E-Scooter and E-Bike Injuries Soar

Injuries caused by e-scooters and e-bikes increased steeply from 2021 to 2022, highlighting the serious risks associated with these transportation devices (officially known as “micromobility products”).

According to a new report from the U.S. Consumer Product Safety Commission (CPSC), titled “Micromobility Products-Related Deaths, Injuries, and Hazard Patterns,” these kinds of injuries increased by almost 21 percent from 2021 to 2022.

This marks the continuation of an alarming upward trend, illustrating that the 2023 increase is much more than a fluke: these types of injuries have increased by an average of 23 percent each year since 2017.

Digging into the data on e-bike injuries

To help you better understand the new data on micromobility devices, here are some of the most notable revelations from the latest CPSC report:

  • 46% of all e-bike injuries from 2017 to 2022 occurred in 2022.
  • Although children under the age of 15 constitute only 18 percent of the U.S. population, they made up 36 % of those injured by micromobility devices from 2017 to 2022.
  • There were 360,800 micromobility product-related emergency department visits from 2017 to 2022.
  • From January 2021 to November 2022, there were 19 deaths associated with micromobility device fires.

In light of the dangers of e-bikes and related devices—now backed up by this extensive and detailed data—CPSC called for “more than 2,000 manufacturers, importers, distributors and retailers of [micromobility devices] to review their product lines and ensure they comply with established voluntary safety standards to reduce the serious risk of dangerous fires with these products or face possible enforcement action.”

E-bike and e-scooter safety tips

While using an electric bike or scooter can be dangerous, there are numerous ways to protect yourself so you can enjoy these devices’ physical and mental health benefits while minimizing their overall risks:

Micromobility device-specific safety tips

  • According to CPSC, you should only use micromobility devices that you are certain were “designed, manufactured, and certified for compliance with the applicable consensus safety standards.”
  • Only use the supplied charger to charge your e-bike or related device, and only charge it when you’re present (in case of a dangerous malfunction). Always make sure to unplug it when you’re done charging.
  • Only use an approved replacement battery pack; likewise, never use a micromobility device with a battery pack that was modified with used cells or by unqualified individuals.
  • Do not dispose of lithium batteries in the trash. Bring used batteries to a hazardous waste collection center or specialized battery recycler.

General bike and scooter safety tips

  • Always wear a helmet in case of a fall.
  • Every time you take out your bike/scooter, check the following parts for damage:
    • Handlebars
    • Brakes
    • Throttle
    • Bell
    • Lights
    • Tires
    • Cables
    • Frame
  • To ensure vehicles and pedestrians can see you, slow down, remain aware of your surroundings, and use your bell or horn to let others know you’re there.
  • Do not ride your bike or scooter after consuming alcohol or other drugs.
  • Don’t share your scooter with another person. Only one person should ride it at a time.
  • Avoid bumps and other obstacles

If you’ve been injured by an e-bike or another lithium battery-powered device, you have options for asserting your rights and may be entitled to compensation. With the support of a legal team that understands micromobility-related injuries, your case will have the best possible chance of succeeding.

How to Grow Your Law Firm Blog & Attract More Clients

Despite what many marketers might have you believe, blogging is not dead – not even close. Blogging is still one of the best tools a business has for generating organic traffic, drumming up engagement, and improving customer retention.

And blogging works for law firms as well. Law firms can use blogging to share business updates, grow an email list, demonstrate thought leadership, and – yes – even attract new clients.

In this guide, we’re talking all about how to grow your law firm blog. We’ll share loads of tips for how to improve your blog’s SEO and draw in more clients!

What is a Blog, Really?

A blog is more than just a medium for sharing your thoughts with the online world – a common misconception. No, a blog is really a digital tool that people and businesses can use to generate traffic, grow an online community, attract customers, and so much more.

A blog is usually a scrolling feed of posts on your website. And while you may post on your blog once in a while, many law firms aren’t taking full advantage of the benefits a blog can bring for their business.

The (Many) Perks of Blogging for Law Firms

There are many benefits to keeping up with your law firm blog. It’s not just for optics! Having an active blog is a great way to increase traffic and capture the attention of potential clients.

Here are just a few of the (many) benefits of blogging for law firms:

  • Client education: Many people are confused about (or unaware) of their legal rights, or the intricacies of the legal process. You can use your blog to educate new and potential clients, helping them make informed decisions regarding their case.
  • Thought leadership: Blogging gives you a platform for showcasing your knowledge, sharing expertise, and demonstrating thought leadership. This can set you apart from your competitors and build trust with potential clients.
  • Organic traffic: Updating your blog with relevant content can boost your website’s search engine rankings, making it easier for potential clients to find you online.
  • Build loyalty: Foster a sense of loyalty with existing clients by sharing valuable, easy-to-understand insights regarding legal issues, processes, and solutions.
  • Lead generation: A well-written blog can act as a magnet for attracting potential clients. When readers find the content useful, they’re more likely to reach out to work with you.
  • Networking opportunities: Great blog content can get picked up by other publications and legal professionals, landing you speaking engagements, networking opportunities, referrals, and more.
  • Social media content: Blog articles can be repurposed and shared on social media, driving even more traffic back to your law firm’s website.
  • Brand identity: Blogging allows you to control your brand narrative, showcase your firm’s values, and talk about the topics that matter most to your audience.
  • Ethical fulfillment: Many jurisdictions encourage attorneys to provide public education. Blogging can be a way to fulfill this legal ethical obligation.

6 Tips for Growing Your Law Firm Blog

Ready to grow your law firm blog? If so, you’ll want to incorporate these tips. Learn more about SEO, audience engagement, copywriting, and more to see better results from your blog.

1. SET YOUR BLOGGING GOALS

Don’t skip this step! Many business owners jump into blogging without setting specific goals, which is a surefire way to end up burning out or getting frustrated that you aren’t seeing “results”.

You have to define what “results” means for you. Do you want more organic traffic? More form fills on your website? More shares on social media? Setting your goals matters!

There are other types of goals you can set as well. For example, you might set a goal to:

  • Post on your blog once per week
  • Land a guest posting opportunity on another legal blog
  • Generate 10 new backlinks to your website
  • Feature an industry leader on your blog
  • Learn how to create engaging blog graphics
  • Establish a social media sharing strategy for your blog

No matter the objective, it can be helpful to set goals because it will help you 1) determine the next steps you need to take, 2) recognize your wins along the way, 3) set a clear measure of success, and 4) stay motivated to keep blogging.

So, think about why blogging is important for your law firm and what you want to accomplish with your blogging strategy.

Brad Koffel had this to say about his law firm’s blogging strategy:

“At the top of the funnel are potential consumers of legal services who are doing their own research or they are simply interested in a topic. At the bottom of the funnel are prospective clients who are ready to retain a lawyer. Part of my firm’s DNA is offering valuable, timely experience-based information to these folks. At the very minimum we’ve helped someone without investing any additional labor or overhead. At the maximum, it generates a lead to our intake specialists while reinforcing our firm as a statewide leader in criminal defense.”

2. FIND YOUR BRAND VOICE

Don’t be like every other law firm blog out there. Instead, figure out what makes your law firm unique and how to incorporate that identity into your blog content.

For example, your law firm may be “small town” status and family-owned. Your blog should likely convey, then, a sense of familiarity, trust, and support.

Alternatively, your law firm may be high-charged, corporate, and ambitious. With that, your blog content might sound more direct and energetic.

Revisit your law firm’s mission statement (if you have one) or otherwise think about what makes your firm different from your competitors. Then, determine what you want your brand voice to sound like: corporate, friendly, professional, funny, animated, compassionate, etc.

Once you’ve established your brand voice, this will be the guidepost for crafting blog content that’s on-brand and suited for your target audience. It will help you stand out from other firms and build trust with potential clients, who come to know what makes your brand unique.

If you’re not great at writing, consider having someone on your team write the content or work with an experienced copywriter who can capture your brand’s voice in your blog.

Attorney Digger Earles has seen blogging pay off for his law firm in terms of SEO and conversions:

“We feature a combination of firm news and blog posts about specific issues people might experience after they have been injured. The blog posts targeting specific queries draw people to the website, and our firm news converts them when they are doing research on us, deciding between us and other law firms. Also, our domain ranking has consistently been higher than ever over the past month or so, at 36. We were averaging 31/32 in 2022.”

3. CREATE A BLOGGING PLAN

“Winging it” when it comes to your blog can lead to you wasting time (or money) creating content that doesn’t generate any results. While sometimes you get lucky, the best way to create consistent, traffic-generating content is to make a plan.

This starts with conducting keyword research to determine what topics your audience is searching for, relevant to your areas of expertise.

Tools like Semrush.com and Ahrefs.com allow you to search for topics, find relevant keywords, and see the search volume and competition level for each. For most firms, going after low competition, mid-to-high volume keywords is a safe bet.

Then, once you have a few select topics, you can line them up to create your blogging schedule.

For example, say you determine that you want to target the keywords “how to contest a will”, “file for child custody California”, “calculate child support payments”, and “legal rights of grandparents”. These keywords could be used for the following blog topics:

  • “How to Contest a Will and Testament – 5 Steps”
  • “4 Steps to Filing for Child Custody in California”
  • “How to Calculate Child Support Payments”
  • “Legal Rights of Grandparents in California: What You Need to Know”

Once you’ve established your target keywords and the associated blog titles, you can create a blogging schedule. This will vary depending on your bandwidth to create new content.

Here’s how one law firm is growing their blog by keeping up with a consistent schedule:

“To make DiBella Law Office’s blog a powerful lead generation tool we try to maintain a consistent posting schedule, promote it through various channels, and incorporate lead generation forms to capture visitor information. We try to showcase our firm’s expertise and engage with readers. We use our blog to try to establish trust, credibility, and a strong online presence, ultimately generating valuable leads in the legal industry.” – Chris DiBella, DiBella Law Office

Conducting keyword research before writing new posts will allow you to target topics that potential clients are actively searching for in Google. Then, with blogging SEO, you can attract these users and drive more potential clients to your website.

4. IMPLEMENT BLOGGING SEO BEST PRACTICES

You don’t have to be a law firm SEO expert to drive more traffic to your blog. All you need to do is implement the basics to ensure your blog posts are capable of being crawled and indexed by search engines.

When writing and optimizing a blog posts, here are the steps you should follow:

  • Craft a compelling title that includes your target keyword (or a close variation) to improve rankings and entice clicks
  • Write high-quality content that thoroughly covers your target topic and provides value to your audience
  • Organize your content with headings (H1, H2s, H3s, and H4s) to make your content easy to “scan” and “read” by search engines and users
  • Include relevant images, graphics, and/or videos to increase engagement
  • Add internal links to related content (blog posts or pages) on your website
  • Add external links to related (authoritative) sources, publications, or articles
  • Include a concise yet descriptive meta description that explains what your blog post is about
  • Add social sharing buttons to encourage readers to share your content on X, Facebook, Instagram, LinkedIn, etc.
  • Proofread and edit your content for grammar, spelling, and tone of voice
  • Use a succinct but descriptive URL, ideally without “stop” words (e.g. “of”, “and”, “the”)

Of course, there are many more strategies for improving your law firm’s SEO, such as mobile optimization, Featured Snippets, and local optimization, so be sure to check out additional resources to support your overall strategy.

Here’s what these attorneys had to share about how blogging has benefited their businesses:

“At Vaughan & Vaughan we believe the answer to this question is pretty simple. As we approach every interaction, whether online, during a free consultation, or as we work on a case, we focus on providing real value in our services.” – Charles Vaughan, Vaughan & Vaughan

“Our blog emphasizes educational content tailored to Personal Injury cases, particularly for Georgia, empowering our audience with the knowledge needed for informed decisions. By addressing concerns and offering localized insights, we build trust and confidence, increasing conversion rates as potential clients feel better prepared to engage with our firm.” – Jody David, John Foy

“Blogging has helped enhance our firm’s online presence and credibility by providing valuable legal insights and information to our potential clients. It also helped establish our firm as an authority in our field, helping to attract and retain clients seeking our legal services.” – Michael Simmrin, Simmrin Law Group

“Blogging has been instrumental in helping my law firm reach a wider audience and connect with potential clients. By sharing informative articles and legal expertise, we’ve not only established ourselves as trusted authorities in our field but also fostered meaningful relationships with individuals seeking our legal services.” – Bob Goldwater, Birth Injury Lawyers Group

5. PROMOTE YOUR CONTENT ON OTHER PLATFORMS

While your goal may be to drive more organic traffic from search engines, why wait for this traffic when you could get traffic from other platforms as well? It’s best to have a social media sharing strategy so you can also get traffic from X, LinkedIn, Instagram, Pinterest, and Facebook.

You can use graphic design tools like Canva.com to create custom graphics to share alongside your blog post on social media. You can even write your social media captions in advance, or use AI tools like ChatGPT to write social media copy for you!

When sharing your blog posts on social media, be sure to include an attention-grabbing caption and relevant hashtags.

Here’s an example of a social media caption for a law firm blog post:

“Navigating child custody laws can be complex and emotional. Dive into our latest blog post to demystify the process and know your rights as a parent. ✒️📖 #ChildCustody #FamilyLawInsights Click the link in our bio to read more about it!”

6. PUSH YOUR BLOG POSTS OUT TO YOUR EMAIL LIST

Another way to promote your blog is to share your latest posts out to your email list.

If you don’t already have an email list – don’t worry. You can also use your blog to GROW your email list by embedding an email signup form within your blog posts.

If you do have an email list, then you can use an email marketing tool like MailerLite to design email templates, write your email copy, schedule your emails, and check subscribes/unsubscribes. You can add links to your most recent blog posts, directing more users to your website.

You can also generate blog post ideas directly from your audience. Simply send out an email to your list asking subscribers what topics they care about or what questions they have. You can then turn these ideas into new blog posts!

Attorney Tom Anelli at DWI Tom uses his blog to speak to the interests of his target audience:

“I use blog posts to generate leads by knowing my audience and addressing their specific concerns with helpful content. I also select blog topics that are likely to engage comments and respond quickly, and in the past, I’ve offered free resources (like eBooks or guides) which require my readers to provide their contact information.”

Feel free to use this email template to generate more blog post ideas:

“Subject: We Want to Hear From You!

Dear [Recipient’s Name],

I hope this email finds you well. At [Law Firm’s Name], we’re constantly looking for ways to better serve our community and valued clients like you.

Our blog has always been a platform where we aim to provide insights, answer pressing questions, and shed light on the many facets of the legal world. As we plan our content for the upcoming months, we want to ensure it’s not only informative but also relevant to your needs.

And that’s where you come in!

We would love to hear from you about the topics, questions, or legal issues you’re most curious about. Whether it’s a deep dive into a specific law, tips for navigating certain legal processes, or just general legal advice, your input will be invaluable in guiding our content creation.

Kindly reply to this email with any suggestions or topics you’d like us to cover. Your feedback is the cornerstone of our commitment to continuous learning and sharing.

Thank you for being an essential part of the [Law Firm’s Name] community. We eagerly await your insights!

[Your Name]

[Law Firm’s Name]”

Make Your Law Firm Blog Work for You

Your law firm’s blog is a powerful tool for generating more organic traffic and leads. With SEO, you can capture the attention of people who are already searching for services like yours. With social media and email, you can drive more users to your blog and even attract new clients.

If you’re not keeping up with your blog, you may be missing out on more traffic and potential clients. By implementing a blogging plan, you can focus on creating better content (quality over quantity) and start seeing better results from your efforts.

It’s time to use your blog to grow your business. Implement the tips above to get more traffic, boost engagement, increase your authority, and draw in more clients!

Article by Jason Hennessey of Hennessey Digital

Cybersecurity Awareness Dos and Donts Refresher

As we have adjusted to a combination of hybrid, in-person and remote work conditions, bad actors continue to exploit the vulnerabilities associated with our work and home environments. Below are a few tips to help employers and employees address the security threats and challenges of our new normal:

  • Monitoring and awareness of cybersecurity threats as well as risk mitigation;
  • Use of secure Wi-Fi networks, strong passwords, secure VPNs, network infrastructure devices and other remote working devices;
  • Use of company-issued or approved laptops and sandboxed virtual systems instead of personal computers and accounts, as well as careful handling of sensitive and confidential materials; and
  • Preparing to handle security incidents while remote.

Be on the lookout for phishing and other hacking attempts.

Be on high alert for cybersecurity attacks, as cybercriminals are always searching for security vulnerabilities to exploit. A malicious hacker could target employees working remotely by creating a fake coronavirus notice, phony request for charitable contributions or even go so far as impersonating someone from the company’s Information Technology (IT) department. Employers should educate employees on the red flags of phishing emails and continuously remind employees to remain vigilant of potential scams, exercise caution when handling emails and report any suspicious communications.

Maintain a secure Wi-Fi connection.

Information transmitted over public and unsecured networks (such as a free café, store or building Wi-Fi) can be viewed or accessed by others. Employers should configure VPN for telework and enable multi-factor authentication for remote access. To increase security at home, employers should advise employees to take additional precautions, such as using secure Wi-Fi settings and changing default Wi-Fi passwords.

Change and create strong passwords.

Passwords that use pet or children names, birthdays or any other information that can be found on social media can be easily guessed by hackers. Employers should require account and device passwords to be sufficiently long and complex and include capital and lower case letters, numbers and special characters. As an additional precaution, employees should consider changing their passwords before transitioning to remote work.

Update and secure devices. 

To reduce system flaws and vulnerabilities, employers should regularly update VPNs, network infrastructure devices and devices being used to for remote work environments, as well as advise employees to promptly accept updates to operating systems, software and applications on personal devices. When feasible, employers should consider implementing additional safeguards, such as keystroke encryption and mobile-device-management (MDM) on employee personal devices.

Use of personal devices and deletion of electronic files.

Home computers may not have deployed critical security updates, may not be password protected and may not have an encrypted hard drive. To the extent possible, employers should urge employees to use company-issued laptops or sandboxed virtual systems. Where this is not possible, employees should use secure personal computers and employers should advise employees to create a separate user account on personal computers designated for work purposes and to empty trash or recycle bins and download folders.

Prohibit use of personal email for work purposes.

To avoid unauthorized access, personal email accounts should not be used for work purposes. Employers should remind employees to avoid forwarding work emails to personal accounts and to promptly delete emails in personal accounts as they may contain sensitive information.

Secure collaboration tools.

Employees and teams working from home need to stay connected and often rely on instant-messaging and web-conferencing tools (e.g., Slack and Zoom). Employers should ensure company-provided collaboration tools, if any, are secure and should restrict employees from downloading any non-company approved tools. If new collaboration tools are required, IT personnel should review the settings of such tools (as they may not be secure or may record conversations by default), and employers should consider training employees on appropriate use of such tools.

Handle physical documents with care.

Remote work arrangements may require employees to take sensitive or confidential materials offsite that they would not otherwise. Employees should be advised to handle these documents with the appropriate levels of care and avoid printing sensitive or confidential materials on public printers. These documents should be securely shredded or returned to the office for proper disposal.

Develop clear guidelines and train employees on cyberhygiene.

To ensure employees are aware of remote work responsibilities and obligations, employers should prepare clear telework guidelines (and incorporate any standards required by applicable regulatory schemes) and post the guidelines on the organization’s intranet and/or circulate the guidelines to employees via email. A list of key company contacts, including Human Resources and IT security personnel, should be distributed to employees in the event of an actual or suspected security incident.

Prepare for remote activation of incident response and crisis management plans.

Employers should review existing incident response, crisis management and business continuity plans, as well as ensure relevant stakeholders are prepared for remote activation of these plans, such as having hard copies of relevant plans and contact information at home.

DO DON’T
 

  • DO create complex passphrases
  • DO change home Wi-Fi passwords
  • DO create a separate Wi-Fi network for guests
  • DO install anti-malware and anti-virus software for internet-enabled devices
  • DO keep software (including anti-virus/anti-malware software), web browsers, and operating systems up-to-date
  • DO delete files from download folders and trash bins
  • DO immediately report lost or stolen devices
  • DO log off accounts and close windows and browsers on shared devices
  • DO review mobile app settings on shared devices
  • DO handle physical documents with sensitive and/or confidential information in a secure manner

 

 

  • Do NOT use public or unsecure Wi-Fi networks without using VPN
  • Do NOT access or send confidential information over unsecured Wi-Fi networks
  • Do NOT leave electronic or paper documents out in the open
  • Do NOT allow family or friends to use company-provided devices
  • Do NOT leave devices logged-in
  • Do NOT select “remember me” on shared devices
  • Do NOT share passwords with family members
  • Do NOT use names or birthdays in passwords
  • Do NOT save work documents locally on shared devices
  • Do NOT store confidential information on portable storage devices, such as USB or hard drives

 

Internal Investigations Are a Poe Substitute for Compliance

Happy Halloween! In honor of the holiday, we are taking our compliance message in a bit of a . . . spooky direction. But our message remains the same: International transactions are inherently high-risk; they require constant attention and oversight for your compliance to be effective; and it is always better to put your resources into compliance than to spend them on investigations.

Speaking of Halloween, here are some interesting facts about Edgar Allan Poe:

  • Poe ruined a promising start to an army career at West Point by spending his time writing mocking poems about his instructors rather than finishing his assigned work.
  • Poe often wrote only after placing a Siamese cat on his shoulder.
  • The Baltimore Ravens are the only major sports team to be named after a poem, Poe’s “The Raven.”
  • And most importantly, Poe turned down a promising career as a chief compliance officer. Don’t believe me? Check out this recently unearthed initial draft of “The Raven,” and decide for yourself!

Internal Investigations Are a Poe Substitute for Compliance

Once upon a midnight dreary, this Compliance Officer pondered, weak and weary,
Over a list of quaint and curious compliance chores —
While I nodded, nearly napping, suddenly there came a tapping,
As of someone gently rapping, rapping at my chamber door.
“Tis some auditor,” I muttered, “tapping at my chamber door —
Only this and nothing more.”

Ah, distinctly I remember, it was in the bleak December;
When fiscal-year matters come to the fore.
And compliance matters, are quite forgotten,
And talks of investigations, are verboten,
And as welcome as a lingering bedsore,

And yet the knocking — the knocking! — it was far from fleeting.
It thrilled me — it called to me — this was no account-busting lunch meeting!
It filled me with fantastic terrors never felt before.
So that now, to still the beating of my heart, I stood repeating,
“Tis some auditor entreating entrance at my chamber door —
Perhaps some senior officer pleading entrance at my chamber door —
This it is and nothing more.”

Presently my soul grew stronger; had I not mastered SOX? And regs much longer?
“Sir,” said I, “or Madam, truly your forgiveness I implore.
But the fact is I was dreaming, of internal controls, and ethics training,
And so faintly you came tapping, tapping at my chamber door,
That I scarce was sure I heard you” — here I opened wide the door —
Darkness there and nothing more.

Back into the chamber turning, all my soul within me burning,
Soon again I heard a tapping somewhat louder than before.
“Surely,” said I, “surely that is something at my window lattice;
Let me see, then, what threat there is, and this mystery explore —
Let my heart be still a moment and this mystery explore —
’Tis a mistaken Whistleblower and nothing more!”

Open here I flung the shutter, when, with many a flirt and flutter,
In there stepped a stately Raven, a Whistleblower like those of the days of yore.
Not the least obeisance made he; not a minute stopped or stayed he;
But, with mien of lord or lady, perched above my chamber door —
Perched upon a bust of Pallas just above my chamber door —
Perched, and sat, and nothing more.

Then this ebony bird beguiling my sad fancy into smiling,
By the grave and stern decorum of the countenance it wore.
“Though thy crest be shorn and shaven, thou,” I said, “art sure no craven,
Ghastly grim and ancient Whistleblower wandering from the Nightly shore —
Tell me what thy lordly report is from our subsidiaries far off-shore!”
Quoth the Whistleblower Raven: “Your Compliance is Nevermore.”

“Prophet!” said I, “thing of evil! — prophet still, if bird or devil!
By that Heaven that bends above us — by that God we both adore —
Tell this Compliance Officer with sorrow laden if, within our affiliates far offshore,
There are accounting violations or kickback given to dozens or more!
Or payments made to get our products to leave those foreign shores!
Quoth the Whistleblower Raven: “Your Compliance is Nevermore.”

And thus I realized that compliance is toughest when you operate in lands of many scores.
And the Raven, never flitting, still is sitting, still is sitting,
A Whistleblower whose incriminating red flags I ignored,
And his eyes have all the seeming, of an enforcer who is dreaming, of throwing subpoenas on our corporate floor;
And my wretched soul, like our poor compliance, from out that shadow that lies floating on the floor.
Shall be lifted — nevermore!

Consultant Time Tracking Apps: How to Make the Most of Them And What to Avoid

Legal time tracking software is great for law firms, but what about consultants and freelancers? Consultant time tracking apps should allow you to easily and accurately capture your time. If you find yourself guessing your time, you may be losing out on revenue.

Accurate and reliable time tracking is arguably the most important metric a consultant or freelancer can track. If not done properly, inaccurate time tracking can lead to billable leakage, poor utilization rates, decreased productivity, and poor performance in the long term. If you’re using a time tracking app and you have the following red flags, you may want to take note.

Time Tracking Habits to Avoid

Red Flag #1: You Must Enter Your Time Manually

A common issue with consultant time tracking apps is manual time entry. Many apps rely on users remembering to track their time accurately. This may seem like a reasonable expectation at first, but it doesn’t take into account the other tasks a legal professional needs to handle.

Multitasking is a frequent occurrence in the legal industry, but there is a point where it goes too far and ends up impacting performance. Manual timekeeping isn’t as easy as it seems.

To dive into the science of it, psychologists Daniel Kahneman and Amos Tversky coined the term planning fallacy in 1977. Planning fallacy, in short, is the psychological phenomenon where people are optimistic in guessing how long a task will take to complete, underestimating the true number.

Kahneman expands on this idea in his book, “Thinking Fast and Slow.” In the book, Kahneman states that we struggle with time estimation for two reasons:

  1. We don’t consider how long similar tasks have taken us in the past.
  2. We assume or fail to account for barriers, challenges, or complications that will delay our plans.

The planning fallacy affects individuals, groups, and entire organizations.

The trouble with this is the fact that consultants and their clients are often unaware of the problem. As optimism bias clouds our judgment, we fall into the trap of assuming that our tasks will go well.

Manual time tracking and entry forces consultants to make the mistakes discussed above. Consultants enter their projections ahead of time, ensuring that they neglect previous tasks and the amount of time taken to complete them. Or, they reconstruct their time from memory, losing a significant amount of revenue due to faulty judgment, errors in thinking, and inaccurate estimates.

In a perfect time tracking world, you should be able to start and stop your tracking, while the app measures the amount of time you’ve spent on a specific task or tasks automatically. You shouldn’t be forced to reconstruct or project time, which is a recipe for disaster.

Manual time entry has a direct impact on the amount of revenue you’re able to generate — even if you bill at a flat rate. This is why it’s so important to track time correctly.

You should be able to edit your time if you need to make changes, track meetings, and convert them to time entries automatically. Look for this in a mobile consultant time tracking app.

Red Flag #2: Uniform Time Tracking

Time tracking requires granularity.

In an ideal consultant time tracking app, you should be able to track billable vs. non-billable work automatically — track employees, contractors, and third-party time. You should be able to easily differentiate between the various types of timekeeping (e.g., tasks, projects, meetings, etc.).

Unfortunately, many consultant time tracking apps force users into a timekeeping model that may not be best for their business. This isn’t ideal, as it requires more time and attention when it’s time to analyze time entries for billing, invoicing, or internal analysis.

Red Flag #3: No reporting or analytics for consultant time tracking

There are lots of options for time tracking software consultants can use. However, many of these don’t provide management with the data and intel they need to make good decisions. Good legal time tracking software enables consultants to answer the following questions:

  1. Where are we losing the most time?
  2. Which employees are most productive, and why?
  3. Which employees are the least productive, and why?
  4. Which projects, clients, or tasks are most productive or profitable?
  5. Which projects, clients, or tasks are minimally productive and unprofitable?
  6. What is my profit per employee, partner, client, etc.?

Why are these questions important? They give your business the clarity you need to answer higher-level questions like:

  • How do we avoid unprofitable clients in the future?
  • How do we attract more of the clients we want and none of the clients we don’t like?
  • What 20 percent of projects produce 80 percent of our revenue?
  • What 20 percent of clients produce 80 percent of our headaches, conflict, or concerns?

These questions provide clarity.

However, a comprehensive look at your time entries isn’t enough. You’ll need to be able to break your reporting down into actionable, bite-sized chunks you can use to grow your consultancy.

Many time tracking apps are generalists in the sense that they provide you with a limited set of data on your team’s performance. They don’t provide you with the level of granularity and analysis your consultancy needs to grow.

Why Is Time Tracking Valuable for Consultants?

Time tracking is valuable for consultants because it can be easily translated to money. While many organizations feel they’re on top of their time tracking, this isn’t always the case. If your consultant time tracking app has any of the red flags I’ve mentioned, it may be time to switch.

These red flags lead to billable leakage, poor utilization rates, decreased productivity and poor performance over the long term.

Consultants need reliable time tracking software in order to run a productive business.

As a consultant, you’re busy. The software you use should simplify everyday tasks and keep your law firm running without the hassle.

How to Confidentially Challenge a Women’s Business Enterprise (WBE) Certification

Women’s Business Enterprise (WBE) Certification is a valuable tool to help women-owned businesses secure additional contracts and business that they might not have otherwise secured. Despite a rigorous application process, occasionally someone discovers that a WBE is not legitimately women-owned and controlled.

If you suspect that a WBE certified through WBENC is not truly women owned and/or controlled, you can challenge the certification and maintain the confidentiality of your identity.

According to WBENC’s Standards and Procedures, a certification challenge must meet the following criteria to be considered:

1. Be in writing;
2. Be addressed to the Executive Director or President of the Regional Partner Organization (RPO) that certified the company; and
3. Include evidence challenging the WBE’s eligibility.

Next, the Executive Director or President of the RPO will determine, based on your submission, whether there is reason to evaluate the challenge further.

If they deem your challenge not credible, they will inform you in writing and the challenge will be closed. If you disagree, you can appeal that decision to the WBENC Board of Directors.

If your challenge is deemed credible, the RPO will notify the WBE that it is being challenged, with a summary of the reasons. The WBE then must provide information and/or documentation to refute the challenge, and the Executive Director or President will inform both the WBE and the challenging party, in writing, of the preliminary determination and provide the reasons. There may be an opportunity for hearing, and then a final determination will be made. Again, both parties are notified in writing of the decision, which may be appealed to WBENC.

From experience, the more detail your challenge provides and the more supporting evidence, the better your chances are of succeeding. It is not enough to simply say that you suspect the woman is not running the business. If such a challenge is important to you and/or your business, you may want to seek professional assistance in preparing your challenge materials.

Cryptocurrency Brings Disruption to Bankruptcy Courts—What Parties Can Expect and the Open Issues Still To Be Resolved (Part Two)

In this second part of our blog exploring the various issues courts need to address in applying the Bankruptcy Code to cryptocurrency, we expand upon our roadmap.  In part one, we addressed whether cryptocurrency constitutes property of the estate, the impacts of cryptocurrency’s fluctuating valuation, issues of perfection, and the effects of cryptocurrency on debtor-in-possession financing.  In this part two, we explore preferential transfers of cryptocurrency, whether self-executing smart contracts would violate the automatic stay, and how confusing regulatory guidelines negatively impact bankruptcy proceedings, including plan feasibility.

Preferential Transfers

Pursuant to section 547(a) of the Bankruptcy Code, a debtor-in-possession (or trustee) can avoid a transfer of the debtor’s property to a creditor made in the 90-days before filing the petition if, among other things, the creditor received more than it would have in a Chapter 7 liquidation proceeding.  Notably, such a transfer can only be avoided if the thing transferred was the debtor’s property.  When cryptocurrency is valued and whether cryptocurrency is considered to be property of the estate can impact preference liability.

Perhaps the first question to arise in cryptocurrency preference litigation is whether the transferred cryptocurrency is property of the estate.  If, as in the Chapter 11 bankruptcy case of Celsius Network LLC and its affiliates, the cryptocurrency withdrawn by the accountholder during the ninety days prior to the bankruptcy is determined to be property of the estate, and not the accountholder’s property, a preferential transfer claim could be asserted.  If, however, the cryptocurrency was property of the accountholder, for instance if it was held in a wallet to which only the accountholder had exclusive rights, no preference liability would attach to the withdrawal of the cryptocurrency.

Assuming that a preferential transfer claim lies, the court must decide how to value the preferential transfer.  Section 550 of the Bankruptcy Code allows a debtor-in-possession to recover “the property transferred, or, if the court so orders, the value of such property.”[1] This gives the debtor-in-possession wide latitude in asserting a preference claim.  For instance, the debtor-in-possession could take the position that the cryptocurrency is a commodity, in which case a claim could be asserted to recover the cryptocurrency itself, which, by the end of the case, may be worth a much more than it was at the time of the transfer, with any gain accruing to the estate’s benefit.[2]  In contrast, the party receiving the transferred cryptocurrency would likely take the position that the cryptocurrency is currency, in which case a claim would be limited to the value of the cryptocurrency at the time of the transfer.[3]

The proper valuation methodology has not to date been definitively addressed by the courts.  Perhaps the closest a court has come to deciding that issue was in Hashfast Techs. LLC v. Lowe,[4] where the trustee claimed that a payment of 3,000 bitcoins to a supplier was a preferential transfer.  The bitcoin was worth approximately $360,000 at the time of the transfer but was worth approximately $1.2 million when the trustee asserted the preferential transfer claim.  The trustee argued that the payment to the supplier was intended to be a transfer of bitcoins and not a payment of $360,000, and that the supplier was required to pay 3,000 bitcoins to the estate, notwithstanding the substantial increase in value (and the resulting windfall to the estate).  Ultimately, the court refused to decide whether bitcoin is either currency or commodities and held that “[i]f and when the [trustee] prevails and avoids the subject transfer of bitcoin to defendant, the court will decide whether, under 11 U.S.C. § 550(a), he may recover the bitcoin (property) transferred or their value, and if the latter, valued as of what date.”[5]

The changing value of cryptocurrency will also impact the question of whether the creditor received more than it would have in a Chapter 7 liquidation proceeding.[6]  While the value of preferential transfers are determined at the time of the transfer,[7] the analysis of whether such transfer made the creditor better off than in a Chapter 7 liquidation is determined at the time of a hypothetical distribution, which means, practically, at the time of the petition.[8]  Therefore, if a customer withdraws cryptocurrency from a platform during the 90-day preference period, and the cryptocurrency experiences a decrease in value during those 90 days, that customer could arguably be liable for a preferential transfer because the withdrawn cryptocurrency was worth more at the time of the transfer than at the time of the petition.

Presently unanswered is whether the safe-harbor provisions provided for in section 546(e) of the Bankruptcy Code shield cryptocurrency transfers from preferential transfer attack.  Pursuant to section 546(e), a debtor-in-possession cannot avoid as a preference a margin payment or settlement payment made to “financial participant . . . in connection with a securities contract . . . commodity contract . . . [or] forward contract . . . that is made before the commencement of the case.” If the court determines that cryptocurrency is a security or commodity, and that the transfers were made in connection with forward or commodities contracts, then section 546(e) may shield those transfers from attack as preferential.

Violations of the Automatic Stay and Smart Contracts

The self-executing nature of smart contracts may raise automatic stay concerns.  The automatic stay arises upon the filing of a bankruptcy petition, and in general, prevents creditors and other parties from continuing their collection efforts against the debtor.[9]  Of relevance to smart contracts, section 362(a)(3) of the Bankruptcy Code states that the stay applies to “any act” to obtain possession of or control of property of the estate.  Very recently, in Chicago v. Fulton, the United Stated Supreme Court held that section 362(a)(3) prevented any “affirmative act that would alter the status quo at the time of the bankruptcy petition.”[10]

Prior to Fulton, a bankruptcy court in Arkansas examined an analogous issue in Hampton v. Yam’s Choice Plus Autos, Inc. (In re Hampton).[11]  In Hampton, the court adjudicated whether a device that automatically locked the debtor out of her car violated the automatic stay when it disabled function of the car’s engine postpetition.  The device relied on a code—if the debtor paid, the creditor sent her a code, which she would then input, and this prevented the device from automatically disabling the car’s starter.  In this instance, the court found a violation of the automatic stay.[12]

Based on current case law, it remains unclear whether a smart contract, operating automatically, would violate the automatic stay.  For example, if a smart contract is based on a DeFi loan, and it automatically executes postpetition to transfer to the lender assets of the estate, a court may find a violation of the automatic stay.

Hampton would suggest that such actions would be a violation—but two issues caution against relying on Hampton as a clear bellwether.  First, Hampton was decided pre-Fulton and it remains unclear whether, and to what extent, the Supreme Court’s holding in Fulton would change the outcome of Hampton. Second, a potentially key factual distinction exists: the device in Hampton required the creditor to give the debtor a code to prevent the disabling of the car, but smart contracts can be programmed to automatically execute postpetition without any further action by the parties.  If a smart contract is found to violate the automatic stay, the next question is whether such a violation is willful, meaning that a court can impose monetary penalties, including potentially punitive damages.[13]

Note that even if a smart contract is found not to violate the automatic stay, it does not mean that a creditor can retain the property.  Section 542 of the Bankruptcy Code requires those in possession of estate property to turnover the property to the estate.  The estate is created at the time of the filing of the petition, and therefore, any smart contract that executes postpetition would theoretically concern estate property and be subject to turnover.  Unfortunately, ambiguities arise even in this statute, as section 542 contains a good-faith exemption to the turnover mandate if the recipient is not aware of bankruptcy filing and transfers the assets.[14]  Thus, the turnover mandate may be difficult to apply to non-debtor parties to smart contracts who program the contract ahead of time with the knowledge that such a contract may execute after a bankruptcy petition but with no actual knowledge of such petition having been filed.

Regulatory Confusion

The regulatory world has no uniform approach to cryptocurrency. Both the Securities and Exchange Commission (SEC) and the Commodities Future Trading Commission (CFTC), perhaps in part spurred by executive pressure, recently advanced heavier regulatory oversight of cryptocurrency.[15]  The two agencies also share jurisdiction; one agency asserting authority to regulate cryptocurrency does not preclude the other from doing so.[16]  Other agencies, such as the Department of the Treasury’s Office of Foreign Assets Control (OFAC) and Financial Crimes Enforcement Network (FinCen), have also asserted the jurisdiction to regulate cryptocurrency.[17]  The result is regulatory confusion for market participants, both because of the sheer number of agencies asserting jurisdiction and the fact that individual agencies can sometimes issue confusing and ill-defined guidelines.

For instance, the SEC applies the Howey test, developed in the 1940s, to determine whether a specific cryptocurrency is a security.[18]  Unfortunately, the SEC has stated that whether a specific cryptocurrency is a security can change overtime, and recently announced even more cryptocurrencies that they believe meet Howey’s definition of a security via their lawsuits with crypto exchanges Binance.US and Coinbase.[19]

The regulatory confusion clouding cryptocurrency has directly impacted bankruptcy proceedings. One recent case study offers a glimpse into that disconcerting influence. In 2022, crypto exchange Voyager Digital Holdings Ltd. filed for Chapter 11 bankruptcy. Another major crypto exchange, Binance.US, entered into an agreement with Voyager to acquire its assets—valued at around $1 billion. The SEC, the New York Department of Financial Services (NYDFS), and the New York Attorney General all filed sale objections in Voyager’s bankruptcy proceedings, arguing that if Voyager’s crypto assets constitute securities, then Binance.US’s rebalancing and redistribution of these assets to its account holders would be an “unregistered offer, sale or delivery after sale of securities” in violation of Section 5 of the Securities Act.[20]  The NYDFS also alleged that the agreement “unfairly discriminates” against New York citizens by subordinating their recovery of diminished assets in favor of Voyager’s creditors—as well as foreclosing the option to recover crypto rather than liquidated assets.[21]

SEC trial counsel noted that, “regulatory actions, whether involving Voyager, Binance.US or both, could render the transactions in the plan impossible to consummate, thus making the plan unfeasible.”[22]  In April 2023, Binance.US sent Voyager a legal notice canceling the prospective transaction, writing that “the hostile and uncertain regulatory climate in the United States has introduced an unpredictable operating environment impacting the entire American business community.”[23]

The SEC’s desire towards regulating cryptocurrency as securities appears to be growing.  On August 15, 2023, the SEC settled for $24 million its claims against Bittrex, which included violations of Section 5 of the Securities Act.[24] Upon the settlement, the director of the SEC stated that Bittrex “worked with token issuers . . . in an effort to evade the federal securities law.  They failed.”[25]  Uncertainty combined with aggressive enforcement leaves cryptocurrency entities in an uncertain and precarious position.

Plan Feasibility

The Voyager case also highlights issues with plan feasibility in Chapter 11.  In Voyager, the SEC objected to plan feasibility on the basis that one known digital asset of Voyager was a security, and therefore, the purchaser should register as a securities dealer.[26]  Although the court overruled the SEC’s objection, as noted above, Binance.US ultimately withdrew its purchase offer, placing blame on the overall regulatory climate.[27]  As regulations remain uncertain, and government authorities have shown a willingness to assert themselves into the process of reorganization, debtors who file for bankruptcy will have to brace for new or unforeseen objections to an otherwise confirmable plan.

Conclusion

Cryptocurrency has been seen by some as a disruptive force in finance.  As the above issues show, it also appears to be a disruptive force in bankruptcy cases.  Debtors and creditors alike will have to weather the disruption as best they can while the courts continue to grapple with the many open issues raised by cryptocurrencies.

See Cryptocurrency Brings Disruption to Bankruptcy Courts—What Parties Can Expect and the Open Issues Still To Be Resolved (Part One)


[1] See 11 U.S.C. § 550(a).

[2] This position would arguably be consistent with cases interpreting section 550(a) of the Bankruptcy Code that have held that the estate is entitled to recover the value of the property when value has appreciated subsequent to the transfer.  See, e.g., In re Am. Way Serv. Corp., 229 B.R. 496, 531 (Bankr. S.D. Fla. 1999) (noting that when the value of the transferred property has appreciated, “the trustee is entitled to recover the property itself, or the value of the property at the time of judgment.”).

[3] Mary E. Magginis, Money for Nothing: The Treatment of Bitcoin in Section 550 Recovery Actions, 20 U. Pa. J. Bus. L. 485, 516 (2017).

[4] No. 14-30725DM (Bankr. N.D. Cal. Feb. 22, 2016),

[5] Order on Motion for Partial Summary Judgment at 1-2, Hashfast Techs. LLC v. Lowe, Adv. No. 15-3011DM (Bankr. N.D. Cal. 2016) (ECF No. 49).

[6] See 11 U.S.C. § 547(b)(5) (requiring the transferee to have received more that it would have received in a Chapter 7 liquidation).

[7] Maginnis, supra note 3.

[8] See In re CIS Corp., 195 B.R. 251, 262 (Bankr. S.D.N.Y. 1996) (“Thus, the Code § 547(b)(5) analysis is to be made as of the time the Debtor filed its bankruptcy petition); Sloan v. Zions First Nat’l Bank (In re Casteltons, Inc.), 990 F.2d 551, 554 (9th Cir. 1993) (“When assessing an alleged preferential transfer, the relevant inquiry . . . [is] . . . the actual effect of the payment as determined when bankruptcy results.”).

[9] 11 U.S.C. § 362(a).

[10] 141 S.Ct. 585, 590 (2021).

[11] 319 B.R. 163 (Bankr. E.D. Ark. 2005).

[12] Hampton, 319 B.R. at 165-170.

[13] See 11 U.S.C. § 362(k) (providing that, subject to a good faith exception “an individual injured by any willful violation of [the automatic stay] shall recover actual damages, including costs and attorneys’ fees, and, in appropriate circumstances, may recover punitive damages.”).

[14] See 11 U.S.C. § 542(c).

[15] David Gura, The White House calls for more regulations as cryptocurrencies grow more popular (Sept. 6, 2022, 6:00 AM), https://www.npr.org/2022/09/16/1123333428/crypto-cryptocurrencies-bitcoin-terra-luna-regulation-digital-currencies.

[16] See, e.g.CFTC v. McDonnell, 287 F. Supp. 3d 222, 228-29 (E.D.N.Y. 2018) (“The jurisdictional authority of CFTC to regulate virtual currencies as commodities does not preclude other agencies from exercising their regulatory power when virtual currencies function differently than derivative commodities.”).

[17] See Treasury Announces Two Enforcements Actions for over $24M and $29M Against Virtual Currency Exchange Bittrex, Inc., (October 11, 2022), https://home.treasury.gov/news/press-releases/jy1006.

[18] See SEC v. W.J. Howey Co., 328 U.S. 293 (1946).

[19] Emily Mason, Coinbase Hit With SEC Suit That Identifies $37 Billion of Crypto Tokens As Securities, (June 6, 2023 5:08 pm), https://www.forbes.com/sites/emilymason/2023/06/06/coinbase-hit-with-sec-suit-that-identifies-37-billion-of-crypto-tokens-as-securities/?sh=3cc4c6d667a9SEC Charges Crypto Asset Trading Platform Bittrex and its Former CEO for Operating an Unregistered Exchange, Broker, and Clearing Agencyhttps://www.sec.gov/news/press-release/2023-78 (last visited July 31, 2023).

[20] Jack Schickler, SEC Objects to Binance.US’ $1B Voyager Deal, Alleging Sale of Unregistered Securities, (last updated Feb. 23, 2023 at 2:32 p.m.), https://www.coindesk.com/policy/2023/02/23/sec-objects-to-binanceus-1b-voyager-deal-alleging-sale-of-unregistered-securities/.

[21] See NYDFS Objection to Plan, In re Voyager Digital Holdings, et al. at 9-10, No. 22-10943 (Bankr. S.D.N.Y. Feb. 22, 2023) [ECF No. 1051].

[22] Kari McMahon, SEC and New York Regulators Push Back on Binance.US’s Acquisition of Voyager, The Block (Feb. 23, 2023), https://www.theblock.co/post/214333/sec-and-new-york-regulators-push-back-on-binance-uss-acquisition-of-voyager.

[23] Yueqi Yang & Steven Church, Binance US Ends $1 Billion Deal to Buy Bankrupt Crypto Firm Voyager, Bloomberg (April 25, 2023), https://www.bloomberg.com/news/articles/2023-04-25/binance-us-terminates-deal-to-buy-bankrupt-crypto-firm-voyager.

[24] See Crypto Asset Trading Platform Bittrex and Former CEO to Settle SEC Charges for Operating an Unregistered Exchange, Broker, and Clearing Agencyhttps://www.sec.gov/news/press-release/2023-150 (last visited Sept. 18, 2023).

[25] Id.

[26] See Objection of the U.S. Securities Exchange Commission to Confirmation at 3 n.5, In re Voyager Digital Holdings, et al., No. 22-10943 (Bankr. S.D.N.Y. Feb. 22, 2023) (ECF No. 1047).

[27] See supra at n. 23.

For more articles on cryptocurrency, visit the NLR communications, media and internet section.

A Major Deal for the Minor League: California Bill Paves the Way for Historic Collective Bargaining Agreement for Minor League Baseball

Major changes are coming to the Minor League. In April, Major League Baseball (MLB) players and owners voted to ratify a historic collective bargaining agreement that, for the first time in history, covers Minor League players. MLB owners voted unanimously to ratify the agreement on April 3, following a March 31 vote in which more than 99 percent of Minor League players voted to ratify the agreement. The five-year agreement, which was negotiated by MLB and the MLB Players Association (MLBPA), more than doubles the salaries at all Minor League levels and provides that Minor League players will be paid almost year-round.

Equally significant, just seven months before the agreement’s ratification, MLB agreed to voluntarily recognize the MLBPA as the exclusive bargaining representative for Minor League players. MLB’s September 9, 2022 recognition decision marks the first time in history that all Minor League players have been represented by the MLBPA or any labor organization. Previously, the MLBPA only represented Minor League players on 40-man rosters, but the September 2022 recognition decision extended union coverage to all Minor League players. Integrating the 5,000-plus Minor League players into a union that had already represented 1,200 well-paid MLB players will no doubt pose a series of challenges to the MLBPA. But recognition as the exclusive union for Minor League players allows the MLBPA to negotiate bargaining agreements on behalf of the players, including the historic agreement ratified in April.

California Governor Signs Bill Paving the Way for Collective Bargaining Agreement

On September 11, 2023, the California Legislature unanimously passed SB 332, a bill designed to pave the way for the historic collective bargaining agreement ratified in April. SB 332 grants a narrow exemption from state labor laws for California-based Minor League players. The legislation was designed “to carry out the collective bargaining agreement” approved by MLB and the MLBPA. Specifically, SB 332 provides that certain provisions of Wage Order No. 10-2001—which covers the amusement and recreation industry—does not apply to Minor League Baseball players covered by the collective bargaining agreement ratified by MLB players and owners earlier this year. Additionally, the bill exempts these Minor League players from certain overtime and meal period laws, and it relaxes the requirements for the wage statements that must be provided to these players. Governor Newsom signed SB 332 into law on October 13.

The passage of SB 332 caps a major milestone for Minor League Baseball and ensures implementation of the collective bargaining agreement ratified earlier this year. With SB 332 signed into law, California’s Minor League Baseball players, owners, and fans can put contract negotiations in the rearview mirror – and play ball.

The Generative AI Revolution: Key Legal Considerations for the Fashion & Retail Industry

For better or worse, generative artificial intelligence (AI) is already transforming the way we live and work. Retail and fashion companies that fail to embrace AI likely risk losing their current market share or, worse, going out of business altogether. This paradigm shift is existential, and businesses that recognize and leverage AI will gain a significant competitive advantage.

For instance, some of our clients are using AI to streamline product design processes, reducing the costs and time necessary to generate designs, while others employ virtual models to circumvent issues related to adult and child modeling. Additionally, AI can provide valuable market intelligence to inform sales and distribution strategies. This alert will address these benefits, as well as other significant commercial advantages, and delve into the legal risks associated with utilizing AI in the fashion and retail industry.

There are significant commercial advantages to using AI for retail and fashion companies, including:

1. Product Design

From fast fashion to luxury brands, AI is set to revolutionize the fashion and retail industry. It enables the generation of innovative designs by drawing inspiration from a designer’s existing works and incorporating the designer’s unique style into new creations. For instance, in March 2023, G-Star Raw created its first denim couture piece designed by AI. We also worked with a client who utilized an AI tool to analyze its footwear designs from the previous two years and generate new designs for 2024. Remarkably, the AI tool produced 50 designs in just four minutes, with half of them being accepted by the company. Typically, this process would have required numerous designers and taken months to complete. While it is unlikely that AI tools will entirely replace human designers, the cost savings and efficiency gained from using such technology are undeniable and should not be overlooked.

2. Virtual Models

2023 marks a groundbreaking year with the world’s first AI Fashion Week and the launch of AI-generated campaigns, such as Valentino’s Maison Valentino Essentials collection, which combined AI-generated models with actual product photography. Fashion companies allocate a significant portion of their budget to model selection and hiring, necessitating entire departments and grappling with legal concerns such as royalties, SAG, moral issues, and child labor. By leveraging AI tools to create lifelike virtual models, these companies can eliminate the associated challenges and expenses, as AI models are not subject to labor laws — including child entertainment regulations — or collective bargaining agreements.

3. Advertising Campaigns

AI can also be used to create entire advertising campaigns from print copy to email blasts, blog posts, and social media. Companies traditionally invest substantial time and resources in these efforts, but AI can generate such content in mere moments. While human involvement remains essential, AI allows businesses to reduce the manpower required. Retailers can also benefit from AI-powered chatbots, which provide 24/7 customer support while reducing overhead expenses linked to in-person customer service. Moreover, AI’s predictive capabilities enable businesses to anticipate trends across various demographics in real-time, driving customer engagement. By processing and analyzing vast amounts of consumer data and preferences, brands can create hyper-personalized and bespoke content, enhancing customer acquisition, engagement, and retention. Furthermore, AI facilitates mass content creation at an impressively low cost, making it an invaluable tool in today’s competitive market.

4. ESG – Virtual Mirrors and Apps

From an environmental, social, and corporate governance (ESG) standpoint, the use of AI-powered technology can eliminate the need for retail stores to carry excess inventory, thereby reducing online returns and exchanges. AI smart mirrors can enhance in-store experiences for shoppers by enabling them to virtually try on outfits in various sizes and colors. Furthermore, customers can now enjoy the virtual try-on experience from the comfort of their homes, as demonstrated by Amazon’s “Virtual Try-On for Shoes,” which allows users to visualize how selected shoes will appear on their feet using their smartphone cameras.

5. Product Distribution and Logistics

Fashion companies rely on their C-level executives to make informed predictions about product quantities, potential sales in specific markets or stores, and the styles that will perform best in each market. In terms of logistics, AI models can be employed to forecast a business’s future sales by analyzing historical inventory and sales data. This ability to anticipate supply chain requirements can lead to increased profits and support the industry’s initiatives to reduce waste.

Legal and Ethical Risks

Although AI has some major advantages, it also comes with a number of legal and ethical risks that should be considered, including:

1. Accuracy and Reliability

For all their well-deserved accolades and hype, generative AI tools remain a work in progress. Users, especially commercial enterprises, should never assume that AI-created works are accurate, non-infringing, or fit for commercial use. In fact, there have been numerous recorded instances in which generative AI tools have created works that arguably infringe the copyrights of existing works, make up facts, or cite phantom sources. It is also important to note that works created by generative AI may incorporate or display third-party trademarks or celebrity likenesses, which generally cannot be used for commercial purposes without appropriate rights or permissions. Like anything else, companies should carefully vet any content produced by generative AI before using it for commercial purposes.

2. Data Security and Confidentiality

Before utilizing generative AI tools, companies should consider whether the specific tools adhere to internal data security and confidentiality standards. Like any third-party software, the security and data processing practices for these tools vary. Some tools may store and use prompts and other information submitted by users. Other tools offer assurances that prompts and other information will be deleted or anonymized. Enterprise AI solutions, such as Azure’s OpenAI Service, can also potentially help reduce privacy and data security risks by offering access to popular tools like ChatGPT, DALL-E, Codex, and more within the data security and confidentiality parameters required by the enterprise.

Before authorizing the use of generative AI tools, organizations and their legal counsel should (i) carefully review the applicable terms of use, (ii) inquire about access to tools or features that may offer enhanced privacy, security, or confidentiality, and (iii) consider whether to limit or restrict access on company networks to any tools that do not satisfy company data security or confidentiality requirements.

3. Software Development and Open-Source Software

One of the most popular use cases for generative AI has been computer coding and software development. But the proliferation of AI tools like GitHub Copilot, as well as a pending lawsuit against its developers, has raised a number of questions for legal counsel about whether use of such tools could expose companies to legal claims or license obligations.

These concerns stem in part from the use of open-source code libraries in the data sets for Copilot and similar tools. While open-source code is generally freely available for use, that does not mean that it may be used without condition or limitation. In fact, open-source code licenses typically impose a variety of obligations on individuals and entities that incorporate open-source code into their works. This may include requiring an attribution notice in the derivative work, providing access to source code, and/or requiring that the derivative work be made available on the same terms as the open-source code.

Many companies, particularly those that develop valuable software products, cannot risk having open-source code inadvertently included in their proprietary products or inadvertently disclosing proprietary code through insecure generative AI coding tools. That said, some AI developers are now providing tools that allow coders to exclude AI-generated code that matches code in large public repositories (in other words, making sure the AI assistant is not directly copying other public code), which would reduce the likelihood of an infringement claim or inclusion of open-source code. As with other AI generated content, users should proceed cautiously, while carefully reviewing and testing AI-contributed code.

4. Content Creation and Fair Compensation

In a recent interview, Billy Corgan, the lead singer of Smashing Pumpkins, predicted that “AI will change music forever” because once young artists figure out they can use generative AI tools to create new music, they won’t spend 10,000 hours in a basement the way he did. The same could be said for photography, visual art, writing, and other forms of creative expression.

This challenge to the notion of human authorship has ethical and legal implications. For example, generative AI tools have the potential to significantly undermine the IP royalty and licensing regimes that are intended to ensure human creators are fairly compensated for their work. Consider the recent example of the viral song, “Heart on My Sleeve,” which sounded like a collaboration between Drake and the Weeknd, but was in fact created entirely by AI. Before being removed from streaming services, the song racked up millions of plays — potentially depriving the real artists of royalties they would otherwise have earned from plays of their copyrighted songs. In response, some have suggested that human artists should be compensated when generative AI tools create works that mimic or are closely inspired by copyrighted works and/or that artists should be compensated if their works are used to train the large language models that make generative AI possible. Others have suggested that works should be clearly labeled if they are created by generative AI, so as to distinguish works created by humans from those created by machine.

5. Intellectual Property Protection and Enforcement

Content produced without significant human control and involvement is not protectable by US copyright or patent laws, creating a new orphan class of works with no human author and potentially no usage restrictions. That said, one key principle can go a long way to mitigating IP risk: generative AI tools should aid human creation, not replace it. Provided that generative AI tools are used merely to help with drafting or the creative process, then it is more likely that the resulting work product will be protectable under copyright or patent laws. In contrast, asking generative AI tools to create a finished work product, such as asking it to draft an entire legal brief, will likely deprive the final work product of protection under IP laws, not to mention the professional responsibility and ethical implications.

6. Labor and Employment

When Hollywood writers went on strike, one issue in particular generated headlines: a demand by the union to regulate the use of artificial intelligence on union projects, including prohibiting AI from writing or re-writing literary material; prohibiting its use as source material; and prohibiting the use of union content to train AI large language models. These demands are likely to presage future battles to maintain the primacy of human labor over cheaper or more efficient AI alternatives.

Employers are also utilizing automated systems to target job advertisements, recruit applicants, and make hiring decisions. Such systems expose employers to liability if they intentionally or unintentionally exclude or impact protected groups. According to the Equal Employment Opportunity Commission (EEOC), that’s precisely what happened with iTutorGroup, Inc.

7. Future Regulation

Earlier this year, Italy became the first Western country to ban ChatGPT, but it may not be the last. In the United States, legislators and prominent industry voices have called for proactive federal regulation, including the creation of a new federal agency that would be responsible for evaluating and licensing new AI technology. Others have suggested creating a federal private right of action that would make it easier for consumers to sue AI developers for harm they create. Whether US legislators and regulators can overcome partisan divisions and enact a comprehensive framework seems unlikely, but as is becoming increasingly clear, these are unprecedented times.

For more articles on AI, visit the NLR Communications, Media and Internet section.

Navigating Data Ownership in the AI Age, Part 1: Types of Big Data and AI-Derived Data

The emergence of big data, artificial intelligence (AI), and the Internet of Things (IoT) has fundamentally transformed our understanding and utilization of data. While the value of big data is beyond dispute, its management introduces intricate legal questions, particularly concerning data ownership, licensing, and the protection of derived data. This article, the first installment in a two-part series, outlines challenges and opportunities presented by AI-processed and IoT-generated data. The second part, to be published Thursday, October 19, will discuss the complexities of the legal frameworks that govern data ownership.

Defining Big Data and Its Legal Implications

Big data serves as a comprehensive term for large, dynamically evolving collections of electronic data that often exceed the capabilities of traditional data management systems. This data is not merely voluminous but also possesses two key attributes with significant legal ramifications. First, big data is a valuable asset that can be leveraged for a multitude of applications, ranging from decoding consumer preferences to forecasting macroeconomic trends and identifying public health patterns. Second, the richness of big data often means it contains sensitive and confidential information, such as proprietary business intelligence and personally identifiable information (PII). As a result, the management and utilization of big data require stringent legal safeguards to ensure both the security and ethical handling of this information.

Legal Frameworks Governing Data Ownership

Navigating the intricate landscape of data ownership necessitates a multi-dimensional understanding that encompasses legal, ethical, and technological considerations. This complexity is further heightened by diverse intellectual property (IP) laws and trade secret statutes, each of which can confer exclusive rights over specific data sets. Additionally, jurisdictional variations in data protection laws, such as the European Union’s General Data Protection Regulation (GDPR) and the United States’ California Consumer Privacy Act (CCPA), introduce another layer of complexity. These laws empower individuals with greater control over their personal data, granting them the right to access, correct, delete, or port their information. However, the concept of “ownership” often varies depending on the jurisdiction and the type of data involved — be it personal or anonymized.

Machine-Generated Data and Ownership

The issue of data ownership extends beyond individual data to include machine-generated data, which introduces its own set of complexities. Whether it’s smart assistants generating data based on human interaction or autonomous vehicles operating independently of human input, ownership often resides with the entity that owns or operates the machine. This is typically defined by terms of service or end-user license agreements (EULAs). Moreover, IP laws, including patents and trade secrets, can also come into play, especially when the data undergoes specialized processing or analysis.

Derived Data and Algorithms

Derived and derivative algorithms refer to computational models or methods that evolve from, adapt, or draw inspiration from pre-existing algorithms. These new algorithms must introduce innovative functionalities, optimizations, or applications to be considered derived or derivative. Under U.S. copyright law, the creator of a derivative work generally holds the copyright for the new elements that did not exist in the original work. However, this does not extend to the foundational algorithm upon which the derivative algorithm is based. The ownership of the original algorithm remains with its initial creator unless explicitly transferred through legal means such as a licensing agreement.

In the field of patent law, derivative algorithms could potentially be patented if they meet the criteria of being new, non-obvious, and useful. However, the patent would only cover the novel aspects of the derivative algorithm, not the foundational algorithm from which it was derived. The original algorithm’s patent holder retains their rights, and any use of the derivative algorithm that employs the original algorithm’s patented aspects would require permission or licensing from the original patent holder.

Derived and derivative algorithms may also be subject to trade secret protection, which safeguards confidential information that provides a competitive advantage to its owner. Unlike patents, trade secrets do not require registration or public disclosure but do necessitate reasonable measures to maintain secrecy. For example, a company may employ non-disclosure agreements, encryption, or physical security measures to protect its proprietary algorithms.

AI-Processed and Derived Data

The advent of AI has ushered in a new era of data analytics, presenting both unique opportunities and challenges in the domain of IP rights. AI’s ability to generate “derived data” or “usage data” has far-reaching implications that intersect with multiple legal frameworks, including copyright, trade secrets, and potentially even patent law. This intersectionality adds a layer of complexity to the issue of data ownership, underscoring the critical need for explicit contractual clarity in licensing agreements and Data Use Agreements (DUAs).

AI-processed and derived data can manifest in various forms, each with unique characteristics. Extracted data refers to data culled from larger datasets for specific analyses. Restructured data has been reformatted or reorganized to facilitate more straightforward analysis. Augmented data is enriched with additional variables or parameters to provide a more comprehensive view. Inferred data involves the creation of new variables or insights based on the analysis of existing data. Lastly, modeled data has been transformed through ML models to predict future outcomes or trends. Importantly, these data types often contain new information or insights not present in the original dataset, thereby adding multiple layers of value and utility.

The benefits of using AI-processed and derived data can be encapsulated in three main points. First, AI algorithms can clean, sort, and enrich data, enhancing its quality. Second, the insights generated by AI can add significant value to the original data, rendering it more useful for various applications. Third, AI-processed data can catalyze new research, innovation, and product development avenues.

Conversely, the challenges in data ownership are multifaceted. First, AI-processed and derived data often involves a complex web of multiple stakeholders, including data providers, AI developers, and end users, which can complicate the determination of ownership rights. Second, the rapidly evolving landscape of AI and data science leads to a lack of clear definitions for terms like “derived data,” thereby introducing potential ambiguities in legal agreements. Third, given the involvement of multiple parties, it becomes imperative to establish clear and consistent definitions and agreements that meticulously outline the rights and responsibilities of each stakeholder.

For more articles on AI, visit the NLR Communications, Media and Internet section.