Five Suggestions for Elder Care If You or Your Elderly Parents Have “One Foot on the Banana Peel”

Shana and I recently had a new client, “Jane,” that came to see us because she was concerned about her elderly parents. Both are in their 90s and although they are still living independently, she is noticing both a physical and cognitive decline in both.  She described them as having “one foot on the banana peel,” recognizing that they are one fall or illness away from no longer being able to maintain their current lifestyle.

As with many of our clients, they are resistant to making any changes and she is worried about what will happen. Jane lives a distance from her parents, works full time, and has her own teenage children. She came to us for assistance in understanding what she can do to help them. Here are five suggestions we made for her:

1. Changes to Powers of Attorney and Health Care Proxy

Jane’s parents’ existing legal documents have each other as primary agents and neither is able to act in that capacity. Jane is handling their bill paying and taking them to MD appointments and it will be easier for her to continue this role with the appropriate legal documents naming her as the primary agent.

2. Financial Planning

Jane’s parents have limited liquid assets and own their home. Their monthly income does not cover their expenses, so they are drawing from those assets every month. This plan will not work long term if either needs to hire a caregiver to help them at home due to the high cost. We helped Jane to understand the realities of paying for care and the limited coverage of Medicare. We also explained the criteria for Medicaid eligibility, the application process and the problem with using Medicaid to pay for home care. We stressed the importance of Jane and her parents exploring alternative living situations that may better meet their needs while they still had funds and ensuring that they found a facility that would allow them to spend down to Medicaid when their funds are exhausted.

3. Home Evaluation

Jane’s parents live in a bi-level home with stairs to enter and Jane is very concerned about their safety. We recommended a home evaluation to determine what modifications can be done to the home to make it safer. These modifications can be simple such as a tub bench, so they don’t have to step over the tub to get into the shower or more complex such as a stairlift or emergency alert system.

4. Medication Management

Jane’s parents have multiple medical conditions and each takes many medications. They often forget to take their medications or take them incorrectly. This is a very serious issue and often leads to unnecessary hospitalization which can precipitate a downward spiral. We discussed a variety of options, including a visiting nurse and an automatic medication dispenser.

5. Take a Deep Breath

As with all our clients, Jane loves her parents and wants what is best for them. However, her vision of what is best for them doesn’t necessarily coincide with their vision. As a caregiver-child myself, I can very much relate to her frustration of having a clear idea of what will improve an elderly parent’s quality and/or quantity of life and having that parent refuse to make a change. Sometimes small changes are acceptable and they can make a difference and prolong stability. But very often the best we can do is to plan for the emergency and know we have done the best we can.


©2020, Norris McLaughlin & Marcus, P.A., All Rights Reserved

For more on caring for elderly relations, see the National Law Review Family Law, Divorce & Custody type-of-law section.

Limiting Junk Fax Class Actions: Online Fax Services Outside Scope of TCPA FCC Rules

 

On December 9, 2019, the Federal Communications Commission (“FCC”) issued a declaratory ruling In the Matter of Amerifactors Financial Group, LLC (“Amerifactors”) concluding that modern faxing technologies are not within the scope of the Telephone Consumer Protection Act (TCPA).  The Amerifactors ruling, which follows the express language of the TCPA, determines that faxes received via an online fax service as electronic messages are effectively email and therefore are not faxes received on a “telephone facsimile machine” under the statute. This narrows the scope of the TCPA to traditional fax machines and will make it more difficult for attorneys to certify classes of fax recipients under the TCPA, ideally curbing the plethora of TCPA Fax class action lawsuits.

Amerifactors Background

In 2017, Amerifactors filed a petition for an expedited declaratory ruling asking the FCC to “clarify that faxes sent by “online fax services” are not faxes sent to “telephone facsimile machines”[1] therefore, outside of the scope of the TCPA. While faxing has declined in usage significantly, many of those who still receive faxes do so through cloud-based services that send the document via an attachment to an email.  At the time of Amerifactors’ declaratory filing, they were defending a class action suit with claims that Amerifactors violated the TCPA by sending unsolicited fax messages, the bulk of which were sent to consumers from online fax services.

FCC Ruling and Logic

In the Amerifactors ruling, the FCC explained that faxes sent by online fax services do not lead to the “specific harms” Congress sought to address in the TCPA’s Junk Fax Protection Amendment and concluded that “a fax received by an online fax service as an electronic message is effectively an email.”

Unlike printed fax messages that require the recipient to supply paper and ink, the FCC concluded consumers can manage faxes sent by online fax services the same way they manage their email by blocking senders or deleting incoming messages without printing them, short-circuiting many of the specific harms envisioned by the original legislation.  With online fax services, there is no phone-line that is occupied and therefore unavailable for other purposes, and no paper or ink used that must be supplied by the recipient.  Clarifying legislative intent, the FCC stated:

“The House Report on the TCPA makes clear that the facsimile provisions of the statute were intended to curb two specific harms: “First, [a fax advertisement] shifts some of the costs of advertising from the sender to the recipient. Second, it occupies the recipient’s facsimile machine so that it is unavailable for legitimate business messages while processing and printing the junk fax.”

In many ways, the FCC ruling in Amerifactors demonstrates FCC recognition of the changes in faxing technology.  Steven Augustino of KelleyDrye[2], one of the attorneys who represented Amerifactors,  points out that the language we use now does not match the technology that has largely replaced traditional faxing technology, instead offering a short-hand that has roots in an earlier era—and that references dead technologies.  Augustino says:

Amerifactors argued that the term “faxing” has outlived the actual technology of faxing, much in the same way that we still dial a telephone even though no one has a rotary telephone, or we “cc” people on emails but we aren’t using carbon copies.  In many ways, saying ‘I sent a fax’ is similar to that, the term has outlived the technology that has supported it.”

There is reason to believe that this is the first of many declaratory rulings on fax matters under the TCPA.  As of November 2019, there are thirty-six petitions in front of the FCC, and six of those petitions specifically address “junk” faxing rules.  These petitions represent a variety of faxing issues, such as consent and the definition of an advertisement.   The declaratory ruling in Amerifactors and the FCC’s reasoning related to technological changes will likely impact the FCC’s rule-making on similar issues.

Implications for Future TCPA Fax Class Action Lawsuits

According to Douglas B. Brown of RumbergerKirk, one of the attorneys who represented Amerifactors in the FCC’s declaratory ruling:

“While the traditional fax machine has faded out of today’s business communications, online fax services provide secure communications that are critical to providing consumers with secure information about their finances, health and other important matters. The FCC’s ruling allows for these communications to continue without interference from debilitating class-action lawsuits.”

Per Samantha Duke of RumbergerKirk who also represented Amerifactors:

“First, according to the Hobbs Act, federal district courts are bound to enforce the FCC’s rules, regulations, and orders relating to the TCPA. Thus, this declaratory ruling may impact all fax class actions filed in the district courts in the country.”

The Amerifactors ruling requires a closer look at how faxes are being received complicating how class actions are certified under the TCPA.  Per Duke:

The Amerifactors ruling now makes the method by which the fax was received key to determining whether any particular unsolicited facsimile violates the TCPA. This individualized determination will most certainly complicate any attempt to certify a TCPA-fax class action as the question of whether the facsimile was sent to an online fax service will predominate over any common issue.”

In short, unless a fax comes through an old-school fax machine, it’s outside the reach of the TCPA per the FCC’s Amerifactors ruling.


[1] See Petition for Expedited Declaratory Ruling of Amerifactors Financial Group, LLC, CG Docket Nos. 02-278, 05-338, at 2 (filed July 13, 2017) (Petition).

[2] Amerifactors Financial Group, LLC was represented by Rumberger, Kirk & Caldwell, PA attorneys Douglas B. Brown and Samantha Duke, along with attorney Steven A. Augustino of Kelley Drye & Warren LLP.


Copyright ©2019 National Law Forum, LLC

For more on the TCPA and FCC Regulations, see the National Law Review Communications, Media & Internet law section.

Bruce Lee Enterprises, LLC Sues Chinese Fast Food Chain for IP Infringement

Earlier this month, Bruce Lee Enterprises, LLC sued Shanghai Zhengongfu Fast Food Management Co., Ltd., Guangzhou Zhengongfu Catering Management Co., Ltd., and Guangzhou Zhengongfu Fast Food Chain Management Co., Ltd. (collectively referred to as Zhengongfu (真功夫)) in the Shanghai Second Intermediate People’s Court, asking Zhengongfu to cease using a Bruce Lee image (in marketing materials and signage), issue a public clarification in the media for 90 consecutive days that it has nothing to do with Bruce Lee, and requested the court to order Zhengongfu to pay 210 million yuan in economic losses and 88,000 yuan in reasonable expenses (about $30 million USD).

Zhengongfu was founded in 1990 and now has over 600 restaurants throughout China and is in the only Chinese brand in the top 5 of fast food chains in China.  Zhengongfu has been using a drawn image in store signage and marketing of a martial artist in a yellow top that is reminiscent of Bruce Lee dressed in a yellow-and-black one-piece tracksuit from the movie Game of Death.  Zhengongfu has also registered several trademarks incorporating the martial artist that Bruce Lee Enterprises, LLC alleges is Bruce Lee.  For example, in 2004, Zhengongfu filed for mark 3999537 reproduced below and registered in 2008.  There are at least eleven other Chinese trademarks bearing a similar image registered to Zhengongfu.

CN Trademark No. 3999537
This mark is regularly used in store signage as shown in the photo below of a Shanghai branch of the chain.
By WhisperToMe – Own work, CC0.

In the following screen shot from Game of Death, Bruce Lee, in a yellow-and-black tracksuit, strikes a pose similar to that in the trademark.

Still from Game of Death

The cause of action will most likely be portrait right violation, which is similar to California’s right of publicity and right of publicity for the deceased.  Portrait rights in China are protected in the General Principles of Civil Law, with relevant articles reproduced below:

Article 100 Citizens shall enjoy the right of portrait. The use of a citizen’s portrait for profits without his consent shall be prohibited.

Article 120 If a citizen’s right of personal name, portrait, reputation or honor is infringed upon, he shall have the right to demand that the infringement be stopped, his reputation be rehabilitated, the ill effects be eliminated and an apology be made; he may also demand compensation for losses.

The above paragraph shall also apply to infringements upon a legal person’s right of name, reputation or honor.

Although not explicit in the law, portrait rights in China apply to the deceased as the Supreme Court made clear in Zhou Haiying v. Shaoxing Yuewang Jewellery and Gold Co., Ltd. for violating Lu Xun’s portrait right.  The Court ruled that portrait rights continue after death and a close relative has the right sue on behalf of the deceased.  Accordingly, Bruce Lee’s daughter, Shannon Lee, may need to be a named plaintiff in the current lawsuit.

Further, other cases indicate that drawn or cartoon images of persons are also protected by portrait right.  As long as the person is identifiable in the image, portrait rights are infringed regardless of the medium (painting, sculpture, etc.).  For example, in Beijing Huariling Automobile Trading Co., Ltd. and Zhang Zhensuo (stage name: Zhang Liang), the First Intermediate People’s Court of Beijing held that a cartoon reproduction of the plaintiff violated his portrait rights.

On the other hand, Michael Jordan was less successful in the Supreme Court based on a silhouette of a basketball player not showing any facial characteristics.  The Supreme Court explained “the “portrait” protected by the right of portrait should be identifiable, which should contain enough information to enable the public to identify the corresponding right’s subject, that is, the personal characteristics of a specific natural person, so that it can clearly refer to the corresponding right’s subject…the facial features of natural persons are the most important personal characteristics of their physical features.”

Michael Jordan silhouette

In contrast, in the instant case, multiple characteristics potentially identifiable as belonging to Bruce Lee, including his facial characteristics, are present.  Accordingly, Bruce Lee Enterprises, LLC  and Bruce Lee’s daughter could prevail if the Shanghai Second Intermediate People’s Court rules that the Zhengongfu image is identifiable as Bruce Lee.


© 2019 Schwegman, Lundberg & Woessner, P.A. All Rights Reserved.

For more IP infringement cases, see the National Law Review Intellectual Property law page.

Who Must Protect the Ukraine-Trump Whistleblower?

As the impeachment proceedings heat-up, and calls for the Ukraine whistleblower to be identified increase, there remains a fundamental question:  Who has the legal responsibility to protect this whistleblower?  The answer will surprise you!

There are very few laws mandating what the President, as part of his required and mandatory job duties, must perform.   Guaranteeing that employees who make protected disclosures under the  Intelligence Community Whistleblower Protection Act (“ICWPA”) are fully protected is one of them.  The Ukraine whistleblower is a a federal employee covered under the ICWPA.  He or she made a protected disclosure under the ICWPA.  Thus, it is up to President Trump to fully and completely protect this individual.  Here’s why:  The ICWPA directs that [t]he President shall provide for the enforcement of the [Act].” It is as clear and simple as that.  The President “shall” “enforce” the whistleblower law that makes it illegal to retaliate against intelligence community whistleblowers.

Every intelligence community whistleblower, whether they be a Democrat, Republican or Independent, is entitled to the same protection from the President.  In the case of the Ukraine whistleblower, the law does not permit the political implications of the whistleblower’s disclosure to have any impact on the mandatory duty of President Trump to fully “enforce” that whistleblower’s right to be free from any retaliation.  The President is required to put his biases or self-interest aside and defend the right of intelligence community whistleblowers to report abuses of authority.  This includes wherever those abuses are committed, including the Oval Office. Under the ICWPA the buck stops with President Trump, impeached or not.

Unlike other whistleblower laws which give the federal courts or independent agencies, like the Merit Systems Protection Board or the Department of Labor, the authority to protect whistleblowers, the ICWPA places that solemn duty directly on the shoulders of the President.  It is the unique legal responsibility of the President.  The President must ensure that the identity of the intelligence community whistleblowers who file  complaints with the Inspector General pursuant to the Inspector General Act, are fully protected.  It is the President who must ensure that every person within the executive branch of government protect the job security of ICWPA whistleblowers.  It is the obligation of the President to punish those who fail to do so.

The ICWPA anti-retaliation law is not limited simply to preventing whistleblowers from being fired.  The law defines the types of “adverse action” the President must shield whistleblowers from, including  “any change in working conditions.”   In the case of the Ukrainian “quid pro quo” whistleblower, the catastrophic impact on the whistleblower’s ability to perform his or her job duties that would be triggered by violating his right to confidentiality is obvious.  This would include undermining his or her ability to work oversees, be promoted to a covert agent (if not one already), or effectively interact with employees in the White House.

Furthermore, breaching the confidentiality of whistleblowers is well established as an “adverse action” under whistleblower law.  Federal courts and administrative agencies as divergent as the SEC and Department of Labor have ruled that revealing the name of a whistleblower is an adverse action.  Anyone with experience working with whistleblowers knows that once their identity is revealed, their working conditions will never be the same, and they will have a target on their back for the rest of their careers.

The procedures applicable to the Ukraine whistleblower actually informed the whistleblower, in writing, that he or she could file a confidential complaint to the Inspector General.   The actual form submitted guaranteed this right.  Once the complaint was filed and accepted by the Inspector General, the whistleblower protections afforded under the ICWPA kicked in.  As a matter of law, it became President Trump’s obligation to “enforce” the ICWPA and ensure that the Ukraine whistleblower suffer no retaliation. It became the President’s non-discretionary duty to ensure the whistleblower suffered no harm.   This may be hard to believe, but the law is the law.

Given the highly public attacks on the whistleblower emanating from the White House it is now incumbent upon President Trump to instruct all employees within the federal government to comply with the ICWPA.  He must take steps to have his Congressional supporters, “stand down” and stop their continued drum beat to “out” the whistleblower.  Regardless of where you stand on impeachment, the President must enforce the requirements of the ICWPA and protect the whistleblower.

When Donald Trump signed onto the job of President, protecting intelligence community whistleblowers became one of his few mandatory job duties.  Like other employees who work for the taxpayers, he many not like all of his required jobs.  Like other employees he may find some parts of his job difficult or distasteful.  But he has no discretion in this matter.  It is a requirement.  He must ensure that the whistleblower is not retaliated against, that the whistleblower’s identity remains confidential, and that the whistleblower can continue in his or her career, free from stigma.    He must hold those who retaliate accountable.  That is part of the job he wanted.  That is the job he must perform.


Copyright Kohn, Kohn & Colapinto, LLP 2019. All Rights Reserved.

Strategic Guidance for the Most Complex EPLI Claim Coming Across Your Desk

Employment Practices Liability Insurance Conference: January 29-30 at Park Lane Hotel in NYC

Designed for claims managers, underwriters, risk managers, in-house or outside counsels to network and benchmark, this event has an agenda packed with enhanced industry perspectives and new developments, strategies and industry trends. 

With a conference faculty comprised of the “who’s who” of EPLI thought leadership you will be prepared to prevent, manage and defend against the increasing number of employment practices liability claims being filed today.

See the agenda for the 28th National EPLI Conference, and learn more about this great event!

EPLI Conference

Employee Video Surveillance: Position of the European Court of Human Rights

On October 17, 2019, the European Court of Human Rights (ECHR) approved the installation of a Closed-Circuit Television (“CCTV”) surveillance system which was used to monitor supermarket cashiers without informing those employees of the fact that it had been installed.

In this case, a Spanish supermarket manager decided to install cameras in the supermarket because of suspected thefts. He installed (i) visible cameras pointing at the supermarket’s entrance and exit of which he had informed the staff and (ii) hidden cameras pointing at the cash registers of which neither employees nor staff representatives had been informed.

The hidden cameras revealed that thefts were being committed by several employees at the cash registers. The concerned employees were dismissed. Some of them brought an action before the Spanish Labor court arguing that the use of CCTV without their prior knowledge was a breach to their right to privacy and that such evidence could not be admitted in the dismissal procedure.

Like French law, Spanish law requires the person responsible for a CCTV system to inform the concerned employees of the existence, purpose, and methods of the collection of their personal data, prior to implementation of the system.

The case was brought before the ECHR, which gave a first decision on January 9, 2018, concluding that Article 8 of the European Convention for the Protection of Human Rights, relating to the right to privacy, had been breached. The case was then referred to the Grand Chamber.

The issue raised was to find the proportionality and the balance between (i) the reasons justifying the implementation of a CCTV system (i.e., the right of the employer to ensure the protection of its property and the proper functioning of its business) and (ii) the employees’ right to privacy.

The ECHR stated that “domestic courts must ensure that the introduction by an employer of surveillance measures that infringe the employees’ privacy rights is proportionate and is implemented with adequate and sufficient safeguards against abuse”, referring to its previous case law [1].

The ECHR considered that in order to ensure the proportionality of CCTV measures in the workplace, domestic courts should take into account the following factors when balancing the interests involved:

  1. Has the employee been informed of the possibility of being subject to a video surveillance measure?
  2. What is the extent of the video surveillance and what is the degree of intrusion into the employee’s private life?
  3. Has the use of video surveillance been justified by the employer on legitimate grounds?
  4. Was there an alternative surveillance system based on less intrusive means and measures available to the employer?
  5. What were the consequences of the surveillance for the employee who was subject to it?
  6. Was the employee concerned by the video surveillance measure offered adequate guarantees?

Therefore, prior notification to the employees is only one of the criteria taken into account in the balance of interests.

In this particular case, the ECHR approved the examination of proportionality of the video surveillance measure. The Judges decided that despite the lack of prior notification to the employees, the CCTV was (i) justified by suspicions of theft, (ii) limited in space (only a few checkout counters), and (iii) limited in time (10 days). The Court also noted that very few people watched the recordings and then concluded that the degree of intrusion into the employees’ privacy was limited.

Consequently, the Grand Chamber considered that there was no violation of the employees’ privacy rights.

Although this decision does not directly concern France, it remains very interesting since French regulations (i.e., the Data Protection Act, the General Data Protection Regulations, and the Labor Code) provide:

  • that the monitoring measures implemented by an employer must not impose restrictions on the employees’ rights and freedoms which would neither be proportionate nor justified by the nature of the task to be performed (Article L. 1121-1 of the Labor Code); and
  • that concerned employees and staff representatives must be informed prior to the implementation of a video surveillance system (Article L. 1222-4 of the Labor Code).

According to French case law, any system that is not compliant with the above is considered illicit and the information collected could not be used as evidence of an employee’s misconduct [2].

The ECHR’s decision seems to challenge French case law: where the absence of prior notification to employees is considered as an overwhelming obstacle by French judges, the ECHR considers that it is merely one of the several criteria to be taken into account to assess the proportionality of the infringement to the employee’s right to privacy.

The question that remains is: what will be the impact of the ECHR’s decision in France?


NOTES

[1] ECHR, Grand Chamber, September 5, 2017, n°641996/08, Bărbulescu c. Roumanie; ECHR, decision, October 5, 2010, 420/07, Köpke c. Germany.

[2] See French Supreme Court, June 7, 2006, n°04-43866 ; French Supreme Court, September 20, 2018, n°16-26482.


Copyright 2019 K & L Gates

ARTICLE BY Christine Artus of K&L Gates.
For more on employee privacy rights, see the National Law Review Labor & Employment Law section.

Senate Introduces Bill to Formalize Joint Framework for Regulating Cell-Cultured Meat Products

Producers of cell-cultured meat – synthetic meat products derived from animal cell cultures that are intended to simulate the taste, appearance, and texture of traditional animal products – may soon receive regulatory direction from Congress. On December 16, 2019, Senators Mike Enzi (WY) and Jon Tester (MT) introduced legislation to codify a joint agreement between the U.S. Food & Drug Administration (FDA) and the U.S. Department of Agriculture (USDA) regulating the development and sale of cell-cultured meat products. The legislation aims to address ongoing uncertainty over which federal agency should regulate the cell culture development process, and would assign authority to USDA to establish appropriate label terms for cell-cultured meat products. The bill arrives even as a number of states have recently acted to prohibit cell-cultured meat products from being labeled as “meat” – and are now facing lawsuits in federal court.

Cell-cultured meat, also called lab-grown meat or “clean meat,” is grown in a sterile laboratory environment. The cell cultures are drawn from either a live or slaughtered animal and grown in a complex multi-step process.[1] They are differentiated and matured to simulate traditional meat products while avoiding many of the environmental impacts associated with traditional animal husbandry. Technology advocates state that cell-cultured meat reduces feed costs, crop footprints, greenhouse gas emissions, and water consumption.

But cell-cultured meat products have not yet been able to offer these benefits at scale, owing in part to high costs currently associated with development and production. Regulatory uncertainty has also created challenges, as regulators have grappled over which federal agency should have primary oversight over the cell-cultured meat production process: while USDA regulates and inspects meat and poultry, FDA generally regulates all other food products to ensure that they are safe for human consumption and labeled accurately. This longstanding framework has prompted a challenging question for regulators and stakeholders alike: should cell-cultured meat products be regulated by USDA under its authority over traditional meat and poultry products, or by FDA, which has historically regulated the types of food manufacturing facilities and laboratories where cell-cultured meat will be grown and produced?

The agencies have already offered their commitment to work together. In November 2018, USDA and FDA issued a press release articulating a joint framework for robust collaboration, wherein FDA would oversee the stages of production from cell collection to differentiation, while USDA would regulate all subsequent processing, packing, and labeling of the products.[2] The agencies formalized their joint agreement in March 2018.

Responding to concerns from livestock industry groups and other stakeholders, a number of states (including Arkansas, Louisiana, Missouri, Mississippi, and Wyoming) subsequently passed laws to prohibit certain animal-derived food products from being labeled as “meat” or a “meat food product.” Several of those laws were subsequently challenged in lawsuits brought by public interest groups.

In the wake of these legal challenges, Senators Enzi and Tester introduced the “Food Safety Modernization for Innovative Technologies Act” (Senate Bill 3053) on December 16.[3] The bill draws from the Joint Agreement and aims to clarify that FDA will oversee the initial cell collection, proliferation, and culturing processes while transferring regulatory oversight of the harvested cells to USDA for regulation related to further processing and packaging. Significantly, the bill provides USDA with exclusive authority over labeling requirements for cell-cultured meat products derived from cell lines of livestock or poultry and assigns USDA with responsibility for establishing “appropriate nomenclature” for these product labels. The bill also requires the FDA and USDA to share information and collaborate during cell differentiation and harvesting. As of this date, the bill has been referred to the Committee on Agriculture, Nutrition, and Forestry and has yet to face a vote.


[1] See Alan Sachs & Sarah Kettenmann, A Burger by Any Other Name, 15 SciTech Lawyer 19 (Winter 2019).

[2] U.S. Dept Agric., Statement from USDA Secretary Perdue and FDA Commissioner Gottlieb on the Regulation of Cell-Cultured Food Products from Cell Lines of Livestock and Poultry, Release No. 0248.18, Nov 16, 2018, available at https://www.usda.gov/media/press-releases/2018/11/16/statement-usda-secretary-perdue-and-fda-commissioner-gottlieb.

[3] Food Safety Modernization for Innovative Technologies Act, S. 3053, 116th Cong. (2019).


© 2019 Beveridge & Diamond PC

For more on Cell-Cultured Meat, please see the Biotech, Food and Drug Law section of the National Law Review.

Reflections on 2019 in Technology Law, and a Peek into 2020

It is that time of year when we look back to see what tech-law issues took up most of our time this year and look ahead to see what the emerging issues are for 2020.

Data: The Issues of the Year

Data presented a wide variety of challenging legal issues in 2019. Data is solidly entrenched as a key asset in our economy, and as a result, the issues around it demanded a significant level of attention.

  • Clearly, privacy and data security-related data issues were dominant in 2019. The GDPR, CCPA and other privacy regulations garnered much consideration and resources, and with GDPR enforcement ongoing and CCPA enforcement right around the corner, the coming year will be an important one to watch. As data generation and collection technologies continued to evolve, privacy issues evolved as well.  In 2019, we saw many novel issues involving mobilebiometric and connected car  Facial recognition technology generated a fair amount of litigation, and presented concerns regarding the possibility of intrusive governmental surveillance (prompting some municipalities, such as San Francisco, to ban its use by government agencies).

  • Because data has proven to be so valuable, innovators continue to develop new and sometimes controversial technological approaches to collecting data. The legal issues abound.  For example, in the past year, we have been advising on the implications of an ongoing dispute between the City Attorney of Los Angeles and an app operator over geolocation data collection, as well as a settlement between the FTC and a personal email management service over access to “e-receipt” data.  We have entertained multiple questions from clients about the unsettled legal terrain surrounding web scraping and have been closely following developments in this area, including the blockbuster hiQ Ninth Circuit ruling from earlier this year. As usual, the pace of technological innovation has outpaced the ability for the law to keep up.

  • Data security is now regularly a boardroom and courtroom issue, with data breaches, phishing, ransomware attacks and identity theft (and cyberinsurance) the norm. Meanwhile, consumers are experiencing deeper and deeper “breach fatigue” with every breach notice they receive. While the U.S. government has not yet been able to put into place general national data security legislation, states and certain regulators are acting to compel data collectors to take reasonable measures to protect consumer information (e.g., New York’s newly-enacted SHIELD Act) and IoT device manufacturers to equip connected devices with certain security features appropriate to the nature and function of the devices secure (e.g., California’s IoT security law, which becomes effective January 1, 2020). Class actions over data breaches and security lapses are filed regularly, with mixed results.

  • Many organizations have focused on the opportunistic issues associated with new and emerging sources of data. They seek to use “big data” – either sourced externally or generated internally – to advance their operations.  They are focused on understanding the sources of the data and their lawful rights to use such data.  They are examining new revenue opportunities offered by the data, including the expansion of existing lines, the identification of customer trends or the creation of new businesses (including licensing anonymized data to others).

  • Moreover, data was a key asset in many corporate transactions in 2019. Across the board in M&A, private equity, capital markets, finance and some real estate transactions, data was the subject of key deal points, sometimes intensive diligence, and often difficult negotiations. Consumer data has even become a national security issue, as the Committee on Foreign Investment in the United States (CFIUS), expanded under a 2018 law, began to scrutinize more and more technology deals involving foreign investment, including those involving sensitive personal data.

I am not going out on a limb in saying that 2020 and beyond promise many interesting developments in “big data,” privacy and data security.

Social Media under Fire

Social media platforms experienced an interesting year. The power of the medium came into even clearer focus, and not necessarily in the most flattering light. In addition to privacy issues, fake news, hate speech, bullying, political interference, revenge porn, defamation and other problems came to light. Executives of the major platforms have been on the hot seat in Washington, and there is clearly bipartisan unease with the influence of social media in our society.  Many believe that the status quo cannot continue. Social media platforms are working to build self-regulatory systems to address these thorny issues, but the work continues.  Still, amidst the bluster and criticism, it remains to be seen whether the calls to “break up” the big tech companies will come to pass or whether Congress’s ongoing debate of comprehensive data privacy reform will lead to legislation that would alter the basic practices of the major technology platforms (and in turn, many of the data collection and sharing done by today’s businesses).  We have been working with clients, advising them of their rights and obligations as platforms, as contributors to platforms, and in a number of other ways in which they may have a connection to such platforms or the content or advertising appearing on such platforms.

What does 2020 hold? Will Washington’s withering criticism of the tech world translate into any tangible legislation or regulatory efforts?  Will Section 230 of the Communications Decency Act – the law that underpins user generated content on social media and generally the availability of user generated content on the internet and apps – be curtailed? Will platforms be asked to accept more responsibility for third party content appearing on their services?

While these issues are playing out in the context of the largest social media platforms, any legislative solutions to these problems could in fact extend to others that do not have the same level of compliance resources available. Unless a legislative solution includes some type of “size of person” test or room to adapt technical safeguards to the nature and scope of a business’s activities or sensitivity of the personal information collected, smaller providers could be shouldered with a difficult and potentially expensive compliance burden. Thus, it remains to see how the focus on social media and any attempt to solve the issues it presents may affect online communications more generally.

Quantum Leaps

Following the momentum of the passage of the National Quantum Initiative at the close of 2018, a significant level of resources has been invested into quantum computing in 2019.  This bubble of activity culminated in Google announcing a major milestone in quantum computing.  Interestingly, IBM suggests that it wasn’t quite as significant as Google claimed.  In any case, the development of quantum computing in the U.S. has progressed a great deal in 2019, and many organizations will continue to focus on it as a priority in 2020.

  • Reports state that China has dedicated billions to build a Chinese national laboratory for quantum computing, among other related R&D products, a development that has gotten the attention of Congress and the Pentagon. This may be the beginning of the 21st century’s great technological race.

  • What is at stake? The implications are huge. It is expected that ultimately, quantum computers will be able to solve complex computations exponentially faster – as much as 100 million times faster — than classic computers. The opportunities this could present are staggering.  As are the risks and dangers.  For example, for all its benefits, the same technology could quickly crack the digital security that protects online banking and shopping and secure online communications.

  • Many organizations are concerned about the advent of quantum computing. But given that it will be a reality in the future, what should you be thinking about now? While not a real threat for 2020 or the near-term thereafter, it would be wise to think about it if one is anticipating investing in long-term infrastructure solutions. Will quantum computing render the investment obsolete? Or, will quantum computing present a security threat to that infrastructure?  It is not too early to think about these issues, and for example, technologists have been hard at work developing quantum-proof blockchain protocols. It would at least be prudent to understand the long-term roadmap of technology suppliers to see if they have even thought about quantum computing, and if so, to see to how they see quantum computing impacting their solutions and services.

Artificial Intelligence

We have seen significant level of deployment in the Artificial Intelligence/Machine Learning landscape this past year.  According to the Artificial Intelligence Index Report 2019, AI adoption by organizations (of at least one function or business unit) is increasing globally. Many businesses across many industries are deploying some level of AI into their businesses.  However, the same report notes that many companies employing AI solutions might not be taking steps to mitigate the risks from AI, beyond cybersecurity. We have advised clients on those risks, and in certain cases have been able to apportion exposure amongst multiple parties involved in the implementation.  In addition, we have also seen the beginning of regulation in AI, such as California’s chatbot law, New York’s recent passage of a law (S.2302prohibiting consumer reporting agencies and lenders from using the credit scores of people in a consumer’s social network to determine that individual’s credit worthiness, or the efforts of a number of regulators to regulate the use of AI in hiring decisions.

We expect 2020 to be a year of increased adoption of AI, coupled with an increasing sense of apprehension about the technology. There is a growing concern that AI and related technologies will continue to be “weaponized” in the coming year, as the public and the government express concern over “deepfakes” (including the use of voice deepfakes of CEOs to commit fraud).  And, of course, the warnings of people like Elon Musk and Bill Gates, as they discuss AI, cannot be ignored.

Blockchain

We have been very busy in 2019 helping clients learn about blockchain technologies, including issues related to smart contracts and cryptocurrency. 2019 was largely characterized by pilotstrials,  tests and other limited applications of blockchain in enterprise and infrastructure applications as well as a significant level of activity in tokenization of assetscryptocurrency investments, and the building of businesses related to the trading and custody of digital assets. Our blog, www.blockchainandthelaw.io keeps readers abreast of key new developments and we hope our readers have found our published articles on blockchain and smart contracts helpful.

Looking ahead to 2020, regulators such as the SECFinCENIRS and CFTC are still watching the cryptocurrency space closely. Gone are the days of ill-fated “initial coin offerings” and today, security token offerings, made in compliance with the securities laws, are increasingly common. Regulators are beginning to be more receptive to cryptocurrency, as exemplified by the New York State Department of Financial Services revisiting of the oft-maligned “bitlicense” requirement in New York.

Beyond virtual currency, I believe some of the most exciting developments of blockchain solutions in 2020 will be in supply chain management and other infrastructure uses of blockchain. 2019 was characterized by experimentation and trial. We have seen many successes and some slower starts. In 2020, we expect to see an increase in adoption. Of course, the challenge for businesses is to really understand whether blockchain is an appropriate solution for the particular need. Contrary to some of the hype out there, blockchain is not the right fit for every technology need, and there are many circumstances where a traditional client-server model is the preferred approach. For help in evaluating whether blockchain is in fact a potential fit for a technology need, this article may be helpful.

Other 2020 Developments

Interestingly, one of the companies that has served as a form of leading indicator in the adoption of emerging technologies is Walmart.  Walmart was one of the first major companies to embrace supply use of blockchain, so what is Walmart looking at for 2020? A recent Wall Street Journal article discusses its interest and investment in 5G communications and edge computing. We too have been assisting clients in those areas, and expect them to be active areas of activity in 2020.

Edge computing, which is related to “fog” computing, which is, in turn,  related to cloud computing, is simply put, the idea of storing and processing information at the point of capture, rather than communicating that information to the cloud or a central data processing location for storage and processing. According to the WSJ article, Walmart plans on building edge computing capability for other businesses to hire (following to some degree Amazon’s model for AWS).  The article also talks about Walmart’s interest in 5G technology, which would work hand-in-hand with its edge computing network.

Our experience with clients suggest that Walmart may be onto something.  Edge and fog computing, 5G and the growth of the “Internet of Things” are converging and will offer the ability for businesses to be faster, cheaper and more profitable. Of course this convergence also will tie back to the issues we discussed earlier, such as data, privacy and data security, artificial intelligence and machine learning. In general, this convergence will increase even more the technical abilities to process and use data (which would conceivably require regulation that would feature privacy and data security protections that are consumer-friendly, yet balanced so they do not stifle the economic and technological benefits of 5G).

This past year has presented a host of fascinating technology-based legal issues, and 2020 promises to hold more of the same.  We will continue to keep you posted!

We hope you had a good 2019, and we want to wish all of our readers a very happy and safe holiday season and a great New Year!


© 2019 Proskauer Rose LLP.

For more in technology developments, see the National Law Review Intellectual Property or Communications, Media & Internet law sections.

Foreign Judgments in Israel: Recognition and Enforcement

As a basic rule in international law, a judgment rendered in one country is not recognized, per se, in another country in which its recognition is enforcement or recognition is sought. The foreign judgment must first undergo a process of integration, sometimes called ‘domestication,’ dictated by the laws of the integrating country before it can be recognized or enforced. The difference in status between a foreign and a local, or domestic, judgment necessitates this integration:[1]

“Where it exists, it is a sign that a local governmental organ – judicial or otherwise – has granted the foreign judgment an entry visa and has set the degree of its validity here according to the pertinent rules of the local law.” Justice Cheshin observed in C.A. 970/93 Attorney General of Israel v. Agam[2]:

Thus, for a foreign judgment to serve as, e.g., as a collateral estoppel in Israeli litigation, an Israeli court must first recognize, and thus integrate, the foreign judgment. Until this is done, the foreign judgment has no status in Israel, for the purpose of either recognition or enforcement. It can even be said that “a foreign judgment not yet declared enforceable holds the same status as mere pleadings.”[3]

General

A foreign judgment lacks validity, and must undergo a process of integration, before it can be recognized or enforced in Israel. Israeli law’s methods of integration are detailed in the Foreign Judgments Enforcement Law, 5718-1958 (Enforcement Law). This establishes a distinct normative framework on whose sole basis the courts in Israel may recognize a foreign judgment or declare it enforceable. The Enforcement Law establishes a series of conditions regarding the nature of the judgment, the manner of its execution, and its integration into Israeli law. Should these conditions be met, a court shall declare the judgment enforceable in Israel. Thus, inter alia, the Enforcement Law establishes conditions under which an Israeli court may declare a foreign judgment enforceable: the requirement of reciprocity of enforcement, according to which a foreign judgment would not be declared enforceable if the rendering country’s law does not enforce the judgments of Israeli courts; the time period during which a petition to enforce a foreign judgment must be filed for an Israeli court to considered it; defenses, any one of which would preclude the enforceability of the foreign judgment; and a restriction on enforcement, according to which a foreign judgment shall not be declared enforceable if its enforcement is likely to prejudice the sovereignty or security of the State of Israel.

The Enforcement Law (Article 11) also establishes conditions for recognizing a foreign judgment: “incidentally, while hearing another matter…and for the purpose of that matter”, or primarily and directly. It is significant that the original Enforcement Law, passed by the Knesset in 1958, dealt solely with incidental recognition of foreign judgments, while provisions for direct and primary recognition of foreign judgments were added later, in the Foreign Judgments Enforcement Law (Amendment 2) 5738-1977.

Although lack of good faith or unacceptable conduct do not, pursuant to the Enforcement Law, provide independent cause to refuse recognition or enforcement of a foreign judgment, “however certainly this carries weight in the court’s considerations together with all other conditions”[4] for such recognition or enforcement.

Judgments in Personamin Rem, and Personal Status Judgments

The recognition or enforcement of a foreign judgment is highly influenced by the traditional classification of judgments into in personamin rem, and personal status judgments. A judgment in personam obligates a person to perform an act (repay a debt, pay damages, surrender an object, etc.) or to refrain from doing so. A judgment in personam binds, in the sense of creating res judicata, only the parties involved, and by its very nature is given to execution, that is to say, enforcement. A judgment in rem declares or establishes (creates, changes, or cancels) title in immovable or movable property. Such a judgment binds the world, so to speak. It does not place any personal obligation and is therefore not given to execution. This is also true of quasi in rem judgments, which are applicable only to certain parties: for example, an inheritance order that declares certain individuals as heirs, and their resulting title in a certain property. A status judgment is a judgment that declares or establishes (creates, changes, or cancels) the personal status of a person, such as an annulment or a judgment of divorce. Like a judgment in rem, a personal status judgment is not given to execution, as it imposes no personal obligations.

Under the rules of private international law, personal status judgments can be issued by a court in the country of permanent residency or in the country of citizenship.[5] In general, however, there is no international consistency,[6] as personal status is limited to a particular country or a specific legal system. In a case where a Jewish couple, married in, e.g., New York in a civil ceremony, emigrates to Israel, they may be considered unmarried from the perspective of the Jewish law that applies in the Israeli State Rabbinical court. Yet, in the event of divorce, Israeli law may require them to accept a Rabbinic divorce. In some situations,[7] nonetheless, Israeli civil law may recognize the marriage, for example, regarding alimony.[8] A foreign divorce judgment is another example of a split status,[9] as it has no binding validity and lacks evidentiary value until validation from a competent Israeli court.

Another example is mamzerut, a status created by Jewish religious law that disqualifies the mamzer from Jewish marriage. In the Israeli legal system,[10] a mamzer is a child born of a married woman from another man, or a child of relations with a first-order relative, defined and prohibited in religious law. Within the state of Israel, qualification for marriage and divorce between Jews is set by Jewish law, a law that is not applicable in other countries. Therefore, a mamzer may other than in Israel. A parallel example, in certain countries, is a child born out of wedlock. In those countries, such a child is considered illegitimate, whereas in Jewish religious law, the status of a child born out of wedlock is not affected in any way.

Thus, only foreign judgments in personam can be enforced in Israel directly, while foreign in rem and personal status judgments are granted validity through their recognition. However, because all enforcement in and of itself includes recognition, it can be said that all types of judgments can potentially be recognized,[11] although for those judgments that cannot be enforced, the recognition per se is of nearly no value.

What options are available for a party seeking the enforcement, in Israel, of a foreign judgment? In general, the traditional means in English common law for enforcing a foreign debt judgment is by filing a domestic claim based on the foreign judgment. The foreign judgment itself, as opposed to the cause of action in the original forum, becomes the new cause of action. Claims based on foreign judgments were accepted in Palestine under the British Mandate. This expired in 1948 upon the establishment of the State of Israel. However, after enactment of the Enforcement Law, and particularly of its Article 2, it was no longer clear whether this procedure was still available to the holder of a foreign judgment.[12]

In C.A. 101/63 Winter v. Kovetz,[13] the Supreme Court dispersed any doubts, ruling unequivocally, that even given the Enforcement Law, a party might still file a claim in Israel on the basis of a foreign judgment, as opposed to filing a petition pursuant to the Enforcement Law to declare the judgment enforceable.[14] In C.A. 665/72 Mata Khan (Christophilco) v. Schweibel,[15] the Israeli Supreme Court again held that a foreign judgment creditor is permitted to “file a claim based on the original cause at the basis of the judgment, file a claim whose cause of action is the foreign judgment, or file a petition for enforcement in accordance with the enforcement law.”[16]

Enforcement proceedings for a foreign judgment are intended to grant the creditor, whose matter was already heard and adjudicated in a foreign state, tools of enforcement in the state occupied by the debtor or his property. In this way, the objectives behind the enforcement process are attained, including limiting litigation between the parties; honoring their rights; as well as encouraging cooperation and harmony between the various legal systems.

A result of the stated objectives of the enforcement process is that an Israeli court hearing a petition to enforce a foreign judgment does not act as an appellate court over the foreign court, and is inclined to “respect the judgment as is, and not question it.”[17] Thus also, “the court does not require a new, local investigation of the foreign court proceedings; does not examine the factual or legal correctness of the foreign judgment; and does not even take the reasoning of the judgment into account.”[18] Therefore, an error – even a blatant one – in the foreign judgment would not in and of itself preclude the judgment’s enforcement.


[1] Prof. Amos Shapira, Recognition and Enforcement of Foreign Judgments, Iyunei Mishpat 4 (1974) 509 (hereinafter: Shapira, Recognition and Enforcement of Foreign Judgments, or Shapira).

[2]P.D. 49(1) 561, 569 (1995).

[3]Bnk. (T.A.) 1515/04 Bamira v. Greenberg, at §4, (Nevo, Jul. 15, 2004).

[4] See Judge Keret-Meir’s ruling in Bankruptcy File (T.A.) 2193/08 First International Bank of Israel Ltd. v. Gold & Honey (1995) L.P. et al (Nevo, Oct. 30, 2008), §4.

[5] H.C. 36/50 Gottlieb v. Gottlieb P.D. 5 57, 64 (1950); C.A. 472/64 Inavi v. Attorney General of Israel P.D. 19(1) 645 (1965).

[6] Michael Corinaldi, Status, Family, and Succession Laws Between Religion And State 25-26 (2004).

[7]Avigdor Levontin, On Marriage and Divorce Abroad 7, 50-51, 67-68 (1957). See also Menashe Shawa, Personal Law in Israel 153-154, 681 (4th ed., 2001).

[8]C.A. 173/69 Becher v. Goldberg P.D. 23(2) 665 (1969).

[9]Shawa, supra n. 3 at 141-241. See also Menashe Shawa, Direct Recognition of Judgments in Israel, and Applicable Rules Kiryat Hamishpat 2 35 (2002).

[10]Corinaldi, supra n. 3 at 25-26.

[11]Shapira, Recognition and Enforcement of Foreign Judgments 513.

[12]Id. 515-516.

[13]P.D. 17 2032 (1963). See also Shapira, Recognition and Enforcement of Foreign Judgments 516 n. 28.

[14]Shapira, id.

[15]P.D. 27(1) 690 (1984).

[16]Id. at 694.

[17]C.A. 221/78 Ovadia v. Cohen P.D. 33(1) 293, 296 (1978).

[18]D.C.M. (Jm.) 4052/05 Wells Fargo Bank of Minnesota National Association v. Zimmering (Nevo, Dec. 31, 2007), Section 9 of the judgment.


Copyright © 2019 Carmon & Carmon

For more on international law, see the National Law Review Global Law page.

CCPA Notice of Collection – Are You Collecting Geolocation Data, But Do Not Know It?

Businesses subject to the California Consumer Privacy Act (“CCPA”) are working diligently to comply with the CCPA’s numerous mandates, although final regulatory guidance has yet to be issued. Many of these businesses are learning that AB25, passed in October, requires employees, applicants, and certain other California residents to be provided a notice of collection at least for the next 12 months. These businesses need to think about what must be included in these notices.

Business Insider article explains that iPhones maintain a detailed list of every location the user of the phone frequents, including how long it took to get to that location, and how long the user stayed there. The article provides helpful information about where that information is stored on the phone, how the data can be deleted, and, perhaps more importantly, how to stop the tracking of that information. This information may be important for users, as well as companies that provide iPhones to their employees to use in connection with their work.

AB25 excepted natural persons acting as job applicants, employees, owners, directors, officers, medical staff members, and contractors of a CCPA-covered business from all of the CCPA protections except two: (i) providing them a notice of collection under Cal. Civ. Code Sec. 1798.100(b), and (ii) the right to bring a private civil action against a business in the event of a data breach caused by the business’s failure to maintain reasonable safeguards to protect personal information. The notice of collection must inform these persons as to the categories of personal information collected by the business and how those categories are used.

The CCPA’s definition of personal information includes eleven categories of personal information, one of which is geolocation data. As many businesses think about the categories of personal information they collect from employees, applicants, etc. for this purpose, geolocation may be the last thing that comes to mind. This is especially true for businesses with workforces that come into the office every day, and which do not have a business need to know where their employees are, such as transportation, logistics, and home health care businesses. But, they still may provide their workforce members a company-owned iPhone or other smart device with similar capabilities, although not realizing all of its capabilities or configurations.

As many who have gone through compliance with the General Data Protection Regulations in the European Union, the CCPA and other laws that may come after it in the U.S. will require businesses to think more carefully about the personal information they collect. They likely will find such information is being collected without their knowledge and not at their express direction, and they may have to communicate that collection (and use) to their employees.


Jackson Lewis P.C. © 2019