Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the login-customizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131
The National Law Forum - Page 511 of 753 - Legal Updates. Legislative Analysis. Litigation News.

NLRB Shows Some Restraint in its Protection of Employee Social Media Communications: Employee Termination Arising From “Egregious” and “Insubordinate” Facebook Posts Was Legal Under the NLRA

Mintz Levin Law Firm

In the wake of the NLRB’s aggressive crackdown on social media policies, many employers have asked: “Is there any limit to what employees can post on social media about their employers?”  It appears that there is.  Just last week, a former employee of the Richmond District Neighborhood Teen Center in San Francisco learned this the hard way when the Board dismissed his complaint that the Center violated Section 8(a)(1) of the National Labor Relations Act after it pulled a rehire offer after it discovered that he particpated in an inappropriate Facebook exchange.

During the 2011-2012 school year, Ian Callaghan and Kenya Moore both worked for the Center’s afterschool program—Callaghan as a teen activity leader and Moore as the teen center program leader.  In May 2012, the Center held a staff meeting during which it solicited and received both positive and negative feedback from its staff, including Callaghan and Moore.  In July 2012, Callaghan and Moore received letters inviting them to return to the Center for the 2012-2013 school year; this time both as activity leaders.

The following month, Callaghan and Moore communicated over Facebook about (i) refusing to obtain permission before organizing youth activities (“ordering sh*t, having crazy events at the Beacon all the time.  I don’t want to ask permission…”; “Let’s do some cool sh*t and let them figure out the money”; “field trips all the time to wherever the f#@! we want!”), (ii) disregarding specific school district rules (“play music loud”; “teach the kids how to graffiti up the walls…”), (iii) undermining leadership (“we’ll take advantage”), (iv) neglecting their duties (“I ain’t go[]never be there”), and (v) jeopardizing the safety of participating youth and the program overall (“they start loosn kids I aint helpin”; “Let’s f#@! it up”).  When the Center’s administration became aware of the postings, it revoked the offers to rehire, and Callaghan filed a charge with the Board.

Under Section 7 of the Act, employees have the right to engage in concerted activities for their mutual aid and protection, including complaining to one another about the terms and conditions of their employment.  In that vein, an employer may not take adverse action against employees for exercising their Section 7 rights without violating Section 8(a)(1) of the Act.  That said, employees can take it too far and lose the protection of Section 7 when their conduct is particularly egregious or of such a character as to render the employees unfit for further service.

Here, although Callaghan and Moore previously had engaged in protected activity during the May 2012 staff meeting when they offered negative feedback about the Center, and although neither Callaghan nor Moore had ever engaged in any acts of insubordination, the Board held that they lost the Act’s protection because “[t]he magnitude and detail of insubordinate acts advocated in the [Facebook] posts reasonably gave [the Center] concern that Callaghan and Moore would act on their plans, a risk a reasonable employer would refuse to take.”

Several years ago, the Richmond District Neighborhood Center decision may have been a foregone conclusion.  But in light of the current Board’s aggressive approach to Section 7 protections, the decision provides employers with reassurance that Section 7 has retained at least some outer bounds.  The decision provides some guidance for defining “insubordination” in social media policies, for example, to include communications pervaded by detailed plans to jeopardize the employer’s very existence, violate legally enforceable employer policies, or neglect job duties.

For a full discussion of the Board’s recent approach to social media policies, see George Patterson’s September 3, 2014 posting “NLRB Continues Aggressive Crackdown on Social Media Polices.”

OF

California To Expand Its Data Breach Notification Rules

Sheppard Mullin Law Firm

California has broadened its data breach notification statutes in response to the increasing number of large data breaches of customer information.  AB 1710, which Governor Jerry Brown signed into law, amends California’s Data Breach Notification Law to (1) ban the sale, advertising for sale or offering for sale of social security numbers, (2) extend the existing data-security law and obligations applicable to entities that own or license customer information to entities that “maintain” the information, and (3) require that if the person or business providing notification of a breach under the statute was the source of the breach then the notice must include an offer to provide appropriate identity theft prevention and mitigation services, if any, at no cost for 12 months along with any information necessary to take advantage of the offer.  The last of these amendments has spurned some debate over whether the statute actually mandates an offer of credit monitoring or other services given its use of the phrase “if any.”  It is also unclear what exactly is intended by or who qualifies as “the source of the breach.”

The use and placement of the phrase “if any” in the statute does create some ambiguity.  The statute, however, speaks in mandatory terms when it states the notification “shall include” an offer of these services.  Its plain language also suggests the phrase “if any” is directed to the question of whether appropriate identity theft or mitigation services exist and are available – not whether or not they must be offered.  A review of the measure’s legislative history confirms this.  The Committee analyses all discuss this element of the statute as “requiring” an offer of services.  Indeed, the legislative analysis immediately following the addition of the phrase “if any” defined the problem under existing law to be that it does not require any prevention or mitigation steps and states that this measure (AB 1710) addresses this issue by requiring an offer of appropriate “identity theft prevention and mitigation services, if any are available,…”  This interpretation is also consistent with the fact that an offer is only required when the breach involves disclosure of highly sensitive information that tends to lead to identity theft or credit card fraud, i.e., the customer’s social security, driver’s license or California identification number.

The standard of whether or not such services would, to some degree, be appropriate will not likely be the primary conversation that this amendment sparks.  The more lively topic will likely be who is the “source of the breach” (and even then the offer is only required when you are both the source of the breach and the party giving notice under the statute) and what standards apply for determining “appropriate” services.  The legislative history is not as equally helpful on these questions.  Thus, until the scope of this new requirement becomes more clear, businesses involved in a breach under the statute need to carefully think through the risks of offering certain services when providing notice.

These new rules take effect on January 1, 2015.  To review the amended statute or its legislative history click here.

How to Build a Lead Generation Machine Online with Content Marketing (Part 2 of 2)

If you struggle with creating quality content for your website or blog, I’ve pulled together 8 best practices for content marketing to guide you.  If you missed the first four in the series of eight, see yesterday’s blog post here.

These are the second 4 of 8 best practices in content marketing:

Best Practice 5: Use video to give visitors a sense of who you are. Video is one of the best ways to improve your website conversion rates. I highly recommend you record several videos for your website: an overview of each major practice area your firm offers, a few case studies of typical clients you want to attract, a video introduction for each attorney, and reasons why people should hire you versus a competitor. You can also add videos from seminars or presentations you make to add more content to your site.

Best Practice 6: Take a position on a topic and frequently update your blog. When you begin a blog, you need to make sure that it is a topic you feel passionate about. Make sure that you will still be energized to write about the topic in six months or a year. You also need to make sure that there is an audience for your blog.

In order to keep your website and blog at the forefront of Google’s mind, you will need to post regularly. The most successful lead generation blogs post every day. If you aren’t willing to post new content at least a few times per week then you should seriously consider hiring someone to do the writing for you. In a survey of over 7,000 small businesses, Hubspot.com found companies that blog 15 or more times per month generate five times as much traffic as companies that don’t blog!

Best Practice 7: Add social media to your website to make it easier for people to share your content online. Most major websites people visit have fully integrated social media-whether its Facebook, LinkedIn or Twitter you want to make it easy for people to share your content with their friends and colleagues.

Best Practice 8: Keep your content consistent with your brand. If you’re an estate planning attorney, write about estate planning and rarely about anything else. Professional blogs need to remain professional. The tone, content and focus should demonstrate the type of attorney you are. If your office is more relaxed and friendly, then try to convey that in the tone of your blogs. If your firm is more traditional, that too should be apparent in the tone of your piece.

Your content also needs to stay relevant. If there is a major change in what area of law you practice in, then you should be discussing it right away on your blog. If there is a big ruling in your practice area that is causing a lot of questions or anxiety for clients and prospects and you are the last person to mention in on their website or blog, then chances are the readers will have moved on to someone who is more on top of things.

Conclusion. Content marketing is one of the best ways to build targeted traffic to your website and become recognized as a thought leader. However, it is a long-term strategy so set your expectations appropriately. Depending on the level of competition in your practice area, how well-established your website/blog is, which key terms you are targeting, and how frequently you update your blog it may take several months to start seeing some significant results.

Content Marketing

ARTICLE BY
Stephen Fairley

OF

Join LMA New England in ONE week for their Regional Conference! Nov 13-14 in Boston

Register today for the LMANE 2014 Regional Conference:
LMA-NE-2014-3

 

When

NOVEMBER 13 & 14

Where

Revere Hotel, Boston, MA

REGISTER NOW!

There are many benefits to attending the LMANE Regional Conference, below are just a few:

LMANE Legal Marketing Association New England Boston Regional Conference

You will walk away feeling energized and full of new ideas to bring back to your firm!

How to Build a Lead Generation Machine Online with Content Marketing (Part 1 of 2)

The Rainmaker Institute

If you are looking to drive more high quality traffic to your law firm’s website, one of the best ways to do so is via unique, high quality content on your blog.

lead generationIt is estimated that 95% of law firms already have a website, but too few attorneys are consistently generating quality leads from their online presence because they lack great content.

Google has made it increasingly difficult to rank high without putting a lot of quality content on your website.  If you want to continue ranking well on Google, which drives more qualified traffic to your website so you can generate more online leads, you must put more and more content on your website.

Here are the first 4 of 8 best practices in content marketing:

Best Practice 1: Create content prospects will connect with and will want to read. If your website is the first to pop up in a Google search, but a potential client reads your home page and finds it littered with meaningless legal jargon, then chances are they are going to move on to website number two. People hire attorneys they feel a connection with. If the viewer doesn’t connect with your website, then chances are they aren’t going to call you.

By creating content that viewers find informative and relevant, easy to digest and in multiple formats (like audio or video as well as written) you are encouraging them to spend more time on your site. By filling each page with informative and easy-to-understand language, an attorney is boosting their visibility on the web and converting browsers into believers.

Best Practice 2: Know the critical keywords prospects use to search. While Google is making sure the context fits the keywords, websites still need to focus on certain keywords. Start by making a list of at least 20-30 terms you believe an interested prospect might use to search for your kind of services. Then do your research.

I recommend two sites: Google Keyword Tool and WordTracker.com. You can find the first one simply by searching on Google for it. The terms definitely emphasize Google’s pay-per-click model, which is why I strongly recommend double checking your findings against the results from WordTracker.com. Use only one or two key terms per blog post and do not post duplicate content.

Best Practice 3: Make sure your blog is on the same domain/subdomain. I used to recommend having two different sites: your primary website and a separate blog site. Due to the recent changes in Google I now recommend keeping your blog on your website (use ABClaw.com/blog instead of blog.ABClaw.com). If you already have two separate sites don’t combine them unless they are less than six months old.

By integrating your blog and your website in one place, you can increase your rankings by adding more content via your blog. Topics for your blog can include recent cases you have handled, commenting on current events or stories in the media, answering frequently asked questions, and discuss aspects of the law.

Best Practice 4: Create geo-targeted pages. You need to write several pages for each city you want to target. For example, if you are a business litigation attorney in the East Valley of Phoenix, you want to have several pages of content focusing on each of the following cities: Phoenix, Tempe, Chandler, Scottsdale, Mesa, Gilbert, etc.

Do not make the mistake of only targeting Phoenix because every single other attorney is doing that. Put as many pages of content up there for the secondary cities. Even though you will not receive nearly as many hits for those cities the competition to rank on the first page of Google will be significantly less.

Come back here tomorrow where I will share the last 4 of 8 best practices for content marketing.

ARTICLE BY

OF

Criminal Defendant Required to Provide Smartphone Fingerprint, but Not Passcode

Covington BUrling Law Firm

A Virginia state judge ruled last week that law enforcement may require a criminal defendant to provide his fingerprint — but not his passcode — to unlock a smartphone that might contain evidence that would be used against him at trial.

In Commonwealth v. Baust, the police sought access to the smartphone of David Charles Baust, who was indicted in connection an alleged assault. The victim alleged that a video of the assault was stored on Baust’s phone.

Police officers obtained a warrant for the phone and other evidence from Baust’s home. Because the officers were unable to unlock Baust’s phone, the government filed a motion to compel Baust to produce either his passcode or fingerprint to unlock the phone.

Because the government had obtained a lawfully executed search warrant, Baust could not challenge the government’s request on Fourth Amendment grounds. Instead, Baust argued that the request violates the Fifth Amendment, which provides that no person “shall be compelled in any criminal case to be a witness against himself.” Courts have long held that this privilege protects a criminal defendant from being forced to provide the government with “evidence of a testimonial or communicative nature.”

Virginia Circuit Court Judge Steven C. Frucci rejected the government’s request to compel Baust to provide his passcode, holding that providing his passcode would be testimonial because it would force Baust to “disclose the contents of his own mind.” This conclusion is in line with a 2010 ruling by a Michigan federal court that forcing the defendant to produce a passcode is “the extortion of information from the accused.”

But Judge Frucci allowed the government to compel Baust to provide his fingerprint. He concluded that the fingerprint, “like a key . . . does not require Defendant to communicate any knowledge at all.”

EEOC Part of Increasing Focus On LGBT Issues

Barnes Thornburg

We seem clearly to be in the midst of a shift towards greater employment protections for LGBT employees, evidenced both by discrimination legislation largely at a state and local level and less directly in the legal environment by developments such as greater acceptance of gay marriage including the Supreme Court’s recent refusal to consider lower court decisions invalidating state statutes prohibiting gay marriage.

EEOC Commissioner Chai Feldblum recently released thisinteresting summary of the EEOC’s activities and positions on LGBT issues. Highlights include:

  • Title VII prohibits discrimination on the basis of sex.  The EEOC interprets the law to provide protection on the basis of sexual orientation and gender identity.  This has not always been the case – in the 1970s the EEOC held that discrimination on the basis of gender identity (1974) and sexual orientation (1976) were not prohibited under Title VII.
  • Courts have not yet developed a clear position on this.  (And for lawyer readers, there are numerous case cites that provide a useful reference.)
  • The EEOC has accepted discrimination charges from LGBT individuals since January 2013 and reports that it is has received and resolved hundreds of them.
  • Commissioner Feldblum states that strong laws at all levels of government explicitly protecting LGBT workers are still necessary.

Anecdotally, more and more employers seem to be voluntarily extending to LGBT employees the protection they extend to employees in generally accepted protected classes.  In many cases, the employer is required to do so under the laws of some places it does business, and simply implements the protection uniformly.  Employers who choose not to do so voluntarily and are not yet required to do so in places where they do business should at least be thinking ahead on administering what seem like inevitable changes.

As always, regardless of what classes are protected in what jurisdictions, the best defense against discrimination liability are making good business decisions and being able to document that you have done so.

ARTICLE BY

OF

NLRB Finds Facebook Posts Go Too Far for the Act's Protection

Neal Gerber

As we reported previously, social media issues are troublesome for employers who must navigate unsettled or even conflicting federal and state laws and decisions.  A recent ruling from the National Labor Relations Board (NLRB) demonstrates that employers can still protect their business against inappropriate online activity by employees.  Specifically, the NLRB ruled that an Employer acted lawfully in rescinding two employees’ rehire offers, finding that the Facebook conversations between the two were so egregious as to lose protection under the National Labor Relations Act and render the two individuals unfit for further service with the Employer.

The Employer operates a Teen Center that provides afterschool activities to students.  During a period between school sessions, just before the employees would have been rehired for the coming school year, the two individuals engaged in a series of Facebook conversations during which they repeatedly talked, in profane terms, about what they intended to do when they returned to work. The messages contained numerous indications that the two would refuse to follow the rules and policies of the Employer, would refuse to work with management or get required permissions, would engage in various acts to undermine the school’s leadership, and they detailed specific acts of intended insubordination.

The NLRB agreed that the exchange of messages (which certainly discussed their displeasure over working conditions) was “protected concerted activity” under the Act. Normally, such protected activity cannot be the basis of any adverse employment action. However, the Board determined that the conduct constituted “pervasive advocacy of insubordination which, on an objective basis, was so egregious as to lose the Act’s protection.”

In finding the conduct unprotected, the Board relied on the fact that the individuals repeatedly described a wide variety of planned insubordinations in specific detail. According to the Board, these acts were beyond brief comments that might be explained away as a joke or hyperbole divorced from any likelihood of implementation. Rather, the Board concluded that the magnitude and detail of insubordinate conduct advocated in the posts reasonably gave the Employer concern that the two individuals would act on their plans, a risk that a reasonable employer would refuse to take by returning the individuals to the workforce. The Board concluded that the Employer was not required to wait for the employees to follow through on the misconduct they advocated.

This decision gives employers some relief that there are limits to what employees can say on social media, even if the subject of their conversations or postings is “protected” and “concerted”. However, before an employer can take adverse employment action against an employee who engages in such activity, the employer must be able to demonstrate that, on an objective basis, the activity is egregious and pervasive and is of such magnitude and of such detail that it is reasonably likely to be acted upon rather than being mere hyperbole.

[Richmond District Neighborhood Center, 361 NLRB No. 74 — October 28, 2014]

OF

Simplify to Maximize: Register now for the LMA New England Regional Conference, Nov 13-14, Boston

The National Law Review is proud to bring you information about the LMANE 2014 Regional Conference. Register today!
LMA-NE-2014-3

 

When

NOVEMBER 13 & 14

Where

Revere Hotel, Boston, MA

REGISTER NOW!

There are many benefits to attending the LMANE Regional Conference, below are just a few:

LMANE Legal Marketing Association New England Boston Regional Conference

You will walk away feeling energized and full of new ideas to bring back to your firm!

 

Uber’s Decision To “Deactivate” Driver Over Retweet of Article Goes Viral in Minutes

Allen Matkins Law Firm

It all started with a retweet. A recent story regarding the “deactivation” and subsequent reinstatement of an Uber driver in Albuquerque is a useful reminder for employers that, given the widespread use by employees of social media, employment decisions should not only be well thought out, but also should take into account potential negative publicity.

During a period while he was on hiatus from driving for Uber, Christopher Ortiz merely retweeted an article referenced as “Driving for Uber, not much safer than driving a taxi,” without commenting on the article. When he sought to resume driving for Uber a couple of months later, Ortiz received an email from Uber stating that his driver account had been “permanently deactivated due to hateful statements regarding Uber through social media.” The e-mail referenced the title of the article that Ortiz had retweeted. Ortiz immediately tweeted a screenshot of Uber’s email, and the story was picked up by websites such as Forbes and BuzzFeed.

Twitter Feed for Christopher J. Ortiz

Within hours, Uber reversed its decision and reactivated Ortiz’s driver account. Ortiz then tweeted a screenshot of Uber’s message reinstating him, which subsequently was retweeted numerous times.

In this situation, each of Uber’s communications with Ortiz was made public and broadcast within seconds of its transmission to Ortiz. It took only minutes for Uber’s termination decision to get attention from national media outlets. The fact that information regarding employers’ hiring and firing decisions can become subject to public scrutiny at such a rapid pace should serve as a reminder to employers to carefully assess how they approach these decisions and how they react to the decisions’ aftermath. For example, retracting an employment decision, particularly if it is publicized, could embolden other employees to publicize negative employment decisions affecting them in the hope those decisions too will be retracted.

As noted at the outset, employers should contemplate, as part of their decision-making process, that any employment decisions they make, and particularly those they may e-mail to their employees, potentially could be broadcast publicly and be subject to the court of public opinion through various forms of social media. As demonstrated by this incident, once a story gains traction on social media, it is very difficult, if not impossible, to control the ramifications.

ARTICLE BY

OF