For your Review! Thank you for all your support! Sincerely, Leslie A. Fischman "AML Compliance in the UK and the US" ![]()
0 Comments
Blog Post: http://www.mymollydoll.com/mymollydoll/dissertation-draft-will-begin-again-tomorrow-by-leslie-a-fischman-for-thomas-jefferson-school-of-law by: Leslie A. Fischman ![]()
"Social Media and Wealth Management"
10/07/18 By: Leslie A. Fischman Topic: Confidentiality and Social Media Confidentiality applies to “strategic business plans; market and competitive assessments, analyses, studies, profiles, and forecasts.”[1] The purposes for protective orders are to prevent the complication of matters and interests to the privacy of user data and information protected by the FTC.[2] There are plenty of risks associated with the storing and compiling of confidential information” requiring “good cause” on behalf of the party to whom a protective order is granted to prove that “an unacceptable risk of, or opportunity for, "inadvertent disclosure" of that information” presents itself, in the face of exposure.[3] There are issues as to the predictability of disclosure of confidential information, and it is argued that the consequences of disclosure are irreversible, and upon disclosure, a series of repercussions exist that are automatically occurring upon exposure to confidential information, that it cannot be reversed, knowledge of information, and communications resulting from knowledge of such information. Therefore, whether disclosure is inadvertent or purposeful, is the measure by which “careful and sensitive assessment”[4] is taken to determining whether inhouse counsel or outside counsel should be chosen during any “competitive decision-making”[5] process. Why? Because “It is very difficult for the human mind to compartmentalize and so suppress information once learned, no matter how well-intentioned the effort may be to do so.”[6] Employees designated the responsibility of handling confidential information are determined by whether, upon court approval, a confidential order, they are designated to handle “competitively sensitive information.”[7] Upon disclosure of information on social media, one of the factors under assessment by FTC regulations are trade secrets, it is the preference of companies to select employees to whom confidential information is considered understood, and no nuanced opinion of information, would interfere with their ability to protect by court order, knowledge if made so, of information requiring an “intimat[e] familiar[ity] with the processes and formulations” of such confidential information.[8] This applies to not only trade secrets, but also to mergers[9], which may or may not require disclosure of confidential information, to sensitive decision making processes as applied to “antitrust counseling and litigation, mergers and acquisitions, and capital financing.”[10] The only way to protect use of confidential information from social media is to “carve out a special category of Highly Confidential information for them that is not accessible to in-house designees” this is to prevent the sharing of information that cannot be uninfluenced by exposure to information, from spilling out onto social media, and by creating rules for outside counsel to follow, who are not subject to such psychological limitations presented by exposure to confidential information, as they are not the ones sharing or posting on social media, unaffected as inhouse counsel would be, as seen by third parties. Reference: FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [1] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [2] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [3] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [4] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [5] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [6] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [7] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [8] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [9] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 [10] FTC v. Advocate Health Care Network, 162 F. Supp. 3d 666, 2016 U.S. Dist. LEXIS 24788, 2016-1 Trade Reg. Rep. (CCH) P79,519 "Social Media and Wealth Management"
10-06-18 By: Leslie A. Fischman Topic: “Online Advertising and Marketing Developments” The growth in online “digital and internet advertising” [1] has resulted in “new guidelines … complicating companies’ compliance programs.” [2] Whenever “marketing” is used for social media, there are a few “regulatory concerns” [3] to keep in mind, by compliance officers. The primary role of compliance officers to financial firms is to protect the reputation of their companies. [4] Protecting the “integrity of the markets” [5] means staying in compliance with “Securities Exchange Commission (SEC)” their primary concern being “communications pertaining to conducting business.” [6] Among the requirements are “truthful, not misleading, [while] includ[ing] risks and … proper disclosures.” [7] What is communicated to and from associates within a business is just as important as communications sent from businesses, especially online on social media. One of the ways in which social media use may be monitored is by “limit[ing] engagement with pre-approved content.” [8] Every firm is different when it comes to their “risk tolerance” [9] with policies that reflect the principles by which a company operates. Some companies opt not to engage in the use of social media, but some seek “to increase their online presence via digital and internet advertising.” The FTC has “published guidelines that digital advertisers like financial service companies … [have used when] consider[ing] … marketing their products online.” [10] Its important to note that “online marketing efforts …span” beyond “multiple digital platforms.” [11] These spaces include “personal computers to tablets to mobile phones” [12] including the product itself being marketed, by uses of technology. In marketing products, sometimes influencers are used to market a company, who must abide by “written social media polic[ies] that provid[e] guidance to their influencers.” [13] Social media is but one “digital communications network” that has the primary responsibility of its members to companies, to comply with guidelines set forth by the FTC, especially with regards to communications within a company. [14] The FTC is responsible for taking “reasonable steps to secure [the] personal data and information” while “handling consumers’ sensitive data” and be sure not to compromise “the level of care the company” applies to “privacy and security features in their marketing materials.” [15] Reference: [1-2,4-13] 73 Bus. Law. 517 [3] https://www.forbes.com/sites/joannabelbey/2017/09/06/social-media-and-a-day-in-the-life-of-a-compliance-officer/#6d61b2905b11 [14-15] Internet Law and Regulation [1] 73 Bus. Law. 517 [2] Id [3] https://www.forbes.com/sites/joannabelbey/2017/09/06/social-media-and-a-day-in-the-life-of-a-compliance-officer/#6d61b2905b11 [4] Id. [5] Id. [6] Id. [7] Id. [8] Id. [9] Id. [10] Id at 1. 73 Bus. Law. 517 [11] Id at 1 73 Bus. Law. 517 [12] Id at 1 73 Bus. Law. 517 [13] Id at 1 73 Bus. Law. 517 [14] Internet Law and Regulation [15] Internet Law and Regulation Whether Technological Advancements Have Infringed Upon Ones Right to Privacy?
10-03-18 By: Leslie A. Fischman As a company, ones online identity is defined by their “domain name” [1] a unique identity protected by “trade marks and [principles of] branding.” [2] From that platform, information can be disseminated, although alterations to protected works are not covered by copyright infringement laws, subsequent “right to distribute modified copies of the work” [3] are by “rights given to the author.” [4] Digital communication networks and digital trail[s] [5] track exactly that, what is being produced, how its being produced, and who is being affected by the production of that material source. So-called “wrongdoers” are individuals who engage in the “unlicensed” sharing of “music and video” which has been considered a copyrighted work. [6] There is a difference between the “old copyright laws [of] the internet and … electronic submission[s] [which] can have the unexpected consequence of increasing the reach of copyright.” [7] Traditional copyright laws, differ from those of the internet, because such “over-protection” delineates subtle differences between “primary and secondary infringement,” [8] primary meaning the “copying” of works, and secondary meaning the “distribution” of works, liability is therefore based upon “knowledge” to some “fixed [degree]” that the “distribution of the information” falls within one of these two definitions of traditional copyright laws as applied to the internet. [9] One of the main concerns of distribution of copyrighted works, not authored by or with permissions from the one to whom rights have been given, occurs when faced with the possibility that subsequent additional works can be created by use of technology, “recreated by computer,” the key issue being whether the law extends so far as to over-protect further uses beyond the initial violation, primary or secondary, misuse of copyrighted works. In fact, “the advent of digital technology has overturned the underlying economic assumptions of the original law.” [10] That being said, “every act of electronic distribution is also an act of copying if a transient copy counts as infringement.” [11] One forum to help raise awareness, as to copyright laws, and the dissemination of information that may or may not be protected by copyright laws granted to the author, is social media. Building “situational awareness culling data [can help to] obtain a clearer picture.” [12] FEMA discusses the significance of the sharing of information online, and warns that “rumors and misinformation can spread quickly over social networks” however, not all networks are “self-correcting [requiring] swift intervention [to] dispel rumors spread [by] new information [or] common practice[s].” [13] In the event of an emergency “responding quickly and effectively” can help to curtail the misuse of “new, incorrect, or conflicting information.” [14] Part of the process of responding in cases of emergency to the misuse of information by rumor, is to “engage the community and [to] build mutual trust.” [15] Reference: [1] – [11] Internet Law and Regulation 4th Edition [12] IS-0042 – Social Media Emergency Management, FEMA |
AuthorLeslie Fischman Archives
August 2020
Categories |