The Mummy and Compliance: Lessons for Compliance Officers and Corporate Leaders from the Universal Classic Movie

by Thomas Fox
Contact

Thomas Fox - Compliance Evangelist

Compliance lessons from the Universal classic monster movies...

A. The Original Mummy

Equifax and Dust in the Wind

I am back with my celebration of the classic Universal Picture’s monster movies as lessons for the compliance practitioner. I am returning to the roots, with one of Universal’s original greats The Mummy. Over series, I will be going through the five Universal movies featuring the creature returned to life through the desecration of his tomb of eternal damnation. 

The first appearance was appropriately entitled, The Mummy, and was released in 1932, starring Boris Karloff. In many ways I found this to be the most hauntingly filmed of the classic monster movies. Perhaps this was due to the director Karl Freund, who was in his directorial debut for this film. He is probably best known as Universal’s top cameraman and the person who set up some of the great shots for the gamut of Universal pictures in the 1930s. His use of shadings in the black and white era added an aura of mystery that is not present in today’s films. This original movie in the Mummy series, is probably the best visual feast of all the classic Universal Picture horror films. 

One cannot see the movie, or indeed write about it, without talking about the makeup artist, Jack Pierce, one of the truly greatest makeup artists of any era. He headed Universal’s Makeup Department until 1948 and personally created the makeup for all of the classic Universal Pictures monsters. While most people think of Frankenstein’s monster as Pierce’s greatest creation, I agree with his self-assessment that The Mummy was his true masterwork. The application of the makeup was arduous, taking up to eight hours of work on Karloff to complete the 3,000 year old look for the Mummy. 

For me, most haunting scene is one which occurs quite early in the movie. After a spell is read aloud, bringing Karloff as the Mummy to life, the casket which houses the Mummy is left open allowing the Mummy to escape into the present-day world. One of the young archeologists sees the Mummy walk out of the room and immediately goes insane. I can hear his haunting scream in my head to this day. But here is the key to making this scene so powerful, we never see the Mummy; the only thing we see is some of the rags trailing from his body as he walks out of the room. Too bad today’s gore-fest directors have forgotten what real terror can be. 

The basic story line is that Imhotep, the High Priest of Egypt, was mummified after the Pharaoh found out he had fallen in love with the Pharaoh’s wife Princess Anck-es-en-Amonand. As a Mummy, Imhotep was condemned to eternal damnation and his soul would never to go the afterlife. After he is released from this curse in the 20th Century with the reading of the spell, Imhotep searches for the reincarnation of the Princess. He finds her in modern day London, as Helen Grosvenor, played by the alluring Zita Johann; the Mummy tries to convince her she is the reincarnated Princess Anck-es-en-Amonand and to join him in an eternal love affair. Grosvenor prays to the goddess Isis who sends a ray into Imhotep which turns him into dust. 

So, the compliance angle here? It is the dust in wind that Equifax created from its statements over the past week and actions which led to the massive data breach in the first place. The former head of the company, Richard Smith, testified before Congress that the entire breach was the fault of one lone employee. Yes, you read that right, the rogue employee myth lives. Admitting that the company had received the security warning that part of its security software, Apache Struts, had a deficiency and needed an upgrade to install a patch. A Memo was sent to the IT Department and Smith literally testified before Congress that one Equifax employee ‘didn’t read the memo’ and did not install the patch. Of course, all this happened in March some three months before the breach occurred. Equifax either did not verify the update was installed or could not do so. Further none of the company’s internal controls or other redundant back-ups picked up this mis-adventure. 

Another interesting compliance angle and one which may be even more instructive than former Chief Executive Officer (CEO) Smith’s inane defense were the actions of the company’s General Counsel (GC), John J. Kelley. While most reports have focused on Kelley’s role in allowing senior executives to dump their stock before the public announcement of the security breach, thereby saving them millions; I was more interested in Kelley’s multiple roles in the organization. In addition to be GC, he was also Chief Compliance Officer (CCO) and a host of other roles. According to the Equifax website, Kelley was responsible for “legal services, global sourcing, security and compliance, government and legislative relations and more.” The head of security reported to him. As I have previously noted, law schools simply do not prepare lawyers for the compliance role and certainly not all the roles that Kelley took on. 

Another clear sign that Equifax was headed for a massive crash in the dust is also found in the company’s Board committee charters and the make-up of its Board of Directors. It should not surprise many reader that Equifax did not have a Compliance Committee on the Board. More troubling, for a company which is in the specific business of buying and selling data, it did not even have a data governance or other similar committee. 

While the Board did have two members who are retired CEOs of technology companies; the Board did not have any compliance expertise on the Board. Just as Wells Fargo and Uber demonstrated, when you do not have a commitment to compliance, extending up to the Board; a company cannot adequately prevent, detect and remediate a significant issue; let alone respond in an adequate manner. 

Just as Imhotep literally turns to dust to end the movie, Equifax’s claims are dust in the wind. One thing I forgot to mention is that as it is a 1932 production, it is pre-Code. So be on the lookout for some interesting ladies garments. As I said, a visual feast for all. 

B. Tom Tyler Takes Over in The Mummy’s Hand 

A Risk-Based Approach at the Board Level

Next we consider the 1940’s film, The Mummy’s Hand as the second installment in Universal Pictures series featuring this creature. Boris Karloff departed the role and it was taken over for one film by Tom Tyler, who was better known for his cowboy roles and his stint as Captain Marvel in the 1940 serial bearing the same name. 

The film begins with the Egyptian, Andoheb traveling to the Hill of the Seven Jackals in answer to the royal summons of the High Priest of Karnak. The dying priest of the sect explains the story of The Mummy, named Kharis. The tale closely parallels that of the original film, except that Kharis steals the sacred tana leaves in the hope of restoring life to the dead Princess Ananka. His penalty upon being discovered is to be buried alive, without a tongue, and the tana leaves are buried with him.

The leaves are the secret to Kharis’ continued existence. During the cycle of the full moon, the fluid from the brew of three tana leaves is to be administered to the creature to keep him alive. Should despoilers enter the tomb of the Princess, a fluid of nine leaves will restore movement to the monster. Some down on their luck American archaeologists find a vase which they believe contains clues to the location of the Princess Ananka’s tomb. Of course, it does and after securing funding from a rich ex-pat they are off to the desert to find the tomb, along with the funder’s beautiful daughter. 

In the final scene, The Mummy attempts to drink a brew of the tana leaves. He is prevented and the lead American explorer overturns a brazier onto the monster, engulfing it in flames. The ending has the members of the expedition heading happily back to the United States with the mummy of Ananka, and the spoils of her tomb. It all sets up the next sequel. 

I thought about all of this when considering a recent visit I had with Gerry Czarnecki, founder of the National Leadership Institute. He is a well-known thought leader in leadership and corporate governance. He called himself a “corporate governance fanatic” which he went on to define as believing in the incredibly important role Boards of Directors in corporate governance, tempered with the fact that he believes a Board’s role is oversight not management of the organization. One of the things that intrigued me was that Czarnecki suggested a risk based approach to corporate governance at the Board level. 

One consistent issue almost every Board of Director struggles with is how to engage in oversight without stepping over the line into management. Czarnecki believes this issue exists in most Boardrooms across the country. They are worried about how much they drill down “and management’s fret over their drilling down so far that they get into the operating management function.”

He said it all starts with the most powerful tool a Board of Director has in place - that of inquiry or as he termed it the “capacity for inquiry the capacity to ask questions.” He provided an example around the Board’s role in cybersecurity, noting when you look at cybersecurity and technology, Board members should know enough about the subject matter that they are focused on to ask questions that enlighten them. He said, “I walk into a boardroom for my first board meeting and I say I’d like to know a little bit more about what our cybersecurity plan is all about. Could you give me a quick update on what how do we protect what it is we want to protect? Someone will start going into the type of security software the company has in place. But the real questions is “what data we decide that we have to protect what are the pieces of data. What do we think we are our crown jewels? If we lose control over that data we are putting our business at risk or we’re putting our customers at risk?”

Czarnecki went on to note such an inquiry alone would be enough to generate a discussion with management about what were the company’s crown jewels. But the key, for a Board member, is to ask that question because the management team has not thought about it. This will stimulate an important discussion within the management team about what should they spend their money on, which is of course the type of business question that management should be asking and answering. He emphasized that it is not a question of technology, it is a business question.

If you think about this approach, it is a risk-based approach. Czarnecki is asking management to assess its risks of the crown jewels of data being breached. If so what would be the cost? From there, management should then determine the best risk management strategy to employ. This parallels the approach of the former Chief Technology Officer (CTO) of Coca-Cola who once told me that there was one thing that was the most important to the company which he had to protect at all costs. Both the good guys and the bad guys knew what it was, the formula to Coca-Cola. 

This example also powers how a Chief Compliance Officer (CCO) should think about their approach to the Board. Former Department of Justice (DOJ) Compliance Counsel Hui Chen has said the Evaluation of Corporate Compliance Program (Evaluation) document is designed to get compliance professionals to think about their compliance program. I believe a CCO should try and get the Board to think about compliance by using a risk based strategy laid out by Czarnecki. What are your highest compliance risks? What would be the costs to your company if those risks were breached? From there you can begin to see how to budget for your highest risks. 

So how about the American archaeologists in The Mummy’s Hand, did they use a risk based approach? I would suggest you check out the movie to find out. 

C. Lon Chaney Jr. Takes Over in From the Mummy’s Tomb and the Mummy’s Ghost 

Professional Development for the Compliance Practitioner

For this installment, I combine two installments in the 1940s reimaging of the 1932 classic; The Mummy’s Tomb and The Mummy’s Ghost, as they follow, both chronologically and thematically the original sequel, The Mummy’s Hand. 

The Mummy's Tomb picks up the story thirty years after the conclusion of the previous film. It begins with Steve Banning reciting the story of Kharis to his family and evening guests one night. He relates the destruction of the creature, at the tombs back in Egypt. However, surviving their supposed demise, Andoheb explains the legend of Kharis, (now played by Lon Chaney, Jr.) to his follower, Mehemet Bey. Andoheb passes on instructions for the use of the tana leaves and assigning the task of terminating the remaining members of the Banning Expedition and their descendants. Bey and Kharis leave Egypt for the journey to the United States to fulfill their destiny, which they largely accomplish, killing nearly everyone involved in the original expedition.  

The Mummy’s Ghost picks up with Andoheb, the aging High Priest, summoning Yousef Bey to the Temple of Arkam to pass on the duties of High Priest. He explains the legend of Kharis to Bey and informs Bey that Kharis still lives and that Yousef’s mission is to retrieve Kharis and the body of Ananka and return them to their rightful resting place in Egypt. Back in Mapleton, Massachusetts, where the last Mummy rampage occurred and where Kharis is located, a student, Tom Hervey, meets up with his girlfriend Amina Mansori, a beautiful woman of Egyptian descent. She will become the immortal love interest of Kharis.

Kharis senses Amina as the carrier of Ananka’s soul and kidnaps her. Tom tries to rescue her but is fought off by Kharis. Unfortunately, Amina ages to become the same vintage as Kharis as he lumbers off with her where they sink into quicksand in a swamp. Tom’s last anguished sight of Amina is that of a 3,000-year-old Egyptian Princess as Kharis and Ananka disappear under the water, united in death.

What is the connection of compliance and these two installments in the Mummy oeuvre? It is professional development (don’t worry - it will be clear by the end). Corina Manea wrote a great post on Spin Sucks, entitled “How to Build Your Professional Development Plan for Habit”, which I have purloined and adapted for the compliance professional. There are only eight working weeks left in the year. What have you achieved against the professional development goals you set in January? It is very easy to be stuck in the details of our day job. 

Too often your learning goals suffer because you are too busy or too tired to even think about it. Or because you have no time and have other obligations. Yet there is no job, particularly the compliance profession, in which you can function if you do not focus and invest in your professional development now. One of the clear themes of this year’s SCCE 2017 Compliance and Ethics Institute (CEI) was the need for professional development. 

1. Professional Development is a Must for Every Compliance Professional 

I want you to look around…really look around you. Artificial intelligence (AI) is gaining ground and will be a part of the compliance practice in a very short time. Can you read a spreadsheet? If not, you probably will not ever be a CCO. 

Blockchain has been called the new internet and will certainly be one of the most important tools in compliance down the road. Your work must be measured but you have no idea how to read the data in front of you. Professional development is a must for every compliance professional no matter how much - or how little - experience you have. Things are moving much more quickly and it is hard to keep up with technology, not to mention stay ahead of trends. Which brings me back to investing in your professional development now, as opposed to later.

2. Treat Professional Development as a Client

The key insight is that as a compliance professional, you must treat your professional development as if it were a client. This means to give it the same attention, dedication, and passion you have for your day-to-day work. In time and with hard work (there is no way around that), it will pay off. Take your career into your own hands and invest in your professional development. It starts with a plan, one that will help you create the habit. Your plan should include, at a minimum:

  • How much time per day you will spend learning
  • The top five publications, blogs, or online magazines you want to read every day
  • Online courses you want to take in the next three months
  • The top three conferences you want to attend next year 

Do not forget to include digital networking, as well. Once you have your plan in place, it’s time to split each goal into monthly and weekly tasks. Schedule a meeting with yourself at the end of each week - actually put it on your calendar - to review your progress, see what worked and what did not work for your development and adjust for the following week. Apply the same strategy at the end of each month and quarter. Write down your weekly and monthly results and progress. There is no bigger motivator than getting results from your efforts. Do not treat it lightly; write it down; all of it and then commit to it.

How can you achieve all of this? A good way to start would be to join me next week for my inaugural Doing Compliance Master Class Series. You a trusted partner who delivers relevant content, which can be used to solve a wide variety of issues, even those outside the anti-corruption compliance space. This series delivers timely topical information you can trust, is relevant to the compliance business function, and comes at a reasonable cost.  As the Compliance Evangelist, I bring a unique insight into what many companies have done right and many have done not so well over the years. This professional experience enables me to put together a unique training program for any professional who wants to succeed in compliance. For more information, check out Doing Compliance Master Class Series.

The lesson from the two Mummy movies that opened this piece are that lifelong learning is something you must engage in as a compliance practitioner. The compliance world will not sit still and neither should you. Manea was right, you must treat your professional development with the same seriousness that you treat your internal customers and clients; i.e. your employees. Set out a plan, follow it, measure your actual progress against the plan and adjust as needed. 

Curse of The Mummy and of Continuing a Failing Strategy

In this final post for October 2017’s classic monster movie month, I want to round out the original Universal Picture series by focusing on 1944’s second offering of The Mummy, in The Curse of the Mummy. In this film, Lon Chaney, Jr. makes his final appearance as Kharis, The Mummy. He is in search of his long-lost love over the ages, the Princess Ananka. For reasons unexplained, Kharis is now in Louisiana. Princess Ananka, who in present life is awakened and found lying unconscious on a road. Although apparently suffering from amnesia, she has incredible knowledge of ancient Egypt. Kharis tracks her down and in the final scene he pins a traitorous priest of the cult in a room with him and literally brings the roof down on the both of them.

Perhaps Kharis was always doomed to destruction. He certainly did not appear again in a Universal picture until the pathetic Tom Cruise effort from the summer of 2017. It was so poorly received that the movie single handedly managed to kill off the projected new Universal monster movie series. All I can say is thanks, it would have been horrible. However, one thing Universal Pictures did recognize was to stop on its failing strategy. Unfortunately, this is something usually not well done in the corporate world. When it comes to the compliance function, it is better to recognize such a situation sooner, rather than later. 

In a recent Harvard Business Review (HBR) article, Freek Vermeullen and Niro Sivanathan explored this phenomenon in their piece “Stop Doubling Down on Your Failing Strategy”. There are numerous reasons why failing strategies continue, which the authors dub the “escalation of commitment.” They include some of the following:

The sunk cost fallacy – where when making investment decisions, people often factor in costs they have already incurred. The hope is that if the project continues, the costs can be recouped, while the rational decision maker will look only at future costs, not at past ones.

Loss aversion – in this scenario, withdrawal from a course of action implies certain and immediate losses, decision makers often prefer to allocate more resources to continue with it—despite low expected returns—if they see any chance of turning the situation around.

The illusion of control – here senior managers notoriously overestimate their ability to control the future. Unfortunately, a prior success (or two) tends to amplify the illusion; people are quick to take credit for the outcomes of decisions and confuse having correctly predicted the future with having made it happen.

Preference for completion – people have an inherent bias toward completing tasks—whether that means finishing a plate of food or seeing a project through.

Pluralistic ignorance – people often remain silent because they believe they are the only dissenters and of course, everyone else interprets their silence as agreement. This can lead to all persons’ agreeing to a decision that no one believes in. 

Personal identification – often employee’s identities and social status are tied to their commitments and withdrawal from a commitment may result in a perceived loss of status or a threat to one’s identity. Conversely, no executive likes to admit that a decision was wrong, because the ability to make smart decisions is part of what defines a good executive.

The best way to overcome these biases is through a robust procedure in your decision-making process. Always begin with a set of rules. Start with an objective criteria and if that cannot be used because there is not sufficient data, agree upon the non-numerical rules. Next is to pay attention to the voting rules, whether you vote conjunctively or disjunctively. This means you consider looking at the criteria separately rather than simply tallying people’s overall judgments. You must also provide protection for dissenters by making it safe for them to raise their concerns. This can be done by allowing anonymous feedback, increasing the diversity of those giving opinions and senior management modeling doubt to demonstrate it is an acceptable practice. 

Another method is to expressly consider other options to frame the decision as more than one of simply binary alternatives. Consider bringing in a new team to implement a decision, separate and apart from the team which developed the solution, as this second team will not have the emotional investment in the initial decision and can more easily see if it is not working. Finally the authors suggest, “reinforcing the anticipation of regret” by two different methods. The first is to take a “temporal perspective” of considering what might go wrong with the decision or strategy. Another way to view this is “prospective hindsight” where you ask employees how something might fail. Another approach is to ask employees to take emotion out of the equation and step outside of themselves by putting themselves in different roles. 

The authors conclude by stating “By its nature, an escalation of commitment is difficult to detect.” Kharis would seem to be the perfect example of doomed love over the ages, never realizing he cannot be reunited with Princess Ananka, rather like “overcommitted executives are prone to ignore signs of their company’s imminent collapse. That is precisely why companies need to establish organizational processes and practices of the kind we’ve laid out—to encourage managers at all levels to make decisions more objectively and explicitly consider alternative strategies and perspectives.”

By putting a process in place to test, check and then recheck the findings as a project progresses; you can place your organization in a better position to change things that are not working. The Department of Justice’s (DOJ’s) Evaluation of Corporate Compliance Programs would seem to echo that approach. It is more than simply what is the data and what does it show. It is how are you using the data? Have you incorporated it back into your compliance program to not simply test effectiveness but more critically improve effectiveness. This may be the final lesson from this year’s classic Mummy monster movie series.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Thomas Fox, Compliance Evangelist | Attorney Advertising

Written by:

Thomas Fox
Contact
more
less

Compliance Evangelist on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide

JD Supra Privacy Policy

Updated: May 25, 2018:

JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations.

This Privacy Policy describes how JD Supra, LLC ("JD Supra" or "we," "us," or "our") collects, uses and shares personal data collected from visitors to our website (located at www.jdsupra.com) (our "Website") who view only publicly-available content as well as subscribers to our services (such as our email digests or author tools)(our "Services"). By using our Website and registering for one of our Services, you are agreeing to the terms of this Privacy Policy.

Please note that if you subscribe to one of our Services, you can make choices about how we collect, use and share your information through our Privacy Center under the "My Account" dashboard (available if you are logged into your JD Supra account).

Collection of Information

Registration Information. When you register with JD Supra for our Website and Services, either as an author or as a subscriber, you will be asked to provide identifying information to create your JD Supra account ("Registration Data"), such as your:

  • Email
  • First Name
  • Last Name
  • Company Name
  • Company Industry
  • Title
  • Country

Other Information: We also collect other information you may voluntarily provide. This may include content you provide for publication. We may also receive your communications with others through our Website and Services (such as contacting an author through our Website) or communications directly with us (such as through email, feedback or other forms or social media). If you are a subscribed user, we will also collect your user preferences, such as the types of articles you would like to read.

Information from third parties (such as, from your employer or LinkedIn): We may also receive information about you from third party sources. For example, your employer may provide your information to us, such as in connection with an article submitted by your employer for publication. If you choose to use LinkedIn to subscribe to our Website and Services, we also collect information related to your LinkedIn account and profile.

Your interactions with our Website and Services: As is true of most websites, we gather certain information automatically. This information includes IP addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and clickstream data. We use this information to analyze trends, to administer the Website and our Services, to improve the content and performance of our Website and Services, and to track users' movements around the site. We may also link this automatically-collected data to personal information, for example, to inform authors about who has read their articles. Some of this data is collected through information sent by your web browser. We also use cookies and other tracking technologies to collect this information. To learn more about cookies and other tracking technologies that JD Supra may use on our Website and Services please see our "Cookies Guide" page.

How do we use this information?

We use the information and data we collect principally in order to provide our Website and Services. More specifically, we may use your personal information to:

  • Operate our Website and Services and publish content;
  • Distribute content to you in accordance with your preferences as well as to provide other notifications to you (for example, updates about our policies and terms);
  • Measure readership and usage of the Website and Services;
  • Communicate with you regarding your questions and requests;
  • Authenticate users and to provide for the safety and security of our Website and Services;
  • Conduct research and similar activities to improve our Website and Services; and
  • Comply with our legal and regulatory responsibilities and to enforce our rights.

How is your information shared?

  • Content and other public information (such as an author profile) is shared on our Website and Services, including via email digests and social media feeds, and is accessible to the general public.
  • If you choose to use our Website and Services to communicate directly with a company or individual, such communication may be shared accordingly.
  • Readership information is provided to publishing law firms and authors of content to give them insight into their readership and to help them to improve their content.
  • Our Website may offer you the opportunity to share information through our Website, such as through Facebook's "Like" or Twitter's "Tweet" button. We offer this functionality to help generate interest in our Website and content and to permit you to recommend content to your contacts. You should be aware that sharing through such functionality may result in information being collected by the applicable social media network and possibly being made publicly available (for example, through a search engine). Any such information collection would be subject to such third party social media network's privacy policy.
  • Your information may also be shared to parties who support our business, such as professional advisors as well as web-hosting providers, analytics providers and other information technology providers.
  • Any court, governmental authority, law enforcement agency or other third party where we believe disclosure is necessary to comply with a legal or regulatory obligation, or otherwise to protect our rights, the rights of any third party or individuals' personal safety, or to detect, prevent, or otherwise address fraud, security or safety issues.
  • To our affiliated entities and in connection with the sale, assignment or other transfer of our company or our business.

How We Protect Your Information

JD Supra takes reasonable and appropriate precautions to insure that user information is protected from loss, misuse and unauthorized access, disclosure, alteration and destruction. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. You should keep in mind that no Internet transmission is ever 100% secure or error-free. Where you use log-in credentials (usernames, passwords) on our Website, please remember that it is your responsibility to safeguard them. If you believe that your log-in credentials have been compromised, please contact us at privacy@jdsupra.com.

Children's Information

Our Website and Services are not directed at children under the age of 16 and we do not knowingly collect personal information from children under the age of 16 through our Website and/or Services. If you have reason to believe that a child under the age of 16 has provided personal information to us, please contact us, and we will endeavor to delete that information from our databases.

Links to Other Websites

Our Website and Services may contain links to other websites. The operators of such other websites may collect information about you, including through cookies or other technologies. If you are using our Website or Services and click a link to another site, you will leave our Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We are not responsible for the data collection and use practices of such other sites. This Policy applies solely to the information collected in connection with your use of our Website and Services and does not apply to any practices conducted offline or in connection with any other websites.

Information for EU and Swiss Residents

JD Supra's principal place of business is in the United States. By subscribing to our website, you expressly consent to your information being processed in the United States.

  • Our Legal Basis for Processing: Generally, we rely on our legitimate interests in order to process your personal information. For example, we rely on this legal ground if we use your personal information to manage your Registration Data and administer our relationship with you; to deliver our Website and Services; understand and improve our Website and Services; report reader analytics to our authors; to personalize your experience on our Website and Services; and where necessary to protect or defend our or another's rights or property, or to detect, prevent, or otherwise address fraud, security, safety or privacy issues. Please see Article 6(1)(f) of the E.U. General Data Protection Regulation ("GDPR") In addition, there may be other situations where other grounds for processing may exist, such as where processing is a result of legal requirements (GDPR Article 6(1)(c)) or for reasons of public interest (GDPR Article 6(1)(e)). Please see the "Your Rights" section of this Privacy Policy immediately below for more information about how you may request that we limit or refrain from processing your personal information.
  • Your Rights
    • Right of Access/Portability: You can ask to review details about the information we hold about you and how that information has been used and disclosed. Note that we may request to verify your identification before fulfilling your request. You can also request that your personal information is provided to you in a commonly used electronic format so that you can share it with other organizations.
    • Right to Correct Information: You may ask that we make corrections to any information we hold, if you believe such correction to be necessary.
    • Right to Restrict Our Processing or Erasure of Information: You also have the right in certain circumstances to ask us to restrict processing of your personal information or to erase your personal information. Where you have consented to our use of your personal information, you can withdraw your consent at any time.

You can make a request to exercise any of these rights by emailing us at privacy@jdsupra.com or by writing to us at:

Privacy Officer
JD Supra, LLC
10 Liberty Ship Way, Suite 300
Sausalito, California 94965

You can also manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard.

We will make all practical efforts to respect your wishes. There may be times, however, where we are not able to fulfill your request, for example, if applicable law prohibits our compliance. Please note that JD Supra does not use "automatic decision making" or "profiling" as those terms are defined in the GDPR.

  • Timeframe for retaining your personal information: We will retain your personal information in a form that identifies you only for as long as it serves the purpose(s) for which it was initially collected as stated in this Privacy Policy, or subsequently authorized. We may continue processing your personal information for longer periods, but only for the time and to the extent such processing reasonably serves the purposes of archiving in the public interest, journalism, literature and art, scientific or historical research and statistical analysis, and subject to the protection of this Privacy Policy. For example, if you are an author, your personal information may continue to be published in connection with your article indefinitely. When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
  • Onward Transfer to Third Parties: As noted in the "How We Share Your Data" Section above, JD Supra may share your information with third parties. When JD Supra discloses your personal information to third parties, we have ensured that such third parties have either certified under the EU-U.S. or Swiss Privacy Shield Framework and will process all personal data received from EU member states/Switzerland in reliance on the applicable Privacy Shield Framework or that they have been subjected to strict contractual provisions in their contract with us to guarantee an adequate level of data protection for your data.

California Privacy Rights

Pursuant to Section 1798.83 of the California Civil Code, our customers who are California residents have the right to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes.

You can make a request for this information by emailing us at privacy@jdsupra.com or by writing to us at:

Privacy Officer
JD Supra, LLC
10 Liberty Ship Way, Suite 300
Sausalito, California 94965

Some browsers have incorporated a Do Not Track (DNT) feature. These features, when turned on, send a signal that you prefer that the website you are visiting not collect and use data regarding your online searching and browsing activities. As there is not yet a common understanding on how to interpret the DNT signal, we currently do not respond to DNT signals on our site.

Access/Correct/Update/Delete Personal Information

For non-EU/Swiss residents, if you would like to know what personal information we have about you, you can send an e-mail to privacy@jdsupra.com. We will be in contact with you (by mail or otherwise) to verify your identity and provide you the information you request. We will respond within 30 days to your request for access to your personal information. In some cases, we may not be able to remove your personal information, in which case we will let you know if we are unable to do so and why. If you would like to correct or update your personal information, you can manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard. If you would like to delete your account or remove your information from our Website and Services, send an e-mail to privacy@jdsupra.com.

Changes in Our Privacy Policy

We reserve the right to change this Privacy Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our Privacy Policy will become effective upon posting of the revised policy on the Website. By continuing to use our Website and Services following such changes, you will be deemed to have agreed to such changes.

Contacting JD Supra

If you have any questions about this Privacy Policy, the practices of this site, your dealings with our Website or Services, or if you would like to change any of the information you have provided to us, please contact us at: privacy@jdsupra.com.

JD Supra Cookie Guide

As with many websites, JD Supra's website (located at www.jdsupra.com) (our "Website") and our services (such as our email article digests)(our "Services") use a standard technology called a "cookie" and other similar technologies (such as, pixels and web beacons), which are small data files that are transferred to your computer when you use our Website and Services. These technologies automatically identify your browser whenever you interact with our Website and Services.

How We Use Cookies and Other Tracking Technologies

We use cookies and other tracking technologies to:

  1. Improve the user experience on our Website and Services;
  2. Store the authorization token that users receive when they login to the private areas of our Website. This token is specific to a user's login session and requires a valid username and password to obtain. It is required to access the user's profile information, subscriptions, and analytics;
  3. Track anonymous site usage; and
  4. Permit connectivity with social media networks to permit content sharing.

There are different types of cookies and other technologies used our Website, notably:

  • "Session cookies" - These cookies only last as long as your online session, and disappear from your computer or device when you close your browser (like Internet Explorer, Google Chrome or Safari).
  • "Persistent cookies" - These cookies stay on your computer or device after your browser has been closed and last for a time specified in the cookie. We use persistent cookies when we need to know who you are for more than one browsing session. For example, we use them to remember your preferences for the next time you visit.
  • "Web Beacons/Pixels" - Some of our web pages and emails may also contain small electronic images known as web beacons, clear GIFs or single-pixel GIFs. These images are placed on a web page or email and typically work in conjunction with cookies to collect data. We use these images to identify our users and user behavior, such as counting the number of users who have visited a web page or acted upon one of our email digests.

JD Supra Cookies. We place our own cookies on your computer to track certain information about you while you are using our Website and Services. For example, we place a session cookie on your computer each time you visit our Website. We use these cookies to allow you to log-in to your subscriber account. In addition, through these cookies we are able to collect information about how you use the Website, including what browser you may be using, your IP address, and the URL address you came from upon visiting our Website and the URL you next visit (even if those URLs are not on our Website). We also utilize email web beacons to monitor whether our emails are being delivered and read. We also use these tools to help deliver reader analytics to our authors to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

Analytics/Performance Cookies. JD Supra also uses the following analytic tools to help us analyze the performance of our Website and Services as well as how visitors use our Website and Services:

  • HubSpot - For more information about HubSpot cookies, please visit legal.hubspot.com/privacy-policy.
  • New Relic - For more information on New Relic cookies, please visit www.newrelic.com/privacy.
  • Google Analytics - For more information on Google Analytics cookies, visit www.google.com/policies. To opt-out of being tracked by Google Analytics across all websites visit http://tools.google.com/dlpage/gaoptout. This will allow you to download and install a Google Analytics cookie-free web browser.

Facebook, Twitter and other Social Network Cookies. Our content pages allow you to share content appearing on our Website and Services to your social media accounts through the "Like," "Tweet," or similar buttons displayed on such pages. To accomplish this Service, we embed code that such third party social networks provide and that we do not control. These buttons know that you are logged in to your social network account and therefore such social networks could also know that you are viewing the JD Supra Website.

Controlling and Deleting Cookies

If you would like to change how a browser uses cookies, including blocking or deleting cookies from the JD Supra Website and Services you can do so by changing the settings in your web browser. To control cookies, most browsers allow you to either accept or reject all cookies, only accept certain types of cookies, or prompt you every time a site wishes to save a cookie. It's also easy to delete cookies that are already saved on your device by a browser.

The processes for controlling and deleting cookies vary depending on which browser you use. To find out how to do so with a particular browser, you can use your browser's "Help" function or alternatively, you can visit http://www.aboutcookies.org which explains, step-by-step, how to control and delete cookies in most browsers.

Updates to This Policy

We may update this cookie policy and our Privacy Policy from time-to-time, particularly as technology changes. You can always check this page for the latest version. We may also notify you of changes to our privacy policy by email.

Contacting JD Supra

If you have any questions about how we use cookies and other tracking technologies, please contact us at: privacy@jdsupra.com.

- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.