Challenging an ongoing investigation by the SEC is a daunting task, particularly for those identified as subjects of the investigation. Two recent holdings, one by the Third Circuit in Gentile v. Sec. & Exch. Comm’n, 2020 WL 5416297 (3d Cir. Sept. 10, 2020) and the other by the United States District Court for the District of New Jersey in Sec. & Exch. Comm’n v. Gentile, 16-cv-01619-BRM-JAD (Order Sept. 29, 2020), both of which involved the same parties, offer some clarification on when and how best to mount such a challenge. The Third Circuit’s opinion makes clear that the SEC’s ability to investigate is one of the “rare circumstances” in which an agency’s action is exempt from the waiver of sovereign immunity that might otherwise apply under the Administrative Procedure Act and, as a result, is not subject to judicial review. By contrast, the district court’s opinion reinforces that, once an investigation results in an enforcement action in federal court, the SEC is subject to the court’s rules and review as any other litigant. Taken together, these opinions present both practitioners and those in the securities industry with useful guidance in when and how to challenge the SEC.
This CLE program gives attorneys a practical command of the legal, regulatory, and ethical issues ar...
During this course, we will go over your rights under the Freedom of Information Act (FOIA) and Priv...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...
Many law firms now rely on AI?driven research, drafting, and workflow tools without fully understand...
Learn about the best strategies and tactics to file bid protests at the agency level, U.S. Governmen...
The Protections and Limits of the First Amendment when it comes to Expressive Conduct. This PowerPoi...
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
Most legal professionals are operating in survival mode whether they realize it or not. Not crisis-l...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...