MediaTech Law

By MIRSKY & COMPANY, PLLC

Blogs and Writings We Like

This week we highlight 3 writers discussing timely subjects in media tech law: Sandy Botkin writing about zombie cookies and targeted advertising, Geoffrey Fowler writing about the new world of phishing and “phishermen” (yes, that’s a thing), and Justin Giovannettone and Christina Von der Ahe writing about nonsolicitation agreements and social media law.

FTC vs Turn, Inc.: Zombie Hunters

Sandy Botkin, writing on TaxBot Blog, reports amusingly on the FTC’s December 2016 settlement with digital advertising data provider Turn, Inc., stemming from an enforcement action against Turn for violating Turn’s own consumer privacy policy. Botkin used the analogy of a human zombie attack to illustrate the effect of actions Turn took to end-run around user actions to block targeted advertising on websites and apps.

According to the FTC in its complaint, Turn’s participation in Verizon Wireless’ tracking header program – attaching unique IDs to all unencrypted mobile internet traffic for Verizon subscribers – enabled turn to re-associate the Verizon subscriber with his or her use history. By so doing, according to Botkin, this further enabled Turn to “recreate[] cookies that consumers had previously deleted.” Or better yet: “Put another way, even when people used the tech equivalent of kerosene and machetes [to thwart zombies], Turn created zombies out of consumers’ deleted cookies.”

What we like: We like Botkin’s zombie analogy, although not because we like zombies. We don’t. Like. Zombies. But we do think it’s a clever explanatory tool for an otherwise arcane issue.

*            *            *

Your Biggest Online Security Risk Is You

Geoffrey Fowler writes in The Wall Street Journal (here ($), with an even fuller version of the story available here via Dow Jones Newswires) about the latest in the world of phishing, that large category of online scams that, one way or another, has the common goals of accessing your data, your money or your life, or someone else’s who might be accessed through your unsuspecting gateway.

“If you’re sure you already know all about them, think again. Those grammatically challenged emails from overseas ‘pharmacies’ and Nigerian ‘princes’ are yesterday’s news. They’ve been replaced by techniques so insidious, they could leave any of us feeling like a sucker.”

Oren Falkowitz of Area 1 Security told Fowler that about 97% of all cyberattacks start with phishing. Phishing is a big deal.

Fowler writes of the constantly increasing sophistication of “phishermen” – yes, that’s a term – weakening the effectiveness of old common-sense precautions:

In the past, typos, odd graphics or weird email addresses gave away phishing messages, but now, it’s fairly easy for evildoers to spoof an email address or copy a design perfectly. Another old giveaway was the misfit web address at the top of your browser, along with the lack of a secure lock icon. But now, phishing campaigns sometimes run on secure websites, and confuse things with really long addresses, says James Pleger, security director at RiskIQ, which tracked 58 million phishing incidents in 2016.

What we like: Fowler is helpful with advice about newer precautions, including keeping web browser security features updated and employing 2-factor authentication wherever possible. We also like his admission of his own past victim-hood to phishing, via a malware attack. He’s not overly cheery about the prospects of stopping the bad guys, but he does give confidence to people willing to take a few extra regular precautions.

*            *            *

Don’t Friend My Friends: Nonsolicitation Agreements Should Account for Social Media Strategies

This is an employment story about former employees who signed agreements with their former employers restricting their solicitations of customers of their former employers. In the traditional nonsolicitation context, it wasn’t that hard to tell when a former employee went about trying to poach his or her former company’s business. Things have become trickier in the age of social media, when “friend”-ing, “like”-ing, or “following” a contact on Facebook, Twitter, Instagram or LinkedIn might or might not suggest nefarious related behavior.

Justin Giovannettone and Christina Von der Ahe of Orrick’s “Trade Secrets Watch” survey a nice representative handful of recent cases from federal and state courts on just such questions.

In one case, the former employee – now working for a competitor of his former employer – remained linked via LinkedIn with connections he made while at his former company. His subsequent action in inviting his contacts to “check out” his new employer’s updated website drew a lawsuit for violating his nonsolicitation. For various reasons, the lawsuit failed, but of most interest was Giovannettone and Von der Ahe’s comment that “The court also noted that the former employer did not request or require the former employee to “unlink” with its customers after he left and, in fact, did not discuss his LinkedIn account with him at all.”

What we like: Giovannettone and Von der Ahe point out the inconsistencies in court opinions on this subject and, therefore, smartly recognize the takeaway for employers, namely to be specific about what’s expected of former employees. That may seem obvious, but for me it was surprising to learn that an employer could potentially – and enforceably – prevent a former employee from “friend”-ing on Facebook.

Read More

Employer Tries to Enforce Noncompete, Virginia Says “No Way”!

This past November, the Virginia Supreme Court overruled a 1989 opinion on the wording of non-compete clauses.  In Home Paramount Pest Control v. Shaffer, the court held Home Paramount’s non-compete clause to be too broad, thus reversing a 22-year old decision in which the same court had upheld the same employer’s almost identical language.

Justin Shaffer, the defendant in Home Paramount Pest Control, signed an employment agreement in connection with his hiring by the pest control company in January 2009.  The agreement contained a non-competition clause forbidding Shaffer for two years from engaging in a pest control business in any area that he had worked as an employee of Home Paramount, specifically:

The employee will not engage directly or indirectly or concern himself/herself in any manner whatsoever in the carrying on or conducting the business of exterminating, pest control, termite control and/or fumigation services … in any city, cities, county or counties in the state(s) in which the Employee works and/or in which the employee was assigned during the two (2) years from and after the date upon which he/she shall cease for any reason whatsoever to be an employee of [Home Paramount].

Shaffer resigned from Home Paramount in July 2009, and soon thereafter began work at a competing pest control business.  Home Paramount then filed a complaint against Shaffer claiming he had violated his non-compete clause.  Shaffer responded by filing a plea contending that the provision was legally overbroad and therefore unenforceable.  The circuit court of Fairfax County ruled in favor of Shaffer, holding that the provision was indeed overbroad and therefore unenforceable.  On appeal, the Virginia Supreme Court affirmed.

Read More

Do Corporations Have Personal Privacy Rights?

Thanks to Andrew Mirsky for contributing research and feedback to this post.

Does a corporation have the same rights as a person?

It really depends on the context. In the context of personal privacy, the answer is no.

In a unanimous ruling this month, the Supreme Court found that corporations are not entitled to the same “personal privacy” rights as individuals under the Freedom of Information Act (FOIA).

After a 2004 investigation by the Federal Communications Commission (FCC) into AT&T’s billing practices, a trade group including AT&T competitors submitted a FOIA request to the FCC seeking records of the inquiry. The FCC protected some of AT&T’s trade secrets and customers’ personal information, but refused AT&T’s request under the personal-privacy exemption in FOIA to protect certain other information.  The FCC ruled that AT&T’s records should be publicly released under FOIA because the company could not claim “personal privacy.”

Read More

Podcast #3: Intellectual Property: Protecting Ideas, Concepts, Processes and Plans

 

In today’s podcast, we discuss intellectual property issues, specifically the question of how to protect ideas.  My guest is Neal Seth, a partner in Baker Hostetler’s Washington, DC office. Neal’s practice focuses on patent litigation and appeals.  Neal has handled numerous litigation and appellate matters in a variety of technologies, including the pharmaceutical, chemical, electrical, and mechanical fields in district courts, the ITC, and the Federal Circuit.

This is not meant to be a true “primer” on intellectual property protection.  Instead, we’re going to look at the very practical threshold problems entrepreneurs and small businesses face when developing and pursuing new ideas for businesses.

Our questions: What is the major practical problem with patents from the perspective of someone with an idea?  What can copyrights really do for someone?  For example the software developer: What does it mean to copyright software and what kind of protection does it get you (and not get you)?  We discuss major limitations against “descriptive” trademarks.  We discuss trade secrets and how trade secrets are distinct from patent or copyright.  What about Non-disclosure Agreements (NDAs) or Confidentiality Agreements?  Is it necessary to have all interested parties sign an NDA before reviewing a business plan or even taking a meeting?  What benefits?

Please click play below to hear the podcast.

Read More