Social Media Could Get You Fired? Really? Well, Yes. Really.

If you aren’t careful, social media can hurt in the workplace, too. While recruiters, college and university admissions counselors, and many others have used profiles, postings, YouTube videos, and other social media platforms to gather information about candidates and prospects—corporations that are now increasingly monitoring their own presence, mentions, and brands in social media are discovering that employees—at work and outside the workplace—can be outstanding goodwill ambassadors, or may be saying a bit too much. In an interview with Laurie Sullivan, reporting in MediaPost News, Online Media Daily describes how Twitter And Facebook Could Get You Fired—because the same rules apply online as offline, but online are magnified by technology. Read the article, and when your company needs to develop a policy or understand how to optimize the benefits and minimize the legal risks, call me, Joe Rosenbaum; or Douglas J. Wood or Stacy Marcus, key lawyers in our Social Media Task Force; or any of the Rimon lawyers with whom you regularly work.

Social Media Risks and Rewards

In the wake of our release and distribution of the Rimon Social Media Task Force’s groundbreaking white paper entitled “Network Interference: A Legal Guide to the Commercial Risks and Rewards of the Social Media Phenomenon,” Practical Law Publishing has published a summary, prepared by The Social Media Task Force at Rimon, available here and entitled, Social Media Risks and Rewards. The published article represents a condensation of the entire white paper, previously announced in Legal Bytes, and which you can still download in its entirety.

As we mentioned, we will be adding, supplementing and updating these materials with even more chapters and new information, and we will soon be launching a special web page dedicated to the evolving social media legal landscape. If you need help navigating this environment, bear in mind that Rimon has a Social Media Task Force – a team of lawyers who have experience, and can advise and guide you as the medium and media evolves. Contact me, Joe Rosenbaum, or Douglas J. Wood, Stacy Marcus, or any of the Rimon lawyers with whom you regularly work. How can we help you?

Rosenbaum on CNNMoney.com

Joe Rosenbaum was featured on CNNMoney.com in the Small Business section in connection with a question about an individual cardholder’s liability for business-related charges on a business/corporate card issued while the individual was an employee.

For the answer, you’ll have to read the entire blog post on CNNMoney Small Business Q&A. Of course you can always contact Joe for the answer.

Francis Vincent Frank Zappa Jr.

“Some scientists claim that hydrogen, because it is so plentiful, is the basic building block of the universe. I dispute that. I say that there is more stupidity than hydrogen and that is the basic building block of the universe.”

Outsourcing Providers Pitching Business? Be Careful What You Wish For.

As far back as May 2005, Legal Bytes reported that Europe was becoming a major outsourcing hub for a variety of reasons (Outsourcing Statistics). Well just this week, the law started catching up.

In what is certainly a major ruling and quite possibly the beginning of emboldened plaintiff-customers seeking greater accountability from outsourcing providers, Electronic Data Systems (EDS) has lost a case initiated by British Sky Broadcasting Plc (BSkyB) back in 2004, alleging that EDS, one of the leading outsourcing providers in the world, had misled BSkyB about its capabilities and expertise. For those of you who are legal research hounds, the case is cited as HT-06-311, British Sky Broadcasting v. Electronic Data Systems, although I don’t believe it has been fully published yet. The dispute arose over a services contract that was entered into by EDS and BSkyB in 2000, well before EDS was purchased in 2008 by its current owner, Hewlett-Packard (HP), for slightly more than US$13 billion.

To give you the background, BSkyB selected EDS to develop a new customer relationship management (CRM) system for its call centers in Scotland. After almost two years and failure by EDS to deliver, by March 2002, BSkyB ended the contract and took over the project itself – the frustration and events ultimately leading to the legal proceedings filed in 2004 that alleged EDS lied about its ability to undertake and complete the project. On the other side of the case, in its own court documents, EDS alleged that BSkyB simply “did not know what it wanted,” and wanted the lowest cost possible to accomplish “it.” To highlight the disconnect further, the contract with EDS was for £48 million, but according to court documents filed in the case, with all of the delays, budget over-runs, EDS’ failure to deliver, and BSkyB taking over and completing the project itself, costs had mounted to £265 million.

Justice Ramsey, writing for the British High Court, ruled that EDS misled BSkyB in making false and fraudulent misrepresentations in pitching and marketing its capabilities to BSkyB, giving rise to a claim for damages. Further, the court concluded, to the extent these representations were fraudulent, the limitation of liability clause in the contract that would have otherwise limited EDS’ liability for damages should be set aside and does not apply. While damages have not yet been fixed, in theory, if one includes the differential in costs, lost profits and other damages that are now fair game, EDS could be liable to BSkyB for well in excess of £200 million – that’s more than US$315 million at current exchange rates.

This is a major decision not only in the UK, but also for outsourcing deals around the globe, and if the beginning of a precedential trend, it could signal a radical shift in the way outsourcing deals are bid, negotiated and consummated. There is no question that anyone involved in outsourcing knows that the customer does not always have its specifications and detailed requirements buttoned up when discussions begin. Indeed, outsourcing often presents a singularity at which time enhancements, efficiencies and improvements that might have been difficult or impossible internally, can be effected by moving the operations to a third-party provider. The provider, eager to win a lucrative bid, may over-promise or over-represent its experience and capabilities. Smart negotiators know that forcing both sides to diligently and meticulously work through the “devil in the detail,” and making sure expectations, resources and capabilities are clearly set out and unambiguous, is the single most important contribution to be made in avoiding disputes, potential litigation and problems as the work and services unfold. Those of you in marketing know all too well that there is often a fine line between an actual claim and puffery. The former represents actionable representations, the latter . . . well, “you’ve tried the rest, now try the best” on every pizza box in the world.

Are you contemplating a major outsourcing initiative? Are you considering any outsourcing project, even a small one, involving critical operations – customer services, supply chain management, operations, transaction processing? Outsourcing is complicated. Need help? We wrote the book. No really, you can see for yourself: Outsourcing Agreements Line by Line: A Detailed Look at Outsourcing Agreements & How to Change Them to Fit Your Needs, written by none other than yours truly, Joseph I. Rosenbaum. Whether you check out the book or not, if you do need help, our Advertising Technology & Media law team here at Rimon has the help you need to make sure that, even if you are right, you can avoid the costly consequences and angst inherent in any legal proceedings between customers and providers. How can we help you? Call me, Joe Rosenbaum, or the Rimon attorney with whom you regularly work.

FINRA Issues Guidance in New Social Media Websites Notice

In November, Legal Bytes reported (Regulators Poised to Give Financial Institutions a Slap in the Facebook) that Richard Ketchum, Chief Executive of the Financial Industry Regulatory Authority (FINRA), acknowledged Wall Street is eager to use social media to interact with customers. In the course of his remarks at a recent meeting of the Securities Industry and Financial Markets Association (SIFMA), he noted, “We continue to witness the advent of technologies that will challenge your ability to ensure compliance with regulatory requirements,” and “Social networking is one such innovation.

Now, supplementing existing FINRA Rules, FINRA has released a notice concerning online media rules (you can download and read a copy of the notice below) whose key components include requirements that securities firms:

  • Must develop policies and require its employees to comply with the new regulatory requirements
  • Must retain records of communications (a compliance requirement of the Securities Exchange Act of 1934) when social media is used to communicate
  • Must ensure that recommendations made through social media are suitable to all investors to whom the recommendation is made (e.g., by limiting or filtering access based on investor/consumer qualifications)

FINRA’s notice takes the position that securities firms must adapt existing rules to social media and essentially mirror the 2003 FINRA definition of “public appearance.” This definition noted that chat room postings were no different than if a firm representative was in a room making statements to a room filled with investors. FINRA’s current notice indicates that information posted or content placed online (static information) is subject to these same rules and must be approved by a firm principal – presumably, even information about individuals in the firm that may be part of an individual’s profile on the firm’s website or in social media platforms. But online interactions that are occurring on the fly (e.g., in real time), while subject to supervisory requirements (e.g., they must be supervised, perhaps even monitored), do not require such approvals.

You can read or download the FINRA Regulatory Notice 10-06 (Social Media Web Sites) [PDF] here.

As mentioned in the Legal Bytes November post, SEC disclosure rules apply to Tweets, blog postings, wall postings and other communication platforms provided by social media sites, and other regulatory agencies are seeking to address the use of social media sites by the entities they regulate (e.g., the FCC, the New York State Insurance Department). So if any of this is of interest and if you need to know more or need help, please contact me, Joseph I. Rosenbaum, or the Rimon attorney with whom you regularly work. We are happy to help.

Update:  Rimon lawyers Christopher P. Bennet, Amy J. Greer, Jacob Thride and Kevin Xu have prepared a Client Alert on the subject which you can read by going to: FINRA Issues Notice for Financial Firms Using Social Media.

Freedom of the Press = Freedom to Tweet

Twitter keeps hitting the newswires—in this instance, in a matter involving freedom of the press. You might have heard from time to time, especially in high-profile or emotionally charged cases, about judges who have used their power to control proceedings by restricting the use of certain communications equipment and mechanisms from within their courtrooms (e.g., use of mobile phones, video recording equipment, etc.).

From Pennsylvania comes an order from a Dauphin County judge refusing to bar reporters from sending Tweets during the course of a public and high-profile trial. In response to a motion by the defendants counsel, Judge Lewis, in a brief order, noted that “. . . to impose the proposed restriction would be premature and that the restriction itself is overly broad.”

In this particular case, the defendants were concerned that reporters, using Twitter inside the courtroom, would broadcast witnesses testimony, which could then be read or seen by other witnesses who were yet to testify. While refusing to ban Twitter to reporters, the judge did order the witnesses to avoid reading or listening to reports concerning the trial.

As icing on the cake, our own Rimon lawyers, Tom McGough, Mark Tamburri and Tom Pohl, won the order on behalf of the Associated Press and Pittsburgh Post-Gazette. Yes, Virginia, there is a place for social media in jurisprudence.

If you remember, Twitter was also the subject of some controversy in Pittsburgh during the G20 Summit last year. In that case, involving freedom of speech, police in Pittsburgh arrested a man who was using Twitter to send messages about the movements of police officers as protests were unfolding. Although the police sought to charge the man with aiding an illegal protest, the man was broadcasting what was easily visible in plain sight.

While commercial cases often involve money or intellectual property rights, or rights of publicity or privacy, cases are emerging that involve fundamental Constitutional rights. The law will need to move quickly into the digital and social media age in order to keep up. Some courts and judges are doing just that!

Need to know more? Contact me, Joseph I. Rosenbaum, or any Rimon attorney with whom you regularly work.

Court Rules Twitter Libel is Stale, and Neither Ripe Nor Moldy

Back in July, Legal Bytes posted a report (Landlord Can’t Let Tweet sMOLDer) about a Twitter "tweet" posted by Amanda Bonnen, that contained the following statement: "Who said sleeping in a moldy apartment was bad for you? Horizon realty thinks it’s OK."

Back then we told you that Horizon Group Management, the landlord of the apartment building involved, filed suit in a Cook County Illinois Court for libel, alleging that it was a "malicious and defamatory" tweet about the state of her apartment. 

Well this past Wednesday (Jan. 20, 2010), Cook County Circuit Court Judge Diane J. Larsen dismissed the suit, and Ms. Bonnen’s attorney indicated the judge described the posting as too vague to constitute libel under the legal tests applicable to such a claim.

To support a claim of libel, Horizon would have had to show that Ms. Bonnen wasn’t merely offering her opinion, that the statement must be reasonably understood by everyone to refer to the specific entity—in this case, this particular Horizon realty company—and that there was actual harm that can be proved, flowing from the statement. The fact that the statement was made on Twitter, and consequently widely available across the Internet, doesn’t change the standard one must meet to prove libel, and the judge dismissed the case. 

As you can guess, these aren’t the only cases involving defamation in the context of social media. For example, the action against Courtney Love, wife of the late Kurt Cobain, is alive and well. You might recall that case arose when a fashion designer claimed Ms. Love tweeted that the designer was a drug addict, a prostitute and called her a "lying hosebag thief." As we reported in Legal Bytes this past August (Court Orders Google to Turn Over Blogger Identity Information), cases of defamation become even more complex when the identity of the actual "tweeter" is hidden behind a pseudonym.

These cases all hinge upon the friction created by social interaction. Defamation is not a new concept, and whether broadcast over radio waves or propagated across the web, it should come as no surprise that when human beings populate the borderless universe of cyberspace, these interactions can give rise to legal actions. The laws that apply to publicity, privacy, libel, deceptive advertising, unfair competition and intellectual property may need to be applied or viewed differently, but they don’t disappear simply because the content is digital. Need to know more? Contact me, Joseph I. Rosenbaum, or any Rimon attorney with whom you regularly work.

George Washington Carver (1864-1943)

“How far you go in life depends on your being tender with the young, compassionate with the aged, sympathetic with the striving, and tolerant of the weak and strong. Because someday in your life you will have been all of these.”

When the Fog Lifts, Don’t Be Surprised if You Still See Clouds

“If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility . . . The computer utility could become the basis of a new and important industry.”

                                      John McCarthy, MIT Centennial, 1961

“Cloud computing” is a term used to describe the use of computer resources not solely as a communications protocol (e.g., the Internet), nor solely as a content or transaction host (World Wide Web), but as an application development and information processing service. To help explain further, to send an email, much like using the telephone, it makes no difference who your provider or host is or which carrier you use. There is a protocol that allows interoperability across networks and processors, and as long as the sender and recipient have an email address and access to an Internet connection, the email gets through. On the web, with access to the Internet and a browser (technology that displays content and functionality hosted at a particular Internet address), you can interact with the website – you can see the material displayed and you can "select" (click) to enable certain features.

Today, as a general rule, if you wanted to create, edit, spell check, save, send or share most content or information with someone, unless you plan on typing and formatting a very long email, you still need word processing, spreadsheet or presentation software programs to create and upload (communicate or store for display), or to see and use content that you might download. In a cloud-computing environment, all of these functions are resident in the "cloud." Imagine that you no longer needed a desktop or laptop computer processor, and all you had were input and display devices (e.g., keyboard, mouse, monitor), which you could either carry or borrow wherever you went. Plug into a universal "outlet," enter your unique pass codes and authentication information, and you have everything you need – where and when you need it. Like telephone, electric or gas service, computing becomes a commodity accessible virtually anywhere and anytime, generally priced by usage, the applications, and the amount and type of storage for which you want and need access.

Cloud-computer services can be sold and paid for using plans not dissimilar to phone service – per call, per minute, unlimited, features, functions – and they disaggregate the user, whether individual or business enterprise, from the procurement, maintenance and operations of the underlying processors and software programs. Clouds can be public – made available to anyone on demand (think Wi-Fi registration based hot spots) or private (large companies can operate or arrange to have someone operate a closed-cloud environment). I summarize the basic characteristics of cloud computing as follows:

  • Flexibility – the user can easily modify use, resources, demand, access and virtually every other resource, without the need to purchase or dispose of any equipment or software, other than input and output devices. Increases or decreases in processing, development, storage or other requirements can be managed easily in real time and on an infinitely scalable basis.
  • Cost – commodity or utility pricing lowers user costs. Capital expenditures can be eliminated, license fees reduced and access fees managed more efficiently.
  • Resources – shared resources enable lower per-user, per-unit pricing, and optimization of peak and non-peak loads across user communities. Resource upgrades and enhancements can be amortized across a broad user base, seamlessly and transparently to the user community. Inter-exchange agreements between cloud providers will enable continuity and recovery, load management, and resource backup capability at optimal prices.
  • Independence – time, space and resource constraints become largely irrelevant to the extent Internet or web access is available.
  • Interoperability – absent unique or customized requirements that can be managed separately by the user, standardized applications, development tools and protocols are simpler to maintain and operate, debug, update and support. 

While security and privacy is always a concern – more so where data, in addition to processing capability and storage, becomes more concentrated and accessible rather than distributed – more users and businesses will have the potential benefit of stronger security measures than are currently affordable or in use, to the extent cloud providers can develop and implement strong security standards and protocols within their service offerings. 

So who are the actual or prospective players? Well lots of prognosticators and labelers are out there, but here is my list in basic categories:

  • Providers are those who procure, create, host and manage cloud resources and then sell access, services, features and functions in a cloud environment – wholesale or retail
  • Users are those who need to use and take advantage of cloud services, features and functions, whether individually or as part of a business
  • Intermediators are those who create intermediation and aggregation opportunities between and among providers. On the one hand, intermediators can bridge gaps between providers and create interface and sharing environments between or among providers. On the other hand, intermediators may begin finding niches in customizing or aggregating services, features or functions for particular industries or in particular regions.
  • Developers and supporters are those who develop utilities, applications, tools, features and functions to enhance the cloud experience, make additional services and applications available, and who maintain and support the efficient functioning of the cloud environment.

There may be others – my list is not intended to be comprehensive or even definitive. I don’t have a crystal ball, so time and experience will determine what we cannot now predict. Four computers, interconnected to respond to the perceived vulnerability of centralized computing, were the origins of the Internet. Distributed computing represented commercial attempts to amortize costs, decentralize institutionalized information, and enable greater redundancy and recovery capability. Networking and web-based computing gave us the ability to communicate, share and store information across multiple processors and devices through share protocols. While it’s still too foggy to tell what the future will bring, cloud computing represents the next big innovative thing in making the power of the computer and the Internet easier to use, more available, more interoperable and more cost-effective.

When the fog starts to lift, we may see clouds on the horizon. Whether they are storm clouds or fluffy wondrous sights of joy, I leave to your imagination. Stay tuned. But no matter what your visions of the future may be, if you see a cloud and you aren’t sure what the legal implications might be, please feel free to contact me, Joseph I. (“Joe”) Rosenbaum, or the Rimon attorney with whom you regularly work.