Guest Blog
Written By: John Kaveney Partner, Healthcare and Litigation Greenbaum, Rowe, Smith & Davis LLP On October 1, 2025, the U.S. federal government entered a partial shutdown after Congress failed to pass either a full-year appropriations package or a continuing resolution. Among the many ripples from this lapse in funding is a sudden rollback of the expanded telehealth flexibilities under Medicare that providers and beneficiaries have now utilized for many years. While Medicare is classified as a mandatory program, and thus core functions of Medicare remain funded during a shutdown, the temporary telehealth authorities were subject to explicit legislative extension…
Read MoreThird Circuit Aligns With the Supreme Court’s Limit on the Scope of the Computer Fraud and Abuse Act
Written By: Andrew F. Beck Gibbons P.C. Does an employee logging into the computer of an employee away from the office, at the request of said employee, to access a document and email it to the employee away from the office constitute criminal behavior under the Computer Fraud and Abuse Act, 18 U.S.C. §1030 (CFAA), a federal statute that imposes criminal penalties and provides for a civil cause of action against individuals who obtain information from a computer by intentionally accessing the computer without authorization or by exceeding authorized access? Also at issue is whether passwords constitute trade secrets…
Read MoreWritten By: Chris Regan Founder CLR Solutions LLC Solar energy is one of the fastest-growing sources of clean power, but like any technology, it has a lifespan. Panels typically last 25-30 years, though many are replaced sooner for upgrades to higher wattage density models or due to property renovations, roof work, or relocation. Even after two decades, a panel can still produce roughly 80% of its original rated power-meaning they often retain real value at the time of removal. The challenge? When it’s time to remove or replace panels, improper handling can waste valuable resources, create environmental hazards, and…
Read MoreWritten By: Michael Spinello Associate Chiesa Shahinian & Giantomasi PC As New Jersey’s legislative calendar winds down, there has been a new renewed push by environmental advocates to pass the Climate Superfund Act (S3545/A4696) (“Superfund Act”) during the upcoming lame duck session. The Superfund Act has gained some traction in both chambers of the New Jersey Legislature, earning support from more than two dozen lawmakers and approximately 50 municipalities. Modeled after similar laws in Vermont and New York, the proposed legislation would impose retroactive liability on certain fossil fuel companies for damages resulting from fossil fuel combustion and create…
Read MoreWritten By: John Gray Partner, Environmental Practice Greenbaum, Rowe, Smith, & Davis LLP On September 3, 2025, the New Jersey Department of Environmental Protection (NJDEP) held a public hearing on the Notice of Substantial Change (NOSC) for revisions the Department made to the Resilient Environments and Landscapes (REAL) rule proposals. The Department originally published the REAL rule proposals on August 5, 2024, and due to significant comments received provided the NOSC revisions for public comment. The comment period closes on September 19, 2025. Interested parties may submit comments through the NJDEP’s rule comment form. The REAL proposal seeks…
Read MoreWritten By: Chris Regan Founder CLR Solutions LLC Computers, phones, and smart gadgets power just about every part of modern life-but eventually they wear out, slow down, or simply get replaced. Then most of us run into two big dilemmas: How do I get rid of old tech safely and responsibly? How do I make sure my personal or company data doesn’t end up in the wrong hands? In 2022 the world produced a record 62 million tons of electronic waste-enough fully loaded 40‑ton trucks to circle the equator bumper‑to‑bumper. Less than one‑quarter of that mountain was recycled, and at…
Read MoreWritten By: Chris Regan Founder CLR Solutions LLC That pile of old laptops, phones, or servers sitting in your back office? It’s not just outdated-it’s dangerous. Unmanaged end-of-life (EOL) IT equipment can become a massive liability, exposing your organization to data breaches, regulatory fines, and environmental consequences. Whether you’re a global enterprise or a small business, ignoring old tech is like leaving the vault door open. A formal EOL management strategy isn’t optional-it’s essential. The good news? With the right plan and certified support, EOL IT asset management doesn’t have to be a burden. In fact, it can become…
Read MoreImage from https://www.linkedin.com/pulse/importance-being-proactive-federica-ferracin/ Written By: David H. Nachman, Esq. Ludka Zimovcak, Esq. Snehal Batra, Esq. Samantha Oberstein, Esq. Nachman, Phulwani, Zimovcak (NPZ) Law Group, P.C. Immigration enforcement at the workplace-whether through surprise visits, audits, or information requests-remains a reality for U.S. employers. Proactive preparation is key to protecting both your business and workforce. Below, NPZ Law Group outlines best practices for employers to confidently and lawfully handle potential enforcement actions, ensuring compliance and minimizing operational disruptions. 1. Understand Enforcement Boundaries Know Your Workplace Rights: Immigration agents may only enter non-public areas (like back offices or employee breakrooms) with a valid…
Read MoreWritten By: David H. Nachman, Esq. Ludka Zimovcak, Esq. Snehal Batra, Esq. Samantha Oberstein, Esq. Nachman, Phulwani, Zimovcak (NPZ) Law Group, P.C. As the landscape of employment-based immigration continues to evolve, U.S. employers must stay alert to new policies, adjudication trends, and procedural shifts. While comprehensive immigration reform remains elusive, several regulatory and procedural changes are already reshaping how companies sponsor and retain foreign national talent. Increased Scrutiny Under New Administration Policies Since early 2025, immigration enforcement has intensified under new federal directives. Agencies are prioritizing: Fraud prevention Identity verification National security screening As a result: Visa adjudications are…
Read MoreWritten By: Margarita Echevarria NJAPM
Read MoreEach week, we feature a guest blog from one of our members on an issue that's important to business. Want to write for CIANJ? E-mail jpangburn@cianj.org to get your organization published here.