Practice Advisories |
LAC Practice Advisories provide in depth discussion and analysis of select substantive and procedural issues in immigration law. The Practice Advisories are intended to assist lawyers and do not substitute for individual legal advice supplied by a lawyer familiar with a client's case.
Employment Authorization and Asylum: Strategies to Avoid Stopping the Asylum Clock
This Practice Advisory discusses how the asylum EAD clock operates, EOIR interpretations of clock stopping events, Legal Action Center analysis, and strategies to keep the clock running.
Published On: Tuesday, February 28, 2006 | Download File
Judicial Review Provisions of The REAL ID Act
On May 11, the REAL ID Act was signed into law. This Act contains numerous provisions related to federal court review of immigration cases. This Practice Advisory contains a preliminary analysis of the judicial review provisions.
Published On: Tuesday, June 7, 2005 | Download File
BIA "Affirmance Without Opinion": What Federal Court Challenges Remain?
This Practice Advisory discusses the types of AWO challenges that have failed and those that remain available.
Published On: Wednesday, April 27, 2005 | Download File
Suggested Strategies for Remedying Missed Petition for Review Deadlines or Filings in the Wrong Court
This Practice Advisory addresses situations in which a court might excuse a late-filed petition for review, options for remedying the failure to timely file a petition for review, and provides an overview of the statute that authorizes courts to transfer a case to cure a lack of jurisdiction when an action is filed in the wrong federal court.
Published On: Wednesday, April 20, 2005 | Download File
EOIR Background and Security Check Regulations
On April 1, 2005, EOIR's security check regulations went into effect. The interim rule bars IJs and the BIA from granting most forms of relief until DHS has informed them that security checks are complete. DHS is requiring applicants to mail copies of their applications to USCIS service centers to initiate the security check process.
Published On: Wednesday, April 6, 2005 | Download File