ALERT: Fraud Scheme Targets Foreign Nationals

GT Law

Foreign nationals are advised to be aware of a reported fraud scheme that is currently being perpetrated in the United States.

Individuals purporting to be officers of U.S. Citizenship and Immigration Services (USCIS) are reportedly telephoning foreign nationals to falsely claim a discrepancy or problem in such individuals’ immigration records and pressure victims to pay a “penalty” to rectify the issue. Victims are told to wire funds to an address the caller provides.

The perpetrators may possess personal information about the victim and may ask victims to provide or confirm immigration information, including an I-94 number, an alien registration number or a visa control number.

Foreign nationals who receive such calls should not forward any funds as instructed by the caller or disclose any personal information. Those targeted by the scheme should contact law enforcement, the Federal Trade Commission Bureau of Consumer Protection, and an attorney.

Article By:

 of

3 Ways to Raise Your Revenues In the Next Year

The Rainmaker Institute mini logo (1)

1. Increase your Conversion Rates

One of the best ways to generate more revenue is by increasing your conversion rates at each stage. Conversion starts the moment an interested prospect contacts your law firm. How many of those people turn into appointments? That’s part of conversion. Start there by finding ways to increase the percentage of leads that turn into appointments. By increasing that number by just 10% you can radically improve your revenues!

The Rainmaker Institute builds customized lead conversion systems for law firms. These systems automate your conversion process and helps to increase your conversion rate at every stage. You can also get a clear picture of which types of leads are the most profitable for your firm.

2. Raise Your Rates

I understand we are still in a difficult economy. However, unless you are already charging near the top 20% of prices in your practice area, I find that most of the small practitioners I consult with can immediately increase their prices by 10-30%. I had a dozen clients who did that last year, including a criminal defense attorney who went from charging $275 per hour to $395 per hour! By the way, he now has more work than he can handle and has had to hire two more attorneys.

In our example above, by moving from an Average Client Worth of $2,000 per client to just $2,500 you would only need 1,015 leads per year, a 20% decrease. This is often the fastest way to get to your goals.

3. Increase Repeat Business

Yes, I know this is a mantra in the legal industry, but most law firms do not have any specific plans for doing so. On average, acquiring a new client will cost your law firm almost 10 times as much as obtaining repeat business from an existing client!

One of the most effective ways to do this is with a monthly e-Newsletter. Recently I asked a room of over 40 attorneys from small firms how many of them received newsletters, either electronic or print, from other professionals. Most of them raised their hands. Then I asked them, how many of you send out a newsletter to your prospects, clients, and referral sources?  Only 3 of them raised their hands!

One of the laws of marketing is “out of sight is out of mind.” If you don’t keep in touch with your prospects, clients and referral sources someone else will. The number one reason why you aren’t receiving more repeat business from your former clients is lack of connection-you haven’t stayed in touch with them. Make a commitment to change that!

Article By:

 of

Women, Influence and Power in Law Conference – October 2-4, 2013

The National Law Review is pleased to bring you information about the upcoming Women, Influence & Power in Law Conference:

WIPL2013_250x250

When:

Where:

The Only National Forum Facilitating Women-to-Women Exchange on Current Legal Issues

Women, Influence & Power in Law Conference is presented by Summit Business Media’s Legal Suite – InsideCounsel magazine, InsideCounsel.com (website), producers of the 13th annual IC SuperConference, the prestigious Transformative Leadership Awards, and creators of Project 5/165.

Presented by InsideCounsel Magazine, the pioneering monthly magazine exclusively serving general counsel and other top in-house legal professionals, the first annual Women, Influence & Power in Law Conference offers an opportunity for unprecedented exchange with women outside counsel. This unique event was created with the assistance of an unheralded advisory board comprised of highly placed women attorneys who are all direct reports to the general counsel and were drawn from across the country. These attorneys have the highest levels of expertise and experience in key practice areas.

The Women, Influence & Power in Law Conference is not a forum for lawyers to discuss so-called “women’s issues.” It is a conference for women in-house and outside counsel to discuss current legal topics, bringing their individual experience and perspectives on issues of:

  • Governance & Compliance
  • Litigation & Investigations
  • Intellectual Property
  • Government Relations & Public Policy
  • Global Litigation & Transactions
  • Labor & Employment
  • Executive Leadership Skills Development

Amendments to SEC Rules Regarding Broker Dealer Financial Responsibility and Reporting Requirements

Katten Muchin

The Securities and Exchange Commission adopted amendments to the financial responsibility requirements for broker dealers under the Securities Exchange Act of 1934 (Exchange Act) designed to safeguard customer securities and funds held by broker dealers. Such requirements include Exchange Act Rule 15c3-1 (Net Capital Rule), Rule 15c3-3 (Customer Protection Rule), Rules 17a-3 and 17a-4 (together, Books and Records Rules) and Rule 17a-11 (Notification Rule, and together with the Net Capital Rule, the Customer Protection Rule and the Books and Records Rules, the Financial Responsibility Rules).

The SEC amended the Customer Protection Rule to: (1) require “carrying broker dealers” that maintain customer securities and funds to maintain new segregated reserve accounts for account holders that are broker dealers; (2) place certain restrictions on cash bank deposits for purposes of the requirement to maintain a reserve to protect customer cash, by excluding cash deposits held at affiliated banks and limiting cash held at non-affiliated banks to an amount no greater than 15 percent of the bank’s equity capital, as reported by the bank in its most recent call report; and (3) establish customer disclosure, notice and affirmative consent requirements (for new accounts) for programs where customer cash in a securities account is “swept” to a money market or bank deposit product.

The SEC amended the Net Capital Rule to: (1) require a broker dealer when calculating net capital to include any liabilities that are assumed by a third party if the broker dealer cannot demonstrate that the third party has the resources to pay the liabilities; (2) require a broker dealer to treat as a liability any capital that is contributed under an agreement giving the investor the option to withdraw it; (3) require a broker dealer to treat as a liability any capital contribution that is withdrawn within a year of its contribution unless the broker dealer receives permission for the withdrawal in writing from its designated examining authority; (4) require a broker dealer to deduct from net capital (with regard to fidelity bonding requirements prescribed by a broker dealer’s self-regulatory organization (SRO)) the excess of any deductible amount over the amount permitted by the SRO’s rules; and (5) clarify that any broker dealer that becomes “insolvent” is required to cease conducting a securities business.

The SEC amended the Books and Records Rules to require large broker dealers (i.e., at least $1,000,000 in aggregate credits or $20,000,000 in capital) to document their market, credit and liquidity risk management controls. Under the amended Notification Rule there are new notification requirements for when a broker dealer’s repurchase and securities lending activities exceed 2,500 percent of tentative net capital (or, alternatively, a broker dealer may report monthly its stock loan and repurchase activity to its designated examining authority, in a form acceptable to such authority). In addition, the amended Notification Rule requires insolvent broker dealers to provide notice to regulatory authorities.

In a separate release, the SEC also amended Exchange Act Rule 17a-5 (Reporting Rule). Under the amended Reporting Rule, a broker dealer that has custody of the customers’ assets must file a “compliance report” with the SEC to verify that it is adhering to broker dealer capital requirements, protecting customer assets it holds and periodically sending account statements to customers. The broker dealer also must engage a Public Company Accounting Oversight Board (PCAOB)-registered independent public accountant to prepare a report based on an examination of certain statements in the broker dealer’s compliance report. A broker dealer that does not have custody of its customers’ assets must file an “exemption report” with the SEC citing its exemption from requirements applicable to carrying broker dealers. The broker dealer also must engage a PCAOB-registered independent public accountant to prepare a report based on a review of certain statements in the broker dealer’s exemption report. A broker dealer that is a member of the Securities Investor Protection Corporation (SIPC) also must file its annual reports with SIPC.

The rule amendments also require a broker dealer to file a new quarterly report, called Form Custody, that contains information about whether and how it maintains custody of its customers’ securities and cash. The SEC intends that examiners will use Form Custody as a starting point to focus their custody examinations. In addition, a broker dealer, regardless of whether it has custody of its clients’ assets, must agree to allow SEC or SRO staff to review the work papers of the independent public accountant if it is requested in writing for purposes of an examination of the broker dealer and must allow the accountant to discuss its findings with the examiners.

The effective date for the amendments to the Financial Responsibility Rules is 60 days after publication in the Federal Register. The effective date for the requirement to file Form Custody and the requirement to file annual reports with SIPC is Dec. 31, 2013. The effective date for the requirements relating to broker dealer annual reports is June 1, 2014.

Click here to read SEC Release No. 34-70072 (Financial Responsibility Rules for Broker Dealers).

Click here to read SEC Release No. 34-70073 (Broker Dealer Reports).

 of

Resale Price Maintenance in China: Enforcement Authorities Imposing Large Fines for Anti-Monopoly Law Violations

McDermottLogo_2c_rgb

Recently Shanghai High People’s Court reached a decision in the first lawsuit involving resale price maintenance (RPM) since China’s Anti-Monopoly Law (AML) came into effect five years ago.  Shortly thereafter, a key enforcement agency announced RPM-related fines against six milk powder companies, five of which are non-Chinese.  Both cases clearly show that RPM can be a violation of the AML, and that RPM is currently under much greater scrutiny by enforcement authorities.  It would be prudent for all foreign corporations active in China’s consumer markets to take heed of these changes in China and conduct an immediate review of any potential RPM violations.

On 1 August 2013 the Shanghai High People’s Court reached a decision in the first anti-monopoly lawsuit involving resale price maintenance (RPM) since China’s Anti-Monopoly Law (AML) came into effect in August 2008.  In addition to this judicial decision, on 7 August 2013 one of the key agencies in charge of enforcing the AML, the National Development and Reform Commission (NDRC), announced RPM-related fines of USD 109 million against six milk powder companies, five of which are non-Chinese.  Both the High People’s Court and the NDRC have been striving to clarify how they will treat RPM, and specifically have focused on the issue of whether RPM should be treated as a per se violation or should be evaluated according to a “rule of reason” analysis.

Judicial Decisions in Civil Lawsuits

According to the recent decision by the Shanghai High People’s Court, in order to hold that an RPM provision is a monopoly agreement, the court must find that the RPM provision has restricted or eliminated competition.  Furthermore, the burden of proof will be on the plaintiff to show a restriction or elimination of competition arising out of the RPM.  The High People’s Court explicitly stated that this burden is the opposite from the burden of proof for horizontal monopolies, such as a cartel, in which case the burden of proof falls on the defendant to show that the agreement does not have any effect of eliminating or restricting competition.  This burden for horizontal monopolies has been further examined and confirmed by the “Judicial Interpretation of Anti-Monopoly Disputes” that was issued by China’s Supreme People’s Court on 1 June 2012.

Administrative Decisions in Enforcement Actions—Liquor and Infant Milk Formula

There have been several key RPM enforcement actions in 2013.  In February, the NDRC imposed a fine of USD 80 million on the famous Chinese liquor brands Maotai and Wuliangye for requiring distributors to resell the products above a certain price, which is common in some sectors in China.  On 2 July, according to the Price Supervision and Anti-Monopoly Bureau of the NDRC, six milk powder companies came under investigation for RPM violations of the AML.  According to the NDRC’s statements on the case, “from the evidence obtained, the milk powder companies under investigation instituted price controls over distributors and retailers, which excluded and limited market competition and therefore are alleged to have violated the Anti-Monopoly Law”.  The NDRC later announced record fines in that case of USD 109 million, which were the equivalent of between 3 per cent and 6 per cent of the companies’ revenue in 2012.

According to media reports, in the Maotai and Wuliangye cases, the NDRC provided clear indications about some of the factors that it will consider when determining whether the RPM has “eliminated or restricted competition”.   Specifically, when assessing the relevant market and market power of the two companies, the NDRC analysed the market structure and the role played by the two companies in the liquor industry, as well as the degree to which the products are substitutable with similar products and the loyalty of consumers towards the two liquors.  Based on this analysis, the NDRC concluded that the RPM provisions in the agreements with distributors of the two liquor giants eliminated and restricted competition, and thus were vertical “monopoly agreements”.

According to recent media reports, the NDRC has indicated it will “severely crack down” on and sanction vertical monopoly agreements such as RPM if they are maintained by business operators dominant in the market.  If business operators are not dominant, the NDRC reportedly indicated that it would still investigate all vertical monopoly conduct and determine if there has been any elimination or restriction of competition.

Conclusions

These civil lawsuits and administrative cases clearly show that RPM can be a violation of the AML and that RPM is currently under much greater scrutiny by enforcement authorities.  If RPM is an issue in civil lawsuits, a plaintiff will have to prove that RPM eliminates or restricts competition.  However, there are some indications that this burden of proof may be easily met.  In administrative cases, the NDRC will have to be satisfied that it has sufficient proof to show there is an elimination or restriction of competition.  However, it is unclear what level of evidence would be required to show such a restriction and it may not be a very high level, especially if the accused business operator is dominant in the market.

RPM has been a common feature of distribution agreements and other contracts in many sectors in China.  However, the recent cases clearly show there is a serious compliance risk if RPM continues to be part of a corporation’s normal practices.  This is particularly true for business operators that have a dominant market position or a group of business operators that are regarded as jointly dominant under the AML (in China, in certain circumstances, dominance is presumed with a market share as low as 10 per cent).  Unless the RPM conduct clearly falls within an exception in Article 15 of the AML, a company using RPM may face serious fines and confiscation of illegal gains.  It would be prudent for all foreign corporations active in China’s consumer markets to take heed of these changes to the enforcement priorities of the competition/antitrust authorities in China and conduct an immediate review of any potential RPM violations.

Alex An and Jared Nelson also contributed to this article.

Article By:

 of

Breach Notification Rules under Health Insurance Portability and Accountability Act (HIPAA) Omnibus Rule

DrinkerBiddle

This is the fourth in our series of bulletins on the Department of Health and Human Services’ (HHS) HIPAA Omnibus Final Rule. In our bulletins issued on February 28, 2013 and March 18, 2013, available here, we described the major provisions of this rule and explained how the provisions of the rule that strengthen the privacy and security of protected health information (PHI) impact employer sponsored group health plans, which are covered entities under the HIPAA privacy rules. In our bulletin issued on April 4, 2013, available here, we focused on changes that will need to be made to business associate agreements under the Omnibus Final Rule. In this bulletin, we discuss the modifications to the breach notification rules made by the Omnibus Final Rule and provide health plan sponsors with information regarding the actions they must take to meet their breach notification obligations in the event of a breach of unsecured PHI.

Key Considerations for Health Plan Sponsors

  • Health plan sponsors must be able to identify when a breach occurs and when breach notification is required.
  • Health plan sponsors should review their procedures for evaluating potential breaches and should revise those procedures to incorporate the new “risk assessment” required under the Omnibus Final Rule.
  • Health plan sponsors should review their procedures for notifying individuals, HHS, and the media (to the extent required) when a breach of unsecured PHI occurs.
  • Health plan sponsors should make training workforce members about the breach notification rules a priority. Workforce members should be prepared to respond to breaches and potential breaches of unsecured PHI. A breach is treated as discovered by the covered entity on the first day a breach is known, or, by exercising reasonable diligence would have been known, to the covered entity. This standard is met if even one workforce member knows of the breach or would know of it by exercising reasonable diligence, and even if the breach is not immediately reported to the privacy officer. Discovery of the breach starts the clock ticking on the notification obligation and deadlines, which are described below.
  • Health plan sponsors should review each existing business associate agreement to make sure that responsibility for breach notification is allocated between the business associate and the health plan in a manner that is appropriate based on the business associate’s role with respect to PHI and the plan sponsor’s preferences for communicating with employees.

Health plan sponsors will want to review and revise, as necessary, the following to comply with the new rules described below:

Compliance Checklist

 Business Associate Relationships and Agreements 
 Policies and Procedures 
 Security Assessment and Breach Notification Plan 
 Risk Analysis — Security 
 Plan Document and SPD 
 Notice of Privacy Practices 
 Individual Authorization for Use and Disclosure of PHI
 Workforce Training

What is a Breach?

Background

In general terms, a breach is any improper use or disclosure of PHI. While HIPAA requires mitigation of any harmful effects resulting from an improper use or disclosure of PHI, the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 added a notification requirement. HITECH requires covered entities to notify affected individuals, HHS and, in some cases, the media following a breach of unsecured PHI. HITECH defined “breach” as an acquisition, access, use, or disclosure of an individual’s PHI in violation of the HIPAA privacy rules, to the extent that the acquisition, access, use or disclosure compromised the security or privacy of the PHI. The HHS interim final regulations further specified that PHI was compromised if the improper use or disclosure posed a significant risk of financial, reputational, or other harm. The interim final regulations also contained four exceptions to the definition of breach, adding a regulatory exception to the three statutory exceptions.

General Definition of Breach under the Omnibus Final Rule

Under the Omnibus Final Rule, “breach” continues to be defined as an acquisition, access, use, or disclosure of PHI that both violates the HIPAA privacy rules and compromises the security or privacy of the PHI. However, the Omnibus Final Rule modifies the interim final regulations in two important ways:

  • The interim final regulatory exception for an unauthorized acquisition, access, use, or disclosure of PHI contained in a limited data set from which birth dates and zip codes have been removed is eliminated.
  • The risk of harm standard is eliminated and replaced with a presumption that any acquisition, access, use, or disclosure of PHI in violation of the HIPAA privacy rules constitutes a breach. However, a covered entity (such as a health plan) can overcome this presumption if it concludes following a risk assessment that there was a low risk that PHI was compromised (see “Presumption that a Breach Occurred” below).

Statutory Exceptions to “Breach”

HITECH provided three statutory exceptions to the definition of breach that are also set forth in the Omnibus Final Rule. If an improper acquisition, access, use, or disclosure of PHI falls within one of the following three exceptions, there is no breach of PHI:

  • The acquisition, access, or use is unintentional and is made in good faith by a person acting under a covered entity’s (or business associate’s) authority, as long as the person was acting within the scope of his or her authority and the acquisition, access, or use does not result in a further impermissible use or disclosure of the PHI.
  • The disclosure of PHI is inadvertent and is made by a person who is authorized to access PHI at a covered entity (or business associate), as long as the disclosure was made to another person within the same covered entity (or business associate) who is also authorized to access PHI, and there is no further impermissible use or disclosure of the PHI.
  • The disclosure of PHI is to an unauthorized person, but the covered entity (or business associate) has a good faith belief that the unauthorized person would not reasonably have been able to retain the PHI.

The interim final regulations added a fourth exception for impermissible uses or disclosures of PHI involving only PHI in a limited data set, which is PHI from which certain identifiers are removed, provided birth dates and zip codes are also removed. The Omnibus Final Rule eliminates this exception so an impermissible use or disclosure of PHI in a limited data set will be presumed to be a breach of PHI as described below.

Presumption that a Breach Occurred

Under the Omnibus Final Rule, a breach is presumed to have occurred any time there is an acquisition, access, use, or disclosure of PHI that violates the HIPAA privacy rules (subject to the statutory exceptions outlined above).

However, a covered entity may overcome this presumption by performing a risk assessment to demonstrate that there is a low probability that the PHI has been compromised. If the covered entity chooses to conduct a risk assessment, the assessment must take into account at least the following four factors:

  • The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification.
  • The unauthorized person who used the PHI or to whom the disclosure was made.
  • Whether the PHI was actually acquired or viewed.
  • The extent to which the risk to the PHI has been mitigated.

The covered entity may consider additional factors as appropriate, depending on the facts and circumstances surrounding the improper use or disclosure. After performing its risk assessment, if the covered entity determines that there is a low probability that the PHI has been compromised, there is no breach and notice is not required. If the covered entity cannot reach this conclusion and if no statutory exception applies, then the covered entity must conclude that a breach has occurred.

The Omnibus Final Rule also makes clear that a covered entity may decide not to conduct a risk assessment and may instead treat every impermissible acquisition, access, use, or disclosure of PHI as a breach.

Drinker Biddle Note: Covered entities have the burden of proof to demonstrate either that an impermissible acquisition, access, use, or disclosure of PHI did not constitute a breach, or that all required notifications (as discussed below) were provided. Covered entities should review and update their internal HIPAA privacy and security policies to include procedures for performing risk assessments, as well as procedures for documenting all risk assessments and determinations regarding whether a breach has occurred and whether notification is required.

Providing Breach Notification

Covered entities are required to notify all affected individuals when a breach of unsecured PHI is discovered (unless an exception applies or it is demonstrated through a risk assessment that there is a low probability that the PHI has been or will be compromised). Notification to HHS is also required, but the time limits for providing this notification vary depending on the number of individuals affected by the breach. In addition, covered entities may be required to report the breach to local media outlets. The Omnibus Final Rule describes in detail the specific content that is required to be included in notifications to affected individuals, HHS, and the media.

Drinker Biddle Note: Although the Omnibus Final Rule defines when a “breach” has occurred, notification is required only when the breach involves unsecured PHI. PHI is considered “unsecured” when it has not been rendered unusable, unreadable, or indecipherable to unauthorized persons. HHS has issued extensive guidance on steps that can be taken to render PHI unusable, unreadable, and indecipherable.

Notification to Affected Individuals

Covered entities must notify affected individuals in writing without unreasonable delay, but in no event later than 60 calendar days, after discovery of a breach of unsecured PHI. The notice may be sent by mail or email (if the affected individual has consented to receive notices electronically). The Omnibus Final Rule also provides additional delivery methods that apply when an affected individual is deceased, and when a covered entity does not have up-to-date contact information for an affected individual.

Drinker Biddle Note: Again, a breach is deemed discovered on the first day such breach is known or by exercising reasonable diligence would have been known by any person who is a workforce member or agent of a covered entity or business associate.

Drinker Biddle Note: Please note that 60 days is an outer limit for providing the notice and is not a safe harbor. The operative standard is that the notice must be provided without unreasonable delay. Thus, based on the circumstances, a notice may be unreasonably delayed even though provided within the 60-day period.

Notification to HHS

Covered entities must notify HHS of breaches of unsecured PHI by electronically submitting a breach report form through the HHS website. If a breach of unsecured PHI affects 500 or more individuals, HHS must be notified at the same time that notice is provided to the affected individuals. For breaches of unsecured PHI that affect fewer than 500 individuals, the covered entity may keep a log of all such breaches that occur in a given year and submit a breach report form through the HHS website on annual basis, but not later than 60 days after the end of each calendar year.

Notification to the Media

When there is a breach of unsecured PHI involving more than 500 residents of a state or jurisdiction, a covered entity must notify prominent media outlets serving the state or jurisdiction. This media notification must be provided without unreasonable delay, and in no case later than 60 days after the breach is discovered.

State Law Requirements

Separate breach notification requirements may apply to a covered entity under state law. HIPAA’s breach notification laws preempt “contrary” state laws. “Contrary” in this context generally means that it is impossible to comply with both federal and state laws. As state breach notification laws are not typically contrary to the HIPAA breach notification rules, covered entities may have to comply with both laws.

Drinker Biddle Note: Covered entities should review applicable state breach notification laws and consider to what extent those laws should be incorporated into their HIPAA privacy policies and procedures.

Implications for Business Associate Agreements

If a covered entity’s business associate discovers that a breach of unsecured PHI has occurred, the Omnibus Final Rule requires the business associate to notify the covered entity without unreasonable delay, but in no event later than 60 days following the discovery of the breach. The notice must include, to the extent possible, the identification of each affected individual as well as any other information the covered entity is required to provide in its notice to individuals.

Although a covered entity is ultimately responsible for notifying affected individuals, HHS and the media (as applicable) when a breach of unsecured PHI occurs, the covered entity may want to delegate some or all of the notification responsibilities to its business associate. If a covered entity and its business associate agree that the business associate will be responsible for certain breach notification obligations, the scope of the arrangement should be clearly memorialized in the business associate agreement. In negotiating its business associate agreements, a covered entity should consider provisions such as:

  • Which party determines whether a breach occurred?
  • Who is responsible for sending required notices, and the related cost?
  • Indemnification in the event a business associate incorrectly determines that a breach did not occur, or a business associate otherwise fails to act appropriately.

Drinker Biddle Note: Covered entities that choose to delegate breach notification responsibilities to business associates should pay close attention to how such delegation provisions are drafted to minimize the possibility that the business associate will be considered an “agent” of the covered entity. Under the Omnibus Final Rule, when a business associate acts as an agent of the covered entity, the business associate’s discovery of a breach is imputed to the covered entity, and, therefore, a covered entity could be liable for civil monetary penalties related to the business associate’s act or omission. More information about issues related to drafting business associate agreements can be found in our bulletin issued on April 4, 2013, available here.

Compliance Deadline

Group health plans have until September 23, 2013 to comply with the new requirements of the Omnibus Final Rule. During the period before compliance is required, group health plans are still required to comply with the breach notification requirements of the HITECH Act and the interim final regulations.

Of course, the best course of action is to maintain adequate safeguards to prevent any breach. A recent settlement of HIPAA violations resulting in a $1.7 million payment to HHS is discussed in a separate publication, available here.

Article By:

of

Zappos and It's Effect On "Browswrap" Agreements

Lewis & Roca

Key Takeaways For An Enforceable Terms of Use Agreement

In light of the recent Nevada federal district court decision In re Zappos.com, Inc., ‎Customer Data Security Breach Litigation, companies should review and update their ‎implementation of browsewrap agreements to ensure users are bound to its terms. MDL No. ‎‎2357, 2012 WL 4466660 (D.Nev. Sept. 27, 2012).

A browsewrap agreement refers to the online Terms of Use agreement that binds a web ‎user merely by his continued browsing of the site, even when he is not aware of it. Any ‎somewhat experienced web user is no stranger to the Terms of Use link that leads to the ‎browsewrap agreement. Yet, the users tend to ignore the link’s existence, and rarely think of it ‎as a “contract” with any practical effects. In Zappos, the court questioned the browsewrap ‎agreement’s validity particularly because of this tendency among web users. The court ruled the ‎arbitration clause in Zappos’ browsewrap Terms of Use was unenforceable because the users did ‎not agree to it and Zappos had the right to modify the terms at any time. ‎

Background of the Case

Founded in 1999, Zappos.com is a subsidiary of Amazon.com and one of the nation’s ‎biggest online retailers for footwear and apparel. Currently headquartered in Henderson, ‎Nevada, the company has more than 24 million customer accounts. In mid-January 2012, its ‎computer system experienced a security breach in which hackers attempted to access the ‎company’s customer accounts and personal information.

After Zappos notified its customers about the incident, customers from across the country ‎filed lawsuits against Zappos, seeking relief for damages arising from the breach. The cases were ‎transferred to and consolidated in Nevada. Zappos then sought to enforce the arbitration clause ‎contained in its Terms of Use, which would stay the litigation in federal court and compel the ‎case for arbitration. The court denied Zappos’ motion on two grounds: there was no valid ‎agreement to arbitrate due to the lack of assent by the plaintiffs and the contract was ‎unenforceable because it reserved to Zappos the right to modify the terms at any time and ‎without notice to its users.

Lessons Learned from the Browsewrap

Mutual Assent Must Be Clear 

Arbitration provisions are a matter of contract law, and the traditional elements of a ‎contract must be met even though Zappos’ Terms of Use was presented in electronic, ‎browsewrap form on the website. An essential element of contract formation is mutual assent by ‎the parties to the contract, which the court found was missing in this case as there was no ‎evidence of the plaintiffs’ assent.

The court compared the browsewrap agreement with another popular form of online terms ‎of use agreement, the “clickwrap” agreement. Clickwrap agreements require users to take ‎affirmative actions, such as clicking on an “I Accept” button, to expressly manifest their assent to ‎the terms and conditions.‎

Since Zappos’ browsewrap agreement did not require its users to take similar affirmative ‎action to show their assent to the terms and conditions, there was no direct evidence showing ‎that the plaintiffs consented to or even had actual knowledge of the agreement, including the ‎arbitration clause.‎

Link It Front and Center 

Furthermore, the court found Zappos’ Terms of Use hyperlink was inconspicuous and ‎thus did not provide reasonable notice to its users. The link was a) “buried” in the middle or ‎bottom of each page and became visible when a user scrolls down, b) appeared “in the same size, ‎font, and color as most other non-significant links,” and c) the website did not “direct a user to ‎the Terms of Use when creating an account, logging in to an existing account, or making a ‎purchase.” The court concluded that under ordinary circumstances, users would have no reason ‎to click on the link.‎

Unilateral Right to Modify or Terminate Won’t Work

Another problem with Zappos’ browsewrap agreement was that it was illusory and thus ‎unenforceable. In the agreement, the company “retain[ed] the unilateral, unrestricted right to ‎terminate the arbitration agreement” and had “no obligation to receive consent from, or even ‎notify, the other parties to the contract.” Users would unsuspectingly agree to the changes by ‎continuing to use the site. Under this provision, Zappos could seek to enforce the arbitration ‎clause, as it did here, or not enforce it by modifying the clause without notice to its users when it ‎was no longer in its interest to arbitrate. In either circumstance, the users would still be bound to ‎the agreement.

Implications for Companies

As a result of this decision, companies should carefully reassess the display and content ‎of the online terms of use they adopt to ensure their enforceability. In a narrow sense, the ‎decision means an arbitration clause in a browsewrap agreement similar to Zappos’ may be ‎deemed unenforceable. More broadly, this decision threatens the validity and enforceability of ‎other terms and conditions contained in a browsewrap agreement, which may deprive the ‎company of the agreement’s protection and favorable terms. ‎

Clickwrap agreements seem to provide the solution to Zappos’ problem. The court ‎suggested a clickwrap agreement could obtain a user’s assent to the terms and conditions. A ‎company may implement the clickwrap agreement through account registration or purchase ‎check-out, tailored to the nature of the company’s business and user interaction. The system may ‎require a user to click “I Accept” to secure the user’s assent to be bound by the agreement before ‎he can proceed further on the website. ‎

On the other hand, the court did not conclude that browsewrap agreements are never ‎enforceable. Other courts have held that browsewrap agreements are generally enforceable. ‎Enforceability largely depends on how the company presents the link and terms to the users such ‎that the users would have reasonable notice of the information. Accordingly, a browsewrap ‎agreement may be enforceable if the hyperlink is conspicuously located and displayed. ‎

In addition, companies should communicate and secure a user’s assent to any ‎modification when the user has previously accepted the terms and conditions. The user may ‎consent through another clickwrap agreement showing the modified terms. With a browsewrap ‎agreement, notice of the changes should, at the minimum, be conspicuously displayed on the ‎webpage. ‎

What This Means 

The Zappos decision reflects a change in the public policy on web activities, and users ‎who do not affirmatively agree to the online Terms of Use may no longer be bound. Consumers ‎are increasingly turning to the web for goods and services. In reaction, courts are beginning to ‎look closer into the transactions and resulting issues that occur online. In this process, courts are ‎testing and requiring new standards for these Terms of Use agreements. Companies should be ‎aware of the court’s evolving attitude towards the different types of agreements. You are ‎encouraged to seek legal guidance to properly adapt your implementation of Terms of Use ‎agreements. Failure to update your Terms of Use agreements may leave you exposed to ‎unfavorable terms that the Terms of Use is designed to prevent.‎

Will Obesity Claims Be the Next Wave of Americans with Disabilities Act (ADA) Litigation?

Poyner SpruillIn a new federal lawsuit in the U.S. District Court for the Eastern District of Missouri, Whittaker v. America’s Car-Mart, Inc., the plaintiff is alleging his former employer violated the Americans with Disabilities Act (ADA) when it fired him for being obese.  Plaintiff Joseph Whittaker claims the company, a car dealership chain, fired him from his job as a general manager last November after seven years of employment even though he was able to perform all essential functions of his job, with or without accommodations.  He alleges “severe obesity … is a physical impairment within the meaning of the ADA,” and that the company regarded him as being substantially limited in the major life activity of walking.

The EEOC has also alleged morbid obesity is a disability protected under the ADA.  In a 2011 lawsuit filed on behalf of Ronald Katz, II against BAE Systems Tactical Vehicle Systems, LP (BAE Systems), the EEOC alleged the company regarded Mr. Katz as disabled because of his size and terminated Katz because he weighed over 600 lbs.  The suit alleged Mr. Katz was able to perform the essential functions of his job and had received good performance reviews.  The case was settled after BAE Systems agreed to pay $55,000 to Mr. Katz, provide him six months of outplacement services, and train its managers and human resources professionals on the ADA.  In a press release announcing the settlement, the EEOC said, “the law protects morbidly obese employees and applicants from being subjected to discrimination because of their obesity.”

Similarly, in 2010, the EEOC sued Resources for Human Development, Inc. (RHD) in the U.S. District Court for the Eastern District of Louisiana, for firing an employee because of her obesity in violation of the ADA. According to the suit, RHD fired Harrison in September of 2007 because of her severe obesity.  The EEOC alleged that, as a result of her obesity, RHD perceived Harrison as being substantially limited in a number of major life activities, including walking.  Ms. Harrison died of complications related to her morbid obesity before the case could proceed.

RHD moved for summary judgment, arguing obesity is not an impairment.  The court, having reviewed the EEOC’s Interpretive Guidance on obesity, ruled severe obesity (body weight more than 100% over normal) is an impairment.  The court held that if a plaintiff is severely obese, there is no requirement that the obesity be caused by some underlying physiological impairment to qualify as a disability under the ADA.  The parties settled the case before trial for $125,000, which was paid to Ms. Harrison’s estate.

In June 2013, the American Medical Association (AMA) declared that obesity is a disease.  Although the AMA’s decision does not, by itself, create any new legal claims for obese employees or applicants under the ADA, potential plaintiffs are likely to cite the new definition in support of ADA claims they bring.  In light of these recent developments, obesity related ADA claims will likely become more common.

Article By:

 of

Centers for Medicare and Medicaid Services (CMS) Issues Revised Process for Making National Coverage Determinations

vonBriesen

Yesterday, the U.S. Department of Health and Human Services Centers for Medicare and Medicaid Services (CMS) published its revised process for external requests and internal reviews for new national coverage determinations (NCDs) or for reconsideration of existing NCDs.  Today’s guidance supersedes CMS’s previous process issued in 2003.

Prior to formally requesting an NCD or reconsideration, CMS encourages requesters to contact CMS staff in the Coverage and Analysis Group (CAG).  The CAG staff may identify additional needed information and supporting documentation.  The requester may also find that a formal request is not needed.  For example, CAG staff could determine that coverage of the item or service is already available or that the item or service falls outside the scope of an NCD.

If the requester decides to move forward with requesting an NCD review, the requester must provide the following, which would constitute a “complete, formal request”:

  1. A final letter of request that is clearly identified as “A Formal Request for A National Coverage Determination.”
  2. A full and complete description of the item or service in the request.
  3. The scientific evidence supporting the clinical indications for the item or service, including the proposed use of the item or service, the target Medicare population, the medical indication(s) for which the item or service can be used, and whether the item or service is used by health care providers or beneficiaries.
  4. The Medicare Part A or B benefit category or categories in which the item or service falls.
  5. Additional information if the item or service is currently under FDA review.

Once CMS receives the complete formal request, it will add the request to its tracking sheet on the CMS website and permits public comments on the request.  CMS will also initiate a formal evidence review and will generally issue a proposed decision within six months of opening the NCD review.  CMS will accept public comments for 30 days after issuing the proposed decision.  CMS will then issue a final NCD within 60 days of the end of the public comment period.  These timeframes could be extended, however, if CMS commissions a third party technology assessment, convenes the Medicare Evidence Development and Coverage Advisory Committee, or requests a clinical trial.

Today’s guidance also provides the process for requesting reconsideration of an NCD.  The reconsideration must be in writing and clearly identified.  The requester must also provide documentation meeting one of the following:

  1. Additional scientific evidence not considered at the most recent review and a “sound premise” that the evidence may change the NCD decision.
  2. Arguments that CMS’s conclusion materially misinterpreted the existing evidence at the time the NCD was decided.

CMS will generally accept or reject an external NCD reconsideration request within 60 days of receiving the request.

In certain circumstances, CMS may internally initiate review of an NCD.  CMS will also periodically review NCDs that have not been reviewed in the past 10 years.  CMS will publish a list of NCDs proposed for removal and rationale for removal and provide a 30 day public comment period.  CMS anticipates that this process will reduce the timeframe for removal or amendment of an NCD.  Currently, removal or amendment takes 9 to 12 months.

For more information, please see the guidance at this link.

Article By:

 of

Imperfect Fit: Abercrombie Store Threatens Location In Tailored-Clothing Mecca Savile Row

Womble Carlyle

We’ve all heard the various means of describing the inappropriate place for an otherwise benign thing, rendering the otherwise benign thing a hazard or a liability or just plain offensive.  In 1855, the author Robert De Valcourt referred to, “An awkward man in society is like a bull in a china shop, always doing mischief.”  Robert De Valcourt, The Illustrated Manners Book: A Manual of Good Behavior and Polite Accomplishments (1855).  In 1926, Justice Sutherland opined, “A nuisance may be merely a right thing in the wrong place — like a pig in the parlor instead of the barnyard.”  Village of Euclid v. Ambler Realty Co.272 U.S. 365 (1926).

Village of Euclid, of course, upheld the constitutionality of the zoning concept, a replacement of single purposes ordinances and private litigation for land use management.  See David Owens, Land Use Law In North Carolina (2d ed. 2011).

bull china shop retail real estate land use

“Late Ming dynasty, kaolin and pottery stone foundation, cobalt firing enamelling with Arabic lettering.  If only I could find a well-tailored suit and some skinny jeans to go with this vase.” 

Well, the “pig” or the “bull” in one particular instance is anticipated to be an Abercrombie and Fitch children’s store in the heart of London.

The “china shop” or the “parlor”?  Well, that may be Savile Row, legendary collection of fine British tailors and suitmaker to the rich and famous.  Consider this quote from Mark Henderson, chairman of “heritage tailor Gieves & Hawkes”, reported by CNBC about objection to the Abercrombie store:

“Opening a kids store on Savile Row is a somewhat bizarre thing to do. It’s a fairly narrow street, it’s got its own atmosphere to it.  It’s just fundamentally a mistake from Abercrombie – they don’t get everything right.”

We don’t purport to know the land use laws in London, we’ll leave that to the Ealing Common Land Use Barrister blog, but it’s always interesting to see just how common and universal land use issues can be.

It’s also interesting to see how different motives underpin all land use issues.  For example, one might assume the “hubub” over the Abercrombie store is a degradation of the historical nature of the narrow street, as Mr. Henderson alludes.  Well, maybe the distaste is different for another, even another from a seemingly similar perspective.  Consider this worry about “higher rents”, from John Hitchcock of “bespoke tailor Anderson & Sheppard” (man, I love the British):

“One or two of the tailors are concerned it might put the rents up, and it will do, I suppose.  There’s only so much rent we can pay. Our costs are already high as we make every suit by hand – unlike the big chains which don’t make their products on the premises.”

The Lesson of the Day

Land use decisions are nuanced legally but they are also very nuanced politically.  In this one space, one street within one small universe of British tailors, we have two very distinct motives for refusing the Abercrombie store.  Yes, both are opposed to the store, but each is opposed for a different reason, which means a political salve must address, at least, two distinct concerns.

One must fully and fairly understand the forces against which one is working, before success is at hand.  I think Sun Tzu, the Zhou Dynasty Land Use Litigator, said that.

Article By:

 of