Bedside Manner: The Key to Landing and Retaining Clients

RWLogoWide

Practicing law is very much a client-centric business and providing exceptional service is pivotal to a successful practice. Are you providing the service that your clients expect?

Survey after survey will tell you that the #1 reason why clients fire attorneys is “lack of responsiveness” or in general an overall lack of customer service. Correspondingly, the top reason clients hire lawyers is empathy and responsiveness. Keeping clients and potential clients happy is the key to not only maintaining, but growing your practice. The following are a few tips for ensuring that your bedside manner doesn’t impede your ability to attract and retain new clients.

client retention bedside manner law office management

Return Calls Promptly

The legal industry and in particular personal injury law is highly competitive. Speedy response time to new leads is the key to higher conversions (See our recent article about response time:http://www.rwlynchblog.com/the-key-to-converting-more-leads/). But your bedside manner doesn’t end there: lack of responsiveness is the most cited reason for firing a lawyer. Return client calls as soon as possible, even if it’s an email (or a call from a secretary or paralegal) that lets them know that their call is important to you and that you will respond as soon as possible.

Listen

Our most successful attorneys can attest to this advice: listen to everything a potential client has to say about his/her potential case. Yes, some potential clients can run off on tangents that are seemingly unrelated to a case. However, some of the best cases our clients say they’ve landed are cases that other attorneys turned away; simply because they didn’t take the time to listen and ask the right questions. Don’t lose potential clients because “you don’t have the time” to sort through all of the “riff-raff”. Giving your full attention and asking questions will allow you to uncover the important nuggets of information you may miss otherwise.

Don’t Use Legalese

Take the time to explain legal issues in a way your clients can easily understand them. These are complicated issues and clients are often scared and confused. Explaining issues in a clear and concise manner devoid of legal jargon will put your clients at ease.

Above All Empathize

Taking the time to care, explain the process and reassure clients will not only help you retain clients but will create a lasting impression that will ensure those clients will continue to refer new business your way.

Article by:

Brian Lynch

Of:

RW Lynch Company, Inc.

Hey Wait, What About North Carolina's Fancy New Quasi-Judicial Statute?

Poyner Spruill

 

In 2009, the North Carolina General Assembly adopted Senate Bill 44, an act that codified the case law regarding quasi-judicial land use proceedings, including the proper standards and procedures for judicial review. See N.C. Gen. Stat. § 160A-393. Quasi-judicial land use decisions include, among other things, decisions involving variances, special and conditional use permits, and appeals of administrative decisions. See N.C. Gen. Stat. § 160A-393(b)(3).  The adoption of this new statute took the effort of many accomplished land use attorneys and interested stakeholders.  In fact, discussions regarding the need for this legislation originated before my legal career even began. So, when I read a recent Court of Appeals decision involving the denial of a special use permit by a quasi-judicial body, I was befuddled as to why the opinion did not contain a single citation to G.S. § 160A-393.

In Blair Investments, LLC v. Roanoke Rapids City Council, et al. (filed December 17, 2013), the petitioner sought a special use permit to construct a cell phone tower.  After considering the evidence presented by the applicant, planning department and concerned neighbors, the Roanoke Rapids City Council denied the special use permit on the grounds that the proposed tower would “endanger the public or safety” and would “not be in harmony with the surrounding area.”  The Superior Court affirmed the Council’s decision.  On appeal, however, the Court of Appeals reversed the Council’s decision on the grounds that the applicant had met its burden of making a prima facie showing of entitlement to the special use permit and the testimony of the concerned neighbors were speculative opinions, unsupported by any documentary or testimonial evidence.  Therefore, the Court held the Council’s decision was not supported by substantial, competent, and material evidence and remanded the case with instructions that the special use permit be granted.  

To be clear, I take no issue with the Court’s ultimate decision in Blair.  The Court appropriately reviewed the record and made the correct determination based on the facts and evidence that were before the Council.  I also take no issue with the overall legal principles and case law cited by the Court in Blair.  I do find it perplexing, however, that in discussing the appeal procedure, scope of review and its ultimate disposition of the case, the Court cited to a number of cases decided prior to the adoption of G.S. § 160A-393, but did not cite to or discuss 160A-393 at all.  As already discussed, the purpose of adopting 160A-393 was to codify prior case law and establish the black letter law governing the review of quasi-judicial decisions.  Perhaps the failure to recognize or cite to 160A-393 was an oversight by the lawyers who argued the case or perhaps it simply slipped by the law clerks working on the opinion.  I can’t imagine, however, the statutory framework for reviewing quasi-judicial decisions was completely ignored by the Court intentionally.

Many might consider this article to be a technical assault on an otherwise good appellate opinion.  While I believe it to be a substantive omission, my true reason for writing this article is to hopefully ensure that this fancy new statute at least gets dropped in a future footnote. Too many people worked too hard for it not to.

Article by:

Chad W. Essick

Of:

Poyner Spruill LLP

New Online Privacy Policy Requirements Take Effect January 1, 2014

VedderPriceLogo

 

California Online Privacy Protection Act (CalOPPA)

Owners of websites, online services or mobile applications (apps) that can be accessed or used by California residents should ensure their compliance with the new amendments to the California Online Privacy Protection Act of 2003 (CalOPPA) by the law’s January 1, 2014 effective date.  The borderless nature of the Internet makes this law applicable to almost every website or online service and mobile application.  Accordingly, companies should review and revise their online privacy policies to ensure compliance with the new law and avoid potentially significant penalties.

Previously, CalOPPA required the owner of any website or online service operated for commercial purposes (an “operator”) that collects California residents’ personally identifiable information (PII) to conspicuously post a privacy policy that met certain content requirements, including identifying the types of PII collected and the categories of third parties with whom that information is shared. The new law requires that companies subject to CalOPPA provide the following additional disclosures in their privacy policies.

  • How an operator responds to “do not track” signals from Internet browsers and any other mechanism that provides consumers a choice regarding the collection of PII about an individual consumer’s online activities over time and across third-party websites and online services.  A company may satisfy this requirement by revising its privacy policy to include the new disclosures or by providing a clear and conspicuous hyperlink to a webpage that contains a description of any program or protocol the company follows to provide consumers a choice about tracking, including the effects of the consumer’s choice.
  • An affected company must disclose to users whether third parties may collect PII about a user’s online activities over time and across different websites when a consumer uses the operator’s website or online service. However, an operator is not required to disclose the identities of such third parties.

The California law does not require that operators honor a user’s “do not track” signals. Instead, operators must only provide users with a disclosure about how the website or mobile app will respond to such mechanisms. “Do not track” mechanisms are typically small pieces of code, similar to cookies, that signal to websites or mobile apps that the user does not want his or her website or app activities tracked by the operator, including through analytics tools, advertising networks, and other types of data collection and tracking practices.  Further, the Privacy Enforcement and Protection Unit of the California Office of the Attorney General recently stated that the required disclosures should not be limited to tracking simply for online behavioral advertising purposes, but those disclosures must extend to any other purpose for which online behavioral data is collected by a business’s website (e.g., market research, website analytics, website operations, fraud detection and prevention, or security).

A violation of the law can result in a civil fine of up to $2,500 per incident. The California Attorney General maintains that each noncompliant mobile app download constitutes a single violation and that each download may trigger a fine.

Given that most company websites will have California visitors, companies should consider taking the following steps to ensure compliance with the CalOPPA amendments by January 1, 2014:

  • Identify the tracking mechanisms in place on your company’s websites and online services, including (a) the specific types of PII collected by the tracking mechanism and (b) whether users have the option to control whether and how the mechanisms are used and how the website responses responds to “do not track” signals by seeking input from those familiar with your website, including (i) technicians and developers who understand the mechanics of how the website operates, including how it responds to “do not track signals,” (ii) financial and marketing personnel who understand how user PII is monetized, and (iii) any other stakeholders who access or handle user PII.
  •  Review the practices of any third parties that have the ability to track users on your website. To draft the new disclosures, you will need to understand how those third parties track your users and whether they are capable of doing so before or after the users leave your service.
  • Incorporate the information identified above to modify your online privacy policy to include the required behavioral tracking disclosures.
  • Retain the prior version of the policy in your records, including the date on which each version was posted to the site. The new version should have an updated effective date to distinguish it from the previous version.

Expansion of California’s Data Breach Notification Requirements

Under another new law taking effect on January 1, 2014, California will expand its data breach notification requirements by adding new types of information to the definition of “personal information” under California Civil Code §§ 1798.29 and 1798.82. The new law requires notification if a California resident’s personal information is compromised, and, as with CalOPPA, the breach notification requirements apply regardless of the location of the organization that sustains the breach.  Therefore, to the extent that your business collects and retains California residents’ PII, then the amended California breach notification law would apply.

Previously, the California law required notification of a data breach in the event of the unauthorized access to or disclosure of an individual’s name, in combination with that individual’s (i) Social Security number, (ii) driver’s license or California ID number, (iii) account, credit or debit card number, together with a security or access code, (iv) medical information, or (v) health information, where either the name or the other piece of information was not encrypted. Under the new definition, “personal information” will also include “[a] user name or email address, in combination with a password or security question and answer that would permit access to an online account.”

Accordingly, if your business or organization collects this type of information, then it should consider undertaking the following proactive measures to reduce the risk and magnitude of a potential data breach:

  • Periodically and systematically delete nonessential personal information. By deleting obsolete PII and other sensitive information, businesses can significantly reduce the risk of a breach.  Retaining such obsolete legacy PII serves no business purpose, but only adds unnecessary exposure and potential liability.
  • Conduct a PII inventory and perform a risk assessment of your security measures.  Identify what PII is being collected by your organization, where it is retained, who has access to the PII and  the security measures to protect the PII.  Ensuring that sufficient protections are in place may not prevent every incident, but they can reduce the possibility of an incident occurring in the first place and limit the disruption to your business if there is a breach.
  • Limit the disclosure of PII to third parties only when necessary to provide services or products. You can be equally responsible for a data breach notification if the person or entity who experiences the data breach was a third party who received PII from you. Any vendor or third party with whom you share PII should contractually represent and warrant that they have in place certain standards for protecting that information and agree to indemnify your company for any loss that results from a breach.

 

Article by:

Of:

Vedder Price

Are You Ready for the Coming Explosion of Cybersquatting?

Dickinson Wright Logo

 

The next wave of domain-name barbarians is gathering outside the gates. Here’s what you need to do now to keep your trademarks, and your e-commerce, safe.

Almost every business has had to deal with cybersquatters – pirates that launch web sites designed to divert customers by using domain names that mimic the business’s trademarks.

Until now, the war has focused primarily on domain names within the “.com” sphere. But the battlefront is about to expand – dramatically.

The international body that runs the Internet (called ICANN) has recently begun releasing new generic top-level domains (“gTLDs”). In addition to the familiar “.com,” this program makes it possible to set up a business name, a trademark, a geographic designation – virtually any word in any language – as a gTLD in its own right. Almost 2,000 applications for gTLDs were filed, and more than 1,000 will ultimately be granted. Because many of the new gTLDs will sell domain names to all comers without any attention to whether they are violative of someone else’s trademark rights, they will create a giant new arena in which domain name pirates can operate.

So what should you do now to protect your brands and your domain names?

1. Lock up the family jewels.

ICANN has mandated the creation of a Trade Mark Clearing House, in which owners can list their registered trademarks. It has also required that all newly-released gTLDs offer a 30-day “Sunrise” period in which owners of marks listed in the TMCH get first crack at registering them as domain names. In addition, during the Sunrise period and for sixty days thereafter, other parties that apply for those marks will be advised of the TMCH listing and, if they pursue their application, the owners of the TMCH-listed marks will be notified, giving them an opportunity to invoke various dispute-resolution procedures.

The Trademark Clearance House is now in operation, and it makes sense for brand owners to list at least their “core” trademarks there. These are the marks in which you have invested the most time, energy, and money; the ones most closely associated with your business; the ones you have already had to protect most often in the .com realm.

2. Plan now to make preemptive registrations in gTLDs of particular interest.

An important limitation of the Trade Mark Clearing House is that it protects only against domain names that are identical to your registered trademarks, not to common misspellings, typos, and so on. This leads to a second important step: being prepared to file preemptive domain name registrations for common variations of your brand.

Now is the time to identify specific gTLDs in which you will be especially interested in and to watch for their release dates. For instance, if you’re in the auto industry you will likely want to be active in such gTLDs as “.auto,” “.car,” and the like. As soon as the Sunrise period for one of your identified gTLDs opens, be ready to file immediately. This is an instance where the best defense is a vigorous offense.

Many brand owners were caught unawares years ago when the Internet burst upon the scene, and control of brand-related domain names became crucial. There’s no way to stop the next wave of cyberpiracy. But there’s also no reason not to be prepared for it.

Article by:

John C. Blattner

Of:

Dickinson Wright PLLC

Dark Sites Re: Secret Websites

DrinkerBiddle

 

In our modern media age, it sometimes feels as though everyone in the entire world has noticed the same thing at the same time.  So it is with the Deep Web and the darknes that lurk in the shadows – it was an obscure topic until few months ago, and now your grandparents have probably heard of them.  Once the type of thing that only geeks (like me!) would think and/or talk about, the topic has now made the front cover of Time Magazine (in a piece by legendary fantasy author and critic Lev Grossman).  It has also made national news (with the takedown of the infamous SIlk Road marketplace) and inserted itself into a far more noticeable place of prominence in our culture.

These hidden sites can be found through a collection of anonymous servers that enable a vivid underground of dissidents, hackers, criminals, law enforcement, drug runners and folks who seem like refugees from a James Bond movie.  All you need is a specialized tool like TOR, and (if you believe the stories) you can live a secret life online.  But should you care?  As a character says in one of my novels, “you may not be interested in the deep web, but the deep web is very interested in you.”

In the past when we talked with clients about the dark sites of the deep web, people really thought that it sounded like something out of a William Gibson story, like Chiba City in Neuromancer, or the Night Market in Nick Harkaway’s Angelmaker.   But now companies are suddenly finding themselves confronting deep web issues as never before, whether because someone has “doxed” their employees or executives (by releasing personally identifiable information on persistent sites that cannot be taken down), because their products are being counterfeited and distributed by online networks, because they are being defamed on chat boards that cannot be reached let alone turned off, because someone has used TOR to anonymously hack their passwords — the possibilities are endless, troubling, and happening now.  If you want to steal someone’s trade secrets and want to ensure that the transaction is untraceable, suddenly there are tools to accomplish exactly that.  If you’ve learned how to copy a product using a 3-D printer, you can distribute the plans.  If you want to cause trouble, you can hire someone directly to do that, pay them in bitcoins, and watch the damage from afar.

As a lawyer, it is impossible not to see how this is going to have a dramatic impact on IP, privacy, and nearly every other thing we do.  The Internet of Things is coming shortly (the FTC just held a workshop on the topic this week), and the facial recognition technologies and environmental advertising predicted in Minority Report are no longer futuristic fictions.  3-D and electronic printing promises to give ever smaller groups the ability to make things based on electronic schematics without access to heavy industry.  More and more information will be available about more people, and will be available to more people – and the fact that there are genuinely secure ways where those who are so inclined can use that data for criminal purposes should give everyone pause.

To be sure, all of this seems rather abstract, and it can sound like a tabloid scare tactic.  But there are some things that everyone can do to deal with the risks in their own lives.  First, engage in some data security hygiene: change your passwords regularly, don’t pass them out, don’t allow them to be easily engineered by people who know a few random facts about you.  Second, think about whether you are in a business where people will want to copy your products, will want to pretend to be you, will want to steal your information.  If you are that type of business, it is worth checking from time to time to see if you have been targeted.  And finally, as always, if is critical that everyone in this day and age try to stay abreast of what is happening in the world of tech – it is easy to assume that because you make donuts, or own a small clothing store, or manage a bank, or run a hedge fund, that you don’t need to know about the cutting edge developments coming down the pipe.  But you do.  The time when you could just stick to your knitting and ignore the tech world is past, and you need to assume that the tech world is very interested in you, indeed.

Article by:

Darren S. Cahr

Of:

Drinker Biddle & Reath LLP

Food and Drug Administration (FDA) Guidance for Industry and FDA Staff: Mobile Medical Applications

GT Law

 

On September 25, 2013, the Food and Drug Administration (the “FDA”) released final guidance on the regulatory requirements regarding the introduction of mobile medical applications into the marketplace (the “Final Guidance”).  The purpose of the Final Guidance and its Appendices is to assist manufacturers with determining if a product is a mobile medical app and if so the FDA’s expectations for that product.  This Alert summarizes some the key components of the Final Guidance.

I. Summary of the Guidance

This Final Guidance informs manufacturers, distributors and other entities on how the FDA intends to apply its regulatory authorities to select software applications intended for use on mobile platforms (mobile applications).1   Some mobile applications may meet the definition of a medical device under section 201 of the Federal Food, Drug, and Cosmetic Act (FD&C Act)), but because some may pose a lower risk to the public, FDA intends to exercise enforcement discretion.  A majority of mobile applications either do not meet the definition of the FD&C Act or are in a category where the FDA intends to exercise enforcement discretion.

The FDA intends to apply its regulatory oversight on those mobile applications that are medical devices and whose functionality could post a risk to a patient’s safety if the mobile application does not function appropriately.  The Final Guidance is intended to provide clarity and predictability for manufacturers of these mobile applications.

The Final Guidance provides lengthy definitions of the following terms:

  • Mobile Platform
  • Mobile Application
  • Mobile Medical Application
  • Regulated Medical Device
  • Mobile Medical App Manufacturer

The above-referenced definitions can be found in the full guidance.

II. Scope

The Final Guidance explains the FDA’s intent—to focus its oversight on a segment of mobile apps.

III. Regulatory Approach for Mobile Medical Apps

The FDA intends to apply its regulatory oversight to only those mobile apps that are (1) medical devices; and (2) whose functionality could pose a risk to a patient’s safety if the mobile app were to not function as intended. The FDA believes that if it fails to function as intended, this subset of mobile medical apps poses potential risks to the public health as currently regulated devices. The FDA strongly recommends that manufacturers who fall within the scope of this guidance follow the Quality System2  regulation (which includes good manufacturing practices) in the design and development of their mobile medical apps and initiate prompt corrections to their mobile medical apps, when appropriate, to prevent patient and user harm. Manufacturers of mobile medical apps must meet the requirements associated with the applicable device classification.

A. Mobile medical apps: Subset of mobile apps that are the focus of the FDA’s regulatory oversight

The FDA currently intends to apply its regulatory oversight to only the subset of mobile apps.3   Of major importance, mobile apps can transform a mobile platform into a regulated medical device by using attachments, display screens, sensors, or other such methods. In spite of the transformation, FDA considers such mobile apps to be mobile medical apps.

The following are mobile apps that the FDA considers to be mobile medical apps that are subject to regulatory oversight:

  • Mobile apps that are an extension of one or more medical devices by connecting4  to such device(s) for purposes of controlling5  the device(s) or displaying, storing, analyzing, or transmitting patient-specific medical device data.
  • Mobile apps that transform the mobile platform into a regulated medical device by using attachments, display screens, or sensors or by including functionalities similar to those of currently regulated medical devices. Mobile apps that use attachments, display screens, sensors or other such similar components to transform a mobile platform into a regulated medical device are required to comply with the device classification associated with the transformed platform.
  • Mobile apps that become a regulated medical device (software) by performing patient-specific analysis and providing patient-specific diagnosis, or treatment recommendations. These types of mobile medical apps are similar to or perform the same function as those types of software devices that have been previously cleared or approved.

B. Mobile Apps for which the FDA intends to exercise enforcement discretion (meaning that FDA does not intend to enforce requirements under the FD&C Act)

The Final Guidance illustrates the FDA’s exercise of enforcement discretion for mobile apps that: (i) Help patients (i.e., users) self-manage their disease or conditions without providing specific treatment or treatment suggestions; (ii) Provide patients with simple tools to organize and track their health information; (iii) Provide easy access to information related to patients’ health conditions or treatments; (iv) Help patients document, show, or communicate potential medical conditions to health care providers; (v) Automate simple tasks for health care providers; or (vi) Enable patients or providers to interact with Personal Health Record (“PHR”) or Electronic Health Record (“EHR”) systems.

It is important to note that some mobile apps listed above and below may be considered mobile medical apps, and others might not.

The following examples represent mobile apps for which the FDA intends to exercise enforcement discretion:

  • Mobile apps that provide or facilitate supplemental clinical care, by coaching or prompting, to help patients manage their health in their daily environment.
  • Mobile apps that provide patients with simple tools to organize and track their health information.
  • Mobile apps that provide easy access to information related to patients’ health conditions or treatments (beyond providing an electronic “copy” of a medical reference).
  • Mobile apps that are specifically marketed to help patients document, show, or communicate to providers potential medical conditions.
  • Mobile apps that perform simple calculations routinely used in clinical practice.
  • Mobile apps that enable individuals to interact with PHR systems or EHR systems.

IV. Regulatory Requirements

Manufacturers of mobile medical apps are subject to the requirements described in the applicable device classification regulation.6

Our team will continue to provide you with updated information on various aspects of this Final Guidance.


1 While many have suggested that this guidance provides similar views on software, the Agency has taken a more formalized position on certain software requirements and the classification of such products.  For example, the FDA has previously clarified that when stand-alone software is used to analyze medical device data, it has traditionally been regulated as an accessory to a medical device or as medical device software.  Medical Devices; Medical Device Data Systems Final Rule (76 FR 8637) (Feb. 15, 2011).

2 See 21 CFR part 820.

3 See Appendix C.

To meet this criterion, the mobile medical apps need not be physically connected to the regulated medical device (i.e. the connection can be wired or wireless).

Controlling the intended use, function, modes, or energy source of the connected medical device.

6 Class I devices: General Controls, including:

  • Establishment registration, and Medical Device listing (21 CFR Part 807);
  • Quality System (QS) regulation (21 CFR Part 820);
  • Labeling requirements (21 CFR Part 801);
  • Medical Device Reporting (21 CFR Part 803);
  • Premarket notification (21 CFR Part 807);
  • Reporting Corrections and Removals (21 CFR Part 806); and
  • Investigational Device Exemption (IDE) requirements for clinical studies of investigational devices (21 CFR Part 812).

Class II devices: General Controls (as described for Class I), Special Controls, and (for most Class II devices) Premarket Notification.

Class III devices: General Controls (as described for Class I), and Premarket Approval (21 CFR Part 814).

 

Article by:

Of:

Greenberg Traurig, LLP

National Labor Relations Board (NLRB) Judge Gives a “Like” to Facebook-Related Termination

Barnes & Thornburg

National Labor Relations Board (NLRB) Administrative Law Judge Jay R. Pollack recommended the dismissal of a complaint involving the termination of two former employees of the Richmond District Neighborhood Center, a non-profit organization in the San Francisco Bay Area that runs community programs including after-school and summer programs for youth.

facebook social media NLRB

The decision is all the more surprising because Judge Pollack agreed with the General Counsel that the employees at issue were engaged in protected concerted activity in complaining about their employer on Facebook; yet he found that some of the actions described by the employees (including having “crazy events [without] permission,” “do[ing] cool [expletive] and let[ting] [the employer] figure it out,” “playing loud music and get[ting] graffiti artists to place graffiti on the walls,” and hav[ing] clubs and tak[ing] the kids”) in their Facebook conversations were not protected. Accordingly, the Judge found that the employer could lawfully find that the employees conduct was not protected and that they were unfit for further service.

While this decision shows that not all social-media misconduct must be tolerated by employers, it is important for employers dealing with these types of issues to contact competent labor and employment counsel prior to making any termination decisions involving social media, as defending against an action of this nature before the NLRB can be costly.

Article by:

Of:

Barnes & Thornburg LLP

 

How Lawyers Can Leverage LinkedIn to Build Their Practice, Part 2 of 2

The Rainmaker Institute mini logo (1)

 

Continuing from our previous post, here are 5 more tips for leveraging LinkedIn to build your client and referral base:

5Include All Your Web Links. You can add up to three links to your firm’s websites. There are default settings, but these are also customizable. So instead of www.TheRainmakerInstitute.com, I customized it to say “law firm marketing experts”, but it still links to my website. This is another place where you should use your keywords like: “Scottsdale bankruptcy attorney” or “Chicago divorce lawyer” and link it to your website, blog or even your Facebook fan page.

6. Make Your Profile Public. Remember, it’s called “social media” for a reason—you need to be social. Be sure to make your LinkedIn profile “public”, which means all the information you put in it is available to search engines to make it easier for people to find and connect with you.

7. Don’t Use The Same Copy For Your Summary As Your Bio. The summary is not a place to talk about all the things you have done in your life. This is the place to position yourself as the go-to attorney in your particular practice area and geographical region.

8. Use LinkedIn Groups. LinkedIn Groups can be a very effective way to increase your visibility among niche audiences, like your target market. It takes a little while to get used to how this works. I recommend you start by ‘listening’ before diving in. There are some places you should start with, such as alumni groups and groups in the industry segments you follow. We run several LinkedIn groups you can join for free including: Phoenix Arizona Attorneys, Personal Injury Attorney Network and the Rainmaker Law Firm Marketing Group. Simply log into your LinkedIn account and search under groups. Once you understand how groups work, start your own focusing on your target market or potential referral sources (like CPAs, financial advisors or business brokers).

9Add LinkedIn To Your Email Signature. Most attorneys put their contact information in their email signature; add a link to your LinkedIn account. Here’s mine: http://Rainmaker.MyLinkInvitation.com. I would welcome the opportunity to connect with you on LinkedIn.

LinkedIn Logo

As soon as you start networking with LinkedIn, you increase your chances of reaching new clients and referral partners. However, be prepared, and be willing to work at it. This is not something you can “set and forget”.

If you’re not into social media or can’t make the commitment to put in the time and effort to network in several sites at the same time, this is the ONE social media site you should focus on. You may not see it at first, but with the combined use of the strategies and tips I have shared here, you will start to see your online network mature over time, leading to more prospects and referral partner relationships.

To read Part One – Click Here

Article by:

Stephen Fairley

Of:

The Rainmaker Institute

10 DOs and DON’Ts for Employer Social Media Policies

Odin-Feldman-Pittleman-logo

In recent years, the National Labor Relations Board has actively applied the National Labor Relations Act to social media policies. The Act exists to protect employees’ right to act together to address their terms and conditions of employment. What many employers fail to realize is that the Act applies to union and non-unionized employers. With the Board’s increased scrutiny of social media policies, including review of non-unionized employers’ policies, the following list of dos and don’ts is meant to assist employers in drafting or reviewing their social media policies.

1. DON’T have a policy prohibiting an employee from releasing confidential information. The Board has found that such an overbroad provision would be construed by employees as prohibiting them from discussing information that could relate to their terms and conditions of employment, such as wages.

2. DO have a policy that advises employees to maintain the confidentiality of the employer’s trade secrets and private or confidential information. The Board advises employers to define and provide examples of trade secrets or confidential information. However, the Board cautions employers to consider whether their definition of trade secrets or confidential information would include information related to employees’ terms and conditions of employment.

3. DON’T have a policy prohibiting employees from commenting on any legal matters, including pending litigation. The Board found that such a policy would unlawfully prohibit discussion about potential legal claims against an employer.

4. DO have a policy prohibiting employees from posting attorney-client privileged information. The Board recognizes an employer’s interest in protecting privileged information.

5. DON’T have a policy prohibiting employees from making disparaging remarks about the employer. The Board held that such a policy would have a chilling effect on employees in the exercise of their rights to discuss their terms and conditions of employment.

6. DO have policy that prohibits employees from making defamatory statements on social media about the employer, customers, and vendors, and generally remind employees to be honest and accurate.

7. DON’T have a policy advising employees to check with the company to see if the post is acceptable, if the employee has any doubt about whether it is prohibited. The Board held that any rule that requires permission from the employer as a precondition is an unlawful restriction of the employee’s rights under the Act.

8. DO have a policy that prohibits employees from representing any opinion or statement as the policy or view of the employer without prior authorization. Advise employees to include a disclaimer such as “The postings on this site are my own and do not necessarily reflect the views of the [Employer].”

9. DON’T have a policy prohibiting negative conversations about co-workers or supervisors. The Board held that without further clarification or examples, such a policy would have a chilling effect on employees.

10. DO advise employees to avoid posts that reasonably could be viewed as malicious, obscene, threatening or intimidating, or might constitute harassment or bullying. Provide examples of such conduct such as offensive posts intentionally mean to harm someone’s reputation or posts that could contribute to a hostile work environment on the basis of a race, sex, disability, religion or any other status protected by applicable state or federal law.

Read more: http://ecommercelaw.typepad.com/ecommerce_law/2013/10/ten-dos-and-donts-of-employer-social-media-policies.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+E-commerceLaw+%28E-Commerce+Law%29#ixzz2ir3v2KvK

Article By:

 of

Federal Court Narrows Claims Surrounding “HAPPY BIRTHDAY TO YOU” Copyright Suit

MintzLogo2010_Black

Following up on a previous post regarding the lawsuit winding its way through federal court seeking clarity on whether the music publisher Warner Chappell owns or has the exclusive right to license the copyright in the ubiquitous “Happy Birthday to You” song, U.S. District Judge George H. King (Central District of California) has ordered that certain tangential claims be stayed until further notice, while the case will move forward on the central claim, essentially whether Warner’s copyright in the song is valid and enforceable or not.

Judge King’s order confirms the parties’ agreement at an October 7th hearing to bifurcate (separate) the central claim from the remaining claims (seeking an injunction against Warner, and a variety of related claims such as unfair competition, false advertising, and breach of contract) at least through the summary judgment phase of the central claim.  The central claim alone will proceed for the time being allowing the parties and the Court to focus on what is truly the dominating question in this case.

In his order Judge King also declined to apply a four-year statute of limitations to the central claim instead of the traditional copyright infringement three-year period.  Plaintiffs claimed that unlike a traditional copyright infringement action where a plaintiff alleges a defendant infringed its copyright, this is a “declaratory judgment” action involving a copyright, that is to say one where plaintiffs are preemptively bringing suit so the Court can decide whether Warner even has rights it can assert.  Basically instead of asserting its purported rights, Warner is being forced into a suit to defend its rights.  Despite the procedural change however, the analysis and issues are very similar to a traditional copyright infringement action.  The question Judge King has to resolve was, since the Declaratory Judgment Act (which permits this type of suit) does not contain its own statute of limitations, plaintiffs argued that the Court should instead use the four-year period applicable to California’s unfair competition claims (one of those ancillary claims Judge King stayed in this same order).  Judge King declined, holding that because the Declaratory Judgment Act is merely a procedural vehicle and the substantive rights being challenged are copyright-based under the Copyright Act, the best statute of limitations period is not California’s four-year period, but rather the Copyright Act’s three-year period.  He therefore dismissed two plaintiffs whose claims were time-barred by the new shorter period and gave them three weeks to re-file if they can/chose to.

Judge King’s order is clearly going to focus the parties and the court on the central issue, whether Warner has a valid enforceable copyright in the “Happy Birthday to You” song.  We will continue to closely watch this one as it proceeds.

Article By:

 of