Can Having Employees Pose for the Camera Pose Problems for You?

The National Law Review recently featured an article regarding Employee Photos written by Amy D. Cubbage with McBrayer, McGinnis, Leslie and Kirkland, PLLC:

McBrayer NEW logo 1-10-13

Employers have a variety of reasons for using employee photos, including:

  • internal company use (for a company directory or in the break room);
  • external use (such as the company website or a blog post—you’ll find my picture below);
  • for safety precautions (name badges or scan cards); and
  • for commercial use in advertisements or marketing.

Employees are usually amendable to having their picture taken. But, there may be a few who express their genuine disinterest in being photographed. Such employees could simply be camera shy; others may have a more serious reason to refuse to have an image published.  Some may need to protect anonymity for personal reasons, such as past domestic abuse.  Others may adhere to religions forbidding taking pictures.

There are generally no legal ramifications for using employee photos, unless it is for commercial purposes.  Most states, including Kentucky, have laws that require permission before using an individual or their “likeness” for commercial purposes. This is due to the commonly held notion that a person has property rights in his or her name and likeness and those rights should be shielded from exploitation. Kentucky’s law is codified in KRS 391.170.

If you need to use employee photos for a commercial use, there is a simple solution. Have employees sign releases in which they acknowledge that their picture may be used in a company advertisement and they will receive no compensation for the use of their photo. Keep these releases on file.

Even in a state where consent is not required, it is always a smart approach to use a release so that employees will not be surprised when they see their face plastered on a promotional piece. If minors appear in the commercial materials always use extra caution. Use a consent form, whether required or not, to be signed by the child’s parents.

A warning about taking photos of potential employees: if you take photographs of applicants applying for a job (to help remember who’s who), it may put you at risk for a discrimination claim. A photograph creates a record of certain protected characteristics (i.e., sex, race, or the presence of a disability) that employers generally cannot use in hiring considerations. If this information is collected and a discrimination claim arises, the burden will be on the employer to prove the photographs were not used to make a discriminatory employment decision.

I will leave you with a little common sense about employee photos. Always remember to publicize when the office picture day will be; no one likes showing up ill-prepared. Offer a “redo day” for those who are truly unhappy about how their picture turned out. If all else fails, resort to photoshopping. A little lighting adjustment or cropping can work wonders for a shutterbug humbug.

© 2013 by McBrayer, McGinnis, Leslie & Kirkland, PLLC

3rd Annual International Trade Compliance Conference

The National Law Review is pleased to bring you information about the upcoming Marcus Evans conference – 3rd Annual International Trade Compliance Conference:

3rd Annual International Trade Compliance - April 24-26 2013

 

 Navigating the Latest Changes in Trade Regulations and Global Controls for Improved Compliance

24-26 Apr 2013
venue to be confirmed – Chicago, IL, United States of America

Building from the success of our 2012 conference, the marcus evans 3rd Annual International Trade Compliance Conference will bring together senior executives looking to improve processes with evolving global markets, trade agreements, technology requirements and compliance. Additionally, this conference will provide attendees with the latest updates in international trade regulations, as well as insights and tools for strengthening internal operations in order to remain compliant with critical requirements on a day-to-day basis.

The 3rd Annual International Trade Compliance Conference features two distinct tracks; allowing attendees to fully customize their agenda.

Track one focuses specifically on advanced import & customs topics, such as identifying the latest changes to the ISA program, discovering advancements in supply chain programs and applying recent FDA regulation updates to your business plan.

Track two is entirely centered on export controls. Featured topics include evaluating the recent updates to the ECR, understanding requirements for OFAC compliance and dissecting US and global technology regulations for secure transfers.

Delegates are able to mix and match sessions from both tracks to create a complete conference experience that covers every area of interest.

Attending this conference will enable you to:

1.)   Identify the latest regulatory changes within emerging markets for seamless trade operations

2.)   Navigate Free Trade Agreements to increase efficiency and decrease corporate costs

3.)   Institute a successful global trade compliance program to improve company procedures

4.)   Conquer import and export classification for more effective business practices

5.)   Tackle the latest regulations and requirements for technology transfers and determine various tactics for remaining compliant

Industry leaders attending this conference will also benefit from a dynamic presentation format consisting of workshops, panel-discussions, and industry-specific case studies that provide accurate, real-world knowledge. Attendees will experience highly interactive conference sessions, 10-15 minutes of Q&A time after each presentation, 4+ hours of networking, and exclusive online access to materials post-event.

Who Should Attend
marcus evans invites Heads, Vice Presidents, In-House Counsel, and government agencies with responsibilities in the following areas:

-Global/International Trade Compliance
-Import/Export Trade Compliance
-Global Customs Compliance
-Import/Export Operations
-Export Controls

Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets

The National Law Review recently published an article, Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets, written by Lauren M. Papenhausen with McDermott Will & Emery:

McDermottLogo_2c_rgb

 

The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance.  Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities should review the announcement and decide whether they need to be more active in protecting their trade secrets.  The strategy also offers opportunities for increased collaboration with the government.

On February 20, 2013, the White House announced an “Administration Strategy on Mitigating the Theft of U.S. Trade Secrets.”  Companies should view the announcement of this strategy as both a wake-up call from the government and an offer of assistance.  Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities should review this government announcement and decide whether they need to be more active in protecting their trade secrets.

The administration strategy articulates a broad governmental commitment to addressing an “accelerating” threat to U.S. intellectual property.  The strategy encompasses five action items:

  • Focusing diplomatic efforts to protect trade secrets through diplomatic pressure, trade policy and cooperation with international entities
  • Promoting voluntary best practices by private industry to protect trade secrets
  • Enhancing domestic law enforcement, including through outreach and information-sharing with the private sector
  • Improving domestic legislation to combat trade secret theft
  • Improving public awareness and stakeholder outreach

Three main themes emerge from the administration strategy that are important for U.S. businesses.

First, the strategy and its supporting documentation highlight how frighteningly real the prospect of trade secrets theft is.  The White House report is peppered with references to household name companies that have been victimized by trade secrets theft over the past few years, often at a cost of tens of millions of dollars or more.  Mandated reports from the defense industry to the government indicate a 75 percent increase between FY2010 and FY2011 in reports of suspicious activity aimed at acquiring protected information.  Coupled with a recent New York Times article asserting Chinese government involvement in more than 100 attempted cyber attacks on U.S. companies since 2006, these reports warrant sitting up and taking notice.  According to a report by the Office of the National Counterintelligence Executive, particular targets include companies that possess the following:

  • Information and communications technologies
  • Business information that relates to supplies of scarce natural resources or that gives foreign actors an edge in negotiations with U.S. businesses or the U.S. government
  • Military technologies, particularly in connection with marine systems, unmanned aerial vehicles and other aerospace/aeronautic technologies
  • Civilian and dual-use technologies in sectors likely to experience fast growth, such as clean energy, health care and pharmaceuticals, advanced materials and manufacturing techniques, and agricultural technology

Second, the government alone cannot solve the problem.  The administration commits to making the investigation and prosecution of trade secret theft a “top priority” and states that the Federal Bureau of Investigation has increased the number of trade secret theft investigations by 29 percent since 2010.  On its face, however, a 29 percent increase in investigations cannot keep pace with a 75 percent increase in attempted trade secret thefts.  Historically, as a result of limited resources, the government has been able to address only a tiny fraction of trade secret thefts, and there is no indication that there will be the massive influx of resources necessary to change this dynamic materially.  Indeed, the administration strategy recognizes the need for public-private partnerships on this issue and asks companies and industry associations to develop and adopt voluntary best practices to protect themselves against trade secret theft.  And, of course, there are significant drawbacks to any after-the-fact solution, whether relying on government intervention or a private lawsuit.

The best solution is to prevent a trade secret theft from ever occurring.  Even if that is not possible, having taken strong measures to protect trade secrets will aid success both in any civil litigation against the perpetrator and in any criminal action the government may bring.  Entities should consider at least the following types of protective measures:

  • Research and development compartmentalization, i.e., keeping information on a “need to know” basis, particularly where outside contractors are involved in any aspect of the process
  • Information security policies, e.g., requiring multiple passwords or multi-factor authentication measures and providing for data encryption
  • Physical security policies, e.g., using controlled access cards and an alarm system
  • Human resources policies, e.g., using employee non-disclosure agreements, conducting employee training on the protection of trade secrets and performing exit interviews.

It also will be important in any future litigation that a company has clearly designated as confidential any materials it may wish to assert are trade secrets.

Third, the new administration approach to trade secrets offers some opportunities for U.S. companies.

The government interest in enhancing law enforcement operations indicates that businesses may have a better chance of encouraging the government to investigate and bring criminal charges under the Economic Espionage Act (EEA) against the perpetrators of trade secret thefts.  The possibility of seeking government involvement is a powerful tool that should be considered and discussed with counsel any time there is a significant suspected trade secret theft.  Obtaining government involvement in specific instances of trade secret theft can allow businesses to take advantage of information learned via government tactics such as undercover investigations and search warrants.  It also can significantly enhance any civil litigation—for example, a finding of criminal liability can make a civil outcome a foregone conclusion.

The administration strategy’s focus on improving domestic legislation and increasing communication with the private sector suggests that there is an opportunity for the private sector to collaborate with government actors in communicating industry needs and shaping policy.  For example, it is possible that the time is ripe for an amendment to the EEA (currently a federal criminal statute that offers no private right of action) to create a federal, private cause of action for misappropriation of trade secrets.  A bill to this effect was introduced in Congress in 2012 and did not progress, but two other amendments to strengthen the EEA that passed overwhelmingly in December 2012, plus the recently issued administration strategy, suggest there may be gathering momentum for such a change.

In an executive order signed on February 12, 2013, entitled “Improving Critical Infrastructure Cybersecurity,” President Obama outlined government plans to significantly increase the amount of information that the government shares with private sector entities about cyber threats.  Specifically, the order directs government agencies to develop procedures to create and disseminate to targeted entities unclassified reports of cyber threats that identify them as targets, to disseminate classified reports of cyber threats under certain circumstances to “critical infrastructure entities,” and to expand the Enhanced Cybersecurity Services program (previously available only to defense contractors to assist in information-sharing about cyber threats and protection of trade secrets) to “eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.”  The directives in the executive order are in addition to and complement various information-sharing tactics set forth in the administration strategy designed to provide warnings, threat assessments and other information to industry.  Companies, particularly those involved in the power grid or the provision of other utilities or critical systems, should be aware of the possibility of obtaining additional information from the government about threats to protected information.

© 2013 McDermott Will & Emery

Cutting Edge Issues in Asbestos Litigation Conference – March 18-19, 2013

The National Law Review is pleased to bring you information about the upcoming Perrin Cutting Edge Issues in Asbestos Litigation Conference:

Asbestos March 18 2013

Monday, March 18th – Tuesday, March 19th, 2013
Beverly Wilshire, A Four Seasons Hotel
Beverly Hills, CA

 

Three Provisions You Cannot Operate Without In Your Operating Agreement

McBrayer NEW logo 1-10-13

Deciding on the entity form to use for your business depends on a number of factors, but for many entrepreneurs, an LLC is the best fit. An LLC is a hybrid entity as it provides liability protection similar to a corporation and favorable income tax treatment similar to a partnership. If you are starting or currently operating a business through an LLC, your most important organizational document is the agreement between you and your partners: the Operating Agreement. An operating agreement establishes the internal operations of the business in a way that suits the specific needs of the business owners. Once signed by the members of the LLC, it is an official binding contract.

Another benefit of using an LLC to operate your business is the flexibility LLC owners have to structure their operations and business relations with their partners. While the Kentucky Limited Liability Company Act contains default provisions for many of the organizational issues that may arise, members of an LLC may agree to operate under provisions other than the Act’s default provisions. No matter the nature of your business, your LLC should have an operating agreement that includes details such as voting rights and responsibilities, powers and duties of members and managers, allocation of profits and losses, and distribution of capital, whether the members agree to use the LLC Act’s default provisions or alternatives to the default language.

As an example of the flexibility of the Act, and also of the importance of carefully considering the effects of each section of your operating agreement, consider the following three provisions that will help your business run smoothly.

1. Transfer provisions.

An operating agreement typically contains some language about the circumstances under which a member may or must transfer his ownership interest in the LLC to another person or entity. Under the Act, a member may freely transfer membership interest to anyone. There are a number of provisions in the Act that tell us how the transferring member and the new owner are to be treated, one of which is that the new owner will not be a full member with the right to vote unless a majority of the other members vote to make the new owner a full member. If members are allowed to freely transfer their interests however, founding members may find themselves faced with new business partners they did not approve. Moreover, a member’s interest could be transferred involuntarily, such as by death, divorce, or bankruptcy. For these and other reasons, you and your business partners may decide on a transfer provision that would limit uncertainty in these situations. Terms in the operating agreement may require a majority of members to vote to allow a proposed transfer before it can occur, or give the company or the members a right of first refusal to purchase the membership interest subject to a proposed transfer. The members might agree to purchase life insurance policies to provide the funds to purchase the membership interest of a member at death. The operating agreement may also prohibit members from pledging (granting a lien on) membership interest. Putting restrictions on transferability gives members control over when, how, and why membership interests are transferable.

2. Deadlock provisions.

Management or member deadlock occurs when a company’s decision makers are evenly split on a matter and neither side will relent. It is a potentially fatal problem and, thus, should always be addressed within the operating agreement. Under the Act, the remedy for deadlock is judicial dissolution. A court “may dissolve a limited liability company in a proceeding by a member if it is established that it is not reasonably practicable to carry on the business of the limited liability company in conformity with the operating agreement.” Once the LLC is dissolved, it cannot carry on business, but must wind up and liquidate its business. There are, however, many strategies that can be put into your operating agreement to avoid this problem:

· The opposing member may be allowed to withdraw from the LLC.

· The operating agreement may require that a deadlock at the manager level be subject to a vote of the members.

· The members may agree to be bound by a coin flip.

· The members may be required to take the issue to binding arbitration.

· The members may incorporate a buy-sell provision that would require one member to provide a purchase price to the other member and then require that other member to purchase or sell the membership interest in the LLC at that purchase price such that the selling member ceases to be a member of the LLC.

With each of these strategies, the common feature is that the LLC is likely to continue as a functioning business after the deadlock is resolved.

3. Additional Capital Contributions.

A company operating agreement will usually state the amount of money or the value of property each member initially contributes to the company for operations, known as initial capital contributions. As an example, three people may decide to start a business and agree that each of them will give the company $3,000 so the company has $9,000 in start-up capital. Most operating agreements also have language about additional money from the members, known as additional capital contributions. Because the Act allows flexibility here as well, that language may state that members are not required to make additional capital contributions, or it may require additional capital contributions and allow for one member to make an additional capital contribution for another member that fails to make that contribution when due in exchange for a portion of that member’s membership interest. There are many possibilities. But frequently, when considering these possibilities, members fail to consider the effect of the additional capital contribution language on the limited liability feature of the LLC.

One important function of an LLC is that the members are not individually liable for the debts of the LLC if the LLC cannot pay its creditors. That protection from individual liability is not absolute, however. Among other things that may cause a court to ignore limited liability protection, including fraud, intentional misconduct, or the failure to maintain a real distinction between the LLC and its members, the additional capital contribution language can be read to require the members to pay LLC debt that the LLC cannot pay itself. The members may avoid this by affirmatively stating in the operating agreement that additional capital contributions are never required and the members have no personal liability for the debts of the LLC, but that may cause problems later if the LLC needs additional capital. The members may instead decide to have additional capital contribution language, but to have it drafted carefully so as to avoid unintentionally negating the limited liability protection generally afforded by the LLC. The important thing is to consider and plan for the potential needs of the LLC, and to do so in a way that doesn’t result in unintended consequences for the LLC or its members.

Every successful business encounters bumps in the roads. An operating agreement is a road map, a tool to navigate through the difficult obstacles.

© 2013 by McBrayer, McGinnis, Leslie & Kirkland, PLLC

National Institute on E-Discovery 2013

The National Law Review is pleased to bring you information regarding the upcoming ABA Conference – National Institute on E-Discovery 2013:

E-Discovery April 5 2013

When

April 05, 2013

Where

  • Proskauer Rose LLP
  • Eleven Times Square
  • New York, NY 10036-8299
  • United States of America

Nationally-acclaimed e-discovery professionals and judges will convene for a full day to analyze and discuss the latest developments and best strategies for managing the e-discovery process.

Program Focus

Attendees of this program will learn:

  • Comprehensive and practical “issue-spotting”
  • About the continuing rules amendment process directly from members of the federal judiciary, as well as leading-edge issues emerging in their courts
  • How to choose, search, and review technology that fits your case
  • Tips for cost-effective and defensible project management for both requesting parties and producing parties
  • The latest information on e-discovery of “personal data sources” including social media and personal devices
  • How to navigate “discovery about discovery,” including important privilege considerations

Immigration Reform: It’s Time for a Course Correction

The National Law Review recently published an article regarding Immigration Reform written by  Susan J. Cohen with Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.:

MintzLogo2010_Black

 

The first two months of 2013 have seen a flurry of activity relating to immigration reform.  President Obama is pushing for comprehensive reform as are powerful factions within both the Senate and the House. And the political will and rising tide of opinion in favor of reform are making for unusual bedfellows, as exemplified by the recent joint statement of principles from the American Chamber of Commerce and the AFL-CIO.

But in this same timeframe, lawmakers anxious to change current immigration law to create new pathways for entrepreneurs and highly educated immigrants have introduced a number of bills designed for this purpose, including the Immigration Innovation (I²) Act of 2013 introduced by Senators Hath, Klobuchar, Rubio and Coons and the Startup Act 3.0, introduced by Senators Moran, Warner and Coons. These bills contain many excellent provisions that make tremendous sense, addressing shortcomings and deficiencies in our current law. For example, the I² bill would significantly increase the H-1B cap and would exempt graduates of U.S. advanced degree programs from the cap. It would authorize employment for the spouses of H-1B workers and would make it easier for those workers to move from one company to another.  It would also streamline the green card process and eliminate the enormous backlogs in the current system.  The Startup Act 3.0 would provide a new and much-needed work visa for foreign entrepreneurs who can attract angel or venture funding to their new U.S. ventures.

Our immigration laws are so broken and outdated that only comprehensive reform will correct  our course.  And the lawmakers who have introduced bills such as I² and the Startup Act 3.0 clearly hope that their prescriptions for specific improvements will be incorporated into any final comprehensive bill. But should comprehensive reform prove elusive, at a minimum Congress should pass some version of these bills, to attract and retain the best and the brightest of our foreign students and entrepreneurs, and help to boost and strengthen the U.S. economy.

©1994-2013 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

White Collar Crime Institute – March 6-8, 2013

The National Law Review is pleased to bring you information about the upcoming White Collar Crime Institute:

White Collar Crime March 6-8 2013

The program will provide an in-depth analysis of three recent high visibility trials by the lawyers involved in the cases.  The many topics covered will include: ethical pitfalls and blunders in white collar practice, conducting global investigations (including issues of competing laws), data privacy and blocking statutes, trial tactics in white collar cases, Brady obligations, international issues in white collar practice (including obtaining evidence abroad), handling of, and dealing with, issues related to electronically stored materials, sentencing guidelines and arguing for a departure, updates and trends in securities and FCPA enforcement, and more!

State Law Resale Price Maintenance: We’re not in Kansas anymore

Womble Carlyle

I recently participated in a roundtable discussion on state law resale price maintenance actions presented by the ABA Section of Antitrust Law.

The discussion focused on the Kansas Supreme Court’s decision in O’Brien v. Leegin, in which the court determined that vertical price fixing was still per se illegal under Kansas antitrust laws despite the fact that such conduct is analyzed under the rule of reasons under federal antitrust law.  One of the participants suggested that the if the logic of the Kansas Supreme Court’s decision was extended, then all types of vertical restraints (i.e. geographic restrictions, non-compete agreements) which are typically analyzed under a reasonableness standard, may be subject to attack under the per se rule.  Other participants dismissed such concerns, but noted that state antitrust law can be (and often is) more restrictive than federal antitrust law.

A Deputy Attorney General for the State of California described several post-Leegin developments in state prosecutions of RPM and MAP agrements, including New York’s action against Tempur-Pedic.  The takeaway from that discussion seemed to be that, regardless of the outcome of those cases (which were resolved in favor of the manufacturer), state enforcers may still consider certain RPM and MAP agreements as per se antitrust violations.  Additionally, state enforcers may take an especially narrow view of the Colgate doctrine, which allows a business to unilaterally announce the terms and conditions upon which it will do business with its retailers/resellers.

At the conclusion of the program, one participant suggested that attorneys practicing in this area should give advice to their clients as if Leegin were never decided.  In other words, sometimes state law trumps federal law.  That is exactly what we have been saying on this blog ever since the Leegindecision was announced.

Copyright © 2013 Womble Carlyle Sandridge & Rice, PLLC

White Collar Crime Institute – March 6-8, 2013

The National Law Review is pleased to bring you information about the upcoming White Collar Crime Institute:

White Collar Crime March 6-8 2013

The program will provide an in-depth analysis of three recent high visibility trials by the lawyers involved in the cases.  The many topics covered will include: ethical pitfalls and blunders in white collar practice, conducting global investigations (including issues of competing laws), data privacy and blocking statutes, trial tactics in white collar cases, Brady obligations, international issues in white collar practice (including obtaining evidence abroad), handling of, and dealing with, issues related to electronically stored materials, sentencing guidelines and arguing for a departure, updates and trends in securities and FCPA enforcement, and more!