drafting-esi-protocols/</link>
		
		<dc:creator><![CDATA[Kelly Lavelle]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 21:11:27 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[ediscovery]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7271</guid>

					<description><![CDATA[A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently. In the November 20, 2025 edition of The Legal Intelligencer, Kelly Lavelle writes, “Understanding and Applying Local Rules When Drafting ESI Protocols.&#8220; ESI protocols govern how parties preserve, collect, review, and produce electronic [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently.</em></p>
<p>In the November 20, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Kelly Lavelle writes, “<a href="https://www.law.com/thelegalintelligencer/2025/11/20/understanding-and-applying-local-rules-when-drafting-esi-protocols/">Understanding and Applying Local Rules When Drafting ESI Protocols.</a>&#8220;<span id="more-7271"></span></p>
<p>ESI protocols govern how parties preserve, collect, review, and produce electronic evidence in federal litigation. What once was an obscure procedural topic now lies at the center of nearly every civil case involving documents, emails, databases and other forms of electronic data. ESI protocols provide structure and predictability in an area that can otherwise be costly and difficult to manage. A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently.</p>
<h2>The Role of Local Rules in Electronic Discovery</h2>
<p>With ESI protocols now a regular part of litigation, local rules and court practices play a more significant role in guiding the process. While the Federal Rules of Civil Procedure provide the foundation for electronic discovery, many district courts have developed their own local rules and forms to guide parties in drafting ESI protocols. Some districts have detailed local rules governing electronic discovery, while others, including the Eastern District of Pennsylvania, have not enacted a formal local rule governing ESI, but rely instead on individual judges’ policies and preferences that serve the same purpose. These guidelines show that courts expect parties to manage ESI in an organized way and to address potential issues in advance rather than waiting for them to arise. Following local practice helps lawyers know what the court expects, makes negotiations smoother, and saves time by avoiding mistakes the court has already ruled out.</p>
<p>Recent case law demonstrates how these local practices guide judicial decisions on ESI. In <i>Hall v. Warren</i>, 2025 WL 1392294 (W.D.N.Y. May 14, 2025), the parties failed to reach an agreement on an ESI protocol governing the production of electronically stored information. When negotiations fell apart, plaintiffs moved to compel production of metadata from internal reports and investigative files, arguing that such information was necessary to verify whether documents had been altered and to confirm their authenticity and completeness. Unable to obtain agreement from the parties, the court issued its own ESI protocol order that included selected provisions from each side&#8217;s proposal.</p>
<p>The defendants filed multiple objections to the court’s order, arguing that the order violated the district court&#8217;s local rules and imposed undue cost and technical burden. They claimed the order mandated universal metadata production, required technical tasks they could not perform, demanded compatibility with opposing counsel&#8217;s document review platform, and ordered native production without proper justification.</p>
<p>The court rejected these arguments, clarifying that the ESI order did not require many of the things defendants claimed it required and that the order&#8217;s actual requirements were consistent with the local rules and, in many instances, mirrored the local rules specific provisions. The order also provided flexibility for the parties to meet and confer on alternate formats or cost-sharing if a production became disproportionately burdensome.</p>
<p>The critical lesson from <i>Hall</i> is that the defendants misunderstood both the ESI order and the local rules they said it violated. The defendants clearly had read the district&#8217;s local rules because they cited them throughout their objections. Their problem was not ignorance of the local rules but misunderstanding what those rules actually required. The defendants thought the ESI order required things it did not require. They believed it violated local rules when it actually followed them. They argued that certain procedures were mandatory when the order actually provided flexibility. Because they misunderstood the local rules from the beginning, they could not negotiate effectively. As such, the defendants ended up with a court-imposed protocol that likely was less favorable than what they could have achieved through informed negotiation.</p>
<p>While <i>Hall</i> shows how local rules guide substantive resolution of ESI disputes, the case <i>Husidic v. FR8 Solutions, </i>No. 3:24-cv-963-WGY-SJH (M.D. Fla. Sept. 10, 2025), demonstrates the importance of complying with local procedural requirements even when parties agree. In <i>Husidic</i>, the parties submitted a joint motion requesting that the court enter the parties’ stipulated ESI protocol as an order. The magistrate judge denied the motion identifying three defects. First, the motion cited no legal authority for the proposition that courts should routinely enter agreed ESI protocols as orders. Second, the parties failed to include the memorandum of law required by the U.S. District Court for the Middle District of Florida&#8217;s local rules governing motion practice. Third, the request lacked any showing that court adoption of the protocol was necessary or appropriate.</p>
<p>The magistrate judge also identified a substantive issue with the parties’ proposed stipulation, which included ambiguous provisions referencing privilege and work-product protections that might implicate Federal Rule of Evidence 502, yet neither the stipulation nor the motion addressed Rule 502(d). The court emphasized that if parties seek a non-waiver order, they must make the request expressly and provide factual support demonstrating why such an order is necessary.</p>
<p>In declining to endorse the parties’ ESI protocol, the court implied that judicial resources should not be spent approving private agreements that can be managed through cooperation and adherence to the local rules. Further, compliance with local procedural requirements is essential, even when parties agree on the substance of an ESI protocol. Counsel must understand not only the local rules governing electronic discovery but also the local rules governing motion practice and the standards for obtaining court orders.</p>
<h2>Practical Guidance for Counsel</h2>
<p>For lawyers, these cases show that the most effective ESI protocol is one based on the local rules of the district court or specific judges’ policies and procedures. Counsel should familiarize themselves not only with the federal rules but also with the district court’s ESI checklists, policies, procedures, and discovery guidelines, many of which provide practical direction that supplements the federal rules. Before the Rule 26(f) conference, counsel should review the district&#8217;s local rules on electronic discovery and consider how those rules, and the judge’s preferences are likely to influence court resolution of any disputes. By following local rules from the beginning, parties can reduce the likelihood of motion practice and avoid judicially imposed resolutions that may be less favorable than a negotiated agreement.</p>
<p><b>Kelly A. Lavelle</b> <i>is an associate at Kang Haggerty. She focuses on e-discovery and information management, from preservation and collection to review and production of large volumes of electronically stored information. Contact her at <a href="mailto:klavelle@kanghaggerty.com">klavelle@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 20, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7271</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Method, Not Mystique: The Renewed Demands of Rule 702</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-method-not-mystique-the-renewed-demands-of-rule-702/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 21:08:33 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7269</guid>

					<description><![CDATA[Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case. In the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case.</em></p>
<p>In the November 20, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/20/method-not-mystique-the-renewed-demands-of-rule-702/">Method, Not Mystique: The Renewed Demands of Rule 702.</a>&#8220;<span id="more-7269"></span></p>
<p>For many years, it was common practice to address expert challenges late in the litigation cycle. Create case themes. Discovery proceeds. Case themes change or develop alongside witness testimony. The <i>Daubert</i> briefing arrives near the end. The expectation was that juries would resolve competing expert views through cross-examination and credibility determinations. That cycle no longer accurately reflects reality in federal courts within the U.S. Court of Appeals for the Third Circuit and throughout the country.</p>
<p>Since the 2023 amendment to Federal Rule of Evidence 702, courts have adopted a more explicit and front-loaded approach to expert admissibility. The rule did not rewrite the familiar elements of qualification, reliability, and fit, but it clarified who bears what burden and when. Trial courts must now ensure, more likely than not, that an expert has not only employed a reliable method but applied that method reliably to sufficient facts or data. Issues that once passed as matters of weight for the jury now receive substantive scrutiny at the admissibility stage.</p>
<p>Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case.</p>
<h2>The Approach Within the Third Circuit</h2>
<p>In <i>Slatowski v. Sig Sauer</i>, 2024 WL 1078198 (E.D. Pa. Mar. 12, 2024), aff’d in part, rev’d in part and remanded, 148 F.4th 132 (3d Cir. 2025), the U.S. District Court for the Eastern District of Pennsylvania excluded two causation experts in a firearm-discharge case despite their credentials and experience. The district court found the opinions lacked a reliable analytical bridge, emphasizing that neither expert offered any conclusion that could be subject to testing or specific to the circumstances in which the plaintiff’s pistol fired. The lack of incident-focused methodology and analysis proved fatal under amended Rule 702.</p>
<p>The Third Circuit affirmed. The panel stressed that the “hallmark of <i>Daubert</i>&#8216;s reliability” prong is the scientific method, meaning the “generation of testable hypotheses that are then subjected to the real-world crucible of experimentation, falsification/validation, and replication.” The court noted that a qualified expert must bridge the gap between theory and reality, and the lack of factual context was fatal in this case. Even if the expert testimony was “reliable about whether the [pistol’s] design could have caused an accident,” it needs to be reliable about “whether the design did cause this accident.”</p>
<p>It is worth noting that the court did not characterize this decision as a close call or a matter better left to cross-examination. Instead, it treated the Rule 702 amendment as a clear directive: opinions that lack testable, case-grounded reasoning cannot reach the jury. The ruling signals a practical expectation that plaintiffs must now present a documented analytical path that connects method to facts with precision, not inference or shorthand experience.</p>
<h2>The Growing Trend of Demanding Reliable Application of Reliable Methods to Facts</h2>
<p>Courts outside the Third Circuit are moving in the same direction. The amended rule and the advisory committee’s commentary have become a touchstone, and courts are citing them to clarify that the sufficiency of basis and reliability of application belong to judges, not juries. Three circuits illustrate this shift.</p>
<p>The Sixth Circuit’s approach is best illustrated by <i>In re Onglyza and Kombiglyze Products Liability Litigation</i>, 93 F.4th 339 (6th Cir. 2024), where exclusion of the plaintiffs’ cardiology expert was affirmed after the court found that, although the expert used “undeniably a reliable methodology,” the opinion was unreliable because it rested on selective data points and inconsistent application of several factors required by the method. The opinion cites the 2023 amendment and emphasizes its “corrective effect:” Rule 702’s recent amendments “were drafted to correct some court decisions incorrectly holding ‘that the critical questions of the sufficiency of an expert&#8217;s basis, and the application of the expert&#8217;s methodology, are questions of weight and not admissibility.’”</p>
<p>The Ninth Circuit’s decision reveals a similar posture, but with different emphasis. In <i>Engilis v. Monsanto</i>, 151 F.4th 1040 (9th Cir. 2025), the court rejected any presumption of admissibility by noting that “there is no such presumption, as a proponent of expert testimony must always establish the admissibility requirements of Rule 702 by a preponderance of the evidence.” The court affirmed the lower court’s exclusion of expert testimony and granting of summary judgment where the expert failed to provide any “scientifically sound reason” when ruling out a potential cause, thus failing to establish that his testimony was “based on sufficient facts or data.” The Fifth Circuit has been equally direct. <i>Nairne v. Landry,</i> 151 F.4th 666, 705 (5th Cir. 2025), reinforces the point by excluding a statistics expert who failed to explain the method-to-data application.</p>
<p>Across jurisdictions, the pattern is consistent. Courts expect transparent and documented analysis sufficient to show a reliable application of established methods to relevant facts. When some part of the analytical or reasoning chain is missing, courts will exercise their role as gatekeepers and exclude the expert testimony. The cases do not signal hostility to plaintiffs or to experts. They signal a renewed willingness on the part of the courts to enforce Rule 702 as written: reliability must now be demonstrated, rather than assumed.</p>
<h2>Practical Guidance for Plaintiffs Attorneys</h2>
<p>For plaintiffs lawyers, the shift in expert testimony admissibility is not theoretical. It reorders when and how cases must be built. The admissibility of expert testimony should be treated as a design principle from day one: identify the theory of causation early, map the analytic chain, and assemble the factual record intentionally so that each step is visible and testable. Litigation strategy must align with admissibility demands, rather than assuming that cross-examination will supply what the record lacks.</p>
<p>The amended Rule 702 rewards intentional sequencing. It punishes gaps that emerge only after discovery closes. Ask experts, before engagement if possible, to articulate precisely how their method connects to the facts at issue and what data they will need to apply it reliably. Build discovery around that roadmap. If testing, literature review, or additional medical documentation is necessary, get it early. Document the methodology as a narrative, not merely as a set of citations. Writing it early sharpens the analysis and exposes weaknesses in time to cure them. Treat expert testimony admissibility as architecture, not defense. In doing so, plaintiffs will not only meet the demands of Rule 702 but also strengthen the merits of their cases in the process.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 20, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7269</post-id>	</item>
		<item>
		<title>Legal Intelligencer: POWER Act—A Philadelphia Game Changer</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-power-act-a-philadelphia-game-changer/</link>
		
		<dc:creator><![CDATA[Aaron L. Peskin]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 16:34:56 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<category><![CDATA[Philadelphia]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7265</guid>

					<description><![CDATA[The scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>The scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a “public body.”</em></p>
<p>In the November 10, 2025 edition of<a href="https://www.law.com/thelegalintelligencer"> The Legal Intelligencer</a>, Aaron Peskin writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/10/power-acta-philadelphia-game-changer/?slreturn=20251111113425">POWER Act—A Philadelphia Game Changer</a>.&#8221;<span id="more-7265"></span></p>
<p>It has been no secret that for many years, Pennsylvania has lagged behind its neighbors, particularly New Jersey, when it comes to protections for whistleblowing employees. While employees on both sides of the river enjoy the same federal whistleblower protections, the similarities end at the state level. New Jersey has the Conscientious Employee Protection Act (CEPA). This statute covers all New Jersey employees and generally protects any employee that reports or objects to any sort of conduct that they believe to be illegal, unethical, or contrary to public policy. Pennsylvania meanwhile has the Pennsylvania Whistleblower Law. While that law does protect employees that report conduct of “wrongdoing or waste.” However, the scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a “public body.” This means that unless your employer is either a public entity funded by Pennsylvania tax dollars or a private entity that receives public funds, you are out of luck. This stands in stark contrast to CEPA, where any employee can sue any employer for retaliation for reporting or objecting to a wide range of conduct. And New Jersey courts have interpreted that statute as broadly as possible to favor employees.</p>
<p>While Pennsylvania does not have particularly strong employee protections against retaliation, Philadelphia employees now enjoy protections similar to those employees across the river thanks to the “Protect Our Workers, Enforce Rights (POWER) Act.” This law was passed by Philadelphia City Council and signed by Mayor Cherelle Parker on May 27, 2025. This act made significant changes to Title 9 of the Philadelphia Code and greatly strengthened employee protections against retaliation.</p>
<p>Specifically, the POWER Act prohibits retaliation against any employee seeking to assert their rights under any “Worker Protection Ordinance,” which is broadly defined to a wide range of Philadelphia ordinances protecting workers, such as concerning wage theft, fair workweek standards, and protections for domestic workers. The protected activities are similarly broadly defined and include seeking information about one’s rights, discussing their rights with another person, objecting to or refusing to participate in any conduct that violates a worker protection ordinance, making an oral or written complaint to an employer, filing a complaint with any governmental agency or court, and providing evidence or participating in any court or administrative proceeding relating to a formal or informal complaint. The POWER Act also explicitly prohibits an employer from retaliating against an employee that takes sick leave under the Philadelphia Sick Leave Law.</p>
<p>Perhaps most importantly, the POWER Act creates a rebuttable presumption of retaliation when an employer takes an adverse employment action, such as firing, suspending, demoting or otherwise penalizing an employee, within 90 days of the protected activity. This effectively turns the relevant standard for retaliation on its ear. In New Jersey and when dealing with Federal statutes, 90 days is generally held to create an inference of retaliation, but one that is can be rebutted by the employer through a preponderance of the evidence to show legitimate non-retaliatory reason(s) for the adverse employment action. In Philadelphia, however, the employer must show the non-retaliatory reason(s) by way of <i>clear and convincing</i> evidence. This is a significantly higher bar than that in most other jurisdictions and employers should be mindful of this standard.</p>
<p>Beyond the retaliation protections the POWER Act is also a gamechanger in several other respects. First, the POWER Act has strengthened the Philadelphia Department of Labor’s Office of Worker Protections (OWP), empowering it to conduct proactive workplace investigations and to hold employers accountable for violations of Philadelphia ordinances, such as the paid sick leave law and the Domestic Workers’ Bill of Rights. It also allows the city to suspend or revoke business licenses and city procurement contracts of employers with repeated violations and requires the creation of a “bad actors database” that publicly lists employers with three or more violations. If OWP finds that employer has violated the POWER Act, the agency can seek civil penalties of $2,000 for each violation. Those fines will be paid into a Worker Justice Fund, which will give back to employees that have suffered monetarily, physically, or mentally as a result of retaliation.</p>
<p>Second, while the OWP has extensive enforcement power, an employee does not necessarily have to exercise their rights through that office. The POWER Act also creates a private right of action against an employer that violates that ordinance and they do not need to exhaust administrative remedies (such as reporting to OWP) before doing so. In doing so, employees can seek damages directly from the employer, which is a significant change from previous practices where penalties were directed solely to the City. Before filing suit, an employee must give the employer the opportunity to cure the alleged infraction within 15 days, but that requirement is waived for instances of retaliation. That means that an employee may file suit immediately after he or she believes that retaliation has taken place. The statute of limitations for a claim under the POWER Act is three years, which is significantly longer than most federal statutes and even two years beyond that permitted under CEPA.</p>
<p>Third, the POWER has strengthened protections for immigrant workers. It authorizes the OWP to certification applications and submit statements of interest on behalf of those workers, including those subject to unlawful retaliation, who may be eligible for a U Visa or T Visa under the Victims of Trafficking and Violence Protection Act or for the Deferred Action Program.</p>
<div class="mb-4">
<div class="article-font-size">
<p>Fourth, the POWER Act raises the hourly rate for paid sick leave for tipped workers under Philadelphia sick leave law. It is now calculated by taking the average of the hourly wage for “bartenders,” “waiters and waitresses,” and “dining room and cafeteria attendants and bartender helpers” as defined under the Standard Occupational Classification Code as published for Philadelphia County by the Pennsylvania Department of Labor.</p>
<p>Fifth, employers are now required to keep records of hours worked by employees and hours of sick time taken by an employee and payments made to the employee for sick time for three years rather than two. This comports with the new statute of limitations for bringing suit.</p>
<p>Finally, the POWER Act requires that employers provide notice to employees of their rights. While this notice does not have to be contained in the employee handbook, it does have to be provided in some format to all employees in Philadelphia.</p>
<p>Employers should be mindful of the heightened level of accountability that the POWER Act presents and should endeavor to maintain accurate records of hours worked and sick time, provide notice of rights to all employees, and carefully consider the POWER Act’s presumption of retaliation when making a determination as to whether to take an adverse employment action against an employee.</p>
<p>Employees should also familiarize themselves with the POWER Act, especially if they are inclined to report what they believe to be wrongdoing under the Act. Employees should determine if the conduct that they wish to complain about or report would qualify such a complaint or report as “protected activity” under the Act. Employees should also carefully consider whether it makes sense to report the conduct to the OWP, file a private lawsuit, or do both.</p>
<p>Ultimately, the POWER Act will likely lead to a significant increase in employment litigation at both the state and federal levels in Philadelphia, and employment attorneys practicing in Philadelphia should familiarize themselves with this game-changing statute.</p>
<div><b>Aaron L. Peskin</b><i>, senior counsel at Kang Haggerty,</i> <i>is a seasoned attorney whose practice spans complex commercial litigation, employment law, and general corporate matters. He brings a strategic, client-focused approach to a wide range of legal matters, drawing on deep experience across multiple industries and legal forums.</i></div>
<div><strong><em>Reprinted with permission from the November 10, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></div>
<div class="mb-4">
<div></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7265</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Lincoln’s Law, One of the Most Powerful Tools to Combat Fraud on the Government, Is Under Attack</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-lincolns-law-one-of-the-most-powerful-tools-to-combat-fraud-on-the-government-is-under-attack/</link>
		
		<dc:creator><![CDATA[Edward T. Kang and Kandis Kovalsky]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 20:53:55 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Whistleblower Actions]]></category>
		<category><![CDATA[False Claims Act]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<category><![CDATA[Qui Tam]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7251</guid>

					<description><![CDATA[The False Claims Act (FCA) can be a powerful tool to protect veteran health care in the wake of an uptick in private equity’s participation in the sector, in that it is now well-established that private equity companies and their principals can be held liable under the FCA. In the October 23, 2025 edition of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>The False Claims Act (FCA) can be a powerful tool to protect veteran health care in the wake of an uptick in private equity’s participation in the sector, in that it is now well-established that private equity companies and their principals can be held liable under the FCA.</em></p>
<p>In the October 23, 2025 edition of <a href="https://www.law.com/thelegalintelligencer/">The Legal Intelligencer</a>, Edward T. Kang and Kandis L. Kovalsky co-authored, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/10/23/lincolns-law-one-of-the-most-powerful-tools-to-combat-fraud-on-the-government-is-under-attack-/">The False Claims Act (FCA) can be a powerful tool to protect veteran health care in the wake of an uptick in private equity’s participation in the sector, in that it is now well-established that private equity companies and their principals can be held liable under the FCA</a>.&#8221;<span id="more-7251"></span></p>
<p>On Sept. 9, 2025, we had the great honor, along with our colleague Jacklyn DeMar, the chief executive officer of The Antifraud Coalition (TAF), of participating in a roundtable meeting at the U.S. House of Representatives Committee on Veterans’ Affairs at the invitation of the Honorable Mark Takano, the Ranking Member of the Committee. The roundtable, titled “Profit Over Quality: Examining the Effects of Private Equity on Veteran Healthcare,” was specifically focused on private equity’s role in the demise of health care for veterans. We discussed with Reps. Mark Takano and Jullia Brownley how the False Claims Act (FCA) can be a powerful tool to protect veteran health care in the wake of an uptick in private equity’s participation in the sector, in that it is now well-established that private equity companies and their principals can be held liable under the FCA.</p>
<p>Under the FCA, a whistleblower, called a “relator,” can file an action for violations of the FCA in federal court on behalf of the U.S. government; this is known as a qui tam action. The FCA requires that the action must be filed under seal and remain sealed for 60 days, during which time the government can investigate the reported fraud and misconduct. The reality is that the seal period in qui tam actions is usually extended many times, and it is not uncommon for the investigations to take several years. Oftentimes, litigation follows the investigation, which can take another few years, and sometimes more. The recent monumental case of <em>Penelow v. Janssen Products</em>, out of the U.S. District Court for the District of New Jersey, which resulted in a $1.64 billion judgment, is a good example. This case was filed in 2012, yet a judgment was not obtained until 2025—<em>13 years later</em>.</p>
<p>We explained to Ranking Member Takano and other members of Congress that to disincentivize private equity companies from participating in fraud on the government, the investigations in qui tam actions must move much quicker than they do now. The speed of the investigation regarding any private equity defendant is critical. This is because, generally, private equity companies exit their portfolio companies within three to seven years, to align with the life cycle of their investment funds. Private equity firms do not typically have a large pot of money sitting in an operating account like other types of companies may. To be able to collect damages under the FCA against a private equity firm, there needs to be liquidity in the specific fund formed for the acquisition of the portfolio company at issue. In situations where qui tam actions, through investigation and litigation, are taking a case to a point where settlement or obtaining a judgment is occurring seven to 10 years after the private equity firm’s acquisition of the portfolio company, it can make it difficult to have any chance of collecting, unless individual liability can also be established. Even so, settlements based on individual liability will almost always be on an ability-to-pay basis (especially when the mandatory trebling of damages and statutory penalties are accounted for).</p>
<p>DeMar explained to Takano that one solution to this predicament is to increase resources and staffing to the civil departments within the Department of Justice that are responsible for investigating and prosecuting qui tam cases. Rep. Takano responded: “I am wondering if some of the members here, we might write a letter to DOJ about the staffing challenges. If we are looking for government efficiency and rooting out fraud, waste, and abuse, I think we have hit a pretty big vein here, and if we could redirect DOGE into things like this, I would hazard to guess what that amount of money would be.”</p>
<p>This is correct. Government fraud is rampant. According to the Government Accountability Office (GAO), the federal government loses between $233 billion and $521 billion <em>annually</em> to fraud, waste and improper payments. Since 2003, federal agencies have reported about $2.8 trillion in improper payments. In 2024, 16 agencies reported improper payment estimates that totaled $162 billion. Specific high-problem areas include government health care programs (Medicare, Medicaid, TRICARE) and government defense contracts. All these statistics directly correlate to taxpayers’ hard-earned money being effectively stolen. According to The Heritage Foundation, this pattern continues to contribute to a taxpayer burden that already exceeds more than $270,000 per household due to the $36 trillion in taxpayer debt.</p>
<p>In 2024, $2.9 billion was recovered under the FCA, 83% of which is attributable to qui tam suits. Since the enactment of Sen. Chuck Grassley’s 1986 reforms to the FCA, FCA actions have returned $78 billion to the taxpayers, with more than 70% of this amount being because of qui tam actions (and the remainder being from FCA actions filed directly by the government). These cases also have a strong deterrent on future fraud, estimated to be in the many billions.</p>
<p>While we were at the U.S. House of Representatives, discussing how to better use FCA to fight fraud, others sought to dismantle its very existence.</p>
<p>On Sept. 10, 2025, an article was published here in The Legal Intelligencer titled “<a href="https://www.law.com/thelegalintelligencer/2025/09/10/historical-patterns-cannot-justify-contemporary-violations-of-constitutional-guaranteesrenewed-constitutional-attacks-on-fca-qui-tam-provisions-/">Historical Patterns Cannot Justify Contemporary Violations of Constitutional Guarantees—Renewed Constitutional Attacks on FCA Qui Tam Provisions</a>.” The authors of this article argued that “this is a pivotal moment for defendants to raise and preserve constitutional challenges to qui tam actions.” The article summarizes two court opinions from Judge Kathryn Kimball Mizelle, from the U.S. District Court for the Middle District of Florida, and one concurrence from Judge Stuart Kyle Duncan, from the U.S. Court of Appeals for the Fifth Circuit, in which these judges held that the FCA’s qui tam allowance violates Article II of the Constitution.</p>
<p>The FCA, also known as “Lincoln’s Law, was passed in 1863, during the Civil War. It was passed in response to war profiteers who defrauded the Union Army. The FCA has been good law for 162 years. So, why is there a push to change the law now? More importantly, why is this something defense lawyers would want and celebrate? If the FCA is ruled unconstitutional, the taxpayers will be saddled with billions more in debt each year while fraudsters profit from them, and the government will be left much more powerless to do anything about it. Further, holding the qui tam mechanism of the FCA statute as unconstitutional would not preserve or advance the interests of the Constitution; in fact, it would do the opposite and undermine many decades of precedent.</p>
<p>The constitutionality of the qui tam mechanism has been challenged many times before, and every circuit to consider the issue, including the Second, Fifth, Sixth, Seventh, Ninth, and Tenth Circuits, has held, in decisions ranging from 1993 to 2002, that the qui tam provision is in accordance with the Constitutional separation of powers. This aspiration to dismantle the FCA began with a 2023 dissent by Justice Clarence Thomas, who has authored many FCA opinions since his tenure on the high court began in 1991 without raising this issue, including the infamous <em>Escobar</em> decision in 2016.</p>
<p>In 2023, in the case of <em>Polansky v. Executive Health Resources</em>, Thomas disagreed with the eight-Justice majority, which held that the government has broad discretion to seek dismissal of relators’ <em>qui tam</em> actions. Justice Thomas went further, though, in arguing that the qui tam function of the FCA violates Article II of the Constitution. In his flawed opinion, representation of the United States’ interests is an executive function conferred only to the president and individuals appointed as officers of the United States under Article 2, the appointments clause.</p>
<p>Shortly thereafter, Judge Mizelle, who clerked for Justice Thomas in 2018 and 2019, reached the same flawed conclusion in <em>Zafirov v. Florida Medical Associates</em>. The Eleventh Circuit’s decision in this case will be a defining moment for the FCA. If the court rules in favor of the appellants, it will be the seventh circuit to join the majority view that qui tam actions are constitutional. Suppose it rules in favor of the appellees. In that case, it will create a circuit split on the issue, and with not only Justice Thomas, but also Justices Brett Kavanaugh and Amy Coney Barrett itching to revisit this issue, it is somewhat unclear what the outcome would be.</p>
<p>Justice Thomas said last month that he does not view the high court’s prior rulings as “the gospel” and that any precedent that does not respect the U.S. Constitution or the country’s legal traditions is ripe for reconsideration. Justice Thomas’ attack on the constitutionality of qui tam actions seems to be a part of his larger philosophy to upend any precedent, no matter how longstanding, that he believes is violative of the Constitution. This approach undermines the public’s faith in the judiciary, which is already at an all-time low. In the case of the FCA, there appears to be no upside. More than 75% of the recoveries in FCA actions are from cases filed by whistleblowers. Simply put, the government does not have the resources to achieve what whistleblowers can in the FCA space. To dismantle qui tam actions would be bad for the public. And, for the reasons outlined in all the briefs filed on behalf of the appellants in the <em>Zafirov</em> appeal, particularly the amicus brief filed on behalf of Sen. Grassley, Justice Thomas, and Judges Mizelle and Duncan are wrong in their analysis.</p>
<p>For the sake of this country, let’s hope that the Eleventh Circuit does the right thing in the<em> Zafirov</em> appeal, that more resources can be allocated to the DOJ to fight fraud on the government, and that there can be a bipartisan approach in doing so under the FCA so that the government can recoup more of the billions of dollars that are siphoned off by fraudsters each year.</p>
<p><strong>Edward T. Kang</strong> is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</p>
<p><strong> Kandis L. Kovalsky</strong>, a member with the firm, focuses her practice on a broad range of high stakes business-related civil litigation in Pennsylvania, New Jersey, and New York state and federal courts and arbitral tribunals, and representing relators in high stakes qui tam actions filed under the federal and state False Claims Acts.</p>
<p><strong><em>Reprinted with permission from the October 23, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7251</post-id>	</item>
		<item>
		<title>Legal Intelligencer: No End-Run Piercing: Lessons From &#8216;Mortimer&#8217; and &#8216;Dewberry&#8217;</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-no-end-run-piercing-lessons-from-mortimer-and-dewberry/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 23:11:19 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<category><![CDATA[Piercing the Corporate Veil]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7248</guid>

					<description><![CDATA[Taken together, Mortimer and Dewberry define both opportunity and constraint. They confirm that Pennsylvania trial courts may develop an enterprise liability doctrine but also underscore that no amount of judicial sympathy can justify collapsing corporate distinctions without rigorous analysis. In the September 11, 2025 edition of The Legal Intelligencer, Edward Kang writes, &#8220;No End-Run Piercing: [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Taken together, Mortimer and Dewberry define both opportunity and constraint. They confirm that Pennsylvania trial courts may develop an enterprise liability doctrine but also underscore that no amount of judicial sympathy can justify collapsing corporate distinctions without rigorous analysis.</em></p>
<p>In the September 11, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/09/11/no-end-run-piercing-lessons-from-mortimer-and-dewberry/">No End-Run Piercing: Lessons from &#8216;Mortimer&#8217; and &#8216;Dewberry.&#8217;</a>&#8220;<span id="more-7248"></span></p>
<p>Pennsylvania law is not settled on the matter of piercing the corporate veil—particularly with regard to horizontal or “enterprise” liability. While the Pennsylvania Supreme Court recognized the possibility of holding sister corporations jointly liable in <em>Mortimer v. McCool</em>, 255 A.3d 261 (Pa. 2021), it ultimately declined to apply that theory on the facts. The U.S. Supreme Court has since weighed in, albeit under the Lanham Act context, to remind lower courts nationwide that corporate separateness is to be respected absent a properly pleaded and proven veil-piercing theory. See <em>Dewberry Group v. Dewberry Engineers</em>, 604 U.S. 321 (2025).</p>
<p>In this column in September 2021, I discussed <em>Mortimer</em>, the enterprise theory of liability generally, and the common sequencing decisions plaintiffs need to make when bringing a veil piercing claim in &#8220;<a href="https://www.khflaw.com/news/legal-intelligencer-enterprise-liability-and-when-to-seek-piercing-the-corporate-veil/">Enterprise Liability and When to Seek Piercing the Corporate Veil</a>.&#8221;</p>
<p>Taken together, <em>Mortimer</em> and <em>Dewberry</em> define both opportunity and constraint. They confirm that Pennsylvania trial courts may develop an enterprise liability doctrine but also underscore that no amount of judicial sympathy can justify collapsing corporate distinctions without rigorous analysis. For practitioners on both sides of the “v.”—whether trying to collect against shell entities or defend against overreach—these cases chart the terrain for the next decade of veil-piercing litigation.</p>
<p>In <em>Mortimer</em>, the injured plaintiff secured a multimillion-dollar judgment against the entity, whose only asset was a liquor license, insufficient to satisfy the judgment. As such, the plaintiff sought to hold a related real estate entity owned by the same family liable as part of a unitary enterprise. The Pennsylvania Supreme Court acknowledged that “sister corporations” might, under some circumstances, be held jointly liable for each other’s debts. But it emphasized that the liquor-license entity was adequately capitalized, and that the two companies operated distinctly. The court noted a single purpose entity, such as the liquor-license entity, need not be capitalized any more than it had based on Pennsylvania’s common practice of using a single purpose entity for holding liquor licenses. The court invited lower courts to apply enterprise liability when the equities demanded but declined to do so itself in that case.</p>
<p>Fast-forward to <em>Dewberry</em>, the U.S. Supreme Court analyzed the enterprise liability theory within the Lanham Act context. The Lanham Act allows prevailing plaintiffs in trademark cases to recover the “defendant’s profits” as part of remedies under the act. See 15 U.S.C. Section 1117(a). The plaintiff sought to sweep in the profits of affiliates of the corporate defendant, Dewberry Group, even though those affiliates had not been named as parties. The lower courts—both the district court and the U.S. Court of Appeals for the Fourth Circuit—agreed, reasoning that all those companies should be “treated as a single corporate entity,” and that the affiliates’ earnings were so intertwined with the defendant’s that they could be treated as part of the same profit pool.</p>
<p>The Supreme Court unanimously reversed. The court emphasized the statutory text: the “defendant’s profits” means exactly that, the profits of the named defendant, not those of affiliates or related entities. The court acknowledged that the lower courts’ reasoning was based on the “economic reality” of how the defendant and its affiliate entities operated and acknowledged the lower courts’ concern that strict adherence to corporate formalities would let infringing conduct escape penalty. However, the court held that ignoring the distinction between the corporate defendant and its separately incorporated affiliates improperly swept nondefendants’ profits into the award and went further than the Lanham Act allows.</p>
<p>But the court’s ruling went beyond simple textualist interpretation of a federal statute to reaffirm one of the bedrock principles of American corporate law: corporate separateness. Its language was unambiguous: “The courts below were wrong to treat Dewberry Group and its affiliates as a single entity in calculating the ‘defendant’s profits.’ Dewberry Group is the sole defendant here, and under that language only its own profits are recoverable.”</p>
<p>Notably, the opinion pointedly declined to address whether traditional veil-piercing might be available on remand. Neither did the court decide when courts may look behind accounting records to examine the “economic realities” of a transaction, nor how far the Lanham Act’s “just sum” provision might extend in cases where corporate structures are used to disguise true profits.</p>
<p>In a separate opinion, Justice Sonia Sotomayor highlighted these open questions and underscored that corporate separateness is not absolute: courts are not required to ignore economic reality or accept “clever accounting” designed to disguise a defendant’s true financial gain through affiliate arrangements. She offered concrete examples, such as when a defendant provides infringing services to an affiliate at artificially low rates, thereby shifting profits on paper while retaining the economic benefit. In such cases, she explained, a court’s equitable powers may allow it to treat the affiliate’s revenues as part of the defendant’s profits. Her concurrence concluded by directing the lower courts on remand to “explore that important issue and consider reopening the record if appropriate.”</p>
<h2>Implications for Veil Piercing Claims</h2>
<p>The immediate holding of <em>Dewberry</em> is narrow and limited to the Lanham Act’s calculation of a “defendant’s profits,” but its implications extend much further. At bottom, the court reaffirmed that related companies cannot be treated as interchangeable absent a properly proven veil-piercing theory. It also underscored the plaintiff’s burden to identify and join the parties whose assets are at stake, rather than relying on judicial willingness to collapse affiliates into a single enterprise. Where <em>Mortimer</em> invited Pennsylvania courts to explore enterprise liability in appropriate cases, <em>Dewberry</em> reminded all courts of the doctrinal limitations on doing so: end-runs are not permitted.</p>
<p>For plaintiffs, the combined lesson of <em>Mortimer</em> and <em>Dewberry</em> is that veil-piercing remains possible but will require precision. Pleadings must be carefully drafted to bring in all relevant entities, since courts will not read “defendant” to include affiliates not before them. Discovery must be used carefully and strategically to develop facts showing undercapitalization, asset-shuffling, and systemic commingling. Courts are most receptive when the record tells a story of exploitation or injustice—for instance, when a defendant has hollowed out one entity while leaving a creditor with no meaningful recourse, or when affiliates are used as conduits to dodge liability. Plaintiffs who can frame their cases in these terms are more likely to persuade a court that veil-piercing is warranted.</p>
<p>For defendants, <em>Dewberry</em> is a reassuring reminder that corporate separateness is still the rule. Sympathy for injured plaintiffs is not a license for courts to disregard the form of incorporation. But the decision also highlights the importance of corporate hygiene. Each entity must maintain its own records, hold meetings and file required documents. Finances must be kept distinct, with no commingling or undocumented inter-company loans. Entities should be sufficiently capitalized for their intended purposes and insured (for operating entities) so they cannot be portrayed as judgment-proof shells. Even public-facing materials matter: branding that blurs the lines between affiliates may be used as evidence of a “single enterprise” in future litigation. In both internal governance and outward presentation, the safest course is to respect boundaries consistently.</p>
<p>Edward T. Kang is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</p>
<p><strong><em>Reprinted with permission from the September 11, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7248</post-id>	</item>
	</channel>
</rss>
