Growing Client Accounts With Tablet Apps (TBC)

phones, multiple

“We Need An App!” This has been a consistent cry from partners in law firms around the world over the past few years. Unfortunately those who were tasked with this jumped a little too quickly without understanding their audience and the purpose of an app. In most cases, apps were built that essentially reflected content that could be found on the corporate website and were launched in haste – without being updated regularly or adding any value. These apps were not ‘sticky’ and gave the target audience little reason to return. The results of these experiments were costly apps that failed to truly connect with the targeted audience. As business development tools these were a fail, but at least these initiatives were a start in exploring how firms can adopt mobile as tool and channel. But how can law firms harness the power of the tablet?

The growth in tablet technology for the enterprise is truly explosive. Research by digital ad agency Vertic, predicts enterprise tablet adoption will grow by almost 50% per year and by 2015 mobile app development projects will outnumber native PC projects by a ratio of 4-to-1! These are facts that can’t be ignored by professional services firms and mobile is now well and truly on the agenda. However, most firms’ initial mobile strategies have been focused on client adoption, when the focus should be business adoption. Your most captive and receptive audience is your own workforce, let’s equip them with mobile tools that empower them to engage effectively with clients and generate new revenue opportunities.

Law firms produce substantial amounts of marketing and business development collateral but much of it is inaccessible, out of date or not in easily consumed formats. Tablet technology is rapidly changing how proprietary marketing and business development content is shared and leveraged to internal and external audiences.

Forward thinking firms have recognized this and are placing mobile high on the agenda and revising their strategies, or formulating one if they haven’t before. One part of the puzzle is the device strategy – how to secure, deploy and manage smartphones and tablets (both personal and firm-owned devices). The other piece is the application strategy – deciding on the enterprise apps that are most relevant for achieving the firm’s objectives and what mobile platforms these need to cater for (iOS, Blackberry, Android etc.). IT teams will push for firms to adopt enterprise apps that mobilize internal processes and improving efficiencies. However, there should be a higher priority whilst the competitive window is open, which is using enterprise tablet apps as tools for growing client accounts and acquiring new clients. We are calling this ‘business development enablement’.

In the age of the internet, most firm-wide marketing collateral is stored as electronic files in difficult to access and immobilized intranets or file storage systems. These are hardly encouraging for an attorney who is trying to prepare and rally their team for a big business development meeting with a key client. If they are out of the office it is even more difficult to access and share the right information. Many still use their own personal decks or carry with them the printed materials that the firm has produced –  which is often out of date the day. Even though many partners prefer print, they are high cost and low usage, or ‘low viewage’ to be more accurate. Your target audiences are now much more likely to consume content on a mobile device than print. Your firm’s business development and marketing content – brochures, case studies, client briefings, press releases and deal memorandums– must be mobilized. Fee earners need to be able to access collateral quickly and easily on the devices where they are both consuming and sharing marketing content.

So why should your firm deploy an enterprise tablet apps for marketing and business development enablement?

Fee earners can access knowledge outside their area of expertise

Most fee earners are experts in a particular area of the law and may not be able to confidently convey the firm’s experience or track record in other areas, where potential opportunities may arise within an existing client. A tablet app empowers a fee earner to quickly access relevant collateral with a couple of swipes, so opportunities are captured at the time they arise.

Have everyone singing from the same hymn sheet

Using a centrally managed and distributed app ensures the whole client facing organization is using consistent and up-to-date collateral that has been made available by marketing, business development and knowledge teams.

A Branded Experience

Your firm-branded app will produce a positive and focused brand experience for both user and client. An app is a concentrated place with no distractions and also brings stagnant collateral to life by giving it an extra dimension that cannot be achieved using printed or static web pages.

Access marketing or business development collateral, anywhere, any time

An enterprise app for business development can store and present any digital asset that the firm has produced. Documents, presentations, video and audio can all be consumed, shared and even presented over a coffee or on a screen, in a client-facing meeting. A tablet enterprise app with a well design user experiences also requires little or no training for fee earners and business development teams, meaning user adoption is rapid.

Collaboration around clients, matters and opportunities

Apps can be rolled out to multiple devices across the firm, allowing fee earners and business development teams to all share and collaborate around client meetings and opportunities.

Gain a competitive advantage through innovation

Impression is everything. Using the latest mobile technology and software can enhance the face-to-face engagement with a client or prospect and subsequently improves the perception of, not just the individual expert, but the firm itself. Even though a firm’s reputation may rely on history, using a tablet and enterprise app to market, demonstrates that a firm is progressive, innovative and employing technology to deliver results.

Are you behind or ahead?

There is a vast contrast between where law firm are with their mobile strategy. One major  AMLAW 100 firm purchased iPads for its entire 1,000 strong workforce back in 2011. This was bold move back then but this was real foresight, as the firm now understands the usage of these devices for the enterprise, and not to just be more efficient, but to consume and share information and knowledge both internally and externally. For those of you who are reading this and are a little concerned that your firm is behind in its pursuit of mobile, consider this – I met with a senior marketing executive of a Global AMLaw20 firm in the latter half of 2012. When I asked if they were considering their mobile strategy, I was told in no uncertain terms “that we are at least three years away from looking into mobile”.

Article By:

 of

The New Generic Top-Level Domains and the New Trademark Clearinghouse: Deciding Whether to Register Your Brands

Mintz Logo

The Internet Corporation for Assigned Names and Numbers (“ICANN”) is the organization that oversees domain names worldwide.  It recently began accepting new applications for expanding the number of generic top-level domains (“gTLDs”) on the Internet. The most popular gTLDs until now have included .com, .info, .org, and .net. With the approval of applications for new gTLDs will come an unlimited number of new opportunities on the Internet for entrepreneurs of all types, including trademark infringers. Thus, trademark owners must make some decisons on how to address this new threat. One possibility is the new Trademark Clearinghouse.

ICANN created the Trademark Clearinghouse (“Clearinghouse”),  which went live on March 26, 2013, in an effort to help trademark owners protect their brands in the midst of this expansion of available gTLDs.  Trademark owners who record their marks with the Clearinghouse under the relevant procedures are entitled to: (1) first priority in registering their recorded marks as second-level domain names under the new gTLDs during the “sunrise” period (which will vary by gTLD but will be at least 30 days before the general public would be permitted to do so), and (2)  receipt of notification when a domain has been registered under any new gTLD that matches the trademark owner’s recorded mark. The ICANN filing fee to record a trademark in the Clearinghouse is $150 (US) for one year, $435 for three years, and $725 for five years.

There is no deadline for recording a trademark with the Clearinghouse, but there are advantages to doing so during the “sunrise” periods. As stated above, recordation during this period provides trademark holders with advanced opportunities to obtain a second-level domain name under one of the new gTLDs before registration is open to the general public, e.g., twinkies.food. In addition, during the “trademark claims period,” which will run for at least 90 days after the initial operating period for general domain name registration under a new gTLD, those seeking registration of a domain name that matches a recorded trademark will be notified of the existence of the recorded mark. There is no mechanism in place which will automatically prevent the registration of a domain name matching a recorded trademark. Thus, although someone seeking to register a domain name which matches a recorded trademark may be notified about the existence of the recorded mark, that someone may still register that domain. Should this happen, the owner of the recorded trademark will be notified of the registration and will then have to make a unilateral decision on what action to take, if any, against the registered domain.

For those who have recorded their marks at the Clearinghouse, ICANN provides two global rights protection mechanisms for dealing with allegedly improper domain registrations: (1) the Uniform Domain Name Dispute Resolution Policy, and (2)  Uniform Rapid Suspension. Each mechanism operates in a slightly different manner.

Since neither recordation with the Clearinghouse nor any other ICANN procedure actually stops registration of a domain name which matches a recorded trademark, reaction by trademark owners to the Clearinghouse has been mixed. Accordingly, each trademark owner will have to engage in its own cost/benefit analysis and weigh the pros and cons of this new system in deciding whether to record any, all, or some of its trademarks.

Federal Circuit Fails to Clarify Software Patent Eligibility

Neal Gerber

In a highly-anticipated decision that was expected to clarify the test for eligibility of software patents under 35 U.S.C. § 101, in CLS Bank Int’l v. Alice Corp.,1 a divided en banc panel of the Federal Circuit upheld the lower court’s determination that the asserted method, computer-readable medium, and system claims are invalid. In doing so, however, the Federal Circuit further muddied the waters, “propound[ing] at least three incompatible standards, devoid of consensus, serving simply to add to the unreliability and cost of the system of patents as an incentive of innovation.”2 In sorting through the 135 pages of seven different opinions in this decision, at least a few takeaways include: (1) the future of software patents remains uncertain for the time being; (2) until further development, the outcomes of future Federal Circuit cases regarding software patents will vary greatly based on the specific judicial panels deciding the cases; and (3) for now, parties filing and enforcing software patents should consider focusing their subject matter more heavily on system claims and the hardware used in those systems.

Background

At issue were patents directed to “a computerized trading platform used for conducting financial transactions in which a third party settles obligations between a first and a second party so as to eliminate . . . ‘settlement’ risk.”3 Certain of the asserted claims “recite methods of exchanging obligations between parties,” others “are drawn to data processing systems,” and others are directed to “computer-readable media containing a program code for directing an exchange of obligations.”4

CLS Bank filed suit in the United States District Court for the District of Columbia against patent owner Alice Corp. seeking, in pertinent part, a declaratory judgment of patent invalidity under 35 U.S.C. § 101.5 The District Court granted summary judgment that the asserted claims are invalid as being directed to ineligible subject matter (i.e., an abstract idea).6 Alice Corp. appealed to the Federal Circuit, and a three-judge panel reversed the District Court and found all of the asserted claims to be patent eligible.7 The Federal Circuit granted CLS Bank’s petition for rehearing en banc.8

The En Banc Decision

In a one paragraph per curiam opinion, a majority of the en banc panel affirmed the District Court’s holding that the asserted method and computer-readable medium claims are ineligible and invalid under § 101, and because a majority could not be reached with respect to the asserted system claims, the District Court’s determination regarding those claims remained intact, rendering the asserted system claims ineligible and invalid under § 101 as well.9

None of the six remaining opinions garnered a majority of six of the ten judges that sat on the en banc panel.10Accordingly, as best stated by Chief Judge Rader, “though much is published today discussing the proper approach to the patent eligibility inquiry, nothing said today beyond our judgment has the weight of precedent.”11 Thus, the precedential effect of the Federal Circuit’s decision is limited to the asserted claims, with the remaining opinions simply providing insight into the Judges’ different, conflicting proposed approaches to determining patent eligibility.12

Judge Lourie Requires an Inventive Concept

Judge Lourie, joined by four panel members, advocated that a claim embodying an abstract idea is patent eligible under § 101 if that claim includes “additional substantive limitations”—which Judge Lourie termed an “inventive concept”—“that narrow, confine, or otherwise tie down the claim so that, in practical terms, it does not cover the full abstract idea itself.”13In other words, according to Judge Lourie, if a claim includes elements embodying an abstract idea, additional elements of the claim (i.e., those elements not embodying the abstract idea) must include an “inventive concept” for the claim to be patent eligible. With respect to claim directed to computer-implemented inventions, Judge Lourie asserted that “appending generic computer functionality to lend speed or efficiency to the performance of an . . . abstract concept does not meaningfully limit the claim scope for purposes of patentability. . . . [T]he requirement for computer participation . . . fails to supply an ‘inventive concept.’”14

Applying this approach to the asserted claims, Judge Lourie opined that the claims embodied “the abstract idea of reducing settlement risk by effecting trades through a third-party intermediary . . . empowered to verify that both parties can fulfill their obligations before allowing the exchange—i.e., a form of escrow.”15 He found that none of the elements of any of the claims in addition to those embodying the alleged abstract idea, including the structural elements of the system claims,16 include an “inventive concept,” and found all of the asserted claims to be ineligible and invalid under § 10117. Regarding the inclusion of computer functionality in the claims, Judge Lourie stated that “adding generic computer functions to facilitate performance provides no substantial limitation and therefore is not ‘enough’ to satisfy § 101.”18Judge Lourie largely disregarded the format of the claims (i.e., whether the claims were drawn to methods, computer-readable media, or systems), opining that “when § 101 issues arise, the same analysis should apply regardless of claim format.”19

Chief Judge Rader Focuses on Meaningful Limitations

Chief Judge Rader, joined in full by one panel member20 and in part by two other panel members,21 disagreed with Judge Lourie’s requirement of an “inventive concept,”22 and instead advocated that a claim embodying an abstract idea is patent eligible under § 101 if that claim includes “limitations that meaningfully tie that [abstract] idea to a concrete reality or actual application of that idea.”23 With respect to a claim directed to a computer-implemented invention, Chief Judge Rader opined that the claim is patent eligible “where the claim is tied to a computer in such a way that the computer plays a meaningful role in the performance of the claimed invention, and the claim does not pre-empt virtually all uses of an underlying abstract idea.”24

Applying this approach to the asserted system claims, Chief Judge Rader found the system claims to be patent eligible, stating that “the claim covers the use of a computer and other hardware specifically programed to solve a complex problem. . . . The specific functions recited in these claims, which are integral to performing the invention, show that the . . . claims are directed to practical applications of the underlying idea and thus are patent-eligible.”25 Chief Judge Rader stated that the specification “explains implementation of the recited special purpose computer system” and “includes numerous flowcharts that provide algorithm support for the functions recited in the claims,” concluding that “[l]abeling this system claim an ‘abstract concept’ wrenches all meaning from those words, and turns a narrow exception into one which may swallow the expansive rule (and with it much of the investment and innovation in software).”26

Turning to the asserted method claims, Chief Judge Rader stated that the claims embody the abstract idea “of using a neutral intermediary in exchange transactions to reduce risk that one party will not honor the deal, i.e., escrow management.”27 He found the asserted method claims to be ineligible and invalid under § 101 because the recited steps were “inherent in an escrow and claimed at a high level of generality” and did not add any meaningful limitations to the claims.28 Because Alice Corp. conceded that the method claims and the computer-readable medium claims rise or fall together, Chief Judge Rader also found that the asserted computer-readable medium claims were ineligible and invalid under § 101.29

Judge Newman Defers to the Plain Language of the Statute

Judge Newman would abolish the judicially-created exceptions to § 101, and advocated that the Federal Circuit “abandon its failed section 101 ventures into abstraction, preemption, and meaningfulness,” and find that a claim is patent eligible if “the subject matter is within the statutory classes in section 101.”30 In other words, under Judge Newman’s approach, a claim is patent eligible if that claim recites a “process, machine, manufacture, or composition of matter,”31 and “claims that are ‘abstract’ or ‘preemptive’“ will be “eliminate[d] . . . on application of the laws of novelty, utility, prior art, obviousness, description, enablement, and specificity.”32 Applying this approach to the asserted claims, Judge Newman found all of the claims to be patent eligible.33 Judge Newman also called for the Federal Circuit to confirm a right of “experimental use of patented information,” which she believes would render it “no longer . . . necessary to resort to the gambit of treating such information as an ‘abstraction’ in order to liberate the subject matter for experimentation.”34

Interestingly, Chief Judge Rader, in his separately-filed additional reflections, seemed to agree with Judge Newman’s adherence to the plain language of the statute, stating: “I doubt innovation is promoted when subjective and empty words like ‘contribution’ or ‘inventiveness’ are offered up by the courts to determine investment, resource allocation, and business decisions. . . . [W]hen all else fails, it makes sense to consult the simplicity, clarity, and directness of the statute.”35

Judge Linn Calls for Congressional Action

Judge Linn addressed the concerns expressed by various Amici “regarding the proliferation and aggressive enforcement of low quality software patents,” opining that “broadening what is a narrow exception to the statutory definition of patent eligibility should not be the vehicle to address these concerns.”36 Rather, Judge Linn called for legislative action, asserting that “Congress can, and perhaps should, develop special rules for software patents.”

A Divided Majority Believes that the Asserted Claims Should Rise or Fall Together

As noted by Judge Lourie, a majority of the en banc panel agreed that, under the particular facts of this case, the asserted method, computer-readable medium, and system claims should rise or fall together. It is important to note, however, that the majority did not agree on why all of the asserted claims should rise or fall together.38 Judge Lourie and those joining his concurring opinion believed that the asserted claims should rise or fall together because they all fail to satisfy his inventive concept test. Judge Linn and Judge O’Malley, on the other hand, believed that the asserted claims should rise or fall together because, based on the record, all of the claims “are grounded by the same meaningful limitations that render them patent eligible.”39 Finally, Judge Newman simply stated that “patent eligibility does not depend on the form of the claim.”40 Since the majority did not agree on why all of the asserted claims should rise or fall together, the fact that they agreed that the claims should rise or fall together in this particular case has no precedential effect.

Implications

At the outset, it is important to note that Alice Corp. will almost certainly ask the Supreme Court to hear the case. The combination of the divided nature of this en banc decision, the arguably incompatible Federal Circuit precedent regarding § 101, and the potential impact on the patent system makes it likely that the Supreme Court will hear the case to (hopefully) provide clarity to courts, patent owners, and inventors. Judge Moore aptly summarized the potential impact of this case: “If the reasoning of Judge Lourie’s opinion were adopted, it would decimate the electronics and software industries. . . . There has never been a case which could do more damage to the patent system than this one.”41

In the meantime, during this period of uncertainty, when preparing a patent application directed to an invention implemented in software, the applicant should consider including as much computer hardware as possible in the specification (including the claims) without unduly limiting the invention, and then tying the central software steps and functionality of the invention to those hardware elements. The applicant should also consider including system claims that include the hardware elements and how they interact to perform the software functions within the central portions of the claims.

Additionally, a patentee asserting claims directed to software during litigation should consider only asserting system claims. Although the majority did not agree on the reason why the asserted claims should rise or fall together in this particular case (robbing the decision of any precedential effect), the majority nevertheless appears to believe that claims should rise or fall together. Since method and computer-readable medium claims are more likely to be found invalid than system claims according to this decision, a patentee may not want to risk system claims being found invalid simply because corresponding method and/or computer-readable medium claims are found invalid.


No. 2011-1301, slip op. at 6–7 (Fed. Cir. May 10, 2013) (per curiam). 

Id. at 1–2 (Newman, J., concurring-in-part and dissenting-in-part). 

Id. at 2–3 (Lourie, J., concurring) (citing CLS Bank Int’l v. Alice Corp., 768 F. Supp. 2d 221, 224 (D.D.C. 2011)). 

Id. at 3–4. 

Id. at 4 (Rader, C.J., concurring-in-part and dissenting-in-part) (citing CLS Bank Int’l, 768 F. Supp. 2d at 221). 

Id.

Id. 

The Federal Circuit granted the petition for rehearing en banc to address the following two questions:

a.     What test should the court adopt to determine whether a computer-implemented invention is a patent ineligible “abstract idea”; and when, if ever, does the presence of a computer in a claim lend patent eligibility to an otherwise patent-ineligible idea?

        b.     In assessing patent eligibility under 35 U.S.C. § 101 of a computer-implemented invention, should it matter whether the invention is claimed as a method, system, or storage medium; and should such claims at all times be considered equivalent for § 101 purposes?
Id. at 4 (quoting CLS Bank Int’l v. Alice Corp., 484 F. App’x. 559 (Fed. Cir. 2012)). 

Id. at 6–7 (per curiam). Chief Judge Rader, Judge Dyk, Judge Lourie, Judge Moore, Judge Prost, Judge Reyna, and Judge Wallach determined that the asserted method and computer-readable medium claims are ineligible and invalid under § 101. Judge Dyk, Judge Lourie, Judge Prost, Judge Reyna, and Judge Wallach found that the asserted system claims are ineligible and invalid under § 101, while Chief Judge Rader, Judge Linn, Judge Moore, Judge Newman, and Judge O’Malley determined that the asserted system claims are patent eligible. 

10 Judge Taranto did not participate in the decision. Id. at 6. 

11 Id. at 1–2 n.1 (Rader, C.J., concurring-in-part and dissenting-in-part) (emphasis added). 

12 Note that Chief Judge Rader wrote separately to express his dismay at the outcome. Id. (Rader, C.J., additional reflections).

13 Id. at 17–22 (Lourie, J., concurring). Judges Dyk, Prost, Reyna, and Wallach joined Judge Lourie’s opinion. 

14 Id. at 27. 

15 Id. at 25. 

16 Id. at 34 (The “tangible devices . . . , including at least ‘a computer’ and ‘a data storage unit’” recited in the claims “cannot support any meaningful distinction from the computer-based limitations that failed to supply an ‘inventive concept’ to the related method claims.”). 

17 Id. at 26–29, 31, 36. 

18 Id. at 28. 

19 Id. at 33. 

20 Judge Moore filed a separate dissenting-in-part opinion, joined by Chief Judge Rader and Judges Linn and O’Malley, “to explain why the system claims at issue are directed to patent eligible subject matter.” Id. at 4 (Moore, J., dissenting-in-part). 

21 Judges Linn and O’Malley did not join in the portion of Chief Judge Rader’s opinion that found the asserted method and computer-readable medium claims to be ineligible and invalid under § 101. Id. at 1–2 (Linn, J., dissenting). Judge Linn filed a separate dissenting opinion, joined by Judge O’Malley, that found the asserted method and computer-readable medium claims to be patent eligible. Id. at 11–12. 

22 Id. at 5–11, 22 n.5 (Rader, C.J., concurring-in-part and dissenting-in-part). 

23 Id. at 16. 

24 Id. at 22. 

25 Id. at 31, 35. 

26 Id. at 31–32, 34. 

27 Id. at 39–40. 

28 Id. at 40–42. 

29 Id. at 39, 42. 

30 Id. at 11–13 (Newman, J., concurring-in-part and dissenting-in-part). 

31 35 U.S.C. § 101. 

32 CLS Bank Int’l, No. 2011-1301, slip op. at 4 (Newman, J., concurring-in-part and dissenting-in-part). 

33 Id. at 14. 

34 Id. at 9–10. 

35 Id. at 5 (Rader, C.J., additional reflections). 

36 Id. at 12–13 (Linn, J., dissenting). 

37 Id. at 13. 

38 Id. at 2 n.1 (Lourie, J., concurring). 

39 Id. at 1–2 (Linn, J., dissenting). 

40 Id. at 4 (Newman, J., concurring-in-part and dissenting-in-part). 

41 Id. at 2–3 n.1 (Moore, J., dissenting-in-part). Judge Moore explicitly requested that the Supreme Court provide guidance on this issue: “It has been a very long time indeed since the Supreme Court has taken a case which contains patent eligible claims. This case presents the opportunity for the Supreme Court to distinguish between claims that are and are not directed to patentable subject matter.” Id. at 3.

Article By:

Improving the Return on Investment of Your Legal Marketing Dollars

consumer_colorlogo

At the end of April, Avvo hosted its “Lawyernomics” conference.  Some 300 lawyers from across the country assembled at the Bellagio in Las Vegas to hear from speakers from a variety of disciplines and communications platforms (including representatives from Avvo, Twitter and Yelp).  Although a wealth of information was shared, there was a broad, tactical theme that permeated the entire program:  Improving return on a firm’s business development investment.

Choosing Your Investments Wisely

For an industry that pays so much to get in front of consumers, lawyers are often poor at converting interested consumers into paying clients.  Similarly, even those firms investing heavily in numerous forms of advertising – online and traditional – usually don’t have a clear picture of which of those advertising channels are effective.  They’re left to “go by gut” when choosing whether to continue investing in an advertising campaign.

The lowest-hanging fruit in this area is establishing systems for following up with client inquiries.  It should be simple, but far too many firms don’t have adequate processes in place to ensure that consumer inquiries are immediately followed up on.  With the likelihood of making contact with someone who leaves a message plummeting within minutes of their reaching out, establishing a follow-up system is critical.  Doing so involves a mix of “rules and tools.”  The “rules” are business processes established and monitored to ensure that phones are covered, calls are answered, and inquiries get an immediate response.  The “tools” can be as simple as an excel spreadsheet tracking inbound inquiries to as sophisticated as powerful Customer Relationship Management (“CRM”) systems such as Salesforce or Avvo Ignite.

Measuring Marketing Channel’s Effectiveness

Having a good system for contact and customer management is key to calculating marketing channel effectiveness. Used diligently, the CRM tools of such a system will tell the firm where each inquiry originates from (its website, a search marketing campaign, the Yellow Pages, etc.). Over a period of months, the firm will then be able to tell the rate at which those inquiries turn into actual clients. This may show, for example, that while a conference sponsorship is driving a lot of calls, such contacts become clients at a far lower rate than the smaller number of calls and appointments generated from a webinar. When all marketing platforms are matched up, the most successful ones should stand out for future business development projections and budget reviews.

By layering the cost of these marketing initiatives on the number of clients generated, a firm can get a very clear picture of the return on investment of each channel (i.e., what it costs to generate a client).  That information allows the firm to identify those channels where it can profitably increase its marketing investment – and those that it needs to cut loose.

Article By:

 of

Twitter: Little Statements with Big Consequences for Companies

McBrayer

Twitter is under attack. In recent months, accounts belonging to media giants CBS, BBC, and NPR have all been temporarily taken over by hackers. The Associated Press is the most recent victim. On April 23, 2013, a false statement about explosions at the White House and the President being injured sent shock waves through the Twitter-sphere. The real surprise is the effect the single tweet had in the real world: the Standard & Poor’s 500 Index dropped so sharply moments after the frightening tweet that $136 billion in market value was wiped out. While the hacking of these massive media outlets make headlines, everyday businesses are not safe from the threat, either. In February of this year, a hacker changed the @BurgerKing feed to resemble that of McDonald’s, putting the McDonald’s logo in place of Burger King’s. The hackers posted offensive claims about company employees and practices. If accounts belonging to well-established companies like these are vulnerable, so is yours. If a tweet can have a profound impact on the nation’s stock market, imagine what an ill-contrived tweet could do to your business.

Business owners may have the knee-jerk reaction to delete their Twitter account, but despite the recent blemishes to its security, Twitter remains one of the most important social media sites out there. Just recently, the Securities Exchange Commission made clear that companies could use social media like Twitter when announcing key information in compliance with Regulation Fair Disclosure. Twitter is not just a marketing or PR tool—Twitter is business. And you should never turn your back on existing business. So instead of hanging up your hashtags, consider some steps that can make your Twitter account safer.

Limit Access

Not every employee should have access to the company’s Twitter account. In fact, hardly anyone should, except a few designated employees like the marketing director or business owner. While those with access may never do anything harmful to the account, the more people who have the log-in information, the more likely it is to fall into the wrong hands.

Create a strong password

I know, you already have too many passwords to remember. But a creative password is your best defense against someone seeking to break into your account. Employers should, at minimum, have unique passwords for their most commonly used media sites; please do not use the same word for your Facebook, LinkedIn, and Twitter account. Once a hacker figures it out, they have control of your entire social media presence.

When creating a password, avoid using anything that would be too common. “Password,” “1234,” or the business’s name should never be the only thing standing between you and a hacker. The longer the password, the better. Use a mix of uppercase and lowercase letters, numbers, and symbols.

Article By:

 of

Making Copies! The Fourth Circuit Defines Taxable Costs Associated With eDiscovery

GT Law

Can this happen to your client? Your client gets sued, is forced to spend over $100,000 on eDiscovery despite you making all the right objections, you deliver a clean victory on dispositive motions and the District Court awards costs of … $200. Here is what happened in the Fourth Circuit and what you can do to help your clients avoid the same fate:

The Fourth Circuit just decided the scope of taxable eDiscovery costs under 28 U.S.C. § 1920(4) in Country Vintner of North Carolina v. E. & J. Gallo Winery, Inc., __ F.3d __, 2013 WL 1789728 (4th Cir. Apr. 29, 2013). Section 1920(4) allows the District Courts to “tax as costs … [f]ees for exemplification and the costs of making copies of any materials where the copies are necessarily obtained for use in the case.” Id.   Under Federal Rule of Civil Procedure 54(d)(1), the cost of making copies “should be allowed to the prevailing party.” As an initial matter, the Fourth Circuit concluded that section 1920(4) applies to the costs related to documents produced in discovery – not just used at trial or in connection with a dispositive motion. Country Vintner, 2013 WL 1789728, *7. The Fourth Circuit then examined the meaning of “making copies,” and held that section 1920(4) “limits taxable costs to … converting electronic files to non-editable formats and burning files onto discs.” Id., *9.   In reaching that conclusion, the Fourth Circuit explicitly rejected the argument that “ESI processing costs constitute[d]” “making copies” under Section 1920(4). Id., *7. As a consequence, Appellant Gallo was awarded only $218.59 out of the $111,047.75 in eDiscovery costs it sought.

What does that mean?

Appellant Gallo sought more than $70,000 for “indexing” and “flattening” ESI – processing methods that extracted irrelevant files and duplicates, made the remaining data searchable, and organized the data; spent more than $15,000 extracting and organizing metadata and preparing it for review; less than $100 on electronic bates numbering; and over $20,000 on quality assurance and preparing the document production. None of these costs were taxed. Instead, Gallo received only $178.59 to convert certain native files into TIFF and PDF format and another $40 to burn images onto CDs. While the documents could not be “copied” without all of the processing that preceded it, such processing costs will not be shifted through a bill of costs. Id., *8-9 (citing Race Tires Am.supra n. 2, 674 F.3d at 169).

What lessons can we learn?

The Fourth Circuit seems to recognize the harshness of its ruling and provides two helpful clues for future litigants seeking to manage their eDiscovery burdens. The court first observes: “That Gallo will recover only a fraction of its litigation costs under our approach does not establish that our reading of the statute is too grudging in an age of unforeseen innovations in litigation-support technology.” Id., *9. Then, the court leaves open the question of whether the allowable costs of production might include the processing costs had the parties “clearly agreed to the production of ESI on a particular database or in native file format.” Id., *9 n. 20 (citing In re Ricoh Co., Ltd. Patent Litig., 661 F.3d 1361, 1365–66 (Fed. Cir. 2011) (holding that $234,702.43 for the cost of an electronic database which the parties agreed to use for document production would have been allowed, but for the parties’ agreement to share costs)). Next, the court points out that, where discovery costs are excessive, the responding party can move for a protective order and, if that motion is denied (as Gallo’s motion was denied), then the responding party “can appeal that decision” Id., *9; id., *9 n. 21 (noting that Gallo had not appealed the denial of its motion for protective order).

Lesson #1: While it is not entirely clear how the parties’ agreement to utilize a particular format or database alters the conclusion that processing is not “making copies,” the Fourth Circuit seems to suggest that it might.  So, any party seeking to shift its eDiscovery costs should consider agreeing with the other side regarding the format or database to be used to handle the parties’ productions.

Lesson #2: While it is not entirely clear whether parties are entitled to file an interlocutory appeal with respect to the denial of a motion for protective order, the Fourth Circuit seems to urge parties to do so. 4  Either the court is encouraging interlocutory appeals before the ESI expenses are incurred, or the court is suggesting that a final judgment (for either party) does not moot the trial court’s refusal to shift pre-trial eDiscovery costs.


 1 Because appellant Gallo’s eDiscovery costs neither involved authentication of public records nor demonstrative exhibits – two potential meanings of exemplification – the Fourth Circuit did not define the meaning of exemplification in this case.  Country Vintner, 2013 WL 1789728, *10.

 2 In reaching that conclusion, the Fourth Circuit aligned itself with the Third Circuit’s approach in Race Tires Am., Inc. v. Hoosier Racing Tire Corp., 674 F.3d 158 (3d Cir. 2012).

 In distinguishing In re Ricoh Co., the Third Circuit explained: “we have acknowledged that the costs of conversion to an agreed-upon production format are taxable as the functional equivalent of ‘making copies.’ It is all the other activity, such as searching, culling and deduplication that are not taxable.” Race Tires Am., 674 F.3d at 171 n.11.

 On one hand, discovery orders against a party are not immediately appealable. Seee.g.Nicholas v. Wyndham Int’l, Inc., 373 F.3d 537 (4th Cir. 2004). On the other hand, most discovery orders will be moot by the time a final order is entered. See, e.g., E. H. Reise v. Bd. of Regents of the Univ. of Wisconsin, Sys., 957 F.2d 293, 295-296 (7th Cir. 1992).

Article By:

 of

No “Safe Harbor” for BitTorrent Website Operator

McDermottLogo_2c_rgb

The U.S. Court of Appeals for the Ninth Circuit affirmed a summary judgment ruling in favor of seven film studios finding that the defendant induced third parties to download infringing copies of the plaintiffs’ copyrighted works. Columbia Pictures Industries, Inc., et al.  v. Gary Fung, et al., Case No. 10-55946 (9th Cir., Mar.21, 2013) (Berzon, J.).

Seven film studios—including Columbia Pictures, Disney and Twentieth Century Fox—sued Gary Fung and his company isoHunt Technologies, claiming that Fung induced third parties to download infringing copies of the studios’ copyrighted works through Fung’s websites, such as torrentbox.com and isohunt.com—websites that help users find copies of videos to download and stream through a type of peer-to-peer file sharing network.

The district court found Fung liable for contributory copyright infringement for inducing others to infringe the studios’ copyrights and also found that Fung was not entitled to protection from damages liability under the safe harbor provisions of the Digital Millennium Copyright Act (DMCA).  After a permanent injunction was issued, Fung appealed.

On appeal, Fung challenged the full holding, including the scope of the injunction claiming that it was vague, punitive and an impediment to free speech.  The 9th Circuit, citing the Supreme Court decision in Grokster III (which also dealt with peer-to-peer file sharing technology), analyzed the facts of the present case under the four elements of the Grokster III inducement principle:  the distribution of a device or product, acts of infringement, an object of promoting its use to infringe copyright and causation.

Inducement Liability Under Grokster III

With respect to the first element of the Grokster III inducement liability standard, Fung argued that he did not develop or distribute products, nor did he develop the BitTorrent protocol used by his websites.  The 9th Circuit, however, distinguished copyrights as expression that are not necessarily in the form of products or devices. Thus, the court concluded that a copyright can be infringed through “culpable actions resulting in impermissible reproductions of copyrighted expression,” even if such actions are the provision of services used in accomplishing the infringement.

Fung was not able to rebut the second “acts of infringement” Grokster III factor after the studios presented evidence that Fung’s services were widely used to infringe copyrights by allowing uploading and downloading of copyrighted material. Accordingly, the court found for the studios on the second factor, noting that the “predominant use” of Fung’s services was for copyright infringement.

As to the third Grokster III factor, the court agreed with Fung that mere knowledge of a potential to infringe, or knowledge of actual infringing uses of a product or service, is not enough for liability.  Nevertheless, the court found there was more than enough evidence that Fung offered his services with the object to promote their use to infringe copyrighted material.  Specifically, the court found that the evidence showed Fung actively encouraged uploading files of specific copyrighted material; he provided links for certain movies and urged users to download those movies; he affirmatively responded to requests for help in locating and playing copyrighted materials; and, he even personally instructed users on how to burn infringing files to DVDs.  The court also referenced two points of circumstantial evidence raised by the Grokster III opinion, namely, that Fung took no steps to develop filtering tools to diminish infringing activity and that he generated revenue by selling advertising space on his websites.

Finally, as to causation, the court adopted the studios’ interpretation of causation and held that the acts of infringement by third parties need only be caused by the product distributed or services provided.  This was contrary to Fung’s theory of causation (which was also joined by amicus curiae, Google) wherein Fung claimed that the infringement must be directly caused by a defendant’s inducing messages.

The Digital Millennium Copyright Act “Safe Harbor” Provisions

Fung also asserted affirmative defenses under three of the DMCA’s safe harbor provisions, 17 U.S.C. §512(a), (c) and (d). Although the studios argued that there can never be a DMCA safe harbor defense to contributory copyright liability inducement, the 9th Circuit disagreed, noting that the safe harbor provisions do not exclude vicarious or contributory liability from its protections. Even so, the court denied all of Fung’s safe harbor defenses.

In particular, the court concluded that Fung did not qualify for protection under §512(a) for transitory digital network communications because Fung’s torrent file trackers, not the third party users, were responsible for selecting the copyrighted data to be transmitted.

The court also concluded that § 512(c), relating to information residing on networks or systems at the direction of the users, was also not applicable because Fung had actual and “red flag” knowledge of infringing activity on his system due to his own active encouragement of infringement, as well as the fact that Fung did not dispute evidence that he personally used his isohunt.com website to download infringing material.

According to the 9th Circuit, Fung did not qualify for protection under §512(c) or §512(d) (for providers of information location tools) because Fung received a “financial benefit” from his services by selling ad space and because he had the “right and ability to control” the infringing activity, which was shown through evidence that Fung exerted substantial influence on the activities of the users of his websites.

Finding no available defenses under the DMCA safe harbors, the court affirmed summary judgment for the studios on the issue of liability under contributory copyright infringement.  However, the court found various terms of the lower court’s permanent injunction to be vague and unduly burdensome and remanded to the district court to modify certain employment prohibitions and to provide more specific language for several terms in the injunction.

Article By:

 of

Recent Social Media Developments Impacting Employers

Sills-Cummis-Gross-607x84

NLRB: Latest Decisions Addressing Social Media Policies and Activities

Within the past several months, the National Labor Relations Board (“NLRB“) has issued four precedent-setting opinions addressing the legality of an employer’s use of social media as a basis for taking adverse employment action. These decisions apply to both unionized and non-unionized workforces.

The key issue in each of these cases was whether the employer’s actions compromised the right of employees to engage in “protected concerted activities” for the purpose of their “mutual aid and protection.” However, as noted in a prior alert, recent federal case law could void all NLRB decisions dating back to January 4, 2012 (including those discussed below). Until there is clarity the NLRB decisions continue to be significant in shaping social media use, policy and practice.

On April 19, 2013, the NLRB, in Design Technology Group, LLC, found that an employee’s Facebook posts that criticized a manager’s handling of employee concerns were a “classic connected protected activity” under the National Labor Relations Act (“the Act”).

In that case, workers had approached their manager about closing the store they worked in at 7 PM instead of 8 PM, because of safety concerns. The manager advised that she would discuss those concerns with corporate officials, but the issue was never resolved. Subsequently, two employees posted messages on Facebook that were critical of how the manager handled that issue. Another employee showed the manager those posts and six days later, both employees who made the critical Facebook posts were fired by the manager.

The NLRB determined that the Facebook posts were part of the employees’ efforts to convince their employer to close the store earlier in the evening, based on their concerns about working late in an unsafe neighborhood. The NLRB found that those posts were protected under the Act and that the employees’ terminations constituted unfair labor practices.

Design Technology comes on the heels of three other NLRB social media rulings issued late last year.

In Hispanic United of Buffalo (December 14, 2012), the NLRB held that the termination of five employees for violating an employer’s policies on the basis of their social media activity was unlawful. In that case, five employees posted comments on Facebook that were critical of a co-worker who was scheduled to meet with and complain to management about their work performance. The employer terminated the five employees for “bullying and harassing” the co-worker in violation of its policies.

Hispanics United of Buffalo applied settled NLRB law regarding oral communications among co-workers to the social media context. Under NLRB precedent, employees’ comments regarding the terms and conditions of their employment are protected if their comments are “concerted” — meaning they are “‘engaged in, with or on the authority of other employees,” not only by “one employee on behalf of himself.” Finding the actions of these employees to be protected, the NLRB set a relatively low threshold for interpreting social media activity as protected concerted activity under the Act.

The Hispanics United decision is especially controversial because it may conflict with an employer’s competing obligation under federal and state discrimination laws to prevent workplace harassment. And, the decision may ultimately be in conflict with workplace anti-bullying laws in those states where such legislation is being actively considered. In Karl Knauz Motors, Inc. (September 28, 2012), the NLRB ordered another employer to rescind its social media policy. In that case, the employer terminated the employee for multiple reasons, including violation of the employer’s “Courtesy” rule requiring employees to be “courteous, polite and friendly” to customers, vendors, suppliers and fellow employees and not to use “language which injures the image or reputation of the Dealership.”

The NLRB held that the “Courtesy” rule violated the NLRA because employees could “reasonably construe its broad prohibition against ‘disrespectful’ conduct and ‘language’ which injures the image or reputation of the Dealership as encompassing Section 7 activity.” However, the NLRB upheld the employee’s termination, finding it was not motivated by protected concerted activity, but rather was solely based on the employee’s Facebook postings that did not relate to the terms and conditions of his or any other employee’s employment. The NLRB did not address whether other posts would be protected by the Act.

In Costco Wholesale Corp. (September 7, 2012), the NLRB ruled that an employer’s overbroad social media policy violated the National Labor Relations Act because it prohibited employees from posting statements “that damage the Company, defame any individual or damage any person’s reputation or violate the policies outlined in the Costco Employee Agreement.” The NLRB ordered Costco to rescind the policy based on its finding that the policy inhibited employees from engaging in protected concerted activity.

NJ Legislative Update: Proposed Law Seeks to Protect Employee and Job Applicant Passwords

A-2878, a bill that prohibits employers from requiring, or requesting, a current or prospective employee to reveal, as a condition of employment, his or her user name, password or other means of accessing the employee’s personal social media account, has passed both houses of the NJ Legislature and is awaiting further action by Governor Chris Christie. While it is not clear as of this writing whether Governor Christie will sign or veto this bill, the implications to employers of this potential new law are far reaching.

If enacted, this bill would prohibit employers from even asking an employee or prospective employee whether he or she has a profile on a social media site. In addition, the bill would prohibit employers from requiring prospective employees to waive or limit any protection granted to them under the law as a condition of applying for or receiving an offer of employment. It provides for a $1,000 civil penalty for the law’s first violation and $2,500 for each subsequent violation. If Governor Christie signs this bill into law, New Jersey would join other states that have enacted legislation preventing employers from requesting social media access information, including Arkansas, California, Delaware, Illinois, and Michigan, though it would be the first state to prevent employers from inquiring if employees or applicants have a social media account.

Notably, the bill does not prevent employers from performing their own online search to determine if a prospective or current employee is on a social media site. Accordingly, if a social media account is publically available, an employer would not run afoul of this proposed law by independently viewing an employee’s or prospective employee’s social media account. This type of activity could have other potential pitfalls associated with it however, such as learning protected class information about applicants.

We will continue to monitor the signing status of this bill.

What These Decisions and the Prospective NJ Statute Mean to Employers

In light of the foregoing, we recommend the following:

  • Employers should review and consider revising social media polices and hiring practices to address the NLRB decisions, the new NJ legislation, if enacted, and EEO issues associated with searches on applicants.
  • With respect to policies, employers should ensure that prohibitions placed on employees’ communications do not prohibit employees’ rights to engage in protected concerted activity.
  • Employers should continue to exercise caution when disciplining or terminating any employee based on his/her social media activities and should also consider training its managers in this area so that they do not inadvertently run afoul of these laws.
  • It is important to consult with counsel to consider whether an employee’s comments or posts would be deemed to be protected concerted activity under the Act before any disciplinary action is taken by the employer based on those comments or posts.
Article By:

of

Is Your Smartphone Costing You Thousands Each Month in Billable Time?

Client Logo

Back in the early 2000s, I had a friend who’d recently purchased a new-fangled flip-style mobile phone. Oohing and aahing, I asked if he loved all the things he could do with it. “I can play games on it and check the news, stock prices, sports scores, and weather” he lamented, “but I can’t figure out how to just make a phone call.”

Flash forward a decade to the ubiquity of smartphones, with their sleek design, shiny screens, and bright, colorful icons. Nearly every lawyer, young and old, has one. Newsletters and blog posts extol the smartphone’s positive impact on a lawyer’s productivity. New apps appear in the store almost daily to assist with note taking, dictation, file creation and storage, calendaring, practice management, and time tracking, to name a few. Bar associations and professional organizations host conferences, meetings, and CLEs to offer practical training on making the most of tablets, smartphones and cloud services.

Despite this, when lawyers use their smartphones for the most basic of tasks – talking on the phone – they struggle with capturing and billing that time. Are you one of them? Ask yourself the following questions:

  • Do I spend a lot of billable time on the phone?
    Surveys show that lawyers spend nearly one-quarter of their billable time on the phone, with over 70% percent of that time spent on the desktop phone in their office.
  • Do I use my mobile smartphone for work calls when I’m out of the office?
    If you do, you’re not alone. Lawyers report spending an average of 23 percent of their time working outside the office, during which time over 85 percent make work calls on smartphones.
  • Have I struggled finding good smartphone apps to use for work?
    Although a majority of lawyers responding to the 2012 ABA Legal Technology Survey use their own personal devices for work (making them part of the growing Bring Your Own Device, or BYOD, movement), two-thirds have never downloaded a general business app, while even fewer have tried a legal-specific smartphone app.
  • Have I ever forgotten or been unable to bill my time spent on the phone?
    You’re human and you’re busy, so you’re probably like most lawyers, who estimate that they lose a conservative five billable hours related to phone calls each month. Some of these hours are for forgotten, undocumented, or untimed calls. Others come from time spent reconstructing the call history for billing purposes, an arduous and inaccurate task.

If you answered yes to these questions, then that ubiquitous productivity tool – your smartphone – may make you more productive but still not help your bottom line. At an average hourly billable rate of $250, an office of four lawyers stands to lose nearly $5,000 every month, just on billable phone time.

With numbers like these, it’s never been more important that attorneys have access to timekeeping solutions that make it simple to track billable hours while on the phone. There are many time-trackers on the market, but common complaints about them include:

  • They’re too complex and full of bells and whistles that I will never use” (just like my friend with the fancy new flip phone).
  • “They require the use of a timer, which I often forget to start and stop.”
  • “They don’t capture time on the desktop phone, where I make the majority of my calls.”
  • “There’s too much manual entry required to create detailed records. Postponing the entry does nothing to alleviate the chore of billing reconciliation at the end of the month.”

When evaluating the options, consider these requirements:

  • Choose a solution that’s so simple, compliance is a snap.
    Look for a solution that is compatible with both mobile and desktop phones. From here, you can easily capture the call details and duration as it happens, no matter which device you’re using. In seconds, you can ensure that every minute spent on the phone is billed.
  • Simplify the billing reconciliation process with 24×7 access to the captured call data.
    A worthwhile solution will reclaim the hours previously spent digging through voicemail, paper phone messages, calendar appointments, and mobile call logs to reconstruct billable phone time. The internet is the perfect platform for the billing staff to gain access to captured call data from any browser whenever and wherever needed.
  • Impress your clients with descriptive, auditable billing records.
    Capturing comprehensive call details as they happen will improve your billing accuracy and show your clients exactly what they’re paying for. The more detail you can provide, the more they will trust your records, and the more likely you will be to collect on each invoice. Greater detail will help speed up your billing reconciliation time as well.
  • Minimize training time and increase usage by ensuring that the app is virtually identical on any device.
    If the process of capturing call information is the same on both office and mobile phones, it will quickly become a habit, no matter which device is in use. Consolidating the records generated from every device in a single, intuitive place online will help billing staff easily export and create line items for invoices.

While many time-trackers offer bells and whistles that sound great on paper, their complexity leaves many lawyers feeling like my friend who couldn’t figure out how to make a call on his new flip phone. Focus on simplicity to find a telephone timekeeping solution that you’ll actually use. An app that works automatically on any device will eliminate lost revenue for billable phone time, provide an audit trail for your clients, and allow your lawyers to be both productive and profitable.

Article By:

 of

“Actually, Someone Knows You are a Dog”– the Chinese Regulation Efforts on Private Data Protection

Sheppard Mullin 2012

Do you have privacy in the era of information?

“On the Internet, nobody knows you’re a dog.” First published in The New Yorker on July 5, 1993, this widely known and recognized saying has been quoted many times to describe the anonymous feature of Internet. However, now this description has been drifting from the truth.

The truth is that, some people using the Internet may know you better than yourself. When you log on Amazon, not only will the site greet you by name, the homepage will also suggest certain purchases. Surprisingly, you will be interested in at least one third of them. Your addresses have been recorded and Amazon will automatically calculate the delivery period. Besides those online shopping sites, getting visitors’ information is the common practice of online service and/or information providers. Youku and Netflix suggest videos to watch. Weibo and Facebook suggest friends to follow. Douban and IMDB suggest movie tickets to buy and parties to attend.

On one hand, these recommendations might give you convenience in your life and entertainment; while on the other hand, this can be really intruding and make you anxious by knowing you so much. For example, you just bought an apartment and even did not get the keys. However, decoration companies and contractors give you calls telling you the decoration designs for the new apartment have been done. You just submitted some resumes for a job. Even before the interview, insurance companies and training companies give you calls and emails to make sales. Have you wondered how strangers know your private, personal information?

Every time you log on a website, make a call or buy a ticket by showing ID card, computer systems will track you down, and record everything you have clicked and purchased. Data analyzing systems will collect, characterize, store your information, and take further actions based on the information. Some entities even purchase and resell personal data for profit. The reason why personal data become commodities is because direct marketing based on private data is profitable. Marketing communications are only classified as “direct marketing” where they are addressed to a specific person by name or where a phone call is made to a specific person, and the use of private data is the foundation of direct marketing. The newly issued Hong Kong Personal Data (Privacy) Amendment Ordinance contains a number of new provisions regulating the use of personal data in connection with direct marketing activities in Hong Kong, which has come into force since April 1, 2013. Apart from Hong Kong, there are over fifty countries and regions which have laws and regulations protecting personal data.

What is the new trend in China to protect personal data?

In order to safeguard the legitimate rights and interests of Chinese citizens concerning private data protection, the Ministry of Industry and Information Technology of China (“MIIT”) announced the Provisions on the Protection of Personal Information of Telecommunication and Internet Users (Draft for Comments) (“PPI Rules”) and the Provisions on the Registration of True Identity Information of Telephone Users (Draft for Comments) (“RTII Rules”) and sought for public comments. The deadline for submitting comments is May 15, 2013.

The PPI Rules and RTII Rules are a breakthrough with respect to legislation of personal information protection. Although these two rules are not officially a personal information protection law, they are a good beginning and call for a complete set of rules.

The PPI Rules and RTII Rules are designed to protect personal information from two perspectives. While the PPI Rules regulates the collection and utilization of users’ private information, the RTII Rules requests “real-name registration” of telephone users for the prohibition of direct or indirect marketing using no-name telephone numbers. Specifically, the PPI Rules requires that telecommunication service providers and Internet information service providers (“Service Providers”) shall not collect or use the users’ personal information without their consent. Service Providers shall also clearly notify the users of the purpose, method and scope of collection and utilization of the users’ personal information, retention period of such information, ways to access and modify such information, and consequences of refusal to provide such information.

Meanwhile, the “real-name registration” required by RTII Rules is a double-edged sword. Not only are telephone users required to supply their true identity information, some Internet services, for example, the Chinese Twitter Weibo, also require users’ true identity information. On one hand, it will reduce the risk of private information abuse by no-name telephones and Weibo bloggers. One the other hand, the “real-name registration” regime means it is legitimate for telephone and some Internet service providers to collect their users’ information. Although RTII Rules prohibits the sales and illegal provision of users’ information, it doesn’t mean those providers will not utilize the users’ information to make profits and provide such information to government or other compulsive entities. This “real-name registration” may limit the health development of Internet and even harm users’ right to free speech. Is “real-name registration” the only way to protect personal information? This is a controversial topic.

What can enterprises do to avoid violations of personal data protection rules in China?

Putting the controversial topic aside, let’s talk about what the enterprises doing business in China can do regarding new rules to protect personal information. Those enterprises may not be limited to Internet/telecommunication service providers, because the regime may expand in the future to regulate more entities that may get access to citizens’ personal data.

First, the concerned enterprises can log on MITT official websites and submit comments if any. They can make their voice heard since the rules are in the “draft for comments” period.

Second, thorough study of the new rules and other anticipated rules in this area is needed. The concerned enterprises need to provide proper training to their employees regarding the users’ information protection, since this is not only required by the new rules, but the enterprises might also have joint and several obligations with the employees who abuse the users’ information.

Third, proper drafts of disclaimer/declaration/agreement are needed when the enterprises want to collect and utilize the users’ private information. The enterprises need to make sure that they have obtained the users’ consents concerning the information collection and utilization. Proper preparations are needed to avoid future risks.

 of