How Do You Respond To & Prevent Social Media Spam

I’m surprised at how often I receive commercial bulk email messages that are not compliant with the Federal CAN SPAM act.The two biggest mistakes I see are 1) no physical address and 2) no opt-out/unsubscribe mechanism.

Image representing Twitter as depicted in Crun...
Image via CrunchBase

Another common mistake is a “blind” bulk email address list like “Undisclosed-Recipients@email.com.”  Not only do I NOT know which address this received the offensive message, there usually isn’t even a proper return address for me to send an “Unsubscribe” message.

With the popularity of social media, you’ve  probably received a Twitter promotion for iPhones, special deals, free downloads, etc. While it’s easy to dismiss poorly-written tweets from obvious spammers, when someone replies to you on Twitter, says “must read, check it out” and the topic is clearly the kind of thing you read and share it’s more difficult to tell. Often, these are from legitimate accounts where a human has taken the time to compose and send the message.

In light of the growing use of electronic mail (“email”) messages for advertising, marketing, corporate communications and customer service, is essential to have some familiarity with the Federal “Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003” also known as the CAN SPAM Act (the “Act”) The Act provides the parameters of its application, explicit prohibitions, requirements for transmission of legally compliant email messages including the “Opt-Out” mechanism and vicarious liability.  Generally speaking, the Act was written to prohibit the fraudulent, deceptive, predatory and abusive practices that threaten to undermine the success and effectiveness of commercial email and email marketing.

Congress drafted the Act to impose limitations and penalties on the transmission of unsolicited commercial email messages. Unlike some state initiatives, the Act is an “opt-out” law. Put another way, for most purposes permission of the e-mail recipient is not required. However, once an email recipient has indicated a desire to opt-out or no longer receive such messages, failure to comply with the recipient’s request may subject both the sender and the person or entity on whose behalf the message was sent to severe penalties.

Frequently asked question about the Act include:

1)    To Whom Does The Act Apply? The Act applies to any person or entity that sends email.

2)    What Activities Are Prohibited By The Act? The Act is primarily concerned with explicitly  prohibiting certain predatory and abusive commercial email practices.

3)    What Are The Requirements For Sending Email Messages? Section 5(a) of the Act sets requires the inclusion non-misleading information regarding: (a) transmission, (b) subject, (c) email address, (d) Opt-out and physical address, and (e) clear and conspicuous language identifying sexually-oriented messages.

4)    Who Can Be Liable for Violations? The Act applies to both the party actually sending the commercial email messages and those who procure their services.

Discussion

The primary substantive provisions of the Act can be divided into three parts found in Section 4, Section 5 and Section 6. Section 4 of the Act addresses “predatory and abusive” practices prohibited by the Act. Section 5 details the requirements for transmission of messages that comply with the Act. Section 6 details the requirements for transmission and identification of sexually-oriented messages. Section 6 is not discussed in this article.

Section 4 of the Act lists specific “predatory and abusive” practices prohibited by the Act.  In short, the Act specifically prohibits: (i) accessing a computer without authorization for the purpose of initiating transmission of multiple commercial email messages, (ii) transmission of multiple commercial email messages with the intent to deceive or mislead recipients, (iii) transmission of multiple commercial email messages with materially false header information, (iv) registration of email accounts or domain names using information that materially falsifies the identity of the actual registrant, and (v) false representations regarding the registration of Internet Protocol addresses used to initiate multiple commercial email messages.

The second relevant part, set forth in Section 5 of the Act, details the requirements for transmission of messages that comply with the Act. Subject to certain limitations discussed below, the Act requires that email messages contain: (i) transmission information that is not materially false or misleading, (ii) subject information that is not materially false or misleading, (iii) a return address or comparable mechanism for opt-out purposes, (iv) identifier, Opt-out and physical address, and (v) clear and conspicuous language identifying sexually-oriented messages as such. (Note, this last requirement is not discussed. See above.) Lastly, the Act implicates both commercial email transmission service providers as well as those who procure their services.

To Whom Does The Act Apply?

The Act applies to any person or entity that sends email. The Act specifically regulates “commercial electronic mail messages,” defined as any email message “the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose).” However, the Act specifically excludes from this definition “transactional or relationship messages.” A “transactional or relationship message” falls within one of five categories of messages:

  1. communications that facilitate, complete or confirm a commercial transaction previously agreed to by the recipient;
  2. communications that provide warranty or other product information with respect to a product or service previously used or purchased by the recipient;
  3. notifications with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship;
  4. information directly related to an employment relationship or related benefit plan in which the recipient is currently involved; and
  5. communications to deliver goods or services, including product updates or upgrades, under the terms of a transaction previously agreed to by the recipient.(Emphasis added.)

The purpose for the distinction between “commercial electronic mail messages” and “transactional or relationship messages” is to exempt certain types of communications from compliance with all the message transmission requirements of the Act. As should be clear from the list above, the Act distinguishes the types of communications based on the relationship between the sender and recipient rather than on the character of the message. Put another way, so long as the communication is related to some type of existing business relationship, it is not a “commercial electronic mail message.”

What Activities Are Prohibited By The Act?

Section 4 of the Act is primarily concerned with prohibiting certain predatory and abusive commercial email practices. Section 4(a) amends Chapter 47 of Title 18 of the United States Code by adding Section 1037 which specifies the offenses that constitute “fraud and related activity in connection with email.” An offense is committed by anyone who directly or indirectly, knowingly:

  1. accesses a protected computer without authorization, and intentionally initiates the transmission of multiple commercial electronic mail messages from or through such computer,
  2. uses a protected computer to relay or retransmit multiple commercial electronic mail messages, with the intent to deceive or mislead recipients, or any Internet access service, as to the origin of such messages,
  3. materially falsifies header information in multiple commercial electronic mail messages and intentionally initiates the transmission of such messages,
  4. registers, using information that materially falsifies the identity of the actual registrant, for five or more electronic mail accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple commercial electronic mail messages from any combination of such accounts or domain names, or
  5. falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses.

Clearly, Section 4 is primarily concerned with preventing practices whereby the sender intentionally, either through outright fraud or other deception, conceals its true identity or the true commercial character of the message.

What Are The Requirements For Sending Email Messages?

            Section 5(a) of the Act sets forth certain other protections for the users of commercial email.

Accurate Transmission Information. Among the affirmative requirements of Section 5(a), Section 5(a)(1) prohibits sending either a commercial electronic mail message, or a transactional or relationship message, that contains, or is accompanied by, header information that is materially false or materially misleading. Unlike the general prohibition against sending messages with materially false header information under Section 4, in addition to having technically accurate transmission information, the sender is prohibited from having used false pretense or other deceptive means to acquire such information (e.g. email accounts, domain names and IP addresses). Furthermore, the “from” line must “accurately identify the person transmitting the message.” Lastly, the sender must accurately identify the computers used to originate, relay or retransmit the message.

Note, the following only apply to commercial electronic mail messages:

Accurate Subject Information. Messages must have accurate subject information. Subject information would not be accurate if a “person has actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that a subject heading of the message would be likely to mislead a recipient, acting reasonably under the circumstances, about a material fact regarding the contents or subject matter of the message.”[8]

Inclusion of Opt-out Mechanism. Messages MUST contain a functioning return email address or other Internet-based mechanism (e.g. hyperlink), that is clearly and conspicuously displayed that enables a  recipient to submit a request to opt-out of future email messages from the sender whose email address was contained in the message. The opt-out mechanism (whether email address or hyperlink, etc.) must remain functional for at least thirty (30) days after the transmission of the original message.

            Removal After Objection. If a recipient makes a request using the opt-out mechanism, the sender shall not transmit any further messages to the recipient, more than ten (10) business days after the receipt of such request, if such message would fall within the scope of the request. A third-party acting on behalf of the sender shall not transmit or assist others to transmit, any further messages to the recipient, more than ten (10) business days after the receipt of such request, if such third party knows or should know of the recipient’s objection. Lastly, the sender and any third party who knows that the recipient has made such a request, shall not sell, lease, exchange, or otherwise transfer or release the electronic mail address of the recipient for any purpose other than compliance with the Act or other provision of law.

Inclusion of Identifier, Opt-out & Physical Address. Every message must clearly and conspicuously: (i) identify the message as an advertisement or solicitation; (ii) provide notice of the opportunity to opt-out of future communications; and (iii) provide a valid physical postal address of the sender. However, the notice that a message is an advertisement or solicitation does not apply where the recipient has given prior affirmative consent to receive the message.

Related Activities Proscribed.

Other prohibitions in the Act concern unethical or unscrupulous practices that tend to coincide with deceptive or abusive email. Several common methods for generating email distribution lists have also been proscribed. The Act prohibits certain unethical practices such as:

  • hijacking another email server to send or relay messages;
  • “harvesting” email addresses that appear on others’ Web sites;
  • randomly generating email addresses;
  • knowingly linking an email ad to a fraudulently registered domain; and
  • participating in other offenses such as fraud, identity theft, etc.

Who Can Be Liable for Violations?

The Act applies to both the party actually sending the commercial email messages and those who procure their services.[9] One cannot “outsource” its “spam” and thereby avoid liability under the Act. One may be held accountable if the email service employed isn’t actually using a legally-compiled or permission-based list. Under some parts of the Act one may be held liable for employing a third party to distribute the messages “with actual knowledge, or by consciously avoiding knowing, whether such [third party] is engaging or will engage, in a pattern or practice that violates this Act.”

CONCLUSION

The Act was written to prohibit the fraudulent, deceptive, predatory and abusive practices that threaten to undermine the success and effectiveness of commercial email and email marketing. Since Bacon’s uses email to communicate with employees, vendors, existing and prospective customers, Bacon’s is clearly subject to the Act. The Act focuses on enumerating proscribed activities rather than affirmative obligations to make it easier for legitimate, honest businesses to comply with the Act. The Act distinguishes communications based on a previously existing relationship between the sender and the recipient from those communications that are prospective in nature. Generally, email messages not based on a pre-existing relationship are subject to greater affirmative requirements.

Compliance Guidelines.

  1. Be Aware of the Requirements for Transmitting Messages.
  2. Require Compliance by Clients.
  3. Monitor Distribution by Affiliates.

FTC Publishes Guide to Help Mobile App Developers Observe Truth-in-Advertising, Privacy Principles

Sept. 5 2012:

From the FTc web site:

The Federal Trade Commission has published a guide to help mobile application developers observe truth-in-advertising and basic privacy principles when marketing new mobile apps. The FTC’s new publication, “Marketing Your Mobile App: Get It Right from the Start,” notes that there are general guidelines that all app developers should consider. They include:

Tell the Truth About What Your App Can Do. – “Whether it’s what you say on a website, in an app store, or within the app itself, you have to tell the truth,” the publication advises;

Disclose Key Information Clearly and Conspicuously. – “If you need to disclose information to make what you say accurate, your disclosures have to be clear and conspicuous.”

Build Privacy Considerations in From the Start. – Incorporate privacy protections into your practices, limit the information you collect, securely store what you hold on to, and safely dispose of what you no longer need. “For any collection or sharing of information that’s not apparent, get users’ express agreement. That way your customers aren’t unwittingly disclosing information they didn’t mean to share.”

Offer Choices that are Easy to Find and Easy to Use. – “Make it easy for people to find the tools you offer, design them so they’re simple to use, and follow through by honoring the choices users have made.”

Honor Your Privacy Promises. – “Chances are you make assurances to users about the security standards you apply or what you do with their personal information. App developers – like all other marketers – have to live up to those promises.”

Protect Kids’ Privacy. – “If your app is designed for children or if you know that you are collecting personal information from kids, you may have additional requirements under the Children’s Online Privacy Protection Act.”

Collect Sensitive Information Only with Consent. – Even when you’re not dealing with kids’ information, it’s important to get users’ affirmative OK before you collect any sensitive data from them, like medical, financial, or precise geolocation information.

Keep User Data Secure. – Statutes like the Graham-Leach-Bliley Act, the Fair Credit Reporting Act, and the Federal Trade Commission Act may require you to provide reasonable security for sensitive information.

Social Media Legal News Roundup

Into the data jungle – in association with Huron Legal
The Lawyer
Technological developments such as cloud computing, social networking and mobile apps mean EU law is no longer fit for purpose. The EU claims current laws often conflict and cost businesses a total of nearly £2bn a year.

Saudi Arabia considers law against insulting Islam
Bangladesh News 24 hours
JEDDAH, Saudi Arabia, July 16 (bdnews24.com/Reuters) – Saudi Arabia is studying new regulations to criminalise insulting Islam, including in social media, and the law could carry heavy penalties, a Saudi paper said on Sunday.

Mind the missteps in online job dance
Lawyers Weekly
With some background check firms specializing in social media searches (U.S.-based Social Intelligence Corp. for one), how do third-party recruiters use social media when screening or finding clients for law firms in Canada?

Saudi Arabia looking to criminalize Islam insults on social media
Bikya Masr
DUBAI: The Saudi Arabia government is looking to ensure users on social media networking sites do not insult Islam or the Prophet Mohamed, al-Watan newspaper reported on Sunday, citing officials who said a new law could bring “heavy” penalties.

Watching the detectives: the case for restricting access to your social media data
Delimiter
That debate tells us something about how Australians and the media conceptualise privacy and business-government relationships in a world where mobile phones and social network services such as Facebook are ubiquitous.

10 Tactics for Integrating Photographs into Content Marketing
Business 2 Community
Acquire digital rights for images. Remember when using images, especially photographs, your legal team is your best friend. Ensure that you’ve got the right to use the photos by incorporating outtakes and additional shots for social media.

Syracuse Neighborhood Watch plans to increase social media outreach
CNYcentral.com
New program coordinator plans more email, social media contact. … CNY Biz Central – Legal. Helpful advice about finding the right attorney for your legal needs. CNY Biz Central. Get information from our team.

Reasonable Expectations of Privacy in the Digital Age
Mondaq News Alerts (registration)
In this digital age of smart phones, global positioning systems, cloud computing, and social networking, determining what constitutes private information and what lengths our legal system will go to protect it is increasingly challenging.

Sale Of Digg Reminder Of Potential Risks To Facebook And Other Social Media …
Seeking Alpha
In 2011, social media watchers may recall reading in Bloomberg that Myspace, which had been purchased by News Corporation (NWS) for $580 million in 2005 had reportedly been sold for just $35 million to private investors, including Justin Timberlake. In …

Your Social Media Tweeting & Posting Legal Rights. TV … – YouTube
Find out how legally liable you are for your Twitter Tweets and Facebook postings.

Learn more about me here: www.ecommerceattorney.com and follow me here

Managing Compliance Obligations For Electronic Communications

Financial Services is one of the most heavily regulated industries. As electronic communications devices and platforms proliferate, message retention and oversight is a top priority for many compliance officers. A recent survey of compliance professionals in the financial services industry identified the following key issues:

    Firms are working smarter, not harder to manage the growing compliance burden.

As the types of messages that Financial services firms are required to monitor and store continue to increase, firms are re-evaluating and updating supervision and retention procedures. Key areas of compliance concerns are

    New regulations
    New communications channels (e.g. social media, text messaging)
    New communications devices (e.g. smartphones and tablets)
    Increased scrutiny/enforcement by regulators
    Inefficiencies of the supervision process
    Mobile devices and communications are emerging as a top concern.

Like many other industries, Financial Services firms are facing the “Bring Your Own Device” (BYOD) challenge: growing use of smartphones and tablets as well as adoption of mobile-specific communications like text messaging. This presents a challenge to conventional compliance practices which has not gone unnoticed by regulators. Last year, FINRA issued Regulatory Notice 11-39, stating that firms are required to retain, retrieve and supervise business communications regardless of whether they are conducted from a work-issued device or a personal device. This presents a challenge to companies that must separate business and personal communications in order to ensure regulatory compliance.

    Social Media and other online communication channels present new concerns.

Use of Social Media is on the rise in the Financial Services industry. However, policies and procedures for supervision and retention lag behind the pace of adoption. In terms of the most requested message types during examination! Email was first, followed by Website pages (including
RSS feeds, blogs, wikis) with Bloomberg or Reuters messages and instant messages ( tied for third place.

Conclusion

While regulatory examiners are increasing their oversight and moving from a check-the-box approach to compliance to scrutiny of the messages themselves, financial services firms are getting more savvy about their approach to compliance. In addition, as the opportunities for new types and channels of electronic communications increase, so too are the archiving and supervision technologies allowing firms use of these emerging communication tools with a greater sense of security.

Perfect Pitch: Who Am I? What Am I? Why Am I? Why You Merit Investment

Perfect Pitch™ A Strategy For Concise And Effective Communication Of The Idea Behind Your Business And Why You Merit Investment

©David M. Adler, All Rights Reserved

My recent attendance at TechWeek Chicago 2012 reminded me of advice that I used to provide to start-up and technology entrepreneurs. I have spent the last 15 years of my law practice advising entrepreneurs and businesses in varying stages of development. At some point, all growing businesses will need an infusion of capital. Sometimes this comes from “friends, family and fools.” Just as often it comes from professional investors such as Angels or Venture Capitalists. If you or your business needs additional capital to get to the “next level” whether that be development of a “proof of concept,” execution of the go-to-market strategy or strategic investment in new people or technology, you will need to convince the investor that your idea or business is relevant to the target market, achievable by the people and intellectual capital behind it, and likely to result in a substantial increase in value.

It has been my experience that many entrepreneurs or CEO pitch-men lose sight of the forest for the tress. All too often, the “pitch” or presentation only focuses on one thing. Usually, it focuses too heavily on the idea or the market and not enough on the people and strategy. On the other hand successful presentations seem to incorporate three basic, yet distinct concepts, what I call the tri-partite “Perfect Pitch.” In a nutshell the Perfect Pitch answers three questions: Who Am I? What Am I? Why Am I?

Who Am I? 

Answering this question tells investors about the people behind the idea. Every presentation should begin with a short, pithy and relevant description of the people and company, their history together and their qualifications for successfully commercializing this idea. For example: “John Doe, Jane Smith and Mary Jones each graduated in 2006 with a MBA from the Whoopity School Of Business. John has 5 years experience managing operations for a national retail chain. Jane has a 4 years experience as an assistant human resources manager for a Fortune 500 Company. Mary operated a small consulting business for 3 years before shutting down operations to pursue her MBA. Last year, they formed National Widget Sales Consultants (NWSC) as a Delaware LLC to capitalize on the emerging/growing/widening need for retailers to leverage the growing list of retail sales technologies.”

What Am I?

Answering this question tells the investor about the specific product or service offered and the revenue model. Put another way, answering this question tells investors what you do, how you do it and how you plan to make money. It never ceases to amaze me how many entrepreneurs forget the making-money part. They simply assume that advisors, investors and strategic partners will intuitively “get it.”

We won’t unless you tell us in plain and simple terms. If it is a product, does it stand alone or will it be incorporated into an end-product? Will it be sold wholesale, at retail, through VARs, through an inside sales team, or through an outside sales team, e.g. commissioned sales reps? How will the product be distributed? Will you have your own distribution? Will you piggy-back on another’s? Will you use a traditional courier, e.g., UPS or FedEx?

If it is a service, how will you market it? How will customers acquire it? Will it be licensed? How do you plan to keep customers coming back?

Continuing our previous example, “NWSC has created a proprietary and highly-customizable system that will be marketed and sold by an inside sales force. We will place consultants within our clients’ businesses to dissect their retail operations, identify operational and sales goals and evaluate which of the many technologies in the marketplace are the best fit for achieving those goals. NWSC generates revenue through consulting fees, commissions on technology sales and licensing the system to third-party business consultants.”

This is also the part of the presentation where you want to highlight the existence and commercial viability of any Intellectual Property including, Patents, Trademarks, Copyrighted content and Trade Secrets as well as proprietary technology or systems and methods.

Why Am I?

Now that you have convinced us that you are qualified to run this business and that you know how it will make money, you need to convince us how or why your idea meets existing or potential needs in the marketplace. Another common mistake I see is a focus on market size, penetration and growth. Yes, it’s true that VCs want to see Billion Dollar markets. But, more importantly, they want to know why your idea is going to penetrate that market and capture sales.

For example, is the market fragmented with no dominant provider? Are there segments of the market that are underserved by existing products/services? Put another way, what is your value proposition? Why will customers choose your product or service over their existing, entrenched ways of doing business? Again, don’t assume your audience will instinctively understand this. The more sophisticated the product or service, the more you will have to flesh out this value proposition.

The Bottom Line. 

While following the method outlined above is not guaranteed to land you that round of financing that you are after, it will no doubt help. Paying attention to answering these three simple questions will help keep you focused, keep you on message and provide a framework for answering the types of questions that your advisors, investors and strategic partners will be asking themselves. Good Luck!

PLEASE Forward, comment and follow me!

World Social Media Legal News Roundup

Law professor says social media can pose legal problems in Courtroom
Winnipeg Free Press
SASKATOON – The dean of law at the University of Saskatchewan says using social media can have negative consequences in the Courtroom – Business – Winnipeg Free Press.

Eight Ways Your Employee Social-Media Policy May Violate Federal law
AdAge.com (blog)
All employees have certain rights under federal law that social-media policies can’t restrict.

New Law to Force Identification of Trolls Set to be Unveiled
Technorati
Home / Social Media / Articles / New Law to Force Identification of Troll. … is behind the attacks on them online without having to resort to expensive legal action.

A blue wave of change Cleveland County law enforcers join move toward social media alerts
Norman Transcript
Lauri Stevens, a social media strategist at LAwS Communications, a Boston-area company, said law enforcement agencies nationwide are beginning to embrace social media.

Social media helped, hurt in hunt for suspect in triple shooting
Washington Post
Social media at times was a help, other times a hindrance in the search and eventual arrest of a suspect in the triple fatal shooting at an Alabama apartment complex.

Use social media, but use it responsibly, UAE conference hears
gulfnews.com
He said, “We do not monitor social media networks. People have the freedom to speak within the legal framework. There is no law specifically for twitter, but …

Police: Street gangs embrace social media, too
Kansas.com
Beard gave a presentation on gangs, the Internet and social media at last week’s Midwest Law Enforcement Conference on Gangs and Drugs, held in Wichita.

And…don’t forget to check out my presentation on the Law & Social Data panel at #TechWeek Chicago 2012.

The past few years have witnessed an explosion of legal and regulatory activity involving social and other new media. This session will examine several key areas, including copyright, trademark and related intellectual property concerns; defamation, obscenity and related liability; false advertising and marketing restrictions; gaming; data privacy issues presented by social media; and impacts of social media on employees and the workplace. Attendees will learn how to identify legal risks and issues before they become full-scale emergencies and how to develop appropriate policies and guidelines covering social media activity.

If you can’t make it, check out the Slideshare presentation here.

Mobile Privacy Standards Coming: U.S. National Telecommunications and Information Agency

Mobile carriers, app developers, and other technology stakeholders will meet with the U.S. National Telecommunications and Information Agency on July 12 to discuss privacy standards for mobile use. The focus of the discussion will be the privacy practices of mobile apps and their transparency.

Applications will be the main focus on July 12 when enforcement begins. The initial series of meetings will decide on rights, obligations and enforcement of online and mobile device security under President Obama’s virtual “Privacy Bill of Rights”.

The U.S. Department of Commerce’s National Communications and Telecommunication Administration (NTIA) has made the decision that it is now time to put the president’s Privacy Bill of Rights into effect. In order to get started, they have sent an invitation to all of the “privacy stakeholders” in order to “generate robust input” in the creation of the very first transparency code of conduct for consumer data collection and use.

The White House and Congress hopes that this discussion will eventually lead to a privacy bill of rights. July’s meeting will be webcast for the public.

David M. Adler Speaking on Law & Social Data Panel at Chicago TechWeek 2012

Chicago is a new kind of technology hub, and the Techweek Conference is a new type of technology conference.

The Techweek 2012 Conference showcases the technology renaissance evolving in Chicago and the midwest. June 22-26, 2012

Law & Social Data
The past few years have witnessed an explosion of legal and regulatory activity involving social and other new media. This session will examine several key areas, including copyright, trademark and related intellectual property concerns; defamation, obscenity and related liability; false advertising and marketing restrictions; gaming; data privacy issues presented by social media; and impacts of social media on employees and the workplace. Attendees will learn how to identify legal risks and issues before they become full-scale emergencies and how to develop appropriate policies and guidelines covering social media activity.

Sunday June 24, 2012 3:00pm – 3:45pm @ 3 – 8 A/B (222 Merchandise Mart Plaza, Chicago, IL)