FH2’s Mike Stewart Wins Client Choice Award for Third Time

FH2’s Mike Stewart was named the exclusive 2016 Winner of the  International Law Office’s Client Choice Award for the IT & Internet category for Georgia.  This marks the third time Mr. Stewart has won the Client Choice Award since 2013. Established in 2005, the Client Choice Awards recognize those partners around the world that stand apart for the excellent client service they provide.  For more information on Mike, his practice and his accomplishments, Click Here.

8 Key Terms You Need to Pay Attention to in Your Next Lease

Almost every person or business (the “tenant”) that seeks to occupy space in another’s building (free standing, multi-tenant office or shopping center) will enter into a contract, known as a lease, with the owner (the “landlord”) of the building. A lease is an amalgam in nature, comprised of (i) the conveyance of an interest in real property by the landlord to the tenant, and (ii) a contract between the landlord and tenant that defines all of the elements of the relationship between them regarding the building and premises for the duration (the “term”) of its use by the tenant. Because commercial leases are typically in effect for a relatively long period (three or more years), the lease is a dynamic document that has very real implications for the tenant in years to come.

The lease is comprised of a variety of provisions that define aspects of the landlord/tenant relationship – ranging from the direct economic ones (such as rent, taxes and maintenance) to non-economic ones (such as the manner of use, renewal and tenant relocation). Because the landlord’s and the tenant’s interests are typically divergent, the provisions require negotiation between the landlord and tenant. But which ones are of most significance to the tenant? Unless the tenant is leasing a substantial amount of space in the building the bargaining positions of the tenant and landlord are generally weighted in favor of the landlord, so the tenant must decide which provisions are most crucial to modify in order to meet its needs and which ones can be accepted as proposed by the landlord.

The following are key provisions that merit special attention by a tenant.

1. Rent: While this seems obvious, the tenant must be sure that base rent (per square foot rental rate times the total square feet in the premises) is clearly stated for the term of the lease, and that there are no overlooked rent escalations (such as cost-of-living adjustments) included that have not been specifically agreed to.

In addition to base rent, leases generally provide that the tenant will pay its pro rata share (based on square footage of the premises divided by the square footage of the building) of building operating expenses, taxes and insurance. This will be discussed later in more detail under the heading Building Operating Expenses.

2. Use: This provision defines what the tenant can use the premises for. Landlords will frequently seek to limit the use to a specific one, while it is in the tenant’s best interest to keep the scope of use more broad. For example, the landlord may seek to limit the use to “law offices”, but the tenant should try, at a minimum, to expand the approved use to include “general office purposes” or, better still, any purpose not prohibited by law.

3. Maintenance and Repair: It is critical that the division of responsibility for maintenance and repair of the building (together with its common areas) and the premises (the space within the building actually occupied by the tenant) be fair to the tenant. The tenant will typically be responsible for repairs and maintenance to the premises, while the landlord is otherwise responsible for the building and common areas. In this situation the definition of “Premises” within the lease is very important. The tenant should seek to define the premises for which it is responsible as “below the ceiling grid, above the surface of the floors and inside of the exterior windows”. If the definition of the Premises is not so limited, tenant could find itself liable for maintenance and repair of electrical systems and HVAC above the ceiling grid and plumbing systems below the floor. Additionally, the tenant should try to avoid being made responsible for any “replacement” of components of the premises, like plumbing and light fixtures unless the replacement is necessitated by the tenant’s negligent acts or omissions.

4. Building Operating Expenses: While landlords are typically responsible for maintenance, repairs and replacements of the building and common areas, the costs incurred by the landlord in fulfilling that responsibility are almost always passed to the tenant on a pro rata basis. The amount involved can be substantial, sometimes as much as 30/40% of base rent. The lease will include a comprehensive definition of all such costs which will include taxes (unless addressed separately), insurance and virtually every other cost incurred by the landlord in operating and maintaining the building and common areas and providing services to the building.

During the lease negotiation the tenant should try to avoid including the following items in the definition of building operating expenses:

  • Depreciation on improvements and equipment, especially if a capital reserve is already part of the definition;
  • Costs properly chargeable to landlord’s capital account such as repaving, new roof and construction of additional improvements; and
  • Paying a percentage that varies from 10-20% of base rent, to the landlord for its administrative costs, rather than its actual out-of-pocket costs for administration.

The tenant should also seek to limit its obligations for building operating expenses to paying only those expenses that represent an “increase” over the building operating expenses for a base year established in the lease. The “base year” is typically the year that the lease is entered into. However, many landlords seek to pass on all building operating expenses to tenants, not just increases over a base year.

Payments of the building operating expenses are typically made monthly based on the landlord’s estimate of such expenses, with a reconciliation in the first 90 days of the next calendar year based on the actual operating expenses for the preceding year.

5. Extension/Renewal Options. When negotiating for the use of space, the tenant should consider having an extension/renewal option provision included in the lease. This grants the tenant the option (or several consecutive options) to extend/renew the lease for one or more fixed terms on substantially the same terms and conditions as are contained in the original lease, with the exception of base rent, financial incentives and the renewal option itself. This provision will provide that the option may be exercised, if at all, by written notice to the landlord, given within a specified number of months before the then current term expires. Landlords frequently resist such provisions because they restrict the landlords’ rental options in the future. Nevertheless, landlords may be persuaded to agree – particularly if the lease includes a relocation provision in favor of the landlord (see below).

Rent for the renewal/extension period is negotiated by the landlord and tenant and is often based on “market rent” at the time of renewal, with stated criteria for determining “market rent” such as (i) similarly situated second generation space in comparable buildings, (ii) where the building is located, (iii) annual rent escalations, (iv) definition of rentable space, and (v) other similar factors affecting the rental rate.

If the landlord and tenant cannot agree on “market rent”, the option will often provide for determination of market rent by one to three arbitrators who are experienced in representing landlords and tenants of buildings comparable to the building.

The option will almost invariably state that in no event shall the base rent for the renewal term be less than base rent in effect on the last day of the preceding term.

6. Relocation: Landlords of multi-tenant buildings (and sometimes landlords of shopping centers) often include a provision in the lease that allows them to move tenants to other spaces in the building. Landlords want to include such a provision as it allows the landlords the flexibility to adjust its leases in the building to accommodate prospective tenants who need large spaces within the building. If a tenant does not have the leverage to get the landlord to agree to omit the provision, it needs to negotiate adequate protection against the cost and disruption of a “forced” move. If a relocation provision is included it should provide for, at least, the following:

  • No less than 60 days’ advance notice;
  • The new premises should be substantially the same in size, dimensions, configurations, tenant improvements and finishes as the original premises, all paid for by landlord;
  • The relocation shall be at landlord’s sole cost and expense;
  • The relocation shall take place over a weekend and be completed, if possible, before the Monday following the weekend of the move; and
  • Tenant shall be reimbursed for all costs incurred by tenant as a consequence of the relocation including without limitation, moving costs, changing stationery and business cards, moving of computers and telephone systems and re-cabling the new premises to meet the tenant’s technology requirements.

7. Assignments: Leases will frequently prohibit a tenant from assigning the lease or sub-letting all or part of the premises without the landlord’s prior consent. The tenant should seek to limit the landlord’s discretion in prohibiting assignment or sub-letting by providing that the landlord may not unreasonably delay, condition or deny its consent to an assignment or sub-lease. Further, to account for future business transactions and restructurings, the tenant should seek the right to assign the lease, or sub-lease the premises – without any required landlord consent – to any entity controlling, controlled by or under common control with the tenant, or to any entity into or with which the tenant has merged or consolidated or which purchases all or substantially all of the tenant’s assets.

8. Surrender of Premises: This provision often does not receive the attention it needs when the tenant is negotiating the lease. The lease will typically require that, upon expiration or termination of the lease, the premises must be returned, broom clean, in good order and condition (except for normal wear and tear), substantially in the same condition as it was when the lease commenced.

While a provision of this sort is customary and should not be objectionable to the tenant, many leases go further, and require that, in addition to removing its trade fixtures and personal property, tenant must remove all communications wiring and cabling installed by it from the ceiling and walls of the premises – and sometimes even from the premises to the point where it terminates to the building’s wiring. Further, some leases seek to obligate the tenant to pay for the removal of all tenant improvements made to prepare the premises for tenant’s occupancy. Both of these provisions should be rejected if at all possible as the cost to tenant of complying can be substantial. However, tenant should retain the “option” of removing cabling and wiring as tenant may wish to reuse these items in its new location.

$500 In Damages for Using a Smartphone to Send a Text Message?

Most businesses that engage in telemarketing or fax marketing are aware of the Telephone Consumer Protection Act (TCPA), the federal Do Not Call list (and state Do Not Call lists in many states), and the importance of complying with their requirements when marketing their goods or services. But did you know that federal law limits the ways in which almost anyone can place calls or send text messages to residential and wireless telephone numbers even when they are not engaged in marketing? The Federal Communications Commission (FCC) recently issued a Declaratory Ruling clarifying several provisions of the TCPA. Review of the FCC’s order emphasizes the importance, and the difficulty, of complying with this law when using automatic dialing equipment—which may include any smartphone—or artificial or prerecorded voice messages.

What the TCPA Prohibits

In general and subject to limited exemptions, the TCPA and the FCC’s implementing regulations prohibit:

  • Making any marketing call to a telephone number included in the national Do Not Call database or to any residential telephone customer who has requested to be placed on the calling party’s do not call list
  • Initiating any non-emergency call using an automated telephone dialing system or an artificial or prerecorded voice to (i) any emergency telephone line, (ii) the telephone line of any guest room or patient room of a hospital, health care facility, elderly home or similar establishment, or (iii) any telephone number assigned to a wireless service or any service for which the called party is charged for the call, in each case, without the prior express consent of the called party (which must be written consent if the call is for a marketing purpose)
  • Initiating any commercial marketing call to a residential line using an artificial or prerecorded voice without the prior express written consent of the called party
  • Sending an unsolicited fax advertisement to anyone with whom the sender does not have an established business relationship or who has requested not to receive fax advertisements from the sender
  • Sending any fax advertisement (solicited or unsolicited) to anyone without including on the first page a notice advising the recipient how to opt out of receiving any further fax advertisements from the sender
  • Using an automatic telephone dialing system in such a way that two or more lines of a multi-line business are engaged simultaneously
  • Disconnecting an unanswered telemarketing call prior to at least 15 seconds or four rings
  • Abandoning more than 3% of telemarketing calls that are answered live by a person
  • “Spoofing” the Caller ID of any call with the intent to defraud, cause harm, or wrongfully obtain anything of value
  • Dialing any telephone number for the purpose of determining whether the line is a fax or voice line

The FCC’s Declaratory Ruling

The focus of the FCC’s recent Declaratory Ruling is on calls to wireless numbers using automated telephone dialing systems or artificial or prerecorded voice messages and calls to residential lines using artificial or prerecorded voice messages, which the FCC referred to collectively as “robocalls.” Alongside the increasing use of wireless phones, robocalls have become pervasive. One source estimates that approximately 1.45 billion robocalls were placed in the United States in December 2015. According to the source, more robocalls were placed to Atlanta residents in December than to residents of any other city, and the Atlanta 404 and 678 area codes were two of the three most robocalled area codes in America. And this count includes only voice calls, not text messages, which are also covered by the TCPA.

Text Messages as Calls

The FCC ruled in 2003 that Short Message Service (SMS) text messages are “calls” for purposes of the TCPA. In its recent order, it clarified that ruling, holding that any text message that is sent to a North American telephone number is a TCPA “call,” even if it originates as an email and is converted to a text message by an intermediate function.

Autodialers – Every Smartphone May Be an Autodialer

The first issue addressed in the FCC’s order, and possibly its most important aspect, is its clarification of what it means to “make a call … using any automated telephone dialing system,” or “ATDS.” The statute defines an ATDS as “equipment which has the capacity—(A) to store or produce telephone numbers to be called, using a random or sequential number generator; and (B) to dial such numbers.” Citing dictionary definitions, the FCC ruled that the term “capacity” does not refer only to the capability of a device at the time that a call is made, but to the potential capability of using the device to dial stored or produced numbers randomly or in sequence, even if doing so would require the use of additional software or equipment to enable that capability. The only example the FCC provided of a device that can make a telephone call but is not at least potentially an ATDS was a rotary dial telephone. And as long as a device has the “capacity” to be an ATDS, it is irrelevant whether its autodialing function is used for a particular call; a manually dialed call using an ATDS is subject to the same rules as an autodialed call.

Software (“apps”) is available for smartphones that enables them to store telephone numbers and dial them. A dissenting commissioner pointed out that the FCC’s reasoning dictates the conclusion that every smartphone is an ATDS. The majority did not disagree, but only stated that it was not aware of smartphone users being sued by their friends and families or the companies with which they do business for calling them or sending them texts. And because it doesn’t matter whether the autodialing capability of an ATDS is used for a particular call, potentially (and somewhat absurdly) any call or text message using a smartphone to a wireless number requires the prior express consent of the called party.

The FCC also ruled that any Internet-based service that places calls or sends text messages to North American telephone numbers is an ATDS. Whether the user of the service or the service provider is the calling party who must have obtained the consent of the called party depends upon the totality of the circumstances. In most cases the user of the service is considered the calling party, but the service provider may also need the requisite consent if it controls part of the content of the call or text message or chooses some of the recipients.

Consent of the Called Party

The FCC also addressed how a caller may obtain the consent of the called party. Although written consent is required for robocalls that contain or link to advertising or constitute telemarketing, the FCC confirmed that no particular method of consent is required for non-marketing robocalls. In most cases, the fact that someone provides a wireless number as a contact number in connection with a relationship with another party constitutes consent to receive non-marketing robocalls to that number. A robocaller may obtain the consent of called parties through an intermediary, such as the organizer of a group, but the caller is liable for a violation if the intermediary did not actually obtain the consent of a called party. And the fact that someone is listed in the contact database of someone else who has provided consent does not constitute consent to receive robocalls.

Can I Include a Consent Requirement in My Terms of Service?

The FCC also emphasized that a residential or wireless telephone customer cannot be required to consent to receive robocalls as a condition of purchasing goods or services or otherwise doing business with the robocaller. Shortly before the FCC issued its Declaratory Ruling, PayPal revised its User Agreement to state “You consent to receive autodialed or prerecorded calls and text messages from PayPal at any telephone number that you have provided us or that we have otherwise obtained.” The FCC’s Enforcement Bureau sent PayPal a letter advising it that the new User Agreement violated the TCPA. It has also cited other businesses for seeking to impose similar consent requirements as part of their terms of service.

What if the Person Who Provided Consent Changes Phones?

A particular problem for anyone making robocalls to wireless numbers is the difficulty of being certain that the person who consented to receive the calls or texts still has the telephone number to which that consent applies. Some parties argued that the “prior express consent of the called party” should mean the consent of the “intended recipient,” so that consent to receive autodialed or recorded calls to a particular wireless number would remain valid after the wireless number was assigned to a different customer, as long as the caller intended such calls or texts for the customer who had provided the consent. The FCC rejected this argument, ruling that “the ‘called party’ is the subscriber, i.e., the consumer assigned the telephone number dialed and billed for the call, or the non-subscriber customary user of a telephone number included in a family or business calling plan.” Mitigating the basic problem only somewhat, the FCC adopted a “safe harbor” permitting one autodialed or recorded call to a reassigned wireless number as long as the caller had the prior express consent (written consent for marketing) of the previous subscriber or customary user of that number and has no knowledge of the reassignment of the number. Acknowledging that a single call to a reassigned number often will be insufficient to make a caller aware of the reassignment, the FCC said only that it could have interpreted the statute to prohibit even a single autodialed or recorded call to a reassigned number. The FCC also noted that misdialed calls and calls to numbers that were incorrectly entered into a dialing system enjoy no such safe harbor.

The risk associated with autodialed or recorded calls to misdialed or potentially reassigned numbers is enhanced by the FCC’s conclusion that a called party has no good faith obligation to advise the calling party that the number has been reassigned. “[T]he TCPA places no affirmative obligation on a called party to opt out of calls to which he or she never consented.” Even when the content of a call clearly indicates that it is intended for someone else, the FCC’s order almost encourages the called party to wait and sue after receiving several misdirected calls rather than tell the calling party that it has reached a wrong number.

Revocation of Consent

The TCPA provisions concerning fax advertisements include requirements for an opt-out notice and expressly permit someone who has invited or consented to fax advertisements to withdraw consent, but there is no similar provision with respect to autodialed or recorded calls. Some parties and a dissenting commissioner argued that this meant that once consent has been provided for the receipt of robocalls, that consent cannot be revoked. Others argued that the sender should be permitted to establish an exclusive method of revoking consent to receive robocalls, similar to the requirements for withdrawing consent to receive fax advertisements. The FCC rejected both arguments, ruling that residential and wireless customers may revoke their consent to receive robocalls at any time, by “any reasonable means,” including orally. The FCC stated that callers cannot limit in any way the method by which a called party may revoke consent.

The ability of a consumer to revoke consent by any reasonable means raises questions such as whether a national retail chain must honor a “stop robocalling me” request made orally to a cashier at a local store, or a technology company must honor such a request made in the midst of a technical support call. While someone engaged in robocalling cannot limit the methods by which called parties may revoke consent, however, there is no reason that the robocaller cannot publicize one or more simple, readily available ways to revoke consent to receiving its calls, thus potentially reducing the risk of receiving consent revocations by other means and possibly establishing an argument that a method by which someone claims to have revoked consent was unreasonable.

Robocall Blocking

In response to a request by the National Association of Attorneys General, the FCC ruled that there is nothing that prohibits telephone service providers or third parties from offering services that attempt to block robocalls. Any such services must be offered on an opt-in basis with adequate disclosure that they are imperfect and may inadvertently block other calls as well. But the FCC encouraged providers to offer such blocking services and hinted that it could require them to do so in the future. The Federal Trade Commission had previously granted a substantial award to the developer of one such service that works only for customers of some interconnected VoIP providers.

Liability

The TCPA authorizes a “person or entity” to sue the calling party for a violation of the robocall or fax advertising prohibitions, authorizes any person who has received more than one call in 12 months from the same entity in violation of the Do Not Call rules to sue that entity, and authorizes states to sue violators of any of the TCPA provisions. The statute provides that private actions may be brought in appropriate state courts and state enforcement actions must be brought in federal courts, but federal courts have held that they also have jurisdiction over private TCPA lawsuits. The plaintiff in a private action may recover the greater of $500 or actual damages for each violation (i.e., each prohibited call or fax), or up to three times that amount if the court determines that the violation was willful, and a state may recover $500 per violation. Some of the FCC’s interpretations of the TCPA are expressly based in part upon the difficulty that a consumer would face in pleading or proving a violation if it interpreted the TCPA differently.

Most private lawsuits for TCPA violations are filed as class actions, and many of them proceed as such, although some courts have ruled that class actions for robocalling violations cannot be certified because of the difficulty of identifying individuals who did not provide prior express consent to receive such calls or texts. Failure to stop robocalling upon request, however, can give rise to substantial liability even without a class action. Yahoo, for example, faces potential liability for damages of over $15,000,000 for sending over 24,000 text messages to a wireless number that had been reassigned to a different customer despite the new customer’s numerous, reasonable requests (including a conference call with representatives of Yahoo and the FCC) that it stop doing so. The trial court in that case initially ruled for Yahoo on the ground that it had not used an ATDS, but the appellate court recently sent the case back for reconsideration based upon the FCC’s ruling concerning what constitutes making a call using an ATDS.

Conclusion

As the FCC repeatedly stated in its order, the TCPA does not prohibit anyone from making any non-marketing call to anyone else without prior consent, as long as the call is not dialed using an ATDS or an artificial or prerecorded voice. And finally, with very limited exceptions, the TCPA expressly permits states to further restrict or prohibit altogether calls that are otherwise permitted by the TCPA.

Background Checks on Job Applicants: 3 Things You Need to Know

Are you using criminal background checks as part of your hiring process? If so, your use of them is subject to federal law. We can show you how to avoid some common – and dangerous – pitfalls when using background checks to safeguard your business.

Georgia law requires every employer to use “ordinary care” to ensure that its employees don’t pose an unreasonable risk of harm to others. Georgia courts have held that, at least sometimes, ordinary care will require an employer to perform a background check before hiring a potential employee. For example, in 2007 our Court of Appeals held that a home-security company that knew its salesmen would be entering customers’ homes as part of their job could be held liable for failing to run a background check on a salesman who later attacked a customer. Underberg v. Southern Alarm, Inc., 284 Ga. App. 108 (2007). Given the potential for liability, it isn’t surprising that many employers run criminal background checks on potential employees as a matter of course. But even though it might be required, running a background check on a potential hire carries its own risks if you fail to comply with applicable law governing how you procure and use background checks in the hiring process.

Before you use a background check in your hiring process, here are three things you need to know:

  • Federal law governs how you obtain the background check and what you do with it;
  • You have to get the potential employee’s consent before you begin; and
  • You have to take certain actions both before and after you reject the potential employee.

One: Federal law applies when you run a background check on a potential employee.

Even though state law may require a company to perform a background check, federal law imposes a completely independent set of requirements. That is because of the federal Fair Credit Reporting Act (or “FCRA”). 15 U.S.C. § 1681 et seq. To judge by its name, you might think the FCRA only applies to credit reports, not criminal background checks. You would be wrong. The FCRA is worded so broadly that many other types of reports fall within its purview. The statute applies to almost any commercially prepared report about a person’s “character, general reputation, personal characteristics, or mode of living” if the report is used to determine that person’s eligibility for employment. That statutory definition includes criminal background reports. See Farmer v. Phillips Agency, Inc., 285 F.R.D. 688 (N.D. Ga. 2012).

Two: You have to get the applicant’s permission before you get the report.

The FCRA requires a company to take specific steps any time it uses a background report in the hiring process. Before you get a background check, you must:

  • Tell the potential employee in writing that you intend to get a background report and get the applicant’s written permission to do so before ordering the report. And,
  • Certify to the company that is providing the report that you have complied with the FCRA’s requirements that you disclosed your intent to get the report and you got the applicant’s permission before you obtained the report. You also have to certify that you will comply with the FCRA’s dispute-resolution requirements, which are described below.

Three: You have to give the applicant a chance to respond to the report before you reject the applicant, and then you have to provide additional notice once you make the decision.

Once you get the report, the FCRA controls how you use it. Before you reject an applicant based on a background report, you must give the job-seeker:

  • A copy of the background report that you are relying on;
  • A summary of the employee’s rights under the FCRA prepared by the federal Consumer Financial Protection Bureau (CFPB), which include the right to dispute with the reporting agency any incomplete or inaccurate information contained in the report (a copy of the summary can be found on the CFPB’s website at http://files.consumerfinance.gov/f/201410_cfpb_summary_your-rights-under-fcra.pdf); and
  • Five days to raise any objection to the contents of the report.

If you have met these requirements, you can then reject the potential employee’s application. But your obligations don’t stop there. Once you have made the decision to reject the applicant, you must notify the applicant that you have declined him on the basis of the report and also provide him with:

  • The name, address, and phone number of the consumer reporting agency that supplied the report (including a toll-free telephone number established by the agency if the agency compiles and maintains files on consumers on a nationwide basis);
  • A statement that the consumer reporting agency that supplied the report did not make the decision to reject the applicant and cannot give the applicant the specific reasons for that decision; and
  • A notice of the person’s right to dispute the accuracy or completeness of any information the consumer reporting agency furnished, and to get an additional free report from the agency if the person asks for it within 60 days.

Be aware that these requirements apply if the report has played any role in your decision to reject the applicant. The report does not have to be the only factor in your decision, or even the primary one.

If you fail to meet any of these requirements, the applicant can sue you. What’s at stake if you get sued? Potentially a lot. At a minimum, the rejected applicant can recover any actual damages that she suffered as a result of the violation. You should be aware that “damages” include the applicant’s attorneys’ fees and court costs, which often far exceed any economic damages that the applicant directly suffered. Remarkably, actual damages can also include emotional distress. So even if the applicant did not suffer any measurable economic harm, you can still face a claim for substantial damages. Even worse, if a court finds that your failure to comply with the statute was “willful,” it can impose additional penalties, including punitive damages.

These types of suits are surprisingly common – one Atlanta law firm that specializes in FCRA cases has filed over 800 of these suits on behalf of rejected job applicants. To make matters worse, any liability you face for a failure to comply with the FCRA may not be covered under your business’s general liability insurance policy. To be covered by insurance, you will almost always need a separate employment-practices liability policy, and even then you will need to confirm that your specific policy provides coverage for violations of the FCRA. At a minimum, you will need to carefully follow the procedures described in the insurance contract regarding giving notice of the claim to the insurer.

As in so many areas of the law, an ounce of prevention is worth a pound of cure. If you have any doubts about your procedures or the state of your business’s insurance coverage when it comes to the use of background checks, contact Ben Byrd at Friend, Hudak & Harris for more guidance.

Insurance for Technology Businesses: Are You Covered?

Most prudent businesses today carry at least certain standard insurance coverages to protect against risks and liabilities arising out of the conduct of their business. These threshold coverages usually consist of a Commercial General Liability (CGL) policy, coupled with a workers’ compensation and employer’s liability policy and a commercial automobile liability policy. However, the provision of technology-related products and services entails certain unique risks not faced by the “ordinary” business, and a business engaged in providing those products and services (and their customers) run the risk of a very unpleasant surprise when a claim is made and the business discovers that these standard insurance products may not provide coverage. As such, businesses that provide technology-related products and services – from software development and licensing to IT professional services and data hosting – should be aware of additional insurance products that are available to insure against the risks that are unique to their business operations.

Why Isn’t a CGL Policy Enough? Though the exact terms of coverage may vary from policy to policy and from insurer to insurer, CGL policies generally protect a business from a third party’s claim of negligence that results in bodily injury or physical damage to property. In addition, a CGL policy may provide coverage against infringement of certain intellectual property rights if the alleged infringement occurs in the course of advertising or marketing the business’ goods and services.

However, CGL policies typically exclude certain risks that are actually quite common in the provision of technology-related products and services. For example:

  • Defects in Products and Services/Contract Performance Disputes – a failure or error of a technology product or service is more likely to result in financial damage to a third party than to cause bodily injury or physical damage to a third party’s property – but purely financial losses caused by the negligence of an insured are usually excluded from coverage under the CGL policy. This means that a CGL policy will quite likely not protect a business against claims arising out of programming errors, software performance, or the failure of products and services to perform as promised in a contract.
  • Subcontractors – technology service providers often supplement their work force through the use of subcontractors and independent contractors – but the acts of subcontractors and independent contractors are usually not covered by a CGL policy.
  • Professional Services errors and omissions arising out of the provision of professional services (for example, IT consulting and implementation services) are usually excluded from coverage under a CGL policy.
  • Data Breaches in the past, many courts have construed CGL policies to not provide coverage for data breaches (for example, in some cases, on the rationale that data is not tangible “property” and, in other cases, on the grounds that a data breach did not constitute “publication” of private information to qualify for coverage as an “advertising injury”); to avoid an uncertainty, many insurers have now begun to expressly exclude data breaches from coverage under a CGL policy.
  • Infringement of Intellectual Property, especially Patents as noted above, most CGL policies exclude coverage for claims arising out of the infringement of intellectual property rights if the infringement does not occur in connection with “advertising” – but even then, claims of patent infringement are almost always excluded from coverage under all circumstances. Given the proliferation of infringement claims by “patent trolls” and other non-practicing entities (NPEs), lack of coverage against such claims is a significant area of concern for all providers (and customers) of technology-related products and services.

Additional Insurance Technology Companies Should Consider. The following are some additional available insurance coverages that are more specifically tailored to the risks and liabilities faced by providers of technology-based products and services and so may be used to fill “gaps” left by a CGL policy. Of course, the terminology for a given type of coverage may vary from insurer to insurer, and not all insurance policies provide the same coverage; in addition, certain of the coverages listed below may already be included under another insurance product or added as a rider. In short, the devil is in the details, so you should always consult with your insurer or broker and review each policy carefully to make sure that a given insurance product meets your needs.

1. Technology Errors and Omissions (Tech E&O).  Tech E&O coverage is a species of the more well-known professional liability/professional errors & omissions coverage, and it often supplements the CGL policy in important ways specific to a technology-related business. Tech E&O insurance generally protects the insured against a third party’s (such as a customer) claims of financial loss caused by either (i) the failure of the insured’s product to perform as promised, or (ii) an act, error, or omission committed by the insured in the course of its performance.

  • Tech E&O applies to claims arising out of the performance of professional services. To avoid confusion, it is important to note that “professional services” not only include the rendering of services but also the offering or provision of technology-related products as well. For example, IT/network consultants, website designers and cloud storage companies provide technology services, while software licensors and hardware manufacturers offer technology products.
  • Tech E&O provides coverage for defects in products and certain services/contract performance disputes. As noted above, failure or error of a technology product or service more often gives rise to purely financial damage (for example, monetary loss caused by failure to deliver as promised or failure to meet contractual service levels) rather than causing bodily injury or physical damage to a third party’s property. As such, Tech E&O coverage is a good complement to a CGL policy – if there is no coverage under the CGL policy because there is no physical damage or bodily injury caused by the error, a Tech E&O policy may provide coverage (and, conversely, a CGL policy would provide coverage where the error does cause physical damage or injury, which is usually excluded from the Tech E&O coverage). It is important to note, however, that the Tech E&O coverage does not provide blanket coverage for all contract performance claims or disputes. Generally speaking, Tech E&O policies only cover those defects or performance issues that arise out of the negligence of the insured (or, in some cases, its unintentional acts or omissions) – Tech E&O coverage does not protect an insured against its intentional failure to perform in accordance with a contract.
  • Tech E&O often provides coverage for the negligent acts of your subcontractors and independent contractors.
  • Tech E&O often provides coverage for claims of copyright infringement arising out of the covered activities of the insured. This can be especially useful against claims that your software or other work product was used without an appropriate license or was “copied” from copyrightable subject matter owned by a third party.

However, there are still important risks that a typical Tech E&O policy generally does not cover. For example, Tech E&O policies typically do not protect the insured against:

  • Claims of patent infringement; or
  • Data breach or other failure to protect personally identifiable information.

As these risks are typically not covered by either a CGL policy or a Tech E&O policy, the business should continue to consider the availability of other protections to mitigate these risks.

2. Data Breach and Malware – Cyber Risk Insurance (a/k/a Cybersecurity or Privacy and Network Liability Insurance). Protection against cyber risk may be obtained via a separate policy or, sometimes, may be added as coverage under another policy, such as a Tech E&O policy. As with any insurance product, coverage for cyber risk can vary widely from policy to policy, especially with respect to the scope of coverage and associated policy limits and sub-limits. Nonetheless, cyber risk coverage differs from typical CGL and Tech E&O polices in two important ways:

  • Cyber risk coverage expressly provides coverage for data breaches; and
  • In addition to protecting the insured against liabilities to third parties (which may include not only customers, business partners, and regulatory agencies but also the business’ own shareholders), cyber risk policies often cover the insured’s own losses arising out of a breach. These losses can include, for example:
    • costs of investigating the breach;
    • expenses of data restoration and recovery;
    • business interruption and expenses to get “up and running” again (which may include, under certain policies, “extortion” payments necessary to retrieve or restore data that has been encrypted or otherwise held for ransom by criminals); or
    • costs of any legally-required data breach notification and, if applicable, costs of credit monitoring for persons whose non-public information was compromised in the breach.

With respect to liabilities to third parties arising out of a data breach, a well-crafted cyber risk policy can protect the business against:

  • costs of defending against third party lawsuits and payment of settlements or judgments against the insured; and
  • costs of defense to investigations and prosecutions brought by regulatory or administrative agencies, along with payment of any resulting fines and penalties levied upon the insured.

Additional practical benefit. Of course, actually obtaining coverage against data protection risks is the ultimate benefit of acquiring cyber risk coverage; however, even merely reviewing the application forms can be of practical benefit to the business. This is because the application process for cyber risk coverage often includes a detailed questionnaire regarding the data protection and security practices actually employed by the business, which can can serve as a useful “self-assessment” to identify areas in which the business can improve its data protection and security practices.

3. Patent Infringement Liability Insurance. Patent litigation in the technology sector is at an all-time high, and this is attributable in large part to the proliferation of suits by “patent trolls” and other NPEs – entities who acquire patents for the primary purpose of enforcing them against others for monetary gain rather than actually utilizing the patents to create or market useful goods or services. However, claims of patent infringement are almost never subject to coverage under a CGL policy. (While some policyholders have successfully argued that such claims are in fact covered under the “advertising injury” provisions of a CGL policy, such successes are rare and very fact-dependent.)

Given this, some insurers have recently begun offering insurance products specifically tailored to protect the insured against third party patent infringement claims. The terms of available patent infringement liability policies can vary significantly, though the cost of such policies is uniformly high, no doubt owing to the costs of mounting a defense to a patent infringement claim and the potential for high damages awards if the defense is unsuccessful. Nonetheless, as with any insurance product, there are certain variables in the scope of protection purchased that can be tailored to help manage the purchase price, such as:

  • whether the policy covers the defense of a patent infringement claim only or covers both defense of the claim and indemnification obligations owed to a third party;
  • whether the policy covers other attendant costs and expenses incidental to a patent infringement claim, such as product redesign costs; and
  • whether the policy protects against any and all patent infringement claims or merely protects against “weak” cases commonly associated with “patent trolls” (in the latter situation, the policy may state that coverage will not apply unless the insurer determines that the insured stands a substantial chance of success against the infringement claim).

When considering whether to purchase patent liability infringement insurance, it is important to keep in mind that most policies will exclude coverage for a given patent infringement claim if the insured had previously been threatened by the owner of the patent or was otherwise aware of a risk that it would be sued for infringement of that patent.

Joel L. Thomas Joins FH2

We are pleased to announce that Joel L. Thomas has joined our Firm as an associate attorney.  Joel joins the FH2 telecommunications practice group and focuses on state, federal and local regulatory matters, as well as legislative and public policy advocacy. Joel began his career serving as a law clerk in the Cybersecurity and Communications Reliability Division and Policy and Licensing Division of the Federal Communications Commission. He received an undergraduate degree in Marketing, with a Logistics Minor and a Finance Collateral, from the University of Tennessee.  He earned his law degree from the University of Georgia in 2014.

Joel may be reached at jthomas@fh2.com or at 770-399-9500.  For more information on Joel, please Click Here.

You Have Been Served | What to Do if You Have Been Served with Legal Papers

If you are served with legal papers, you must stop normal activities and take immediate action. What you must do and when you must do it depends on a number of variables (some of which are discussed in the next paragraph). Exploration of those variables is beyond the scope of this article. Instead, this is a quick summary and checklist of issues to consider, actions to take, and the time in which those actions must be taken.

The legal papers may come from a criminal court, from a court that handles civil disputes, or from an administrative agency. The papers may be a notice of an urgent hearing seeking immediate relief, a lawsuit against you, or a subpoena requiring you to produce documents or testify. You may have been served individually, or your company may have been served. The papers may be from a federal court or a court of the state. Within the state system, there are often several levels of courts.

This summary is written from the perspective of a small to mid-size business, although many of the issues apply equally to legal papers served on individuals or on large businesses. Businesses that have received such papers before may have procedures in place to address these issues, hopefully incorporating the points made in this article.

What Legal Papers Were Served?

Notice of a Hearing: The papers may provide very short notice of a Hearing, seeking a Temporary Restraining Order or an Injunction. Such papers require immediate attention.

Summons & Complaint: The Summons is a notice from a court that a lawsuit has been commenced against you or your company. The Summons tells you the time by which you must respond. The Complaint is the statement of the other party’s claim against you or your business.

Subpoena: Even if you are not a party to a lawsuit, you may be compelled to collect information and to give testimony in a legal proceeding. You have a limited time to object to the scope of a Subpoena, to seek to narrow the collection of information, and to seek compensation for the expense of compliance.

How Were the Papers Delivered?

Sheriff or Process Server: Commonly, such papers are delivered by a Sheriff or a Process Server; however, legal papers may be validly served in other ways. Always assume that the legal papers were properly served. (Your lawyer may later determine that service was not proper and raise a defense.)

Certified Mail or Statutory Overnight Delivery: Legal papers may arrive by Certified Mail – Return Receipt Requested or by UPS, FedEx or other such method that requires you to sign for the delivery. Do not avoid service by refusing to sign or by refusing to retrieve the Certified Mail from the Post Office.

Substituted Service or Publication: There are limited circumstances under which the other side may be able to “serve” you or our company by serving the Secretary of State or by publishing a notice of the lawsuit in a County Legal Organ, which is a newspaper authorized by applicable law to publish notices of legal proceedings. Even though you may not have actually seen the legal notice, the law will treat the substituted service or publication as valid service upon you or your company.

Novel Methods: As more communication and commerce are done by electronic devices, the boundaries are being pushed. A few courts have allowed electronic service. It is not yet common; however, if you are concerned that you may have received legal papers electronically, ask your lawyer.

Who May Be Served?

Personally: The papers may be served on you, individually, or as a representative for your company. You may be served at your work, at your home, or at any place you are found.

Person with whom you reside: The papers may be properly served on an adult who resides with you.

Agent or Employee: Your business may have designated an Agent for Service of Process or service may be attempted on an employee or other agent of your company. Your Agent or employee must be aware of the issues discussed in this article.

What is the Time For Response?

Read the papers and get an idea of when action is required. Putting aside the sometimes complex rules for counting dates, generally:

Notices of Hearings seeking urgent legal relief (TROs or injunctions) typically have very short deadlines. The date will be shown in the Notice. Your first call should be to your lawyer.

Subpoenas generally specify the date for a response or compliance with the Subpoena. In addition, the Subpoena may require the filing of any Objections you may have on or before the time specified for a response. While the deadline to file an Objection is often 10 or 14 days after service, it can be earlier.

Summons & Complaint: a Summons typically states the time within which a response must be filed, generally 21 days from the date of service for proceedings in federal court and 30 days from the date of service for proceedings in Georgia courts.

What to do?

As soon as you are aware of legal papers, you should make a note of how, where, when, and by whom the papers were received. Make those notes on the papers or on some other record maintained with the original copy of the papers.

Never ignore legal papers, even if you believe they were not properly served or that the claims are groundless. If you ignore the papers, you may miss your opportunity to resist the imposition of a Temporary Restraining Order, you may lose the right to object to a Subpoena or to seek compensation for the costs of complying, or, if you ignore a Summons & Complaint, every allegation of fact will be deemed admitted and default judgment will be entered against you or your business.

Instead, contact your lawyer, your insurer, and contact the business that may have agreed to indemnify you (for example, pursuant to a contract). Failure to give notice may cause you to lose your right to contest the relief sought, lose your insurance coverage for the claims at issue, or lose your right to be indemnified.

Immediately upon service, you should collect all necessary information, e.g., the names and contact information of witnesses and identification of relevant information and documents. Once identified, you must preserve the paper files and electronic files on computers.

Who to Contact?

Your Lawyer: Service of legal papers triggers important deadlines, and action must be taken before those deadlines expire. If you do not take appropriate action within those deadlines, you lose the right to defend against the lawsuit – even if the lawsuit has no merit. You must immediately notify your lawyer about the notice, suit, or subpoena so that your lawyer can determine the important deadline dates and file the necessary responses.

In addition, you may have a claim against the person or entity that sued you or your business, called a “counterclaim.” Some such counterclaims are “compulsory” and must be made at the time when you respond to the Summons & Complaint. Discuss these with your lawyer immediately so that your lawyer is able to timely assert any compulsory counterclaims.

Insurance Carrier: Your insurance policy can be a great benefit, not only paying for any damages that may be found due but, often as importantly, paying for the cost of your defense. The insurance policy, however, has important conditions that must be met in order for the insurer to provide coverage and a defense for a given claim. Those conditions include notifying the insurer of a potential claim and immediately transmitting a copy of the legal papers to the insurer. Failure to meet those conditions within the time required by your insurance policy could result in a denial of insurance coverage for the claim, even if the claim is otherwise “squarely” covered by your insurance policy.

Another Business: You may have negotiated contract terms with another business requiring that business to indemnify you or your company or to purchase insurance protecting your company. You and your lawyer should explore whether any such rights are available and, if so, immediately notify that other business and tender the defense of the action.

Confidentiality of Your Communications.

Your communications with your lawyer seeking legal advice about the legal papers are privileged, as long as those communications are maintained in confidence by you.

Conversely, anything you say to the Process Server, to the author of the legal papers, or to your co-workers may be used against you in the legal proceeding. You should not comment upon or discuss the matter with the Process Server, the adverse party, or your co-workers unless instructed to do so by your lawyer. Be careful about who is in the room when you speak and to whom copies of emails are sent.