Life on the B Side: Social Media Advertising Under CGL Coverage B (Part 2)

The following is Part II in our two-part series on the intersection between social media advertising and the lesser known portion of commercial general liability (โ€œCGLโ€) policiesโ€”the elusive โ€œCoverage B.โ€ย  Inย Part I, we examined the prevalence of social media and social media advertising in todayโ€™s society.ย  We also provided a brief overview of the Coverage B provisions that are likely to be implicated by social media advertising.ย  In Part II, we discuss these Coverageย B issues in greater detail.

POTENTIAL COVERAGE B ISSUES IMPLICATED BY SOCIAL MEDIA ADVERTISING

1.ย  ย What Constitutes Advertising?

A threshold issue that could arise in cases involving social media advertising is whether the use of social media qualifies as โ€œadvertisingโ€ under the policy.ย  In the typical insurance policy, โ€œAdvertising Injury or Damageโ€ is defined as including a covered offense stemming from the insuredโ€™s โ€œadvertisingโ€ efforts.ย  However, the term โ€œadvertisingโ€ is often left undefined.

Social media advertising raises some unique questions, particularly with respect to whether specific content constitutes โ€œadvertising.โ€ย  On the one hand, banner ads (i.e., those typically found on the top or sides of a website) are akin to traditional forms of print advertising; therefore, it is difficult to imagine that such content would not qualify as โ€œadvertisingโ€ for Coverage B purposes.ย  On the other hand, social media offers access to less formal means of advertising.ย  For instance, a business could open a Twitter or Facebook account in order to promote itself through individual postings.ย  Although the use of these social media platforms as a promotional tool would appear to constitute โ€œadvertising,โ€ judges unfamiliar with social media platforms, or at least more familiar with traditional forms of advertising, might disagree.

This issue has not yet been addressed in the Coverage B context.ย  However, one court recently concluded that a businessโ€™s Facebook posts did not constitute advertising under the Lanham Act.ย  Inย Buckeye International v. Schmidt Custom Floors, 2018 WL 1960115 (W.D. Wis. Apr. 26, 2018), a federal judge held that Facebook posts made by one business criticizing another business did not constitute advertising under the Lanham Act because they were โ€œindividualized person-to-person communication[s].โ€ย  This ruling fails to appreciate that a businessโ€™s posts to social media accounts, particularly where the business makes those posts public without limitation, are not โ€œindividualized person-to-person communicationsโ€ because they are often intended to reach large audiences or the public-at-large.ย  However, judges examining similar issues in a Coverage B dispute could reach similar conclusions.ย  Thus, educating courts about the basics of social media platforms, including how they operate and the purposes for which businesses use them, is critical in any litigation involving these technologies.

2.ย  ย #trademarkviolation

Anyone who has ever viewed a Twitter feed has surely noticed the presence of hashtags within individual Tweets.ย  Hashtags were originally intended as a tool to categorically arrange materials so that other users could easily search for a topic.ย  However, their use has quickly expanded to other social media platforms.ย  Today, they are often used to express humor or as a method for brand recognition. ย Indeed, certain courts to-date have found that hashtags are entitled to trademark or copyright protections, despite that they were originally intended to assist with online search capabilities.ย  The Wall Street Journal has reported that companies are increasingly filing trademark applications for hashtags related to their companies and products.[1]

The increased protections offered for hashtags has potential Coverage B implications.ย  In Part I, we discussed the fact that included among the covered offenses that constitute โ€œpersonal and advertising injuriesโ€ are: ย (1) the use of anotherโ€™s advertising idea in your โ€œadvertisementโ€; and (2) infringing upon anotherโ€™s copyright, trade dress, or slogan in your โ€œadvertisement.โ€ย  Thus, social media advertisements employing hashtags could trigger intellectual property litigation.ย  And, the related defense costs and/or indemnity arising out of such litigation would potentially be covered by standard Coverage B protections.

3.ย  ย Risks Associated With Social Media Influencers

In Part I of our series, we discussed how companies were employing brand advocacy through paid social media influencers (individuals with a significant following on social media who post content about products and services in exchange for compensation (e.g., money or free products)).ย  Although a companyโ€™s use of social media influencers does not create any unique Coverage B issues, the use of such influencers as part of a marketing campaign is not without risks.ย  Social medial influencers are certainly not professional advertisersโ€”recent studies show they are not only not aware of the rules and regulations concerning their paid posts, but may actually be consciously ignorant of those rules and regulations.[2]ย  Therefore, in order to minimize liability, companies seeking to utilize influencers must be dogged in (1) educating their influencers, and (2) monitoring their influencersโ€™ content.ย  This is especially true given the above-referenced statistics showing social media influencers are often ignorant of advertising normsโ€”an influencer left to his or her own devices is an influencer who could cause headaches for an insured. ย However, even companies that educate influencers about advertising norms must trust these people to actually follow the rules.ย  By utilizing influencers, companies give up certain elements of control over the advertising that they would maintain under traditional advertising campaigns and increase the chances that an influencer could engage in acts that constitute covered offenses for Coverage B purposes.

CONCLUSION

As highlighted throughout this two-part series, the use of social media advertising raises interesting and unique issues, as well as possible liabilities to companies.ย  Along with these possible liabilities comes the potential for insurance coverage under policies offering coverage for โ€œpersonal and advertising injuries.โ€ย  While it remains to be seen how courts will address these issues, companies should be mindful of the potential for insurance coverage.


[1]ย Seeย https://www.wsj.com/articles/companies-increasingly-trademark-hashtags-1…

[2] See Jim Tobin,ย Ignorance, Apathy or Greed? Why Most Influencers Still Donโ€™t Comply with FTC Guidelines, Forbes (Apr. 27, 2018 8:00 AM)ย https://www.forbes.com/sites/forbesagencycouncil/2018/04/27/ignorance-ap…ย Steven P. Mandell et al.,ย Recent Developments in Media, Privacy, Defamation, and Advertising Law, 52 Tort Trial & Ins. Prac. L.J. 531, 560 (2017).

 

ยฉ 2019 Gilbert LLP
This post was written by Michael B. Rushย and Samantha R. Millerย of Gilbert LLP.
Read more insurance legal news on our Insurance type of law page.

Kentucky to Begin Taxing Video Streaming Services under Telecom Tax

Legislators in Frankfort added a new โ€œvideo streaming serviceโ€ tax to the omnibus tax bill (HB 354) as part of a closed-door conference committee process before the bill was hastily passed in the House and Senate. Notably, the new video streaming service tax was not previously raised or discussed as part of HB 354 (or any other Kentucky legislation) before it was included in the final conference committee report that passed the General Assembly in March.

Specifically, as passed by the General Assembly, HB 354 will add โ€œvideo streaming servicesโ€ to the definition of โ€œmultichannel video programming serviceโ€ subject to the telecom excise tax.ย  This is the same tax imposition that the Department of Revenue argued applied to video streaming services in theย Netflixย litigationโ€”an argument that was rejected by the courts in Kentucky and then subsequently settled on appeal. Under existing law, Kentucky taxes โ€œdigital propertyโ€ under the sales and use tax. The term is broadly defined and applies to audio streaming services, but expressly carves out โ€œdigital audio-visual worksโ€ (i.e., downloaded movies, TV shows and video; defined consistently with the SSUTA) from the scope of the sales and use tax imposition. HB 354 would not modify the treatment of digital goods and services under the sales and use tax, and changes that would be implemented are limited to the telecom excise tax imposed on the retail purchase of a multichannel video programming service.

As amended by HB 354, the definition of โ€œmultichannel video programming serviceโ€ for purposes of the telecom excise tax would be expanded to mean โ€œlive, scheduled, or on-demand programming provided by or generally considered comparable to or in competition with programming provided by a television broadcast station and shall include but not be limited to: (a) Cable service; (b) Satellite broadcast and wireless cable service; and (c) Internet protocol television provided through wireline facilities without regard to delivery technology; and (d) video streaming services.โ€ The legislation defines โ€œvideo streaming servicesโ€ as โ€œprogramming that streams live events, movies, syndicated and television programming, or other audio-visual content over the Internet for viewing on a television or other electronic device with or without regard to a particular viewing schedule.โ€ Thus, the โ€œvideo streaming servicesโ€ language in HB 354 would clearly subject over-the-top video streaming service providers to the excise tax on the retail purchase of a multichannel video programming service. As passed by the General Assembly, the new video streaming services excise tax in HB 354 would โ€œapply to transactions occurring on or after July 1, 2019.โ€

Governor Matt Bevin signed HB 354 into law on March 26, 2019. The General Assembly subsequently passed a โ€œcleanup billโ€ (HB 458) that was enacted into law last month, but it did not make any changes to the part of HB 354 that expanded the scope of the tax on multichannel video programming services to include video streaming services.

Kentucky is a member of the Streamlined Sales and Use Tax Governing Board. Taxation of electronically transferred audio-visual works is something specifically dealt with in the Streamlined Sales and Use Tax Agreement (SSUTA). The SSUTA also prohibit the enactment of so-called โ€œreplacement taxesโ€ that have the effect of avoiding the provisions of the SSUTA.ย  Kentuckyโ€™s inclusion of streamed movies in its tax on multichannel video programming services, a regime outside the sales and use tax, could run afoul of the SSUTAโ€™s prohibition on replacement taxes, potentially putting the state out of compliance with the SSUTA and exposing it to the risk of sanctions by the Governing Board.

Practice Note:ย ย From an administrability and compliance point of view, enacting a new tax on digital goods and services as part of excise or gross receipts taxes outside the generally applicable sales and use tax poses significant problems. Many businesses that are not telecom providers simply do not have the compliance infrastructure to allow them to collect and remit taxes other than sales and use taxes. In addition, by taxing certain digital goods and services under a tax other than what is applicable to similar content sold via a tangible medium (such as a physical movie rental or viewing a movie in theater), the federal Permanent Internet Tax Freedom Act enacted by Congress may be implicated and pose a litigation risk to the state. Both the compliance nightmare and litigation risk could be easily avoided by imposing the tax under the sales and use tax (as opposed to miscellaneous excise or gross receipts taxes). We will continue to monitor the digital tax climate in Kentucky, and encourage companies impacted by this new imposition to contact the authors to discuss this issue in more detail.

ยฉ 2019 McDermott Will & Emery
Read more SALT news on the National Law Review’s Tax page.

Colorado Enacts Equal Pay for Equal Work Law, Effective 2021

Colorado Governor Jared Polis signed theย Equal Pay for Equal Work Actย (Senate Bill 85) into law on May 22. The intent of the new law is to help close the gender pay gap in Colorado and ensure that employees with similar job duties are paid the same wage rate regardless of sex, or sex plus another protected status. Unless a referendum petition is filed, the law goes into effect on January 1, 2021, providing employers with 19 months to come into compliance. Key points of the legislation follow.

Prohibited Conduct and Scope

The Act prohibits employers from:

  • paying differing wages based on an employee’s sex or on the basis of sex in combination with another protected status (disability, race, creed, color, sex, sexual orientation, religion, age, national origin, or ancestry) unless one of the statutory exceptions apply;

  • seeking the wage rate history of a prospective employee or relying on a prior wage rate to determine a wage rate for the position in question;

  • discriminating or retaliating against a prospective employee for failing to disclose their wage rate history;

  • discharging or retaliating against an employee for asserting the rights established by the Act, invoking the Act’s protections on behalf of anyone, or in assisting in the enforcement of the Act;

  • discharging, disciplining, discriminating against, coercing, intimidating, threatening, or interfering with an employee or other person because they inquired about, disclosed, compared, or otherwise discussed the employee’s wage rate; and

  • prohibiting an employee from disclosing wage rate information.

The Act defines “employer” broadly to include “the state or any political subdivision, commission, department, institution, or school district thereof, and every other person employing a person in the state.”ย  “Employee” is defined as “a person employed by an employer.”

Exceptions to the Act

The Act allows exceptions to the prohibition against a wage differential based on sex if the employer demonstrates the difference in wages is reasonably based upon one or more factors, including:

  • a seniority system;

  • a merit system;

  • a system that measures earnings by quantity or quality of production;

  • the geographic location where the work is performed;

  • education, training, or experience to the extent that they are reasonably related to the work in question; or

  • travel, if the travel is a regular and necessary condition of the work performed.

In relying on these factors, the employer must not rely on prior wage rate history to justify a disparity in current wage rates.

New Employer Obligations

The Act also imposes new affirmative obligations on employers. Once the Act is in effect, employers must:

  • announce to all employees employment advancement opportunities and job openings, and the pay range for the openings; and

  • maintain records of job descriptions and wage rate history for reach employee for the duration of their employment, plus two years.

Private Right of Action and Enforcement

Employees have a private right of action in district court to pursue remedies specified in the law. They need not first file administrative wage discrimination complaints with the Colorado Department of Labor and Employment before bringing suit.

The Act sets a two-year statute of limitations; a violation of the statute occurs each time a person is paid a discriminatory wage rate.

An employee may recover both economic damages (measured as the difference between the amount the employer paid and what the employee would have received had there been no violation) plus additional liquidated damages, equal to the amount of the economic damages. The liquidated damages provision is intended to compensate an employee for the delay in receiving amounts due. Employees may also recover attorneys’ fees and costs, and obtain legal and equitable relief, which may include reinstatement, promotion, and a pay increase.

The Director of the state Department of Labor and Employment is also authorized to enforce actions against an employer involving transparency in pay and employment opportunities, including fines of between $500 and $10,000 per violation. An employer’s failure to comply with the Act for one promotional opportunity or job opening is considered one violation.

Good Faith Defense and Wage Audits

An employer may avoid liquidated damages for a violation if it can establish that it had reasonable grounds for believing it was not in violation of the Act. The Act states that one factor to be considered in determining good faith is whether the employer had completed within the prior two years a “thorough and comprehensive pay audit of its workforce, with the specific goal of identifying and remedying unlawful pay disparities.”

Rebuttable Presumption Regarding the Failure to Keep Records

If an employer fails to keep required wage records and is later sued, the Act permits the court to impose a rebuttable presumption that the records not kept by the employer contained information favorable to the employee’s wage claim and the jury may be instructed that the failure to keep records is evidence that the violation was not in good faith.

Lessons for Employers

With pay equity issues increasingly in the news, we expect this new legislation to spur an uptick in litigation after it goes into effect in 2021. Because these are inherently fact-intensive cases, litigation involving the new Equal Pay for Equal Work Act will be complex and protracted. Colorado employers should audit and review their compensation systems now in order to identify and address potential problems. Consideration should be given to involving outside counsel in these audits in order to cloak them with the attorney-client privilege against public disclosure.

Copyright ยฉ by Ballard Spahr LLP
This post was written by Steven W. Suflas and Rachel R. Mentz of Ballard Spahr LLP.
Read more labor and employment news on the National Law Review’s Employment law page.

Huge Anti-Robocall Measure Passes In the Senate: Here is Your Definitive Guide to How TRACED Alters the TCPA Worldscape

The TRACED Act passed the Senate and is on its way to the House for consideration by the Democratic-lead lower chamber.

But what is exactly is TRACED and why is it so important? As the Czar of the TCPA World it falls on me to provide a nuts and bolts perspective of TRACEDโ€”and just in time for Memorial Day weekend. Below is your definitive guide to the TRACED Act and what to expect if/when the bill becomes law.

First, it is important to recognize that TRACED does not create a new statutory scheme. Rather it modifies and enhances the existing Telephone Consumer Protection Act (โ€œTCPAโ€) in a manner that assures the TCPA will remain the official federal response to the current robocall epidemic in this nation. That means that all of the TCPAโ€™s broad and ambiguous terminologyโ€”such as โ€œautomated telephone dialing systemโ€ and the identity of the enigmatic โ€œcalled partyโ€โ€”take on enhanced importance as the statute is exalted to โ€œcrown jewelโ€ status. It also means that the pending constitutional challenges to the TCPA have even greater import. Understanding the TCPA is, therefore, more critical than ever before as TRACED moves toward becoming law.

As TCPAWorld.com is already filled with articles and resources to help you understand the TCPA, this article will not pause long on these background issues. But here is the bedrock: thou shalt not use regulated technologyโ€”whatever that may beโ€”to call cell phones without the express consentโ€”whatever that meansโ€”of the called partyโ€”whoever that is. So far so good?

Most importantly, TRACED grants the FCC explicit authority to implement its Shaken/Stir framework for call authentication and anti-spoofing technology. TRACED provides that not later than 18 months after passage, the FCC shall โ€œrequireโ€ a provider of voice service to implement the STIR/SHAKEN authentication framework in the internet protocol networks of the voice service provider. ย โ€œSTIR/SHAKENโ€ is specifically defined to mean โ€œthe secure telephone identity revisited and signature-based handling of asserted information using tokens standards proposed by the information and communications technology industry.โ€ That, in turn, means that wireless carriers have to transmit, receive, and interpret certain data packets containing authentication information so every carrier knows whether every call is legitimately being received by a true number authorized by another carrier. That, in turn, means that YOU should always know whether a phone call can be trusted or not. So far so good.

TRACED also required the FCC to implement rules regarding when a carrier is permitted toย blockย calls that fail Stir/Shaken authentication, and to implement a safe harbor for calls that are improperly but accidentally blocked by carriers. This particular portion of TRACED has raised a lot of concern with industry groups that fear their legitimate messages will not be delivered due to the potential for wireless carriers to aggressively block messages utilizing non-public, vague or shifting standards or algorithms. To address this concern the amended version of TRACED allows callers who have been โ€œadversely affectedโ€ by call blocking to seek redress:ย  TRACED requires the FCC to establish โ€œa process to permit a calling party adversely affected by the information provided by the call authentication frameworkโ€ฆ to verify the authenticity of the calling partyโ€™s calls.โ€

Interesting, no?

TRACED also requires the FCC to initiate anti-spoofing rulemaking with an end goal to help protect consumers from receiving spoofed calls. Most importantly, TRACED directs the FCC to consider and determine โ€œthe best means of ensuring that a subscriber or provider has the ability to block calls from a caller using an unauthenticated North American Numbering Plan number.โ€ This portion of TRACED is rather vague and the directive to the FCC seems to be โ€œfigure it outโ€โ€”weโ€™ll keep an eye on developments surrounding any potential FCC rulemaking proceeding if and when TRACED passes the House.

All of this is good to neutral news for TCPAWorld residents. The mandated enhancements to carrier technology should help assure that more calls are answered as consumers feel safe to use their phones again. And it should mean that we all experience a dramatic reduction in spam and scam calls. Not bad.

But TRACED also makes critical and potentially disastrous changes to the TCPA enforcement environment, potentially shifting enforcement activity away from the expert agency in this fieldโ€”the FCCโ€”and to other agencies that are less experienced in this field. Specifically, TRACED requires the creation of a โ€œworking groupโ€ including:

  • the Department of Commerce;
  • the Department of State;
  • the Department of Homeland Security(!);
  • the Federal Communications Commission;
  • the Federal Trade Commission; and
  • the Bureau of Consumer Financial Protection(!!).

This working group is specifically charged with figuring out how to better enforce the TCPA. Specifically, these agencies must determine whether Federal laws inhibit the prosecution of TCPA violations and encourage and improve coordination among agencies in the prevention and prosecution of TCPA violations. Translation: Congress wants more TCPA prosecutions and enforcement actions and is asking every federal agency with an enforcement arm to figure out how to make that happen. Perhaps scariest of allโ€”the working group is specifically asked to determine whether State AGโ€™s should be invited to the table: ย the working group must consider โ€œwhether extending civil enforcement authority to the States would assist in the successful prevention and prosecution of such violations.โ€ Eesh.

TRACED also affords additional (and clearer) authority to the FCC to pursue TCPA enforcement actions. Where the TCPA is violated willfully TRACED allows the FCC to seek a new and additional penalty of $10,000.00 per violation. That means if a bad actor acts badly and contacts cell phones knowing he or she lacks consent the FCC can seek to recover $10,000.00 for each one of those phone callsย plusย (apparently) the forfeiture penalty of up to $16,000.00 per violation that is already available under the general provisions of the Telecommunications Act.ย So TRACED appears to raise the maximum per call penalty for violating the TCPA to $26,000.00 per call!ย Notably, TRACED represents the first Congressional enactment that clearly defines the FCCโ€™s forfeiture authority respecting illegal phone calls. ย TRACED also expands the timeframe the FCC has to pursue actions for intentional misconduct to three years from one year.

To avoid confusion, let me be clear TCPAWorldโ€“ the penalties available in a civil suit remain $500.00 per callโ€” and up to $1,500.00 per call for willful violationsโ€” where a private party is bringing suit. TRACED would not alter or amend this private right of action. And uncapped TCPA class actions remain a threat after TRACED.

TRACED also requires the FCC to prepare an annual report specifying the number of complaints it received related to robocalls and spoofing, and identifying what enforcement actions the Commission had undertaken in that same period of time.

Finally, for those of you already facing litigation, TRACED was designed not to have any impact on your case.ย  Section (b) of TRACED specifies: โ€œ[t]he amendments made by this section shall not affect any action or proceeding commenced before and pending on the date of enactment of this Act.โ€ So work hard to get sued before the Act passes in the House. Iโ€™m kidding. Sort of.

So there you have it. A deep dive TRACED discussion you can read poolside or while working the โ€˜cue. Enjoy the ribs TCPAWorld.

 

ยฉ Copyright 2019 Squire Patton Boggs (US) LLP
This post was written by Eric J. Troutmanย of Squire Patton Boggs (US) LLP.

Mental Illness in Family Law & Divorce

According to theย National Institute of Mental Health,

Not surprisingly, mental health issues come up in the context of a divorce in a variety of ways. They arise when mental health issues contribute to the breakdown of the marriage or relationship. For instance, a partner may suffer from a condition which causes him or her to behave in ways that are detrimental to the relationship. This can manifest itself in aggression, narcissism, and self-centered behavior to the detriment of the other partner or children, excessive spending impacting family finances, to engaging in dangerous behavior with a partner, and/or their children.

What happens when someone believes that their partnerโ€™s actions are caused by a mental illness? After a complaint for divorce has been filed, or other court process started, attention needs to be focused to the behavior, and steps should be taken to:

  1. Ensure that children are safe;
  2. Assets of the marriage are protected; and
  3. A plan is created to provide treatment options if children are involved.

If a spouse or partner is suffering from mental illness to the extent that he or she cannot make rational decisions, the court has a variety of options to protect that person, both personally and his or her property. The court can appoint a guardian for the person, particularly if the illness is so extreme as to cause a person to be incompetent.

If the litigant is ill, but not to the point of incompetency, the court can appoint a Guardian Ad Litem.

If a partner or spouseโ€™s illness is creating a risk of assets being dissipated, a court can freeze accounts, and limit access to funds. A court may allow a third party to make payments on behalf of a litigant such as rent, etc.

There is little question that difficult issues arise when a parent suffers from mental illness. The courts, acting in the best interests of children, must make sure the child is safe, while at the same time safeguarding a parentโ€™s rights to have a relationship with a child. When custody is an issue and one parent is alleging that the other suffers from a mental illness, the court will typically order an evaluation by a licensed mental health provider with experience in custody cases. The court may enter an order limiting, or prohibiting contact with the children pending the outcome of the evaluation. Then, depending on the outcome of the evaluation, the court may order therapy, medication, or other recommended treatment as a condition to parenting time. While the parent is undergoing treatment, the court can order supervised parenting time to make sure the children see the parent, but also making sure they are safe.

If substance abuse is part of the illness, there are options to make sure a child is not with a parent who is intoxicated. In addition to random drug testing, which the court can order as a condition of parenting time, there are devices, similar to mini breathalyzers to detect alcohol and certain other substances. These can be carried on someoneโ€™s person, in a pocket or purse, and they will be sent a random text instructing them to blow into it. A report will then be sent to the custodial parent, who can take steps to protect the children.

Sometimes, a child will suffer from a mental illness and the parents may differ as to the existence of the illness or for its treatment. This often results in a health care provider refusing to treat in the absence of agreement. In that case, either parent can petition the court for assistance, and an order allowing treatment.

COPYRIGHT ยฉ 2019, STARK & STARK.

This post was written by Jennifer Weisberg Millner of Stark & Stark

Read more about Divorce & Family Law on the National Law Review’s Family Law, Estate Planning and Personal Injury Legal News page

Mission Products v. Tempnology: SCOTUS Holds that Rejection of Trademark License in Bankruptcy Does Not Terminate the Right to Use the Mark

On May 20, 2019, the U.S. Supreme Court held by a vote of 8-1 that a trademark licensorโ€™s rejection in bankruptcy of a trademark license does not terminate the licenseeโ€™s right to use the licensed mark.Mission Products Holdings, Inc. v. Tempnology, LLC, No. 17-1657, 587 U.S. ___ (2019). In so holding, the Court resolved a circuit split on the issue. The Court reversed the decision of the First Circuit, which held that Tempnologyโ€™s rejection of a trademark license under the Bankruptcy Code had the effect of terminating Mission Productsโ€™ right to use the licensed marks. The Court expressly affirmed the reasoning of the Seventh Circuit inย Sunbeam Products, Inc. v. Chicago Am. Mfg., LLC, 686 F.3d 372 (7th Cir. 2012), and held that rejection of a trademark license constitutes a pre-petition breach of the license agreement but does not otherwise terminate the licensorโ€™s and licenseeโ€™s rights and obligations under the license agreement.

The Courtโ€™s opinion, authored by Justice Kagan, considered section 365 of the Bankruptcy Code, 11 U.S.C. ยง365. Specifically, the Court considered section 365(a), which permits a debtor in bankruptcy to reject any executory contract 1, and section 365(g), which provides that the debtorโ€™s rejection โ€œconstitutes a breach of such contract.โ€ 11 U.S.C. ยง365(a), (g).

In this case, the licensor, Tempnology, manufactured clothing and accessories designed to stay cool when used in exercise. Tempnology sold those products under the name โ€œCoolcoreโ€ with related logos and labels. Tempnology entered into a license agreement with Mission Products, which granted, among other things, a non-exclusive license to use the Coolcore trademark in the United States and elsewhere. In 2015, less than a year before the license was to expire, Tempnology filed a petition for bankruptcy under Chapter 11 of the Bankruptcy Code. Tempnology exercised its option under section 365(a) to reject the license agreement, as it was still executory, and the Bankruptcy Court approved the rejection. The parties agreed that the rejection had two effects. First, Tempnology could stop performing under the license agreement, and second, Mission Products could assert a pre-bankruptcy petition claim for damages 2

Tempnology argued that its rejection of the license agreement also terminated the rights it previously granted Mission Products to use the Coolcore marks. Tempnology based its argument on a negative inference it drew from the fact that, over the years, Congress had adopted provisions in section 365 that allowed the other party in a rejected contract to continue exercising its contractual rights. Of particular relevance was section 365(n), which provides that if the licensor of certain intellectual property rights, such as patents, rejects the license, the licensee can continue to use the patented technology as long as it makes the payments required under the license. 11 U.S.C. ยง365(n).  Section 365(n) specifically excluded trademark licenses. See 11 U.S.C. ยง365(n). Tempnology argued that, because section 365(n) excludes trademark licenses, a negative inference should be drawn that Congress intended for trademark licenses to terminate upon rejection.

The Court rejected Tempnologyโ€™s arguments. In so doing, the Court first relied on the language in section 365(g), which provides that a rejection constitutes a breach. While a breaching debtor can stop performing its remaining obligations under the license, it cannot rescind the license. The Court went on to note that the section 365(n) provision allowing a licensee to continue using licensed intellectual property other than trademarks was a reaction to a Fourth Circuit decision โ€“ Lubrizol Enterprises v. Richmond Metal Finishers, 756 F.2d 1043 (4th Cir. 1985) โ€“ which held that a patent licenseeโ€™s rejection of an executory contract had the effect of revoking the grant of a patent license. The Court in Mission Products explained that โ€œCongressโ€™s repudiation of Lubrizol for patent contracts does not show any intent to ratify that decisionโ€™s approach for almost all others. Which is to say that no negative inference arises.โ€ (emphasis in original).

The Court also rejected Tempnologyโ€™s arguments based on a trademark licensorโ€™s duty to monitor and exercise quality control over licensed goods and services. Tempnology argued that if rejection does not terminate the license, the debtor-licensor is forced to choose between expending scarce resources on quality control, or forgoing expending such resources and thereby risking the loss of a valuable asset, presumably because use without quality control would lead to a naked license. The Court observed that these concerns, while possibly serious, โ€œwould allow the tail to wag the Doberman.โ€ The Court explained that the ability to reject a contract under section 365 allows a debtor to escape its future contract obligations, but it does not exempt the debtor from all burdens that generally-applicable law, in this case the law on trademarks, imposes on the owner of the trademark.

Tempnology also argued that the case is moot because, it claimed, Mission Products could not recover damages.3The Court held that the case is not moot, as Mission Products would be able to recover damages. 

The Mission Products decision is important for several reasons.  First, it resolves the split that had developed between those courts holding that rejection results in a breach and those holding that rejection terminates the right to use a licensed mark. Second, resolving the split removes uncertainty faced by trademark licensors and licensees who are forced to consider what might happen if a licensor declares bankruptcy. Moreover, resolving this uncertainty avoids the need to use expensive and complex steps, such as placing licensed marks in a bankruptcy-remote entity, in order to avoid the effect of a licensorโ€™s bankruptcy. 


[1] An executory contract refers to a contract that neither party has finished performing.[2] In its opinion, the Court noted that pre-petition creditors often receive only cents on the dollar of their bankruptcy claims.

[3]The lone dissent, by Justice Gorsuch, also argued mootness on the ground that the license had already expired by the time the bankruptcy court confirmed the rejection and declared that Mission Products could not use the mark.

ยฉ 2019 Brinks Gilson Lione. All Rights Reserved.

This post was written by David S. Fleming and Emily Kappers of Brinks Gilson Lione.

Tours in Trouble: Rock Stars and Insurance Recovery

Touring is where profits lie for todayโ€™s successful recording artists, with considerable sums expended on venues and staging to bring an artistโ€™s music to his or her fans.ย But the list of things that can go wrong before and during a tour is almost endless.

Thatโ€™s why artists, tour companies, and record labels purchase various forms of tour insurance to mitigate the risk from postponements or cancelations caused by a variety of circumstances.ย Often, those purchasing tour insurance have considerable influence over what harms are covered and the terms under which reimbursement will be provided. Unforeseen disasters can result in losses to the tune of millions of dollars if proper insurance is not obtained and handled carefully.

Three sources of tour insurance claims are particularly important: natural disasters, terrorism, and artist illness. As we outline below, tour profitability depends upon understanding these threats and choosing effective strategies to mitigate them or avoid them entirely.

Coverage for Natural Disasters

Just like any other event, tours planned months or years in advance are susceptible to natural disasters such as earthquakes, hurricanes, and floods.ย However, even when tour insurance is purchased, receiving coverage for tour cancelations or postponements on this basis is not automatic.

For example, many โ€œnon-appearanceโ€ insurance policies contain exclusions that could be construed to eliminate coverage for certain kinds of disasters.ย One such provision is the โ€œadverse weatherโ€ exclusion, which commonly excludes coverage for outdoor performances affected by rain, wind, or other similar meteorological incidents.ย Also common is language restricting coverage to certain enumerated perils and requiring that a covered peril be the โ€œsole and direct causeโ€ of any non-appearance.ย How such policy language is interpreted in the case of a hurricane or tropical storm, for instance, may make the difference as to whether an artist is compensated under his or her tour insurance policy.

Coverage for Acts of Terrorism

Just as threatening to tour profits as natural disasters are those postponements or cancelations caused by acts of terror.ย The attacks in Las Vegas during Jason Aldeanโ€™s performance, those in Manchester, England outside Ariana Grandeโ€™s show, and those at the Eagles of Death Metal performance at the Bataclan club in Paris, France highlight that terrorism is a very real threat to music artists.

However, even if an artistโ€™s tour is insured, acts of terrorism are often excluded unless specifically added by an amendment to insurance policies called an endorsement, which can be quite expensive.ย  Moreover, terrorism coverage policy language varies, with certain provisions requiring an attack to have taken place, whereas others provide coverage if a tour is postponed or canceled based on the threat of an attack.ย Still other policies that purport to cover cancellations due to terrorist acts limit coverage based on how long after or how far away from an attack or threatened attack the tour is scheduled to take place.ย For instance, the Foo Fighters canceled the remainder of their European tour in Spain and Italy in the wake of the Paris bombing in 2015.ย However, the Foo Fightersโ€™ insurers initially refused to reimburse them for these losses under their applicable tour insurance policies (which included terrorism coverage), apparently because the insurers considered the future shows too far away from the date and site of the Paris attack.ย After much publicity and costly litigation, the lawsuit was eventually settled on confidential terms.

Coverage for Artist Illness

Tour events are also canceled due to artist illness.ย Often, an insurerโ€™s response to a claim based on artist illness depends on the nature of the illness and what the artist said in underwriting materials submitted to the insurers.ย  It is not uncommon for coverage disputes to center around the accuracy of medical reports submitted by artists to insurers.ย For instance, Linkin Park canceled parts of a tour in 2008 due to their then-frontmanโ€™s back issues.ย Nickelback was forced to cancel part of their 2015 No Fixed Address tour due to polyps discovered on their lead singerโ€™s throatย  In both instances, the bandsโ€™ tour insurance claims were denied based on alleged inaccurate medical reporting in the underwriting materials submitted to the insurers. And in both cases, the bands were forced to resort to litigation based upon alleged failures to disclose existing medical issues.

Sometimes, an artistโ€™s tour is postponed or canceled but the artist and insurers do not agree on the cause. Not surprisingly, this can lead to coverage disputes.ย  For example, Kanye Westโ€™s cancelation of his 2016 Saint Pablo tour resulted in two lawsuits, with West claiming he suffered a โ€œdebilitating medical conditionโ€ and his insurers insinuating the cancelation was due to drug use and mental health issues (both of which were excluded under the policy).ย The last of the suits ultimately settled in February 2018, but not before myriad news outlets reported on the partiesโ€™ allegations, including leaked details about Westโ€™s medical history.

Strategies to Mitigate or Avoid Coverage Threatsย 

These examples only scratch the surface of the many reasons a tour may be postponed or canceled, and the ways in which this can complicate insurance recovery.ย  Different strategies should be applied depending on individual challenges, but all involve careful scrutiny of the governing policy language.ย  The best time for such scrutiny is during negotiation of the policy itself, when experienced counsel can advise on coverage gaps or language that might cause trouble for touring artists.

Also key is carefully shaping the public narrative for any tour postponement or cancelation.ย This is particularly true in the context of postponements or cancelations where the cause may be disputed.ย  Effective counsel can assist in rapidly coordinating the actions of doctors, the media, and the artist to ensure a consistent message and head off potential pretextual coverage denials from insurers.

As the Ramones sang, โ€œhigh risk insurance, the time is right.โ€

ยฉ 2019 Gilbert LLP
This post was written by Benjamin W. Massarsky and Kellyn Goler of Gilbert LLP.

The Digital Millennium Copyright Act: Scope, Reach, and Safe Harbors

With businesses engaging in increasingly more commerce over the internet, it is crucial to understand the consequences of displaying, using, and transferring another entityโ€™s works online. Enterย The Digital Millennium Copyright Act (DMCA) of 1998, which was signed into law by President Clinton to keep pace with the new realities of internet technology and commerce. The Act sought to protect intellectual property rights while simultaneously advancing the growth and development of e-commerce.

The DMCA is divided into five titles.

  • Title I implements the 1996 World Intellectual Property Organization (WIPO) treaties and makes it unlawful to manufacture or distribute products, services, or technologies that can be used to circumvent any technological measures intended to control access to copyrighted works, such as passwords or encryptions.
  • Title II contains various โ€œsafe harborsโ€ for internet service providers (ISPs) that limit their liability for direct, contributory, or vicarious copyright infringement.
  • Title III creates an exemption from infringement liability for computer program copying conducted for purposes of repair, diagnosis, or troubleshooting.
  • Title IV contains miscellaneous provisions for items such as ephemeral recordings and the transfer of rights to motion pictures.
  • Title V creates a new form of protection for vessel hull designs, overturning the United States Supreme Courtโ€™s Bonito Boats decision, which denied copyright protection to such boat designs.

Under the DMCA, ISPs such as AT&T, Comcast Xfinity, and Verizon, cannot be held liable for copyright infringement when they neither know, nor have reason to know, that they are providing internet services to a website that is engaged in copyright infringement. The safe harbors include:

  • A โ€œstorage safe harborโ€ that protects an online service providerโ€™s hosting and storing, and makes available infringing matter stored at a third-party userโ€™s direction.
  • A โ€œtransmission safe harborโ€ that protects the transmitting or providing of a connection to infringing material, typically evoked by telecommunications companies.
  • A โ€œcaching safe harborโ€ that protects an ISP from liability for intermediate and temporary storage of a third-partyโ€™s infringing material on a system or network either controlled or operated by the service provider or for the service provider.
  • A safe harbor for search engine websites that protects the linking or referring of users to online third-party locations with infringing material. In order for providers to invoke this protection, internet providers must make an ongoing investigation of their usersโ€™ material, โ€œtake downโ€ any infringing material once they are made aware of the infringement and inform any of their subscribers of the illegal consequences of making use of that infringing material through, for example, a set of terms and conditions that appear on the site.

In light of the safe harbors, it is important to note what the DMCA does not protect against โ€“ trademark infringement, unfair competition, rights of publicity, invasion of privacy, defamation, foreign law copyright claims, the ISPโ€™s own, directly infringing activities, and any collusion between ISPs and third parties to create infringing material. ISPs must therefore continuously monitor third-party conduct in addition to its own conduct to prevent any activity that could lead to liability or loss of an affirmative defense to copyright infringement.

Two recent cases illustrate the complexities of the DMCA. In Disney Enterprises Inc. et al. v. VidAngel Inc., a federal appeals court affirmed an injunction that shut down VidAngel, a web service that lets users stream Hollywood films without seeing nudity or violence. VidAngel essentially purchased authorized copies of DVDs and Blu-ray discs, decrypted one disc of each film to create a digital, unauthorized copy of the work, removed objectionable violent or obscene content from its created copy, and streamed a filtered version of the copy to its customers. Finding that VidAngel infringed on the studiosโ€™ copyrights and violated the ban on circumvention of digital encryption measures (VidAngel bypassed locks on the physical discs in order to upload and stream the movies), the district court issued a preliminary injunction to stop the company from streaming the altered films.

On appeal, the Ninth Circuit Court of Appeals sided with the district court despite VidAngelโ€™s arguments that its actions were lawful because, as purchasers of the DVDs and Blu-ray discs, it was authorized by the Studios to decrypt the technical protection mechanisms installed to view the discsโ€™ contents. The law, however, distinguishes between those entities the content owner authorizes to circumvent the access controls and those the owner authorized to access the work. Falling into the latter category, VidAngel was not be able to claim exemption from copyright liability under DMCAโ€™s safe harbor provisions. The takeaway for business owners is that the DMCA cannot be used as a shield by purchasers of copyrighted works who use them for unlawful copying and dissemination.

In another case, Mavrix Photographs, LLC v. LiveJournal, Inc., 873 F.3d 1045 (9th Cir. 2017), a celebrity photography company that sells its photographs to celebrity magazines brought suit against LiveJournal for posting 20 of its copyrighted photographs online.

LiveJournal is an online platform where users create and run communities to post and comment on content. LiveJournal utilized the help of three unpaid administrative roles:

  1. โ€œModeratorsโ€ who reviewed posts submitted by users to ensure compliance with company rules;
  2. โ€œMaintainersโ€ who reviewed and deleted posts and who had the ability to remove moderators; and
  3. โ€œOwnersโ€ who removed maintainers and monitors.

The district court held that the DMCAโ€™s safe harbor provision protected LiveJournal from liability since the photos were stored at the direction of its users and not LiveJournal itself. On appeal to the Ninth Circuit, however, using principles of the law of agency, the court ruled that the moderators might be โ€œagentsโ€ of the websites they police and could lose DMCA safe harbor immunity if they permit infringing content to be posted. The court stated that moderators were provided with specific directions from LiveJournal, and LiveJournal employees substantively supervised, selected, and removed the moderators. On the other hand, moderators were also free to stop working for LiveJournal and volunteer their time elsewhere. Nonetheless, the court vacated the lower courtโ€™s order denying discovery of the moderatorsโ€™ identities because it believed that the newfound, possible agency relationship impacted the decision to conceal the moderatorsโ€™ identities.

The implications of theย LiveJournalย decision remain unclear. Some have criticized the holding as inconsistent with the DMCA framework because the statute was enacted to create a safe harbor that broadly protects service providers for material storedย at the directionย of its users, not literally for material stored directlyย byย users themselves. But going forward, internet businesses and content providers who previously approved and monitored posts the way LiveJournal did may consider opting to forego such thorough oversight of its usersโ€™ posted content if they believe they would be unable to assert a safe harbor defense to copyright infringement.

COPYRIGHT ยฉ 2019, STARK & STARK

This post was written by Gene Markin of Stark & Stark Law Firm.

Read more news on the Digital Millennium Copyright Act on the National Law Review’s Intellectual Property page.

Are Uber Drivers Employees?

With the advent of ridesharing services, there is an extremely large number of drivers for those companies out on the roads. But are drivers for Uber and similar companies โ€œemployeesโ€? Over the years these companies have taken the position the drivers are not employees but rather independent contractors. The Office for the General Counsel of the National Labor Relations Board (NLRB) recently weighed in on this issue, and he agrees with Uber.

In a recently released advice memo, the board concluded that Uber drivers are independent contractors under the National Labor Relations Act (NLRA). When analyzing the relationship between Uber and its drivers, the memo states that it needed to primarily evaluate: โ€œ(1) the extent of the companyโ€™s control over the manner and means by which drivers conduct business and (2) the relationship between the companyโ€™s compensation and the amount of fares collected.โ€ Looking at those factors, the board held:

โ€œConsideration of all the common-law factors, viewed through the โ€˜prism of entrepreneurial opportunity,โ€™ establishes that UberX drivers were independent contractors. The drivers had significant entrepreneurial opportunity by virtue of their near complete control of their cars and work schedules, together with freedom to choose log-in locations and to work for competitors of Uber. On any given day, at any free moment, drivers could decide how best to serve their economic objectives: by fulfilling ride requests through the App, working for a competing ride-share service, or pursuing a different venture altogether. As explained in detail below, these and other facts strongly support independent-contractor status and outweigh all countervailing facts supporting employee status.โ€

The memo arrived at the same conclusion for UberBLACK drivers โ€“ another category of driver โ€“ based on the same analysis. The NLRBโ€™s newly restored test for evaluating independent status was cited extensively.

Independent contractor status poses significant consequences under the NLRA because such workers are not covered under the act. This means they cannot form unions or seek redress for any alleged violations of the NLRA. However, employers must take care to ensure they do not misclassify workers as independent contractors because that can pose significant legal risk. This new advice memo sets forth a potential roadmap for companies desiring to use an independent contractor model, at least when it comes to the NLRA.

 

ยฉ 2019 BARNES & THORNBURG LLP
This post was written by David J. Pryzbylski of Barnes & Thornburg LLP.
Read more about employee classification on the National Law Review’s Labor and Employment page.

U.S. Increases Tariffs On Chinese Imports

The president announced this week that special Section 301 tariffs on $200 billion of Chinese imports (List 3) will increase from 10% to 25%. The Office of United States Trade Representative (USTR) issued theย official notice of the tariff increaseย May 8. The rate increase is effective on May 10, 2019.

List 3 is composed of about 6,000 different Harmonized Tariff Schedule of the United States (HTSUS) codes and $200 billion worth of imports; comparatively, the previously imposed List 1 and List 2 collectively cover approximately 1,000 HTSUS codes and $50 billion worth of imports from China.

This rate increase will have a massive effect on almost all industries that rely on imports from China, including agriculture, automotive, electronics, textiles, and energy, just to name a few.

Two other things of particular note from the notice:

(1) increased tariffs will be applied to goods entered for consumption (or withdrawn from warehouse for consumption) on or after 12:01 a.m. Eastern time on May 10, 2019,ย andย exported from China on or after May 10, 2019, so goods that were on the water prior to May 10 will not be affected.

(2) USTR indicates that it will promulgate a product exclusion process in the near future so importers, purchasers, trade associations and other interested parties can request that certain products be excluded from the tariff. Domestic producers will also have the opportunity to object to such exclusion applications.

 

ยฉ 2019 BARNES & THORNBURG LLP
You can learn more about trade and tariffs on the National Law Review Global Page.