Tag Archive | "Law Tips"

Practical Considerations in Family Law Mediations

Have you reviewed your mediation techniques lately? Let’s take a few minutes to go over a list of practical considerations from Jill Goldenberg Schuman, a mediator, arbitrator and lecturer in family law. Here are some reminders she included in her recent CME for Family Mediators program:

Practical Considerations in Family Law Mediations:

  • Call attorneys in advance to obtain a better understanding of the case and/or determine preliminary issues.
  • Consider staggering start times.
  • Consider giving back up dates.
  • Review statements in advance. Develop a mediator’s strategy but be careful not to push what you believe is the best solution right off the bat.
  • If you have marital balance sheets or information in advance of the mediation, create a comparison so the attorneys and their clients can readily identify the disparities in their numbers. Just the other day at the conclusion of mediation we realized that one attorney’s number included several accounts so there was double dipping. It allows each attorney to look at their sources and offer corrections.
  • Be Patient.
  • Listen- repeat back if necessary to make sure you have it right
  • Problem Solve- do not just carry offers back and forth- offer solutions. I have a tip sheet for some that have arisen.
  • Be compassionate.
  • Be open to learning- allow an attorney or a party to educate you on an area.
  • Bond with the attorneys and parties. They need to trust and respect you.
  • Identify each party’s goal and priorities of goals early on in the day.
  • If having a hard time- go off “balance sheet” – ie, itemize what each side is getting.
  • Explore realistic settlement with the attorneys and parties based on the competing spreadsheets. Taking in an offer of 80% on a spreadsheet that is way higher without justification doesn’t make sense.
  • Brainstorm with the attorney and his or her client to keep them engaged. Allowing them to just say no or offering criticism will not assist in getting it resolved.
  • If you think the offer will not fly in the other room, ask for a basis for their offer so you can offer an explanation if asked when delivering the offer.
  • Do not allow yourself simply to be a conduit of negative information.
  • Don’t reveal a confidence learned in caucus without permission. If you think you might want to use something later – ask if you can use it if the time becomes appropriate.
    • Check in periodically with the other room if you are in one room for an extraordinary amount of time
    • Remind parties periodically that mediation empowers them and that they are in control of the outcome.
    • Explore financial considerations of going to trial. (Not just attorney fees and litigation costs but explore carrying costs- ie, what a person is paying each month— how long they will pay it before the likelihood of a court order).
    • Suggest calls to experts such as accountants/HR department/bank.
    • Help the parties see the positive aspects of where they have come each pass.
    • Don’t report anything to the Court other than settlement or no settlement.

2.7(E) says that within 10 days a mediator shall submit to the court without comment and without recommendation a report of the mediation status- i.e., was it settled/didn’t settle/partially settled or rescheduled as still going. WITH THE CONSENT OF THE PARTIES the mediator’s report may also identify any pending motions or outstanding legal issues, discovery process, or other action by any party, which, if resolved or completed, would facilitate the possibility of settlement.

The road to resolving conflicts in family mediations can be bumpy. I hope these reminders from Jill Goldenberg Schuman help to keep you rolling more smoothly. For additional information the e-publication for “CME for Family Mediators” includes Jill Goldenberg Schuman’s training along with other outstanding instructions from our family law expert panel.

_________________________________________________________________________________

About our Law Tips faculty participants:
Jill Goldenberg Schuman, Cohen, Garelick & Glazier, Indianapolis, concentrates in the areas of family law and alternative dispute resolution.  Ms. Goldenberg Schuman received her B.S. in business from Indiana University in 1990 and her J.D. from Boston University School of Law in 1993. She is certified by the Indiana Certifying Organization of the Indiana Bar Association as an Indiana Certified Family Law Specialist. She is also a registered domestic mediator. Jill is a lecturer in various family law and alternative dispute resolution topics for ICLEF.

About our Law Tips blogger:
Nancy Hurley has long-standing connections with Indiana lawyers. She was formerly a member of the ISBA and IBF staffs for over 30 years. Nancy’s latest lifestyle venture is with ICLEF. We are utilizing her exceptional writing and interviewing skills while exploring how her Indiana-lawyer background fits with ICLEF’s needs. When she isn’t ferreting out new topics for Law Tips, her work can be found in our Speaker Spotlight blogs, postings on the ICLEF Facebook and Twitter pages, and other places her legal experience lends itself.

Thank you for reading Law Tips. You may subscribe to this weekly blog through the RSS link at the top of this page.  Also, you are encouraged to comment below or email Nancy. She welcomes your input as she continues to sift through the treasure trove of knowledge of our CLE faculty to share with you.

ICLEF • Indiana Continuing Legal Education Forum, Indianapolis, IN

Posted in Law Tips, NewsComments (0)

So What’s An Employer To Do In The Current Social Media Situation?

How do you counsel a client whose employee is making questionable posts online concerning his/her job?  Advising employers these days involves staying on top of numerous evolving social media issues. Those specific challenges are met daily by Jan Michelsen, our faculty participant from Ogletree, Deakins, Nash, Smoak & Stewart, Indianapolis.  Jan has broad experience in counseling and defending management in a myriad of labor and employment law matters. She provides fellow lawyers with the benefit of her expertise during ICLEF’s “Recent Developments in Employment Law” seminar. I am grateful that she agreed to bring Law Tips readers some food-for-thought on current trends and how employers might set policy to avoid problems. 

According to a 2014 BTI Consulting survey, the growth of social media will lead to employment litigation being 1 of only 4 areas of law projected to grow in 2014. Another interesting piece of survey information was that this growth may be more in counseling than litigation. This study also emphasizes that social media use is still expanding as people increase the types of devices they use for this purpose: desktops, laptops, tablets and smart phones. One example of this growth speaks loudly in the fact that there are over 400 active social media sites today.

The workplace social media issues now involve risks to eee’s and eer’s of social media-based personnel decisions, new privacy legislation, ownership of social media accounts and risks for attorneys. This burgeoning social media activity includes employers vetting applicants through observance of their online activity. In response to this increased practice there are online resources making potential applicants aware of where they may be watched. An example of one tool is WeKnowWhatYoureDoing.com that calls itself a social networking privacy experiment. Concerned employees can go to this website to find what pieces of their Facebook activity are publicly viewable, in case they may wish to delete some of their posts.

There are other types of sites that exist to assist people in being safe online, in avoiding employment problems. For instance, the Digital Information World website has advice on the dangers of using social media under the influence. One can find there the topic entitled “Are You Sure You’re Cool To Tweet Right Now?”  that includes reminders such as this: Drink 4: Threat level = Irresponsible, in danger of texting your ex.

Another illustration of the prominence of social media in the employment world is the widely-accepted term: “dooced.”  Dooced is Internet slang for being fired from your job because of what you’ve written in a blog or website. The cases of people losing their jobs over social media activities is a growing trend. For example, here are the top 10 posts that will get you fired:

  • Hating your job.
  • Public persecution.
  • Drinking and driving.
  • Public intoxication and hangovers.
  • Relationship troubles.
  • Your great timeline milestones.
  • Steer clear of controversy.
  • Moonlighting.
  • Cursing a LOT.
  • Posting anything bad FROM work.

From the other side of the above situation, the involvement of social media in employment is becoming so public that employees are asking on Facebook to be fired, they are hijacking Twitter accounts to broadcast live tweet firings. Employees are even quitting via video; and coal miners and teachers have “gone wild” with their own accounts for these purposes.

These developing uses of the Internet in employer/employee relationships brings the discussion around to the resulting lawsuits. The important question for employers is:

What are employers being sued about in social media based decisions?

  • Discrimination.
  • Retaliation
  • Harassment
  • Anti-union animus
  • Disclosure of confidential information
  • Invasion of privacy
  • Defamation
  • Violations of HIPAA, ADA, FMLA
  • Negligent hiring or supervison

So, What’s An Employer To Do?

  • Draft policies that are consistent with and incorporate other company policies.
  • Think twice before firing or disciplining for social media activity.

Be sure no other employees are involved.

Talk to your legal counsel.

Be wary when posts are expressions of opinion.

  • NLRB will look beyond the words of the policy and to the context and totality of circumstances and the nature of the charging party’s individual dispute.
  • It’s critical to have appropriate monitoring policies and practices, as NLRB will consider how you learned about the social media discussion that prompted the adverse decision; i.e., public postings v. surreptitious discovery.
  • No quick triggers. Analyze each situation just as you would communication by other means.

Here are some employer disclaimers you may want to include:

  • “This policy is not intended to interfere in any way with any applicable federal, state or local law.”
  • “Application of this policy will be consistent with the National Labor Relations Act.”
  • “This policy will not be interpreted or enforced in a manner that would interfere with employees’ rights to discuss work-related issues with one another.”

Control your social media:

If an employee maintains an accounts on the employer’s behalf, address ownership issues.

  • Written social media-specific agreements.
  • Company should create/register the account.
  • Change the password when an employee leaves.
  • Result may differ based on when the account was created, who maintains it, and what kind of content.

What Would YOU Do?  When social media issues hit home, think about:

  • Source(s) of the information.
  • Which policies may be indicated.
  • Potential effects on employee morale.
  • Potential public relations implications.
  • Potential liability.
    • For the post itself.
    • For the disciplinary action.

Hopefully this overview of social media’s involvement in employment law will assist when the next issue develops for you or your client.  Thanks very much to Jan Michelsen for providing her timely advice for guiding employers in social media policy. If you are interested in the comprehensive On Demand Seminar, “Recent Developments in Employment Law”, Click Here.

_________________________________________________________________________________

About our Law Tips faculty participants:
Jan Michelsen, Ogletree, Deakins, Nash, Smoak & Stewart, P.C., Indianapolis, counsels and defends management in various labor and employment law matters. Her areas of expertise include employment discrimination litigation, EEOC charges and complaints, sexual harassment, the ADEA, the ADA, the FMLA, WARN, in federal and state courts and before regulatory agencies.  She also counsels in the area of employment contract disputes, employee privacy issues, social media and Web 2.0, electronic communications, wage and hour issues, wrongful discharge claims, and other state tort claims, such as defamation. Prior to her legal career, Jan directed communications, strategic planning, and marketing functions as Director of Business Development at Indiana University Medical Center.

About our Law Tips blogger:
Nancy Hurley has long-standing connections with Indiana lawyers. She was formerly a member of the ISBA and IBF staffs for over 30 years. Nancy’s latest lifestyle venture is with ICLEF. We are utilizing her exceptional writing and interviewing skills while exploring how her Indiana-lawyer background fits with ICLEF’s needs. When she isn’t ferreting out new topics for Law Tips, her work can be found in our Speaker Spotlight blogs, postings on the ICLEF Facebook and Twitter pages, and other places her legal experience lends itself.

Thank you for reading Law Tips. You may subscribe to this weekly blog through the RSS link at the top of this page.  Also, you are encouraged to comment below or email Nancy. She welcomes your input as she continues to sift through the treasure trove of knowledge of our CLE faculty to share with you.

ICLEF • Indiana Continuing Legal Education Forum, Indianapolis, IN

 

Posted in Law Tips, NewsComments (0)

Electronic Spying & Your Cell Phone: Protecting Your Family Law Clients

Welcome back to Law Tips. I’m pleased to continue the discussion of digital evidence with valuable commentary on electronic surveillance by Tim Wilcox, of International Investigators, Inc. In last week’s Law Tips our family law panel offered interesting information on current trends in digital evidence and a few pointers for keeping your clients private activities private. If you missed it, you’ll find that post at the conclusion of this article.

Have you had experiences with clients, or perhaps on your own, that made you suspicious that activities may have been surveilled through a cell phone? Would you recognize the signs of spyware? Tim Wilcox assures you  that illegal surveillance through a cell phone is a definite possibility. The following are facts and examples he offers to assist you in providing counsel and making a decision on how to proceed in this digital age.

Cell Phone Spyware Facts:

  • The manner in which spyware is installed on the phone is dependent upon the capabilities of the phone itself.
  • Smart phones can have spyware downloaded from websites, Bluetooth connection, mms messages, and pc connection.
  • There is no single spyware program that can be installed on all phones since there are many different OS’s and each one must have code written for the specific OS.
  • Symbian OS is the most common OS but has hundreds if not thousands of different versions depending on the software development intended on the device. Many spyware programs cannot work for more than a few versions, if even more than one version.
  • Spyware programs that can be installed via Bluetooth connection claim to be able to install software remotely but as with all Bluetooth devices it must have been paired with the target phone first.
  • It is possible for the remote installation of spyware onto a target phone, but this involves “tricking” the user into downloading and installing the malware.
  • Sending bogus mms messages with the intent to install malware is the easiest way to trick a target user. By sending messages with fake links could get the user to unknowingly download spyware programs. Most of these attacks involve making the user think the messages came from the carrier and posing as upgrades to the firmware on the phone especially through email. Some techniques use photos embedded with third party stegnography hiding the spyware.
  • Some spyware claims that it can extract data and voice from a target phone without installing any spyware on the target phone. We are still researching a specific software with this claim but at this time we can neither confirm nor deny this possibility.
  • Spyware programs can collect the following information and possibly more: contact data, mms, sms, phone call history, email history, webpage history, pictures, video, GPS location, cell tower triangulation history (less accurate), file system information.
  • Spyware programs can remotely become a covert third party to conversations as well as use the phone as a bug so that room audio is available whenever the bad guy chooses. The spyware can alert the bad guy when a call is made as well as texts and emails so they can call the phone and listen in. No call history for the bad guys phone is saved on the phone although it will show up in the service providers records.
  • As far as prevention of spyware installation is concerned, Blackberry’s have the best protection by far. The security code can only be guessed a certain number of times before it completely erases all information from the phone and has no obvious “backdoor” to circumvent this issue. Other phones can be protected more or less by passwords but the password must not be too easy to guess and some phones can allow a reset of the password, which is not that hard to accomplish in the wrong hands.
  • There is no known blanket spyware protections that will protect all cell phones.

What Are Some Indicators That My Cell Phone Might Have Malware/Spyware?

Top 10 suspicious indicators that your cell phone might have illegally installed spyware:

  1. Battery is warm when not in use
  2. Battery life is noticeably diminished each day.
  3. Some Blackberry’s; communication icon on right screen is flashing.
  4. Small pauses of audible communication while talking.
  5. Light audible tones, beeps or clicks throughout conversation.
  6. Flashing or flickering on display or change of brightness.
  7. Some spyware programs require the spy to manually mute their phone, therefore you might hear them in the background at the beginning of conversation or when they tap in.
  8. Slower internet access.
  9. Suspicious 3rd parties have detailed knowledge of your private conversations and locations. (GPS)
  10. You have opened a suspicious email or one from a potential spy. (Allowing Trojan horse to install spyware remotely)

The smarter the cell phones the easier it is to hide spyware. If the eavesdropping perpetrator has effectively installed spyware on your phone, then that perpetrator has total control, i.e. obtain all text messages, emails, internet sites visited GPS location, photos and videos obtained, etc.

Can I Examine the Cell Phone Myself to Obtain Evidence?

It is nearly impossible on most phones to detect malware without the use of sophisticated software. Not only is forensic spyware detection software expensive, it is also highly complex and difficult to master. Furthermore, the software is only as good as the examiner who utilizes it. The examiner must not only know how to operate the software to its full potential but also be able to manually search through the data (lines of code) to find the spyware. This is particularly useful if any evidence obtained is to be introduced into a court of law.Credibility is very important in technical evidence.

Making the right decisions on acquiring and protecting digital evidence is becoming more important every day in the family law practice. I thank Tim Wilcox for providing an introduction to the cell phone spyware facts that could be effecting clients as we speak. Find more digital surveillance information at: www.iiiweb.net.   And keep an eye on this blog for more advice.

If you are interested in viewing the comprehensive On Demand or Video Replay presentation of “Electronic Spying and Tracking Spouses in Divorces:  What’s Available? What’s Appropriate?” from ICLEF’s Annual Family Law Institute, Click Here.

_________________________________________________________________________________

About our Law Tips faculty participants:
Tim Wilcox, International Investigators, Inc, CEO, Indianapolis, is a skilled and well-known Indiana investigator.  He specializes in security consultation, internal theft investigations, protection of proprietary information and communications, computer and cellular forensics, and litigation support.  He has been instrumental in reducing corporate shrinkage and eliminating vulnerabilities for companies worldwide. Mr. Wilcox is a member of the World Association of Detectives, the National Assn. Of Legal Investgators, the Society for Competitive Intelligence Professionals, the American Society for Industrial Security and the Indiana Association of Professional Investigators.

About our Law Tips blogger:
Nancy Hurley has long-standing connections with Indiana lawyers. She was formerly a member of the ISBA and IBF staffs for over 30 years. Nancy’s latest lifestyle venture is with ICLEF. We are utilizing her exceptional writing and interviewing skills while exploring how her Indiana-lawyer background fits with ICLEF’s needs. When she isn’t ferreting out new topics for Law Tips, her work can be found in our Speaker Spotlight blogs, postings on the ICLEF Facebook and Twitter pages, and other places her legal experience lends itself.

Thank you for reading Law Tips. You may subscribe to this weekly blog through the RSS link at the top of this page.  Also, you are encouraged to comment below or email Nancy. She welcomes your input as she continues to sift through the treasure trove of knowledge of our CLE faculty to share with you.

ICLEF • Indiana Continuing Legal Education Forum, Indianapolis, IN

 

Posted in Law Tips, Sale/Featured ItemsComments (0)

The Age of Digital Evidence: Protecting Your Family Law Clients

Whether you find the digital evidence age interesting and challenging or consider it a frustration and nuisance, it makes no difference. The evidence is clear.  Among the many fields of law taking a head on plunge into this arena is family law. Lawyers are busy preparing clients for the electronic exposure that is possible in their everyday activities.  Otherwise, these challenges may sneak up on you.

Fortunately, our faculty members are willing to share their expertise in these electronic tracking developments. I appreciate the contributions of  Ryan Cassman, Judge Andrea Trevino, Tim Wilcox, and Bob Zoss. Following is a sample of their training session during ICLEF’s 11th Annual Family Law Institute  entitled “Electronic Spying and Tracking Spouses in Divorce: What’s Available? What’s Appropriate?”

Our panel begins by looking at the trends that are bringing digital evidence into play for many practitioners:

The Trend of Digital Evidence
94 percent of 1,600 lawyers recently surveyed by the American Academy of Matrimonial Lawyers (AAML) claimed that text messages had increasingly become the most damaging evidence in divorce cases. The same survey shows sharp increases in evidence via texting (62 percent), social media (81 percent) and emails (23 percent).  (http://www.aaml.org/about-the-academy/press/press-releases/divorce/lawyers-finding-divorce-app-smart-phones)

The New Addiction?
Facebook currently estimates its monthly active users at 845 million and its daily active users at 483 million. This means that more than half of all active Facebook users access the site daily.  (http://jamesburchill.com/how-many-active-users-does-facebook-really-have)

And in case that doesn’t amaze you, how about these stats:

  • 65% of online adults use social media.
  • 89% of those under 30 use social media.
  • 69% of those under 30 use social media DAILY.

Courts are entering orders impacting social media data
In the Gallion case in Connecticut (http://www.forbes.com/sites/kashmirhill/2011/11/07/judge-orders-divorcing-couple-to-swap-facebook-and-dating-site-passwords) the husband saw things on their shared computer that made him suspect incriminating evidence would be found in the wife’s social media accounts.  The Court ordered the divorcing couple to hand over the passwords to their online dating accounts to their opposing counsel.

Truth Trumps Privacy
Divorcing parties may be granted full access to MySpace and Facebook, including private and deleted data. See Romano v. Steelcase, Inc., 907 N.Y.S.2D 650 (Sept. 2010) And another example of divorcing parties being ordered to turn over passwords, usernames and logins for social networking sites is Zimmerman v. Weis Markets, Inc. (May 19, 2011, Pennsylvania).  (http://www.scribd.com/doc/59083827/Zimmerman-v-Weis-Markets-Inc)

Considering the looming reality of these activities, what should be the lawyer’s instructions to his/her clients? Following is succinct advice offered by these experts for preventing problems:

Litigation Checklist for Your Clients

  • Don’t brag.  Think twice about “bragging” to your ex via any social networking post.  Party pics can get you in trouble in more ways than just one.
  • Block your ex.  Block your ex-spouse from all your social media sites and consider blocking or limiting availability to certain family, friends and colleagues who are sympathic to your ex-spouse.
  • Change your passwords and protect your digital equipment. It is possible your ex-spouse has or had access to your laptop or smart phone and can hijack passwords and even install spyware software. Take the time to change all your important passwords. If you suspect spyware or are just curious, you can take your laptop or smart phone to a spyware detection specialist.
  • Stop Checking In and Geotagging. Don’t let everyone know your whereabouts during this sensitive time in your life.  It’s time to chill out on any location services software such as “check ins” on your iPhone or with Instagram’s newfangled “geotagging” capabilities.

Of course, the legalities pertaining to digital evidence is a topic for an in-depth discussion. These faculty members’ presentations extend into such areas as Authentication and Preservation of Social Media Evidence, the Electronic Communications Privacy Act of 1986 and the Indiana Voyeurism Law. For their thorough training session the 11th Annual Family Law Institute is available as an On Demand Seminar and as Video Replay’s by Clicking Here.

One could say that the overall advice from this family law panel is: Be aware of the impact of your digital activity and the possibilities of digital watching!  Fortunately, I’m able to add to the discussion of digital surveillance with further commentary by our security expert, Tim Wilcox, CEO of International Investigators, Inc. Stay tuned for next week’s Law Tips when Tim provides enlightening information about malware and spyware that may be lurking on your clients’ cell phone.

_________________________________________________________________________________

About our Law Tips faculty participants:
Ryan H. Cassman, Coots, Henke and Wheeler, Carmel, Indiana, focuses his practice on representing individuals in divorce, collaborative divorce, custody, adoption, guardianship and support matters. His practice also includes drafting and negotiating premarital agreements, and with other attorneys at Coots, Henke and Wheeler, assisting clients in preserving their business interests and investments, pre and post-divorce. Ryan is a Certified Domestics Relations Mediator and a Certified Family Law Specialist.

Andrea R. Trevino, Magistrate, Allen Circuit Court, Fort Wayne, Indiana, was appointed to her position in August 2013. She presides primarily over the IV-D Division of the Circuit Court. Ms. Trevino grew up in Fort Wayne, Indiana and received her J.D from IU Law School Bloomington in 2003. Prior to her appointment as Magistrate, Andrea practiced law for ten years, concentrating in family law, civil litigation and appellate work.

Tim Wilcox, International Investigators, Inc, CEO, Indianapolis, is a skilled and well-known Indiana investigator. He specializes in security consultation, internal theft investigations, protection of proprietary information and communications, computer and cellular forensics, and litigation support.  He has been instrumental in reducing corporate shrinkage and eliminating vulnerabilities for companies worldwide. Mr. Wilcox is a member of the World Association of Detectives, the National Assn. Of Legal Investgators, the Society for Competitive Intelligence Professionals, the American Society for Industrial Security and the Indiana Association of Professional Investigators.

Robert E. “Bob” Zoss, Sr., Bob Zoss Law Office LLC, Evansville, was born and raised in South Bend, Indiana.  He received his JD from Indiana University Law School Bloomington. He has practiced law in Evansville, Indiana, since 1974, initially working for a local law firm and then as Deputy Prosecutor until his retirement from that office in March, 2012. During his some 35 years as a felony trial deputy, Bob has handled many murders and other high profile cases on behalf of the State of Indiana.

About our Law Tips blogger:
Nancy Hurley has long-standing connections with Indiana lawyers. She was formerly a member of the ISBA and IBF staffs for over 30 years. Nancy’s latest lifestyle venture is with ICLEF. We are utilizing her exceptional writing and interviewing skills while exploring how her Indiana-lawyer background fits with ICLEF’s needs. When she isn’t ferreting out new topics for Law Tips, her work can be found in our Speaker Spotlight blogs, postings on the ICLEF Facebook and Twitter pages, and other places her legal experience lends itself.

Thank you for reading Law Tips. You may subscribe to this weekly blog through the RSS link at the top of this page.  Also, you are encouraged to comment below or email Nancy. She welcomes your input as she continues to sift through the treasure trove of knowledge of our CLE faculty to share with you.

ICLEF • Indiana Continuing Legal Education Forum, Indianapolis, IN

Posted in Law Tips, NewsComments (0)


Having trouble logging in? Visit our Support section.

Contact Us

ICLEF
230 East Ohio Street
Suite #300
Indianapolis, Indiana 46204
Phone: 317-637-9102
Fax: 317-633-8780
E-mail: iclef@iclef.org