The Paycheck Protection Program was established to provide federally backed loans to businesses that needed financial relief during the COVID-19 crisis. The program proved susceptible to fraud, and federal authorities have undertaken extensive and aggressive efforts to identify and prosecute individuals and companies that may have fraudulently obtained funds.
Join Matthew Adams and Matthew Lee, Co-Chairs of Fox Rothschild’s White-Collar Criminal Defense & Regulatory Compliance Practice Group, for a discussion about critical steps businesses can take to avoid becoming the focus of a criminal probe; and advice on how to navigate an investigation if they do come under federal scrutiny.
Learning Objectives:
Fox Rothschild LLP
Partner
[email protected]
(215) 299-2765
Matthew D. Lee is a partner at the law firm of Fox Rothschild LLP in Philadelphia. He is co-chair of the firm's White-Collar Criminal Defense & Regulatory Compliance practice group and maintains an extensive tax controversy practice. Mr. Lee regularly represents individuals and businesses in criminal and civil tax matters, including criminal tax investigations, prosecutions, and proceedings before the Internal Revenue Service, such as audits, appeals, and collection matters.
Fox Rothschild LLP
Partner
[email protected]
(973) 994-7573
Matthew is an experienced criminal and civil trial attorney whose diverse national practice focuses predominantly on white-collar criminal and regulatory defense and complex commercial litigation. He serves as the co-chair of Fox Rothschild’s White-Collar Criminal Defense & Regulatory Compliance practice group. He holds leadership roles in the Association of Criminal Defense Lawyers of New Jersey (Officer) and the Essex County, New Jersey Bar Association (Trustee).
Known for his sophisticated command of emerging issues at the intersection of technology and the law, Matthew is exceptionally knowledgeable in e-discovery, digital forensics, data privacy, social networking, and cybersecurity. His clients routinely rely upon him to advance their interests by using technology-driven evidence like e-mails, text messages, internet IP address and intrusion analysis, metadata, and cellular tower triangulation, to name just a few.