To find out more about how the Adler Law Group can help your business identify risk and issues related to intellectual property ownership, corporation or LLC formation, or just assess risk associated with your business, contact us for a free, no-obligation consultation by emailing David @ adler-law.com, visiting our web site www.adler-law.com, or calling toll free to (866) 734-2568.
When I committed myself to social media marketing a few years ago, like most lawyers, I wasn’t quit sure what I was getting myself into. One thing I knew for sure: I had to just start.
I’m sure my early posts were fairly mundane and added little value, let alone acted as a catalyst for a conversation. As most social media experts will posit, social media is about identifying and engaging with customers, employees and prospects. Over time, I increased my engagement, learned to participate and learned what worked and what didn’t. What follows are a couple of things that I try to keep in mind as part of my legal social media marketing efforts.
1. Have a voice. As lawyers we have instant credibility. Use this to your advantage. Whether you are a personal injury lawyer or in house counsel to a pharmaceutical company, you probably follow certain topics or have expertise in a particular area. You can use your area of expertise to talk about events, trends or interesting developments. Even if all you do is post a link to something that interests you, you are developing your online persona.
2. Cultivate your followers. One of the most powerful aspects of social media marketing is the network effect. As followers like, share or favorite your content, your message gets spread exponentially. Don’t be afraid to engage with those followers to cultivate and strengthen those relationships.
3. Always evaluate. Sometimes I am shocked that a post gets shared or favorited. For whatever reason, the subject matter resonates with my followers and my followers’ followers. When I see that, I try to note the subject area or topic, how it was shared an by whom. Focusing on content that others find useful enhances the value of my voice and my content.
As we look forward to 2015, now is an opportune time to take a look at what work last year, what didn’t and how we can improve our focus going forward.
If you find my posts uself, I encourage you to share, comment, follow or just get in touch.
Best of luck for your legal marketing efforts in 2015!
United Trademark Holdings, Inc. (“Applicant”) appealed a decision by the U.S. Patent & Trademark Office refusing registration of its “ZOMBIE CINDERELLA” trademark for dolls when the USPTO held that it was confusingly similar to the registered “WALT DISNEY’S CINDERELLA” trademark.
In any likelihood of confusion analysis, two key considerations are the similarities between the marks and the similarities between the goods at issue. Applicant demonstrated that the story of “Cinderella,” is a “well-known narrative … involving a beautiful young lady, her antagonistic stepsisters, a fairy godmother, a ball, a prince, and a pair of glass slippers, existing since at least as early as 1697.”
The USPTO cited to nine other doll lines that use the name “Cinderella” holding that: 1) the mark is weak, and 2) CINDERELLA is not the dominant component of the cited, registered mark. The court found that while the dominant part of the mark -the term CINDERELLA – was similar, use of the terms “Walt Disney” and “Zombie” differentiated the two. The USPTO also found that “the design element of “WALT DISNEY’S CINDERELLA” may function, for juvenile customers, as a stronger source indicator than the term CINDERELLA, because it depicts a specific version of Cinderella that is associated with the Walt Disney animated film” of the same name.
Lastly, although the word “zombie” has little significance or distinctiveness as a source indicator in the marketplace for toys, the combination of ZOMBIE with CINDERELLA creates a unitary mark with an incongruous impression.
Do you work with start-up companies and need a basic understanding of the various intellectual property issues that can arise?
I will be co-presenting in this online seminar that will help you:
- understand the trademark and copyright problems your client may encounter with branding;
- learn how to protect your client’s branding once established;
- familiarize your practice with patents, including what they protect, timing, and strategies to prevent inadvertent loss of patent rights before filing the application;
- understand trade secrets and the importance of non-disclosure and confidentiality agreements;
- recognize intellectual property issues relating to technology, including open source code and the cloud;
- establish a proactive approach toward intellectual property ownership between cofounders, employees, and vendors; understand business names, domain names, promotional issues, and website content concerns.
The program qualifies for 1.5 hours MCLE credit.
I would like to personally invite you to attend the upcoming Law Ed program titled, “Identifying Intellectual Property Issues in Start-Ups,” which I will be co-presenting via live webcast on Tuesday, May 27th.
Presented by the ISBA Business Advice and Financial Planning Section
Co-Sponsored by the ISBA Intellectual Property Section
Online marketing continues to evolve and affiliate marketing can be a great method of building brand awareness. Online marketers need to stay ahead of legal and regulatory compliance trends. This article looks at recent Federal Trade Commission (“FTC,” “Commission,” or “agency”) activity that impacts online marketing.
Given the lack of a comprehensive federal regulatory scheme, and the increasing awareness of deceptive marketing practices, it is not surprising that the FTC has ramped up enforcement efforts against entities not covered by existing, industry-specific federal regulations over the last decade. Notably, one company has defended itself against the FTC by challenging the FTC’s authority to pursue such broad enforcement.
The widely-watched case of FTC v. Wyndham Worldwide Corp is not just about Cybersecurity.
The Federal Trade Commission (FTC) has just won the first major round of its fight with Wyndham Hotels over data security. However, the importance of the case has more to do with the FTC’s jurisdiction, challenged when Wyndham moved to dismiss the FTC’s case. Affirming the FTC’s broad jurisdiction, the federal judge overseeing the controversy noted that the case highlights “a variety of thorny legal issues that Congress and the courts will continue to grapple with for the foreseeable future.”
Affiliate Marketing: A Roadmap for Compliance: Text Message Marketing
The Commission is cracking down on affiliate marketers that allegedly bombard consumers with unwanted text messages in an effort to steer these consumers towards deceptive websites falsely promising “free” gift cards.
For example, in eight different complaints filed in courts around the United States, the FTC charged 29 defendants with collectively sending more than 180 million unwanted text messages to consumers, many of whom had to pay for receiving the texts. The messages promised consumers free gifts or prizes, including gift cards worth $1,000 to major retailers such as Best Buy, Walmart and Target.
By now, many in the Affiliate Marketing industry are familiar with the Legacy Learning Systems case. In March, 2011 the FTC settled charges against Legacy — which sells instructional DVDs — that Legacy represented, directly or indirectly, expressly or by implication, reviews of their products were endorsements reflecting the opinions of ordinary consumers or independent reviewers, when many of the favorable endorsements were posted by affiliate marketers who received a commission from Legacy for sales they generated.
Regardless of the form of affiliate marketing – email campaigns or text message campaigns – there are a couple key take-aways here.
First, identify and disclose a material connection between a product user or endorser and any other party involved in promoting the product. A “material connection” is a relationship that affects the credibility of an endorsement and wouldn’t be reasonably expected by consumers. See our article about complying with the endorsement guides here.
Second, set up and maintain a system to monitor and review affiliates’ representations and disclosures to ensure compliance. For example, Legacy looked at its top 50 revenue-generating affiliates at least once a month, visiting their sites to review their representations and disclosures. It has to be done in a way designed not to disclose to the affiliates that they’re being monitored.
Third, understand he requirements for conducting legally-compliant text message marketing. The Telephone Consumer Protection Act (TCPA) makes it unlawful to make any call (other than a call made for emergency purposes or made with the prior express consent of the called party) using any automatic telephone dialing system or an artificial or prerecorded voice … to any telephone number assigned to a . . . cellular telephone service … or any service for which the called party is charged for the call. The prohibition on calls to cell phones applies to text messaging.
Privacy Law Update: California “Do Not Track”
Disclosures must explain:
1. If a web site operator allows other parties to use tracking technologies in connection with the site or service to collect certain user data over time and across sites and services; and
2. How it responds to browser “do not track” signals or other mechanisms designed to give consumers choice as to the collection of certain of their data over time and across sites and services
In addition, the “California Shine the Light Act” requires that companies (except non-profits and businesses with less than 20 employees) collecting broadly defined personal information from California consumers on or offline either: (a) give consumers a choice as to the sharing of that information with third parties (including affiliates) for direct marketing purposes; or (b) provide notice of, and maintain, a method by which consumers can annually obtain information on the categories of information disclosed the names and addresses of the recipients of that data, and a description of the recipients’ business.
If an e-commerce service offers tangible goods or services, or vouchers for them, to California consumers, it must give certain notices to consumers, including how they can file a complaint with the CA Department of Consumer Affairs.
Are you concerned about how to disclose how your service responds to “Do Not Track” signals or similar tools and settings, and whether third parties are permitted to collect personally identifiable information about consumer online activities over time and across different websites when a consumer uses that online service? We may be able to help. We can review your policies, your information gathering and sharing practices, and advise on whether there is room for improvement.
Please contact us for a no-fee consultation.
At the end of August, the California passed an amendment to the California Online Privacy Protection Act that will require commercial websites and services that collect personal data to disclose how they respond to Do Not Track signals from Web browsers.
AB 370, as introduced by California Assemblyman Al Muratsuchi, requires a business that discloses a customer’s personal information to a third party for direct marketing purposes to provide the customer, within 30 days after the customer’s request, as specified, in writing or by e-mail the names and addresses of the recipients of that information and specified details regarding the information disclosed.
This bill, available here, would declare the intent of the Legislature to enact legislation that would regulate online behavioral tracking of consumers.
A presentation on what goes into creating original designs and how these differ from copycats.
WHERE: Decoration & Design Building, J. Robert Scott Showroom, Suite 220
WHEN: Wednesday, October 2,2013 !2 p.m.
WHAT: From film to fashion, creative industries are taking steps to protect and promote original work. Designers and manufacturers need to know what steps they can take to protect their designs, their businesses, and their profits. The discussion will address issues related to how to protect original design (copyright & design patent) and the manufacturers (trademark, unfair competition).
INTERIORS Magazine Editorial Director Michael Wollaeger
J. Robert Scott Founder Sally Sirkin Lewis
Designer Laura Kirar [Web Site]
Intellectual Property lawyer David Adler
Showroom reception to follow.
Download the full Fall Decoration & Design Building Market Brochure Here.
On October 2, 2013, I will be attending the Decoration & Design Building Fall Market where I am giving a presentatIon on protecting original furniture & textile designs. Those in attendance share a belief that style and design matter.
As designers and purveyors of good taste, you may spend months developing a concept, selecting materials, agonizing over the exact curve of the arm of a chair. Manufacturers may refine the design, invest in tooling to build it, promote it, and get it to market. Merchandise buyers may spend months reading, researching, attending events such as this to obtain and fill your showrooms and catalogue with ineffable elements of style. This is original, authentic design. Authentic designs—pieces produced by designers or their authorized manufacturers—are investments.
Therein lies the problem for today’s furniture designers and retailers. It takes intellectual and financial capital to conceive, create and produce good design. Yet, today’s consumer driven, price-focused economy is making it more and more difficult for a designer to protect and profit from the investment of this intellectual capital.
This presentation will focus on why certain designs are protectable, how to protect them, and how to defend against knock-offs.
Over the last few years privacy, and the lack of comprehensive protection, have made numerous headlines. From overly inquisitive mobile applications that fail to disclose how cell photo data is accessed and shared (Path) to handset manufacturers failures to properly inculcate privacy in the design and manufacturing process (HTC) to security lapses at government databases resulting in exposure of sensitive personal information (South Carolina), consumers, regulators and legislators are waking up to privacy issues.
Recent developments highlight the trend in Privacy
In the U.S. we lack a single comprehensive privacy law, although many state and federal laws address various aspects of collecting, storing and sharing personal information. In the absence of a single, over-arching, mandate, legislators and regulators are stepping into fill at perceived need.
GPS, Location & Privacy
The Geolocation Privacy and Surveillance (GPS) Act addresses use of location data by law enforcement. The bill (not yet law) requires police to obtain a warrant based on probable cause whenever it seeks “location information.” Unfortunately, the term “location information” is very broadly defined, does not distinguish requests for access based on the level of precision, time period, or whether the information is for past or future conduct.
Proposed Federal Privacy Standards
Two bills introduced this year aim to create a baseline level of privacy protection at the federal level. John Kerry (D-MA) and Sen. John McCain (R-AZ) introduced S. 799, the Commercial Privacy Bill of Rights Act of 2011, to create a regulatory framework for the comprehensive protection of personal data for individuals, enforceable by the Federal Trade Commission (FTC). Similarly, Rep. Cliff Stearns (R-FL) is promoting a Consumer Privacy Protection Act (H.R.1528), directed at consumers and focused on restricting the sale or disclosure of personal information.
FTC Protects Privacy Under Mantle of Consumer Protection
As a result of alleged data security failures that led to three data breaches at Wyndham hotels in less than two years, the Federal Trade Commission filed suit against hospitality company Wyndham Worldwide Corporation. The case against Wyndham is part of the FTC’s ongoing efforts to make sure that companies live up to the promises they make about privacy and data security.
The FTC complaint alleges that Wyndham failed to maintain adequate and industry standard security measures by storing credit-card information in unencrypted format, allowing servers to remain unpatched, and failing to use firewalls.
The FTC alleges that these failures led to fraudulent charges on consumers’ accounts, millions of dollars in fraud loss, and the export of hundreds of thousands of consumers’ payment card account information to an Internet domain address registered in Russia.
Most notably, the lawsuit will test whether the Federal Trade Commission has the jurisdiction to compel companies to provide a certain level of cybersecurity in order to safeguard consumer personal information.
Privacy Remains Top Concern
Many companies across many industries, financial services, higher education and healthcare, just to name a few, are facing a wide range of security and privacy concerns, scrambling to implement A defensible security framework and demonstrate compliance. It’s alarming, considering the significant consequences associated with not complying.
Organizations can lose contracts, customers and their reputation. That could put some out of business.
Compliance Preparation & Best Practices
Large organizations can spend many months and millions of dollars on compliance. Your business need not go to such extremes. To prevent getting caught by surprise and to prepare for the compliance journey, I’ve listed below some suggested best practices.
Periodic risk assessments. Evaluate potential damage and disruption caused by unauthorized access, use, disclosure, modification, or destruction of data or systems.
Policies and procedures. Incorporate procedures for detecting, reporting, and responding to security incidents, as well as business continuity plans.
Standardize. Set standards of acceptable information security for networks, facilities, and information systems.
Train Employees. Awareness training for employees, contractors, and other users of information systems is critical. Articulate the security risks associated with activities and define users’ responsibility for complying with policies and procedures.
Test & Evaluate. Periodic assessment of the effectiveness of information security policies, procedures, practices, and controls helps determine weak spots. At a minimum they should be conducted annually, according to Ford.
Respond & Repair. Have a pre-defined process for planning, implementing, evaluating, and documenting remedial actions designed to address legal, PR, HR and related risks in the event of a breach.
THIS IS NOT LEGAL ADVICE. The procedures outlined above are merely suggestions and there is no guarantee that implementation will reduce risk or mitigate liability.
Please contact Leavens, Strand, Glover & Adler at 866-734-2568 for a free consultation to learn how LSGA can help meet your specific needs.