<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Kang Haggerty News</title>
	<atom:link href="https://www.khflaw.com/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.khflaw.com/news/</link>
	<description>Published By Kang Haggerty LLC</description>
	<lastBuildDate>Thu, 19 Mar 2026 16:22:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Legal Intelligencer: AI Systems and the Question of Confidentiality</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-ai-systems-and-the-question-of-confidentiality/</link>
		
		<dc:creator><![CDATA[Kelly Lavelle]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 14:44:18 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[ediscovery]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7304</guid>

					<description><![CDATA[Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable. In the March 19, 2026 edition of The Legal Intelligencer, Kelly Lavelle writes, &#8220;AI Systems [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable.</em></p>
<p>In the March 19, 2026 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Kelly Lavelle writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/03/19/ai-systems-and-the-question-of-confidentiality/?slreturn=20260319103703">AI Systems and the Question of Confidentiality</a>.&#8221;<span id="more-7304"></span>Much of the attention surrounding generative AI in litigation has focused on hallucinated authorities and AI-generated filings. But a different litigation risk arises when lawyers, or even clients themselves, enter client information into an AI platform. Before privilege or production issues arise, the more basic inquiry is whether the information was ever confidential in the first place. This question is particularly significant in e-discovery, where electronically stored information generated by AI systems may later become discoverable.</p>
<p>The U.S. District Court for the Southern District of New York’s decision in <i>United States v. Heppner</i> brings that issue into focus. Although the case has been described as a privilege ruling, the court’s analysis turned on a more basic issue: whether the information was confidential when it was entered into the AI platform. If client information is submitted to a system under terms that allow the provider to access, retain, or disclose it, the protections that depend on confidentiality, including attorney-client privilege and work product, may never attach.</p>
<p>In <i>Heppner,</i> a corporate executive under criminal investigation used the publicly available generative AI platform “Claude” to generate written analyses of potential defenses after receiving a grand jury subpoena. He later shared those documents with counsel. Following his arrest, FBI agents executed a search warrant at Bradley Heppner&#8217;s home and seized numerous documents and electronic devices. Heppner&#8217;s counsel later informed the government that among the seized materials were approximately thirty-one documents memorializing Heppner’s communications with the AI platform.</p>
<p>Through his counsel, Heppner asserted privilege over these documents, arguing that the information entered into the AI platform was learned, that he created the documents to facilitate discussions with counsel and obtain legal advice, and that he subsequently shared the AI outputs with his attorneys. His counsel acknowledged, however, that they did not direct Heppner to conduct the AI searches. The court rejected those claims. It held that the documents were not communications with an attorney, were not prepared by or at the direction of counsel, and, critically, were not confidential in light of the platform’s privacy policy.</p>
<p>The court’s analysis centered on the conditions under which the information was entered into the system. The provider’s terms stated that user inputs and outputs were collected and retained and that the company reserved the right to disclose data to third parties, including governmental authorities. Under those conditions, the court concluded that Heppner lacked a reasonable expectation of confidentiality at the moment of disclosure.</p>
<p>The court also rejected Heppner’s contention that he communicated with Claude for the “express purpose of talking to counsel.” In doing so, the court looked to the platform’s own representations. Claude expressly disclaimed providing legal advice. When asked whether it could provide such advice, the system responded that it was not a lawyer, could not offer formal legal recommendations, and advised users to consult a qualified attorney.</p>
<p>The court acknowledged that the implications of artificial intelligence for the law are only beginning to be explored. The court emphasized that AI’s novelty does not place it outside established legal principles, including those governing attorney-client privilege and the work-product doctrine. AI does not change the basic rules.</p>
<p>The opinion highlights a familiar but often underemphasized principle that privilege attaches only when communications are intended to be confidential and were, in fact, kept confidential. In the AI context, if a platform’s terms allow provider use beyond delivering the requested service, such as model training, analytics, affiliate sharing, or extended retention, the user may be acting inconsistently with the intent to preserve confidentiality at the moment of disclosure. The issue is not a subsequent waiver. It is that the platform itself may defeat confidentiality at inception.</p>
<p>This reasoning extends beyond generative AI. Courts have consistently held that employees may waive attorney-client privilege when using employer email systems to communicate with counsel, with the analysis turning on whether the employee had an objectively reasonable expectation of confidentiality. In those cases, the inquiry focuses on whether the intent to communicate in confidence was objectively reasonable under the circumstances. <i>Heppner</i> suggests that AI platforms may be subject to similar scrutiny. The terms governing data retention and disclosure may determine whether any protection exists at all.</p>
<p>The court also reaffirmed that privilege remains grounded in professional accountability. Recognized privileges depend on a relationship with a licensed professional who owes fiduciary duties and is subject to discipline. Generative AI does not occupy that role. Even if an output resembles legal advice, it is not a communication with counsel.</p>
<p>However, the court suggested that if counsel had directed the use of the AI tool within a structured framework, the analysis might have been different. That distinction highlights the importance of control. When AI use is integrated into a counsel-directed process under defined terms, protection arguments may be stronger. When it is independent and unsupervised, confidentiality may fail at the start.</p>
<p>Platform terms of service are therefore central. Many providers claim licenses to user inputs and outputs broader than a confidentiality-preserving relationship would tolerate, sometimes including rights to use content for service improvement, analytics or model training. However, this concern does not apply in the same way to all AI tools. Paid legal research platforms or firm-licensed systems are often governed by professional services agreements that include confidentiality obligations and defined data controls. In those contexts, the vendor functions more like a traditional litigation support provider than a public AI service. Even there, however, the analysis may turn on the contract. Courts will look at the terms to determine what they permit and how the provider handles user content.</p>
<p>These issues directly affect attorney-client privilege. Privilege protects confidential communications made for the purpose of obtaining or providing legal advice. The problem is not simply waiver. It is that the basic requirements for privilege may never have been satisfied. The work-product doctrine raises a similar issue. Work product protects materials prepared in anticipation of litigation. If those materials are created on a public nonconfidential platform, it weakens the argument that they reflect protected legal strategy shielded from disclosure.</p>
<p><i>Heppner</i> reinforces the basic rule that privilege depends on confidentiality at the time the communication is made. It does not arise simply because a document is later shared with counsel. In the AI context, that means platform terms, data handling practices, and professional controls must align with confidentiality requirements before client information is entered. The focus should be less on whether AI interactions are discoverable and more on whether confidentiality ever attached. As <i>Heppner</i> shows, confidentiality is not assumed simply because a document resembles legal analysis. It depends on the conditions under which the information was created and maintained.</p>
<p><b>Kelly A. Lavelle</b> <i>is Senior Counsel at Kang Haggerty. She focuses on e-discovery and information management, from preservation and collection to review and production of large volumes of electronically stored information. Contact her at <a href="mailto:klavelle@kanghaggerty.com">klavelle@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the March 19, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7304</post-id>	</item>
		<item>
		<title>Kang Haggerty Hosts Post EDPA Roundtable Happy Hour for TAF at Kiddo</title>
		<link>https://www.khflaw.com/news/kang-haggerty-hosts-post-edpa-roundtable-happy-hour-for-taf-at-kiddo/</link>
		
		<dc:creator><![CDATA[Kang Haggerty LLC]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 16:22:06 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[TAF]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7306</guid>

					<description><![CDATA[Kang Haggerty was pleased to host a post‑Eastern District of Pennsylvania Roundtable Happy Hour for TAF – The Anti‑Fraud Coalition last night at Kiddo in Philadelphia. The gathering brought together whistleblower practitioners, government colleagues, and members of the broader anti‑fraud community to continue the conversations sparked during the EDPA roundtable. We’re grateful to everyone who [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Kang Haggerty was pleased to host a post‑Eastern District of Pennsylvania Roundtable Happy Hour for <strong>TAF – The Anti‑Fraud Coalition</strong> last night at <strong>Kiddo</strong> in Philadelphia. The gathering brought together whistleblower practitioners, government colleagues, and members of the broader anti‑fraud community to continue the conversations sparked during the EDPA roundtable.<span id="more-7306"></span></p>
<p>We’re grateful to everyone who joined us to strengthen the relationships that drive effective False Claims Act enforcement and support the mission of TAF. A special thank‑you to Kiddo for the warm hospitality and to all who helped make the evening a success.</p>
<p>We look forward to continuing to support TAF’s work and to creating more opportunities for connection across our community.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7306</post-id>	</item>
		<item>
		<title>Kang Haggerty Welcomes Three New Associates to Its Growing Litigation Team</title>
		<link>https://www.khflaw.com/news/kang-haggerty-welcomes-three-new-associates-to-its-growing-litigation-team/</link>
		
		<dc:creator><![CDATA[Kang Haggerty LLC]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 05:08:14 +0000</pubDate>
				<category><![CDATA[Firm News]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7302</guid>

					<description><![CDATA[Philadelphia, PA (March 4, 2026):  Kang Haggerty LLC is pleased to announce the addition of Walter O. Bourdaghs, Kyle Hannigan, and Nicholas Cardoso as Associates, further strengthening the firm’s capabilities across complex commercial litigation, business disputes, employment matters, whistleblower matters, and related practice areas. Each brings a strong academic background, diverse professional experience, and a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Philadelphia, PA (March 4, 2026):</strong>  <a href="https://www.khflaw.com/">Kang Haggerty LLC</a> is pleased to announce the addition of Walter O. Bourdaghs, Kyle Hannigan, and Nicholas Cardoso as Associates, further strengthening the firm’s capabilities across complex commercial litigation, business disputes, employment matters, whistleblower matters, and related practice areas. <span id="more-7302"></span>Each brings a strong academic background, diverse professional experience, and a commitment to client-focused advocacy that aligns with the firm’s values and strategic growth.</p>
<p><a href="https://www.khflaw.com/walter-ogura-bourdaghs.html"><strong>Walter O. Bourdaghs</strong></a> focuses his practice on complex commercial litigation, construction law, and civil rights matters, drawing on experience representing individuals, small businesses, and international companies. He earned his J.D. from Boston University School of Law and holds a B.A. from Beloit College. Walter is admitted to practice in Massachusetts, Connecticut, New Jersey, and Pennsylvania, and recently relocated to Philadelphia after working at MG+M law firm in Boston, following six years as Center Coordinator at the University of Chicago’s Center for East Asian Studies.</p>
<p><a href="https://www.khflaw.com/kyle-j-hannigan.html"><strong>Kyle Hannigan</strong></a> focuses his practice on complex civil litigation, contract disputes, whistleblower claims, and creditors’ rights, bringing experience helping clients navigate a wide range of legal challenges. He earned his J.D. from Rutgers Law School and holds a B.A. in Law &amp; Justice from Rowan University. Kyle is admitted to practice in Delaware and began his career at Kang Haggerty as a law clerk during law school; before entering the legal profession, he spent eight years in the automotive industry as a vehicle technician and service and parts coordinator.</p>
<p><a href="https://www.khflaw.com/nicholas-j-cardoso.html"><strong>Nicholas Cardoso</strong></a> focuses his practice on business disputes and employment law, representing clients on both the plaintiff and defense sides in matters involving complex commercial litigation, contract disputes, and workplace claims. He earned his J.D. from the University of Virginia School of Law and holds a B.A. in Criminology from The College of New Jersey. Nick is admitted to practice in New Jersey and Pennsylvania and previously practiced at an Am Law 200 firm, where he gained valuable insight into defense strategies that inform his work today.</p>
<p>“We are thrilled to welcome Walter, Kyle, and Nick to the firm,” said Edward T. Kang, Managing Member of Kang Haggerty. “Each of them brings strong litigation skills, intellectual rigor, and a client centered approach that enhances our ability to serve businesses and individuals across the region.”</p>
<hr />
<p><strong>Kang Haggerty LLC</strong> is a boutique business litigation firm with offices in Philadelphia, PA and Marlton, NJ. The firm was formed by lawyers with a wide range of professional, cultural, social, and political backgrounds.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7302</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Taking a Plaintiff’s Case to the Next Level: Holding Individuals Liable Under Pennsylvania Law</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/</link>
		
		<dc:creator><![CDATA[Edward T. Kang and Kandis Kovalsky]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 22:24:12 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7298</guid>

					<description><![CDATA[Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape. In the February 19, 2026 edition of The Legal Intelligencer, Edward Kang and Kandis Kovalsky [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape.</em></p>
<p>In the February 19, 2026 edition of <a href="https://www.law.com/thelegalintelligencer/">The Legal Intelligencer</a>, Edward Kang and Kandis Kovalsky co-authored, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/02/19/taking-a-plaintiffs-case-to-the-next-level-holding-individuals-liable-under-pennsylvania-law/?slreturn=20260219170528">Taking a Plaintiff’s Case to the Next Level: Holding Individuals Liable Under Pennsylvania Law</a>.&#8221;<span id="more-7298"></span></p>
<p>For plaintiffs counsel, winning a verdict against a corporate entity is often only the opening act. The real contest begins post-judgment, when the defendant reveals itself to be a shell: a defunct LLC, a dissolved partnership, or a corporation with nominal assets. The plaintiff, having prevailed on liability, is left holding a judgment that is legally pristine but could be practically worthless.</p>
<p>This outcome is avoidable. Strategic practitioners do not need to treat entity liability as the finish line; they may treat it as a starting point. Holding individual owners or officers personally liable—whether as partners, corporate actors, alter egos, or signatories—fundamentally alters the litigation landscape. It expands the pool of recoverable assets, concentrates the minds of defense counsel, and aligns the case with the core purpose of civil liability: meaningful accountability against wrongdoers.</p>
<h3>Why Individual Liability Matters</h3>
<p>The pursuit of individual liability is not a secondary consideration; it is a force multiplier for three distinct reasons.</p>
<p>First, individual exposure changes behavior. A corporate entity, insulated by limited liability and defense counsel, often litigates with strategic detachment. An individual whose personal assets, reputation, and future earnings are at risk does not. Cases involving individual defendants often settle differently—earlier, at higher values, and with fewer procedural hurdles. Personal risk concentrates attention in ways that corporate liability rarely does.</p>
<p>Second, the assets often reside with the individuals. Commercial general liability policies carry limits and exclusions. Directors and officers (D&amp;O) policies, by contrast, frequently provide broader coverage that follows the individual, not the entity. A dissolved corporation cannot respond to a judgment; a former officer with a D&amp;O tail policy can. General partners remain personally liable for partnership obligations—a fact often forfeited when plaintiffs name only the partnership in the complaint.</p>
<p>Third, accountability is the product. The Department of Justice’s 2015 Yates Memo recognized that corporate enforcement is incomplete when it stops at the entity level. Civil plaintiffs experience this reality firsthand. A family suing a nursing home chain is not made whole by a judgment against a corporate shell. They seek accountability from the individuals who made the decisions that caused the harm. That impulse is not merely human—it is legally and strategically sound.</p>
<h3>Direct Liability Under Pennsylvania Statutes</h3>
<p>It is well known that general partners are jointly liable for the debts of a partnership. This most straightforward path to individual liability is often statutory—and frequently overlooked at the pleading stage. Under the Pennsylvania Uniform Partnership Act, a judgment against a partnership is not, by itself, a judgment against any individual partner. See 15 Pa.C.S. Section 8437. Pennsylvania Rule of Civil Procedure 2132 reinforces this principle: a judgment entered against a partnership sued only in its firm name supports execution only against partnership property. To reach a partner’s individual assets, the partner must be named and served in the lawsuit.</p>
<p>The same logic applies to limited partnerships, under 15 Pa.C.S. Section 8645. General partners are jointly and severally liable for partnership obligations, but only if they are properly joined. A judgment against the limited partnership alone does not reach them. This is not a substantive limitation on liability; it is a pleading requirement. Plaintiffs who fail to name individual partners at the outset may forfeit the ability to collect from them entirely.</p>
<p>The lesson is elementary: name the partners when warranted. The cost of doing so is negligible; the cost of failing to do so can be fatal to recovery.</p>
<h3>Participation Theory: Liability Through Conduct</h3>
<p>Beyond statutory partnership liability, Pennsylvania recognizes a common-law doctrine that imposes individual liability on corporate officers and directors based on their personal involvement in tortious conduct. This is the participation theory, articulated most clearly in the Pennsylvania Supreme Court case <em>Wicks v. Milzoco Builders</em>, 470 A.2d 86 (Pa. 1983). Under Wicks, a corporate officer is individually liable for torts committed in the course of employment if the officer personally participated in the wrongful conduct or directed it to occur. See our earlier article on this topic, <a href="https://www.khflaw.com/news/legal-intelligencer-a-primer-on-pennsylvanias-participation-theory/">here</a>.</p>
<p>Participation theory is not veil-piercing. It does not require proof of fraud, undercapitalization, or disregard of corporate formalities. It does not attack the corporate structure. Instead, it reflects a bedrock principle: individuals remain liable for their own torts, even when acting on behalf of a corporation.</p>
<p>But the doctrine has limits. Alleging that a defendant held a corporate title or signed a document is insufficient. Plaintiffs must plead specific facts demonstrating personal involvement: directing the conduct, approving the scheme, making the misrepresentation, or physically engaging in the wrongful act. Courts are skeptical of boilerplate allegations of “participation.” Overreaching invites dismissal and damages credibility.</p>
<p>Participation theory applies only to individuals, not affiliated entities. To reach parent companies or sister corporations, plaintiffs must turn to other doctrines, such as alter ego or enterprise liability.</p>
<h3>Contractual Liability: The Signatory Problem</h3>
<p>In contract cases, the path to individual liability is narrower and more nuanced. The general rule is familiar: an agent who signs a contract on behalf of a disclosed principal is not personally liable on that contract (unless the agent specifically agrees to assume liability). See <em>Vernon D. Cox &amp; Co. v. Giles</em>, 406 A.2d 1107, 1110 (Pa. Super. 1979). But the exceptions are where cases are won or lost.</p>
<p>One common exception arises from ambiguity. If a contract does not clearly indicate the signatory’s representative capacity, parol evidence may be admissible to determine whether the parties intended individual liability. See <em>Trenton Trust v. Klausman</em>, 296 A.2d 275, 277 (Pa. Super. 1972). Ambiguous signature blocks, inconsistent use of letterhead, or vague agency language can expose individuals to personal liability. See <em>Hazer v. Zabala</em>, 26 A.3d 1166, 1170 (Pa. Super. 2011).</p>
<p>Another fertile theory is misrepresentation of authority. An agent who warrants they have authority to bind a principal—but does not—may be personally liable for breach of warranty of authority. See <em>Kribbs v. Jackson</em>, 129 A.2d 490, 496 (Pa. 1957) Similarly, an individual who makes material misrepresentations to induce a contract may face tort liability for fraudulent inducement, even if the contract itself binds only the entity. See <em>Felix v. Fraternal Order of Police</em>, Philadelphia Lodge No. 5, 759 A.2d 34, 39 (Pa. Commw. Ct. 2000).</p>
<p>These theories should be explored early. Discovery into the signatory’s knowledge, the entity’s financial condition at the time of contracting, and the parties’ communications can reveal evidence of individual intent and responsibility. In the right case, contractual individual liability is not ancillary; it is central.</p>
<h3>Alter Ego and Piercing the Corporate Veil</h3>
<p>The most demanding—and most powerful—path to individual liability is veil piercing. Pennsylvania law requires a showing that the corporation was a mere alter ego or business conduit of the individual and that respecting the corporate form would sanction fraud, illegality, or fundamental unfairness. Put simply, veil-piercing is most viable when someone uses a corporate form to perpetrate fraud.</p>
<p>Unlike participation theory, veil piercing attacks the corporate structure itself. It can also extend beyond individuals to affiliated entities under enterprise liability theories. In <em>Mortimer v. McCool</em>, 255 A.3d 261 (Pa. 2021), the Pennsylvania Supreme Court recognized the viability of enterprise liability while declining to apply it on the facts. More recently, in <em>Dewberry Group v. Dewberry Engineers</em>, 604 U.S. 321 (2025), the U.S. Supreme Court reaffirmed the presumption of corporate separateness but left room for traditional veil piercing and equitable adjustments where corporate forms obscure economic reality. See our latest article on this topic, <a href="https://www.khflaw.com/news/legal-intelligencer-no-end-run-piercing-lessons-from-mortimer-and-dewberry/">here</a>.</p>
<p>These decisions offer both caution and opportunity. Courts will not disregard corporate form lightly, but they remain receptive to well-supported claims involving commingling, asset shifting, undercapitalization, and artificial inter-company transactions. Discovery into inter-company transfers, pricing practices, and the use of shell entities can provide the factual foundation necessary to overcome the presumption of separateness.</p>
<p>As a practical matter, veil piercing should rarely be pled in an initial complaint. The necessary facts are almost never available pre-discovery, and premature allegations risk early dismissal under Pennsylvania’s fact-pleading standards, and potentially, a loss of credibility with the court. A more effective strategy is to plead viable individual claims under participation theory and statutory liability, then develop the evidentiary record to support alter ego claims as the case progresses.</p>
<h3>Choosing the Right Theory</h3>
<p>Each individual liability doctrine serves a distinct function, and understanding their interplay is critical to effective case management.</p>
<ul>
<li>Partnership liability is mandatory, not discretionary. Name the partners.</li>
<li>Participation theory is the primary tool for holding officers and managers accountable for their own tortious conduct.</li>
<li>Contractual liability theories apply where ambiguity, misrepresentation, or extra-contractual conduct creates individual exposure.</li>
<li>Veil piercing and enterprise liability are reserved for cases involving manipulation of corporate form to evade responsibility or to perpetuate fraud.</li>
</ul>
<p>Used together, these doctrines transform litigation strategy. They expand the defendant pool, increase settlement leverage, and protect plaintiffs from the all-too-common scenario of winning on liability but losing on collectability.</p>
<h3>Conclusion</h3>
<p>The shift from entity liability to individual accountability is not merely tactical; it reflects the economic realities of modern commerce. Corporate entities can be created, dissolved, and restructured with ease. Individuals endure. They hold assets, carry insurance and bear responsibility for their conduct. On many occasions, individuals are the wrongdoers.</p>
<p>Plaintiffs who treat the corporate defendant as the endpoint of litigation will continue to obtain judgments against shell companies and wonder why their clients remain uncompensated. Plaintiffs who integrate individual liability into their strategy from the outset—by naming partners, pleading participation, scrutinizing contractual authority, and preserving alter ego theories—are likely to recover more. They will fulfill the fundamental promise of civil law: that wrongdoing leads to meaningful accountability, not empty judgments.</p>
<p><strong>Edward T. Kang</strong> <em>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>. </em></p>
<p><strong>Kandis L. Kovalsky</strong><em>, a member with the firm, focuses her practice on a broad range of high stakes business-related civil litigation in Pennsylvania, New Jersey, and New York state and federal courts and arbitral tribunals, and representing relators in high stakes qui tam actions filed under the federal and state False Claims Acts. Contact her at <a href="mailto:kkovalsky@kanghaggerty.com">kkovalsky@kanghaggerty.com</a>. </em></p>
<p><strong><em>Reprinted with permission from the February 19, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7298</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Authenticity Under Pressure: Rethinking Rule 901 in the Age of AI</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-authenticity-under-pressure-rethinking-rule-901-in-the-age-of-ai/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 19:42:48 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7278</guid>

					<description><![CDATA[This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies. In the January 7, 2026 edition of The Legal Intelligencer, Edward Kang [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies.</em></p>
<p>In the January 7, 2026 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2026/01/07/authenticity-under-pressure-rethinking-rule-901-in-the-age-of-ai/">Authenticity Under Pressure: Rethinking Rule 901 in the Age of AI.</a>&#8220;<span id="more-7278"></span></p>
<p>For decades, Federal Rule of Evidence 901 has been a pillar of evidentiary stability. Its intentionally flexible standard—requiring only “evidence sufficient to support a finding that the item is what the proponent claims it is”—easily accommodated evidence from handwritten letters to surveillance footage. Authentication disputes were rarely dispositive, typically resolved through minimal foundation and common sense.</p>
<p>Enter the age of artificial intelligence (AI). The advent of generative artificial intelligence—specifically, tools capable of producing hyper-realistic audio, video, images and text (deepfakes)—has fractured the rule’s foundational assumptions. When synthetic media can replicate a person’s likeness or voice with near-perfect fidelity, traditional authenticity markers become unreliable. Evidence can be entirely fabricated yet appears genuine, leaving opposing parties without meaningful tools to prove manipulation.</p>
<p>This technological shift has triggered a parallel evolution in law. The conversation now spans from reforming Rule 901 to proposing a new Federal Rule of Evidence 707 specifically for AI-generated evidence. Simultaneously, ethics regulators are clarifying that lawyer competence requires understanding these technologies. The result is a critical convergence: the mechanics of authentication are now inseparable from counsel’s duty of competence under ABA Model Rule 1.1.</p>
<h2>Rule 901’s Analog Assumption in a Digital World</h2>
<p>Rule 901 was conceived in an era where forgery was typically crude, detectable, and difficult to scale. Its illustrative examples—testimony based on personal knowledge, distinctive characteristics, chain of custody—presume authenticity can be assessed through human perception and circumstantial context.</p>
<p>Generative AI dismantles this logic. Modern models produce videos of individuals saying things they never uttered, audio clips indistinguishable from real recordings, and documents that mimic unique writing styles—often complete with consistent metadata and artifacts that evade casual scrutiny. In this context, a witness’ assurance that evidence “looks real” offers scant probative value.</p>
<p>Courts are sensing this mismatch. While few opinions directly confront deepfakes, judicial unease with superficial digital authentication is growing. See, e.g., <em>Alford v. Commonwealth</em>, No. 2022-SC-0278-MR, 2024 WL 313431, at *6 (Ky. Jan. 18, 2024) (stating that the emergence of artificial intelligence, with the capacity and initiative to manipulate digital media, “will only serve to further compromise our determinations of authenticity unless such advancements are both recognized and addressed by our courts”). Some courts are “mindful” that the rules of evidence “may need to adapt,” yet still apply the same “low threshold for authentication” of electronic evidence as instructed by the current rules. See <em>State v. Ziolkowski</em>, 329 A.3d 939, 950 (Conn. 2025). The result is unpredictability: similar evidence may be admitted in one courtroom and excluded in another, based largely on a judge’s comfort with the technology rather than a consistent doctrinal framework. “As artificial intelligence progresses, battles over the accuracy of computer images and manipulation of deepfakes can be expected to intensify.” See <em>Pegasystems v. Appian</em>, 904 S.E.2d 247, 279 (Va. App. 2024), appeal granted (Mar. 7, 2025); see also <em>People v. Smith</em>, 969 N.W.2d 548, 565 (Mich. App. 2021) (“we are mindful that in the age of &#8230; so-called deep fakes, a trial court faced with the question whether a social-media account is authentic must itself be mindful of these concerns”).</p>
<h2>The Case for Reforming Rule 901: Asymmetry and Reliability</h2>
<p>The push for reform centers on two flaws exposed by AI: asymmetry and compromised reliability. A proponent of synthetic evidence needs only to clear Rule 901’s low bar of plausibility. The opponent, however, may bear an impossible burden to prove falsity without access to proprietary tools, training data, or generation logs. The current rule relies on adversarial testing, but the technology itself can obscure any meaningful test.<br />
Proposed reforms vary. Some suggest amending Rule 901’s examples to explicitly reference AI-generated evidence, signaling that courts may demand technical proof. Others advocate a more structural shift, placing an affirmative burden on the proponent of AI-susceptible evidence to demonstrate authenticity through forensic analysis.</p>
<p>Skeptics warn that rewriting Rule 901 risks complexity and could disadvantage less-resourced litigants. They argue that judicial discretion and evolving common law—which have adapted the rule to include email and digital photos—can suffice. Yet even skeptics acknowledge deepfakes present a qualitative leap: unlike prior technologies, generative AI is designed to evade detection. This reality fuels the argument for a more targeted solution.</p>
<h2>Proposed Rule 707: A Surgical Response to Synthetic Evidence</h2>
<div class="mb-4">
<div class="article-font-size">
<p>The most direct proposal is a new Federal Rule of Evidence 707. While formulations vary, a leading draft proposes: “Rule 707. Machine-Generated Evidence. When machine-generated evidence is offered without an expert witness and would be subject to Rule 702 if testified to by a witness, the court may admit the evidence only if it satisfies the requirements of Rule 702(a)-(d).” In essence, Rule 707 would do three things: Mandate disclosure when a party offers AI-generated or altered evidence. Authorize courts to demand technical proof of authenticity (e.g., expert testimony, metadata analysis, system documentation). Empower judges to exclude evidence if the risk of deception substantially outweighs its probative value, even if Rule 901 is nominally satisfied.Proponents argue that Rule 707 restores balance by aligning standards with technological risk, providing courts with a clear doctrinal framework. Opponents fear line-drawing problems (what counts as “AI-generated”?) and worry it could chill legitimate technological uses. Regardless of its adoption, the proposal signals a consensus: deepfake evidence cannot be treated as just another digital exhibit.</p>
<h2>The New Authentication Battleground: From Lay Perception to Expert Analysis</h2>
<div class="mb-4">
<div class="article-font-size">
<p>A practical consequence is the forensic turn in authentication. Detecting AI-generated media often requires specialized tools and knowledge that extend beyond a lay understanding. Following trends under Daubert and Rule 702, courts are increasingly treating authenticity as a gatekeeping question, resolved at the time of admissibility, rather than a weight question for the jury.This raises the stakes for practitioners. Authentication is no longer a box-checking exercise but an architectural component of case strategy. It demands early investigation, strategic expert selection, and targeted discovery (e.g., requests for native files, generation logs, model training data). Practitioners who fail to meet these requirements risk exclusion or adverse credibility findings. Conversely, unsupported accusations of “deepfake” manipulation may be seen as speculative or dilatory.</p>
<h2>Model Rule 1.1: The Ethical Imperative of AI Literacy</h2>
<div class="mb-4">
<div class="article-font-size">
<p>These evidentiary shifts directly implicate ABA Model Rule 1.1 (Competence). Comment 8 explicitly requires understanding the “benefits and risks associated with relevant technology.” While once applied to e-discovery, this now encompasses generative AI.Competence does not demand that lawyers become engineers. It does require baseline AI literacy: understanding the capabilities and limits of these tools, recognizing red flags for synthetic evidence, knowing when to consult an expert, and appreciating the limits of detection technologies. A lawyer who introduces digital media without considering manipulation risk or who fails to investigate credible challenges—may breach the duty of thorough preparation.</p>
</div>
</div>
<div class="mb-4">
<div class="article-font-size">
<p>Similarly, a lawyer who reflexively cries “deepfake!” without factual grounding risks violating duties of candor and professionalism. Courts show diminishing tolerance for unfounded technological skepticism. Bar ethics opinions now emphasize the duty to supervise litigation technology, vet experts, and advise clients on associated risks. AI competence is transitioning from a niche specialty to a core component of general litigation practice.</p>
<h2>Strategic Imperatives for the Modern Litigator</h2>
<div class="mb-4">
<div class="article-font-size">
<p>The convergence of Rules 901, proposed 707, and Model Rule 1.1 demands a strategic recalibration. Lawyers must treat potentially AI-generated evidence with the rigor applied to expert testimony: early planning, documented methodology and a clear explanatory narrative.Key questions must guide the process: Provenance: Who created the evidence and using what tools/models? Process: What data trained the system? What safeguards were in place? Verification: What independent, technical verification exists (metadata, hash values, audit logs)?</p>
<p>Discovery should be tailored to answer these questions. Equally crucial is judicial education. Many judges are still developing fluency with AI. Clear, restrained explanations of the technology and its uncertainties are more persuasive than alarmism. The goal is to provide courts with a principled framework for decision-making, not to sow indiscriminate doubt.</p>
</div>
</div>
<div class="mb-4">
<div class="article-font-size">
<h2>Conclusion: Competence Redefined</h2>
<div class="mb-4">
<div class="article-font-size">
<p>Whether Rule 901 is amended or Rule 707 adopted remains uncertain. (The public comment period for proposed Rule 707 is open until February 16, 2026.) Yet the trajectory is clear. Authentication doctrine is being reshaped by a technology that challenges bedrock assumptions about truth and reliability. In parallel, professional norms are evolving to mandate a responsible and informed understanding of the same technology.In this new environment, legal competence is comprised of three components: technical, strategic and ethical. Practitioners who integrate AI literacy into their practice and treat authentication as a substantive battleground will protect both their clients and their credibility. Those who do not may find the most persuasive evidence in their case is also the most vulnerable to attack.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the January 7, 2026 edition of “The Legal Intelligencer” © 2026 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7278</post-id>	</item>
		<item>
		<title>Legal Intelligencer: From Vulnerability to Liability: Understanding Today’s Cyber Claims and Enforcement</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-from-vulnerability-to-liability-understanding-todays-cyber-claims-and-enforcement/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 20:06:58 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7274</guid>

					<description><![CDATA[The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility. In the November 26, 2025 edition of The Legal Intelligencer, Edward Kang writes, &#8220;From [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility.</em></p>
<p>In the November 26, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/26/from-vulnerability-to-liability-understanding-todays-cyber-claims-and-enforcement/?slreturn=20251126150203">From Vulnerability to Liability: Understanding Today&#8217;s Cyber Claims and Enforcement</a>.&#8221;<span id="more-7274"></span></p>
<p>On Oct. 31, mass spam emails were sent from multiple university-affiliated accounts to members of the University of Pennsylvania community. The messages, sent from compromised “@upenn.edu” addresses, criticized the university’s data security practices and its institutional purpose, and suggested that internal systems had been infiltrated. Although UPenn’s Office of Information Security quickly disabled the compromised accounts and initiated a forensic investigation, the extent of any unauthorized access to personal information remained uncertain.</p>
<p>Only three days later, a class action was filed in the U.S. District Court for the Eastern District of Pennsylvania by a putative class of students, applicants, alumni and employees. The complaint alleges that UPenn failed to maintain reasonable cybersecurity measures despite collecting and storing personally identifiable information. Plaintiffs further allege that UPenn disregarded known cyber risks, failed to implement adequate monitoring and intrusion-detection systems, and did not act with sufficient urgency once the unauthorized access was discovered. The lawsuit seeks damages and injunctive relief, requiring UPenn to strengthen its data security practices. Several other class action lawsuits soon followed within a few days.</p>
<p>While the factual investigation is ongoing, the speed with which the lawsuits followed the incident illustrates how rapidly cybersecurity events now trigger litigation and how strongly plaintiffs view institutional cybersecurity as an affirmative legal obligation rather than a technical aspiration.</p>
<h2>When a Cybersecurity-Related Claim May Be Brought</h2>
<p>Whether a cybersecurity incident becomes actionable depends on when plaintiffs can demonstrate that a lapse in these duties resulted in a concrete injury or created a substantial risk of imminent harm. Recent U.S. Court of Appeals for the Third Circuit and U.S. Supreme Court decisions provide a clear framework for this threshold.</p>
<p>The Supreme Court’s decision in <i>TransUnion v. Ramirez, </i>594 U.S. 413 (2021), reshaped the standing landscape for data-related harm. In <i>Ramirez</i>, the putative class action against TransUnion alleged violations of the Fair Credit Reporting Act, including the defendant’s failure to follow reasonable procedures to ensure credit files were accurate. The court held that the plaintiffs seeking damages must demonstrate a concrete injury. Without demonstrating the likelihood that their information would be disseminated, that the risk of harm materialized, or that the risk of harm itself independently harmed them, the plaintiffs whose information was not disseminated, therefore, did not meet the concrete injury requirement. Although the case did not involve a cyber breach, its reasoning has become the foundation for evaluating modern data-security claims.</p>
<p>The Third Circuit has built on this framework in <i>Clemens v. ExecuPharm,</i> 48 F.4th 146 (3d Cir. 2022), which clarifies how the concreteness of a data-related injury can be assessed and when cyber-related harms become actionable within the circuit. <i>Clemens</i> involved a ransomware attack in which a criminal hacking group exfiltrated a trove of highly sensitive information, including Social Security numbers, bank-account details, and tax records, and then posted that information publicly on the dark web. The trial court dismissed the plaintiff’s complaint, reasoning that allegations of any speculative identity theft due to a data breach are insufficient to establish standing. The Third Circuit reversed, holding that the plaintiff had standing to sue because the publication of her data created a substantial risk of identity theft. The court emphasized that the nature of the compromised information, its availability to criminal actors, and the plaintiff’s mitigation efforts together satisfied the requirement of injury-in-fact.</p>
<p>Importantly, misuse is not always required. Plaintiffs may also pursue claims where an institution has made specific cybersecurity commitments, such as promises in admissions materials, donor communications, privacy policies, research data management plans, or federal grant certifications, and has failed to honor them. In these circumstances, claims based on breach of contract, negligent misrepresentation, or deceptive practices can attach even in the absence of confirmed misuse. The key question becomes whether the institution represented that it would implement certain controls and whether its actual practices fell short of these representations.</p>
<p>In practice, a cybersecurity claim becomes viable when unauthorized access is paired with any combination of: actual misuse or publication of data; demonstrable, nonspeculative mitigation efforts; emotional or reputational harm resulting from the breach; or the breach of specific, identifiable promises regarding cybersecurity practices. Courts are increasingly sophisticated in evaluating these elements, treating cybersecurity duties as enforceable components of institutional governance.</p>
<h2>The False Claims Act and Cybersecurity: An Expanding Enforcement Frontier</h2>
<p>While private plaintiffs increasingly turn to negligence and consumer-protection theories in the wake of cyber incidents, federal enforcement trends indicate that cybersecurity lapses are increasingly carrying implications far beyond private civil litigation. In particular, the Department of Justice’s civil cyber-fraud initiative has brought cybersecurity to the forefront of False Claims Act (FCA) enforcement—a development with significant implications for universities that receive federal funding.</p>
<p>Formally launched to address systemic underinvestment in cybersecurity among government contractors and grantees, the civil cyber-fraud initiative targets entities that knowingly misrepresent their cybersecurity practices or compliance with federal requirements; fail to implement cybersecurity controls that are express conditions of payment; or fail to report cyber incidents as required by federal regulations or contract terms.</p>
<p>Crucially, a breach is not required for there to be an FCA violation. Under the DOJ’s theory, the core wrong is the misrepresentation: if an institution certifies compliance with cybersecurity requirements, such as NIST SP 800-171 for controlled unclassified information or federal reporting requirements for cyber incidents, but has not actually implemented those measures, the certification itself may be a false claim.</p>
<p>Recent cases illustrate how this theory is applied in practice. In 2025, Illumina, Inc. paid nearly $10 million to resolve allegations that it had misrepresented compliance with federal cybersecurity requirements for medical device software, despite no breach having occurred. Earlier cases involving defense contractors similarly turned not on the theft of data but on failures to implement required controls under Department of Defense contracts.</p>
<p>This enforcement posture has sweeping implications. Any organization that contracts with the federal government or receives federal funds, whether in healthcare, defense, manufacturing, research, technology, or public services, may be subject to cybersecurity-related FCA scrutiny. Even complex, decentralized organizations must ensure that their internal practices align with the cybersecurity commitments outlined in contracts, bids, compliance certifications, or grant submissions. A gap between policy and practice, or between what is certified and what is actually implemented, can expose the organization to significant financial penalties and reputational harm.</p>
<p>Unlike class actions, which are made public, an FCA action is filed under seal. Such an action is kept under seal for months and sometimes years. That means, given the number and speed of class actions filed against the University of Pennsylvania, it would not be surprising that an FCA action has already been filed against the university.</p>
<h2>Conclusion</h2>
<p>Viewed together, the UPenn incident, the court’s standing jurisprudence, and DOJ’s expanding FCA enforcement signal that cybersecurity is now a critical legal and governance obligation. Underinvestment can quickly translate into legal exposure.</p>
<p>Incident response has also taken on heightened legal significance. The speed and clarity with which institutions detect, escalate, investigate, and disclose cyber incidents directly influence the trajectory of litigation and regulatory scrutiny. Delays, ambiguities, or false or even incomplete notifications often become focal points in class-action claims, undermining institutional credibility.</p>
<p>Ultimately, these developments underscore the need for proactive oversight. Effective cybersecurity now requires coordinated action across IT, legal, compliance, and administrative domains. Budgeting, staffing, vendor management, and periodic audits are no longer technical concerns; they are components of an institution’s legal risk profile.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 26, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7274</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Understanding and Applying Local Rules When Drafting ESI Protocols</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-understanding-and-applying-local-rules-when-drafting-esi-protocols/</link>
		
		<dc:creator><![CDATA[Kelly Lavelle]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 21:11:27 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[ediscovery]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7271</guid>

					<description><![CDATA[A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently. In the November 20, 2025 edition of The Legal Intelligencer, Kelly Lavelle writes, “Understanding and Applying Local Rules When Drafting ESI Protocols.&#8220; ESI protocols govern how parties preserve, collect, review, and produce electronic [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently.</em></p>
<p>In the November 20, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Kelly Lavelle writes, “<a href="https://www.law.com/thelegalintelligencer/2025/11/20/understanding-and-applying-local-rules-when-drafting-esi-protocols/">Understanding and Applying Local Rules When Drafting ESI Protocols.</a>&#8220;<span id="more-7271"></span></p>
<p>ESI protocols govern how parties preserve, collect, review, and produce electronic evidence in federal litigation. What once was an obscure procedural topic now lies at the center of nearly every civil case involving documents, emails, databases and other forms of electronic data. ESI protocols provide structure and predictability in an area that can otherwise be costly and difficult to manage. A well-drafted ESI protocol defines production formats, metadata requirements, search terms, and privilege review procedures, reducing disputes and helping discovery move forward efficiently.</p>
<h2>The Role of Local Rules in Electronic Discovery</h2>
<p>With ESI protocols now a regular part of litigation, local rules and court practices play a more significant role in guiding the process. While the Federal Rules of Civil Procedure provide the foundation for electronic discovery, many district courts have developed their own local rules and forms to guide parties in drafting ESI protocols. Some districts have detailed local rules governing electronic discovery, while others, including the Eastern District of Pennsylvania, have not enacted a formal local rule governing ESI, but rely instead on individual judges’ policies and preferences that serve the same purpose. These guidelines show that courts expect parties to manage ESI in an organized way and to address potential issues in advance rather than waiting for them to arise. Following local practice helps lawyers know what the court expects, makes negotiations smoother, and saves time by avoiding mistakes the court has already ruled out.</p>
<p>Recent case law demonstrates how these local practices guide judicial decisions on ESI. In <i>Hall v. Warren</i>, 2025 WL 1392294 (W.D.N.Y. May 14, 2025), the parties failed to reach an agreement on an ESI protocol governing the production of electronically stored information. When negotiations fell apart, plaintiffs moved to compel production of metadata from internal reports and investigative files, arguing that such information was necessary to verify whether documents had been altered and to confirm their authenticity and completeness. Unable to obtain agreement from the parties, the court issued its own ESI protocol order that included selected provisions from each side&#8217;s proposal.</p>
<p>The defendants filed multiple objections to the court’s order, arguing that the order violated the district court&#8217;s local rules and imposed undue cost and technical burden. They claimed the order mandated universal metadata production, required technical tasks they could not perform, demanded compatibility with opposing counsel&#8217;s document review platform, and ordered native production without proper justification.</p>
<p>The court rejected these arguments, clarifying that the ESI order did not require many of the things defendants claimed it required and that the order&#8217;s actual requirements were consistent with the local rules and, in many instances, mirrored the local rules specific provisions. The order also provided flexibility for the parties to meet and confer on alternate formats or cost-sharing if a production became disproportionately burdensome.</p>
<p>The critical lesson from <i>Hall</i> is that the defendants misunderstood both the ESI order and the local rules they said it violated. The defendants clearly had read the district&#8217;s local rules because they cited them throughout their objections. Their problem was not ignorance of the local rules but misunderstanding what those rules actually required. The defendants thought the ESI order required things it did not require. They believed it violated local rules when it actually followed them. They argued that certain procedures were mandatory when the order actually provided flexibility. Because they misunderstood the local rules from the beginning, they could not negotiate effectively. As such, the defendants ended up with a court-imposed protocol that likely was less favorable than what they could have achieved through informed negotiation.</p>
<p>While <i>Hall</i> shows how local rules guide substantive resolution of ESI disputes, the case <i>Husidic v. FR8 Solutions, </i>No. 3:24-cv-963-WGY-SJH (M.D. Fla. Sept. 10, 2025), demonstrates the importance of complying with local procedural requirements even when parties agree. In <i>Husidic</i>, the parties submitted a joint motion requesting that the court enter the parties’ stipulated ESI protocol as an order. The magistrate judge denied the motion identifying three defects. First, the motion cited no legal authority for the proposition that courts should routinely enter agreed ESI protocols as orders. Second, the parties failed to include the memorandum of law required by the U.S. District Court for the Middle District of Florida&#8217;s local rules governing motion practice. Third, the request lacked any showing that court adoption of the protocol was necessary or appropriate.</p>
<p>The magistrate judge also identified a substantive issue with the parties’ proposed stipulation, which included ambiguous provisions referencing privilege and work-product protections that might implicate Federal Rule of Evidence 502, yet neither the stipulation nor the motion addressed Rule 502(d). The court emphasized that if parties seek a non-waiver order, they must make the request expressly and provide factual support demonstrating why such an order is necessary.</p>
<p>In declining to endorse the parties’ ESI protocol, the court implied that judicial resources should not be spent approving private agreements that can be managed through cooperation and adherence to the local rules. Further, compliance with local procedural requirements is essential, even when parties agree on the substance of an ESI protocol. Counsel must understand not only the local rules governing electronic discovery but also the local rules governing motion practice and the standards for obtaining court orders.</p>
<h2>Practical Guidance for Counsel</h2>
<p>For lawyers, these cases show that the most effective ESI protocol is one based on the local rules of the district court or specific judges’ policies and procedures. Counsel should familiarize themselves not only with the federal rules but also with the district court’s ESI checklists, policies, procedures, and discovery guidelines, many of which provide practical direction that supplements the federal rules. Before the Rule 26(f) conference, counsel should review the district&#8217;s local rules on electronic discovery and consider how those rules, and the judge’s preferences are likely to influence court resolution of any disputes. By following local rules from the beginning, parties can reduce the likelihood of motion practice and avoid judicially imposed resolutions that may be less favorable than a negotiated agreement.</p>
<p><b>Kelly A. Lavelle</b> <i>is an associate at Kang Haggerty. She focuses on e-discovery and information management, from preservation and collection to review and production of large volumes of electronically stored information. Contact her at <a href="mailto:klavelle@kanghaggerty.com">klavelle@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 20, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7271</post-id>	</item>
		<item>
		<title>Legal Intelligencer: Method, Not Mystique: The Renewed Demands of Rule 702</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-method-not-mystique-the-renewed-demands-of-rule-702/</link>
		
		<dc:creator><![CDATA[Edward T. Kang]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 21:08:33 +0000</pubDate>
				<category><![CDATA[Business Litigation and Dispute Resolution]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7269</guid>

					<description><![CDATA[Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case. In the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case.</em></p>
<p>In the November 20, 2025 edition of <a href="https://www.law.com/thelegalintelligencer">The Legal Intelligencer</a>, Edward Kang writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/20/method-not-mystique-the-renewed-demands-of-rule-702/">Method, Not Mystique: The Renewed Demands of Rule 702.</a>&#8220;<span id="more-7269"></span></p>
<p>For many years, it was common practice to address expert challenges late in the litigation cycle. Create case themes. Discovery proceeds. Case themes change or develop alongside witness testimony. The <i>Daubert</i> briefing arrives near the end. The expectation was that juries would resolve competing expert views through cross-examination and credibility determinations. That cycle no longer accurately reflects reality in federal courts within the U.S. Court of Appeals for the Third Circuit and throughout the country.</p>
<p>Since the 2023 amendment to Federal Rule of Evidence 702, courts have adopted a more explicit and front-loaded approach to expert admissibility. The rule did not rewrite the familiar elements of qualification, reliability, and fit, but it clarified who bears what burden and when. Trial courts must now ensure, more likely than not, that an expert has not only employed a reliable method but applied that method reliably to sufficient facts or data. Issues that once passed as matters of weight for the jury now receive substantive scrutiny at the admissibility stage.</p>
<p>Lawyers accustomed to relying on experience-based experts must now make the analytical path explicit. Credibility and cross-examination alone could rescue a thin factual basis or an implicit chain of reasoning. Admissibility is no longer a late-stage checkpoint. It is a threshold gate, and lawyers must plan accordingly from the outset of a case.</p>
<h2>The Approach Within the Third Circuit</h2>
<p>In <i>Slatowski v. Sig Sauer</i>, 2024 WL 1078198 (E.D. Pa. Mar. 12, 2024), aff’d in part, rev’d in part and remanded, 148 F.4th 132 (3d Cir. 2025), the U.S. District Court for the Eastern District of Pennsylvania excluded two causation experts in a firearm-discharge case despite their credentials and experience. The district court found the opinions lacked a reliable analytical bridge, emphasizing that neither expert offered any conclusion that could be subject to testing or specific to the circumstances in which the plaintiff’s pistol fired. The lack of incident-focused methodology and analysis proved fatal under amended Rule 702.</p>
<p>The Third Circuit affirmed. The panel stressed that the “hallmark of <i>Daubert</i>&#8216;s reliability” prong is the scientific method, meaning the “generation of testable hypotheses that are then subjected to the real-world crucible of experimentation, falsification/validation, and replication.” The court noted that a qualified expert must bridge the gap between theory and reality, and the lack of factual context was fatal in this case. Even if the expert testimony was “reliable about whether the [pistol’s] design could have caused an accident,” it needs to be reliable about “whether the design did cause this accident.”</p>
<p>It is worth noting that the court did not characterize this decision as a close call or a matter better left to cross-examination. Instead, it treated the Rule 702 amendment as a clear directive: opinions that lack testable, case-grounded reasoning cannot reach the jury. The ruling signals a practical expectation that plaintiffs must now present a documented analytical path that connects method to facts with precision, not inference or shorthand experience.</p>
<h2>The Growing Trend of Demanding Reliable Application of Reliable Methods to Facts</h2>
<p>Courts outside the Third Circuit are moving in the same direction. The amended rule and the advisory committee’s commentary have become a touchstone, and courts are citing them to clarify that the sufficiency of basis and reliability of application belong to judges, not juries. Three circuits illustrate this shift.</p>
<p>The Sixth Circuit’s approach is best illustrated by <i>In re Onglyza and Kombiglyze Products Liability Litigation</i>, 93 F.4th 339 (6th Cir. 2024), where exclusion of the plaintiffs’ cardiology expert was affirmed after the court found that, although the expert used “undeniably a reliable methodology,” the opinion was unreliable because it rested on selective data points and inconsistent application of several factors required by the method. The opinion cites the 2023 amendment and emphasizes its “corrective effect:” Rule 702’s recent amendments “were drafted to correct some court decisions incorrectly holding ‘that the critical questions of the sufficiency of an expert&#8217;s basis, and the application of the expert&#8217;s methodology, are questions of weight and not admissibility.’”</p>
<p>The Ninth Circuit’s decision reveals a similar posture, but with different emphasis. In <i>Engilis v. Monsanto</i>, 151 F.4th 1040 (9th Cir. 2025), the court rejected any presumption of admissibility by noting that “there is no such presumption, as a proponent of expert testimony must always establish the admissibility requirements of Rule 702 by a preponderance of the evidence.” The court affirmed the lower court’s exclusion of expert testimony and granting of summary judgment where the expert failed to provide any “scientifically sound reason” when ruling out a potential cause, thus failing to establish that his testimony was “based on sufficient facts or data.” The Fifth Circuit has been equally direct. <i>Nairne v. Landry,</i> 151 F.4th 666, 705 (5th Cir. 2025), reinforces the point by excluding a statistics expert who failed to explain the method-to-data application.</p>
<p>Across jurisdictions, the pattern is consistent. Courts expect transparent and documented analysis sufficient to show a reliable application of established methods to relevant facts. When some part of the analytical or reasoning chain is missing, courts will exercise their role as gatekeepers and exclude the expert testimony. The cases do not signal hostility to plaintiffs or to experts. They signal a renewed willingness on the part of the courts to enforce Rule 702 as written: reliability must now be demonstrated, rather than assumed.</p>
<h2>Practical Guidance for Plaintiffs Attorneys</h2>
<p>For plaintiffs lawyers, the shift in expert testimony admissibility is not theoretical. It reorders when and how cases must be built. The admissibility of expert testimony should be treated as a design principle from day one: identify the theory of causation early, map the analytic chain, and assemble the factual record intentionally so that each step is visible and testable. Litigation strategy must align with admissibility demands, rather than assuming that cross-examination will supply what the record lacks.</p>
<p>The amended Rule 702 rewards intentional sequencing. It punishes gaps that emerge only after discovery closes. Ask experts, before engagement if possible, to articulate precisely how their method connects to the facts at issue and what data they will need to apply it reliably. Build discovery around that roadmap. If testing, literature review, or additional medical documentation is necessary, get it early. Document the methodology as a narrative, not merely as a set of citations. Writing it early sharpens the analysis and exposes weaknesses in time to cure them. Treat expert testimony admissibility as architecture, not defense. In doing so, plaintiffs will not only meet the demands of Rule 702 but also strengthen the merits of their cases in the process.</p>
<p><b>Edward T. Kang</b> <i>is the managing member of Kang Haggerty. He devotes the majority of his practice to business litigation and other litigation involving business entities. Contact him at <a href="mailto:ekang@kanghaggerty.com">ekang@kanghaggerty.com</a>.</i></p>
<p><strong><em>Reprinted with permission from the November 20, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7269</post-id>	</item>
		<item>
		<title>Legal Intelligencer: POWER Act—A Philadelphia Game Changer</title>
		<link>https://www.khflaw.com/news/legal-intelligencer-power-act-a-philadelphia-game-changer/</link>
		
		<dc:creator><![CDATA[Aaron L. Peskin]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 16:34:56 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<category><![CDATA[Legal Intelligencer]]></category>
		<category><![CDATA[Philadelphia]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7265</guid>

					<description><![CDATA[The scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>The scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a “public body.”</em></p>
<p>In the November 10, 2025 edition of<a href="https://www.law.com/thelegalintelligencer"> The Legal Intelligencer</a>, Aaron Peskin writes, &#8220;<a href="https://www.law.com/thelegalintelligencer/2025/11/10/power-acta-philadelphia-game-changer/?slreturn=20251111113425">POWER Act—A Philadelphia Game Changer</a>.&#8221;<span id="more-7265"></span></p>
<p>It has been no secret that for many years, Pennsylvania has lagged behind its neighbors, particularly New Jersey, when it comes to protections for whistleblowing employees. While employees on both sides of the river enjoy the same federal whistleblower protections, the similarities end at the state level. New Jersey has the Conscientious Employee Protection Act (CEPA). This statute covers all New Jersey employees and generally protects any employee that reports or objects to any sort of conduct that they believe to be illegal, unethical, or contrary to public policy. Pennsylvania meanwhile has the Pennsylvania Whistleblower Law. While that law does protect employees that report conduct of “wrongdoing or waste.” However, the scope of what is considered to be “wrongdoing or waste” has been found to be relatively narrow by courts interpreting that statute, especially the U.S. District Court for the Middle of District of Pennsylvania. And the biggest hurdle to making a claim under the Pennsylvania Whistleblower Law is that the employer must be a “public body.” This means that unless your employer is either a public entity funded by Pennsylvania tax dollars or a private entity that receives public funds, you are out of luck. This stands in stark contrast to CEPA, where any employee can sue any employer for retaliation for reporting or objecting to a wide range of conduct. And New Jersey courts have interpreted that statute as broadly as possible to favor employees.</p>
<p>While Pennsylvania does not have particularly strong employee protections against retaliation, Philadelphia employees now enjoy protections similar to those employees across the river thanks to the “Protect Our Workers, Enforce Rights (POWER) Act.” This law was passed by Philadelphia City Council and signed by Mayor Cherelle Parker on May 27, 2025. This act made significant changes to Title 9 of the Philadelphia Code and greatly strengthened employee protections against retaliation.</p>
<p>Specifically, the POWER Act prohibits retaliation against any employee seeking to assert their rights under any “Worker Protection Ordinance,” which is broadly defined to a wide range of Philadelphia ordinances protecting workers, such as concerning wage theft, fair workweek standards, and protections for domestic workers. The protected activities are similarly broadly defined and include seeking information about one’s rights, discussing their rights with another person, objecting to or refusing to participate in any conduct that violates a worker protection ordinance, making an oral or written complaint to an employer, filing a complaint with any governmental agency or court, and providing evidence or participating in any court or administrative proceeding relating to a formal or informal complaint. The POWER Act also explicitly prohibits an employer from retaliating against an employee that takes sick leave under the Philadelphia Sick Leave Law.</p>
<p>Perhaps most importantly, the POWER Act creates a rebuttable presumption of retaliation when an employer takes an adverse employment action, such as firing, suspending, demoting or otherwise penalizing an employee, within 90 days of the protected activity. This effectively turns the relevant standard for retaliation on its ear. In New Jersey and when dealing with Federal statutes, 90 days is generally held to create an inference of retaliation, but one that is can be rebutted by the employer through a preponderance of the evidence to show legitimate non-retaliatory reason(s) for the adverse employment action. In Philadelphia, however, the employer must show the non-retaliatory reason(s) by way of <i>clear and convincing</i> evidence. This is a significantly higher bar than that in most other jurisdictions and employers should be mindful of this standard.</p>
<p>Beyond the retaliation protections the POWER Act is also a gamechanger in several other respects. First, the POWER Act has strengthened the Philadelphia Department of Labor’s Office of Worker Protections (OWP), empowering it to conduct proactive workplace investigations and to hold employers accountable for violations of Philadelphia ordinances, such as the paid sick leave law and the Domestic Workers’ Bill of Rights. It also allows the city to suspend or revoke business licenses and city procurement contracts of employers with repeated violations and requires the creation of a “bad actors database” that publicly lists employers with three or more violations. If OWP finds that employer has violated the POWER Act, the agency can seek civil penalties of $2,000 for each violation. Those fines will be paid into a Worker Justice Fund, which will give back to employees that have suffered monetarily, physically, or mentally as a result of retaliation.</p>
<p>Second, while the OWP has extensive enforcement power, an employee does not necessarily have to exercise their rights through that office. The POWER Act also creates a private right of action against an employer that violates that ordinance and they do not need to exhaust administrative remedies (such as reporting to OWP) before doing so. In doing so, employees can seek damages directly from the employer, which is a significant change from previous practices where penalties were directed solely to the City. Before filing suit, an employee must give the employer the opportunity to cure the alleged infraction within 15 days, but that requirement is waived for instances of retaliation. That means that an employee may file suit immediately after he or she believes that retaliation has taken place. The statute of limitations for a claim under the POWER Act is three years, which is significantly longer than most federal statutes and even two years beyond that permitted under CEPA.</p>
<p>Third, the POWER has strengthened protections for immigrant workers. It authorizes the OWP to certification applications and submit statements of interest on behalf of those workers, including those subject to unlawful retaliation, who may be eligible for a U Visa or T Visa under the Victims of Trafficking and Violence Protection Act or for the Deferred Action Program.</p>
<div class="mb-4">
<div class="article-font-size">
<p>Fourth, the POWER Act raises the hourly rate for paid sick leave for tipped workers under Philadelphia sick leave law. It is now calculated by taking the average of the hourly wage for “bartenders,” “waiters and waitresses,” and “dining room and cafeteria attendants and bartender helpers” as defined under the Standard Occupational Classification Code as published for Philadelphia County by the Pennsylvania Department of Labor.</p>
<p>Fifth, employers are now required to keep records of hours worked by employees and hours of sick time taken by an employee and payments made to the employee for sick time for three years rather than two. This comports with the new statute of limitations for bringing suit.</p>
<p>Finally, the POWER Act requires that employers provide notice to employees of their rights. While this notice does not have to be contained in the employee handbook, it does have to be provided in some format to all employees in Philadelphia.</p>
<p>Employers should be mindful of the heightened level of accountability that the POWER Act presents and should endeavor to maintain accurate records of hours worked and sick time, provide notice of rights to all employees, and carefully consider the POWER Act’s presumption of retaliation when making a determination as to whether to take an adverse employment action against an employee.</p>
<p>Employees should also familiarize themselves with the POWER Act, especially if they are inclined to report what they believe to be wrongdoing under the Act. Employees should determine if the conduct that they wish to complain about or report would qualify such a complaint or report as “protected activity” under the Act. Employees should also carefully consider whether it makes sense to report the conduct to the OWP, file a private lawsuit, or do both.</p>
<p>Ultimately, the POWER Act will likely lead to a significant increase in employment litigation at both the state and federal levels in Philadelphia, and employment attorneys practicing in Philadelphia should familiarize themselves with this game-changing statute.</p>
<div><b>Aaron L. Peskin</b><i>, senior counsel at Kang Haggerty,</i> <i>is a seasoned attorney whose practice spans complex commercial litigation, employment law, and general corporate matters. He brings a strategic, client-focused approach to a wide range of legal matters, drawing on deep experience across multiple industries and legal forums.</i></div>
<div><strong><em>Reprinted with permission from the November 10, 2025 edition of “The Legal Intelligencer” © 2025 ALM Global, LLC. All rights reserved. Further duplication without permission is prohibited. Request academic re-use from <a class="text-blue-800 underline hover:no-underline" href="https://www.copyright.com/">www.copyright.com.</a> All other uses, submit a request to <a class="text-blue-800 underline hover:no-underline" href="mailto: asset-and-logo-licensing@alm.com">asset-and-logo-licensing@alm.com.</a> For more information visit <a class="text-blue-800 underline hover:no-underline" href="https://www.law.com/asset-and-logo-licensing/">Asset &amp; Logo Licensing</a>.</em></strong></div>
<div class="mb-4">
<div></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7265</post-id>	</item>
		<item>
		<title>Kang Haggerty Earns National and Regional Honors in 2026 Best Law Firms® Rankings</title>
		<link>https://www.khflaw.com/news/kang-haggerty-earns-national-and-regional-honors-in-2026-best-law-firms-rankings/</link>
		
		<dc:creator><![CDATA[Kang Haggerty LLC]]></dc:creator>
		<pubDate>Thu, 06 Nov 2025 10:00:57 +0000</pubDate>
				<category><![CDATA[Firm News]]></category>
		<category><![CDATA[Best Law Firms]]></category>
		<guid isPermaLink="false">https://www.khflaw.com/news/?p=7262</guid>

					<description><![CDATA[Kang Haggerty has once again been recognized for excellence in the legal profession, earning national and regional rankings in the 16th edition of the United States Best Law Firms®. National Recognition Tier 2 – Construction Law Tier 2 – Litigation – Construction Regional Rankings – Philadelphia Metro Tier 1 – Construction Law Tier 1 – [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Kang Haggerty has once again been recognized for excellence in the legal profession, earning national and regional rankings in the 16th edition of the United States <a href="https://www.bestlawfirms.com/"><em>Best Law Firms®</em>.</a><span id="more-7262"></span></p>
<p><strong>National Recognition</strong></p>
<ul>
<li><strong>Tier 2</strong> – Construction Law</li>
<li><strong>Tier 2</strong> – Litigation – Construction</li>
</ul>
<p><strong>Regional Rankings – Philadelphia Metro</strong></p>
<ul>
<li><strong>Tier 1</strong> – Construction Law</li>
<li><strong>Tier 1</strong> – Litigation – Construction</li>
<li><strong>Tier 2</strong> – Commercial Litigation</li>
</ul>
<p>These rankings reflect the firm’s continued strength in complex construction and commercial matters, as well as its commitment to delivering strategic, results-driven counsel across the region and beyond.</p>
<p><strong>About <em>Best Law Firms®</em></strong></p>
<p>Since its inception in 2010, <em>Best Law Firms®</em> has been a nationally respected benchmark for legal excellence. Its rankings are based on a rigorous, data-driven <a href="https://www.bestlawfirms.com/methodology">methodology</a> that blends detailed client feedback, peer evaluations, and comprehensive firm data. Recognition by <em>Best Law Firms®</em> reflects a consistent record of professional achievement, deep legal expertise, and a steadfast commitment to client service.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7262</post-id>	</item>
	</channel>
</rss>
