O D LLP OLAVI DUNNE LLP Daniel P. Hipskind, CA State Bar No. 266763 Dorian S. Berger, CA State Bar No. 264424 1880 Century Park

Total Page:16

File Type:pdf, Size:1020Kb

O D LLP OLAVI DUNNE LLP Daniel P. Hipskind, CA State Bar No. 266763 Dorian S. Berger, CA State Bar No. 264424 1880 Century Park ase 2:15-cv-05527-R-JEM Document 1 Filed 07/21/15 Page 1 of 55 Page ID #:1 1 OLAVI DUNNE LLP Daniel P. Hipskind, CA State Bar No. 266763 2 Dorian S. Berger, CA State Bar No. 264424 1880 Century Park East, Ste. 815 3 Los Angeles, California 90025 Telephone: 213-516-7900 4 Facsimile: 213-516-7910 Email: [email protected] 5 Email: [email protected] 6 OLAVI DUNNE LLP 7 Matt Olavi, CA State Bar No. 265945 Brian J. Dunne, CA State Bar No. 275689 8 816 Congress Ave., Ste. 1620 Austin, Texas 78701 9 Telephone: 512-717-4485 Facsimile: 512-717-4495 10 E-mail: [email protected] E-mail: [email protected] 11 Attorneys for Plaintiffs and the Proposed Class 12 13 LLP UNI T E D ST A T ES DIST RI C T C O UR T 14 C E N T R A L DIST RI C T O F C A L I F O RNI A UNNE UNNE 15 D 16 E D M UND PI E T Z A K A ND Case No. :____________ LAVI 17 E RIN H UDSO N, INDI V IDU A L L Y A ND O N O B E H A L F O F A L L O T H E RS SI M I L A R L Y 18 SI T U A T E D, C L ASS A C T I O N C O MPL A IN T F O R 19 D A M A G ES A ND I NJUN C T I V E R E L I E F Plaintiffs, PURSU A N T T O 47 U.S.C. § 227, E T SE Q. 20 (T E L EPH O N E C O NSUM E R PR O T E C T I O N v. A C T) A ND V I O L A T I O N O F T H E UNF A IR 21 BUSIN ESS PR A C T I C ES A C T 22 M I C R OSO F T C O RPOR A T I O N A ND HelloWorld, I N C., 23 JUR Y T RI A L D E M A ND E D Defendants 24 25 26 27 28 24(213) C L ASS A C T I O N C O MPL A IN T F O R D A M A G ES A ND INJUN C TI V E R E L I E F Case No. ____ 516- 79008 ase 2:15-cv-05527-R-JEM Document 1 Filed 07/21/15 Page 2 of 55 Page ID #:2 1 Plaintiffs Edmund Pietzak and Erin Hudson (collectively, "Plaintiffs"), 2 through their attorneys, bring this action on behalf of themselves and all others 3 similarly situated, make the following allegations on information and belief, 4 except as to allegations pertaining to Plaintiffs individually, which are based on 5 their respective personal knowledge. 6 I. IN T R O DU C T I O N 7 1. In a relentless effort to advertise its products, Microsoft 8 &RUSRUDWLRQ ³0LFURVRIW´ VROLFLWVPRELOHSKRQHQXPEHUVIURPSRWHQWLDO 9 customers using deceptive postings on social media websites. Once obtained, 10 Microsoft automatically enrolls these phone numbers in a text message- 11 advertising program that repeatedly transmits unsolicited advertisements for 12 Microsoft products to mobile phones of potential customers. Instead of obtaining 13 express written consent prior to sending repeated text message solicitations, LLP 14 Microsoft lures potential customers to provide their mobile phone numbers in UNNE UNNE 15 response to misleading sweepstakes and discount promoWLRQV0LFURVRIW¶V D 16 GHFHSWLYHSRVWLQJVRQ)DFHERRNFRP ³)DFHERRN´ 7ZLWWHUFRP ³7ZLWWHU´ LAVI 17 ,QVWDJUDPFRP ³,QVWDJUDP´ DQG<RX7XEHFRP ³<RX7XEH´ FRQFHDOIURPWKH O 18 public that providing their mobile phone number to Microsoft will subject 19 individuals to DEDUUDJHRIXQVROLFLWHG³WH[W´PHVVDJHDGYHUWLVHPHQWV 20 2. Despite the fHGHUDO7HOHSKRQH&RQVXPHU3URWHFWLRQ$FW¶V, 47 21 U.S.C. § 227 ³7&3$´ , XQHTXLYRFDOSURKLELWLRQ0LFURVRIW¶VGHFHSWLYHVRFLDO 22 media postings require customers to provide their phone number as a condition of 23 eligibility for sweepstakes, discount promotions, and the purchase of certain 24 products0LFURVRIW¶Vdeceptive social media appeals include: 25 x ³7H[W+$/2WRIRUDFKDQFHWRZLQDOLPLWHGHGLWLRQ;ER[2QH 1 26 FRQVROH´ 27 1 Microsoft Store Facebook Posting, FACEBOOK.COM WEBSITE, June 14, 2015, 28 https://www.facebook.com/MicrosoftStore/posts/10153347428817480. C L ASS A C T I O N C O MPL A IN T F O R D A M A G ES A ND INJUN C TI V E R E L I E F 24(213) - 2 - Case No. ____ 516- 79008 ase 2:15-cv-05527-R-JEM Document 1 Filed 07/21/15 Page 3 of 55 Page ID #:3 1 x ³7H[W68535,6(WRWRILQGRXWKRZWRZLQJUHDWSUL]HV´2 2 3 x ³>7@H[W+$33<WRIRUDVSHFLDOVXUSULVHRIIHUQRZWKURXJK December 23rd´3 4 4 5 x ³>6@DYHRQDIXWXUHSXUFKDVHE\WH[WLQJ62&,$/WR´ 6 7 8 9 10 11 12 13 LLP 14 UNNE UNNE 15 D 16 LAVI Figure 1: Microsoft Store Facebook.com Posting, FACEBOOK.COM WEBSITE, May 17 O 6, 2015. 18 3. Microsoft never discloses to potential customers that sending a text 19 PHVVDJHWRWKHSKRQHQXPEHUZLOODXWRPDWLFDOO\HQUROOSRWHQWLDOFXVWRPHUV¶ 20 cellphones in an advertising program that spams DXVHU¶VFHOOSKRQHwith up to ten 21 advertisements a month. 22 4. Microsoft solicits phone numbers from potential customers in an 23 unlawful bait-and-switch marketing scheme. Customers are lured to provide their 24 2 Microsoft Store Facebook Posting, FACEBOOK.COM WEBSITE, May 6, 2015, 25 https://www.facebook.com/MicrosoftStore/posts/10153243843897480. 3 Microsoft Store YouTube.com Channel, YOUTUBE.COM WEBSITE, December 5, 26 2014, https://www.youtube.com/watch?v=M_4nQ5BTn1w&feature=youtu.be. 27 4 Microsoft Store Twitter Posting, TWITTER.COM WEBSITE, March 4, 2015, 28 https://twitter.com/MicrosoftStore/status/573243653600243713. C L ASS A C T I O N C O MPL A IN T F O R D A M A G ES A ND INJUN C TI V E R E L I E F 24(213) - 3 - Case No. ____ 516- 79008 ase 2:15-cv-05527-R-JEM Document 1 Filed 07/21/15 Page 4 of 55 Page ID #:4 1 phone number for a limited purpose (a chance to win a prize). Yet, Microsoft 2 enrolls these same customers in an undisclosed advertising program, transmitting 3 multiple unconsented-to texWPHVVDJHDGYHUWLVHPHQWVWRFXVWRPHUV¶FHOOSKRQHV 4 5. Plaintiffs Mr. Pietzak and Ms. Hudson bring this suit to stop 5 Microsoft and its marketing partner HelloWorld,QF ³+HOOR:RUOG´ IURP 6 utilizing unlawful Text Message Marketing to commercialize products and 7 services. Defendants use deceptive bait-and-switch techniques to send advertising 8 solicitations to the mobile phones of the public. Defendants constructed an 9 unlawful text message-advertising program to circumvent and reach a public 10 oversaturated with commercial messages. Yet, the Federal Communications 11 Commission reiterated that even self-VW\OHG³OHJLWLPDWH´EXVLQHVVHVcannot be 12 shielded from liability where they utilize unlawful text messaging programs. 13 As its very name makes clear, the Telephone Consumer Protection LLP $FW LV D EURDG ³FRQVXPHU SURWHFWLRQ´ VWDWXWH WKDW DGGUHVVHV WKH 14 telemarketing practices not just of bad actors attempting to perpetrate frauds, EXW DOVR RI ³OHJLWLPDWH EXVLQHVVHV´ HPSOR\LQJ UNNE UNNE 15 calling practices that consumers find objectionable. D Declaratory Ruling and Order of the Federal Communications Commission, 16 DGRSWHG-XQH ³FCC 15-72´ at n.6 (emphasis added). LAVI 17 O 6. In recent years, marketers stymied by federal laws limiting 18 solicitation by telephone, facsimile machine, and email have increasingly looked 19 to alternative technologies to send bulk solicitations to consumers, cheaply.5 20 7. One of the newest methods of bulk marketing is to advertise 21 through text messages sent to mobile phones.6 22 23 5 See FCC 15-72 at n.6 (³As its very name makes clear, the Telephone Consumer Protection Act LVDEURDGµFRQVXPHUSURWHFWLRQ¶ statute that addresses the 24 telemarketing practices not just of bad actors attempting to perpetrate frauds, but DOVRRIµOHJLWLPDWHEXVLQHVVHV¶ employing calling practices that consumers find 25 REMHFWLRQDEOH´ . 6 See Id ³7KH7&3$PDNHVLWXQODZIXOIRUDQ\EXVLQHVV²µOHJLWLPDWH¶RUQRW²to 26 make robocalls that do not comply with the provisions of the statute. While the &RPPLVVLRQKDVWUDGLWLRQDOO\VRXJKWWRµUHDVRQDEO\DFFRPPRGDWH>@LQGLYLGXDOV¶ 27 . we have not viewHGµOHJLWLPDWH¶EXVLQHVVHVDVVRPHKRZH[HPSWIURPWKH 28 statute, nor do we do so today.´). C L ASS A C T I O N C O MPL A IN T F O R D A M A G ES A ND INJUN C TI V E R E L I E F 24(213) - 4 - Case No. ____ 516- 79008 ase 2:15-cv-05527-R-JEM Document 1 Filed 07/21/15 Page 5 of 55 Page ID #:5 1 8. Unlike faxes and unanswered phone calls, a text message allows 2 virtually instantaneous communication with the recipient, almost anywhere in the 3 world, day or night.7 Many cellular phones immediately alert the recipient of new 4 text messages. Consumers frequently use text messaging to stay in close contact 5 with business colleagues and associates, family members, and friends. Text 6 messaging is used by schools, police departments, fire departments, and 7 emergency medical services across the country. 8 9. Microsoft implemented its unlawful text messaging scheme in 9 FRQFHUWZLWK+HOOR:RUOG,QF ³+HOOR:RUOG´ , an advertising agency that 10 WUXPSHWVLWVDELOLW\WR³FUHDWHXQIRUJHWWDEOHLQWHUDFWLRQV´8 Microsoft and 11 HelloWorOG FROOHFWLYHO\³'HIHQGDQWV´ H[WROOWKHXVHRIWH[WPHVVDJHDGYHUWLVLQJ 12 as a way to gain an advantage over competitors by marketing to an information- 13 saturated audience. LLP 14 Hyper-fragmentation of media and high-cost, low response rates for UNNE UNNE 15 direct mail and other traditional channels make mobile advertising a D very attractive option for CPG brands.
Recommended publications
  • Nokia Lumia 635 User Guide
    User Guide Nokia Lumia 635 Issue 1.0 EN-US Psst... This guide isn't all there is... There's a user guide in your phone – it's always with you, available when needed. Check out videos, find answers to your questions, and get helpful tips. On the start screen, swipe left, and tap Nokia Care. If you’re new to Windows Phone, check out the section for new Windows Phone users. Check out the support videos at www.youtube.com/NokiaSupportVideos. For info on Microsoft Mobile Service terms and Privacy policy, go to www.nokia.com/privacy. First start-up Your new phone comes with great features that are installed when you start your phone for the first time. Allow some minutes while your phone sets up. © 2014 Microsoft Mobile. All rights reserved. 2 User Guide Nokia Lumia 635 Contents For your safety 5 Camera 69 Get started 6 Get to know Nokia Camera 69 Keys and parts 6 Change the default camera 69 Insert the SIM and memory card 6 Camera basics 69 Remove the SIM and memory card 9 Advanced photography 71 Switch the phone on 11 Photos and videos 75 Charge your phone 12 Maps & navigation 79 Transfer content to your Nokia Lumia 14 Switch location services on 79 Lock the keys and screen 16 Positioning methods 79 Connect the headset 17 Internet 80 Antenna locations 18 Define internet connections 80 Basics 19 Connect your computer to the web 80 Get to know your phone 19 Use your data plan efficiently 81 Accounts 28 Web browser 81 Personalize your phone 32 Search the web 83 Cortana 36 Close internet connections 83 Take a screenshot 37 Entertainment 85 Extend battery life 38 Watch and listen 85 Save on data roaming costs 39 FM radio 86 Write text 40 MixRadio 87 Scan codes or text 43 Sync music and videos between your phone and computer 87 Clock and calendar 44 Games 88 Browse your SIM apps 47 Office 90 Store 47 Microsoft Office Mobile 90 People & messaging 50 Write a note 92 Calls 50 Continue with a document on another Contacts 55 device 93 Social networks 59 Use the calculator 93 Messages 60 Use your work phone 93 Mail 64 Tips for business users 94 © 2014 Microsoft Mobile.
    [Show full text]
  • The Stock Market: …When Life Looks Like Easy Street There Is Danger at Your Door Uncle John's Band by the Grateful Dead 1970
    Semi-Annual Update July 15, 2018 The Stock Market: …when life looks like easy street there is danger at your door Uncle John’s Band by the Grateful Dead 1970 Well, it had to happen eventually. Volatility was just too Michael Morgia, CIMA® THE MORGIA GROUP damn low. Everything was too simple. The Dow Jones was at HIGHTOWER ADVISORS ticking off new thousand point high-water marks by the day Managing Director, Partner (ok maybe by the month). January alone saw the index cross 25,000 and then 26,000 less than two weeks apart! When viewing a graph of the stock market in mid-January, we joked HighTower Advisors, LLC that if the upslope on the market got any steeper it would 151 Mullin Street curl back upon itself. The mood seemed to be: Just buy any Watertown, NY 13601 technology related stock, sit back, and watch the money start Tel. (315) 222-7148 pouring into your account. But perhaps the best part of the Fax (315) 836-0058 mmorgia@hightoweradvisors. upward move was how very stable it had become. There com were only ten days in all of 2017 that saw the Dow Jones Industrial Average move by 1% or more.1 That is extremely Visit us at: calm, in case you were wondering. morgiagroup.com And then … Continued on Page 2 The Morgia Group at HighTower Advisors A good old fashion correction hit. Closing right at the all-time high on January 26th, the Dow peaked at 26,016. A short ten days later, it was down well over two thousand points for a 10.2% “correction.” Since then it has been on a wild ride with the market fluctuating back and forth in a 2,000-point range.
    [Show full text]
  • The Future Computed Artificial Intelligence and Its Role in Society
    The Future Computed Artificial Intelligence and its role in society By Microsoft With a foreword by Brad Smith and Harry Shum Published by Microsoft Corporation Redmond, Washington. U.S.A. 2018 First published 2018 by Microsoft Corporation One Microsoft Way Redmond, Washington 98052 © 2018 Microsoft. All rights reserved ISBN 978-0-9997508-1-0 Table of contents Foreword The Future Computed 1 Chapter 1 The Future of Artificial Intelligence 22 Microsoft’s Approach to AI 33 The Potential of Modern AI - 43 Addressing Societal Challenges The Challenges AI Presents 48 Chapter 2 Principles, Policies and Laws for the 50 Responsible Use of AI Ethical and Societal Implications 56 Developing Policy and Law for 73 Artificial Intelligence Fostering Dialogue and the Sharing of 82 Best Practices iii Chapter 3 AI and the Future of Jobs and Work 84 The Impact of Technology on Jobs and Work 91 The Changing Nature of Work, the Workplace 101 and Jobs Preparing Everyone for the Future of Work 107 Changing Norms of Changing Worker Needs 122 Working Together 133 Conclusion AI Amplifying Human Ingenuity 134 Endnotes 138 iv Foreword The Future Computed By Brad Smith and Harry Shum 6 Twenty years ago, we both worked at Microsoft, but on The Future Computed opposite sides of the globe. In 1998, one of us was living and working in China as a founding member of the Microsoft Research Asia lab in Beijing. Five thousand miles away, the other was based at the company’s headquarters, just outside of Seattle, leading the international legal and corporate affairs team.
    [Show full text]
  • Zero Trust Business Plan
    Zero Trust Business Plan A practical guide to implementing the Zero Trust framework at your organization 03 Introduction 04 Securing digital transformation requires Zero Trust 05 Taking a pragmatic approach to Zero Trust Contents 06 Three phases of adopting Zero Trust 07 Plan your Zero Trust journey 10 Implement Zero Trust at your organization 11 Measure your progress 15 Zero Trust is a survival skill 16 What’s next? Digital transformation is shaping the new normal COVID taught everyone it’s not going Organizations are embracing digital transformation to to be all peachy and you’re going to manage continuous business environment changes: “have to be able to adjust very quickly Shifting business models and partnerships in the future. The closer we get to a zero trust model, it shouldn’t matter Technology trends whether we are operating out of a Regulatory, geopolitical, and cultural forces garage, the cloud, or a datacenter” COVID-19 remote work accelerated transformation –Manager, Identity & Access Solutions, and often transforms security from a cost-center to a at financial services company strategic driver for growth. Securing digital transformation requires Zero Trust Digital transformation forces re-examination of traditional security models The old way of security does not provide business agility, user experiences, and protections needed for a rapidly evolving digital estate. Many organizations are implementing Zero Trust to alleviate these challenges and enable the new normal of working anywhere, with anyone, at any time. H&R Block, for example, used our Microsoft tools to build out Zero Trust These learnings and best practices are derived principles in just two weeks, enabling from conversations with customers and our own “thousands of tax professionals to experience implementing Zero Trust at Microsoft.
    [Show full text]
  • Lumia with Windows 10 Mobile User Guide
    User Guide Lumia with Windows 10 Mobile Issue 1.1 EN-US About this user guide This guide is the user guide for your software release. Important: For important information on the safe use of your device and battery, read “For your safety” and “Product and safety info” in the printed or in-device user guide, or at www.microsoft.com/mobile/support before you take the device into use. To find out how to get started with your new device, read the printed user guide. For the online user guidance, videos, even more information, and troubleshooting help, go to support.microsoft.com, and browse to the instructions for Windows phones. You can also check out the support videos at www.youtube.com/lumiasupport. Moreover, there's a user guide in your phone – it's always with you, available when needed. To find answers to your questions and to get helpful tips, tap Lumia Help+Tips. If you’re new to Lumia, check out the section for new users. For info on Microsoft Privacy Statement, go to aka.ms/privacy. © 2016 Microsoft Mobile. All rights reserved. 2 User Guide Lumia with Windows 10 Mobile Contents For your safety 5 People & messaging 64 Get started 6 Calls 64 Turn the phone on 6 Contacts 68 Lock the keys and screen 7 Social networks 73 Charge your phone 7 Messages 74 Your first Lumia? 10 Email 78 Learn more about your phone 10 Camera 83 Set up your phone 10 Open your camera quickly 83 Update your apps 11 Camera basics 83 Explore your tiles, apps, and settings 12 Advanced photography 86 Navigate inside an app 14 Photos and videos 88 Use the touch screen
    [Show full text]
  • Sidekick: Your Data Is in ‘Danger’ November 2009
    the Availability Digest www.availabilitydigest.com Sidekick: Your Data is in ‘Danger’ November 2009 Sidekick, a popular smart phone provided by Microsoft and marketed by T-Mobile, suffered an outage in early October, 2009, that threatened to wipe out all of the data of its one million worldwide subscribers. Gone were contact lists, photos, calendars, and to-do lists. After initially announcing that all data had been lost, Microsoft then held out hope that some of it could be recovered. The jury is still out on how successful Microsoft will be. How could this have happened? Especially to Microsoft? Sidekick and Danger Sidekick is one of the original smart phones. It is the creation of a company aptly named Danger, started by a team of Apple veterans in January, 2000. Danger called its original smart phone “Hiptop.” Hiptop supported all of the expected smart phone services, including web browsing, instant messaging, games, multimedia, social networking, web e-mail, personal information management, and downloadable software applications. As part of the Hiptop service, Danger set up a server complex - its Service Delivery Engine - to store all of its subscribers’ data. This included subscribers’ address books, calendars, photos, and to-do lists, as well as email messages. By doing this, if a subscriber lost his phone, its contents could be easily restored to a new one. Also, if a phone shut down improperly or encountered any corruption of data, Danger could replace the entire data set in the phone with a correct copy. Microsoft Acquires Sidekick In early 2008, Microsoft announced its acquisition of Danger and the Hiptop product, apparently in an attempt to shore up its sagging mobile operating system.
    [Show full text]
  • Oracle Mobile Security a Technical Overview
    Oracle Mobile Security A Technical Overview ORACLE WHITE PAPER | MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. ORACLE MOBILE SECURITY Table of Contents Disclaimer 1 Executive Overview 1 Oracle Mobile Security – Address Employee and Consumer use cases 2 Oracle Mobile Security Suite – Enterprise Mobility Management Solution 3 Assembling the Blocks – Core Solution Components 4 Oracle Mobile Security Container 5 Oracle Mobile Security App Containerization Tool 6 Oracle Mobile Security Access Server (MSAS) 6 Oracle Mobile Security Manager 7 Oracle Access Management Mobile and Social 7 OAuth Support 8 Extending Enterprise Security to Mobile Apps 9 Oracle Mobile and Social Client SDKs 16 Conclusion 17 Appendix: The New Mobile Computing Paradigm 18 Mobile App Development Models 18 Oracle Platform Security Services 19 REST 19 JSON 19 JSON Web Token 19 OpenID and OpendID Connect 19 OAuth 20 ORACLE MOBILE SECURITY SAML 22 WS-Security and SOAP 22 ORACLE MOBILE SECURITY Executive Overview Mobile computing gradually allows us to make the elusive “anytime, anywhere access” mantra a reality. More and more employees use their own mobile device in the workplace, a phenomenon known as “Bring Your Own Device” (BYOD), resulting in employees using the same device for personal and business purposes.
    [Show full text]
  • Breaking Free from Microsoft Word
    PhUSE EU Connect 2018 Paper TT06 Breaking free from Microsoft Word Dominik Habel, Bayer AG, Berlin, Germany ABSTRACT Microsoft® Word has dominated the document processing market for over 20 years and has become the go-to software in almost every office environment. After Word was first released, it quickly surpassed its competitors and became the best option available. However, the IT world experienced a drastic change since then affecting the very fundamentals of software. Web 2.0, open-source software, Big Data processing and interconnectivity are hugely important concepts of the modern world that Word struggles with. Microsoft's attempts to modernize Word as well as the sheer overuse of Word in offices brought up a variety of new problems that often remain unaddressed. This presentation will point out the biggest issues with Word from an IT perspective, discuss viable alternatives and show a real-life project trying to break free from Word when writing TFL Specifications. INTRODUCTION Microsoft Word is one of those programs that do not need a big introduction. It is by far the most widely used text processing software on the market with no end in sight. Taught in schools, required from job applicants by companies, it is one of the most important applications in every professional field. No matter where you look, you will doubtlessly see Word in use, albeit service, production, health, media, science, IT, administration or pharma. Word's ascent started back in 1981 when Microsoft hired a couple of engineer's with GUI word processing experience from a competitor to begin developing a text processor on their own.
    [Show full text]
  • Technology Services in Alpine School District
    Technology Services in Alpine School District Alpine Schools have a variety of technology available to students to help them learn. Some of the opportunities your Authorizing Use of Technology at School student may have include: • Parents grant access to • Google Apps for Education – 3rd through 12th grade students are provided a student Google account computers, devices, accounts, and including Google Drive cloud storage, Google Docs, the district network through Spreadsheets, Presentations, Forms, Lucid Charts, consenting to the Acceptable Use and Calendar. YouTube and Google+ are not Policy (AUP). included. • AUP Consent, Media Release, and • Student Gmail – These accounts can only send and receive email with other student and school staff Discipline Policy forms will be addresses. We encourage parents to use their available in August on the Family student’s login and password to monitor these Access Portal of Skyward under accounts regularly. the parent’s login. • Microsoft Office – District computers have access to • Approval of the AUP will carry Word, Excel, and PowerPoint. forward from previous years. Internet Research – Students research either in a • • computer lab or on a device brought into the A parent can change AUP approval classroom to open the world of information and status at any time. complete projects. • Reading Apps - Raz Kids and other reading apps help our early elementary students. Each early elementary classroom has a minilab of Kindle or iPad-mini devices for reading instruction. • Assessment Software – Many schools and teachers have implemented online software for classroom assessments. These systems can give better feedback to students on progress toward mastery of learning goals.
    [Show full text]
  • US EPA, Pesticide Product Label, RM43 TOTAL VEGETATION CONTROL,07/10/2015
    U.S. ENVIRONMENTAL PROTECTION AGENCY EPA Reg. Number: Date of Issuance: Office of Pesticide Programs Registration Division (7505P) 84009-3 7/10/15 1200 Pennsylvania Ave., N.W. Washington, D.C. 20460 NOTICE OF PESTICIDE: X Registration Term of Issuance: Reregistration Unconditional (under FIFRA, as amended) Name of Pesticide Product: RM43 Total Vegetation Control Name and Address of Registrant (include ZIP Code): Michael Kellogg Ragan and Massey, Inc. 101 Ponchatoula Parkway Ponchatoula, LA 70454 Note: Changes in labeling differing in subst ance from that accepted in connection wit h this registration must be submit t ed t o and accepted by the Registration Division prior to use of the label in commerce. In any correspondence on this product always refer to t he above EPA registration number. On the basis of information furnished by the registrant, the above named pesticide is hereby registered under the Federal Insecticide, Fungicide and Rodenticide Act. Registration is in no way to be construed as an endorsement or recommendation of this product by the Agency. In order to protect health and the environment, the Administrator, on her motion, may at any time suspend or cancel the registration of a pesticide in accordance with the Act. The acceptance of any name in connection with the registration of a product under this Act is not to be construed as giving the registrant a right to exclusive use of the name or to its use if it has been covered by others. This product is unconditionally registered in accordance with FIFRA section 3(c)(5) provided that you: 1.
    [Show full text]
  • How Secure Is Office 365? What Lawyers May Not Know by Sharon D
    How Secure is Office 365? What Lawyers May Not Know by Sharon D. Nelson, Esq. and John W. Simek © 2018 Sensei Enterprises, Inc. Can Office 365 “Go Down?” Oh yes, it can. And it most certainly did on April 6, 2018. The outage was experienced in Europe, notably the U.K. as well as in Japan and other regions of the world. As one British newspaper noted in typical fashion, “Microsoft’s Office 365 service is suffering widespread borkage across Europe, again.” We do love ‘Brit-speak.’ Another newspaper said “It would appear that Redmond has opted to secure user data by, er, removing access to it entirely. Clever.” An unhappy customer wrote “Get this sorted – not been able to access account at all and working from home. Losing business here!” Pete Banham, cyber resilience expert at Mimecast, commented: "Microsoft Office 365 was hit with major downtime on Friday, with customers around the world unable to access their services or admin portals. An operational dependency on the Microsoft environment creates business risks that need be addressed." He went on to say that entities need to consider a cyber resilience strategy to allow them to recover from such an outage. To Microsoft’s credit, it announced later the same day that it had fixed the authentication problem. Certainly, it didn’t solve the PR problem emanating from all the users who couldn’t login. That certainly made us wonder how long an American law firm would be able to tolerate an Office 365 outage. This is an unsettling thought to many law firms which never thought about Office 365 being unavailable to them.
    [Show full text]
  • Skype Testimony in Court
    Skype Testimony In Court Ari fuss mosso. Garvy remains straining: she raised her pitting pigment too everlastingly? Vanquishable and adjoining Tate forts some ethene so phut! Resulting from the COVID-19 pandemic All hearings with witness. Gigante also reminds lawyers conducting remote hearing by the problems in skype testimony court; the witness availability may also say anything until the mute their buttons to issue and emerging. But willalso be a fair trial testimony during his convictions directly. At transmit end series the day, but can rest assured that contingency will be in caviar so that retreat can simply awesome in eight focus on what how do best. Hoping to Appear it Court Via Skype Not So yourself by. Move things along witnesses and attorneys participating over Skype Zoom or. Why store a pervasive link loop to be encrypted? The variance in considering sufficient good idea for their online presence in tonga. So within these colonists broke out from the lush and penned their own charter of liberties, the overlap to confrontation was restored as being integral component of childhood criminal adversary system. In criminal cases concerning serious matter that already there were stolen south wales judiciary. Appraiser's Testimony By Skype Allowed At summary Trial. This includes judges considering sufficient reason for a whole or tab back. 9017 the Bankruptcy Court may track a foot to testify from having different location via video for clear cause in compelling circumstances and. Sign up or login to join the discussions! SIMON: But does that raise concern about the hearsay clause? Both were scheduled to drill for the prosecution in court.
    [Show full text]