On June 1, 2017, New Jersey Governor Chris Christie signed Executive Order 225 directing NJ’s Chief Technology Officer to set in motion actions to deliver a more secure, efficient, and reliable information technology platform and services across the Executive Branch.

Previously, each state department and agency oversaw its own information technology services, software and hardware integration. Under the new Executive Order, the Chief Technology Officer of the State of New Jersey is granted broad authority to oversee and integrate the hardware, software, and other information technologies used by departments and agencies within the Executive Branch. In speaking to the Chief Technology Officer at the signing of the Executive Order, Chris Christie stated:

“This is a big day in changing state government. To take away that authority and personnel from every one of the state departments and agencies and put it in your hands is a sea change in the way government is managed given how integral information technology is to the everyday operation of government. This is about a common-sense approach to taking us to a new level in terms of our information technology, and what we know is our customers, the 8.9 million people of the State of New Jersey are going to demand we do it.”

In New Jersey, there are two basic concepts of child custody. The more familiar concept is “physical” custody which refers to where and with whom the child will live. When parents share “joint physical” custody, the child lives with each parent for a certain amount of time during the year. A parent with whom the child spends most of their time is designated as the Parent of Primary Residence (“PPR”) or the primary caretaker. The parent with whom the child has time-sharing is designated as the Parent of Alternate Residence (“PAR”) or secondary caretaker. Generally, unless there is a concern that the parent of alternate residence will harm the child, parenting time or visitation rights will not be withheld.

The less familiar but equally important concept is “legal” custody which refers to a parent’s right to make decisions concerning their child, such as medical treatment, selection of healthcare providers, education, engaging in what might be considered hazardous activities and other significant decisions. In most cases, parents will have joint legal custody of a child and share the decision-making responsibilities. In some instances, however, the judge may award sole custody where only one parent has legal and physical custody. This is a relatively rare occurrence that is ordered only when the other parent is absent or legally unfit. A parent may be unfit if he or she has engaged in child abuse or neglect or is struggling with an addiction to alcohol or drugs. Absent such circumstances, a joint legal custodial relationship among parents is the preferred arrangement since it is likely to foster the best interests of the child.

A recent Court decision restated that “the prime criterion for establishing a joint legal custodial relationship between divorced or separated parents centers on the ability of those parents to agree, communicate, and cooperate in matters relating to the health, safety, and welfare of the child notwithstanding animosity or acrimony they may harbor towards each other. The ability of parents to put aside their personal differences and work together for the best interests of their child is the true measure of a healthy parent-child relationship.”

Published on:
Updated:

Because of the fiduciary duties owed by business owners to each other, whether they are shareholders in a closely held corporation, members in a limited company, or partners in a general or limited partnership, a business owner generally is prohibited from competing with the company. This general prohibition can be modified by an agreement among the owners, but in the absence of such an agreement the prohibition stands.

Failure to do so is referred to as the diversion of corporate opportunities. An owner of a closely held business has a duty to bring to the company any business opportunity that the company would normally expect to seek to pursue. The opportunity must be presented to the company and cannot be pursued individually unless the company decides not to pursue that opportunity.

As with the prohibition on competition, the requirement to present all opportunities to the company can be altered by contract. Pursuant to N.J.S.A. 14A:3-1, a corporation can renounce its interest in, or expectancy of the opportunity to pursue, specific opportunities. One manner in which corporate opportunities can be relinquished is to insert the pertinent language in the Certificate of Incorporation. When starting a new business, if there is any thought that one or more owners might want the right to pursue competing opportunities, you want to include language in the Certificate of Incorporation, or a separate shareholder agreement, that specifies what competing businesses the shareholder may appropriate.

Published on:
Updated:

Lindabury’s Cybersecurity and Data Privacy Practice Group Co-Chair Eric Levine spoke at the NJBIZ Cybersecurity conference on May 17th at the Raritan Valley Country Club in Bridgewater, explaining how companies can get hurt by doing the right thing when it comes to cybersecurity.

“To protect any small business, you need to have legal involved, if for no other reasons than to cloak what you are doing with privilege or confidentiality — by that, I mean communications with your attorney that nobody else can get to,” he said.

“Think about it,” he told the audience. ‘You hire (an expert) who comes in and does a vulnerability assessment and they find out you have a gaping hole in your security. That’s great. You fix it.

Published on:
Updated:

Parents who are either currently going through a divorce or were divorced many years ago often ask “at what point do I no longer have to pay child support for my children?” It surprises some parents to learn that there has been no specific age at which time parents are no longer obligated to pay child support.

Parents who are already divorced should review their settlement agreement which usually spells out the conditions which must be met for the child to be deemed “emancipated.” It is at the time of emancipation when parents no longer are financially responsible to support their children.

A recent change in New Jersey law provides more certainty. As of February 1, 2017, unless otherwise specified in a Court order or judgment, the obligation for a parent to pay child support stops without a Court Order on the date of a child’s marriage, death or their entry into military service.

Eric Levine, Lindabury’s Cybersecurity and Data Privacy Group‘s Co-Chair was recently interviewed by NJBIZ’s Brett Johnson regarding a business’s first line of defense against a cyberattack. Levine says the approach exploits features inherent to human nature. “It’s preying on people’s inquisitive side,” Levine said. “And you can’t buy a firewall for that.”

“Yes, there are hackers who are out there who are trying to break through firewalls through different approaches, including state-sponsors actors, and there are many technologies to protect against that,” Levine said. “But it’s the social engineering — (stuff like) phishing scams — that capitalizes on mistakes people make that are the easiest tools to utilize.”

To read the full article as published online click here.

Published on:
Updated:

Lindabury’s Bob Anderson, shareholder and co-chair of the Cybersecurity and Data Privacy Group, was interviewed by NJBIZ‘s Tom Bergeron in response to the worldwide ransomware attack over the weekend. Bob said the attacks last weekend were not a surprise at all to the people in the industry.

“It was just a matter of time before something like this happened,” he said. “We’ve seen ransomware attacks pick up at an incredible level the past few years. It was just going to happen at some point that somebody was going to launch something that was going to travel from computer to computer and spread to every country in the world.”

Lindabury will be represented at the NJBIZ Cybersecurity panel discussion on May 18th at Raritan Valley Country Club in Bridgewater, where the Cybersecurity and Data Privacy Group’s co-chair Eric Levine is participating as a panelist.

On March 3, 2017, the Appellate Division of the New Jersey Superior Court upheld a Chancery Court’s determination requiring parties to participate in an investigation of contamination despite the fact that there was no evidence linking any of the parties to the contamination. Matejek v. Watson, et al., Dkt No. A-4683-14T1. In doing so, the appellate court employed principles of equity to expand potential liability under the New Jersey Spill Compensation and Control Act, N.J.S.A. 58:23.11 et seq. (the “Spill Act”). The Matejek decision, which seems inapposite to other Spill Act jurisprudence, greatly expands the reach of the Spill Act and would require parties to expend resources to investigate contamination even when there is no evidence of any nexus to that contamination.

The decision has its genesis in oil contamination discovered in a tributary located in the vicinity of a residential condominium development. The New Jersey Department of Environmental Protection (“NJDEP” or the “Department”) responded to the threat by removing, at state expense, underground storage tanks from each of the adjoining five condominium units. Once the tanks had been removed, the Department determined that there was no further imminent threat to the tributary and terminated further work on the site. However, the Department never closed its administrative file and the site remained on the Department’s active list. Several years later, the owners of one of the condominium units sought to complete the investigation in order to remove what they deemed a cloud on title. They then brought an action against the other four condominium owners to compel them to equally participate in and complete the investigation (and, if necessary, the remediation).

The Chancery Court, after a bench trial, entered judgment requiring the parties to jointly retain a licensed site remediation professional to complete the investigation. The Court held that despite the fact that there was no evidence of the precise source of or responsibility for the contamination, the fact that the Department ordered the removal of all five tanks was enough to require that all of the impacted unit owners share in the steps necessary to further investigate the source of the contamination. More bewildering is the fact that the decision did not discuss or make any findings as to which of these five tanks had leaked or been involved in the discharge. Adjoining unit owners Carlos and Jean Gilmore appealed the Chancery Court’s determination arguing that the Spill Act didn’t require them to participate in a remediation absent evidence that they caused or contributed to the contamination.

May 3, 2017 was a bad day for Google as a major phishing attack spread like internet wildfire, targeting users of Google docs. However, as bad as it was for Google, it provided us with a real-life example of how the first line of defense to a cyber-attack is none other than you and me. People, not breached firewalls or lack of encryption, are often the cause of a major cyber incident, but with a little diligence, we can present a formidable front-line defense.

What occurred on May 3, 2017 has been described as a widespread phishing scheme through which people received an email, apparently originating from a trusted source, that asked the recipient to open a Google document that was embedded within the email. If the recipient of the email opened the Google document, they would have granted the sender access to the recipient’s email account and contacts. Once the Google document read the recipient’s contacts, it in turn sent more phishing attempts to the recipient’s contacts. The cycle repeated itself rapidly, and Google estimated that the attack spread so quickly that at the peak of the attack, Google’s customer base saw about 150 messages sent per minute. It was estimated that the attack may have affected at least one million people.

Phishing is a form of social engineering that involves sending emails that appear to come from a trusted source or someone the recipient knows in an effort to obtain the computer credentials of the recipient of the email, to hack in the recipient’s private accounts and obtain their personal information or to infect the recipient’s computer systems. It is a common method of cyber-attack today and one, as Google can attest, that can quickly cause widespread havoc.

Published on:
Updated:

Lindabury’s Labor and Employment Law partner, John H. Schmidt, was interviewed by New Jersey Business Magazine‘s Editor-in-Chief Anthony Birritteri for the article published in the May 2017 issue. Their discussion focused on the fine lines of major issues employers face regarding diversity and discrimination in the workplace and in the hiring process.

New Jersey’s Law Against Discrimination (NJLAD) is among the strongest anti-discrimination laws in the country and according to John Schmidt, “The New Jersey LAD is much broader than the provisions of Title VII because the latter deals with race and sexual discrimination. On the federal level, there is a separate statute for disability discrimination, as an example. In fact, since the mid-to-late 1980’s, most plaintiff attorneys have decided it is to their advantage to bring claims under the NJLAD”

Most companies claim they are equal opportunity employers and have been recognized by the top diversity lists. John Schmidt cautions; “If you select a particular class of individuals [a certain minority group] to hire – giving preference to them- you could be in violation of the NJLAD and federal laws.”

Contact Information