<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5815274498728570281</atom:id><lastBuildDate>Tue, 23 Mar 2021 10:11:26 +0000</lastBuildDate><category>4th Amendment</category><category>HIPAA</category><category>TCPA</category><category>data breach</category><category>5th Amendment</category><category>New Jersey</category><category>PHI</category><category>government surveillance</category><category>leadership</category><category>legal marketing</category><category>legal practice management</category><category>social media</category><category>BYOD</category><category>CFPB</category><category>CISPA</category><category>Consumer Financial Protection Bureau</category><category>Digital Marketing</category><category>ECPA</category><category>FFIEC</category><category>FINRA</category><category>Federal Financial Institutions Examination Council</category><category>HITECH</category><category>MLAT</category><category>Moneyball</category><category>Mutual Legal Assistance in Criminal Matters Treaty</category><category>NJICLE</category><category>PPP</category><category>President Obama</category><category>RPL</category><category>Rule 23</category><category>SCA</category><category>SEC</category><category>SMS</category><category>U.S. v. Miller</category><category>U.S. v. Warshak</category><category>anti-bullying</category><category>attorney client privilege</category><category>business associate</category><category>civility</category><category>class action</category><category>cloud</category><category>compliance</category><category>criminal ediscovery</category><category>culture</category><category>cybersecurity</category><category>cybersecurity framework</category><category>data contracts</category><category>education privacy</category><category>enhanced cybersecurity services program</category><category>ethics</category><category>executive order</category><category>expense management</category><category>financial institutions</category><category>identity theft</category><category>investment advisor</category><category>judges</category><category>law firm performance</category><category>leverage</category><category>liability</category><category>metrics</category><category>mobile</category><category>plain view doctrine</category><category>presidential policy directive on critical infrastructure</category><category>privacy law</category><category>productivity</category><category>rates</category><category>realization</category><category>right to privacy</category><category>sabermetrics</category><category>text messaging</category><category>values</category><category>waiver</category><category>workplace privacy</category><title>Sheikh Law Group, LLC</title><description>Privacy | Data | Corporate Counsel | Litigation &amp;amp; eDiscovery</description><link>http://www.sheikhlawgroup.com/</link><managingEditor>noreply@blogger.com (Khizar A. Sheikh, Esq.)</managingEditor><generator>Blogger</generator><openSearch:totalResults>17</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-2487456236509054833</guid><pubDate>Tue, 22 Oct 2013 18:53:00 +0000</pubDate><atom:updated>2013-10-22T14:53:23.856-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Marketing</category><category domain="http://www.blogger.com/atom/ns#">TCPA</category><category domain="http://www.blogger.com/atom/ns#">text messaging</category><title>Recent Changes For Digital Marketers &amp; Companies That Use Text Message Marketing</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Many marketing consultants advise companies to employ text messaging and telemarketing as a component of their marketing and advertising strategies.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Companies that do so, however, need to be mindful of complying with the 1991 Telephone Consumer Protection Act (the “TCPA”), which prohibits companies from sending auto-dialed text messages, voice calls, and faxes without specific consents and authorizations.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Recent Changes&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;On October 16, 2013, two major changes to the TCPA went into effect:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;Prior Express Written Consent Required For Telemarketing&lt;/em&gt;: Companies must obtain and hold unambiguous &lt;u&gt;&lt;em&gt;written&lt;/em&gt;&lt;/u&gt; consent from customers before initiating any telemarketing call/text message; and&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;em&gt;“Established Business Relationship” Not Sufficient For Telemarketing&lt;/em&gt;: An established business relationship does not relieve companies of the obligation to obtain prior express written consent before making a telemarketing call/text message. &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;These changes follow a January 14, 2013 TCPA change that requires companies to ensure that artificial or prerecorded voice telemarketing or advertising calls have opt-out mechanisms.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;What Should Companies Do Now?&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The TCPA can affect any organization that sends text messages, voice calls, or faxes as part of its advertising / marketing campaign or outreach, whether such messages are sent through the company or a through a contracted third party marketing vendor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Violations of the TCPA can be expensive. The TCPA permits a private right of action and statutory damages in the amount of $500 for each violation and up to $1,500 for each willful violation. The risk for companies is significant because the numbers of TCPA class actions are on the rise and the potential damages / settlement costs in these cases can run into the millions of dollars.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Given the changes that went into effect in October, businesses should review their TCPA / advertising policies to ensure that they are in compliance, so that they can avoid the possibility of paying onerous penalties or being involved in expensive class action litigation.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Further, even if companies that hire third party vendors to conduct telemarketing call / text message campaigns on their behalf, they should exercise care to minimize potential claims, including by requiring, for example, representations and warranties and risk shifting provisions in contracts. &lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/10/recent-changes-for-digital-marketers.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8173709661560192355</guid><pubDate>Fri, 24 May 2013 12:29:00 +0000</pubDate><atom:updated>2013-05-24T08:29:54.319-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">FINRA</category><category domain="http://www.blogger.com/atom/ns#">investment advisor</category><category domain="http://www.blogger.com/atom/ns#">SEC</category><title>Data Breach And Governance Issues Find Investment Advisors</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Two items of interest this week for investment advisors and their clients in how they deal with internal controls relating to confidential data and email:&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;On May 23, 2013, the Securities and Exchange Commission (&quot;SEC&quot;) charged charged proxy adviser Institutional Shareholder Services (&quot;ISS&quot;) for failing to safeguard the confidential proxy voting information of clients participating in a number of significant proxy contests. According to the SEC press release:&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;An SEC investigation found that an employee at ISS provided a proxy solicitor with material, nonpublic information revealing how more than 100 ISS institutional shareholder advisory clients were voting their proxy ballots. In exchange for voting information, the proxy solicitor provided the ISS employee with meals, expensive tickets to concerts and sporting events, and an airline ticket. The breach was made possible in part because ISS lacked sufficient controls over employee access to confidential client vote information, as this employee gathered the data by logging into the ISS voting website from home or work and using his personal e-mail account to communicate details to the proxy solicitor.&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;The SEC&#39;s order finds that ISS willfully violated Section 204A of the Investment Advisers Act of 1940. The order censures the firm and requires ISS to pay a $300,000 penalty and engage an independent compliance consultant to review its supervisory and compliance policies and procedures. The consultant will evaluate whether ISS&#39;s procedures are reasonably designed to ensure that its proxy voting services business complies with the Advisers Act in its treatment of confidential information, communications with proxy solicitors, and gifts and entertainment.&amp;nbsp;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Section 204A of the Investment Advisors Act of 1940 requires every investment advisor to establish and enforce policies and procedures to prevent the misuse of of material, nonpublic information.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The SEC Order is available &lt;a href=&quot;http://www.sec.gov/litigation/admin/2013/ia-3611.pdf&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Also, on May 21, 2013, the Financial Industry Regulatory Authority (&quot;FINRA&quot;) fined broker LPL Financial LLC (&quot;LPL&quot;) $7.5 million for 35 separate, significant email system failures, which prevented LPL from accessing hundreds of millions of emails and reviewing tens of millions of other emails. Additionally, LPL made material misstatements to FINRA during its investigation of the firm&#39;s email failures. LPL was also ordered to establish a $1.5 million fund to compensate brokerage customer claimants potentially affected by its failure to produce email.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;FINRA&#39;s website was down this morning, but the Securities Law Prof Blog has a nice entry &lt;a href=&quot;http://lawprofessors.typepad.com/securities/2013/05/finra-fines-lpl-for-systemic-email-failures-misstatements-to-finra.html&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/05/data-breach-and-governance-issues-find.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-5853947461012515620</guid><pubDate>Fri, 24 May 2013 02:31:00 +0000</pubDate><atom:updated>2013-05-23T22:31:51.097-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><title>Idaho State University Settles HIPAA Security Case for $400,000</title><description>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Idaho State University (&quot;ISU&quot;) has agreed to pay $400,000 to the U.S. Department of Health Human Services (&quot;HHS&quot;) for violations of the Health Insurance Portability and Accountability Act of 1996 (&quot;HIPAA&quot;) Security Rule. The settlement involves the breach of unsecured electronic protected health information (&quot;ePHI&quot;) of 17,500 individuals who were patients at an ISU clinic. HHS found that ISU did not:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;conduct an analysis of the risk to the confidentiality of ePHI as part of its security management process;&amp;nbsp;&lt;/li&gt;&lt;li&gt;adequately implement security measures sufficient to reduce the risks and vulnerabilities to a reasonable and appropriate level; and&lt;/li&gt;&lt;li&gt;adequately implement procedures to review&amp;nbsp;regularly&amp;nbsp;records of information system activity to determine if any ePHI was used or disclosed in an inappropriate manner.&lt;/li&gt;&lt;/ul&gt;Read the HHS press release &lt;a href=&quot;http://www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/isu-agreement-press-release.html.html&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;</description><link>http://www.sheikhlawgroup.com/2013/05/idaho-state-university-settles-hipaa.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-5459292219315613370</guid><pubDate>Wed, 24 Apr 2013 04:29:00 +0000</pubDate><atom:updated>2013-04-24T00:42:18.138-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">civility</category><category domain="http://www.blogger.com/atom/ns#">culture</category><category domain="http://www.blogger.com/atom/ns#">expense management</category><category domain="http://www.blogger.com/atom/ns#">law firm performance</category><category domain="http://www.blogger.com/atom/ns#">leadership</category><category domain="http://www.blogger.com/atom/ns#">legal marketing</category><category domain="http://www.blogger.com/atom/ns#">legal practice management</category><category domain="http://www.blogger.com/atom/ns#">leverage</category><category domain="http://www.blogger.com/atom/ns#">metrics</category><category domain="http://www.blogger.com/atom/ns#">Moneyball</category><category domain="http://www.blogger.com/atom/ns#">PPP</category><category domain="http://www.blogger.com/atom/ns#">productivity</category><category domain="http://www.blogger.com/atom/ns#">rates</category><category domain="http://www.blogger.com/atom/ns#">realization</category><category domain="http://www.blogger.com/atom/ns#">RPL</category><category domain="http://www.blogger.com/atom/ns#">sabermetrics</category><category domain="http://www.blogger.com/atom/ns#">values</category><title>Baseball Stats and Law Firm Performance</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I am a huge baseball fan. I have been so since the 80s when the greatness of &lt;a href=&quot;http://www.youtube.com/watch?v=8jk22qzc9NU&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Don Mattingly&lt;/span&gt;&lt;/a&gt; tormented me on an annual basis because of his not-so-great Yankees&amp;#39; supporting cast (especially oh those pitchers!). A pennant never materialized for me back then, but through it all, every stat, pitching AND hitting, was etched in my brain. I thought that if I only studied the stats enough, I could show everyone -- even those Mets fans -- that the Yankees (and every player on the team, even third baseman &lt;a href=&quot;http://www.youtube.com/watch?v=6KuM1UA4cSc&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Mike Pagliarulo&lt;/span&gt;&lt;/a&gt;) was the absolute best at his position in the major leagues. Of course, the stats to which I had access were only those in the newspaper and the backs of trading cards, namely the big ones: ERA, batting average, RBIs. My ground-shaking epiphany on how it all fit together never came. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Then came Billy Beane. Beane is a former professional baseball player and current front office executive for the Oakland Athletics.  Beginning in the mid-90s, Beane began to apply statistical analysis to player evaluations. Beane was the subject of Michael Lewis&amp;#39; 2003 book on baseball economics, Moneyball, which was made into a 2011 film starring Brad Pitt as Beane. Not too shabby.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The essence of &lt;a href=&quot;http://en.wikipedia.org/wiki/Moneyball&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Moneyball&lt;/span&gt;&lt;/a&gt; was an emphasis on the numbers:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;a href=&quot;http://www.sheikhlawgroup.com/2013/04/baseball-stats-and-law-firm-performance.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>http://www.sheikhlawgroup.com/2013/04/baseball-stats-and-law-firm-performance.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-3285480668632411668</guid><pubDate>Mon, 01 Apr 2013 10:18:00 +0000</pubDate><atom:updated>2013-04-01T06:18:48.607-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ethics</category><category domain="http://www.blogger.com/atom/ns#">judges</category><category domain="http://www.blogger.com/atom/ns#">social media</category><title>Judges &amp; Social Media</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;On February 21, 2013, the American Bar Association released &lt;a href=&quot;http://www.americanbar.org/content/dam/aba/administrative/professional_responsibility/formal_opinion_462.authcheckdam.pdf&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Formal Opinion 462&lt;/span&gt;&lt;/a&gt;, &quot;Judge&#39;s Use of Electronic Social Networking Media,&quot; which finds that a &quot;judge may participate in electronic social networking, but as with all social relationships and contacts, a judge must comply with relevant provisions of the Code of Judicial Conduct and avoid any conduct that would undermine the judge’s independence, integrity, or impartiality, or create an appearance of impropriety.&quot; The Opinion includes guidance on when a judge would have an affirmative duty to disclose a social media connection to parties that appear before that judge (conclusion: not most of the time).&lt;/span&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/04/judges-social-media.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-7856359774373927678</guid><pubDate>Tue, 12 Mar 2013 02:14:00 +0000</pubDate><atom:updated>2013-03-11T22:14:09.904-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">attorney client privilege</category><category domain="http://www.blogger.com/atom/ns#">waiver</category><category domain="http://www.blogger.com/atom/ns#">workplace privacy</category><title>Can A Company Maintain Attorney Client Privilege After Its Executives and Attorneys Communicate With A Consultant Through Another Company&#39;s Email System?</title><description>&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Magistrate Judge Paul S. Grewal of the Northern District of California says yes. Here is what Judge Grewal writes:&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Bill Campbell . . . works for [] Google[], but he is no mere employee, and perhaps not even that. He earns at best a nominal salary, often without any formal agreement or even understanding. And yet Campbell occupies an elite niche in the technology industry that, with apologies to Robert Redford, is best described as an &quot;executive whisperer.&quot; Either as consultant or part-time employee, Cambell has advised Google&#39;s senior-most management even as he did the same for [Apple] and others, all while serving as Chairman of the Board of [Intuit]. Campbell&#39;s unique status lies at the heart of the motion to compel now before the court. Citing their disclosure to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Campbell [through Intuit&#39;s corporate email network], Plaintiffs [] seek production of emails that Google either redacted or failed to produce on the grounds that the documents were privileged. Having considered the parties&#39; papers, supplemental documents, and oral arguments, the court DENIES Plaintiffs&#39; motion to compel but without prejudice to in camera review of certain documents as discussed below.&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;. . .&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Although the court finds that the &lt;/span&gt;&lt;i style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Asia Global&lt;/i&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; [&lt;/span&gt;&lt;i style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In re Asia Global Crossing, Ltd.&lt;/i&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;, 322 B.R. 247 (S.D.N.Y. 2005) (propounding four factors that it found most relevant to the question of confidentiality of emails sent over an employer&#39;s email system in the attorney-client privilege context)] factors are evenly split, the court finds that the importance of the attorney-client privilege as well as the lack of evidence that Intuit in fact monitored Campbell&#39;s emails supports the preservation of the privilege in this case. The fact that Campbell sent and received messages from his Intuit email address does not destroy the confidentiality necessary to maintain the privilege.&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Read all of Judge Grewal&#39;s opinion in&amp;nbsp;&lt;i&gt;In re High-Tech Employee Antitrust Litigation&lt;/i&gt;, No. 11-CV-2509-LHK-PSG (N.D. Cal. Feb. 28, 2013), by clicking &lt;a href=&quot;http://scholar.google.com/scholar_case?case=3897063182007984548&amp;amp;hl=en&amp;amp;lr=lang_en&amp;amp;as_sdt=2,31&amp;amp;as_vis=1&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/03/can-company-maintain-attorney-client.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-6156647288715354123</guid><pubDate>Thu, 07 Mar 2013 20:53:00 +0000</pubDate><atom:updated>2013-03-07T15:53:19.662-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">NJICLE</category><category domain="http://www.blogger.com/atom/ns#">privacy law</category><title>Mastering Data Breach, ID Theft &amp; Privacy Laws</title><description>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;My handout materials for this morning&#39;s New Jersey Institute for Continuing Legal Education&#39;s Mastering Data Breach, ID Theft &amp;amp; Privacy Laws seminar can be found &lt;a href=&quot;https://skydrive.live.com/redir?resid=2EB96671B312965F!174&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;. It was an enjoyable panel of which to be part. Thanks to &lt;a href=&quot;http://www.andersonkill.com/attorneysprofile.asp?id=5293&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Robert Chesler&lt;/span&gt;&lt;/a&gt; for organizing and moderating, and to &lt;a href=&quot;http://www.bressler.com/AttorneyProfile/CynthiaBorrelli-10.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Cynthia Borrelli&lt;/span&gt;&lt;/a&gt;, &lt;a href=&quot;http://www.andersonkill.com/attorneysprofile.asp?id=2378&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Joshua Gold&lt;/span&gt;&lt;/a&gt;, &lt;a href=&quot;http://www.navigant.com/professionals/o/obuchowski%20andrew%20p/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Andrew Obuchowski&lt;/span&gt;&lt;/a&gt;, and &lt;a href=&quot;http://www.infolawgroup.com/author/pparay/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Paul Paray&lt;/span&gt;&lt;/a&gt; for co-presenting.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</description><link>http://www.sheikhlawgroup.com/2013/03/mastering-data-breach-id-theft-privacy.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-3667599390917672470</guid><pubDate>Mon, 25 Feb 2013 16:17:00 +0000</pubDate><atom:updated>2013-02-25T11:17:35.981-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">4th Amendment</category><category domain="http://www.blogger.com/atom/ns#">5th Amendment</category><category domain="http://www.blogger.com/atom/ns#">government surveillance</category><category domain="http://www.blogger.com/atom/ns#">MLAT</category><category domain="http://www.blogger.com/atom/ns#">Mutual Legal Assistance in Criminal Matters Treaty</category><category domain="http://www.blogger.com/atom/ns#">right to privacy</category><category domain="http://www.blogger.com/atom/ns#">U.S. v. Miller</category><category domain="http://www.blogger.com/atom/ns#">U.S. v. Warshak</category><title>MLATs and Government Seizure Of Financial Records</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Interesting case of out of the Southern District&amp;nbsp;of Florida that deals with the issue of whether&amp;nbsp;the Justice Department can turn over a company&#39;s financial records to a foreign government under a Mutual Legal Assistance in Criminal Matters Treaty (&quot;MLAT&quot;).&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In &lt;/span&gt;&lt;a href=&quot;http://scholar.google.com/scholar_case?case=15783595307321276875&amp;amp;hl=en&amp;amp;as_sdt=2,31&quot;&gt;&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;Palmat Int&#39;l, Inc. v. Holder&lt;/em&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;, No. 12-20229 (S.D. Fla. Feb. 14, 2013), the Court held that the &lt;em&gt;Fifth Amendment&lt;/em&gt; of the Constitution does not provide a cognizable right to privacy for bank records when those records are held by a third party bank. The &lt;em&gt;Palmat&lt;/em&gt; court held that even if the Constitution did provide such a right, the United States&#39; interests in fulfilling its obligations under a MLAT &quot;far outweighed&quot; any interests in keeping the records private.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Interestingly, the &lt;em&gt;Palmat&lt;/em&gt; court acknowledged that it had federal question jurisdiction over&amp;nbsp;the constitutional&amp;nbsp;claim (that is, whether&amp;nbsp;a treaty obligation comported with the Constitution), and also acknowledged that there exists a constitutional interest &quot;in avoiding disclosure of personal matters.&quot; It stated, however:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Neither the Parties nor the Court has found a case addressing the issue of whether the &quot;right of confidentiality&quot; strand applies to financial records held by a third party. However, in &lt;em&gt;U.S. v. Miller&lt;/em&gt;, 425 U.S. 435 (1976), the Supreme Court held, in the context of the Fourth Amendment, that a bank customer has no protected interest in the copies of checks and other records retained by his bank, and therefore could not assert a challenge to a grand jury subpoena to the bank for those records. The Court determined that bank records are not the account holder&#39;s private papers but rather &quot;the business records of the banks,&quot; in which a customer &quot;can assert neither ownership nor possession.&quot; Based on the foregoing authority, no constitutionally protected privacy interest exists for Petitioners&#39; bank account records held by [the] Bank. Moreover, even assuming that such an interest exists, it is outweighed by the United States&#39; compelling interests in fulfilling its treaty obligations. (internal citations omitted).&lt;/div&gt;&lt;/blockquote&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As the Court stated, since &lt;em&gt;Miller&lt;/em&gt;, it has become a given that there is no constitutional expectation of privacy over bank records held by a third party bank.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;But what about other records that are now increasingly held by third parties such as Google or Apple, for example, e-mails?&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The Sixth Circuit, in &lt;/span&gt;&lt;a href=&quot;http://www.ca6.uscourts.gov/opinions.pdf/10a0377p-06.pdf&quot;&gt;&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;em&gt;United States v. Warshak&lt;/em&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;, 631 F.3d 266 (6th Cir. 2010), was the first court that held that there is a reasonable expectation of privacy under the &lt;em&gt;Fourth Amendment&lt;/em&gt;&amp;nbsp;in the content of e-mails even if they are&amp;nbsp;stored on third party servers of an internet service provider (&quot;ISP&quot;). The &lt;em&gt;Warshak&lt;/em&gt; court specifically distinguished &lt;em&gt;Miller&lt;/em&gt; by ruling that &lt;em&gt;Miller&lt;/em&gt; involved simple business records, while the emails at issue in &lt;em&gt;Warshak&lt;/em&gt; were confidential and concerned a wide variety of topics. And unlike the third party bank in &lt;em&gt;Miller&lt;/em&gt; (which used the records in the ordinary course of business), the third party ISP was an intermediary, not the intended recipient of the records.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Some interesting questions: Would the United States&#39; interests in fulfilling its obligations under a MLAT &quot;far outweigh&quot; any interests in keeping private e-mails or other electronic records that are stored on a third party ISP&#39;s server? Would a subpoena be sufficient to obtain these records from the third party, or would the Government require a search warrant (or show probable cause)? What if the United States&#39; obligations under the Constitution differed from the MLAT agreements?&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;The issue of MLATs and privacy is an interesting one. I hope to revisit the topic in more depth in the coming months.&lt;/span&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/02/mlats-and-government-seizure-of.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8683960174939552662</guid><pubDate>Wed, 13 Feb 2013 04:33:00 +0000</pubDate><atom:updated>2013-02-12T23:39:40.062-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CISPA</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity framework</category><category domain="http://www.blogger.com/atom/ns#">enhanced cybersecurity services program</category><category domain="http://www.blogger.com/atom/ns#">executive order</category><category domain="http://www.blogger.com/atom/ns#">President Obama</category><category domain="http://www.blogger.com/atom/ns#">presidential policy directive on critical infrastructure</category><title>President Obama&#39;s Focus on Cybersecurity</title><description>&lt;br&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;President Obama addressed cybersecurity during his State of the Union address tonight:&lt;/span&gt;&lt;br&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;America must also face the rapidly growing threat from cyber-attacks. We know hackers steal people’s identities and infiltrate private e-mail. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.  &lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;That’s why, earlier today, I signed a new executive order that will strengthen our cyber defenses by increasing information sharing, and developing standards to protect our national security, our jobs, and our privacy. Now, Congress must act as well, by passing legislation to give our government a greater capacity to secure our networks and deter attacks.&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;That full text of the executive order is expected to be released on Wednesday, February 13. The White House did, however, release a statement that listed the executive order key components [&lt;a href=&quot;http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;]:&lt;/span&gt;&lt;br&gt;&lt;a href=&quot;http://www.sheikhlawgroup.com/2013/02/president-obamas-focus-on-cybersecurity.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>http://www.sheikhlawgroup.com/2013/02/president-obamas-focus-on-cybersecurity.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-1257423150389329069</guid><pubDate>Mon, 11 Feb 2013 21:29:00 +0000</pubDate><atom:updated>2013-02-11T16:31:45.105-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">4th Amendment</category><category domain="http://www.blogger.com/atom/ns#">5th Amendment</category><category domain="http://www.blogger.com/atom/ns#">BYOD</category><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">criminal ediscovery</category><category domain="http://www.blogger.com/atom/ns#">ECPA</category><category domain="http://www.blogger.com/atom/ns#">government surveillance</category><category domain="http://www.blogger.com/atom/ns#">plain view doctrine</category><category domain="http://www.blogger.com/atom/ns#">SCA</category><title>I Always Feel Like Somebody&#39;s Watching Me - Warrantless Searches of Computer Hard Drives by the Government</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This article&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;https://skydrive.live.com/redir?resid=2EB96671B312965F!164&quot;&gt;[pdf]&lt;/a&gt;&amp;nbsp;&lt;/span&gt;focuses on some ‘big data’ issues as they relate to white-collar criminal practice, which typically involves the analysis of electronic communications; cellphone, blackberry, and computer hard drive data; information from third parties in the cloud; etc. Specifically, this article broadly reviews recent case law regarding the government’s power to review, with and without a warrant, electronic data from computer hard drives and cellphones. The focus of the article is on federal power, which, of course, may or may not be the same on the state and local law enforcement level. This article was originally published in the February 2013 issue of New Jersey Lawyer Magazine, a publication of the New Jersey State Bar Association, and is reprinted here with permission.&lt;/span&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/02/i-always-feel-like-somebodys-watching.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-4377716783923573478</guid><pubDate>Thu, 07 Feb 2013 05:29:00 +0000</pubDate><atom:updated>2013-02-07T00:29:24.132-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-bullying</category><category domain="http://www.blogger.com/atom/ns#">education privacy</category><title>Commissioner Issues First Anti-Bullying Decisions</title><description>&lt;br /&gt;&lt;div style=&quot;line-height: 1.5em; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The education commissioner issued its first two decisions under New Jersey&#39;s Anti-Bullying Bill of Rights Act, which was signed into law in 2011. One case dealt with a Tenafly boy who publicly identified another student with head lice, and the other case involved an East Brunswick sixth grader who called a classmate &quot;gay&quot; and said he &quot;danced like a girl.&quot;&amp;nbsp;&lt;span style=&quot;line-height: 1.5em;&quot;&gt;In both cases, the school district’s response was found to have been appropriate. Of special note is the head lice decision, which indicates that perhaps invasion of a student&#39;s privacy may satisfy the statutory definition of &quot;HIB&quot;, or &quot;harassment, intimidation, or bullying.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.5em; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 1.5em;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;To read more, and to access the text of the decisions, click &lt;a href=&quot;http://www.njsba.org/news/sbn/20130129/commissioner-issues-first-anti-bullying-decision.php?w=537&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/02/commissioner-issues-first-anti-bullying.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-2299874089422534550</guid><pubDate>Tue, 22 Jan 2013 16:35:00 +0000</pubDate><atom:updated>2013-01-22T11:35:17.082-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CFPB</category><category domain="http://www.blogger.com/atom/ns#">compliance</category><category domain="http://www.blogger.com/atom/ns#">Consumer Financial Protection Bureau</category><category domain="http://www.blogger.com/atom/ns#">Federal Financial Institutions Examination Council</category><category domain="http://www.blogger.com/atom/ns#">FFIEC</category><category domain="http://www.blogger.com/atom/ns#">financial institutions</category><category domain="http://www.blogger.com/atom/ns#">social media</category><title>Financial Regulators Propose Guidance on Social Media</title><description>The Federal Financial Institutions Examination Council (&quot;FFIEC&quot;) today released proposed guidance on the applicability of consumer protection and compliance laws, regulations, and policies to activities conducted via social media by banks, savings associations, and credit unions, as well as non-bank entities supervised by the Consumer Financial Protection Bureau and state regulators.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;From the FFIEC&amp;nbsp;&lt;a href=&quot;http://www.ffiec.gov/press/pr012213.htm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;press release&lt;/span&gt;&lt;/a&gt;:&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;The FFIEC is responding to requests for guidance in this area from various industry and consumer interests. The guidance is intended to help financial institutions understand potential consumer compliance, legal, reputation, and operational risks associated with the use of social media, along with expectations for managing those risks. Although the guidance does not impose additional obligations on financial institutions, the FFIEC expects financial institutions to take steps to manage potential risks associated with social media, as they would with any new process or product channel.&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;The FFIEC invites comments on any aspect of the proposed guidance. It is specifically seeking comments on the following questions:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Are there other types of social media, or ways in which financial institutions are using social media, that are not included in the proposed guidance but that should be included?&lt;/li&gt;&lt;li&gt;Are there other consumer protection laws, regulations, policies or concerns that may be implicated by financial institutions’ use of social media that are not discussed in the proposed guidance but that should be discussed?&lt;/li&gt;&lt;li&gt;Are there any technological or other impediments to financial institutions’ compliance with applicable laws, regulations, and policies when using social media of which the Agencies should be aware?&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;div&gt;The proposed guidance can be accessed &lt;a href=&quot;http://www.ffiec.gov/press/Doc/FFIEC%20social%20media%20guidelines%20FR%20Notice.pdf&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;. Comments must be received 60 days from publication in the Federal Register.&lt;/div&gt;</description><link>http://www.sheikhlawgroup.com/2013/01/financial-regulators-propose-guidance.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-6903202074778321705</guid><pubDate>Mon, 21 Jan 2013 14:45:00 +0000</pubDate><atom:updated>2013-01-21T09:45:54.165-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">leadership</category><category domain="http://www.blogger.com/atom/ns#">legal marketing</category><category domain="http://www.blogger.com/atom/ns#">legal practice management</category><title>The Importance of Leadership and Differentiation in Attorney Marketing</title><description>&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Let’s not beat around the bush. The end business goal of any attorney in private practice is to make a living by gaining knowledge and then distributing it. Attorneys are the original ‘knowledge workers’ -- people who add value to clients by processing existing information to create new information that can be used to define and solve problems. To read more, click &lt;a href=&quot;https://skydrive.live.com/redir?resid=2EB96671B312965F!159&amp;amp;authkey=!AB0SyAh7poNjxV8&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;</description><link>http://www.sheikhlawgroup.com/2013/01/the-importance-of-leadership-and.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8506674141525437812</guid><pubDate>Fri, 11 Jan 2013 04:01:00 +0000</pubDate><atom:updated>2013-01-11T13:16:12.525-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">4th Amendment</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">liability</category><category domain="http://www.blogger.com/atom/ns#">New Jersey</category><category domain="http://www.blogger.com/atom/ns#">PHI</category><title>Medical Professional Liability When Told To Draw Blood By Law Enforcement</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Yesterday, the United States Supreme Court heard arguments in &lt;i&gt;Missouri v. McNeely&lt;/i&gt;, No. 11-1425. The issue in the case is whether police need a warrant to get a blood sample from an individual suspected of drunk driving. The case &lt;/div&gt;&lt;div&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;began in the early morning of October 3, 2010, when a state highway patrolman, Corporal Mark Winder, pulled over a truck that he had clocked speeding eleven miles over the limit. The truck was driven by Tyler G. McNeely of Cape Girardeau. As he got out of the truck, he was unstable. The officer put McNeely through several field sobriety tests, which he failed. McNeely was put into the officer’s patrol car, and the officer asked him if he would take a breath test; McNeely refused. &lt;u&gt;The officer then drove to a hospital, where McNeely refused to consent to a blood test. Corporal Winder told a hospital lab technician to take a blood sample anyway. &lt;/u&gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;An analysis of the sample showed that McNeely’s blood alcohol level was 0.154 percent, almost double the legal limit of 0.08 percent. Before he went on trial, McNeely and his lawyer sought to block the use as evidence of the test result, contending that the involuntary taking of the sample was a warrantless search that violated his Fourth Amendment rights. The patrolman testified that, at the time of the incident, he did not believe that he needed a warrant, although he said he had obtained a warrant in similar situations in the past.  &lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;He testified that he had since read a magazine article which said that, under Missouri state law, drunk driving meant that a driver had given implied consent to be tested.  &lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;The trial judge ordered the blood evidence barred from the case . . . . The trial judge found no “exigency” that justified the blood search. While that result was overturned by a middle-level state appeals court, the Missouri Supreme Court ruled for McNeely, and barred the test result.&lt;/blockquote&gt;&lt;/div&gt;&lt;div&gt;[(emphasis added.)]&lt;br&gt;&lt;br&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The above facts were posted on SCOTUSBlog, which has an excellent preview and recap of the argument &lt;a href=&quot;http://www.scotusblog.com/?p=157169&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.scotusblog.com/?p=157395&quot;&gt;here&lt;/a&gt;. According to Lyle Denniston, the Court did not appear too pleased with the notion that police anywhere in the country could force a lab technician to stick a needle in your arm without a neutral judicial officer granting permission to do so. Makes sense.&lt;/div&gt;&lt;br&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The case is interesting, but I am intrigued also that McNeely refused a blood test and the officer told a hospital lab technician to take a blood sample anyway. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;What kind of liability could a health care provider face in such a situation?&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://www.sheikhlawgroup.com/2013/01/medical-professional-liability-when.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>http://www.sheikhlawgroup.com/2013/01/medical-professional-liability-when.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8035383495244423001</guid><pubDate>Fri, 28 Dec 2012 19:48:00 +0000</pubDate><atom:updated>2012-12-29T12:54:59.228-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">mobile</category><category domain="http://www.blogger.com/atom/ns#">SMS</category><category domain="http://www.blogger.com/atom/ns#">TCPA</category><title>Coca-Cola&#39;s Core Approach To Mobile Marketing Highlights Need For Vigilance In TCPA Compliance</title><description>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.mediapost.com/publications/article/190014/coca-cola-sees-expansion-in-mobile-future.html#axzz2G7inMyqT&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Website &lt;em&gt;MediaPost&lt;/em&gt; spoke to Kim Siler, mobile brand strategist, global connections at Coca-Cola, about the company’s broader mobile strategy&lt;/span&gt;&lt;/a&gt;. Of note were Ms. Siller&#39;s remarks about the importance that SMS (&quot;short message service&quot;)&amp;nbsp;text messages play in Coca-Cola&#39;s global mobile marketing efforts:&lt;/span&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;MP: Is SMS, because of its universality, still the core of Coca-Cola’s approach to mobile marketing?&lt;br /&gt;&lt;br /&gt;Siler: It is one that our team pushes throughout Coca-Cola. It’s a ubiquitous format you can use to reach 98% of consumers and…it’s much more personal and much more integrated into what a consumer is already doing in their daily lives. So it is a very big part of the mobile marketing mix. We look at a wide range of platforms and outlets in mobile, so it’s not just SMS.&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;If SMS is important to a company like Coca-Cola, the guess is that it will be (and is) an&amp;nbsp;important component to the mobile marketing strategies of many other companies as well - whether that company is a large corporation or SMB.&amp;nbsp; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As more companies utilize SMS, however, they should be mindful that the &lt;a href=&quot;http://www.law.cornell.edu/uscode/text/47/227&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Telephone Consumer Protection Act&lt;/span&gt;&lt;/a&gt; (&quot;TCPA&quot;) regulates the use of&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;automatic dialing devices to&amp;nbsp;make calls to mobile devices by sending SMS&amp;nbsp;text messages to individuals. The penalties for TCPA non-compliance can be severe, and may include the risk of statutory damages, class action lawsuits, and regulatory fines.&amp;nbsp; &lt;a href=&quot;http://sheikhlawgroup.blogspot.com/2012/12/nj-federal-court-denies-motions-to-deny.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;We recently wrote about two TCPA class actions, where a federal judge in New Jersey denied company motions to deny class certification in the lawsuits.&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;As SMS text message campaigns increasingly become a core part of many company marketing strategies, any business using this type of consumer outreach will be well-advised to make sure its internal&amp;nbsp;policies, procedures, and practices regarding&amp;nbsp;are in line with the law.&lt;/span&gt;</description><link>http://www.sheikhlawgroup.com/2012/12/coca-colas-core-approach-to-mobile.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8216748337220799022</guid><pubDate>Wed, 26 Dec 2012 16:08:00 +0000</pubDate><atom:updated>2012-12-26T11:17:47.325-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">class action</category><category domain="http://www.blogger.com/atom/ns#">New Jersey</category><category domain="http://www.blogger.com/atom/ns#">Rule 23</category><category domain="http://www.blogger.com/atom/ns#">TCPA</category><title>NJ federal court denies motions to deny class certifications in two TCPA cases</title><description>&lt;span style=&quot;background-color: inherit;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;strong&gt;&lt;em&gt;Goodrich Management Corp. v. Afgo Mechanical Svcs., Inc.&lt;/em&gt;, Civ. No. 09-43, 11-2769 (WJM) (D.N.J. Dec. 14, 2012).&lt;/strong&gt; &lt;br&gt;&lt;br&gt;&lt;br&gt;Judge Martini recently denied motions to deny class certifications in two cases brought under the Telephone Consumer Protection Act (the &amp;quot;TCPA&amp;quot;), 47 U.S.C. § 227.  (The opinion can be accessed &lt;/span&gt;&lt;a href=&quot;http://scholar.google.com/scholar_case?case=15388155087248820884&amp;amp;q=Goodrich+&amp;amp;hl=en&amp;amp;scisbd=2&amp;amp;as_sdt=3,31&amp;amp;as_ylo=2012&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background-color: white; color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; via Google Scholar.)&lt;br&gt;&lt;br&gt;In &lt;em&gt;Goodrich&lt;/em&gt;, the plaintiffs seek to represent classes of persons who allegedly received unsolicited faxes from defendants Afgo Mechanical Services (to plaintiff Goodrich Management Corp.) and defendants Banco Santander, S.A., Santander Holdrings USA, Inc., Santander Consumer USA, Inc., Sovereign Bancorp, Inc. and Sovereign Bank (to plaintiff Nicholas Fitzgerald).  &lt;br&gt;&lt;br&gt;Generally, the TCPA prohibits persons and entities from faxing &amp;quot;unsolicited advertisements,&amp;quot; i.e., &amp;quot;material advertising the commercial availability or quality of any property, goods, or services which is transmitted to any person without that person&amp;#39;s prior express invitation or permission.&amp;quot; 47 U.S.C. § 227(a)(4), (C). &lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.sheikhlawgroup.com/2012/12/nj-federal-court-denies-motions-to-deny.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>http://www.sheikhlawgroup.com/2012/12/nj-federal-court-denies-motions-to-deny.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5815274498728570281.post-8194016328421875072</guid><pubDate>Mon, 24 Dec 2012 13:47:00 +0000</pubDate><atom:updated>2012-12-24T13:08:03.163-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">business associate</category><category domain="http://www.blogger.com/atom/ns#">data contracts</category><category domain="http://www.blogger.com/atom/ns#">HIPAA</category><category domain="http://www.blogger.com/atom/ns#">HITECH</category><category domain="http://www.blogger.com/atom/ns#">PHI</category><title>A Primer on Business Associate Agreements for the Sharing of Protected Health Information</title><description>&lt;hgroup&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This &lt;/span&gt;&lt;a href=&quot;https://skydrive.live.com/?cid=2eb96671b312965f&amp;amp;id=2EB96671B312965F%21131&quot;&gt;&lt;span style=&quot;color: blue; font-family: inherit;&quot;&gt;article&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; broadly discusses business associate agreements, the required provisions under HIPAA/ HITECH, and other provisions that should be contemplated by health care covered entities or business associates as they enter into or revise &quot;business associate agreements.&quot; This article focuses solely on Protected Health Information and health data contracts. The principles explored in this article, however, can be applied generally to other types of third-party contracts that deal with other types of data and privacy. There are, of course, specific considerations depending on the particular privacy or security statute at issue. This article was originally published in the December 2012 issue of New Jersey Lawyer Magazine, a publication of the New Jersey State Bar Association, and is reprinted here with permission.&lt;/span&gt;&lt;/hgroup&gt;&lt;br /&gt;</description><link>http://www.sheikhlawgroup.com/2012/12/a-primer-on-business-associate.html</link><author>noreply@blogger.com (Khizar A. Sheikh, Esq.)</author><thr:total>0</thr:total></item></channel></rss>