Rainmaker Institutes’s Top Ten Marketing Mistakes

The National Law Review is pleased to bring you information regarding The Rainmaker Institute’s Top Ten Marketing Marketing Mistakes:

 

Here’s What You’ll Discover When You Read This Free E-book:

♦ How to avoid the top 10 marketing mistakes before they destroy your practice

♦ 3 tools top Rainmakers useto automatically attract more and better clients

♦ Specific keys for building a powerful online presence

♦ How to market and position yourself as a recognized specialist

♦ The 1 thing you must never do when marketing your law firm

♦ The top 2 online resources for small and solo law firm marketing

♦ The advertising secrets they don’t want you to know

♦ …And much, much more!

NLRB Chills At-Will Acknowledgements of Social Media in Employee Handbooks

The National Law Review recently published an article about the NLRB’s Social Media Rulings written by Jerrold J. Wohlgemuth of  Drinker Biddle & Reath LLP:

 

 

Having warned employers about the legality of their social media policies under theNational Labor Relations Act, NLRB Acting General Counsel Lafe Solomon has apparently turned his attention to at-will employment statements in employer handbooks and manuals.  Employers of union and non-union workforces need to pay careful attention to this development.

Many employers use standard language in their handbooks and manuals in which their employees acknowledge that their employment is at-will; that the employer may terminate the employment relationship at any time, for any reason; and that the at-will employment relationship cannot be amended, altered or modified except by a writing signed by a senior member of management.  The Acting General Counsel apparently believes that such at-will disclaimers may interfere with or chill the right of employees to engage in protected concerted activity.

In a case that did not receive extensive publicity, the General Counsel’s Office filed an unfair labor practice charge in February 2012 against Hyatt Hotels (NLRB v. Hyatt Hotels Corp., Case 28 CA-061114) in which it alleged that the at-will disclaimer in the company’s employee handbook violated Section 8(a)(1) of the Act to the extent it required employees to acknowledge that their at-will employment status could not be altered except by a writing signed by management.  The charge appears to reflect the Acting General Counsel’s belief that such an acknowledgement will have a chilling effect on the Section 7 right of employees to engage in concerted activity for the purpose of organizing to alter their employment relationship with the employer by choosing union representation.  The Hyatt case was settled before the issue was presented for a hearing.  An Administrative Law Judge issued a similar ruling in a case decided in early February against the American Red Cross; the case was resolved when the Red Cross agreed to modify its at-will disclaimer before the issue could be presented to the Board for review. (NLRB v. Am. Red Cross, 2012 WL 311334, Feb 1, 2012).

This is an important initiative on the part of the Acting General Counsel.  As we have seen in the social media context, in analyzing handbooks and policy manuals the Acting General Counsel will apply Section 7 broadly to find statements unlawful to the extent they could be interpreted in almost any fashion to chill employee rights to engage in protected concerted activity.  Accordingly, employers may want to take proactive steps to avoid NLRB scrutiny by including a disclaimer in the at-will sections of their handbooks to the effect that the at-will acknowledgment does not, and is not intended to, undermine or interfere with the employee’s right to engage in protected concerted organizing activity under Section 7 of the Act.

©2012 Drinker Biddle & Reath LLP

Reining in Blogging, Tweeting and Internet Surfing by Jurors

The National Law Review recently published an article about Jurors and Social Media, written by Carolyn M. Wendel of Barnes & Thornburg LLP:

It is estimated that in 2011, 64 percent of U.S. Internet users utilize social networks—Facebook, Twitter, MySpace, LinkedIn, and the like—on a regular basis, amounting to nearly 148 million people. In addition, with the expansion of the smartphone market to the general populace from more limited business usage, people can access their social networks virtually anytime and anywhere, including the courtroom.  Such access creates a host of problems and recent years have seen a dramatic increase in the number of mistrials and overturned verdicts as a result of jurors’ use of social networking and other Internet sites.

Jurors sharing too much information.

Until recently, what went on behind the closed doors of the jury room remained largely a secret. For better or worse, the ability of jurors to instantly share thoughts and observations via blogs and social networks has offered a glimpse into the decision making process. While these instances are often used as grounds for an appeal, they account for a very small portion of the cases that are actually overturned.

The Illinois Appellate Court recently upheld an award of $4.75 million to the widow of a blind man killed by a Metra commuter train despite the fact that a juror was blogging about the case throughout the trial.  Eskew v. Burlington Northern & Santa Fe Ry. Co., 2011 IL App. (1st) 093450.  The defense argued the verdict must be overturned because the juror’s blog entries showed she had discussed the case with her husband, the jurors had discussed the case among themselves prior to deliberations, and, before all the evidence was in, one juror had stated, “All that’s left now is deciding how much.”  The Court, however, noted that the blog entries showed the other jurors had chastised the juror who made the statement, were generally keeping an open mind, and had been offered no outside information that would influence their decision making process. The Court upheld the verdict, concluding, “The blog entries on which the defendants rely do not indicate that premature deliberations resulted in a jury that was biased when it commenced its deliberations or that the jury’s actual deliberations and verdict were affected by any discussions during trial.  In fact, the entries indicate just the opposite.”

Generally, allegations involving jurors’ texts, tweets, or blogs do not necessitate declaring a mistrial or vacating a verdict.  In a few extreme cases—such as where jurors posted pictures of a murder weapon, blogged about fellow jurors by name, or hosted a chat room where people could ask questions about the case—the courts have taken action. Overall, however, relatively few cases have been overturned because of jurors sharing general thoughts or experiences via posts and blogs.

Jurors seeking out impermissible input and information.

Seemingly more prevalent, and responsible for the majority of mistrials and overturned verdicts, is the situation where jurors impermissibly access the Internet to bring outside information into the jury room.  In 2009 a federal judge in Florida was forced to declare a mistrial eight weeks into a drug trial after learning that jurors were using Internet search engines, Wikipedia, and other Internet sites to research issues associated with the case. Other cases show that jurors have conducted Internet searches of defendants, researched sentencing guidelines, and looked up the social networking profiles of alleged victims.  In one extreme case, a juror in England posted key facts from the case and asked her Facebook friends to vote on whether the defendant was guilty or innocent.  More often than not, where jurors have conducted their own research or solicited outside opinions, judges have been forced to declare mistrials or overturn verdicts.

How courts are responding.

Courts across the country continue to struggle with how to curtail jurors’ use of the Internet and social networking sites. Some courts have banned jurors from using cell phones or similar electronic devices in the courtroom and jury room.  Other courts are warning jurors that violations could lead to jurors being held in contempt. At this point, however, the majority of courts addressing the issue are focusing on updating their jury instructions to emphasize the impermissible uses of the Internet and social networking sites.

In 2010, a committee of the Judicial Conference of the United States endorsed a set of model jury instructions for district judges aimed at deterring jurors from electronically communicating or researching about their case. The committee issued separate instructions to be given before trial and at the close of the case, specifying that during the course of the trial and deliberations, jurors “may not use any electronic device or media, such as a telephone, cell phone, smartphone, iPhone, Blackberry or computer, the Internet, any Internet service, or any text or instant messaging service; or any Internet chat room, blog, or website such as Facebook, My Space, LinkedIn, YouTube or Twitter, to communicate to anyone any information about this case or to conduct any research about this case.”

A 2011 survey of federal and state jury instructions revealed a majority of circuits and states have such “modern” civil jury instructions that address the Internet, social media, or specific social networking sites by name.  See Eric P. Robinson, Jury Instructions for the Modern Age: A 50-State Survey of Jury Instructions on Internet and Social Media, 1 Reynolds Courts & Media Law Journal 307 (2011).  A minority of the circuits and states retain “archaic” instructions that either have no language addressing jurors’ access to media, or only reference newspapers, radio, and television.Only one circuit and 10 states offer an explanation in their civil instructions as to why jurors should refrain from using the Internet and social networking sites during a trial.

As an example, Indiana’s Model Civil Jury Instructions represent one of the most thorough set of instructions. The instructions start out by informing jurors that their decision must be based only on the evidence presented in the courtroom and the judge’s instructions. After listing general activities that are forbidden, the instructions specifically emphasize electronic communication and research:

[Y]ou must not communicate with anyone or post information about the case, or what you are doing in the case, by any means, including telephone, text messages, email, Internet chat rooms, blogs, or social websites, such as Facebook, MySpace, or Twitter.

You also must not Google or otherwise search for any information about the case, or the law that applies to the case, or the people involved in the case, including the parties, witnesses, lawyers, or Judges.

Finally, the instructions offer an extensive explanation of why it is important that jurors not discuss the case with anyone outside of the jury, visit any place discussed in the testimony, or access any media coverage about the case or conduct their own research. The concept of fairness is repeatedly emphasized. “These rules are designed to guarantee a fair trial” and jurors should not conduct independent research because to do so “would not be fair.”  Jurors should not talk with anyone outside the jury because, “Only you have been found to be fair, and only you have promised to be fair – no one else has been so qualified.”

Not many instructions are as thorough in the conduct they prohibit or the rationale behind the rules as the Indiana instructions. However, more and more states will likely move in this direction as there is a growing belief that only if jurors are told specifically what they cannot do and, more importantly, why they cannot do it, will the increasing trend of juror violations be reversed.

© 2012 BARNES & THORNBURG LLP

LinkedIn Password Theft Results in Class Action Lawsuit: Privacy and Security Law Matters

The National Law Review recently published an article by Kevin M. McGinty of Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. regarding The Recent Hacking of LinkedIn:

Nearly as predictable as the sun coming up in the morning, the recent theft of 6.5 million LinkedIn user passwords has resulted in the filing of a class action lawsuit in a California federal court.  In her complaint, a LinkedIn premium subscriber asserts claims on behalf of all LinkedIn users for breach of implied and express contractual obligations, negligence and violation of California’s Unfair Competition Law, Cal. Bus. & Prof. Code § 17200.

Although the attack affected the passwords of just over 5% of LinkedIn’s approximately 120 million users, plaintiff purports to assert claims on behalf of all LinkedIn users.  Although plaintiff alleges classwide damages in excess of $5,000,000 (the jurisdictional threshold for federal court jurisdiction over the state law claims advanced in the complaint) it is unclear what damages plaintiff alleges that the class actually sustained by reason of merely losing passwords.  Some commentators have hypothesized that the propensity to use a single password for multiple online accounts could result in losses where non-LinkedIn accounts are accessed using an individual’s LinkedIn password.

Proving that such losses have occurred, however, would require highly individualized showings that would likely preclude adjudicating plaintiff’s claims as a class action.  Even less clear is what conceivable damages were allegedly sustained by LinkedIn users whose passwords were not stolen.  Thus, as with most privacy class actions, damages issues appear to pose the greatest obstacle to the success of the claims against LinkedIn.

©1994-2012 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

Generic Top-Level Domain Names Summit

The National Law Review is pleased to bring you information about the upcoming Generic Top-Level Domain Names Summit:

World Research Group is proud to announce the Generic Top-Level Domain Names Summit The Challenges and Opportunities Facing the Financial, Pharmaceutical, Consumer Goods, and Other Branding Companies Since ICANNs Program, which will be held onSeptember 13, 2012 in Los Angeles, California. This event will discuss the implications and affects of ICANN’s new top level domain program, the risk and opportunities presented by this revolutionary transformation, and discovering what the next steps are for these companies.

The DotCom Shake-Up: How Will You Protect Your Rights in the New Imminent Domain Name Release?

Barnes & Thornburg LLP‘s Internet and Technology Group recently had an article, The DotCom Shake-Up: How Will You Protect Your Rights in the New Imminent Domain Name Release?, featured in The National Law Review:

The Internet Corporation for Assigned Names and Numbers, often referred to as ICANN, has now released its list of 1,930 applications for proposed new generic Top-Level Domain Names (“New gTLDs”). A list of the New gTLDs and the respective applicants is available here.Much speculation has been made about how these New gTLDs, if successful, will impact the Internet. Brand owners and others are advised to be diligent in preventing others from securing any New gTLDs that may adversely affect their rights.

As expected, many of the applications seek registration of New gTLDs that correspond with generic terms such as .business, .city, .computer and .beer. Still, numerous other applications include domains that correspond with brand names, such as .google, .hbo, and .ferrari.  In many cases, more than one applicant has sought registration of the same New gTLD. Additionally, some of the New gTLDs requested, undoubtedly correspond with trademarks belonging to others.

To address potential disputes over New gTLD applications, ICANN offers several types of pre-delegation dispute resolution procedures to address objections to registration, including:

  1. Legal Rights Objections;
  2. Community Objections;
  3. String Confusion Objections (objections based on confusing similarity to existing top level domains such as .com or .info); and
  4. Limited Public Interest Objections (for example, objections based on human or civil rights); and
  5. Intergovernmental Organization objections

Prior to ICANN’s approval of a New gTLD, third parties will have an opportunity to file a formal objection to a proposed application on the above-stated grounds. Currently, the objection filing window is anticipated to be seven months, from June 13, 2012 to Jan. 13, 2013.

Most objections will likely consist of Legal Rights Objections and Community Objections.

Legal Rights Objections

Brand owners are strongly encouraged to review the list of New gTLD applications to help identify potential legal rights violations.  If a potential violation is identified, brand owners can initiate an arbitration proceeding requesting that an independent panel determine whether an applicant’s potential use of the applied-for New gTLD would be likely to infringe the brand owner’s trademark rights.  To address any such concerns, brand owners may seek to prevent the registration of applied for gTLDs that:

(i)  take unfair advantage of the distinctive character or the reputation of the objector’s registered or unregistered trademark or service mark;

(ii)  unjustifiably impair the distinctive character or the reputation of the objector’s mark; or

(iii) otherwise create an impermissible likelihood of confusion between the applied-for gTLD and the objector’s mark.

Community Objections

Established institutions that are associated with clearly delineated community may also have a basis to object to New gTLD applications.  To prevail, an objector must demonstrate there is a substantial opposition to registration of that New gTLD by the community and that the use of the New gTLD will cause a material detriment to the rights or legitimate interests of its associated community and the broader Internet community.

© 2012 BARNES & THORNBURG LLP

Has Someone Applied to Register Your .BRAND? Top Five Things You Need to Know

The National Law Review recently published an article by Geri L. Haight of Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. regarding The Registration of Brands:

You’ve heard about the planned expansion of the domain name system, but what does it really mean for trademark owners?

Last year, the Internet Committee for Assigned Names and Numbers (ICANN), the organization responsible for the coordination of the global Internet domain name system, announced a plan to bring sweeping changes to the Internet’s generic top level domain (gTLD) structure. Internet users are familiar with gTLDs, if not by name. gTLDs are Internet extensions such as .com, .org and .net found at the end of a domain name. Under the new system, a business could apply to own its .BRAND. An automobile company could apply to own .CARS. A city government could apply to own .CITY. The possibilities, seemingly, are endless.

ICANN received 1900 applications for new gTLDs during the first application period, which is now closed. Google announced last week that it had applied for the gTLDs .GOOGLE, .YOUTUBE and .LOL among others. Canon Inc. announced that it has applied for the gTLD .CANON in order to “increase the convenience and effectiveness of its online communications.” The domain name registry Donuts Inc. announced that it has applied for 307 new gTLDs. The timeframe and process for reviewing the applications are somewhat fluid but the first new batch of gTLDs is slated to become active in early 2013. The remaining batch of applied-for gTLDs will not go live until 2014 or later. So what should trademark owners do now to prepare for the new regime?

1. Review and Analyze the List of Applied-For gTLDs

In what ICANN calls “Reveal Day,” on Wednesday, June 13, 2012, ICANN will publicly post a listing of all applied-for gTLD character strings. This will be the first public glimpse into which entities have applied to own which new gTLDs. Although some companies have announced publicly that they have submitted applications to participate in the new gTLD program, most have remained silent throughout the initial application phase. But all will be revealed on Reveal Day. Trademark owners should carefully review the list of applied-for gTLDs in order to determine if any conflict with pre-existing trademark rights. But remember, the list of applied-for gTLDs have not been approved by ICANN yet. There is time to take action if necessary to protect your trademark rights.

2. Submit a Comment to ICANN

What can you do if you learn on Reveal Day that someone has applied to register your .BRAND? Following publication on Reveal Day, interested parties may submit comments related to proposed new gTLDs to ICANN for consideration by the independent evaluators assessing each application. During the comment period, trademark owners can submit comments regarding potential trademark infringement, dilution, and related concerns raised by particular applications for gTLDs. Application comments received within 60 days of Reveal Day, i.e., by August 12th, will be available to the evaluation panel performing the initial evaluation reviews of all pending applications. Initial evaluation of the applications is expected to begin in early July.

3. Use Dispute Resolution Procedures to Object to Infringing gTLDs and/or Domain Names

Separate from the comment procedure, and prior to the approval of an applied-for gTLD, a formal objection process will be available to trademark owners. ICANN has appointed the World Intellectual Property Organization (WIPO) to be the exclusive provider of dispute resolution services when a third party files a formal “Legal Rights Objection” (LRO) to a pending application. A Legal Rights Objection can be filed where the applied-for gTLD (i) takes unfair advantage of the unique character or the reputation of the objector’s registered or unregistered trademark, intergovernmental organization (IGO) name or acronym, or (ii) without justification, the gTLD impairs the distinctive character or the reputation of the objector’s mark, IGO name or acronym, or (iii) creates an impermissible likelihood of confusion between the applied-for gTLD and the objector’s mark, IGO name or acronym. The LRO process offers a good option for trademark owners who believe that their trademark rights may be encroached upon by a particular applied-for gTLD. But the process comes with a price tag of $10,000 fee for arbitration of a LRO by a single-member panel. The applicant of the challenged gTLD similarly is required to pay a $10,000 fee. If the applicant fails to do so, the objection will be deemed successful. The sole remedies available for a LRO are the success or dismissal of the objection. Monetary damages are not available through this process.

Many anticipate that the problem of “cybersquatting” will dramatically increase with the expansion of the gTLD system. Cybersquatting refers to the bad faith registration of a domain name that contains another’s brand or trademark. If an applied-for gTLD is approved by ICANN and domain names registered using the new gTLD infringe upon your trademark rights, the Uniform Domain Name Dispute Resolution Policy (UDRP) remains available to resolve domain name disputes. Under the UDRP, domain name disputes are typically resolved in approximately 45-60 days and the associated filing fees are relatively low (approximately $1500 to resolve a dispute involving up to 5 domain names). WIPO has stated that the UDRP is “the only proven mechanism in place to absorb the impact of gTLD expansion.”

Another alternative currently contemplated by ICANN is the Uniform Rapid Suspension System (URS). The URS is intended to be a faster, more cost-efficient complement to the UDRP. It is intended for cases of trademark abuse. Unlike the UDRP, which allows a trademark owner to obtain the transfer of a domain name that impairs its trademark rights, the sole remedy available under the URS is the temporary suspension of a domain name for the duration of the registration period (which may be extended for one year). While the URS substantive criteria mirror that of the UDRP, there is a higher burden of proof for complainants. ICANN has not yet selected a vendor for the URS System.

4. Register Your Trademark With ICANN’s Trademark Clearinghouse

In connection with the launch of new gTLDs, ICANN plans to form a Trademark Clearinghouse. The Trademark Clearinghouse is intended to serve as a single database of authenticated, registered trademarks and will eliminate the need for trademark holders to register their marks in many different databases as new gTLDs are introduced. ICANN will require every new gTLD operator to utilize the Clearinghouse, which will be available globally and have the capabilities for validating trademark data from multiple global regions. As a result of these functions, the Trademark Clearinghouse is expected to play an important role in ensuring ongoing protection of trademark rights under the new scheme. If you are a trademark owner and have not applied to register a gTLD, registering your trademark with the Trademark Clearinghouse is an important step in protecting your trademark rights in the new gTLD world. The fee for initial trademark authentication and validation services is expected to be less than $150 US per submission/trademark.

Trademark owners who lodge their marks with the Clearinghouse will obtain certain advantages and notifications during “sunrise” periods that will apply to registrations of second-level (to the left of the “dot,” such as “secondlevel” in secondlevel.BRAND) domain names within newly launched gTLDs. In addition, registrants of second-level domain names will receive (at least for some period of time) notifications of trademarks that are an identical match to their newly registered domain names. Second-level domain name registrants, though, are not prevented from registering the sought-after domain name based on registration of a trademark with the Clearinghouse. They are simply put on notice that the domain name may conflict with another’s trademark rights. Importantly, notice to domain name registrants will not be provided except where the match with a trademark is identical. So, if the second-level domain name contains a misspelling of a trademark, no notification will be given to the registrant.

5. Apply to Register Your Trademarks and Service Marks

Having federally-registered trademark rights will offer valuable protection as the new domain name system becomes a reality. To the extent that you are using or plan to use a trademark or service mark in connection with the offering of goods or services and have not yet applied for federal trademark protection, you should consider doing so now. A federal trademark registration provides many valuable benefits. To start, it provides the owner with rights on a national (as opposed to a regional) level. A federal registration also provides you with the exclusive right to use the mark on or in connection with the goods or services listed in your registration. In connection with the new gTLD system, a federal trademark registration will help to strengthen and reinforce your trademark rights. It will also establish ownership of a particular trademark and, therefore, standing, to submit a legal right objection or other challenge to an applied-for gTLD or second-level domain name.

©1994-2012 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

Webinar on Key Performance Indicators: Knowing the Numbers That Run Your Law Firm Now Available On-Demand

The National Law Review is pleased to bring you information about the upcoming Webinar on Key Performance Indicators (KPI) sponsored by The Rainmaker Institute:

Our law firm marketing webinars are great for attorneys who want to learn about proven legal marketing strategies in one-hour doses. But sometimes the timing just isn’t right. Which is why we are now providing one of our most popular webinars – Knowing the Numbers That Run Your Law Firm – in an on-demand format, so you can watch and learn at your convenience, as many times as you wish.

Over the last decade we have helped over 8,000 attorneys market and grow their business. During this time we have identified many of the key characteristics of highly successful law firms.

One of the more consistent ones is that they track specific numbers and key indicators that give them instant insight into how their law firm is performing on a weekly and monthly basis.

Key Performance Indicators (KPIs) are the numbers that make your law firm run. By analyzing these critical metrics, partners and owners of law firms can easily determine whether they are on track to achieve their goals or if they need to retool and refocus their marketing and business development efforts.

In this fast paced webinar, you learn:

  • How to easily identify the 12 key metrics your law firm needs to track and measure
  • How to set up a system to identify these numbers
  • The 7 critical systems every law firm must have
  • CPL and CPC: the 2 most important numbers every attorney must know in order to succeed
  • How to avoid “paralysis by analysis” and being overwhelmed by too much data
  • Delegating roles and responsibility to your staff
  • Using software to track your KPIs

If you’re a spreadsheet and data driven individual then you will love this webinar! However, if numbers scare you or you tend to ignore them because you have a hard time making heads or tails of all the different data you see, then this webinar is a “can’t miss” event!

We cut through the clutter and give you clear and easy to understand guidance on which numbers really matter the most, how to track this information, and what to do with it once you have it!

To register online for this on-demand webinar, click on this link: Knowing the Numbers That Run Your Law Firm

Domain Names Go Creative: Will We Soon See Dot-Poker?

Griffin Finan of Ifrah Law recently had an article about Domain Names published in The National Law Review:

Domain names on the Internet are about to get much more varied and creative. Soon websites will not just end in the few familiar suffixes like “com” or “edu,” but could end in things like “.movie” or ”.lawyer” or “.lol.”

On Wednesday, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization tasked with regulating Internet domain names, released a list detailing who has applied for new suffixes, also known as top-level domains (TLD). This is the third major expansion ICANN has allowed of domain name suffixes, in addition to a few others that have been allowed on an ad hoc basis. The new system will streamline the application process and allow for up to 1,000 new domain suffixes a year.

The application process allowed companies to apply for their own brand name to use as their domain suffix name. For instance, Apple applied for the “.apple” suffix. Amazon applies for 76 names including “.amazon” and “.zappos.” Google applied for over 100 suffixes, including “.google” and “.youtube,” as well as “.lol,” and “.book.”

An interesting development related to the world of online gaming is that four groups applied for domain names that would end in “.poker.” The companies that applied for the “.poker” suffix are U.S.-based Binky Mill, LLC and Dot Poker, LLC as well as European-based dot Poker Limited and Afilias Domains No. 5. Limited.

Now that the initial list of applicants for TLD’s has been released, the public will have 60 days to comment. This time period will allow for companies and organizations to see whether others’ applications conflict with their interests or their intellectual property. After conflicts are resolved, there will be an appeals process. The new addresses likely will not launch until next year.

It remains to be seen whether these new domain extensions will become popular. Some companies may be able to capitalize on the marketing opportunities presented by the new TLD’s and other generic TLD’s that could become much more common. In any event, domain names are surely going to be more creative starting very soon.

© 2012 Ifrah PLLC

A Betrayal Among Friends: Privacy Issues Surrounding Posts on Facebook

Melissa V. Skrocki of Giordano, Halleran & Ciesla, P.C. recently had an article regarding Facebook Privacy published in The National Law Review:
Exactly what protections should be granted to individuals who post information on Facebook?  This was the question before the US District Court of NJ at a summary judgment hearing in the case of Deborah Ehling v. Monmouth-Ocean Hospital Service Corp., et al., 2012 BL 131926 (D.N.J. May 30, 2012).   The Plaintiff was an employee of Monmouth-Ocean Hospital Service Corporation (“MONOC”) and also served as the Acting President of the local union for Professional Emergency Medical Services Association – New Jersey.   In her union role, she filed multiple complaints against MONOC that she claims initiated MONOC’s retaliatory conduct against her.

The Plaintiff maintained a Facebook account during the term of her employment with MONOC and designated a number of her co-workers as friends on the website.  The Plaintiff stated in her complaint that MONOC “gained access to Ms. Ehling’s Facebook account by having a supervisor(s) summon a MONOC employee, who was also one of Mr. Ehling’s Facebook friends, into an office” and “coerc[ing], strongerarm[ing], and/or threaten[ing] the employee into accessing his Facebook account on the work computer in the supervisor’s presence.” Id. at 2 citing  Am. Compl. 20.   The MONOC supervisor viewed and copied numerous postings by the Plaintiff including one regarding a shooting at the Holocaust Museum in Washington D.C. in which the Plaintiff posted:

An 88 yr old sociopath white supremacist opened fire in the Wash D.C. Holocaust Museum this morning and killed an innocent guard (leaving children).  Other guards opened fire. The 88 yr old was shot. He survived.  I blame the DC paramedics. I want to say 2 things to the DC medics. 1. WHAT WERE YOU THINKING? and 2.  This was your opportunity to really make a difference! WTF!!!! And to the other guards…go to target practice.

Id. at 2 citing Certificate of Elizabeth Duffy Ex. C, ECF No. 11.   On June 17, 2009, MONOC sent notice of the Plaintiff’s Facebook post claiming concern for a disregard of patient safety to the New Jersey Board of Nursing and the New Jersey Department of Health, Office of Emergency Medical Services.  The Plaintiff then brought her suit against MONOC in which, among other claims, she alleged a violation of the New Jersey Wiretapping and Electronic Surveillance Control Act (“NJ Wiretap Act”) and a common law invasion of privacy, for which MONOC moved for dismissal of each complaint.

The Plaintiff maintains that the Defendant violated the NJ Wiretap Act by the unauthorized accessing and monitoring of the Plaintiff’s electronic communications stored in her Facebook account.   An individual will violate the NJ Wiretap Act if that person: “(1) knowingly accesses without authorization a facility through which an electronic communication service is provided or exceeds an authorization to access that facility, and (2) thereby obtains, alters, or prevents authorized access to a wire or electronic communication while that communication is in electronic storage.” N.J.S.A 2A:156A-27(a).   The NJ courts have determined that the NJ Wiretap Act does not apply where the communication was received by the recipient, stored by such recipient and then retrieved or viewed by another without permission because “the strong expectation of privacy with respect to communication in the course of transmission significantly diminishes once transmission is complete.” White v. White, 344 N.J. Super. 211, 200 (Ch. Div. 2001).

The Court dismissed Plaintiff’s NJ Wiretap Act claim because the Plaintiff failed to allege that the Defendant viewed Plaintiff’s post during transmission.  The Court found that the Plaintiff’s comments were clearly in post-transmission storage when they were accessed by the Defendant and as such, the NJ Wiretap Act does not apply.

The Plaintiff further claimed that the Defendant committed a common law invasion of her privacy by accessing her Facebook page without permission. In order to establish a claim for invasion of privacy under New Jersey law, a plaintiff must be able to prove that: “(1) her solitude, seclusion, or private affairs were intentionally infringed upon, and that (2) this infringement would highly offend a reasonable person.” Ehling at 5 citing Bisbee v. John C. Conover Agency Inc., 186 N.J. Super. 335, 339 (App. Div. 1982).   The Plaintiff maintains that she had a reasonable expectation of privacy in her posts on the Facebook site because she had limited access to her account to those individuals deemed “friends” on the website.  Accordingly, Plaintiff maintains that her comments were not generally available to the public. Conversely, the Defendant disputes that such an expectation of privacy can arise when the Plaintiff made her post available to “dozens, if not hundreds, of people.” Ehling at 6.

The Court considered the emerging privacy issues which surround social networking sites.  It noted that:

On one end of the spectrum, there are cases holding that there is no reasonable expectation of privacy for material posted to an unprotected website that anyone can view. On the other end of the spectrum, there are cases holding that there is a reasonable expectation of privacy for individual, password-protected online communication.

Id. at 5 (emphasis and internal citations omitted).   Despite the clear boundaries on the continuum of online privacy issues, the courts have not come to a clear consensus regarding the expectations of privacy for those communications which fall somewhere in between public websites and password-protected email accounts.  Most courts acknowledge that a communication may still be considered to be private even if it has been disclosed to one or more persons.  Interestingly though, the answer of question as to how many people must know a fact before it is considered public varies greatly among the courts.  As reported by the Ehling Court, in Multimedia Wmaz v. Kuback, the court found that disclosure of information by the plaintiff to sixty people did not render it public. Id. at 6 citingMultimedia Wmaz v. Kuback,  212 Ga. App. 707, 7-0 & n. 1 (Ga. Ct. App. 1994).  Conversely, the Eight Circuit found that the plaintiff did not have an expectation of privacy when she shared certain information with two of her coworkers. Id. at 6 citing Fletcher v. Price Chopper Foods of Trumann, Inc. (8th Cir. 2000).

Given the unsettled nature of this area of law, the Court rejected the Defendant’s motion to dismiss the Plaintiff’s violation of privacy claim and will hear arguments on this point during the trial.

It will be interesting to see where the NJ District Court falls within the privacy continuum but one thing is clear: it is best to follow the advice of Facebook, “Always think before you post. Just like anything else you post on the web or send in an email, information you share on Facebook can be copied or re-shared by anyone who can see it.”

© 2012 Giordano, Halleran & Ciesla, P.C.