Contract Drafting: Limitations of Liability & Exceptions

One of the most important functions of a contract is to reduce uncertainties and mitigate risks. That is why almost all professional or personal services contracts contain “limitations of liability” provisions. Although they may seem like densely-worded, “boilerplate” provisions, and often overlooked, these provisions broadly affect a party’s ability to bring a claim, show liability, and prove damages that can be recovered.

A limitation of liability clause is a provision in a contract that limits the amount of exposure a company faces in the event a lawsuit is filed or another claim is made. As a preliminary observation, it is important to note that enforcement of limitation of liability provisions vary from state to state. The general rule in contract law is that in the commercial context, many states have found these clauses to be a mere shifting of the risk and enforce them as written.

Limitations of Liability generally address two areas of concern. First, the types of claims that may be barred. Second, the amount or scope of liability for claims that are not barred.

Limiting The Type Of Claim

A typical limitation of liability clause may look something like this:

“IN NO EVENT SHALL A PARTY OR ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS, BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE, EXEMPLARY, OR INDIRECT DAMAGES, INCLUDING BUT NOT LIMITED TO ANY DAMAGES FOR LOST PROFITS. IN NO EVENT SHALL THE TOTAL LIABILITY OF A PARTY EXCEED THE AMOUNTS PAID BY CLIENT, IF ANY, FOR THE SERVICES.”

This clause limits the types of damages that may be claimed, prohibiting claims for:

  • Consequential damages (damages resulting naturally, but not necessarily, from the defendant’s wrongful conduct, BUT they must be foreseeable and directly traceable to the breach)
  • Incidental damages (includes costs incurred in a reasonable effort, whether successful or not, to avoid loss, or in arranging or attempting to arrange a substitute transaction)
  • Special damages (often treated the same as “consequential” by courts, “special” damages have been defined as those that arise from special circumstances known by the parties at the time the contract was made)
  • Punitive damages (damages that may be awarded which compensate a party for the exceptional losses suffered due to egregious conduct; a way of punishing the wrongful conduct and/or preventing future, similar conduct)
  • Exemplary damages (See “Punitive damages”)
  • Indirect damages (See “Consequential damages”)
  • Lost Profits (Cases in New York (and elsewhere) have a held that a clause excluding “consequential damages” may no longer be enough to bar “lost profits” claims; therefore, consider including more specific provisions in contracts- if parties want to exclude lost profits for breach of contract, a clause specifically excluding “lost profits” should be included.)

Lost profits that do not directly flow from a breach are consequential damages, and thus typically excluded by a limitation of liability clause like that above. But lost profits can be considered general damages (and thus recoverable) where the non-breaching party bargained for those profits, and where the profits are a direct and probable result of the breach.

Limiting The Amount Of The Claim

If found to be enforceable, a limitation of liability clause can “cap” the amount of potential damages to which a party is exposed. The limit may apply to all claims arising during the course of the contract, or it may apply only to certain types of claims. Limitation of liability clauses typically limit the liability to one of the following amounts: (i) the compensation and fees paid under the contract; (ii) an sum of money agreed in advance; (iii) available insurance coverage; or (iv) a combination of the above.

Parties can and typically do agree in their contract that liability is capped at some dollar amount. If liability exists and if damages can be proved, then the aggrieved party recovers those damages, but only up to the agreed cap. Sometimes these are mutual; other times they are one-sided. Sometimes the cap is a fixed sum (e.g., “the amounts paid for the services” or “$100,000”). Other times, the parties may choose to tie the cap to the type of harm, (e.g. personal injury, property damage, violations of confidentiality obligations).

However, sometimes that parties may agree that certain types of harm should not be limited. These “exceptions” put the parties in the same position they would have occupied if there was no limitation of liability provision in effect. For example:

  • exposure for violations of intellectual property (copyright, trademark, trade secret, patent) or proprietary rights (right of publicity, right of privacy, contractually-defined proprietary information)
  • in the event of an obligation to indemnity and defend for 1) breach of intellectual property representations, and/or 2) third party intellectual property or proprietary rights
  • in the event of an obligation to indemnify because a party didn’t have the right to provide data or information
  • in the event of an obligation to indemnify and defend for non-compliance with data security standards
  • exposure for violations of confidentiality obligations
  • personal injury or property damage due to negligent acts or omissions

Best Practices

Businesses that rely upon limitation of liability clauses should periodically reexamine those clauses. Questions that you should be asking include: “what’s my maximum recovery if the other party breaches,” and “what’s my maximum liability if I breach?”

These are only effective if enforceable, that’s why drafting is key. According to many courts, following certain drafting guidelines will help reduce the likelihood that a limitation of liability clause will not be enforced. Such guidelines include:

  • Make the clause conspicuous: set the clause in bold face print or underline or otherwise place the clause apart from the rest of the text on the page on which it appears so that the other party is aware of its existence.
  • Make the language clear and concise: make sure that the clause is concise and unambiguous as it relates to the contract as a whole.
  • Identify specific risks: be specific in identifying the types of damages you think should be excluded.
  • Negotiate the clause: discuss the clause with the party that is signing the agreement and negotiate if there is a discrepancy.
  • Retain drafts of revisions: keep drafts of any revisions made to the limitation of liability clause so that you have proof that the clause was negotiated.
  • Add language stating that these damages are not recoverable even if they were, or should have been, foreseeable or known by the breaching party.
  • Recite that the limitation of liability clause is an agreed benefit of the bargain, and that it remains in effect even if any remedy under the contract fails of its essential purpose.
  • Consider including a liquidated damages clause for specific breaches, which would replace a damages claim.

DISCLAIMER: THIS IS NOT LEGAL ADVICE. Please consult  qualified attorney to discuss your specific situation.

If you are concerned about how to tighten your contracts, we may be able to help. We can review your contracts, your business practices, and advise on whether there is room for improvement.

Please contact us for a no-fee, no-obligation consultation. (866) 734-2568 David [at] adler-law.com

AEREO LOSES COPYRIGHT CASE

Technology Continues to Test The Bounds of Copyright Law

The Internet is an unprecedented source of disruption. From retail services (e.g. Amazon) to media and entertainment, almost every industry has been forced to rethink its business model due to the accessibility, ubiquity and democratizing force of the Internet. Aereo was positioned to disrupt the traditional media distribution model by giving consumers greater control over what were otherwise “free” over-the-air transmissions.

The Aereo service was premised on the idea that consumers should be able to watch and record over-the-air broadcast television programming via the Internet. Major broadcast networks that owned the content made accessible through Aereo challenged the model on the grounds that Aereo was violating the exclusive “public performance” right guaranteed by the Copyright Act.

Copyright law provides copyright owners six exclusive rights. One of those rights is the exclusive right to publicly perform the copyrighted work. Because this right is a statutory construct, one must look to the statute to determine its meaning. To “perform” and to perform “publicly” means “to transmit or otherwise communicate a performance or display the work to a place … or to the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times.”

While many reacted by asking whether the case would stifle innovation and have a chilling effect on start-ups, this case does highlight the increasing tension between technological advances and copyright law.

From a practical standpoint, one need not be alarmed about the impact of the decision on most types of innovation. For one thing, the Court went to some lengths to craft a reasonably narrow decision, which applies only to broadcast TV retransmitted over the Internet.

As with any type of innovation, there are different types of risk. On the one hand, there is technology risk: the risk that whatever technology is necessary for some business plan simply won’t work. On the other hand, there is legal risk, highlighted by the Aereo decision: the risk that the entrepreneur’s interpretation of some act or case law won’t ultimately prevail. That’s what happened to Aereo.

As an IP lawyer, I am somewhat perplexed. It is hard for me to understand why Aereo made such a bold move. However, at least the district court agreed with Aereo’s interpretation.

Identifying Intellectual Property Issues in Start-Ups – Live Webcast!

Do you work with start-up companies and need a basic understanding of the various intellectual property issues that can arise?

I will be co-presenting in this online seminar that will help you:

  • understand the trademark and copyright problems your client may encounter with branding;
  • learn how to protect your client’s branding once established;
  • familiarize your practice with patents, including what they protect, timing, and strategies to prevent inadvertent loss of patent rights before filing the application;
  • understand trade secrets and the importance of non-disclosure and confidentiality agreements;
  • recognize intellectual property issues relating to technology, including open source code and the cloud;
  • establish a proactive approach toward intellectual property ownership between cofounders, employees, and vendors; understand business names, domain names, promotional issues, and website content concerns.

The program qualifies for 1.5 hours MCLE credit.

I would like to personally invite you to attend the upcoming Law Ed program titled, “Identifying Intellectual Property Issues in Start-Ups,” which I will be co-presenting via live webcast on Tuesday, May 27th.

Presented by the ISBA Business Advice and Financial Planning Section

Co-Sponsored by the ISBA Intellectual Property Section

Owning Design: Protecting Original Design in an Age of Knock-Offs

A presentation on what goes into creating original designs and how these differ from copycats.

WHERE: Decoration & Design Building, J. Robert Scott Showroom, Suite 220

WHEN: Wednesday, October 2,2013 !2 p.m.

WHAT: From film to fashion, creative industries are taking steps to protect and promote original work. Designers and manufacturers need to know what steps they can take to protect their designs, their businesses, and their profits. The discussion will address issues related to how to protect original design (copyright & design patent) and the manufacturers (trademark, unfair competition).

WHO:

INTERIORS Magazine Editorial Director Michael Wollaeger

J. Robert Scott Founder Sally Sirkin Lewis

Designer Laura Kirar [Web Site]

Intellectual Property lawyer David Adler

Showroom reception to follow.

 

Download the full Fall Decoration & Design Building Market Brochure Here.

Copycat Conundrum: Tips For Protecting Original Furniture & Textile Designs

On October 2, 2013, I will be attending the Decoration & Design Building Fall Market where I am giving a presentatIon on protecting original furniture & textile designs. Those in attendance share a belief that style and design matter.

As designers and purveyors of good taste, you may spend months developing a concept, selecting materials, agonizing over the exact curve of the arm of a chair. Manufacturers may refine the design, invest in tooling to build it, promote it, and get it to market. Merchandise buyers may spend months reading, researching, attending events such as this to obtain and fill your showrooms and catalogue with ineffable elements of style. This is original, authentic design. Authentic designs—pieces produced by designers or their authorized manufacturers—are investments.

Therein lies the problem for today’s furniture designers and retailers. It takes intellectual and financial capital to conceive, create and produce good design. Yet, today’s consumer driven, price-focused economy is making it more and more difficult for a designer to protect and profit from the investment of this intellectual capital.

This presentation will focus on why certain designs are protectable, how to protect them, and how to defend against knock-offs.

In U.S. Regulators, Legislators Fill Privacy Void

Over the last few years privacy, and the lack of comprehensive protection, have made numerous headlines. From overly inquisitive mobile applications that fail to disclose how cell photo data is accessed and shared (Path) to handset manufacturers failures to properly inculcate privacy in the design and manufacturing process (HTC) to security lapses at government databases resulting in exposure of sensitive personal information (South Carolina), consumers, regulators and legislators are waking up to privacy issues.

Recent developments highlight the trend in Privacy

In the U.S. we lack a single comprehensive privacy law, although many state and federal laws address various aspects of collecting, storing and sharing personal information. In the absence of a single, over-arching, mandate, legislators and regulators are stepping into fill at perceived need.

GPS, Location & Privacy

The Geolocation Privacy and Surveillance (GPS) Act addresses use of location data by law enforcement. The bill (not yet law) requires police to obtain a warrant based on probable cause whenever it seeks “location information.” Unfortunately, the term “location information” is very broadly defined, does not distinguish requests for access based on the level of precision, time period, or whether the information is for past or future conduct.

Proposed Federal Privacy Standards

Two bills introduced this year aim to create a baseline level of privacy protection at the federal level. John Kerry (D-MA) and Sen. John McCain (R-AZ) introduced S. 799, the Commercial Privacy Bill of Rights Act of 2011, to create a regulatory framework for the comprehensive protection of personal data for individuals, enforceable by the Federal Trade Commission (FTC). Similarly, Rep. Cliff Stearns (R-FL) is promoting a Consumer Privacy Protection Act (H.R.1528), directed at consumers and focused on restricting the sale or disclosure of personal information.

FTC Protects Privacy Under Mantle of Consumer Protection

As a result of alleged data security failures that led to three data breaches at Wyndham hotels in less than two years, the Federal Trade Commission filed suit against hospitality company Wyndham Worldwide Corporation. The case against Wyndham is part of the FTC’s ongoing efforts to make sure that companies live up to the promises they make about privacy and data security.

Wyndham’s web site privacy policy claimed that, “We recognize the importance of protecting the privacy of individual-specific (personally identifiable) information collected about guests, callers to our central reservation centers, visitors to our Web sites, and members participating in our Loyalty Program …”

The FTC complaint alleges that Wyndham failed to maintain adequate and industry standard security measures by storing credit-card information in unencrypted format, allowing servers to remain unpatched, and failing to use firewalls.

The FTC alleges that these failures led to fraudulent charges on consumers’ accounts, millions of dollars in fraud loss, and the export of hundreds of thousands of consumers’ payment card account information to an Internet domain address registered in Russia.

Most notably, the lawsuit will test whether the Federal Trade Commission has the jurisdiction to compel companies to provide a certain level of cybersecurity in order to safeguard consumer personal information.

Privacy Remains Top Concern

Many companies across many industries, financial services, higher education and healthcare, just to name a few, are facing a wide range of security and privacy concerns, scrambling to implement A defensible security framework and demonstrate compliance. It’s alarming, considering the significant consequences associated with not complying.

Organizations can lose contracts, customers and their reputation. That could put some out of business.

Compliance Preparation & Best Practices

Large organizations can spend many months and millions of dollars on compliance. Your business need not go to such extremes. To prevent getting caught by surprise and to prepare for the compliance journey, I’ve listed below some suggested best practices.

Periodic risk assessments. Evaluate potential damage and disruption caused by unauthorized access, use, disclosure, modification, or destruction of data or systems.

Policies and procedures. Incorporate procedures for detecting, reporting, and responding to security incidents, as well as business continuity plans.

Standardize. Set standards of acceptable information security for networks, facilities, and information systems.

Train Employees. Awareness training for employees, contractors, and other users of information systems is critical. Articulate the security risks associated with activities and define users’ responsibility for complying with policies and procedures.

Test & Evaluate. Periodic assessment of the effectiveness of information security policies, procedures, practices, and controls helps determine weak spots. At a minimum they should be conducted annually, according to Ford.

Respond & Repair. Have a pre-defined process for planning, implementing, evaluating, and documenting remedial actions designed to address legal, PR, HR and related risks in the event of a breach.

THIS IS NOT LEGAL ADVICE. The procedures outlined above are merely suggestions and there is no guarantee that implementation will reduce risk or mitigate liability.

Please contact Leavens, Strand, Glover & Adler at 866-734-2568 for a free consultation to learn how LSGA can help meet your specific needs.

#Bank Information #Security: The Evolving Threat From Insiders

VIDEO: The Evolving Insider Threat– Dawn Cappelli, Randy Trzeciak of CMU’s Insider Threat Center

This video from RSA Conference 2013 discusses:

  • Who typically commits insider crimes – and how;
  • How employees are being victimized from outside;
  • Why our critical infrastructure is at heightened risk.

Even if you are an employer using standard commercial verification measures, you should be cautious about misuse of any information by employees, managers and contractors. Accordingly, you should be careful with training and education and not on only newly-hired employees. Further, plan on how login credential and access to sensitive information will be handled and/or turned over when training or when terminating, suspending, withholding pay, lowering pay, or taking any other adverse action against an employee.

Managing Risk: Legal Issues for Merchants & Affiliate Managers

I will be speaking at Affiliate Management Days SF 2013 (April 16-17, 2013) on the topic of “Managing Risk: Legal Issues for Merchants & Affiliate Managers.”

 

Affiliate marketing is one of the most cost-effective techniques for monetizing web site traffic and driving sales. Unfortunately, it has a reputation for high risk. While the industry is unlikely to ever be risk-free, it is possible to manage risk by: (1) understanding how techniques like behavioral and contextual targeting affect consumers, affiliates and merchants, (2) understanding the legal and regulatory environment, (3) understating risks involved with prospective marketing partners, (4) using and maintaining proper contracts that allocate risk and provide appropriate indemnifications, and (5) keeping informed about the changes in technology, marketing practices and the regulatory environment. Attendees will learn how to identify these issues and develop policies and procedures to keep informed about the current technology, marketing strategies and regulatory compliance.

 

Topics covered include:

 

  • Behavioral/Contextual Advertising
  • Regulatory/Industry Compliance : FTC Guides & Enforcement Actions
  • CAN-SPAM compliance
  • IP Law: Rules governing use of others™ Trademarks/Keywords, Right of Publicity/Endorsement Issues.
  • Identifying, protecting against, and disputing accusations of Click-Fraud

 

Geno Prussakov, the Founder & Chair of Affiliate Management Days and the CEO & founder of AM Navigator LLC did a pre-interview with me on Small Business Trends that can be found here.

 

 

 

Entertainment & Fashion Law News Update

Entertainment Law News & Events

Entertainment Law Initiative Luncheon Set For Feb. 8 | GRAMMY.com
The GRAMMY Foundation announced today that the keynote discussion at the 15th Annual Entertainment Law Initiative Luncheon & Scholarship Presentation

Colorado IP and entertainment lawyer David Ratner forms ‘Creative …
‘Creative Law Network,’ a Denver-based law firm, will focus on small to mid-size businesses and artists.

Florida Bar Hosts Entertainment Law Event | Billboard
NEW YORK–The Florida Bar Assn.’s Entertainment Arts and Sports Law Section will host its sixth annual legal symposium on music, film and TV on March 26.

UNH Law to debut sports and entertainment law institute
Concord Monitor
The University of New Hampshire’s School of Law will open a Sports and Entertainment Law Institute next fall, giving students the opportunity to focus their studies for a law career in either field.

Entertainment lawyer Mike Novak dies
The Macomb Daily
For nearly three decades, Mike Novak’s name was synonymous with entertainment in the Detroit area. During his career the Troy-based attorney, a resident of Grosse Pointe Shores, represented the likes of artists such as Bob Seger and Kid Rock.

Use a Law Degree to Enter Environmental or Entertainment Fields
U.S. News & World Report (blog)
If you have a question about law school, E-mail me for a chance to be featured next month. This week, I will address questions from readers about pursuing environmental and entertainment law.

Fashion Law News

Minnetonka’s Trademark Suit Against Target Tip-Toes Away http://t.co/sF6vtszP via @FemmeLegale

VIDEO: First Ever Northern California Fashion Law Panel Produced …
First Ever Northern California Fashion Law Panel

Following the Dress Code: Fundamentals of Fashion Law with BK
February 13th – 6:00-8:00pm 2 MCLE Credits (Professional Practice) 123 Remsen Street, BrooklyModerator: Allegra Selvaggio, Esq.

About The Author

David M. Adler, Esq. is a 2012 Illinois SuperLawyer, author, educator, entrepreneur and partner with Leavens, Strand, Glover & Adler, LLC, a boutique law firm in Chicago, Illinois created with a specific mission: provide businesses with a competitive advantage by enabling them to leverage their intangible assets and creative content in order to drive innovation and increase overall business value.

Whose Social Media Account Is It Anyway?

As a result of the rapid shift in marketing from unilateral one-to-many communications, to the multilateral, many-to-many or many-to-one conversations enabled by Social Media, employees and employers are struggling to manage accounts that are used for both work and personal purposes.

This new phenomenon has benefits, but it also creates a number of legal challenges. For employees, it may result in greater efficiency, more opportunities for authentic customers engagement and the ability to stay on top of the most current grands and business issues. For employers, it presents opportunity to reap substantial benefits from lower communications and customer support costs. For in-house counsel, it raises a host of legal and practical issues with few easy solutions and significant liability and regulatory risks.

First, there are hardware issues. Smartphones, tablets and other personal electronics often have social networking capabilities built in. in addition, they contain contain both personal and business data. Because these devices are always on and always connected, they are more than just personal property. They have become essential business tools. For both sides of the workplace equation, employers and employees must understand where the privacy lines fall between personal versus work-related information.

Second, there are data issues. Employers must balance their needs to monitor employee usage, employees’ privacy concerns, and the risk of liability for theft or exposure of data if a device is lost or stolen, or from lack of proper safeguards on account usage. For in-house counsel tasked with drafting policies to address these risks, , Prior to implementation of any policy, the legal team needs to educate front line employees and management on reasonable expectations of privacy and security and the harms that the organization seeks to prevent.

Lastly, recent cases such as the Cristou v. Beatport litigation, highlight the struggle to define and control the beginning and end of employee social media accounts, ownership and protection of intellectual property and the post termination risks that arise from the absence of appropriate policies.

As we prepare to start a new year, the time is ripe to establish security and privacy policies governing creation, maintenance and use of employees’ social media accounts for work functions. In-house counsel must lead the charge to educate, inform and train employees about privacy, security and evidence-recovery implications associated with use of social media.