Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the login-customizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131
The National Law Forum - Page 449 of 753 - Legal Updates. Legislative Analysis. Litigation News.

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the year 2015 has IoT enthusiasts particularly exerted. This year, IoT has taken center stage at many conferences around the world, including the Consumer Electronics Show (CES 2015), SEMI CON 2015, and Createc Japan, among others.

1. IoT will Redefine the Expectations of Privacy

Privacy is of utmost concern to consumers and enterprises alike. For consumers, the deployment of IoT devices in their homes and other places where they typically expect privacy will lead to significant privacy concerns. IoT devices in homes are capable of identifying people’s habits that are otherwise unknown to others. For instance, a washing machine can track how frequently someone does laundry, and what laundry settings they prefer. A shower head can track how often someone showers and what temperature settings they prefer. When consumers purchase these devices, they may not be aware that these IoT devices collect and/or monetize this data.

The world’s biggest Web companies, namely, Google, Facebook, LinkedIn, and Yahoo are currently involved in lawsuits where the issues in the lawsuits relate to consent and whether the Web companies have provided an explicit enough picture of what data is being collected and how the data is being used. To share some perspective on the severity of the legal issues relating to online data collection, more than 250 suits have been filed in the U.S. in the past couple of years against companies’ tracking of online activities, compared to just 10 in the year 2010. As IoT devices become more prevalent, legal issues relating to consent and disclosure of how the data is being collected, used, shared or otherwise monetized will certainly arise.

2. Data and Device Security is Paramount to the Viability of an IoT Solution

At the enterprise level, data security is paramount. IoT devices can be sources of network security breaches and as such, ensuring that IoT devices remain secure is key. When developing and deploying IoT solutions at the enterprise level, enterprises should conduct due diligence to prevent security breaches via the IoT deployment, but also ensure that even if an IoT device is compromised, access to more sensitive data within the network remains secure. Corporations retain confidential data about their customers and are responsible for having adequate safeguards in place to protect the data. Corporations may be liable for deploying IoT solutions that are easily compromised. As we have seen with the countless data breaches over the past couple of years, companies have a lot to lose, financially and otherwise.

3. Immediacy of Access to Data and Fog Computing

For many IoT solutions, timing is everything. Many IoT devices and environments are “latency sensitive,” such that actions need to be taken on the data being collected almost instantaneously. Relying on the “cloud” to process the collected data and generate actions will likely not be a solution for such IoT environments, in which the immediacy of access to data is important. “Fog computing” aims to bring the storage, processing and data intelligence closer to the IoT devices deployed in the physical world to reduce the latency that typically exists with traditional cloud-based solutions. Companies developing large scale IoT solutions should investigate architectures where most of the processing is done at the end of the network and closer to the physical IoT devices.

The Internet of Things has brought about new challenges and opportunities for technology companies. Privacy, security and immediacy of access to data are three important trends companies must consider going forward.

© 2015 Foley & Lardner LLP

Congress to Examine Russia’s Role in the Crises in Syria and Ukraine; The First Lady Travels to Qatar and Jordan

Syrian and Iraqi Crises

Secretary of State John Kerry delivered remarks on U.S. Middle East policy last Wednesday at the Carnegie Endowment for International Peace.  The Secretary called on the Russian Government to contribute to the end of the Syrian conflict, including through a political settlement.  He also highlighted areas where the United States, Russia, and others agree, which include the fact that Daesh cannot be victorious and that a secular and united Syria must be preserved.  That same day, Deputy Secretary of State Antony Blinken warned that Russia cannot win in Syria, adding it can perhaps prevent Assad from losing.  Earlier in the week, the press reported that Russia has sent a few dozen special operations troops to Syria, redeploying the elite units from Ukraine as the Kremlin shifts its focus to supporting the Syrian regime.

Secretary Kerry then headed to Vienna, Austria, for another round of multilateral talks regarding the Syrian conflict, talks that will for the first time include Iran. At his Senate Foreign Relations Committee confirmation hearing to be Under Secretary of State for Political Affairs, State Department Counselor Tom Shannon testified that Secretary Kerry was convening the meeting in Austria to ascertain Russia’s commitment to fighting ISIL and to finding a political solution to the crisis that does not include Syrian President Bashar al-Assad.  This comes after Secretary of Defense Ash Carter signaled last Tuesday that the Administration is considering deploying a small number of special operations forces to Syria and attack helicopters to Iraq to build momentum in the fight against ISIL.

  • On Wednesday, 4 November, the House Foreign Affairs Committee is expected to hold a hearing titled, “U.S. Policy after Russia’s Escalation in Syria.”

  • On Wednesday, 4 November, the House Foreign Affairs Subcommittee on Europe is expected to hold a hearing titled, “Challenge to Europe: The Growing Refugee Crisis.”

Ukraine Crisis

Last Monday, the White House and State Department issued statements commending Sunday’s elections in Ukraine and calling for votes on 15 November in Mariupol and in other parts of eastern Ukraine where the elections could not take place.

Commerce Secretary Penny Pritzker travelled to Ukraine early last week to meet with Government officials and to discuss ongoing economic reforms.  She reiterated U.S. support for Ukraine and announced that President Obama, working with Congress, intends to move forward with a third $1 billion loan guarantee for Ukraine in the coming months.  This, she said, fulfills a U.S. commitment to consider providing a third $1 billion loan guarantee in late 2015, if the conditions warrant.

The press reported last week that NATO is considering proposals to deploy 4,000 troops to Eastern European countries bordering Russia.  The proposals are apparently part of an ongoing debate within the Alliance about the long-term response to Russia’s 2014 annexation of Crimea and its support for the separatist uprising in eastern Ukraine.

  • On Tuesday, 3 November, the Senate Foreign Relations Committee is expected to hold a hearing titled, “Putin’s Invasion of Ukraine and the Propaganda that Threatens Europe.”

NDAA – Avenues Sought

After the presidential veto, Congressional leaders are looking for options to advance the Fiscal Year (FY) 2016 National Defense Authorization Act (NDAA; H.R. 1735).   Some sources report that Senate Armed Services Chairman John McCain (R-Arizona) may be considering drafting a revised NDAA that could be attached to an Omnibus appropriations measure that will likely move later next month or early December.  However, some Members are reportedly advocating for a revised NDAA – one that reflects the $5 billion in cuts mandated by the Budget deal – to be passed quickly and not delayed until Congress takes up the expected Omnibus bill.

TPP Update

Last Thursday, Agriculture Secretary Tom Vilsack sought to explain the delay around publicly releasing the final text of the Trans-Pacific Partnership (TPP), attributing it to the Canadian election.  Reports around Washington indicate the release of the text is weeks away.  At a Thursday press conference, Representative Rosa DeLauro (D-Connecticut) called on the White House to “stop selling something [TPP deal] that nobody but them knows about.”  Meanwhile, Senate Finance Committee Ranking Member Ron Wyden (D-Oregon) praised the Office of the U.S. Trade Representative (USTR) last Thursday for issuing new guidelines that allow the Committee Members’ personal staff to access the text of the deal.

Ex-Im Bank Re-Authorization Advances

Early last week, the House of Representatives passed a measure to reauthorize the U.S. Export-Import (Ex-Im) Bank by a vote of 313-118 over the objections of the chamber’s most conservative Republican members.  Senate Majority Leader Mitch McConnell (R-Kentucky) blocked the measure from being brought to the floor as a standalone bill last week and instead reiterated the bill will have to be attached to another legislative vehicle expected to advance in the Senate.

Washington Prioritizes TTIP

U.S. Trade Representative Michael Froman confirmed last Tuesday at an Atlantic Council event that last month’s conclusion of the TPP deal allows USTR to shift its focus to advancing and accelerating the Transatlantic Trade and Investment (TTIP) negotiations with the European Union.  That same day, SPB released a client alert on Washington’s shift to TTIP.

U.S.-India Trade Policy Forum

Last week, the U.S.-India Trade Policy Forum convened in Washington to discuss agriculture, trade in services and goods, promoting investments in manufacturing, and intellectual property.

Other Congressional Hearings This Week

  • On Tuesday, 3 November, the Senate Armed Services Committee is expected to hold a hearing titled, “Future of Warfare.”

  • On Tuesday, 3 November, the House Energy and Commerce Committee is expected to hold a hearing titled, “Examining the EU Safe Harbor Decision and Impacts for Transatlantic Data Flows.”

  • On Tuesday, 3 November, the House Judiciary Committee is expected to hold a hearing titled, “International Data Flows: Promoting Digital Trade in the 21st Century.”

  • On Tuesday, 3 November, the House Armed Services Subcommittee on Seapower and Projection Forces is expected to hold a hearing titled, “Aircraft Carrier – Presence and Surge Limitations. Expanding Power Projection Options.”

  • On Wednesday, 4 November, the House Foreign Affairs Subcommittee on Global Human Rights is expected to hold a hearing titled, “Demanding Accountability: Evaluating the 2015 Trafficking in Persons Report.”

  • On Wednesday, 4 November, the Senate Foreign Relations Committee is expected to hold a hearing titled, “U.S. Policy in North Africa.”

  • On Wednesday, 4 November, the House Ways and Means Subcommittee on Oversight is expected to hold a hearing titled, “Iran Terror Financing and the Tax Code.”

  • On Friday, 6 November, the House Foreign Affairs Subcommittee on the Western Hemisphere is expected to hold a hearing titled, “Deplorable Human Rights Violations in Cuba and Venezuela.”

Looking Ahead

Washington will likely focus on the following upcoming matters:

  • 1-7 November: First Lady Michelle Obama travels to Doha, Qatar, and Amman, Jordan

  • 9 November: President Obama hosts Israeli Prime Minister Benjamin Netanyahu

  • 14-22 November: President Obama travels to Turkey, the Philippines, and Malaysia

  • 30 November-11 December:  U.N. Global Climate Conference in Paris

  • 15-18 December: 10th WTO Ministerial Conference to be held in Nairobi, Kenya

© Copyright 2015 Squire Patton Boggs (US) LLP

October 2015 – gTLD Sunrise Periods Now Open

The first new generic top-level domains (gTLDs, the group of letters after the “dot” in a domain name) have launched their “Sunrise” registration periods.

As of the date of this post, Sunrise periods are open for the following new gTLDs:

.pohl

.allfinanz

.trading

.spreadbetting

.cfd

.swiss

.xn--45q11c (八卦 for “gossip” in Chinese)

.forex

.broker

.earth

.gdn

.kyoto

.feedback

ICANN maintains an up-to-date list of all open Sunrise periods here. This list also provides the closing date of the Sunrise period. We will endeavor to provide information regarding new gTLD launches via this monthly newsletter, but please refer to the list on ICANN’s website for the most up-to-date information – as the list of approved/launched domains can change daily.

Because new gTLD options will be coming on the market over the next year, brand owners should review the list of new gTLDs (a full list can be found here) to identify those that are of interest.

© 2015 Sterne Kessler

Rainmaker 101: 3 Tips from a Top Producer at a Law Firm [VIDEO]

One of the most interesting elements of my job as a business development coach for attorneys is interviewing top rainmakers to better understand “How they did it.” While every attorney knows a rainmaker or high-level business developer, you might never get the chance to hear how they actually accomplished their goals, what it really took to do so and how to avoid the pitfalls they’ve encountered. One of my first interviews occurred with the Managing Partner and co-founder of Stahl Cowen, Jeff Stahl. He put everything on the line when he went out on his own.  As he stated in our interview, it was “a combination of need and fear,” to begin developing his book of business. Here are Jeff’s top three tips for success in building his legal practice, followed by some of my own thoughts on the subject.  Jump to the end for the full interview. Enjoy!

Jeff’s Tip #1: Helping versus Selling

Jeff’s first and most important revelation as a business developer was to really want to help people, not to sell them legal services.  He says quite empathetically that it’s imperative to, “Recognize when someone is in need of service and then be there, and be creative to help them. Then it isn’t perceived as a sale, but as assistance that usually has greater receptivity than somebody who is hard selling.”

From my point of view, he is touching on one of the critical turning points for attorneys as it relates to sales and being viewed as a “salesman.” I don’t know too many lawyers who like or want to be seen as a salesman. What Jeff explains so clearly in his interview is that you need to switch off that mindset and turn on the idea that you are in the unique position to help people with real problems. The key here is to try not pitching and selling, but rather try asking and listening.

One of my favorite mantras is, “Prescription before diagnosis is malpractice.” Think about that. If you walked into a doctor’s office with a migraine and he suggested amputating your head, I’m sure you’d move pretty quickly to the nearest exit. The same rule should apply to prescribing legal services in the form of a pitch meeting. Just don’t do it! At least not until you’ve fully diagnosed the issues, needs and pains the prospective client is dealing with.

Jeff’s Tip #2: Market Yourself When You’re Busiest

If I’ve heard it once, I’ve heard it 1000 times, “I’m too busy to market myself.” One of the best take-aways from Jeff’s interview was his statement, “Too many people go out and market when they’re slow. You need to market when you are busy, because when you market when you’re slow, you often appear desperate. That comes across and people realize that.” Even when you’re working 60 hours a week, it’s imperative to find ways to market. If nothing comes in right away from the effort, at least you’re building your pipeline which will pay off when things do slow down.

In my experience, the key to success here is to find the time to market by getting organized with your day and opening up gaps of time for business development. A few suggestions I typically offer include:

  • Time blocking- Get into the office at 6:30 am once a week and spend an uninterrupted hour emailing clients, strategic partners and new people you’ve met to schedule a coffee or lunch sometime in the next few weeks. This one hour block of time each week will help ensure that you get meetings set every week without fail.
  • Delegating more- Do everything in your power to delegate administrative tasks to others at a lower billable rate. If you are billing $300-600 an hour, why are you making copies or doing filing? Try making a list of every administrative task that you do and add up the hours in a week. You might be shocked at how much time you’re wasting on activities that can be done for under $50 an hour by someone else. This “found time” can be better used for business development activities or even going home for supper with your family once in a while.
  • Never eat lunch alone- It’s the title of a great networking book for a reason. Schedule lunch at your office and invite someone to join you. Utilize a conference room so that it’s quiet and you can focus the conversation on your guest. If you did this with two of your existing clients or strategic partners every week, you will be delighted to the results you might see. Working during lunch might be helpful to get things done, however it doesn’t have to be your routine every day.

Jeff’s Tip #3: Be Impressive!

“When a client tells you what their issue is, it isn’t always their issue. Through effective listening you may recognize things that they may not even realize themselves.” Effective questioning and listening is not only important as a way to best service the client, but also as a way of differentiating yourself from other attorneys who aren’t focused on the clients story, needs and issues. From Jeff’s perspective it’s more important to be perceived as impressive and knowledgeable, than to beat your chest regarding your prowess as a successful attorney.

Jeff’s  hit on something really critical here. Perception is reality and belief stronger than fact. The concept is simple if you think about it. By asking relevant, probing and open ended questions, the prospective client will perceive that you are an expert based on the way you are managing the conversation and your bedside manner. A great example here would be observing two psychologists. The first spouts off about why she is so good at what she does and her advanced degrees. The other, warmly welcomes her patient onto the couch and begins building rapport. Then the second psychologist begins asking questions about the patients reason for being here today. The patient’s response is followed up with additional questions which open up the dialogue to reveal the actual issues being faced.

If you are working diligently to find new business opportunities, and a prospective client finally agrees to meet with you, try to act like the second therapist by asking questions and being an expert listener. You will not only build greater credibility as a lawyer, but also uncover issues that your new client didn’t even know he had. A win-win outcome is inevitable.

I’d like to thank Jeff Stahl for his rainmaking insights. The reality is that there is always a way to find balance in work and in life. For many of you, it’s a matter of having the proper mindset. For others it’s obtaining new strategies and tactics to accomplish the goals you’ve set. Check in monthly for a new installment of Rainmaker 101 for more tips from the business development superstars I’ve interviewed.

Article By Steve Fretzin of Sales Results, Inc.
Copyright @ 2015 Sales Results, Inc.

Business Succession Planning: An Ounce of Prevention Today

If you told a family business owner that he or she had a one in three chance of survival as a result of a current condition, you would likely get their attention. However, when you tell that same owner that their business, as it currently exists, has a one in three chance of survival in the event of their death the response is often “I will worry about that tomorrow.” The failure to plan may put the family’s financial well-being at risk. This article will address the conflicts that cause family businesses to fail to survive into successive generations and the potential solutions which should be implemented to alleviate such conflicts.

Why Do Family Businesses Fail?

Family businesses fail twice as often because of relationship issues within the family as due to management issues. Which child or children will work in the business and which will not? Which child will be in charge? Will all family members be supported by the business and what internal and external resentments will be heightened by that decision? If the head of the family does not effectively balance the goals of securing the future success of the business with family unity, survival is unlikely. Recognizing the disparate characteristics between family operations and business operations is a start. Families are fueled by emotion and businesses are fueled by logic. Families rely on history and are resistant to change whereas businesses need to adapt and grow. Families accept shortcomings and rationalize poor performance while businesses fire those who are unproductive. Families seek equality while businesses reward achievement. Acknowledging and addressing these conflicts is essential to a successful business succession plan.

Developing the Plan.

1. Identifying Objectives. The first decision to be made by the business owner is the identification of goals and objectives. What does the owner want to happen; i.e., sale versus transfer by gift. When should it happen, today, five years from now or only on death? How should it happen, gifts, sale, inheritance? Who should be involved, children employed by the business only, all children, descendants, in-laws?

2. Identifying Financial Needs. The financial needs of the business owner and spouse will often be determinative with respect to the previously-mentioned objectives. If the business is the owner’s primary asset and therefore the primary method for funding retirement, then value realization is key. The threshold question is what is the business worth? Owners often have an elevated opinion as to the business’s value given it is the culmination of their life’s work. A professional business appraiser will value the business more objectively. The next question is will the realization of that value adequately fund the owners’ expected level of retirement? Finally, on what basis will those funds need to be paid, how does the owner insure future security, and will the business survive under the weight of those payments?

3. Developing Successor Management. It is often difficult for an owner to relinquish day-to-day control. However, the development of successor management is essential for emergency as well as long-term planning. An emergency plan should be established utilizing existing personnel and outside professional advisors such as accountants, attorneys and financial advisors. A long-term plan may include the next generation of family members, key employees or some combination of the two. The formulation of this plan should commence five to ten years in advance of the date of the owner’s retirement. If the future leader is a family member, it is important that he or she be qualified for the position and have the support of employees and other family members. A gradual transition will allow for the development of the successor’s capabilities. Further, as the successor becomes more accustomed to increased responsibility the existing owner can adapt to the loss of responsibility. Such advance planning will more likely result in a smooth transition.

4. Retaining Key Employees. Family businesses often have a few key employees who are critical not only to the eventual succession of the leadership of the business but also to the emergency plan that should be in place in the event of the death or disability of the leader. The following four techniques can be utilized to retain key employees.

a. Employment Agreements. An Employment Agreement will summarize the duties and responsibilities of the employee. However, to encourage retention, the Agreement can also incorporate legal restrictions such as a covenant not to compete and financial incentives such as profit sharing or incentive compensation arrangements. These financial incentives can also utilize vesting periods to encourage continued employment and productivity.

b. Non-qualified Deferred Compensation Plan. A Deferred Compensation Plan is an agreement where the company promises to pay a benefit to the employee at his or her retirement, death or disability as long as the employee continues to be employed for a stated period of time or if the employee is employed upon the sale of the business. If the employee does not continue to be employed, the benefit is forfeited. If properly structured, the payments are taxed to the employee and deducted by the company at the time of payment.

c. Phantom Stock Plan. A Phantom Stock Plan or Stock Appreciation Rights Plan will provide an employee with a benefit that will simulate the appreciation in value of a common stock ownership in the company during the period the employee is employed. This arrangement will compensate the employee for his or her contribution to the success and increasing the value of the company. Vesting provisions can also be utilized to retain the services of the employee. Finally, such a plan avoids the entanglements that can come with true stock ownership by an employee such as voting rights, possible breach of fiduciary duty claims and the obligation to repurchase the stock upon termination of employment.

d. Change of Control Agreement. A Change of Control Agreement can be utilized with the previously-mentioned arrangements to provide comfort to an employee that his or her terms of employment such as compensation and benefits will not be changed for a set period (one to three years) following the transfer of the business. Even if the employee is terminated, the Agreement will guarantee continued payment or a bonus for continuing to be employed with the business until the sale.

Executing the Plan.

The key to effectively executing the plan is balancing the owner’s financial security with fairness and family harmony. The following are alternatives and considerations:

1. Sell the Business to Active Children. If the business is sold to active children for its fair market value as determined by an independent appraiser, then all family members are effectively treated equally. The purchasing children get the business, the financial future of the owner and the owner’s spouse is secured and upon the death of the survivor of them, both active and non-active children can inherit equally. The issues of conflicting opinions and the disparate needs of active and non-active children are eliminated. The downside of this approach is its tax inefficiency. The owner will recognize capital gains and the active children will purchase with after-tax dollars.

2. Business Real Estate. If the owner owns the real estate on which the business is operated, the owner could consider retention of the business real estate subject to a long-term lease. The lease would provide the owner and the owner’s spouse with a continuing source of income. Retention of the business real estate could also provide an asset for the equalization of the inheritance of non-active children. Finally retention of this asset would reduce the lifetime transfer cost of the business interest to the active children.

3. Voting and Non-Voting Stock. Whether the owner of the business wants to transfer ownership currently or needs to use the business to equalize the inheritance of active and non-active children at death, consideration should be given to recapitalizing the company with voting and non-voting stock. Active children can receive the voting stock to allow for the effective management of the company and non-active children can receive the non-voting stock to allow for the continued participation in the growth of the value of the company. Active children should have Employment Agreements to ensure them fair compensation and protect non-active children from the misdirection of company assets. The non-voting stock could be subject to “call” options by the active children and could be subject to a “put” option by the non-active children to allow for a fair separation of interests should one be necessary. A “buy-sell” agreement between the shareholder children can incorporate the “put” and “call” as well as the transfer on death or disability of a shareholder child.

4. Equalize with Non-Business Assets. If there are sufficient non-business assets in the estate of the owner, then equalization of inheritances is more easily accomplished. Ownership interests in the business can be transferred during life or at death to active children and the non-business assets can be transferred to the non-active children. Since all assets are valued at fair market value at death, equality can be made more apparent.

5. Tax Minimization. Although financial security and family fairness are often the primary goals of succession planning, tax minimization is normally also a high priority. Various planning techniques can be incorporated in the context of succession planning discussed above.

Conclusion.

Succession planning does not happen by accident. Successful planning for the termination of ownership of a business interest should be started well in advance of when the ownership will be terminated.

© Copyright 2015 Murtha Cullina

Using Phantom Equity to Grow Your Business: Pros and Cons

phantom equityThis is the second article in a series examining when an entrepreneur should consider granting equity or equity-like interests in his or her company, and if so, how to properly structure that equity or equity-like grant.  To view the first article in this series, please click here.  Today’s topic: Phantom Equity.

Phantom Equity Overview

Phantom equity is an equity-like grant that is tied to the underlying value of a unit (if the company is an LLC) or a share of stock (if the company is a corporation) in the company. More often than not, phantom equity is granted pursuant to a phantom equity plan, with individual phantom equity agreements for each of the applicable employees/executives.  The individual phantom equity agreements will likely have some customized terms for each particular employee (number of units, vesting schedule, etc.), while other terms are usually standard across each of the phantom equity agreements (rights to certain payments, forfeiture upon termination, rights to certain information, etc.).

An example may be helpful.  Let’s assume there are 100 units issued and outstanding to the members of an LLC prior to creating the phantom equity.  Then, 10 “phantom units” are granted to key employees pursuant to a phantom equity plan.  The end result is that the phantom unit holders would receive an amount equal to 9.09% (10 units out 110 units total) of certain payments made to the real unitholders (the holders of the 100 units) of the company.  The key fact to remember is that these phantom units are not actual units of equity in the company, but they are counted as if they are actual units for purposes of certain payment or events of the company.

Vesting

Generally, phantom units or shares are not paid for by an employee, but instead vest over time in exchange for the employee continuing to work full-time at the company during such vesting period.  Typically, I see a one year cliff (from the first date of employment), then vesting in monthly or quarterly increments over the following two to four years.  The one year cliff (meaning, no vesting occurs during the first year of employment) is done to protect the company from granting phantom equity to employees that leave the company for whatever reason within their first year of employment.  Sometimes, an employee that is granted phantom equity will negotiate partial or accelerated vesting if the company terminates the employee “without cause.”  This is typically not granted by most companies, but every situation is unique and I have seen it negotiated and granted to a few individuals.

Eligible Payments

A phantom equity holder will be entitled to payments in connection with certain triggering events.  These triggering events will be set forth in either the phantom equity plan or in the phantom equity agreement.  There is great flexibility for a company in designing their own particular phantom equity plan and what payments the phantom equity holders participate in.

The most company-friendly plans only provide for a payment in the event of a change in control transaction (i.e. the sale of the company).  This means any dividends that flow to members or stockholders of the company (not otherwise in connection with a change of control transaction) will not be shared with the phantom equity holders.  For example, if a company has 100 shares issued and outstanding to its shareholders and 10 phantom shares issued to is phantom equity holders that do not have a right to participate in dividends, and the Company is going to dividend out $1,000,000, then the holder of each share of stock would receive $10,000 per share ($1,000,000 split amongst 100 shares), while the phantom shareholders (10 shares) would receive nothing.  If a phantom equity plan is structured this way, the clear message to the phantom equity holders is that they will only share in the success of the company if the company is ultimately sold.  Phantom equity holders should understand the risk that he or she may not work at the company when it is sold, and therefore it is likely that such phantom equity holder will not receive any benefit from the phantom equity.  This is because phantom equity is often contractually forfeited by the employee when he or she leaves the company.  This allows the company to issue new phantom equity to future hires without further diluting payments made to real equity holders.

Valuation Hurdle/Phantom Appreciation Rights

Another key feature typically found in phantom equity grants is the concept of a valuation hurdle, or what is sometimes referred to as a “phantom appreciation right.”  If a company has been in existence for a few months or longer, then the company likely has some ascertainable “fair market value” greater than zero.  Let’s assume that a company’s fair market value is determined to be $5,000,000, and this company now desires to grant phantom equity to certain employees.  If there is a valuation hurdle in the phantom equity plan or agreement, then the phantom equity holders only share in the value that is created (based on their phantom equity percentage) that is above $5,000,000.  Using this same example, let’s assume the company is sold three years later for $10,000,000 and there are 100 units of real equity issued and outstanding and 10 units of phantom equity.  In such example, the real equity holders (100 units) would receive all of the first $5,000,000 of proceeds from the sale, and then the next $5,000,000 would be split 90.91% to the real equity holders and 9.09% to the phantom equity holders (per the math at the beginning of this article).

No Ownership Rights/Control 

From the company’s perspective, it is important that the plan and/or phantom agreements very clearly spell out that phantom equity does not grant any rights to the holder that would be typically granted to a normal equity holder under law.  This provision should explicitly state that the phantom equity holder has no voting or decision making authority with respect to the company in connection with being granted phantom equity.  It should also limit the rights of the phantom equity holder to demand certain information (financial or otherwise) from the company.  Conversely, if you are the person being granted phantom equity, you should consider negotiating certain information rights into your phantom equity agreement.

Tax Implications

Whether phantom equity or phantom appreciation rights are being granted, the tax situation is generally the same for the company.  Generally, payments made by a company in connection with phantom equity or phantom appreciation rights are deductible by the company at the time the payment is made.  Regardless, always be sure to discuss the tax consequences with a tax advisor before granting phantom equity or phantom appreciation rights.

Conversely, and as a big disadvantage to the employee being granted phantom equity instead of real equity, payments received by phantom equity holders are taxed as ordinary income.  The difference between ordinary income and capital gains (which typically would apply to certain payments made to true equity owners) can add up to thousands (if not millions) of dollars of additional taxes paid by the employee if the company has a successful exit event.  However, in positive news for the recipient, no taxes should be due by the phantom equity holder upon his or her receipt of phantom equity.  With respect to true equity issuances, the recipient will likely owe tax on the fair market value of the equity received, unless such equity was actually purchased by the recipient for fair market value.

General Pros and Cons

There are a number of reasons phantom equity may make sense for a company as compared to other types of equity and equity-like plans.  Below are a few final points to think about as you decide whether or not phantom equity may be a viable option for your company:

Pros:

  • It allows certain key employees to share in the growth and success of the company while existing equity owners are not explicitly diluted and do not give up any control.

  • May serve as a golden handcuff to keep key executives from looking at other job opportunities.

  • Employees do not need to actually purchase the phantom equity; in other equity plans, the employees will likely need to purchase the equity at fair market value or have to pay tax on the fair market value of the equity that they receive.

  • There is a great deal of flexibility that can go into the phantom equity structure.  The phantom equity can mirror true equity almost completely (participate in dividends, etc.), or it can be very limited (participates only in a change of control event, with a valuation hurdle).

  • If structured correctly, phantom equity can easily be forfeited without penalty to the employer or the employee if the employee leaves the company.

            Cons:

  • If structured poorly it can lead to extremely bad results, including the permanent dilution of existing shareholders or unit holders, and/or the forced disclosure of sensitive information to individuals no longer working at the company.

  • May require a valuation of the company by an outside accounting or valuation firm.

  • May not be as attractive to a key employee because it is not real equity, and the company usually has the ability to terminate the employee and consequently extinguish the phantom equity.

  • 409A (deferred compensation) issues can add complexity to structuring and achieving the intended objectives of the company and the employee recipients.

Summary

When structured correctly, phantom equity is an excellent option for both companies and key employees.  As I like to tell clients, granting phantom equity is somewhat akin to dating before getting married – there are clear benefits to both the employee and employer in putting a phantom equity plan in place, but if it does not work out, both sides can walk away with minimal, if any, strings attached.

© Horwood Marcus & Berk Chartered 2015. All Rights Reserved.

Marijuana in the Workplace: The Growing Conflict Between Drug and Employment Laws

Despite the growing number of states that have legalized the use of marijuana, the drug remains illegal under federal drug laws. The legal landscape is made more confusing when considering the differing levels of employment protection that these state laws offer to marijuana users. With this patchwork of state laws, employers are left to grapple with whether and how to accommodate their employees who use marijuana for medical purposes or for off-duty personal consumption.

The Legal Landscape

Twenty-three states and the District of Columbia have legalized medical and/or recreational use of marijuana. These jurisdictions provide marijuana users with varying levels of protection against employment discrimination. The majority—Alaska, California, Colorado, Georgia, Hawaii, Maryland, Massachusetts, Michigan, Montana, New Jersey, New Mexico, Oregon, Vermont, and Washington—merely decriminalize use. Other jurisdictions—Arizona, Connecticut, Delaware, the District of Columbia, Illinois, Maine, Minnesota, Nevada, New Hampshire, New York, and Rhode Island—in addition to decriminalizing use, also provide statutory protections against discrimination. Some of these jurisdictions even require accommodation of underlying disabilities.

However, marijuana is still classified as a Schedule I drug (high potential for abuse, no acceptable medical use) and remains illegal under the federal Controlled Substance Act (“CSA”). While last year Congress passed a bill to defund the Department of Justice’s efforts to challenge state-legal medical marijuana programs, the Obama administration’s public position is that it “steadfastly opposes legalization of marijuana.”

Federal precedent in this area has provided employers with broad rights to take adverse action against individuals who use marijuana, whether or not for medical purposes and/or protected under state law. For instance, under the Americans with Disabilities Act (“ADA”), courts have held that marijuana users—regardless of the legality of the use under state law—are not qualified individuals with a disability entitled to anti-discrimination protections. See, e.g., James v. City of Costa Mesa, 700 F.3d 394 (9th Cir. 2012).

Employers, however, must be careful not to rely on medical marijuana use as a pretext for firing an employee with an underlying disability. The U.S. Equal Employment Opportunity Commission (“EEOC”) recently took aim at a Michigan-based assisted living center that fired a nursing administrator who used medical marijuana to treat her epilepsy and thus failed a drug test on her second day of work. EEOC v. Pines of Clarkston, Inc., No. 13-CV-14076, 2015 U.S. Dist. LEXIS 55926 (E.D. Mich. Apr. 29, 2015). The district court denied the employer’s motion for summary judgment on the individual’s ADA claim. Although acknowledging that a positive test for medical marijuana constituted a legitimate, non-discriminatory reason for discharge, the district court concluded that the EEOC raised a genuine issue of material fact as to whether the articulated reason was a pretext for disability discrimination, particularly because the employee had been questioned about her disability during her interview and subsequently after the positive drug test. The case eventually settled but should be heeded by employers as a warning that a positive drug test for marijuana may not insulate them from discrimination claims under the ADA.

Unresolved Conflict Between Employer and Employee Rights Under State Law

State law provides greater protections to marijuana users. However, while courts have infrequently addressed the conflict between state law employment protection and marijuana use, those that have considered such issues generally have found in favor of an employer’s right to take adverse action against an employee who tests positive for marijuana.

The Colorado Supreme Court highlighted this issue when, in Coats v. Dish Network, 350 P.3d 849 (Colo. 2015), it held that an employee may be fired for using marijuana even though he legally used the drug off duty. Colorado law prohibits termination for lawful off-duty conduct, and Coats was a registered medical marijuana patient who only consumed marijuana during non-work hours. Nevertheless, because smoking marijuana was still illegal under the federal CSA, the court held that such use did not constitute lawful conduct under the Colorado statute.

The decision in Coats is consistent with earlier decisions in California, Montana, Oregon, and Washington that have held that decriminalization laws do not confer a legal right to smoke marijuana and that employers may take adverse action against users. See Ross v. RagingWire Telecomms., Inc., 174 P.3d 200 (Cal. 2008); Johnson v. Columbia Falls Aluminum Co., LLC, No. 08-0358, 2009 Mont. LEXIS 120 (Mont. 2009); Emerald Steel Fabricators, Inc. v. Bureau of Labor & Indus., 230 P.3d 518 (Or. 2010); Roe v. TeleTech Customer Care Mgmt. (Colo.) LLC, 257 P.3d 586 (Wash. 2011). Of course, statutes in these states have decriminalized marijuana use but do not expressly provide employment protections to users.

Employers must tread more carefully in jurisdictions that grant express protections to marijuana users. Courts in these states have not decided whether an employee’s rights under such a state statute trump the rights of an employer to take adverse action against the use of a drug categorized as illegal under federal law.

Advice for Employers

While many implications of legalizing marijuana use are yet to be decided by the courts, employers clearly may continue to prohibit the on-duty use of, or impairment by, marijuana. Employers, particularly federal contractors required to comply with the Drug Free Workplace Act, also may continue the implementation of workplace drug testing programs.

Employers, however, must treat positive tests for marijuana cautiously. Decisions in California, Colorado, Montana, Oregon, and Washington collectively provide support to take adverse action against employees who use marijuana, recreationally or medicinally, and may suggest that such employer-favorable rulings will issue even from courts reviewing state statutes providing employment protections. Thus, a bright-line approach to discharging or refusing to hire marijuana users may be defensible related to marijuana use. But given the uncertain state of the law, employers should consider taking the following steps to reduce potential liability:

  • Engage in the interactive process to determine whether medical marijuana use can be accommodated.

  • Particularly in jurisdictions providing employment protections for medical marijuana users, engage in a fact-based inquiry to determine whether the individual is a medical marijuana cardholder and whether the job can accommodate the individual’s use of medical marijuana.

  • Develop and/or review policies that expressly address the right to take adverse action upon a finding of marijuana use.

  • When taking such adverse action, document the reasons to avoid a pretext argument.

Of course, employers should work with legal counsel to closely monitor the changing legal landscape in their jurisdictions as this area of unsettled law is ripe for future litigation.

Cyber Liability: The Risks of Doing Business in a Digital World

Major security and data breaches have become more prevalent in the past decade. News headlines are dominated by stories of major corporations having networks hacked and subjecting employees’ and customers’ personal, financial and health information to cyber threats. Perhaps one of the following from 2014 will sound familiar:

  • January: Snapchat had the names and phone numbers of 4.5 million users compromised

  • February: Kickstarter had personal information from 5.6 million donors compromised

  • May: Ebay‘s database of 145 million customers was compromised.

  • September: iCloud had celebrity photostreams hacked

  • November: Sony Pictures had the highest profile hack of the year involving email accounts, video games and movie releases

While the news headlines make it is easy to think this is an issue for large, Fortune 500 companies, the risk is equally widespread, but much less publicized, for small businesses.

While the data breaches at small businesses do not garner the same attention as the data breaches occurring at Sony or iCloud, the impact to the organization and the liability the organization incurs are largely the same.

Although there are many studies available giving analytics on the types of data breaches that occur, those most common to small businesses can be described in three general categories: unintentional/miscellaneous errors, insider misuse and theft/loss.

Unintentional and miscellaneous errors are any mistake that compromises security by posting private data to a public site accidentally, sending information to the wrong recipients or failing to dispose of documents or assets securely. For example, have any of your employees ever accidentally sent an order (with account information) to the wrong email address?

Insider misuse is not a situation where an accidental error occurs. Rather, an employee or someone with access to the information intentionally accesses the data to use it for an unlawful purpose. For example, a disgruntled clerk in the billing department accesses customer information to obtain name, date of birth and bank account information in order to fraudulently establish a credit card in that customer’s name. Consider another scenario where a third party vendor, a benefits provider, for example, handles employee information. Once transmitted, the employer loses control over information security for that data. Savvy business owners will make sure their contracts with vendors make the vendor responsible for any data breach that occurs during the engagement and that it will indemnify the business for any actions arising from such a breach.

Data breaches also result from physical theft or loss of laptops, tablets, smart phones, USB drives or even printed documents. Consider a scenario where the Human Resource director is heading to a conference and her laptop is stolen at the airport. The laptop is not encrypted or pass coded and the thief can access all the employee files the director keeps on her computer.

In the past decade, laws have been aimed at narrowing the information that can initially be collected by businesses and with whom it can be shared, as well as mitigating the breach after it occurs.

Federal regulations like the Health Insurance Portability and Accountability Act (HIPAA) limit the collection and use of protected health information, and also has requirements for entities suffering a data breach, including customer notification and damage mitigation provisions, such as mandatory credit monitoring and fraud protection for affected customers.

The Personal Information Protect Act requires government agencies, corporations, universities, retail stores or other entities that handle nonpublic personal information to notify each Illinois resident who may be affected by a breach of data security. 815 ILCS 530/1 et seq. Personal information is defined as: an individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted:

  1. Social security number.

  2. Driver’s license number or State identification card number.

  3. Account number or credit card or debit card number, or an account number or credit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

The required notice to Illinois residents must include contact information for credit reporting agencies and the Federal Trade Commission, along with a statement that the individual can obtain information from those sources about fraud alerts and security freezes. 815 ILCS 530/10(a). If the data breached is data that the entity owns or licenses, the notice must be made without unreasonable delay. Id. If the data breached is data that the entity does not own or license, notice must be made immediately. 815 ILCS 530/10(b).

Failure to notify affected consumers is a violation of the Illinois Consumer Fraud and Deceptive Business Practices Act. 815 ILCS 530/20.

Technology is everywhere. Smart phones, tablets, laptops, the internet, online bill payments and the like have changed the way businesses operate. There is no denying that technology allows for efficient and effective commerce and communication. Unfortunately, the same technology that allows for faster and more efficient commerce and communication also subjects businesses to new forms of risk when it comes to data security.

There are risk management tools that all businesses should be aware of and using on a daily basis. Anti-virus software, passwords on all devices, frequent back up of data, encryption for sensitive information transmitted electronically are just a few.

What if a business owner takes all the steps necessary to reduce the risk of a data breach and it still occurs? There is a way to reduce damages and to shorten the recovery and restoration timeframes.

Cyber Liability insurance can protect businesses, large and small, from data breaches that result from malicious hacking or other non-malicious digital risks. This specific line of insurance was designed to insure consumers of technology services or products for liability and property losses that may result when a business engages in various electronic activities, such as selling on the internet or collecting data within its internal electronic network.

Most notably, cyber and privacy policies cover a business’ liability for data breaches in which the customer’s personal information (such as social security or credit card numbers) is exposed or stolen by a hacker.

As you might imagine, the cost of a data breach can be enormous. Costs arising from a data breach can include: forensic investigation, legal advice, costs associated with the mandatory notification of third parties, credit monitoring, public relations, losses to third parties, and the fines and penalties resulting from identity theft.

While most businesses are familiar with their commercial insurance policies providing general liability (CGL) coverage to protect the business from injury or property damage, most standard commercial line polices do not cover many of the cyber risks mentioned above. Furthermore, cyber and privacy insurance is often confused with technology errors and omissions (tech E&O) insurance. However, tech E&O coverage is intended to protect providers of technology products and services such as computer software and hardware manufacturers, website designers, and firms that store corporate data on an off-site basis. Cyber risks are more costly. The size and scope of the services a business provides will play a role in coverage needs and pricing, as will the number of customers, the presence on the internet, and the type of data collected and stored. Cyber Liability polices might include one or more of the following types of coverage:

  • Liability for security or privacy breaches (including the loss of confidential information by allowing or failing to prevent unauthorized access to computer systems).

  • The costs associated with a privacy breach, such as consumer notification, customer support and costs of providing credit monitoring services to affected customers.

  • Costs of data loss or destruction (such as restoring, updating or replacing business assets stored electronically).

  • Business interruption and extra expense related to a security or privacy breach.

  • Liability associated with libel, slander, copyright infringement, product disparagement or reputational damage to others when the allegations involve a business website, social media or print media.

  • Expenses related to cyber extortion or cyber terrorism.

Coverage for expenses related to regulatory compliance for billing errors, physician self-referral proceedings and Emergency Medical Treatment and Active Labor Act proceedings.

While cyber liability insurance may not be right for all businesses, those that actively use technology to operate should consider the risks they would be exposed to if a data breach occurred. In addition, there are many different cyber policy exclusions and endorsements. Not all policies are created equal

While cyber liability insurance may not be right for all businesses, those that actively use technology to operate should consider the risks they would be exposed to if a data breach occurred. In addition, there are many different cyber policy exclusions and endorsements. Not all policies are created equal.

Facebook: Second Circuit “Likes” Employee Rights Under the NLRA

Employers should continue to proceed with caution before disciplining employees for their Facebook activity. In Three D, LLC d/b/a Triple Play Sports Bar and Grille v. NLRB, the Federal Appeals Court for Connecticut, New York and Vermont recently upheld a National Labor Relations Board decision that found that one employee’s “liking” another employee’s comments about the terms and conditions of their employment deserved protection under the National Labor Relations Act. The Court upheld the Board’s decision that terminating those employees was illegal.

In Three D, LLC, the employees of a sports bar had a discussion on Facebook about their employer’s alleged mishandling of their tax withholding. The exchange included both negative comments about their workplace and profanity. One of the employees joined into the conversation by writing a response, while another simply “liked” a co-worker’s statements. The employees happened to be Facebook friends with the bar’s owner’s sister, who told the owner about the post. The owner fired the employees, some of whom were interrogated about the posting and threatened with legal action before their termination. The Board found that this was illegal, and the Employer appealed to the Second Circuit.

In recent years the NLRB has been very open about focusing its efforts on the non-unionized workforce. Many employers assume that because they do not have a union, they do not have to worry about the National Labor Relations Act. However, the Act protects the rights of all employees-unionized or not-to engage in concerted activities for their mutual aid or protection. This includes talking together about their working conditions, wages, and even criticizing management. Interfering with that right may be considered an unfair labor practice.

Before the decision in Three D, LLC, the Board had held that the Act protected Facebook posts/conversations about working conditions. The Board did not make clear whether or not simply “liking” a post constituted enough employee participation to count as protected activity. Three D, LLC made clear that at least in Connecticut, Vermont and New York, such activity merits NLRA protection.

An Employer naturally wants to act when its employees post negative or obscene comments about their workplace or their supervisor on Facebook. It is a public forum that the Employer cannot control, and interesting messages can go viral. Three D, LLC does not change the law that Employers have an interest in preventing negative comments about their products or services and protecting their business reputation. An employee’s public communications may lose protection of the Act if sufficiently disloyal or defamatory. This can happen if the statements are not connected with an ongoing labor dispute or are made maliciously and with knowledge of their falsity. However Employers must tread carefully before disciplining employees for their social media use to air workplace grievances.

All in all, Employers should continue to take a close look at their actions in response to employee Facebook posts, even if they do not “like” it.

© Copyright 2015 Murtha Cullina

Facebook: Second Circuit "Likes" Employee Rights Under the NLRA

Employers should continue to proceed with caution before disciplining employees for their Facebook activity. In Three D, LLC d/b/a Triple Play Sports Bar and Grille v. NLRB, the Federal Appeals Court for Connecticut, New York and Vermont recently upheld a National Labor Relations Board decision that found that one employee’s “liking” another employee’s comments about the terms and conditions of their employment deserved protection under the National Labor Relations Act. The Court upheld the Board’s decision that terminating those employees was illegal.

In Three D, LLC, the employees of a sports bar had a discussion on Facebook about their employer’s alleged mishandling of their tax withholding. The exchange included both negative comments about their workplace and profanity. One of the employees joined into the conversation by writing a response, while another simply “liked” a co-worker’s statements. The employees happened to be Facebook friends with the bar’s owner’s sister, who told the owner about the post. The owner fired the employees, some of whom were interrogated about the posting and threatened with legal action before their termination. The Board found that this was illegal, and the Employer appealed to the Second Circuit.

In recent years the NLRB has been very open about focusing its efforts on the non-unionized workforce. Many employers assume that because they do not have a union, they do not have to worry about the National Labor Relations Act. However, the Act protects the rights of all employees-unionized or not-to engage in concerted activities for their mutual aid or protection. This includes talking together about their working conditions, wages, and even criticizing management. Interfering with that right may be considered an unfair labor practice.

Before the decision in Three D, LLC, the Board had held that the Act protected Facebook posts/conversations about working conditions. The Board did not make clear whether or not simply “liking” a post constituted enough employee participation to count as protected activity. Three D, LLC made clear that at least in Connecticut, Vermont and New York, such activity merits NLRA protection.

An Employer naturally wants to act when its employees post negative or obscene comments about their workplace or their supervisor on Facebook. It is a public forum that the Employer cannot control, and interesting messages can go viral. Three D, LLC does not change the law that Employers have an interest in preventing negative comments about their products or services and protecting their business reputation. An employee’s public communications may lose protection of the Act if sufficiently disloyal or defamatory. This can happen if the statements are not connected with an ongoing labor dispute or are made maliciously and with knowledge of their falsity. However Employers must tread carefully before disciplining employees for their social media use to air workplace grievances.

All in all, Employers should continue to take a close look at their actions in response to employee Facebook posts, even if they do not “like” it.

© Copyright 2015 Murtha Cullina