You’re Invited to LAUNCH: Client Contracts 2.0

Contracts

DATE: Wednesday, June 29
TIME: 9:30AM to 11:30AM
LOCATION: New York Design Center, Conference Room
ADDRESS: 200 Lexington Avenue, NYC

Have you ever had a client refuse to pay a bill, not give you credit for your work, or use your design scheme without hiring you? As loathsome as these situations sound, the reality is that they happen more often than we like to admit. The best way to avoid these issues is to arm yourself with an airtight contract. For this task, we’ve enlisted David Adler, a Chicago-based lawyer who understands the ins and outs of the design industry, to serve as your legal expert for the morning. He will address some of the biggest risk factors interior designers face today and how your contract can (and more importantly, should) cover you. You’ll leave with a better understanding of how you can tighten up your existing contract so you don’t have to learn the hard way.

Register for the event here.

Adler Named 1 of @Law360’s 20 Attorneys Killing It On Twitter

The 20 Attorneys Killing It On Twitter

Law360, New York (September 11, 2015, 4:57 PM ET) — Some attorneys have figured out how to use their Twitter accounts to build their personal brand and network with peers and prospective clients, while also pumping out tweet after tweet of legal insight and hilarious anecdotes. The full article is available here.

Attorney David M. Adler in Chicago Illinois has been named as one of those 20 attorneys.

Getting Smart about Smart-Device #Privacy ISBA

My latest Article in the Illinois Bar Journal entitled – Getting Smart about Smart-Device , discusses wide range of legal and regulatory issues around privacy and security affecting the “Internet of Things.” This overview identifies risks and suggests some best practices for addressing privacy and security issues raised by IoT devices.

Illinois Bar Journal April 2016 • Volume 104 • Number 4 • Page 48

Full article available here.

Best Practices EU/US Privacy Shield

In case you missed it, Ken Dort at Drinker Biddle held a discussion covering high points of the EU/US Privacy Shield. Talking points covered:

1. Application Overview
2. Certification Issues
3. Privacy Shield Principles and Supplemental Principles
4. Implementation Timelines (Expected)
5. Best Practices Going Forward Pending Implementation

The draft EU-U.S. Privacy Shield “adequacy decision” includes the Privacy Shield Principles companies must follow. Suggested Best Practices for compliance with EU-U.S. Privacy Shield Principles include: evaluating disclosures about data collection and use to determine whether they are sufficiently clear and evident to consumers, and 2) giving strong consideration for implementation of a formal opt-in mechanism. European government trade regulators are concerned about whether consumers are being sufficiently informed about the nature and scale of data collection.

Ken graciously provided this great list of resources for the discussion:

* Full text of the Privacy Shield can be found here.

* European Commission draft adequacy decision can be found here.

* Department of Commerce Fact Sheet can be found here.

* European Commission Fact Sheet can be found here.

* European Commission FAQs can be found here.

* Statement from U.S. Secretary of Commerce Penny Pritzker on release of the Privacy Shield text can be found here.

* European Commission statement on the Privacy Shield text can be found here.

Article 29 Working Party statement on the Privacy Shield can be found here.

As part of Adler Law Group’s Privacy & Information Security Practice, we continue to follow the developments in this area. We can help you review, enhance and adopt standardized contracts and implement methodologies for approaching these challenges by setting objectives, determining scope, allocating resources, and developing agreements that will efficiently and effective manage risks.

Apple can comply with the FBI court order

Very good discussion of the technical issues behind the privacy issues.

Dan Guido's avatarTrail of Bits Blog

Earlier today, a federal judge ordered Apple to comply with the FBI’s request for technical assistance in the recovery of the San Bernadino gunmen’s iPhone 5C. Since then, many have argued whether these requests from the FBI are technically feasible given the support for strong encryption on iOS devices. Based on my initial reading of the request and my knowledge of the iOS platform, I believe all of the FBI’s requests are technically feasible.

The FBI’s Request

In a search after the shooting, the FBI discovered an iPhone belonging to one of the attackers. The iPhone is the property of the San Bernardino County Department of Public Health where the attacker worked and the FBI has permission to search it. However, the FBI has been unable, so far, to guess the passcode to unlock it. In iOS devices, nearly all important files are encrypted with a combination of the

View original post 1,662 more words

Adler Quoted in BNA’s Electronic Commerce & Law Report

A recent article by Alexis Kramer, Legal Editor for Bloomberg BNA’s Electronic Commerce & Law Report, examines the nature of social media platform messenger applications and the move into e-commerce. This shift raises the implications for policing counterfeit goods and enforcement of online purchases.

The article entitled “E-Commerce May Come to Messaging Apps; Watch for Counterfeits and Contract Issues” highlights that “[b]uying and selling goods through messenger apps” … “is definitely the future of mobile.”

David M. Adler was interviewed for the article for insight around ecommerce legal issues, which include intellectual property and contractual issues, that arise when consumers transact business through messenger apps. Many of these issues were identified in his article Pinterest “Buyable Pins” And Ecommerce Liability.

The legal risks and issues vary widely depending on industry and product/service mix and encompass many interrelated areas of the law. Specifically, Adler inditified five main areas of concern for ecommerce, especially on mobile devices and/or through messenger apps:

  1. Trade & Commerce Issues (Brand protections)
  2. Online Agreements (limitations of liability)
  3. Intellectual Property Issues (content ownership and use)
  4. Privacy & Security (data gathering, usage, storage & sharing)
  5. Human Resources & Employment Issues (reputation and social media use)

Facebook, WeChat, Instagram, Snapchat, Twitter and other social networks already allow users to send payments to one another through private messages. New tools such as the Pinterest “Buy Now” pin, and Twitter’s direct messages, facilitate commercial transactions with consumers.

As the article notes “enabling retail transactions via chat” opens the door for more counterfeit goods, difficulty monitoring the sales channel, increasing difficultly of enforcing online purchase terms, and lack of visual space to properly notify customers of the terms and conditions.

‘‘All the issues you would have when conducting transactions over the Internet are magnified when you’re using a messenger app,’’ David Adler, principal of Adler Law Group in Chicago, said.

Tracking Tech Case Provides Guidance on Customer Opt Outs

From healthcare apps, to mobile devices, to utilities, services are collecting and aggregating customer data across many different types of connected devices. Many mobile apps and services rely on a consumer’s location information. As more mobile apps connect to the Internet to send and receive location data, the FTC, legislators, privacy advocates, and others have identified location information as a particularly sensitive category of data. A recent study conducted by Carnegie Mellon University contained shocking revelations about the frequency with which location information is gathered and transmitted to companies through their mobile apps. At the same time, the recent settlement with in-store retail customer tracking provider Nomi highlights the FTC’s increased scrutiny of data gathering practices and disclosures of mobile application developers.

It is no secret that retailers could derive significant business intelligence from the real-time moments through stores. This is one of the areas around which companies innovate around customers’ private information. For example, Nomi Technologies, a company whose technology allows retailers to track consumers’ movements through their stores, made headlines when it agreed to settle Federal Trade Commission charges that it misled consumers about opting out of their tracking services. This is not why you want to have your company’s innovations in the news.

Business counsel both inside and outside of companies developing applications that leverage mobile geolocation data of consumers and employees should be aware of the many issues that are developing around this area such as: How is geolocation information gathered and how does data flow from device, to app to, third party? How is it shared and used in mobile advertising? When is consent required and how should stakeholders obtain such consent?

 

HealthCare & IT: mHealth, Telehealth and Telemedicine Developments

Global and China mHealth App Market Size and Forecast up to 2014: Acute Market Reports

The report introduced MHealth App basic information about international market analysis, China domestic market analysis, Macroeconomic environment and economic situation analysis, MHealth App industry policy and plan, MHealth App product specification, manufacturing process, cost structure and statistics in China.

‘meHealth’ for HIV in Africa

Combination of mHealth and e-health technologies and services to give personalized health support to anyone in the health system.
M-health: Set to Grow Its Clout

On the back of growing awareness about information and communications technology (ICT)-led healthcare services among users, m-health saw healthcare become a buzzing and interesting space in India.
Diabetes tools progressing from monitoring to proactive disease management

Developing diabetes care management strategies that extend beyond the clinic environment, reports mHealth Intelligence.

App, portal help spina bifida patients with self-care tasks

“The objective of this research is to develop an innovative mHealth system to support self-skincare tasks, skin condition monitoring, adherence to self-care regimens, etc…

Digital healthcare services in 2016 (and beyond)

Solving the complex problem of medication adherence could have a huge impact on lowering cost of care; It’s no surprise that millions of dollars have already been invested in digital health software to guide the process. In 2016, expect the basics of digital adherence — self-reporting, tracking refills and chronic disease outcomes, etc. — will receive a boost from the use of sensors to collect confirming data, whether it’s via breath analysis, urine sampling, or another non-invasive method.

Mining Data and Privacy: A Primer, Special Areas and State Laws

On Sept. 10, 2015, as part of the Mining Data and Privacy: A Primer Continuing Legal Education presentation moderated by the ISBA Intellectual Property committee, I presented the topic:

ISBA Privacy CLE – “Special Areas”: “Discover the security and privacy issues that have arisen in a number of special areas – HIPAA, COPPA, special state laws and regulations that govern online privacy, protection of personal data in court filings.”

The presentation is available here.

 

← Back

Thank you for your response. ✨

Changes in Global Privacy Affect Small Business Too

Changes in Global Privacy Affect Small Business Too

In case you missed it, on October 6, 2015 the Court of Justice of the European Union (CJEU) issued a long-awaited privacy ruling in the case involving Maximilian Schrems, the Ireland Data Protection Authority (DPA) and Facebook. Back in 2000, the EU Commission decided that personal data sent to US organizations that sign up to the Safe Harbor scheme is adequately protected. Safe Harbor organizations self-certify compliance with certain privacy principles, and the scheme is enforced by the US FTC.

Background

Simply put, Schrems sued to prohibit transfer of his personal data from Facebook Ireland to Facebook in the U.S. due to widely perceived flaws in U.S. data protection following the Edward Snowden NSA revelations.

Why it Matters

Over 5,000 U.S. companies “self-certify” under Safe Harbor, and their European partners and customers rely on Safe Harbor for data transfers into the U.S. The decision may impact many small to medium sized business who use social media for marketing and business development, as well as businesses that use cloud-based services for gathering, processing and sharing data. Transfers of Personally Identifiable Information (PII) from the EU to the U.S must either be authorized by national data protection authorities, or be able to rely on one of the legal exceptions.

Although the Safe Harbor companies publicly committed to apply the Safe Harbor Privacy Principles to the personal data they brought into the U.S. (and some companies passed these commitments on to other entities under Onward Transfer agreements), companies that disregard those commitments, with regard to either stored data or new data transfers, could expose itself to FTC enforcement against “unfair or deceptive practices” or judicial complaints based on U.S. contract, fraud, or tort law, as well as to enforcement in the EU – such as complaints before labor tribunals, courts, and data protection authorities.

Don’t Panic, Yet

While the decision is likely to have a significant impact on the transfer of personal data from the EU to U.S. recipients, EU leaders say it’s not time to panic yet. Experts have pointed out the alternative legal bases for transatlantic data transfers that exist, such as contracts, Binding Corporate Rules or actual, express consent. Many businesses may be able to use these methods and continue their transatlantic data transfers.

Domestic Developments

At the same time, California leads the U.S. in enacting new privacy legislation. Last week California passed legislation that may equate to what the EU wants to see on the federal level. According to §1546.1 b) of CalECPA any government entity must have a warrant, wiretap order, order of electronic reader or a subpoena if they want to compel any individual or a service provider to disclose information stored on their devices (mobile phones, computer, tablets, tv, servers you name it). §1546.1 c) states that government agencies cannot access, either physically or remotely, a device unless they have a warrant, wiretap order, consent of the authorized possessor of the device, if the government in good faith, believes there is an emergency that could jeopardize someone’s life or physical integrity (in which case they’ll have to get a warrant within 3 days later) or in case the devices are confiscated from inmates in state prisons.

Concerned about whether your business is at risk for violating EU data protection rules? Don’t be. We offer a FREE, no-obligation one (1) hour consultation to identify potential issues. The professionals at the Adler Law Group can help you review, enhance and adopt standardized contracts and implement methodologies for approaching these challenges by setting objectives, determining scope, allocating resources, and developing agreements that will efficiently and effective manage risks, while keeping pace with the business.

Please call: (866) 734-2568, click: http://www.adler-law.com, or write: David @ adler-law.com.