Wednesday, September 21, 2016
State v. Dharun Ravi: Invading the Sexual Privacy of LGBTQ Persons
*This post is based on a contribution to the Boston University Law Review symposium on Danielle Citron's Hate Crimes in Cyberspace.
Invading the sexual privacy of LGBTQ persons is particularly devastating. In a world characterized by homophobia, exposing someone as gay, publicizing his or her sexual activities to others, and transforming him or her into a sexual object means that LGBTQ victims of sexual privacy invasions face stigma and discrimination.
Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. According to one study, almost three-quarters of cyberharassment reports come from women. Nearly half of all lesbian, gay, bisexual, and transgender (LGBT) youth experience cyberharassment each year, and LGBT teens are three times more likely than heterosexual teens to be harassed online and twice as likely to receive threatening or harassing text messages. As a gendered and sexualized phenomenon, cyberharassment plays a role in the continued subjugation of women and members of the LGBT community.
For sexual minorities, institutional discrimination amplifies cyberharassment’s horrors. This is not to say that heterosexual victims are crying wolf; to the contrary, cyberabuse is an equal opportunity offender. But LGBTQ victims face three additional hurdles. First, the personal psychological effects of cyberharassment are likely worse when victims live in jurisdictions with laws that discriminate against them. And despite some notable advances, anti-gay discrimination is still more the norm than exception. Second, when patterns of cyberharassment also involve “outing” the victim as gay, rampant discrimination and lost opportunity can follow. And third, for those LGBT and questioning youth who, by virtue of their families’ geographic and cultural isolation, lack local LGBT friends and role models, cyberharassment transforms the internet, ostensibly a door to a wider digital world of opportunity, into a danger zone. This enhances a no-where-to-turn sense of hopelessness that, although experienced by many victims of cyberharassment, is felt by none more acutely than LGBT youth.
Institutional discrimination faced by LGBT victims of cyberharassment metastasizes psychological effects because, as Mark Hatzenbuehler has shown, institutional discrimination enhances all mood, anxiety, and psychological disorders. In a 2010 study, Hatzenbuehler found that institutional discrimination can have a statistically significant negative effect on the mental health of LGB persons: lesbians, gay men, and bisexual individuals who lived in states that banned gay couples from marrying experienced mood, anxiety, and psychiatric disorders at higher rates than LGB persons living in equality states. It makes sense, then, that LGBT victims of bullying and harassment rival only homeless LGBT youth in the frequency and severity of psychological injury in the community.
As a means of “outing” gay persons, cyberharassment also triggers an onslaught of potential discrimination in employment, housing, and the provision of health care. “Outing,” or the revelation of another’s identity, is a frequent element of cyberharassment targeting members of the LGBT community. It is a central reason why antigay cyberharassment is an invasion of an LGBT person’s privacy. Though emotionally harmful, the closet may be a necessary evil in a discriminatory world: in 29 states, you can be fired, denied a home, and denied public accommodation just for being gay. Consider the story of Mark C., one of the many LGBT victims of cyberharassment with whom I have spoken in the course of my research.
Many LGBT youth, in particular, also experience acute effects of cyberharassment because of their unique dependence on online social networks. Often faced with geographic isolation from fellow LGBT individuals, gay youth rely on online social networks to replace non-existent face-to-face communities because they allow roughly anonymous virtual interaction with like-minded individuals. Therefore, these adolescents are not only frequent internet users, but also completely reliant on the virtual community they create for social support, information about their sexuality, and answers to any questions they have about being gay. Empirical data bears this out. As early as 2001, more than eighty-five percent of LGB adolescents reported that the internet had been the most “important resource for them to connect with LGB peers.” Destruction of that online social support network through cyberharassment is, therefore, particularly harmful because it turns what might have been a gay student’s safe space into a danger zone. Gay and lesbian adolescents’ dependence on online media makes them more susceptible to those who would use it as a sword against them.
None of this is to say that cyberharassment does not devastate all its victims. But while it is clear that cyberharassment is a modern weapon used to subjugate sexual minorities, it also makes institutional discrimination worse. Cyberharassment turns second-class citizens into third-class denizens by ballooning psychological harms and triggering discrimination in employment, housing, and the provision of benefits. And it takes away a virtual world of great opportunity from those who need it most.
Tyler Clementi may not have been a victim of cyberharassment. But he was "outed" by his roommate's invasion of his privacy. That Mr. Ravi acted with such disregard for Tyler's humanity makes this story reek of injustice. The criminal law, as written by New Jersey's legislature, may not have been the best tool for addressing the problem. In my next post, I will discuss a few options--beyond the criminal law--for making the internet safer for us all.
Tuesday, September 20, 2016
Nonconsensual Pornography and the "Gay Bachelor"
Logo TV, an LGBTQ-themed television network, is running a sort-of reality show called "Finding Prince Charming." I hear it's absolutely terrible. It looks a lot like ABC's "The Bachelor," except Logo's version is about gay men. Its star is a statuesque man named Robert Sepulveda Jr., a model, interior designer, and, apparently, a former escort. Because Mr. Sepulveda is on television trying to become famous, a celebrity gossip website thought it was "newsworthy" to publish explicit photos of him from his escort days without his consent. The photos have now been "unpublished." As far as we can tell, Mr. Sepulveda used those photos during his days as an escort. He didn't publish them online for everyone to see. Posting graphic or explicit photos of another without his or her consent is called "nonconsensual pornography" (NCP), more commonly known as "revenge porn." And it is a crime in 35 jurisdictions and counting.
Most NCP victims are women. But gay men are frequent victims, as well. Lokies Khan, a gay Singaporean man, had a sex tape posted online without consent. Speaking on the YouTube channel, Dear Straight People, Mr. Khan said he felt "violated," "scared," and undermined by the incident: “Things that I post on Instagram are things that are within my control, are things I want people to see, [that] I’m comfortable with people to look at. But these gifs of me on Tumblr are not within my control. I did not give consent. I did not know it was there.”
In my own research, I have spoken to more than 20 gay male victims of NCP. It usually happens in one of two contexts:
- As with many cases of NCP, generally, ex-boyfriends sometimes post nude or graphic images of their former partners on Craigslist, pornography websites, or use them to impersonate victims on social networking sites.
- Some gay male NCP victims participate in gay social networking apps. Those apps require their users to post a profile photograph, but social norms on the platforms often make sharing more intimate photos a de facto requirement of participation.
One person I spoke to was a victim of NCP at the hands of a photographer who enticed the victim with promises of free professional headshots for casting calls. Many victims felt "vulnerable"; others felt angry about a person stealing their photographs. Almost all of them found different ways to express how NCP is a devastating erosion of trust.
Victims sent intimate photos to their former partners when they were apart, as kind of a modern day love letter. And many victims were indignant when their friends, acquaintances, or online commenters blamed them for taking and sending the not-suitable-for-work photos in the first place. On gay social networking apps, in particular, a background trust exists. As one man said to me, "We're all gay on here. We're all part of the same tribe, looking for community and companionship in a tough world. You are expected to share photos, with your face and your body. If you don't, people don't talk to you. To have that thrown back in your face is really devastating."
NCP can destroy its victims, as Danielle Citron and Mary Anne Franks have described at multiple points in their work. The fact that photos may be "unpublished" does not make the situation any better. The original publisher may have changed his mind, but the photos, once available online, could have been downloaded, uploaded, and reposted thousands of time. Nor is it a publisher's First Amendment right to publish anything he wants about others. Even celebrities enjoy a right to privacy, which, in fact, fosters more, better, and diverse speech.
Despite having his private photos published online, Robert Sepulveda may be doing fine; he hasn't, as far as we know, experienced the kind of professional, personal, physical, and emotional abuse faced by many NCP victims. But he has been the subject of repeated ridicule online for his past as an escort. The attacks have been a combination of different types of shaming (those who both look down on male escorts and those who think he is a poor role model for the LGBTQ community). Whatever we think about escorting or "sex work" or his absolutely excruciating show, no one deserves to have his or her privacy invaded by transforming them into the subject of the prurient interests of others without consent.
Monday, September 19, 2016
State v. Dharun Ravi: A Culture of Homophobia
Dharun Ravi existed in and contributed to a suffocating culture of homophobia. It helped keep Tyler Clementi in the closet and devalued Tyler's life to the point where Mr. Ravi and his friends consciously or subconsciously felt that Tyler did not deserve a right to privacy. This is the context in which LGBTQ individuals (and many women and other marginalized groups) live: they are seen as "less than" and less deserving of equal rights. For many, it is easy to harass them, assault them, ignore their protests, and invade their privacy because their second-class status means they don't really exist as fully realized humans. The cavalier way in which Mr. Ravi and his friends approached invading Tyler's privacy contrasts with the particularly grave consequences of "outing": openly gay individuals face latent and overt discrimination in society that could make coming out terrifying and dangerous.
There were several pieces of evidence to show that Mr. Ravi himself was explicitly uncomfortable with gay people. When he heard that his roommate might be gay, he texted to a friend, "Fuck my life. He's gay" (8). He tweeted a sarcastic "yay" after seeing Tyler make out with another man on September 19 (12). His sent a dismissive tweet--"they're at it again"--on September 21. He was "shocked" at what he saw when he spied on Tyler on September 19 (20) and did not want to go back to the room afterward, suggesting he was creeped out or that there was something dirty about what Tyler did (20).
Mr. Ravi also participated in a particularly nasty homophobic exchange with a high school friend.
M.H.: hahahahha your gay roomie that. . . did you really see him make out with some guy lmao
DEFENDANT: Yeahh omg [M.W.] saw it too. He was older and creepy and def from the internet
M.H.: that's so nastyyy ew watch out he might come for you when you're sleeping! hahaha jk
DEFENDANT: Omg everyone keeps telling me that. I haven't seen him since then
M.H.: hahaha good luck with thatt
DEFENDANT: He just texted me asking when I was coming home omg.
M.H.: maybe his gay friend is in your Ed bed*
DEFENDANT: I set my computer to alert me if anyone is in it when I'm not there LOL
M.H.: really?? how lmao that's so cool
DEFENDANT: My webcam checks my bed hahaha. I got so creeped out after sunday
M.H.: hahaha that's so crazy
DEFENDANT: Yeah keep the gays away
M.H.: I saw a lesbian Asian couple today but they were like nerdy fobby asian and it was gross
DEFENDANT: Ewwww. When we were in ny we saw two guys making out on a stoop
M.H.: NY that's pretty normal though hahha one of my friends is this gay Asian guy who has his ear pierced lol I mean bellybutton pierced*
In addition to this evidence suggesting that Mr. Ravi looked down on gays and contributed to the culture of homophobia at Rutgers, there is even more evidence that Mr. Ravi knew that antigay stigma permeated his group of friends. His friends said they were "shocked" and that it was "scandalous" two men would make out with each other (11, 14). One called it "weird" (11). Everyone was gossiping and laughing about it (14). There were at least 6 people who were gossiping and whispering and pointing to the man with whom Tyler hooked up (26). One student tried to brag that being told Tyler was gay "should have fazed" her (18).
Perhaps most indicative of the fact that a culture of homophobia contributes to a devaluing of gays lives is that everyone thought what Tyler was doing in his dorm room was their business. Mr. Ravi's friends wanted to "grab a glimpse" (19). They were "curious" (14). Mr. Ravi thought nothing of purposely positioning his webcam to focus on Tyler's bed (10, 19) and tweeting out invitations to his friends to watch the sexual encounter (18, 20). And his only response to a friend asking if Mr. Ravi actually spied on Tyler was "LOL" (23).
By the end of this story, more than 18 people knew that Tyler was gay and that Mr. Ravi could spy on him. This number included Ravi's friends from high school (7-8, 21), a young woman across the hall (9), her boyfriend at another school (12), her roommate (13), a friend from class (13-14), friends of the young woman's roommate (14), other friends from college (17, 19), and the members of Mr. Ravi's ultimate frisbee team (20, 21). When Tyler found out that Mr. Ravi had been spying on him, it would be hard for him to deny that his secret was out. He decided to commit suicide shortly thereafter.
Mr. Ravi cannot be directly blamed for Tyler's suicide. But the homophobic context in which he acted and to which he contributed should be relevant when considering both the gravity of the invasion of privacy and Mr. Ravi's state of mind. Mr. Ravi remained willfully blind to the consequences of his actions.
Should willful ignorance of the effects of invading the sexual privacy of a closeted gay person should be enough for sentence enhancement? That is clearly not the way the New Jersey statute invalidated in Pomianek was written; that statute made the state of mind of the defendant irrelevant. But could a re-written statute include both intentional targeting and willful ignorance of the effects of such targeting? Antigay bias is not just using antigay rhetoric--"I hate gays" or "Gays deserve to die"--and then purposefully acting on those impulses. Antigay bias includes contributing to a culture of homophobia that devalues the lives of gay persons.
What do you think about an antibias sentence enhancement provision that gets triggered either when someone purposely acts to discriminate on someone's identity or when someone acts with reckless disregard for the discriminatory consequences of his or her actions?
Wednesday, September 14, 2016
State v. Dharun Ravi: The Appeal
In my last post, I summarized some of the basic facts of the Tyler Clementi/Dharun Ravi story. After he was convicted on all counts, Mr. Ravi appealed his convictions. He made various arguments, but his appeal was given an enormous boost by the 2015 New Jersey Supreme Court decision in State v. Pomianek, 221 N.J. 66 (2015), which declared unconstitutional a key statute upon which Mr. Ravi's conviction was based.
N.J.S.A 2C:16-1(a)(3) states:
A person is guilty of the crime of bias intimidation if he commits, attempts to commit, conspires with another to commit, or threatens the immediate commission of [certain specified] offense[s] ... under circumstances that caused any victim of the underlying offense to be intimidated and the victim, considering the manner in which the offense was committed, reasonably believed either that (a) the offense was committed with a purpose to intimidate the victim or any person or entity in whose welfare the victim is interested because of race, color, religion, gender, disability, sexual orientation, gender identity or expression, national origin, or ethnicity, or (b) the victim or the victim's property was selected to be the target of the offense because of the victim's race, color, religion, gender, disability, sexual orientation, gender identity or expression, national origin, or ethnicity (emphasis added).
This provision was the basis for 4 of the 15 counts in the State's case against Mr. Ravi (Ravi, 2-4). Related evidence also permeated the prosecution's case, including counsel's moving closing statement (45-48). But on March 17, 2015, in Pomianek, the New Jersey Supreme Court declared the provision unconstitutional: it was void for vagueness in violation of the Fourteenth Amendment.
Pomianek involved several workers at the Gloucester Township Department of Public Works. The defendants, all white, and the victim, a person of color, were assigned to an old garage that Public Works used for storage. Inside that garage was a large metal cage that could be padlocked closed. The workers had been "horsing around" in the garage, including in and near the cage. As part of a ruse, one of the defendants approached the victim and told him that their supervisor needed some supplies from the cage. Once the victim was inside, the defendant closed the cage door and locked it. A number of workers started laughing, and one of the defendants said, "Oh, you see, you throw a banana in the cage and he goes right in, which triggered more laughter among the men." The victim felt there were racial overtones to this statement. Another worker unlocked the cage door within 3 to 5 minutes. The victim testified that he felt "humiliated and embarrassed." After the victim was released, the defendant was heard saying, "You all right, buddy? We were just joking around."
The defendants in Pomianek were charged, among other things, with bias intimidation in violation of 2c:16-1(a)(3). The jury convicted them on those counts because, considering the racist overtones of the "banana" comment, the victim could reasonably believe that the act was committed on the basis of race.
The problem with this provision was that unlike every other bias crime statute in the country, this law was based on the state of mind of the victim, not the intent of the defendant. The New Jersey Supreme Court concluded that this violated the Fourteenth Amendment. A core element of due process is that a law must clearly define forbidden conduct so that individuals can tailor their behavior to conform with the law. Section (1)(a)(3) did not do that. By hinging guilt on what is going on in the victim's mind as opposed to the defendant's mind, the statute does not put a "reasonably intelligent person on notice when he is crossing a proscribed line."
Based on Pomianek, any part of Mr. Ravi's conviction based exclusively on (a)(1)(3) was void as a matter of law. But, according to the Appellate Division, evidence of Tyler's perception of the events was a "pillar" of the prosecution's case (41). It came up often, including in the closing statement. In fact, it came up so often that it "render[ed] any attempt to salvage the convictions under the remaining charges futile." It therefore was "unreasonable to expect a rational juror to remain unaffected by this evidence" (6). Evidence of Tyler's state of mind was prejudicial and not harmless beyond a reasonable doubt. As such, the court overturned Mr. Ravi's conviction in its entirety.
I am not so easily convinced. The Fourteenth Amendment does not protect people from punishment enhancement based on their indifference and willful ignorance to the plight of their victims. "Bias" should be understood as more than just stating, "I hate gays." But let's assume that Pomianek is correctly decided. The statute was poorly worded; the trial judge noted that. And it is hard to imagine convicting someone of a bias crime without any evidence of bias. There was, however, a lot of evidence that Dharun Ravi existed in a contributed to a culture of homophobia that discriminated against Tyler and devalued his life in the eyes of others. I will discuss this point in my next post.
Though we were all shocked by Tyler's suicide, it is not clear that turning to the criminal law is always the right answer. The New Jersey legislature had good intentions: it wanted to recognize that the pain of the victim, the monstrosity of the attacker, and the social context in which attacks occur matter. But maybe those considerations are best left for tort law. Clearly, evidence of the gravity of the harm and the homophobic context of Mr. Ravi's conduct could be important in a civil case against him.
Stay tuned for more!
Monday, September 12, 2016
State v. Dharun Ravi: What Happened?
On September 9, the Appellate Division of the Superior Court of New Jersey released its opinion in State v. Dharun Ravi. Dharun Ravi, of course, was the roommate of Tyler Clementi, a young Rutgers student who, after Mr. Ravi and his friends spied on him during an intimate encounter with another man, committed suicide on September 22, 2010. The court overturned all of Mr. Ravi's convictions.
To refresh our memories, here's what happened. (All numbers in parentheses refer to the page numbers in the Appellate Division's decision).
Tyler and Mr. Ravi were roommates at Rutgers University. Shortly after being notified that Tyler would be Mr. Ravi's roommate, one of Mr. Ravi's friends found out that someone using Tyler's email address had posted on a forum for gay people (7). So, Mr. Ravi came into college with at least an inkling that his roommate was gay. Tyler, however, was not open about his sexuality. Tyler was still in the closet.
On two occasions in September 2010, Tyler asked for some time in the room by himself (10). He had met a man using a gay social networking platform and invited him to his room (24). Mr. Ravi left. On the first occasion, which took place on Sept. 19, Mr. Ravi actually came back into the room within a few minutes and appeared to "shuffle some papers" on his desk. It turned out he was also adjusting the position of his webcam to face Tyler's bed. Mr. Ravi then used his technical skills to have his video chat platform automatically accept all calls. This allowed anyone who called him to see through his webcam. On both Sept. 19 and Sept. 21, Mr. Ravi tweeted out several comments about Tyler being gay, that he asked to be alone in their room, and that he was hooking up with another man (12). He encouraged others to call his account and watch (18). Mr. Ravi and quite a few of his friends watched live video of Tyler and another man "making out" on Sept. 19 (11). They tried to do so again on Sept. 21.
By reading some of Mr. Ravi's public tweets, Tyler found out that Mr. Ravi had invaded his privacy and made him the subject of others' prying eyes without his consent. Tyler then complained to his resident advisor and asked for either a private room or a different roommate (26-27). On Sept. 22, Tyler's RA notified Mr. Ravi about Tyler's request for a new room and explained Tyler's allegation that Mr. Ravi had invaded his privacy (29). At 8:46 PM that evening, Mr. Ravi wrote Tyler a text that (sort of) apologized (29-30). Shortly thereafter, Tyler, who had already left campus, used his cellphone to write on his Facebook page: "I'm going to jump off the GW Bridge. Sorry." Moments later, he did so (30).
On April 20, 2011, a grand jury returned indictments against Mr. Ravi for invasion of privacy, bias intimidation, witness tampering, and hindering apprehension or prosecution. On March 16, 2012, the jury convicted Mr. Ravi on all counts. After denying a motion for a new trial, the trial judge sentenced Mr. Ravi to 3 years probation, dependent on serving 30 days in jail (4). Mr. Ravi also had to complete 300 hours of community service, attend counseling on cyberbullying and diversity, and pay $10,000 (which was to be dedicated to helping victims of bias crimes) (5).
September 2010 was a difficult month for the LGBT community. Tyler was just one of 10 gay adolescent boys to commit suicide. Billy Lucas, 15, died on Sept. 9. Cody Barker, 17, died on Sept. 13. Seth Walsh, 13, died on Sept. 19. Asher Brown, 13, died on Sept. 23. Harrison Brown, 15, died on Sept. 25. Raymond Chase, 19, died on Sept. 29. Felix Sacco, 17, died on Sept. 29. And Caleb Nolt, 14, died on Sept. 30.
Tyler's death brought extensive media attention to the problems of suicide in the LGBTQ communities and antigay bullying. Celebrities, including Ellen Degeneres and Anderson Cooper, spoke out about both issues. Antigay bullying is indeed an epidemic facing our schools and our communities. But it is worth asking: Was Tyler a victim of "cyberbullying"? In one sense, it doesn't matter. Tyler's story brought much needed attention to a problem that needs to be addressed, and his parents have joined the fight against bullying and cyberbullying in the years since his death.
But definitions are important. There are a host of definitions of “cyberharassment” or “cyberbullying” milling around. And imprecise and inconsistent definitions frustrate our ability to understand, talk about, and solve the problem. Danielle Keats Citron, author of Hate Crimes in Cyberspace and the leading cyberharassment scholar, defines cyberharassment generally as repeated online expression that intentionally targets a particular person and causes the targeted individual substantial emotional distress and/or the fear of bodily harm. There are five core elements to that definition: repetition, use of digital technology, intent to target, targeting, and substantiality of harm.
Cyberbullying is a subcategory of cyberharassment that includes all five of those elements but is focused squarely on youth-to-youth behavior. It can be understood as repeated online expression that is intended to cause substantial harm by one youth or group of youths targeting another with an observed or perceived power imbalance. This definition retains those five factors and adds two important elements: youth and power imbalance, the latter of which is actually common in many forms of cyberharassment. The asymmetry of power, which could be based on identity (i.e., a member of the majority attacking a member of a traditionally marginalized and discriminated minority), draws the line between schoolyard teasing and bullying. It should come as no surprise, then, that young members of the LGBTQ community are uniquely susceptible to bullying and its tragic consequences. They are bullied because they deviate from the norm and because antigay bullying is either tacitly or explicitly condoned by antigay bigotry and homophobia in society at large. This definition of cyberbullying captures the worst online aggressive behavior while excluding the otherwise mean, hateful, and distasteful speech that free speech norms tend to tolerate. Cyberbullying is, at bottom, cyberharassment involving youth. And it is an epidemic affecting our schools.
Although Tyler was targeted because of his sexual orientation and Mr. Ravi's behavior caused Tyler to experience substantial emotional distress, it is not clear that what happened to Tyler involved repeated behavior that rises to the level of a course of conduct. However, I am not sure that matters at all. Mr. Ravi was not accused of violating an anti-bullying law; he was accused of invading Tyler's privacy, which is exactly what he did.
With this background, I would like to use several forthcoming posts to explore several theories and questions about the Appellate Division's decision in State v. Dharun Ravi. Stay tuned for the next post!
Thursday, August 11, 2016
Copyright Doctrine: IPSC2016
IPSC - Breakout Session II - Copyright Doctrine
Summaries and discussion below the break. If I didn't know the questioner, I didn't guess. If you asked a question and I missed you, feel free to identify yourself in the comments.
Copyright State of Mind – Edward Lee
Authorship and Audience Appeal – Tim McFarlin
Free as the Heir?: Contextualizing the Role of Copyright Successors – Eva Subotnik
Leveraging Death: IP Estates and Shared Mourning – Andrew Gilden
Copyright State of Mind – Edward Lee
Offering a descriptive taxonomy about how state of mind is used in copyright law.
2d Circuit in Prince v. Cariou: transformative use, the first factor in the fair use test: objective state of mind
9th Circuit in Lenz v. Universal: DMCA 512(f) violation: subjective state of mind
State of mind re: copyright liability - it is often said that copyright infringement strict liability. This differs from criminal law, where mens rea (criminal intent) typically matters.
If we look beyond liability, state of mind figures prominently in many different copyright doctrine. For example, authorship, including intent to be joint authors (both objective indicia and subjective intent). We haven't considered the intent of the lawsuit - are we protecting copyright or privacy, for example, but Judge McKeown on the Ninth Circuit recently argued we should. For ISPs, we have the red flag cases which have both subjective and objective elements.
Dave Fagundes: Property also deals with intent. Adverse possession and first possession have a whole mess of intent-related doctrines. Perhaps the ownership intent doctrines might help conceptualize these issues.
Pam Samuelson: Think about remedies as well. Innocent infringement, as well as willful infringement. It can play out also in relation to injunctive relief. Plaintiff's state of mind might matter with regard to obtaining injunctive relief. See also the new Kirtsaeng attorneys' fee case.
Ed Lee: Perhaps I should also look at the Supreme Court's patent cases.
Matthew Sag: If there is a universal theory about what state of mind should be for any of these doctrines, is there a logic that connects us to why we have copyright in the first place?
Ed Lee: I'm skeptical of a uniform theory. See, for instance, DMCA which is a negotiation between stakeholders.
Dmitry Karshtedt: My understanding is that civil liability more objective than subjective, while for criminal liability, intent is more subjective. and should we see the same play out in copyright?
Reforming Infringement – Abraham Bell & Gideon Parchomovsky
We have an immodest goal of reforming remedies in copyright, more systematically including culpability in the analysis. Under the reformed regime, we would treat inadvertent infringement (where the infringer was unaware and couldn't reasonable become aware) and willful infringement (blatant disregard of copyright law) different from standard infringements (with a reasonable risk assumption).
The close cases are in the middle category of standard infringement. The default is standard infringement. Compensatory damages should be awarded in every case. Injunctions would be rare and no restitution for lost profits awarded in the inadvertent cases. We are trying to preserve statutory damages only for cases where it is difficult to prove actual damages. So the defendant in the standard infringement case could argue that statutory damages exceed actual damages.
Why bring it in? 1) Information forcing - incentivize owners of copyright to clarify ownership and terms of licenses. 2) Avoid overdeterrence of follow-on creation. 3) Increase fairness.
Ted Sichelman: In the patent context, we worry about transaction / licensing costs. It may matter for copyright as well. For example, if the work is an orphan work, why should I face huge potential liability?
Abraham: The inquiry should account for the difficulty of finding the copyright owner.
Ian Ayres: Does any kind of negligence go to willfulness because there is no reasonable basis for non-infringement?
Abraham: It's not clear how we would calculate such a thing: What is a reasonable risk, re: evaluation of risk of law. We're treating standard as a residual category. But we are still arguing about this point.
Pam Samuelson: Have you been thinking about remedies re: secondary liability? The framework appears to deal with direct liability, but secondary liability cases may be the more complicated cases, where we wonder how culpable is the platform? The statute tries to grapple with through 512.
Abraham: We didn't think about secondary liability until we talked with Lisa Ramsey last week.
Pam: Secondary liability is the area that needs the most reform!
Abraham: We'll have to bracket this right now. Secondary seems to follow primary, and we don't have a better model right now.
Shyam Balganesh: How much of your proposal unravels other parts of the system? Are you accounting for systemic effects? For example, if information forcing matters, why not deal with that through a heightened notice requirement? Do you think infringement is independently problematic, or is it the best place for achieving information forcing goals?
Abraham: Unlike information forcing, overdeterrence is harder to fix with levers in other places. This isn't the only way to accomplish these goals, and we don't claim that, or that it's the best way.
Jerry Liu: Is it necessary, from an overdeterrence standpoint, to distinguish between willful and standard infringement? Google Books was arguably willful infringement, but it was also efficient infringement.
Abraham: I think Google probably was a standard infringer, from a culpability standpoint. They took a fair use gamble, and they won.
Jerry: How about the MP3.com case?
Abraham: You can make an argument that format change / transferring medium is fair use, so standard.
Authorship and Audience Appeal – Tim McFarlin
Recent projects have looked at disputes between Chuck Berry and his piano player, and Orson Welles and a script-writer. In both cases, questions of audience appeal have been nagging at me, and I want to explore that further.
Can we better use audience appeal in the infringement context than the authorship context?
Audience appeal, from the Aalmuhammed v. Lee case (9th Cir 2000), is an important factor. Audience appeal turns on both contributions, (by potential coauthors), but "the share of each in the success cannot be appraised," citing Learned Hand. If that's right, and we can't evaluate audience appeal in the authorship context, is it a junk factor? If we can, how do we do it? And if we can, should we?
What do courts do with audience appeal? Mentioned in 21 cases, but 9 ignored it in reaching the decision. 9 found it weighed in favor of joint authorship, and 3 found it weighed against joint authorship?
How do we appraise it? If we find evidence of audience appeal from both contributions, at what point is the smaller contribution too small? 60/40?
Might audience appeal help with questions of infringement, for example in the Taurus / Led Zepellin case? Might we consider the appeal of Stairway to Heaven v. the appeal of Spirit's Taurus as a reason for public interest to weigh against injunctive relief? See Abend v. MCA (9th Cir. 1998).
Jake Linford: Perhaps talk to Paul Heald about his research on how musicians copy from each other. There is some potential danger in using audience appeal to decide infringement, injunctive relief, or damages, because that leads to a copyright regime where the party who is best-placed to take advantage of the works gets to use and make money with it, even if that party doesn't pay.
Peter DiCola: You are right to challenge Learned Hand. Audience appeal can be appraised. The question is whether it can be appraised convincingly. The part about in general where does audience appeal matter may be too general, and may not be at the heart of your paper.
Pam Samuelson: Some works have audience appeal, some don't, and it might not be relevant for unconventional expressive works For example, the internal design of computer programs are not appealing. You may need to unpack works where appeal matters and where it doesn't.
Jani McCutcheon: Watch where trademark and copyright protection overlap on this issue.
Free as the Heir?: Contextualizing the Role of Copyright Successors – Eva Subotnik
This paper is inspired by two recent controversies surrounding Harper Lee and To Kill a Mockingbird: the appearance of Go Set a Watchmen, and the decision by her estate to pull the student-priced paperback from the marketplace. Both of these stories are murky. Lee may not have been in her right mind when Go Set a Watchmen was released, and the announcement from Hachette about the student-priced paperback suggest both the estate and Lee wanted the low-priced version discontinued.
Should motivations of the author or the heir matter for copyright decisions? Eva argues that it should. The law should be tougher on post-death copyright successors. We should treat them more like stewards, and require some duties on their part. If copyright ownership limits post-mordem access, heirs should be encouraged to take care.
What might stewardship mean? It has its origins in theology, traditionally applied to land. It's taken on a secular cast today. Stewardship suggests that the owner has duties as well as rights. Stewardship has something in common with commons advocates - copyright should be forward looking, and concerned about future generations. Bobbi Kwall has argued that authors are stewards, and I think it should be applied to heirs as well. Unlike authors, publishers, and distributors who did work with the work, stewardships step in as recipients of a gift, and perhaps they should step into some duties.
Application: Eva doesn't argue for a statutory change, and it's not clear stewardship would change the analysis of the Harper Lee issues, but stewardship could change fair use analysis, for example with biographers and scholars. When the heir has the ownership of a sole copy, stewardship could matter [JL: unclear to me how]. Perhaps stewardship could allow authors to better shape stewardship of their legacy. [JL: Doesn't the termination provision already exclude wills?]
Brad Greenberg: A potential disconnect between assignments and statutory heirs of termination rights. What if the author's assignee is a good steward, and the children are poor heirs, from a stewardship standpoint? Is Stewart v. Abend's analysis of the renewal right a problem for your analysis? Should we also apply stewardship duties to non-author copyright owners?
Eva: To my mind, a post-death successor gains enhanced prominence in managing the copyright after death, and I'm trying to say something specific to that group of copyright owners.
Dave Fagundes: I like the idea of stewardship, but it's still inchoate, and I can't tell to whom is the steward responsible? The work? The public? The author's intent? What if authors wanted their families to be taken care of?
Eva: You could also add the author's legacy, which may differ from author's intent. [JL: This reminds me of Mira Sundara Rajan's project from the first breakout session.]
Ed Lee: Perhaps the moral rights of integrity literature could also be helpful, which is more about legacy than children.
Giancarlo Frosio: French case 2007 might be helpful. See also Kant.
Leveraging Death: IP Estates and Shared Mourning – Andrew Gilden
Scholars seem to distrust claims by estates and heirs, but the tend to succeed in advocating for statutory change, and winning cases before the courts. But I found some recent claims that sound in mourning and grief that perhaps we shouldn't discount in copyright and right of publicity cases.
IP Narratives that are traditionally invoked:
1) Anti-exploitation. Randy California was badgered for years to sue Jimmy Page, but his heirs stepped in to claim some recognition for him.
2) Family privacy. James Joyce / J.D. Salinger estates
3) Purity narratives. Limit downstream uses, especially those that raise potential sexual purity.
4) Inheritance. It's all that the author left to the family.
5) Custody (like child custody). Children as caretakers of the work.
Copyright scholarship tends to ignore these types of claims, but we see them invoked successfully in cases like family businesses, bodily disposition, organs and genetic information, digital assets, like email, and succession laws dealing with omitted family members.
What would happen if IP took these interests seriously? Perhaps there is a desire for shared mourning and grief, both by authors' heir and fans. Fans circulate and disseminate broadly as part of public mourning, but mourning families look inward, seek silence, achieve some semblance of privacy. These interests might not be as irrational as we might think.
One solution might be to bring issues of estate planning more to the fore. Marvin Gaye and Frank Sinatra created a family business when they secured copyright, whether they meant to or not.
Rebecca Curtin: You've made a very sympathetic case, and you've repeatedly spoken about family. Do you mean family, or could you include designated heirs, like the Ray Charles foundation? What might that mean?
Andrew: We may need to think differently about those who inherit intestate and those who don't.
Brad Greenberg: The incentive theory of inheritance suggests that authors will create in part to benefit children. But there could be a labor theory of inheritance: this was the authors, like the children, and it goes to the children. In addition, is this really about IP, or just copyright?
Andrew: Copyright and right of publicity. My take is more of the labor than the incentive theory.
Q: Why does the right publicity survive death?
Andrew: Jennifer Rothman has a very good paper on this. Right of publicity is labelled as property, and property descends, so in some states it descends.
Peter DiCola: I enjoy the presentation, and I ask not to upset the applecart, but what might the First Amendment tell us about these arguments about importance of controlling meaning?
Andrew: I don't think these insights should change fair use outcomes, but my concern is that heirs' motivations are okay, especially in light of how they work in other cases. The emotional appeals are not inherently problematic. (Although I have some problems with the purity rationale).
Jake Linford: Is this project normative as well as descriptive?
Andrew: It started more descriptive, but normatively, I see no problem. Prescriptively, perhaps we could ask authors to be more clear about how their intent at registration / protection, for example.
Giancarlo: Is there space for a moral rights style argument here?
Andrew: Perhaps attribution is the best moral rights claim.
Giancarlo: Is there a mechanism is the composers of Blurred Lines had said no? Can you make the heirs grant a license?
Andrew: Blurred Lines is a declaratory judgment action - the derivative authors brought the case to foreclose liability.
Tim: The estate's emotional appeal in the Taurus complaint may have been somewhat strategic, trying to deal with the perception of greedy, rent-seeking heirs by promising to give money to sick children.
IPSC 2016 First Plenary Session
Thanks to Rachel Sachs for the following summary of the opening plenary session at IPSC! The following papers are summarized, and Q&A recounted, below the fold.
Scarcity of Attention in a World without IP
What’s In vs. What’s Out: How IP’s Boundary Rules Shape Innovation
Mark McKenna & Christopher Sprigman
What We Buy When We “Buy Now”
Aaron Perzanowski & Chris Hoofnagle
Jake Linford: Attention Scarcity in a World without Copyright
The standard account of copyright is that we have it and impose artificial scarcity so that artists can recoup their sunk costs in creating information. But the costs of creating/disseminating information have fallen, and some argue that maybe we should narrow copyright as a result.
This paper argues that narrowing copyright for this reason may be too hasty! It does so by introducing a complicating wrinkle: attention scarcity. The cheaper it is to disseminate information and the more information we get, it may create information gluts. Information gluts can impose costs on consumers, including consumers of copyrighted expression. And the competition for scarce attention is often a zero-sum affair, in which competitors benefit by using copyrighted expression (some of which they don’t pay for and thus use impermissibly) to attract and manipulate scarce attention. As such, some calls to reduce copyright protection may worsen these problems of attention scarcity and information gluts.
Linford does consider the possibility that less copyright protection is better for attention scarcity. What might happen if we reduce copyright protection? One option is that we have less entry. If we have narrower protection then there’s less incentive to enter, but then at the same time there are lower “expression costs.” With copyright retained, you have a relatively higher incentive to create, but you also have higher expression costs. Linford’s concern is that lowering protection might result in less creative or distinct entry, things that are more similar to each other, which is duplicative and results in wasteful racing to capture the first-mover advantages for derivative works. Here, Linford relies on recent work by Joe Fishman (Vanderbilt) arguing that constraints imposed by copyright can sometimes push creators to be even more creative, work that is supported by recent psychological research.
Lemley question: It turns out that crowdsourcing is at least as good and maybe better than expert selection in helping us separate good from bad creative works. So yes, if twenty people make a derivative Star Wars movie, the crowd is good at telling us which is good and bad. Are we really worse off?
Linford: One key danger is that Lucas has to rush out The Empire Strikes Back to compete with those twenty derivative movies, and we may be concerned about the effect of that pressure.
Betsy Rosenblatt: We live in a world where trends are pervasive, even in a world with heavy copyright. One successful horror film leads to twenty more mediocre ones. People tire of sameness. The solution doesn’t seem to be “stop the trend from happening,” it seems to be “let the trend run itself out.” Information scarcity may not create the problem/solution set Linford is describing.
Linford: Thinks what’s more likely is that trends will purge themselves by, instead of having 20 horror movies that pick up the tropes of the genre, you end up with 20 more identical horror movies. The more you narrow it, the more similar those interpretations are.
Central question: What sorts of things are sorted into the utility patent system rather than design patent, copyright, or trademark law? This matters for the current utility patent debates over patentable subject matter but more importantly for the tructure of the system overall. Copyright, trademark, and design patents all have doctrines designed to exclude useful or functional matter on the grounds that such matter is the proper domain of utility patent law. They define themselves in opposition to utility patent law. They all police the boundaries differently, and with different levels of rigor. They don’t do it because the material doesn’t otherwise meet the requirement of those systems – functional material may still indicate source (trademark) or have expressive content (copyright) – but they do it because we think it’s the domain of utility patent law. Mark & Kathy STrandburg have called this the Utility Patent Supremacy Principle. This only works if the other systems have a reasonably clear view of what belongs to the utility patent system.
However, in their view the sense of utility patents deployed in other areas of IP is quite reductive and intuitive, and lack of a clear sense of patent law’s boundaries creates problems both for patent law and these other fields. It’s especially hard to apply when utility patent eligibility is in flux, as it is now. Patent law itself has an inconsistent sense of its own grounding – what counts as technological innovation?
Conundrum: there’s a widespread belief that utility patent law focuses on technological innovation, but in practice that’s inconsistently enforced. Yet all other areas of IP act as if there’s a clear sense of what utility patent law is about (technological innovation) and that other areas of IP should defer to utility patents in that area.
Provides as an example the Varsity Brands case, decided by the Sixth Circuit and scheduled to be heard at the Supreme Court this upcoming term. What divided the appellate opinions in that case was their assessment of functionality. For the majority, the chevrons on the cheerleader uniforms just served to cover the body. But for the dissent, the function is to identify the wearer as a cheerleader. And in that chase, the chevrons are not separable. But if the function is just to cover the body, chevrons are separable and thus copyrightable. This case turns on the definition of functionality and what kinds of functionality the courts are supposed to keep out of copyright, which is undertheorized, as they’ve been arguing.
Linford: What’s the right answer in terms of which way should we push the doctrine?
McKenna: The paper is mostly diagnostic, it’s not prescriptive. The primary point is to identify a paradox at the heart of the system, if you think of the various forms of IP as a cohesive system. We don’t have a particular answer yet.
Ouellette: Where do you think this causes the most difficulty? Overlap may not obviously create problems.
McKenna: Overlap does create some problems, makes it more difficult for people to know what the bounds are of permissible conduct and expression. The accumulation of rights is a problem at least some times for overprotection. When we think about what kind of fair use rights we want to give, as an example, we don’t account for the possibility of overlap.
Sprigman: Some things will end up being protected in multiple ways, but some things won’t end up being protected at all – patent law may kick things out on grounds of novelty or non-obviousness, but other fields will kick it out as being functional.
Janet Freilich: Patent Clutter
Patent claims point out and distinctly claim the invention, and they’re often thought to be shorthand for and synonymous with the invention. But there are few empirical studies of these claims. This study asks whether claims are really only about the invention, or whether claims do a lot more than just point out the invention. The method she uses is to look at whether language appearing in the claim language also appears in the specification. We should care about this because if something in the claim isn’t discussed in the specification, it’s unlikely to be new or used in a new way, or alternatively it may fail the enablement or written description requirements.
Freilich finds that a great deal of claim language (roughly 25%) appears rarely or never in the specification. An average of 9.4% of claim words appear nowhere in the specification, 8.3% appear once, 7.5% appear twice. She calls this non-inventive language, and about 90% of it appears in dependent claims. Patents that have more non-inventive language have fewer forward citations and it’s less likely that the patent is maintained, two common measures (though imperfect) of patent value. Her theory is that language in the claims but not the specification is not part of the core invention of the patent.
Freilich considers limitations of her study. For instance, her methodology can’t account for drawings. She also can’t account for genus/species discussions.
Why do patentees do this? There’s an information transmission functions for the patentees. It may also serve a decoy function – competitors may not be sure what you’re planning to do with an invention. It might help to avoid rejection during prosecution. And it might provide insurance against future commercial uncertainty or litigation.
Freilich argues that some of these claims may not satisfy the enablement and written description requirements. There’s also a clarity difficulty here. Claims are already hard to read – non-inventive language makes claims more difficult to read even, especially because the additions by definition are not defined in the specification. Examiners also report struggling with non-inventive language, making their jobs harder. It also makes patents hard to search, when you use keyword searches (a lot of false positives). It may also create the illusion of a patent thicket in an area.
Ultimately, Freilich urges us to think of claims as very complicated and doing more than just describing the invention. It opens up questions like what does the ideal claim look like? There is a tradeoff between precisions and concision. It may not be practical to get rid of all of this, but some of this is clearly problematic.
Fromer: Troubled by the assumption that what’s in the claim language is the only thing that relates to the invention. The specification is frozen at the time the patent is filed, but claims may be amended throughout prosecution. Without looking at the original claim language, it’s difficult to make these kinds of conclusions. More generally, there are many ways to express something and often in practice the specification is more heavily written by the inventors, while the claims are written by lawyers. It doesn’t mean it’s not inventive, just that different people write something in different ways.
Freilich: This is not a precise proxy, but in general patent prosecutors try to ensure that what’sin the claims is reflected in the specification. And she does have some data on claims as proposed versus
granted. A good amount of patents add non-inventive language during prosecution, but others take it out or remain the same.
Vishnubhakat: What you describe as non-inventive language could be language in the claim and simply be what the inventor regards as her invention. If you have it in the claims and not the specification, it could be ill-enabled and described but still satisfy novelty and nonobviousness. So the finding that 9.4% of words never appear in the specification suggests that if this is a story about people who are inventing things and not describing well enough to claim the full scope of the invention is that they’re leaving claim scope on the table, and that seems consistent with a finding that about 10% of patent grants are first-action allowances where there’s not a back-and-forth between examiners and patent applications.
This project builds on a big question: what does it mean to own something? What does it mean to buy something? The now-famous Amazon 1984 case is a big example of why this is a difficult question. Some people look at this and say that consumers understand that they’re buying a license to something, not a copy of it. Perzanowski has never heard a consumer say this. Perzanowski & Hoofnagle set out to understand how consumers perceive this language.
They created a fictitious marketplace and surveyed almost 1300 consumers and asked them about what the “buy now” language means. They screened consumers to be sure that they were all in the market for digital books, music, or movies, and ensured representativeness – pretty close to census data on nearly all metrics. They sorted them into three categories. They saw a page for an ebook, an mp3 album, or a digital movie. Each respondent could also choose between different titles within those media forms. Look at the ebook category as an example. Some people got the “buy now” button for a digital item, some people got “buy now” for a paperback copy, some people got a “license now” button for a digital item, and some people got a little notice about what they were permitted to do with the digital item they were paying for.
Key findings: 1. The “Buy Now” button misleads a substantial number of consumers about the rights they acquire in digital media. Substantial numbers of people think they can lend, gift, or devise these copies by will. The number of people who think they “own” a product drops significantly between people who saw “buy now” or “license now,” although the “license now” group still had a high percentage of people in the lending and gift categories. Many subjects, though, chose “don’t know” in the “license now” group.
2. Those misperceptions are material to consumer decision making. More than half of the respondents would pay more for digital goods that enabled lending, reselling, or using device of that choice, and respondents said they would prefer to retain those rights. And many consumers said they were more likely to download things illegally or stream them if they didn’t have those rights.
3. Replacing the buy now button with a short notice explaining the rights coming with the copy significantly reduced misperceptions. The short notice group seeing the ebook shows significant reductions in the owning, lending, gift, will, and resale categories. However, this wasn’t true for the digital movie group.
Goldman: I wonder if you can tell a different story from the data, which is that it’s really hard to educate consumers. You can still argue that most consumers aren’t getting the message even in the short notice group. What is the best way to educate them?
Perzanowski: Keep in mind that these people had precisely one exposure for ten or fifteen seconds to the short notice. He’d imagine that with repeated exposure you might see those results increasing more. Further, he’s not a professional user interface developer, and someone who has expertise in this might be able to improve it. It’s a promising avenue for improving consumer understanding but more work needs to be done. What we might see is instead of consumers learning is that they don’t bother to read it, which is the opposite of what we’d hope for.
Wednesday, February 24, 2016
I, for one, welcome our new robot Law Lords.
Friends, I've been a terrible guest-blogger so far this month. My apologies. Life (and teaching... mostly teaching) intervened.
But one of the things I'm teaching is an experimental yearlong project-based seminar called the Policy Lab (link is somewhat obsolete), where students spend the first semester learning about an area of legal policy, and the second designing innovations to work on it. And for this first run-through, students have been thinking about legal technology and access to justice. They've learned about things like predictive coding, multijurisdictional tech-driven delivery of legal services, and artificial intelligence, and they've had virtual as well as physical visits from experts and people making waves in the area, including Dan Katz, Jake Heller, Stephen Poor, Tim Hwang, and Craig Cook, as well as more local folks---and now they're working on designing (though not fully implementing) technological tools to provide legal knowledge to nonprofits, as well as policy analyses of, e.g., the ethical implications of such tools. I'm really proud of them.
I'm also a confirmed parking and traffic scofflaw, who once beat a parking ticket with a procedural due process claim, and also once beat a speeding ticket by getting testimony about the laser evidence chucked on the good-old Frye standard (back in grad school, when that standard applied in California). So imagine my delight when I saw this story: "A 19-year-old made a free robot lawyer that has appealed $3 million in parking tickets". A Stanford kid, Joshua Browder, has written a webapp that (as far as I can discern without trying it out or seeing the code) quizzes people about their parking tickets (U.K. only, alas) in natural language, invokes what is sometimes called an expert system to discern a defense for them, then provides an appeal for them to file. Obviously, I have lots of questions and thoughts about this after the fold.
First, is this legal in the U.K.? How do folks feel about the unauthorized practice of law on the other side of the pond? And what about California? On some aggressive interpretations of UPL rules, we might think that the awesome kid is practicing British law in California. As this kind of service, and the services provided by companies like RocketLawyer, LegalZoom, and the like become more customized, and interact with people more like lawyers interact with clients, the UPL questions are going to get harder and harder. The natural language aspect of the parking ticket thing feels to me more like legal practice: you can easily imagine a client trusting an interactive, English-speaking app more than they might trust a more web 1.0 or 2.0 system of drop-down menus and such. Are the regulators going to quash this (especially now that he's looking to expand to New York), or are they going to get out of the way?
Second, to me, this level of legal tech innovation seems like an unmitigated good. Is there anyone scrutinizing the behavior of parking enforcement authorities right now (given that it's far too small-fry in most cases for lawyers), or is the parking ticket system in many cities nothing but taxation by another name, buttressed by the total lack of any real opportunity to challenge them? Browder might look closer to his temporary home, given that San Francisco is kind of notorious for its abusive parking tickets and they've been resisting the use of other automated systems to squeeze out a droplet of due process from the machine. As I've argued previously on this blog, nickel-and-diming people to death with penny-ante law enforcement directed at ordinary day-to-day behaviors is a threat to the kind of ideas underlying the rule of law, and maybe software can fix it where lawyers can't.
Third, to fellow prawfs: as folks like Dan Katz and Oliver Goodenough keep reminding us, this is coming to the rest of the law. Right now, the advances seem mostly to be looming over the discovery process, with stuff like predictive coding threatening to be the second level of the inexorable process of stripping the legal profession of the rents generated by document review (where outsourcing and offshoring were the first), as well as to relatively small-scale stuff like parking tickets, leases, etc. for small players. But as the technology gets more sophisticated, it has the potential to supplement or replace lawyers in more areas of law. (Right now, the most hubristic claims are being made by an early-stage startup called Ross... but what happens if those claims turn out to be even sort-of true?) What can we as law professors do about it?
One option is to get a lot better about teaching our students to be more comfortable with technology, as users as well as creators, even to the point of trying to teach them programming and machine learning. That's a strategy I'm interested in exploring further, but I also have some skepticism about it. It doesn't obviously follow from the danger of technology supplanting lawyers that the lawyers who will be best positioned to survive are those who are capable of operating in both domains. Whether that's true depends on the shape of the ultimate market: will it actually demand people with both legal skill and technological skill (perhaps to translate from one to the other), or will it favor people with pure technological skill plus a handful of really good lawyers to handle the most high-level work? My crystal ball isn't sharp enough to tell me, though I'm encouraging my students to tech up to the extent possible in order to hedge their bets. But what else can we do?
Sunday, January 31, 2016
The Supreme Court, On Demand
It has become almost a yearly rite: Congress introduces a bipartisan bill to require television cameras in the Supreme Court. The Justices express their concerns about the proposal. High-minded words are exchanged about the dignity of the courts versus the public’s right to know. Eventually the bill dies in committee.
The traditional arguments for cameras, such as public interest in following high-profile cases, or general appeals to transparency, are unlikely to resonate with the Court any more this year than in years past. But there is another case for Supreme Court cameras, and it stems from the federal judiciary’s own highly successful cameras program in the district courts.
In 2011, the Judicial Conference of the United States authorized a pilot program for periodically recording civil proceedings in fourteen federal district courts. The proceedings are then uploaded to the U.S. Courts website, where they are indexed and accompanied by additional information on the case. The entire process is conducted by the courts themselves, without media cameras or external video processing. The result has been a video library of hundreds of proceedings, ranging from pretrial conferences to summary judgment hearings to multi-day trials. The videos have been viewed hundreds of thousands of times.
The success of the district court pilot, which I explore in much more detail here, offers an excellent blueprint for a parallel Supreme Court program.
First, as the district court pilot has shown, both practicing lawyers and ordinary citizens stand to learn a great deal from actually watching Supreme Court proceedings. Watching the Court in action educates those in the legal profession about procedures before the Court, the issues of particular interest to the Justices, and ways in which an attorney might capture the interest and attention of the Court. For the public, watching the Court in action is all the more important: rather than allowing journalists and comedians define the Court’s work after the fact, the public can go straight to the source. Many studies suggest that watching an event on video (whether delayed or through live streaming) carries many of the cognitive benefits accrued from watching a live event. Whether the public would take advantage of this educational opportunity in any serious way is an open question, but at least that opportunity would exist.
Second, a recording (and/or live streaming) program would bolster the Court’s public legitimacy, by openly demonstrating the court’s commitment to transparency and accountability. Public support for the Supreme Court has been hovering at or below 50% for much of the past decade. At the same time, the public is increasingly seeking information through screen time. Watching the Court in action can demystify the judicial process and reduce public reliance in the messaging of politicians, reporters, and editorial writers. Supreme Court Justices, like all federal judges, are public servants. If they are proud of their work, they should welcome public viewing.
Finally, it suggests how the courts can achieve these educational and transparency goals without relying on the news media—the primary public concern of the Justices. Just as cameras have been placed in unobtrusive locations within district courtrooms, and the final recordings made available on the courts’ website, so too can recordings of Supreme Court proceedings be made available on its website, accompanied by rich contextual matter. The Supreme Court can also easily provide live streaming of oral arguments and case announcements without threatening the dignity or solemnity of the proceedings. Indeed, it may avoid the alternative, John Oliver-style, treatments. If the Court really wants to have some control over its own message, it cannot close its eyes and ears to the realities of the twenty-first century.
At least, we can hope.
N.B. -- The district court program has been an excellent resource for my teaching, and I recommend it highly for others whose students cannot as a practical matter visit the courthouse to observe proceedings.
Tuesday, September 22, 2015
Piling on Judge Posner
Cue the outrage: Judge Posner is in the news again for researching facts outside the record and using those facts in judicial opinions. His earlier research included issues of donning and doffing work clothes, dreadlocks in prisons, guns and danger, a traveling would-be preacher and campus geography, and a rabbi involved in a dispute with Northwestern University. Unlike some judges who do research but don't disclose it, Judge Posner is forthright about his research, discussing it at length in chapter 5 of his book, Reflections on Judging.
Although federal judicial ethics rules (Canon 3(A)(4)) are implicated when judges do their own fact research, in practice the propriety of the research tends to come down to whether judicial notice would be proper. For adjudicative facts (generally what Judge Posner is researching), judicial notice is only proper under the rules of evidence if it can be "accurately and readily determined from sources whose accuracy cannot reasonably be questioned." F.R. Evid. 201. (There is no exception for "background information," although such research might meet the requirements for adjudicative facts, or be mere harmless error). Especially at the appellate level, fact research can also mess with the burden of proof, the prohibition of judges as witnesses, and the requirements for admissibility of treatises under the hearsay rule.
Some of Judge Posner's research is entirely proper under those requirements. Some is not. And unless you count the availability of a motion to reconsider, it fails the procedural requirement of Rule 201: "On timely request, a party is entitled to be heard on the propriety of taking judicial notice and the nature of the fact to be noticed. If the court takes judicial notice before notifying a party, the party, on request, is still entitled to be heard." One of the concerns about independent judicial research is the loss of an opportunity to argue that the "facts" the judge finds are wrong, or are not indisputable, or have been misapplied. In addition, Judge Posner uses some of his research to draw inferences, and that is an area where an opportunity to be heard is especially important. In U.S. v. Boyd (the gun case) for example, research about the nature of ammunition and the location of buildings was used to infer that shooting a gun into the air at 3 a.m. in downtown Indianapolis created a "substantial risk of bodily injury to another person." In the traveling preacher case, Judge Posner drew a conclusion about the comparative desirability of speaking locations from Google's view of the college campus. The research involves not just "facts," but also inferences from those facts, and so research done at the appellate level, outside the record, with no opportunity to reply, can be particularly troubling.
But hold on a minute. . . .When I initially researched and wrote about the issue of judicial research, I did something I had never done before, and never expect to do again: wrote a law review article with two endings. Independent judicial research raises some significant policy concerns, and I worry about those, but there is also a powerful policy counterargument, and Judge Posner makes it in the most recent case, Rowe v. Gibson.
- This was a case with a pro se plaintiff, and the information disclosed by Judge Posner's research could easily have been put in the trial court record by competent plaintiff' counsel.
- The defendant's medical expert (whose views were challenged by information that can be found online, as well as by the plaintiff's own sworn statements about his symptoms) was himself a defendant
- This was not the review of a jury fact-finding, but a question of whether a fact issue existed that should be submitted to the jury rather than resolved through summary judgment. Judge Posner's research would thus lead to a fuller fact-finding process, not disrupt one.
To put it more broadly -- do judges need to accept a result that may be very wrong in "fact" (put even more strongly, a miscarriage of justice) even when asymmetrical party resources have severely skewed the record? Judges themselves are strongly divided on this issue, polls show. Regarding the Rowe case itself, opinion is split up the middle in an Above the Law poll (scroll down and click on "View Results"). Criminal cases may raise especially strong concerns. Seventh Circuit judge Diane Wood once noted that Internet research about street names cast doubt on a criminal conviction. U.S. v. Harris, 271 F.3d 690, 708 n.1 (7th Cir. 2001) (Wood, J., dissenting). However, even if we want to allow research to promote accurate outcomes, the need to give the parties timely notice and an opportunity to be heard is crucial.
This policy debate is not easily resolved, and one can construct a parade of horribles on both sides. In the meantime, lawyers would do well to take care at the trial level that important information is made part of the record.
Wednesday, August 26, 2015
Rentboy.com and the Internet's Role in Sex Work
On Tuesday, New York police officers and agents of the Department of Homeland Security raided the Manhattan offices of Rentboy.com (link is to the Wikipedia page). The company's chief executive and other members of the leadership and employment team were also arrested at their homes. According to the Complaint, rentboy.com, a social networking website that connects male sex workers to clients, has been the hub of a multimillion dollar criminal enterprise.
This episode, on the heels of another sex-related internet story at Ashley Madison, raises several questions. The broadest: Should prostitution be criminalized? Reasonable people disagree. The narrowest: Did rentboy.com commit a crime? At this stage, which just requires the government to offer facts that make the case viable, there is factual and legal sufficiency to move forward. I have additional questions: Why is this website a priority for the government? Has the internet made the problem of sexual exploitation worse?
For better or for worse, prostitution is illegal in New York and rentboy.com, the Complaint alleges, fostered, promoted, and facilitated prostitution. A brief read of the redacted Complaint shows the not-so-subtle advertisements individuals posted looking for clients: all of them were thinly veiled posts that included sexual preferences and costs. The website, which charged significant sums for sex workers to advertise, promoted the practice of prostitution by hosting events, giving out awards, and cutting out the middle man in the off-line sex work arrangement. Therefore, it is hard to argue that there is insufficient evidence to move forward.
Should prostitution be a crime and should city and federal law enforcement be spending time and money on investigating and prosecuting this particular website is another question.
Scholars far smarter than I have debated the merits of criminalization of sex work for decades. For some, the decision to commercialize one's body is empowering and the right of free, autonomous individuals in a democratic society. For others, prostitution is not a free and voluntary choice: it is either forced labor or someone's last hope for survival. In many cases, sex workers are victims of abuse and legitimizing prostitution promotes the very real harms some young people face when they are caught in the world of sex trafficking.
The victimization problem may be particularly acute for LGBT youth, though we don't have enough research to make an airtight case. There is a disproportionate number of LGBT youth in the commercially sexually exploited population. One study suggested that within 48 hours of running away from home, something LGBT youth are much more likely to do than their heterosexual peers, 1 in 3 homeless LGBT youth will be approached with offers or invitations to sell their bodies for sex. A Canadian study found that LGBT youth are three times as likely to engage in survival sex than their heterosexual peers. And survival sex -- exchanging sexual favors for food, shelter, clothing -- is a gateway to the sexual exploitation marketplace.
Not all men advertising their services on rentboy.com are victims. Indeed, there is no allegation in the Complaint that any advertisement for sex-for-pay was nonconsensual (although evidence of that may turn up). But that misses the point. Prostitution is illegal. The question of should prostitution be illegal is really a societal choice about whether we are willing to restrict one group's freedom -- that of willing sex workers -- to protect another's -- that of victims, of abuse and sex traffickers, who have no choice but to commercialize their bodies. New York has made the choice to protect the victims.
The internet law implications of this case are worth mentioning even though they are taking a back seat to the broader debate over sex work. With respect to jurisdiction: The website's offices are in Manhattan, under the jurisdiction of the Southern District. The Eastern District (Brooklyn) is leading this case because many of Rentboy.com's sex workers live and work in Brooklyn. DHS is involved because many of the transactions involved interstate commerce. The internet's reach, therefore, has not only given various different jurisdictions potential control over anti-prostitution litigation; it has also federalized it. But that is not the result of overzealous law enforcement eager to score an anti-gay victory. That is the nature of the internet and jurisdiction over it.
With respect to commerce: Rentboy.com has done one thing that anti-prostitution advocates have wanted for decades, and it has used the internet to do so. The website has arguably helped sex workers by eliminating the middle man, the "pimp", in a commercial sex transaction. Pimps, the evidence suggests, perpetrate much of the abuse inherent in the world of prostitution, so taking them out of the equation should be liberating to sex workers. But the website has also made a commercial sex transaction easier, which further perpetuates prostitution's culture of abuse and victimization.
Setting aside the broader discussion over (de)criminalizing prostitution, this story is another example of how we have to accept that internet life is part of "real" life, subject to the same laws as offline transactions and the cause of very real harms to real people. Rentboy.com cannot escape liability simply because it tossed up a disclaimer saying none of its advertisements are for sex-for-pay. Websites that facilitate prostitution still promote the same culture of victimization that New York has decided is bad enough to merit restricting the freedom of voluntary sex workers.
Sunday, March 01, 2015
Recommending Highly The Black Box Society by Professor Frank Pasquale
This is my last post for this stint (my third) on Prawfsblawg and I want to thank again for inviting me Howard Wasserman and the others who are doing the work of keeping going what Dan Markel, ZT”L started.
I also wanted to share a very interesting, well-written and important book that I’ve been reading this month by PrawfsBlawg alumni @frankpasquale called The Black Box Society: The Secret Algorithms that Control Money and Information. (Amazon). Professor Pasquale is a professor at the University of Maryland Francis King Carey School of Law School of Law. In this book, Frank explains in clear, non-technical English what exactly is going on behind the internet technology we use every day. He explains how the sites we access on the internet are not just collecting information from us, but are selling it to others who are using that information in shaping the information we get back. So, and this among the more benign points, what you get when you run a Google (or other) search is probably very different than what I would. Google is not an automated index nor is a database like Lexis or Westlaw. Moreover, the information collected isn’t just shaping the advertisements we see on the screen, it’s controlling our access to jobs, credit, insurance, security clearances, and housing. As he explains, “you can’t form a trusting relationship with a black box.”
What makes the book of special interest to law professors is that it doesn’t just present the issue, it addresses the lack of legal restraints in the United States to regulate (or even monitor) the information private companies collect and the ways they use it. Frank makes a strong case, as he has in his scholarship, for the role of regulation not just in promoting transparency, but in regulating behavior. As he explains, “If credit scores can be regulated, why not the scoring systems used by digital advertisers and employers?”
Whether we directly use the internet to apply for credit, insurance or jobs, those offering these things to us have full access to extensive data about what we like, what we do, and how we are likely to behave. For example, they know whether we are willing to pay above market price for convenience. We are, he tells us, voluntarily opening our entire lives to commercial organizations who not only lack any obligation to keep our confidences, whose business model is to package and sell them.
While we were worrying about the government listening to our phone calls, we didn’t notice that “the state’s immense powers of compulsion and enforcement can now be enlisted in support of the black box technologies of the search, reputation, and finance sectors.”
I commend the book to you highly, as well as his NY Times Op-Ed overview but in the event you need more convincing, please see what others have said in Science, The New Republic, Slate, and The New York Times.
Monday, October 13, 2014
10 Lists I Read on the Internet That Made Me Feel Stupid
Maybe I'm just still pondering College Magazine's list of "22 Reasons Why Going to Law School is the Best Decision You'll Ever Make", which, unlike anything I've written, got picked up by Huff Post. All in good fun, sure, though perhaps over-selling the case and understating the seriousness of law school as a financial proposition.
But I must not be the only person to notice that the internet seems to have been taken over by lists. There they are at the bottom and sides of the screen on my tablet, just begging to be clicked on as I strain to get up that one last hill on the stationary bike. Yes, I know, it's all about ads, and getting to put a different ad up after each click on the list. Still...
It's as if the internets think people can only think in lists. I'm all for, say, numbered blog posts, to help make it easier for commenters to point out which aspect of my argument they found the most stupid. But among the problems with these lists is that their authors seem to gravitate towards the number 10, or 12 (unlike our industry's latest booster), but sometimes getting past eight requires adding a few entries that probably didn't belong.
I'll join the fun, though. Here's a list of recent lists I find silly:
I desire only to smell it, drink it, and dream of it.
I prefer to think of myself as a being of only thought and light.
Don't care what coast animates what character. Still cry every time Mufasa dies.
Seriously, Buffalo has an NFL team? Huh.
It's so obviously the best place to live in America we didn't even try for 10 reasons.
Holy Mother Goddess, pagans can go on and on and on...
Odd that "hurts" and "pain" aren't more prominent, or at least "Riggs, I'm getting too old for this ..."
No Tweets about conferences? That's like the most exciting thing we do, dude.
Back in my day, we used to call this a "mix tape".
Guessing Joe Slater knew most of them.
Friday, October 03, 2014
The Right to be Forgotten
Much of my scholarship concerns comparative constitutional law. An interesting example of such topics being addressed, beyond a law journal, is the recent article by Jeffrey Toobin in the Sep. 29 New Yorker titled "The Solace of Oblivion," http://www.newyorker.com/magazine/2014/09/29/solace-oblivion. His article focuses on a European Court of Justice ruling that essentially ordered Google to delete any links to information regarding an individual in Spain, who had cleared up some financial difficulties that had been previously written about on the Internet. The ECJ said individuals had a right to prohibit Google from linking to items that were "inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed and in the light of the time that has elapsed." From a U.S. First Amendment perspective, such a ruling would almost certainly be an untenable speech restriction, especially given the vagueness and overbreadth of these criteria.
The article includes an interview with the Austrian born Oxford professor who is considered by Toobin to be the "intellectual godfather" of this right to be forgotten. The professor apparently sees analogies between Google retaining links to permanent blemishes about people on the one hand, and the Stasi, or other surveillance states, keeping records on people. It's a short fascinating article that I recommend to folks who want to learn more about the differences between American and European approaches to these issues. Students would find it especially accessible. The article has special relevance now in light of disclosures regarding NSA and other surveillance actions in the U.S. Yale Law Professor James Whitman wrote a seminal law review article addressing some of the underlying philosophical differences between the U.S. and Europe on privacy that has some similarities. "The Two Western Cultures of Privacy: Dignity Versus Liberty," 113 Yale L.J. 1151 (2003-4), http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1647&context=fss_papers
Wednesday, October 01, 2014
The Electorate and Attorneys
Thanks to the PrawfsBlawg folks for letting me join in again. Dan Markel's loss has been devastating, but I hope we can keep his mission alive here by going full speed ahead. As an Iowa-based law professor (Director of the Drake Constitutional Law Center), we have one of the key U.S. Senate elections occurring between Republican Joni Ernst and Democrat Bruce Braley. They are battling to replace Democrat Tom Harkin. Some of you may know, from national new stories, that Braley got into trouble when he was filmed at an out of state fundraiser explaining, in part, that popular incumbent Senator Grassley is a farmer from Iowa who never went to law school. Moreover, Braley elaborated that Grassley may become leader of the Senate Judiciary Committee. Braley's statements were not good politics to say the least. In addition, the fundraiser apparently involved trial lawyers and Braley himself is a trial lawyer. Joni Ernst supporters have run that film clip often on television. On the other hand, Ernst has at times advocated abolishing the Department of Education, privatizing social security, and has not opposed impeaching President Obama. During a recent debate, she appeared to move to the center on some issues as would be expected. Braley did a good job in the debate but did not press her hard on certain matters.
What's fascinating though is that the Braley team has made no effort on television to defend the view that lawyers can play valuable roles in society, even though his campaign Web site does just that. The Web site mentions several instances of Braley helping the underdog against various powerful interests. Certainly, former Presidential candidate John Edwards used his work as a plaintiff's attorney at times to promote his candidacy. Presumably Braley's political consultants (who may know more than me) think the "attorney" word should go virtually unmentioned in television advertisements. But that has handed over the issue of who is the better person to Joni Ernst, as her campaign has run effective ads about her leadership in the National Guard. Moreover, she presents well on television. The polls show Ernst with about a 6 point lead. Whatever happens, it's sad to see the Braley team essentially abandon any defense of some of the good work that Braley likely did as an attorney, even if their strategy is not totally unexpected.
Thursday, September 04, 2014
Using GoFundMe for Litigation
Here is a creative way this local news anchor is trying to raise public awareness and money for defending his case against a non-compete he had signed with his former employer. Watch him and his litigation team explain their woes.
Monday, June 16, 2014
Looks like President O got an early start on that coconut
After the next inauguration, quipped President Obama in a hipster Tumblr interview today, he says he'll "be on the beach somewhere, drinking out of a coconut . . ." Maybe sooner than that, as the president proclaims at the beginning of the interview: "We have enough lawyers, although it's a fine profession. I can say that because I'm a lawyer."
So "don't go to law school" is the message he wants to get across. Larger debate, of course. But let's see what he says right afterward. Study STEM fields, he insists, in order to get a job after graduation. STEM study, yes indeed. But STEM trained grads often look beyond an early career as a bench scientist or an IT staffer, or a mechanical career or . . . that is, STEM-trained young people look to leverage these skills to pursue significant positions in corporate or entrepreneurial settings. Hence, they look for additional training in business school, in non-science master's programs, and, yes, even in law schools.
Tumblr promises #realtalk, so here is some real talk: Significant progress in developing innovative projects and bringing inventions to market require a complement of STEM, business, and legal skills. These skills are necessary to negotiate and navigate an increasingly complex regulatory environment and to interacts with lawyers and C-suite executives as they develop and implement business strategy. Perhaps too many lawyers, but not too many lawyers who are adept at the law-business-technology interface. "Technology is going to continue to drive innovation," wisely insists President Obama. But it is not only technology that is this driver, but work done by folks with a complement of interdisciplinary skills and ambition.
Thursday, May 01, 2014
UF Law's (and My) New MOOC: The Global Student's Introduction to US Law
I am now officially part of a MOOC, which went online today. It has been a learning experience (!!), with the biggest lesson being that it is nowhere as easy as you might think to put one of these courses together. I plan to blog about the experience at length when I get a chance. For now, though, you might be interested in viewing the University of Florida Law School's foray into the great MOOC experiment: The Global Student's Introduction to US Law.
The course description is as follows:
In this course, students will learn basic concepts and terminology about the U.S. legal system and about selected topics in the fields of constitutional law, criminal law, and contract law. A team of outstanding teachers and scholars from the University of Florida faculty introduces these subjects in an accessible and engaging format that incorporates examples from legal systems around the world, highlighting similarities to and differences from the U.S. system. Students seeking an advanced certificate study additional topics and complete assignments involving legal research that are optional for basic level students. The course may be of interest both to U.S. students contemplating law school and to global students considering further study of the U.S. legal system.
My Senior Associate Dean Alyson Flournoy spearheaded the project, and we had excellent technical assistance, which was crucial, by Billly Wildberger. My colleagues Pedro Malavet, Jeff Harrison, Claire Germain, Loren Turner, Jennifer Wondracek, and Sharon Rush all provided lectures, and our research assistant Christy Lopez is providing support with the discussion forums.
Wednesday, April 30, 2014
Of (Courtney) Love and Malice
Today Seattle Police released a note found on Kurt Cobain at his death excoriating wife Courtney Love. Based on her subsequent behavior, Love cannot have been an easy person to be married to. I've been researching Love lately for an article on social media libel that I'm writing with RonNell Andersen Jones. Love is not only the first person in the US to be sued for Twitter libel; she's also Twibel's only repeat player thus far. According to news reports, Love has been sued for Twitter libel twice , and recently she was sued for Pinterest libel as well.
Love's Twitter libel trial raises interesting issues, one of which is how courts and juries should determine the existence of "actual malice" in libel cases involving tweets or Facebook posts by "non-media" defendants. As you probably recall, the US Supreme Court has held that the First Amendment requires public figures and public officials to prove actual malice--i.e., knowledge or reckless disregard of falsity--before they can recover for defamation. And even private figure defamation plaintiffs involved in matters of public concern must prove actual malice if they wish to receive presumed or punitive damages. However, US Supreme Court jurisprudence elucidating the concept of actual malice predominantly involves “media defendants”—members of the institutional press—and the Court’s examples of actual malice reflect the investigative practices of the institutional press. Thus, the Court has stated that in order for a plaintiff to establish actual malice, “[t]here must be sufficient evidence to permit the conclusion that the defendant in fact entertained serious doubts as to the truth of his publication." [St. Amant v. Thompson] Actual malice, for example, exists if a defendant invents a story, bases it on ‘an unverified anonymous telephone call,” publishes statements “so inherently improbable that only a reckless man would have put them in circulation,” or publishes despite “obvious reasons to doubt the veracity of [an] informant or the accuracy of his reports." Id.
These examples have little resonance for “publishers” in a social media context, many of whom, like Love, post information spontaneously with little verification other than perhaps a perusal of other social media sources. The typical social media libel defendant is less likely than her traditional media counterpart to rely on informants strategically placed within government or corporate hierarchies or to carefully analyze primary sources before publishing. Moreover, the typical social media defendants has no fact-checker, editor, or legal counsel and is less likely than institutional media publishers to have special training in gauging the credibility of sources or to profess to follow a code of ethics that prizes accuracy over speed.
The issue Courtney Love's libel trial appears to have raised is whether it constitutes reckless disregard of falsity if a defendant irrationally believes her defamatory accusation to be true. I say "appears," because one can only glean the issue from media accounts of Love's libel trial--the first full jury trial for Twitter libel in the US. The jury found that Love lacked actual malice when she tweeted in 2010 that her former attorney had been "bought off." Specifically, Love tweeted: “I was f—— devestated when Rhonda J. Holmes esq. of san diego was bought off @FairNewsSpears perhaps you can get a quote[sic].” Holmes sued Love in California state court for $8 million, arguing that the tweet accused Holmes of bribery. Love contended that her tweet was merely hyperbole. News accounts of the jury verdict in Love’s favor, however, indicate that the jury found that Love did not post her tweet with “actual malice." The jury deliberated for three hours at the end of the seven-day trial before concluding that the plaintiff had not proved by clear and convincing evidence that Love knew her statements were false or doubted their truth.
The Love case doesn't set any precedents, but it raises interesting issues for future cases. According to court documents and news accounts, Love consulted a psychiatrist for an “addiction” to social media. Certainly Love’s actions in the series of defamation cases she has generated do not seem entirely rational, but there is no “insanity defense” to a libel claim. Yet the determination of whether a defendant had “actual malice” is a subjective one, meaning that it is relevant whether the defendant suffered from a mental illness that caused her to have irrational, or even delusional, beliefs about the truth of a statement she posted on social media. It seems problematic, however, for the law to give no recourse to the victims of mentally disordered defamers pursuing social media vendettas based on fantasies they have concocted. As a practical matter, this problem is likely to be solved by the skepticism of juries, who will rarely accept a defendant’s argument that she truly believed her delusional and defamatory statements. Or at least I hope so.
And in case you wondered . . . Love's first social media libel case involved her postings on Twitter, MySpace and Etsy calling a fashion designer known as the "Boudoir Queen" a "nasty lying hosebag thief" and alleging that the Queen dealt cocaine, lost custody of her child, and committed assault and burglary. Love apparently settled that case for $430,000. Love's third social media libel case involves further statements about the Queen that Love made on the Howard Stern show and posted on Pinterest. Some people, it seems, are slow learners.
Posted by Lyrissa Lidsky on April 30, 2014 at 06:30 PM in Blogging, Constitutional thoughts, Culture, Current Affairs, First Amendment, Information and Technology, Lyrissa Lidsky, Torts, Web/Tech, Weblogs | Permalink | Comments (0)
Sunday, November 03, 2013
NYT v. Sullivan Anniversary Symposium at U. of Georgia
The University of Georgia Law Review is hosting an impressive and impressively well organized symposium honoring the fiftieth anniversary of the Supreme Court's decision in New York Times v. Sullivan. Justice John Paul Stevens is the keynote speaker, and David Savage of the LA Times will be giving a lunchtime talk. The panels of speakers discussing press issues old and new include Justice Steven's former clerk Sonja West, RonNell Andersen Jones, William Lee, Amy Gajda, Amy Kristin Sanders, Lili Levi, Paul Horwitz, and Rodney Smolla, and Hillel Levin will be moderating at least one of the panels.
I will be participating on the "new media" panel, discussing my paper-in-progress, "The Press and Constitutional Self-Help, Then and Now," a synopsis of which is below.
Once upon a time, the U.S. Supreme Court routinely decided press cases, but that period of time came to an end about twenty years ago. The Court’s disinclination to decide press cases kicked in just as the Internet began eroding the press’ traditional role as gatekeeper and translator of news and information and threatening the financial viability of traditional media. As we near the fiftieth anniversary of New York Times v. Sullivan, it is striking how few landmark press cases have been decided since the Internet, and now social media, have entered the scene.
The Supreme Court decided the vast majority of its landmark press cases between 1964 and 1984, in what we media lawyers might now look back on as the “Golden Age” of press cases. These cases contain some of the Court’s loftiest rhetoric about the special role the press plays in our democracy. Yet these same cases recognize only negative press freedoms; they protect only freedom from government intrusions such as prior restraints or compelled publication but refuse to interpret the First Amendment to provide the press with “special” access to governmental information or institutions not available to other citizens or special exemptions from generally applicable laws that interfere with newsgathering. The Court’s refusal to recognize affirmative press rights during this period arguably suggests that the Court was merely paying lip service to the notion that the press plays a special role in democracy, for it seems intuitive that a “special role” should come with “special rights.”
I contend, however, that the Supreme Court that decided the press cases of the Golden Age was committed to a special constitutional role for the press but envisioned the press (or, more aptly, the media) as a true Fourth Estate—an unofficial branch of government capable of checking the other three by using its own powerful resources to safeguard its ability to play its special role. The Court assumed that, in most instances, the media could use its own political and economic power to gain access to government information, protect confidential source relationships, and fight overreaching by the executive or legislative branches. In other words, the Court assumed that the media could engage in “constitutional self-help” to play their role. But this theory of constitutional self-help depends on a number of assumptions about the media that were largely true in the 1970s but may not be today. Media that are economically and politically powerful, popular with the public, and united in pursuit of common goals may indeed be able to fight off threats to their ability to play a special role in our democracy, especially when government officials depend on the media to carry government messages to the public. In light of recent developments, however, it is fair to question the ability of new media to use constitutional self-help to access government information or protect confidential sources, for reasons I will explore further in my talk (and my paper). Fundamental shifts in the balance of power between today’s Fourth Estate and the three official branches may signal a need to reexamine the assumptions underlying the press cases of the Golden Age.
Tuesday, June 18, 2013
Libel Law, Linking, and "Scam"
Although I'm a little late to the party in writing about Redmond v. Gawker Media, I thought I'd highlight it here because, though lamentably unpublished , the decision has interesting implications for online libel cases, even though the court that decided it seems to have misunderstood the Supreme Court's decision in Milkovich v. Lorain Journal.
Redmond involved claims against "new media" company Gawker Media based on an article on its tech blog Gizmodo titled Smoke and Mirrors: The Greatest Scam in Tech. The article criticized a new tech "startup," calling it " just the latest in a string of seemingly failed tech startups that spans back about two decades, all conceived, helmed and seemingly driven into the ground by one man: Scott Redmond." The article further suggested that Redmond, the CEO of the new company, used “technobabble” to promote products that were not “technologically feasible” and that his “ventures rarely—if ever—work.” In other words, the article implied, and the title of the blog post stated explicitly, that Redmond’s business model was a “scam.” Redmond complained to Gizmodo in a lengthy and detailed email, and Gizmodo posted Redmond's email on the site. Regardless, Redmond sued Gawker and the authors of the post for libel and false light. Defendants filed a motion to strike under Califonia’s anti-SLAPP statute. The trial court granted the motion, and the California appellate court affirmed.
Unsurprisingly, the appellate court found that the Gizmodo article concerned an “issue of public interest,” as defined by the anti-SLAPP statute, because Redmond actively sought publicity for his company. The court described “the Gizmodo article [as] a warning to a segment of the public—consumers and investors in the tech company—that [Redmond's] claims about his latest technology were not credible.” This part of the decision is entirely non-controversial, and the court's interpretation of "public interest" is consistent with the goal of anti-SLAPP laws to prevent libel suits from being used to chill speech on matters of significant public interest.
More controversial is the court's determination that Gizmodo's use of the term “scam” was not defamatory (and thus Redmond could not show a probability of prevailing). The court noted that “’scam’ means different things to different people and is used to describe a wide range of conduct;” while the court's assertion is correct, surely at least one of the "different things" that "scam" can mean is defamatory. [For a similar statement, see McCabe v. Rattiner, 814 F.2d 839, 842 (1st Cir. 1987) ]. While the term "scam" is usually hyberbole or name-calling, in some contexts the term acts as an accusation of criminal fraud, especially when accompanied by assertions of deliberate deception for personal gain. However, the court found that "scam" was not defamatory as used in the Gizmodo article, relying heavily on the fact that the authors gave links to “evidence” about the fates of Redmond's prior companies and his method of marketing his new one. The court concluded that the statement that Redmond's company was a “scam” was “incapable of being proven true or false.”
It is clear that the court's categorization of the statements about Redmond as “opinion rather than fact” relied on online context--both the conventions of the blog and its linguistic style. The court asserted that the article contained only statements of opinion because it was “completely transparent,” revealing all the “sources upon which the authors rel[ied] for their conclusions” and containing “active links to many of the original sources.” Technology-enabled transparency, according to the court, “put [readers] in a position to draw their own conclusions about [the CEO] and his ventures.” The court also stressed the blog's “casual first-person style." The authors of the article, according to the court, made “little pretense of objectivity,” thereby putting “reasonable reader[s]” on notice that they were reading “subjective opinions.”
As attractive as this reasoning is, especially to free speech advocates and technophiles, one should read the Redmond decision with caution because it almost certainly overgeneralizes about the types of "opinion" that are constitutionally protected. The Supreme Court's 1990 decision in Milkovich v. Lorain Journal clearly and forcefully indicates that a statement is not constitutionally protected simply because a reader would understand it to reflect the author's subjective point of view. Instead, the Milkovich Court held that a purported "opinion" can harm reputation just as much as explicit factual assertions, at least when it implies the existence of defamatory objective facts. Hence, the Court declared that the statement "In my opinion Jones is a liar" can be just as damaging to the reputation of Jones as the statement "Jones is a liar," because readers may assume unstated defamatory facts underlie the supposedly "subjective" opinion. Moreover, even if the author states the underlying facts on which the conclusion is based, the statement can still be defamatory if the underlying facts are incorrect or incomplete, or if the author draws erroneous conclusions from them. The Court therefore rejected the proposition that defamatory statements should be protected as long as it is clear they reflect the authors' point of view, or as long as they accurately state the facts on which they are based. [This analysis is freely borrowed from this article at pp. 924-25, full citations are included there.]
Posted by Lyrissa Lidsky on June 18, 2013 at 03:24 PM in Blogging, Constitutional thoughts, First Amendment, Information and Technology, Lyrissa Lidsky, Torts, Web/Tech, Weblogs | Permalink | Comments (2) | TrackBack
Tuesday, May 14, 2013
Is a broadcast to everyone private under the Copyright Act?
For the final post in my extended visit here, I want to focus on another example in my series of discussions about formalism vs. policy in copyright. Today’s case is WNET v. Aereo, which allowed continued operation of a creative television streaming service. As I’ll discuss below, the case pretty clearly complies with the statutory scheme, much to the relief of those who believe content is overprotected and that new digital distribution methods should be allowed. This time, the policy opposition is best demonstrated by Judge Chin’s dissent in the case.
In the end, though, the case shows what all of the cases I’ve discussed show: copyright was not really developed with digital content storage and streaming in mind. While some rules fit nicely, others seem like creaky old constructs that can barely hold the weight of the future. The result is a set of highly formalistic rules that lead to services purposely designed inefficiently to either follow or avoid the letter of the law. This problem is not going to get any better with time, though my own guess hope is that the pressure will cause providers to create some better solutions that leave everyone better off.
Here are the basic facts. Aereo runs a system with thousands of dime size antennas. Each of these antennas can capture over-the-air broadcast television, but not cable or satellite signals. OTA signals are “free” – viewers don’t have to pay for access to them the way they do for cable.
Aereo then runs what is essentially a remote digital video recorder for each subscriber. That is, when a user wants to watch or record a program, the Aereo system tunes one of the antennas to the appropriate channel at the appropriate time, saves the resulting TV signal (a show) to disk, and then either streams it to the user over the internet or stores it for the user for later viewing.
Aereo does this for every single subscriber; if 10,000 people want to record a show, then 10,000 antennas store 10,000 copies of the program. Why, you ask, would it do something so ridiculously costly and redundant? Because it’s the law, of course. A prior case, called Cartoon Network stands for this proposition. Here’s the logic: a) a user can use DVRs to store recordings at home (relatively well settled law since the Supreme Court’s decision not to hold VCR makers liable back in 1984); b) a cable operator can store those DVRs at the cable site, because where a customer’s DVR is located does not change the nature of its use, but c) the cable operator must maintain each customer’s choices like a DVR, meaning that the customer chooses what to record, and that a separate copy must be maintained for each customer.
The question in Aereo, then, is whether this basic framework changes if the “cable provider” is now an “antenna farm” provider. There are some differences. The cable subscriber is paying a fee that allows for the rebroadcast of content from the cable operator to the subscriber. Without such a fee/license, such rebroadcast would be infringement. Aereo has no such license, and thus its service could be considered a rebroadcast, which is a no-no. Just ask the folks who tried to rebroadcast NFL games into Canada.
The Aereo Court agreed with the rationale in Cartoon Network, however; the license was not relevant. Instead, the individualized copies were simply not “public” performances. They were private: selected by the user, recorded in the user’s disk quota, and shown in that form only to the user. As the court noted, it was as if the user had a private antenna, DVR, and Slingbox located at Aereo’s facility, and the fact that Aereo owned it and charged for the service was irrelevant.
Judge Chin dissented from the opinion, and took an opposite view, best described using the original dissent’s text:
Aereo's "technology platform" is, however, a sham. The system employs thousands of individual dime-sized antennas, but there is no technologically sound reason to use a multitude of tiny individual antennas rather than one central antenna; indeed, the system is a Rube Goldberg-like contrivance, over-engineered in an attempt to avoid the reach of the Copyright Act and to take advantage of a perceived loophole in the law.
Judge Chin’s dissent goes on to argue that the formalistic reading of the statute fails, and that we should see Aereo’s acts for what they are: a transmission of content to members of the public, which thus constitutes public performance.
This disagreement is a great ending illustration of the cases I’ve blogged about this month. The tension between formalistic statutory reading and policy based glosses is palpable. In my last post, I made clear that I favor following the statute unless convinced otherwise.
But that doesn’t answer the fundamental question, which is: what do we make of all this? Sure, this case was rightly decided. Perhaps now this might lead to the formation of an efficient/licensed broadcast network streaming service that costs users less than Aereo because it is less resource intensive.
I’m not sure the Aereo ruling is the right one in the long run. One of the thorny issues with broadcast television is range. Broadcasters in different markets are not supposed to overlap. Ordinarily, this is no issue because radio waves only travel so far. When a provider sends the broadcast by other means, however, overlap is possible, and the provider keeps the overlap from happening. DirecTV, for example, only allows a broadcast package based on location.
Aereo is not so limited, however. Presumably, one can record broadcast shows from every market. Why should this matter? Imagine the Aereo “Sunday Ticket” package, whereby Aereo records local NFL games from every market and allows subscribers to stream them. Presumably this is completely legal, but something seems off about it. While Aereo’s operation seems fine for a single market, this use is a bit thornier. I’m reasonably certain that Congress will close that loophole if any service actually tries it.
Thus, dealing with what should be clearly legal under the statute is thornier than it appears at first. While I believe that more and cheaper streaming options would be a good thing, I wonder whether the disruption to local broadcast markets is the right way to get there. One thing is clear: copyright law is ill equipped to answer the question.Thanks again to Prawfs for having me, and I'll see you next time around (and in the meantime at madisonian.net).
Monday, April 29, 2013
Why I Decided to Construct a Free Online Casebook Available to Anyone for Civ Pro Using the H20 Platform
One of the nice things about tenure is that it frees you up to to do things you know are good for the world but may not be adequately valued in the tenure process. This summer I will embark on one such project, building a free online casebook for Civ Pro. I will be using the Harvard Berkman Center H20 "hack the casebook" platform. This great platform allows you to create "playlists" of cases and other materials that can be "remixed" by others, added to, etc. The initial goal of the project is to create a completely free H20 platform casebook for each of the firsy year classes, and I have stepped up to do Civ Pro.
Let me tell you a little bit about why I chose to do this because it may encourage others to join this great project or ones like it.
First, like others, I am shocked at how expensive textbooks have become for doctrinal 1L course. I realized that together my casebook and supplement (including the FRCP, major statutesm, etc) would cost my students $243 a piece and thus providing them with free materials would save at least $19,000 among my own students for next year. When multiplied over several years, as well as the possibility that other faculty would adopt this textbook and save their students money, this just seemed like a value creating proposition.In a time when students across the U.S. are struggling with the high price of legal education, I felt I should do what I could here.
Second, most of the materials I teach in my Civ Pro class are major Supreme Court cases (with a few Circuit and state court cases) that could be easily found and edited in public domain format, which the H20 platform makes easy. Just because of the way I teach my own course and the textbook I was using, I was already not assigning many of the notes that followed the cases and I was supplementing the book with additional materials (some written up by myself) so that the value the casebook was offering to my course that could not be found in the public domain was lessened. To be sure, I will still have to replace introductory sections of various parts of the book with my own write-ups as well as do editing of all the versions of the cases I will still use -- no small amount of effort -- but I might have felt differently about undertaking this if my casebook was doing more original work for me in the way I taught my course.
Third (and here I am purposefully not being specific and naming the casebook in question because, for all I know, all Casebooks in the field are similar in this regard): my casebook is more than 1200 pages long. I estimate that I use only about 300-450 of those pages in a 4 credit introductory course. It does have a compact addition for shorter courses, but unfortunately what it chooses to keep versus discard is not a good fit for what I use from the book. Before I decided to do the H20 version myself, I called the publisher of my casebook to see if I could "buy by the page" for the pages I actually use, a practice that some textbooks allow you to do. I was told I could not. Given that they have gone to the trouble of creating a "condensed" version I do not blame the authors/publishers, but this was the last straw for me in deciding to go it on my own.
This summer, along with my RAs, will be spent doing a beta version of the free H20 Casebook for Civ Pro that I will test out with my incoming 1Ls in the fall. I am incredibly grateful to Harvard Law School for allowing me to use my time (and RA time) for this project whose value will hopefully be externalized. I am particularly grateful to my dean, Martha Minow, since she is herself the co-author of a Civ Pro textbook (not the one I had been using), so she is basically authorizing the law school to fund a project that may cut into her own sales. She's just that kind of classy person! The beta version will be kept internal to my students for the fall, but if all goes well I hope to share it with the world in 2014 and perhaps others will want to adopt it.
- I. Glenn Cohen
Wednesday, April 24, 2013
On Policy and Plain Meaning in Copyright Law
As noted in my last post, there have been several important copyright decisions in the last couple months. I want to focus on two of them here: Viacom v. YouTube and UMG v. Escape Media. Both relate to the DMCA safe harbors of online providers who receive copyrighted material from their users - Section 512 of the Copyright Act. Their opposing outcomes illustrate the key point I want to make: separating interpretation from policy is hard, and I tend to favor following the statute rather than rewriting it when I don't like the policy outcome. This is not an earthshattering observation - Solum and Chiang make a similar argument in their article on patent claim interpretation. Nevertheless, I think it bears some discussion with respect to the safe harbors.For the uninitiated, 17 U.S.C. 512 states that "service providers" shall not be liable for "infringement of copyright" so long as they meet some hurdles. A primary safe harbor is in 512(c), which provides exempts providers from liability for "storage at the direction of a user of material that resides on a system" of the service provider.
To qualify, the provider must not know that the material is infringing, must not be aware of facts and circumstances from which infringing activity is apparent, and must remove the material if it obtains this knowledge or becomes aware of the facts or circumstances. Further, if the copyright owner sends notice to the provider, the provider loses protection if it does not remove the material. Finally, the provider might be liable if it has the right and ability to control the user activity, and obtains a direct financial benefit from it.
But even if the provider fails to meet the safe harbor, it might still evade liability. The copyright owner must still prove contributory infringement, and the defendant might have defenses, such as fair use. Of course, all of that litigation is far more costly than a simple safe harbor, so there is a lot of positioning by parties about what does and does not constitute safe activity.
This brings us to our two cases:
Viacom v. YouTube
This is an old case, from back when YouTube was starting. The district court recently issued a ruling once again finding that YouTube is protected by the 512(c) safe harbor. A prior appellate ruling remanded for district court determination of whether Viacom had any evidence that YouTube knew or had reason to know that infringing clips had been posted on the site. Viacom admitted that it had no such evidence, but instead argued that YouTube was "willfully blind" to the fact of such infringement, because its emails talked about leaving other infringing clips on the site - just not any that Viacom was alleging. The court rejected this argument, saying that it was not enough to show willful blindness as to Viacom's particular clips.
The ruling is a sensible, straightforward reading of 512 that favors the service provider.
UMG v. Escape Media
We now turn to UMG v. Escape Media. In a shocking ruling yesterday, the appellate division of the NY Supreme Court (yeah, they kind of name things backward there) held that sound recordings made prior to 1972 were not part of the Section 512 safe harbors. Prior to 1972, such recordings were not protected by federal copyright. Thus, if one copies them, any liability falls under state statute or common law, often referred to as "common law copyright." Thus, service providers could be sued under any applicable state law that protected such sound recordings.
Escape Media argued that immunity for "infringement of copyright" meant common law copyright as well, thus preempting any state law liability if the safe harbors were met.
The court disagreed, ruling that a) "copyright" meant copyright under the act, and b) reading the statute to provide safe harbors for common law copyright would negate Section 301(c), which states that "any rights or remedies under the common law or statutes of any State shall not be annulled or limited by this title until February 15, 2067." The court reasoned that the safe harbor is a limitation of the common law, and thus not allowed if not explicit.
If this ruling stands, then the entire notice and takedown scheme that everyone relies on will go away for pre-1972 sound recordings, and providers may potentially be liable under 50 different state laws. Of course, there are still potential defenses under the common law, but doing business just got a whole lot more expensive and risky to provide services. So, while the sky has not fallen, as a friend aptly commented about this case yesterday, it is definitely in a rapidly decaying orbit.
Policy and Plain Maining
This leads to the key point I want to make here, about how we read the copyright act and discuss it. Let's start with YouTube. The court faithfully applied the straightforward language of the safe harbors, and let YouTube off the hook. The statute is clear that there is no duty to monitor, and YouTube chose not to monitor, aggressively so.
And, yet, I can't help but think that YouTube did something wrong. Just reading the emails from that time period shows that the executives were playing fast and loose with copyright, leaving material up in order to get viewers. (By they way, maybe they had fair use arguments, but they don't really enter the mix). Indeed, they had a study done that showed a large amount of infringement on the site. I wonder whether anyone at YouTube asked to see the underlying data to see what was infringing so it could be taken down. I doubt it.
I would bet that 95% of my IP academic colleagues would say, so what? YouTube is a good thing, as are online services for user generated content. Thus, we read the statute strictly, and provide the safe harbor.
This brings us to UMG v. Escape Media. Here, there was a colossal screw-up. It is quite likely that no one in Congress thought about pre-1972 sound recordings. As such, the statute was written with the copyright act in mind, and the only reasonable reading of the Section 512 is that it applies to "infringement of copyright" under the Act. I think the plain meaning of the section leads to this conclusion. First, Section 512 refers to many defined terms, such as "copyright owner" which is defined as an owner of one of the exclusive rights under the copyright act. Second, the copyright act never refers to "copyright" to refer to pre-1972 sound recordings that are protected by common law copyright. Third, expanding "copyright" elsewhere in the act to include "common law copyright" would be a disaster. Fourth, state statutes and common laws did not always refer to such protection as "common law copyright," instead covering protection under unfair competition laws. Should those be part of the safe harbor? How would we know if the only word used is copyright?
That said, I think the court's reliance on 301(c) is misplaced; I don't think that a reading of 512 that safe harbored pre-1972 recordings would limit state law. I just don't think that's what the statute says, unfortunately.
Just to be clear, this ruling is a bad thing, a disaster even. I am not convinced that it will increase any liability, but it will surely increase costs and uncertainty. If I had to write the statute differently, I would. I'm sure others would as well.
But the question of the day is whether policy should trump plain meaning when we apply a statute. The ReDigi case and the UMG case both seem to have been written to address statutes who did not foresee the policy implications downstream. Perhaps many might say yes, we should read the statute differently.
I'm pretty sure I disagree. For whatever reason - maybe the computer programmer in me - I have always favored reading the statute as it is and dealing with the bugs through fixes or workarounds. As I've argued with patentable subject matter, the law becomes a mess if you attempt to do otherwise. ReDigi and UMG are examples of bugs. We need to fix or work around them. It irritates me to no end that Congress won't do so, but I have a hard time saying that the statutes should somehow mean something different than they say simply because it would be a better policy if they did. Perhaps that's why I prefer standards to rules - the rules are good, until they aren't.
This is not to say I'm inflexible or unpragmatic. I'm happy to tweak a standard to meet policy needs. I've blogged before about how I think courts have misinterpreted the plain meaning of the CFAA, but I am nevertheless glad that they have done so to reign it in. I'm also often persuaded that my reading of a statute is wrong (or even crazy) even when I initially thought it was clear. I'd be happy for someone to find some argument that fixes the UMG case in a principled way. I know some of my colleagues look to the common law, for example, to solve the ReDigi problem. Maybe there is a common law solution to UMG. But until then, for me at least, plain meaning trumps policy.
Tuesday, April 23, 2013
Impact of the “Lander Brief” in the Myriad (Gene Patent) Case – and an answer to Justice Alito’s QuestionThe Supreme Court heard oral arguments on April 15 in Association of Molecular Pathology et al. v Myriad, concerning whether human genes are patent-eligible subject matter. The case focused on Myriad’s patents on two genes, BRCA1 and BRCA2, involved in early-onset breast cancer
Surprisingly, many of the Court’s questions for Myriad’s counsel focused on what Justice Breyer dubbed the “Lander Brief” – an amicus filed on behalf of neither party by one of the country’s leading scientists, Dr. Eric Lander. (Lander was one of the leaders of the Human Genome Project and co-chair’s the Presidents Council of Advisors on Science and Technology.) [Full Disclosure: I am one of the authors of this brief] Justices Breyer, Ginsburg and Alito referred to the brief by name, and several other Justices were clearly influenced by the information in the brief.
I believe that the “Lander brief” was a hot topic of conversation because the Justices realized that it was central to applying the Court’s product-of-nature doctrine to DNA. Importantly, the brief demolished the scientific foundation of the Federal Circuit decision on appeal. The Federal Circuit panel held that human chromosomes are not patent-eligible because they are products of nature, but a majority found that “isolated DNA” fragments of human chromosomes (such as pieces of the breast cancer genes) are patent-eligible. The Federal Circuit’s distinction rested on its assumption that (unlike whole chromosomes) isolated DNA fragments do not themselves occur in nature, but instead only exist by virtue of the hand of man.
The Federal Circuit cited no scientific support for its crucial assumption – neither in the record below, nor in any scientific literature.
Embarrassingly, the Federal Circuit’s assumption turned out to be flat-out wrong. The Lander brief summarized 30 years of scientific literature showing that natural processes in the human body routinely cleave into isolated DNA fragments. Isolated DNA fragments turn out to be abundant outside of cells – including in cell-free blood, urine and stool. They are so common that they can be used for genetic diagnostics of inherited diseases and cancers. In fact, they are so prevalent that several scientific groups have shown that it is possible to determine the entire genome sequence of a fetus based on analyzing the isolated DNA fragments found in a teaspoons-worth of its mother’s blood.
Justice Breyer relentlessly pushed Myriad’s counsel to declare whether he agreed or disagreed with the Lander Brief. When the counsel finally declared that he disagreed, Justice Breyer demanded:
JUSTICE BREYER: Okay. Very well. If you are saying it is wrong, as a matter of science, since neither of us are scientists, I would like you to tell me what I should read that will, from a scientist, tell me that it's wrong.
The only reply that Myriad’s counsel could muster was to point to a declaration that had been filed (by Dr. Mark Kay) in the District Court case in 2009. (In fact, Dr. Kay’s declaration said nothing whatsoever about whether isolated DNA fragments occur in Nature. It concerned how to construe terms in Myriad’s patent.)
A few minutes later, Justice Ginsburg returned to the point:
JUSTICE GINSBURG: Do you concede at least that the decision in the Federal Circuit, that Judge Lourie did make an incorrect assumption, or is the Lander brief inaccurate with respect to that, too? That is, Judge Lourie thought that isolated DNA fragments did not exist in the human body and Dr. Lander says that --
MR. CASTANIAS: No, what -- I think Justice -- Judge Lourie was exactly correct to say that there is nothing in this record that says that isolated DNA fragments of BRCA1 exist in the body. Neither does Dr. Lander's brief, for that matter. And for that matter, those isolated fragments that are discussed in Dr. Lander's brief again are -- are what are known not -- not in any way as isolated DNA, but as pseudogenes. They're typically things that have been killed off or mutated by a virus, but they do not –
Here, Myriad’s counsel proved to be confused. Contrary to Mr. Castanias’s statement, the Lander brief (on page 16) explicitly stated that isolated DNA fragments were found covering the entire BRCA1 and BRCA2 genes. Also, “pseudogenes” had nothing to do with Lander’s brief; they arose in the ACLU’s brief for Petitioners and in Myriad’s reply. (“Pseudogenes” are sequences in the human genome that occur when RNA is rarely reverse transcribed into DNA; they are relevant to the patentability of cDNA but are unrelated to the patentability of genomic DNA.)
Justice Alito then jumped in, offering the only glimmer of hope for Myriad’s counsel:
JUSTICE ALITO: But isn't this just a question of probability? To get back to your baseball bat example, which at least I -- I can understand better than perhaps some of this biochemistry, I suppose that in, you know, I don't know how many millions of years trees have been around, but in all of that time possibly someplace a branch has fallen off a tree and it's fallen into the ocean and it's been manipulated by the waves, and then something's been washed up on the shore, and what do you know, it's a baseball bat.
In other words, Justice Alito asked whether isolated DNA fragments of the BRCA genes might be freakishly rare. Neither opposing counsel nor the Solicitor General had an opportunity to address Justice Alito’s question, because they had already spoken.
The answer to Justice Alito’s questions turns out to be: VERY common. A typical person contains roughly one billion isolated DNA fragments of the BRCA genes circulating in his or her blood.
The Lander Brief (in footnote 23) cites several papers showing that, in 1 milliliter of blood (1/4000th of total circulation), each nucleotide in the human genome was covered by about 250 fragments on average. In total circulation, this corresponds to about 1 million fragments (= 4000 x 250) covering each individual base. Across the length of the BRCA genes, this translates to about 1 billion fragments.
More explicitly, footnote 25 points to a web site published by Stanford Professor Stephen Quake (the author of one of the studies), in which he specifically reported the coverage of the BRCA genes in the blood stream. Dr. Quake’s data directly showed that a typical person carries roughly 945 million fragments of isolated DNA from the BRCA1 and BRCA2 genes.
I was very happy the Lander brief has got this much attention, since I think that once the Court understands the fundamental mistake made by the Federal Circuit (and apparently Myriad’s counsel), as several of the Justices questions suggested they did at oral argument, the outcome of the case becomes clear. The Court actually can sidestep a number of more difficult questions in patent law (about the precise meaning of the standard under Diamond v. Chakrabarty for when a molecule is “markedly different” than a product of nature), because isolated DNA fragments of the human genome are precisely products of nature themselves.
Tuesday, April 16, 2013
Solving the Digital Resale Problem
As Bruce Willis's alleged complaints about not being able to leave his vast music collection to his children upon his death illustrate, modern digital media has created difficulties in secondary and resale markets. (I say alleged because the reports were denied. Side note: if news breaks on Daily Mail, be skeptical. And it's sad that Cracked had to inform Americans of this...).
This post describes a recent attempt to create such a market, and proposes potential solutions.
In the good old days, when you wanted to sell your old music, books, or movies, you did just that. You sold your CD, your paperback, or your DVD. This was explicitly legalized in the Copyright Act: 17 USC Section 109 says that: “...the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord.” As we'll see later, a phonorecord is the material object that holds a sound recording, like a CD or MP3 player.
But we don't live in the good old days. In many ways, we live in the better new days. We can buy music, books, and DVDs over the internet, delivered directly to a playback device, and often to multiple playback devices in the same household. While new format and delivery options are great, they create problems for content developers, because new media formats are easily copied. In the bad sort-of-old days, providers used digital rights management (or DRM) to control how content was distributed. DRM was so poorly implemented that it is now a dirty word, so much so that it was largely abandoned by Apple; it is, however, still used by other services, like Amazon Kindle eBooks. Providers also use contracts to limit distribution - much to Bruce Willis's chagrin. Indeed, Section 109(d) is clear that a contract can opt-out of the disposal right: “[Disposal rights] do not, unless authorized by the copyright owner, extend to any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it.”
But DRM is easily avoided if you simply transfer the entire device to the another party. And contracts are not necessarily as broad as people think. For example, I have scoured the iTunes terms of service and I cannot find any limitation on the transfer of a purchased song. There are limitations on apps that make software a license and limit transfers, but the music and video downloads are described as purchases unless they are "rentals," and all of the “use” limitations are actually improvements in that they allow for multiple copies rather than just one. Indeed, the contract makes clear that if Apple kills off cloud storage, you are stuck with your one copy, so you had better not lose it. If someone can point me to a contract term where Apple says you have not “purchased” the music and cannot sell it, I would like to see that.
Enter ReDigi and the lawsuit against it. ReDigi attempted to set up a secondary market for digital works. The plaintiff was Capitol Records, so there was no contract privity, so this is a pure “purchase and disposal” case. A description from the case explains how it worked (in edited form here):
To sell music on ReDigi's website, a user must first download ReDigi's “Media Manager” to his computer. Once installed, Media Manager analyzes the user's computer to build a list of digital music files eligible for sale. A file is eligible only if it was purchased on iTunes or from another ReDigi user; music downloaded from a CD or other file-sharing website is ineligible for sale. After this validation process, Media Manager continually runs on the user's computer and attached devices to ensure that the user has not retained music that has been sold or uploaded for sale. However, Media Manager cannot detect copies stored in other locations. If a copy is detected, Media Manager prompts the user to delete the file. The file is not deleted automatically or involuntarily, though ReDigi's policy is to suspend the accounts of users who refuse to comply.
After the list is built, a user may upload any of his eligible files to ReDigi's “Cloud Locker,” an ethereal moniker for what is, in fact, merely a remote server in Arizona. ReDigi's upload process is a source of contention between the parties. ReDigi asserts that the process involves “migrating” a user's file, packet by packet — “analogous to a train” — from the user's computer to the Cloud Locker so that data does not exist in two places at any one time. Capitol asserts that, semantics aside, ReDigi's upload process “necessarily involves copying” a file from the user's computer to the Cloud Locker. Regardless, at the end of the process, the digital music file is located in the Cloud Locker and not on the user's computer. Moreover, Media Manager deletes any additional copies of the file on the user's computer and connected devices.
Once uploaded, a digital music file undergoes a second analysis to verify eligibility. If ReDigi determines that the file has not been tampered with or offered for sale by another user, the file is stored in the Cloud Locker, and the user is given the option of simply storing and streaming the file for personal use or offering it for sale in ReDigi's marketplace. If a user chooses to sell his digital music file, his access to the file is terminated and transferred to the new owner at the time of purchase. Thereafter, the new owner can store the file in the Cloud Locker, stream it, sell it, or download it to her computer and other devices. No money changes hands in these transactions. Instead, users buy music with credits they either purchased from ReDigi or acquired from other sales. ReDigi credits, once acquired, cannot be exchanged for money. Instead, they can only be used to purchase additional music.
ReDigi claimed that it was protected by 17 USC 109. After all, according to the description, it was transferring the work (the song) from the owner to ReDigi, and then to the new owner. Not so, said the court. As the court notes, Section 109 protects only the disposition of particular copies (phonorecords, really) of the work. And uploading a file and deleting the original is not transferring a phonorecord, because the statute defines a “phonorecord” as the physical medium in which the work exists. Transfer from one phonorecord to another is not the same as transfering a particular phonorecord. So, ReDigi could be a secondary market for iPods filled with songs, but not the songs disembodied from the storage media.
As much as I want the court to be wrong, I think it is right here, at least on the narrow, literal statutory interpretation. The words say what they say. Even the court notes that this is an uncomfortable ruling: “[W]hile technological change may have rendered Section 109(a) unsatisfactory to many contemporary observers and consumers, it has not rendered it ambiguous.”
Once the court finds that transferring the song to ReDigi is an infringing reproduction, it's all downhill, and not in a good way. The court notably finds that there is no fair use. I think it is here that the court gets it wrong. Unlike the analysis of Section 109, the fair use analysis is short, unsophisticated, and devoid of any real factual analysis. I think this is ReDigi's best bet on appeal.
Even despite my misgivings, ReDigi's position is not a slam dunk. After all, how can it truly know that a backup copy has not been made? Or that the file has not been copied to other devices? Or that the file won't simply be downloaded from cloud storage or even iTunes after it has been uploaded to ReDigi.
If ReDigi, which seemed to try to do a good job ensuring no residual copies, cannot form a secondary market, then what hope do we have? We certainly aren't going to get there with the statute we have, unless courts are much more willing to read a fair use into transfers. The real problem is that the statute works fine when the digital work (software, music, whatever) is stored in a single use digital product. When we start separating the “work” from the container, so that containers can hold many different works and one work might be shared on several containers all used by the same owner, all of the historical rules break down.
So, what do we do if we can't get the statute amended? I suspect people will hate my answer: a return to the dreaded DRM. A kinder, gentler, DRM. I think that DRM that allows content providers to recall content at will (or upon business closure) must go -- whether legislatively or regulatorily. It is possible, of course, for sophisticated parties to negtotiate for such use restrictions (for example, access to databases), and to set pricing for differing levels of use based on those negotiations. That's what iTunes does with its "rentals."
But companies should not be allowed to offer content "for sale" if delivery and use is tied to a contract or DRM that renders that content licensed and not in control of buyers. This is simply false advertising that takes advantage of settled expectations of users, and well within the powers of the FTC, I believe.
But DRM can and should be used to limit copying and transferrability. If transferability is allowed, then the DRM can ensure that the old user does not maintain copies. Indeed, if content outlets embraced this model, they might even create their own secondary markets to increase competition in the secondary market. In short, the solution to the problem, I believe, is going to be a technical one, and that might be a good thing for users who can no credibly show that they won't copy.
And DRM is what we are seeing right now. Apparently, ReDigi has reimplemented its service so that iTunes purchases are directly copied to a central location where they stay forever. From there, copies are downloaded to particular user devices pursuant to the iTunes agreement. This way, ReDigi acts as the digital rights manager. When a user sells a song, it ReDigi cuts off access to the song for the selling user, and allows the buying user access without making a new copy of the song on its server. I presume that its media manager also attempts to delete all copies from the sellers devices.
Of course, this might mean that content, or at least transferring it, is a little more expensive than before. But let's not kid ourselves - the good old days weren't that good. You had to buy the whole CD, or maybe a single if one was available, but you could not pick and choose any song on any album. Books are heavy and bulky; you couldn't carry thousands of them around. And DVDs require a DVD player, which has several limitations compared to video files.
DRM may just be the price we pay for convenience and choice. We don't have to pay that price. Indeed, I buy most of my music on CD. And I get to put the songs where I want, and I suppose sell the CD if I want, though I never do. As singles start costing $1.50, it may make sense to buy the whole CD. Alas, these pricing issues are incredibly complex, which may take another post in the future.
Tuesday, April 09, 2013
Academics Go To Jail – CFAA Edition
Though the Aaron Swartz tragedy has brought some much needed attention to the CFAA, I want to focus on a more recent CFAA event—one that has received much less attention but might actually touch many more people than the case against Swartz.
Andrew “Weev” Auernheimer (whom I will call AA for short) was recently convicted under the CFAA and sentenced to 41 months and $73K restitution. Orin Kerr is representing him before the Third Circuit. I am seriously considering filing an amicus brief on behalf of all academics. In short, this case scares me in a much more personal way than prior discussed in my prior CFAA posts. More after the jump.
Here’s the basic story, as described by Orin Kerr:
When iPads were first released, iPad owners could sign up for Internet access using AT&T. When they signed up, they gave AT&T their e-mail addresses. AT&T decided to configure their webservers to “pre load” those e-mail addresses when it recognized the registered iPads that visited its website. When an iPad owner would visit the AT&T website, the browser would automatically visit a specific URL associated with its own ID number; when that URL was visited, the webserver would open a pop-up window that was preloaded with the e-mail address associated with that iPad. The basic idea was to make it easier for users to log in to AT&T’s website: The user’s e-mail address would automatically appear in the pop-up window, so users only needed to enter in their passwords to access their account. But this practice effectively published the e-mail addresses on the web. You just needed to visit the right publicly-available URL to see a particular user’s e-mail address. Spitler [AA’s alleged co-conspirator] realized this, and he wrote a script to visit AT&T’s website with the different URLs and thereby collect lots of different e-mail addresses of iPad owners. And they ended up collecting a lot of e-mail addresses — around 114,000 different addresses — that they then disclosed to a reporter. Importantly, however, only e-mail addresses were obtained. No names or passwords were obtained, and no accounts were actually accessed.
Let me paraphrase this: AA went to a publicly accessible website, using publicly accessible URLs, and saved the results that AT&T sent back in response to that URL. In other words, AA did what you do every time you load up a web page. The only difference is that AA did it for multiple URLs, using sequential guesses at what those URLs would be. There was no robot.txt file that I’m aware of (this file tells search engines which URLs should not be searched by spiders). There was no user notice or agreement that barred use of the web page in this manner. Note that I’m not saying such things should make the conduct illegal, but only that such things didn’t even exist here. It was just two people loading data from a website. Note that a commenter on my prior post asked this exact same question--whether "link guessing" was illegal--and I was noncommital. I guess now we have our answer.
The government’s indictment makes the activity sound far more nefarious, of course. It claims that AA “impersonated” an iPad. This allegation is a bit odd: the script impersonated an iPad in the same way that you might impersonate a cell phone by loading http://m.facebook.com to load the mobile version of Facebook. Go ahead, try it and you’ll see – Facebook will think you are a cell phone. Should you go to jail?
So, readers might say, what’s the problem here? AA should not have done what he did – he should have known that AT&T did not want him downloading those emails. Yeah, he probably did know that. But consider this: AA did not share the information with the world, as he could have. I am reasonably certain that if his intent was to harm users, we would never know that he did this – he would have obtained the addresses over an encrypted VPN and absconded. Instead, AA shared this flaw with the world. AT&T set up this ridiculously insecure system that allowed random web users to tie Apple IDs to email addresses through ignorance at best or hubris at worst. I don’t know if AA attempted to inform AT&T of the issue, but consider how far you got last time you contacted tech support with a problem on an ISP website. AA got AT&T’s attention, and the problem got fixed with no (known) divulgence of the records.
Before I get to academia, let me add one more point. To the extent that AA should have known AT&T didn’t desire this particular access, the issue is one of degree not of kind. And that is the real problem with the statute. There is nothing in the statute, absolutely nothing, that would help AA know whether he violated the law by testing this URL with one, five, ten, or ten thousand IDs. Here’s one to try: click here for a link to a concert web page deep link using a URL with a numerical code. Surely Ticketmaster can’t object to such deep linking, right? Well, it did, and sued Tickets.com over such behavior. It claimed, among other things, that each and every URL was copyrighted and thus infringed if linked to by another. It lost that argument, but today it could just say that such access was unwanted. For example, maybe Tickemaster doesn’t like me pointing out its ridiculous argument in the tickets.com case, making my link unauthorized. Or maybe I should have known because the Ticketmaster terms of service says that an express condition of my authorization to view the site is that I will not "Link to any portion of the Site other than the URL assigned to the home page of our site." That's right, TicketMaster still thinks deep linking is unauthorized, and I suppose that means I risk criminal prosecution for linking it. Imagine if I actually saved some of the data!
This is where academics come in. Many, many academics scrape. (Don’t stop reading here – I’ll get to non-scrapers below.) First, scraping is a key way to get data from online databases that are not easily downloadable. This includes, for example, scraping of the US Patent & Trademark Office site; although data is now available for mass download, that data is cumbersome, and scraper use is still common. That the PTO is public data does not help matters. In fact, it might make it worse, since “unauthorized” access to government servers might receive enhanced penalties!
Academics (and non-academics) in other disciplines scrape websites for research as well. How are these academics to know that such scraping is disallowed? What if there is no agreement barring them from doing so? What if there is a web-wrap notice as broad as Ticketmaster's, purporting to bar such activities but with no consent by the user? The CFAA could send any academic to jail for ignoring such warnings—or worse—not seeing them in the first place. Such a prosecution would be preposterous, skeptics might say. I hope the skeptics are right, but I'm not hopeful. Though I can't find the original source, I recall Orin Kerr recounting how his prosecutor colleagues said the same thing 10 years ago when he argued the CFAA might apply to those who breach contracts, and now such prosecutions are commonplace.
Finally, non-scrapers are surely safe, right? Maybe it depends on if they use Zotero. Thousands of people use it. How does Zotero get information about publications when the web site does not provide standardized citation data? You guessed it: a scraper. Indeed, a primary reason I don’t use Zotero is that the Lexis and Westlaw scrapers don’t work. But the PubMed importer scrapes. What if PubMed decide that it considered scraping of information unauthorized? Surely people should know this, right? If it wanted people to have this data, they would provide it in Zotero readable format. The fact that the information on those pages is publicly available is irrelevant; the statute makes no distinction. And if one does a lot of research, for example, checking 20 documents, downloading each, and scraping each page, the difference from AA is in degree only, not in kind.
The irony of this case is that the core conviction is only tangentially a problem with the statute (there are some ancillary issues that are a problem with the statute). “Unauthorized access” and even “exceeds authorized access” should never have been interpreted to apply to publicly accessible data on publicly accessible web sites. Since they have, then I am convinced that the statute is impermissibly broad, and must be struck down. At the very least it must be rewritten.
Tuesday, March 05, 2013
The iPhone, not the eye, is the window into the soul
It is great to be back at Prawfsblawg this year. Thanks to Dan and the gang for having me back. For my first post this month, I wanted to point everyone to the most important privacy research of 2012. The same paper qualifies as the most ignored privacy research of 2012, at least within legal circles. It is a short paper that everyone should read.
The paper in question,Mining Large Scale Smart-Phone Data for Personality Studies, is by Gokul Chittaranjan, Jan Blom, and Daniel Gatica-Perez. Chittaranjan and co-authors brilliantly show that it is straightforward to mine data from smart-phones in an automated way so as to identify particular "Five Factor" personality types in a large population of users. They did so by administering personality tests to 117 smartphone users, and then following the smartphone activities of those users for seventeen months, identifying the patterns that emerged. The result was that each of the "Big Five" personality dimensions was associated with particular patterns of phone usage. For example, extraverts communicated with more people and spent more time on the phone, highly conscientious people sent more email messages from their smartphones, and users of non-standard ring-tones tended to be those who psychologists would categorize as open to new experiences.
There is a voluminous psychology literature linking scores on particular Big Five factors to observed behavior in the real world, like voting, excelling in workplaces, and charitable giving. Some of the literature is discussed in much more detail here. But the Chittaranjan et al. study provides a powerful indication of precisely why data-mining can be so powerful. Data mining concerning individuals' use of machines is picking up personality traits, and personality predicts future behavior.
The regularities observed via the analysis of Big Data demonstrate that you can aggregate something seemingly banal like smartphone data to administer surreptitious personality tests to very large numbers of people. Indeed, it is plausible that studying observed behavior from smartphones is a more reliable way of identifying particular personality traits than existing personality tests themselves. After all, it is basically costless for an individual to give false answers to a personality questionnaire. It is costly for an extravert to stop calling friends.
Privacy law has focused its attention on protecting the contents of communications or the identities of the people with whom an individual is communicating. The new research suggests that -- to the extent that individuals have a privacy interest in the nature of their personalities -- an enormous gap exists in the present privacy framework, and cell phone providers and manufacturers are sitting on (or perhaps already using) an information gold mine.
It's very unlikely that the phenomenon that Chittaranjan et al. identify is limited to phones. I expect that similar patterns could be identified from analyzing peoples' use of their computers, their automobiles, and their television sets. The Chittaranjan et al. study is a fascinating, tantalizing, and perhaps horrifying early peek at life in a Big Data world.
Thursday, November 15, 2012
Software Patents and the Smartphone
I will be speaking at Santa Clara Law School's outstanding conference about Solutions to the Software Problem tomorrow. It promises to be a great event, with academics, public interest advocates, and government officials all weighing in.
As a lead-in to the conference, I want to discuss an oft repeated statistic: that there are 250,000 patents that might be infringed by any given smartphone. I'm going to assume that number is accurate, and I have no reason to doubt its veracity. This number, many argue, is a key reason why we must have wholesale reform - no piecemeal action will solve the problem.
Here are my thoughts on the subject:
1. Not all of these patents are in force. Surely, many of them expired due to lack of maintenance fee payments.
2. Not all of the remaining patents are asserted. After all, we don't see every smartphone manufacturer being sued 250,000 times.
3. Many of these patents are related to each other or are otherwise aggregated together. Thus, there are opportunities for global settlements.
4. Even if you think that 250,000 is huge number of patents (and it is, really - there's not disputing that), it is unclear to me why anyone is surprised by the number when you consider what's in a smartphone. More specifically:
- A general purpose computer and all that comes with it (CPU, RAM, I/O interface, operating system, etc.).
- Active matrix display
- Touch screen display
- Cellular voice technology
- 1x data networking
- 3G data networking
- 4G data networking
- Wi-Fi data networking
- Bluetooth data networking
- GPS technology (and associated navigation)
- Accelerometer technology
- Digital camera (including lens and image processing)
- Audio recording and playback
- Battery technology
- Force feedback technology (phone vibration and haptic feedback)
- Design patents
The areas above are by and large "traditional" patent areas - they aren't software for the most part. And there are thousands of patents in each category, before we even get to the potential applications of the smartphone that might be patented (and these are of greater debate, of course).
So, yes, there are many, many patents associated with the smartphone, but what else would you expect when you cram all of these features into a single device? Perhaps smartphones are the focus of the software patent problem because, well, they do everything, and so they might infringe everything. I'm not convinced that this should drive a wholesale reform of the system. Maybe it just means that smartphones are underpriced given what they include. Not that I'm complaining.
Thursday, November 08, 2012
Cease and Desist
For nearly 10 years, scholars, commentators, and disappointed downloaders have criticized the now-abandoned campaign of the Recording Industry Association of America (RIAA) to threaten litigation against, and in some cases, sue downloaders of unauthorized music. The criticisms follow two main themes. First, demand letters, which mention of statutory damages up to and including $150,000 per infringed work (if the infringement is willful), often lead to settlements of $2,000 - $3,000. A back of the envelope cost-benefit analysis would suggest this is a reasonable response from the receipient if $150,000 is a credible threat, but for those who conclude that information is free and someone must challenge these cases, the result is frustrating.
Second, it has been argued that the statutory damage itself is unconstitutional, at least as applied to downloaders, because it is completely divorced from any actual harm suffered by the record labels. The constitutional critique has been advanced by scholars like Pam Samuelson and Tara Wheatland, accepted by a district court judge in the Tenenbaum case, dodged on appeal by the First Circuit, but rejected outright by the Eighth Circuit. My intuition is that the Supreme Court would hold that Congress has the authority to craft statutory damages sufficiently high to deter infringement, and that there's sufficient evidence that Congress thought its last increase in statutory damages would accomplish that goal.
We could debate that, but I have something much more controversial in mind. I hope to convince you that the typical $3,000 settlement is the right result, at least in file-sharing cases.
The Copy Culture survey indicates that the majority of respondents who support a penalty support fines for unauthorized downloading of a song or movie. Of those who support fines, 32% support a fine of $10 or less, 43% support fines of up to $100, 14% support fines of up to $1,000, 5% support higher fines, 3% think fines should be context sensitive, and 3% are unsure. The average max fine for the top three groups is $209. Let's cut it in half, to $100, because roughly half of survey respondents were opposed to any penalty.
How big is the typical library of "illegally" downloaded files? 10 songs? 100 songs? 1,000? The Copy Culture study reports the following from survey respondents who own digital files, by age group:
18-29: 406 files downloaded for free
30-49: 130 files downloaded for free
50-64: 60 files downloaded for free
65+: 51 files downloaded for free
In the two cases that the RIAA actually took to trial, the labels argued that the defendants had each downloaded over 1,000 songs, but sued over 30 downloads in one case, and 24 downloads in the other. As I see it, if you're downloading enough to catch a cease and desist letter, chances are good that you've got at least 30 "hot" files on your hard drive.
You can see where I'm going here. If the average target of a cease and desist letter has 30 unauthorized files, and public consensus centers around $100 per unauthorized file, then a settlement offer of $3,000 is just about right.
Four caveats. First, maybe the Copy Culture survey is not representative of public opinion and that number should be far lower than $100. Second, misfires happen with cease and desist letters: sometimes, individuals are mistargeted. One off-the-cuff response is to have the RIAA pay $3,000 to every non-computer user and the estate of every dead grandman who gets one of these letters.
Third, this doesn't take fair use into account, and thus might not be a fair proxy for many other cases. For example, the Righthaven litigation seems entirely different to me - reproducing a news story online seems different than illegally downloading a song instead of paying $1, in part because the news story is closer to copyright's idea line, where more of the content is likely unprotectable, and because the redistribution of news is more likely to be fair use.
Fourth, it doesn't really deal with the potentially unconstitutional / arguably stupid possibility that some college student could be ordered to pay $150,000 per download, if a jury determines he downloaded willfully. I'd actually be happy with a rule that tells the record labels they can only threaten a maximum damage award equal to the average from the four jury determinations in the Tenenbaum and Thomas-Rasset cases. That's still $43,562.50 per song. Round it down to the non-willful statutory cap, $30,000, and I still think that a $3,000 settlement is just about perfect.
Now tell me why I'm crazy.
Thursday, October 25, 2012
Copyright's Serenity Prayer
I recently discovered an article by Carissa Hessick, where she argues that the relative ease of tracking child pornography online may lead legislators and law enforcement to err in two ways. First, law enforcement may pursue the more easily detected possession of child pornography at the expense of pursuing actual abuse, which often happens in secret and is diffcult to detect. Second, legislators may be swayed to think that catching child porn possessors is as good as catching abusers, because the former either have abused, or will abuse in the future. Thus, sentences for possession often mirror sentences for abuse, and we see a potential perversion of the structure of enforcement that gives a false sense of security about how much we are doing to combat the problem.
With the caveat that I know preventing child abuse is muchmuch more important that preventing copyright infringement, I think the ease of detecting unauthorized Internet music traffic may also have troubling perverse effects.
When I was a young man, copying my uncle's LP collection so I could take home a library of David Bowie casette tapes, there was no way Bowie or his record label would ever know. The same is true today, even though they now make turntables that will plug right into my computer and give me digital files that any self-respecting hipster would still disdain, but at least require me to flip a vinyl disc as my cost of copying.
On the other hand, it's much easier to trace free-riding that occurs online. That was part of what lead to the record industry's highly unpopular campaign against individual infringers. Once you can locate the individual infringer, you can pursue infringment that used to be "under the radar." The centralized, searchable nature of the Internet also made plausible Righthaven's disastrous campaign against websites copying news stories, and the attempt by attorney Blake Field to catch Google infringing his copyright in posted material by crawling his website with automated data gathering programs.
What if copyright owners are chasing the wrong harm? For example, one leaked RIAA study suggests that while a noticeable chunk of copyright infringement occurs via p2p sharing, it's not the largest chunk. While the RIAA noted that in 2011, 6% of unauthorized sharing (4% of total consumption) happens in locker services like Megauploads, and 23% (15%) happens via p2p, 42% (27%) of unauthorized acquisition is done by burning and ripping CDs from others, and another 29% (19%) happens through face-to-face hard drive trading. Offline file sharing is apparently more prevalent than the online variety, but it is much more difficult to chase. So it may be that copyright holders chase the infringement they can find, rather than the infringement that most severely affects the bottom line.
In a way, leaning on the infringement they can detect is reminiscent of the oft-repeated "Serenity Prayer," modified here for your contemplation:
God, grant me the serenity to accept the infringement I cannot find,
The courage to crush the infringement I can,
And the wisdom to know the difference.
All this brings me back to the friends and family question. The study on Copy Culture in the U.S. reports that roughly 80% of the adults owning music files think it's okay to share with family, and 60% think it's okay to share with friends. In addition, the Copyright Act specifically insulates friends and family sharing in the context of performing or displaying copyrighted works to family and close friends in a private home (17 USC s. 101, "publicly"). Thus, there is some danger in going after that friends and family sharing. If the family and friends line is the right line, can we at least feel more comfortable that someone to whom I'm willing to grant physical access to my CD library is a "real" friend than my collection of Facebook friends and acquaintances, some of whom will never get their hands on my vinyl phonograph of Blues and Roots?
Tuesday, October 23, 2012
The New Normal
Two news items from across the pond highlight the adaptability of musicians, but also a highlight a shift from music as a good to music as an experience, necessitated by the ubiquity of file sharing.
+, the debut album by British singer and producer Ed Sheeran, has apparently been downloaded illegally more than any album in the U.K this year. Sheeran is sanguine about the whole thing, gushing on Twitter about purchasers and free-riders alike, because he concludes that both types of fans are buying tickets, and as Sheeran puts it, "I'm still selling albums, but I'm selling tickets at the same time. My gig tickets are like £18, and my albums £8, so ... it's all relative."
Venerable British pop stars Squeeze are also moving to a more DIY, performance-based financial model this year. Fans who attend concerts can choose to purchase a download of the show at a "pop-up" shop after each performance, and meet the band as well. To date, this is the only way for fans to get their hands on Squeeze's first new songs in 14 years...at least until they are posted online. Squeeze founder Glenn Tillbrook is also excited about this brave new world. Tillbrook states, "I love the opportunities and surprises thrown up by the digital age and the fading away of the major labels. Being able to innovate and take control of our own destiny is something I could only have dreamt of back then." And for bands like Squeeze, the old label-centric business model may well have passed them by. As Tillbrook notes, “With the traditional record label no longer relevant for us, our relationship with the merchandisers is increasingly important in order to help us deliver quality products for our fans.”
As I postulated a few months ago, with regard to comic books offered online, I can't help but wonder whether the end result will be less professionally crafted music because the system will support fewer professional craftspeople, or whether we'll just get more artists who are more comfortable with a DIY esthetic, and fewer that rely on big machinery or well-placed intermediaries to make things happen.
It may be that the most important thing a new artist can do is leverage networks and relationships. Here's an example: I'm a huge Josh Ritter fan. Chris Thile's band, Punch Brothers, recently covered a Ritter song, and offered a free download of it for fans that purchased the new Punch Brothers EP. How did I find out? I follow Ritter on Twitter, and he let me know. I wouldn't have otherwise purchased the Punch Brothers EP, but was excited about this opportunity. Once upon a time, you could rely on certain labels for a certain aesthetic in its recorded offerings. Relationships between artists might in the future do some of that same work.
Wednesday, August 29, 2012
A Reminder to Hiring Committees: Don't Google The Candidates?
Here's some advice to hiring committee members travelling to the AALS conference: While it may be natural to search the internet for additional information about candidates for faculty positions, how you use the information you find may subject your university to legal liability. Here are two cautionary tales involving university hiring to keep in mind.
Cautionary tale number one illustrates that the refusal to hire an employee based on information gleaned from social media can sometimes give rise to a discrimination claim under Title VII. Two years ago, the University of Kentucky faced a Title VII lawsuit brought by a rejected job applicant who claimed that the University refused to hire him based on information about his religious views found by the hiring committee during an Internet search. Gaskell v. University of Ky., 2010 U.S. Dist. LEXIS 124572 (E.D. Ky. Nov. 23, 2010). Evidence in the case indicated that the chair of the department conducting the search asked the candidate about his religious beliefs, which the chairman had "personally" researched on the internet. In addition, an email from a staff member to hiring committee members during the process noted: "Clearly this man is complex and likely fascinating to talk with, but potentially evangelical." The case settled for $125,000 after a judge denied cross-motions for summary judgment.
Cautionary tale number two illustates that discrimination against hiring candidates on the basis of their political beliefs can subject state universities to liability for constitutional torts. This tale involves the University of Iowa's College of Law and the hiring of a legal writing instructor. In Wagner v. Jones, Teresa Wagner alleged that the College of Law refused to hire her because of her conservative political beliefs, and she sued under 42 U.S.C. § 1983. The trial court granted summary judgment to the college, but a panel of Eighth Circuit Court of Appeals reversed.
The Eighth Circuit determined that Wagner had made a sufficient claim of political discrimination to get to a jury. The court applied the following test (drawn from the Supreme Court's decision in Mt. Healthy City Sch. Dist. Bd. of Ed. v. Doyle):
A plaintiff alleging First Amendment retaliation must first make a prima facie showing that (1) she engaged in conduct protected by the First Amendment; (2) she suffered an adverse employment action; and (3) the protected activity was a substantial or motivating factor in theemployer’s decision to take the adverse employment action. If a plaintiff makes this prima facie showing, then “a presumption of retaliation arises and the burden shifts to the defendant to advance a legitimate reason for the employment action.
The court found Wagner had presented evidence from which a jury could conclude that her polticial beliefs were a substantial or motivating factor not to hire her. Specifically, a deposition in the case indicated that the candidate's conservative views may have been discussed at a faculty meeting on her candidacy; there was also evidence that she was advised to hide the fact she'd been offered a job at Ave Maria during the interview process at the College of Law, and a contemporaneous email from an associate dean expressed concern that Wagner's politics could have played a part in the faculty's decision not to hire her. In addition, the court noted (several times!) that only one of the fifty faculty members of the College was a registered Republican at the time Wagner interviewed. There's more to the decision, of course, including full discussion of why the court rejected the argument that the Dean was entitled to qualified immunity. Regardless, the decision should be a reminder to hiring committee members at state schools not to use information found on the internet or anywhere else to discriminate against potential hires in violation of their First Amendment rights.
Posted by Lyrissa Lidsky on August 29, 2012 at 02:17 PM in Constitutional thoughts, Employment and Labor Law, First Amendment, Getting a Job on the Law Teaching Market, Life of Law Schools, Lyrissa Lidsky, Web/Tech | Permalink | Comments (10) | TrackBack
Thursday, August 16, 2012
Sanchez on Broadband Deregulation and NSA Wiretapping
Thanks to round-the-clock efforts over the last two weeks to get a piece out the door this submission season, I have leaped into the running for the least-blogging-Prawfsblawg-guest-blogger ever. Fortunately, the piece is out the door to journals as of today (into, um, the teeth of an unraveling market.)
So, to blogging… My one-time housemate Julian Sanchez has an interesting post over at Cato’s blog speculating on the back history of the NSA surveillance program. He writes:
One of the great mysteries of recent national security surveillance policy is exactly why the controversial FISA Amendments Act of 2008 was necessary . . . . [I]n early 2007 . . . then–House Minority Leader John Boehner (R-Ohio) publicly declared that a secret ruling by the (normally highly deferential) Foreign Intelligence Surveillance Court had found a problem with a National Security Agency surveillance program . . . . Most of us at the time assumed that the issue had to do with the greatly increased breadth of the surveillance NSA was trying to conduct—but flipping through the latest edition of David Kris and Douglas Wilson’s invaluable National Security Investigations and Prosecutions, I’ve just realized there’s another possibility that fits the public facts extremely well.
The possibility, he explains in a detailed post, is broadband deregulation. Interesting stuff!
Wednesday, August 15, 2012
Free Speech Rights in Social Media for College Students: Tatro v. U. of Minn.
I've been working on putting together a comprehensive list of social media cases with a First Amendment angle, and I recently came across the fascinating case of Tatro v. University of Minnesota, 816 N.W.2d 509 (Mn. 2012), which the Minnesota Suprem Court decided at the end of June. In case you missed reading this case in June, as I did, here's a summary.
The University of Minnesota sanctioned Tatro, a junior in its mortuary science program, by giving her a failing grade in her anatomy lab and forcing her to undergo a psychiatric evaluation because she posted “violent fantasy” (pretty tame stuff, really) and “satiric” comments about her human cadaver on Facebook. Posting or "blogging" about her cadaver violated the University’s “Anatomy Bequest Program” policies, the Mortuary Science Student Code of Professional Conduct, and the rules of her anatomy course. She appealed the University’s imposition of sanctions on her speech through a writ of certiorari. The Minnesota court of appeals affirmed the constitutionality of the sanctions, and the Minnesota Supreme Court granted further review and also affirmed, basing its decision on the unique nature of the professional program in which the student was enrolled.
The Minnesota Supreme Court treated the case as one of first impression, noting that the constitutional standard governing “a university’s imposition of disciplinary sanctions for a student’s Facebook posts that violate[ ] academic program rules” is “unsettled.” Although the court of appeals had resolved the case by applying Tinker v. Des Moines Inc. Comm. Sch., the Minnesota Supreme Court held this standard to be inappropriate because Tatro was disciplined not for the disruptiveness of her post but for its lack of “respect, discretion, and confidentiality in connection with work on human cadavers.” The Court instead determined that the appropriate standard was whether the university had “impose[d] sanctions for Facebook posts that violate academic program rules that are narrowly tailored and directly related to established professional conduct standards.” (The Court did not cite any particular Supreme Court precedent as the basis for this standard). Applying this new standard, the Court concluded “that dignity and respect for the human cadaver constitutes an established professional conduct standard for mortuary science professionals.” Having previously noted that the asserted purpose of the University’s rules was to “educate students” about their ethical duties in the funeral service profession and “maintain the viability of the Anatomy Bequest Program,” the Court found the academic program rules to be narrowly tailored even though they completely barred (!) blogging about cadaver dissection or the anatomy lab. Tatro clearly violated these rules by giving her a “cadaver a name derived from a comedy film” and engaging in “widespread dissemination” of her comments, first through Facebook and later through the news media. Consequently, punishing her for violating them did not abridge her First Amendment rights.
This case raises some interesting issues, which I'd explore in more detail if I weren't staring down the barrel of multiple deadlines. Some obvious questions raised are as follows: Is a standard proscribing "disrespect" unconstitutionally vague? How can a complete ban be narrowly tailored? (Can't help thinking of Atul Gawande's writing in this context.) Why doesn't ordering a psychiatric evaluation for "unprofessional" speech violate the First Amendment? (The Court didn't address whether the speech constituted a "true threat.")
As a media law professor, I noted with interest that my fellow media law professor Raleigh H. Levine, from William Mitchell College of Law, was an amicus in the case for the ACLU, along with Teresa Nelson.
Friday, August 03, 2012
The Ethics of Practice in the Cloud
Some helpful tips here from the ABA Annual Meeting on this cutting-edge practice issue. I had looked forward to improved mobile access to my work documents in Apple's iCloud service, including my federal appeals, after I upgraded to the Mountain Lion OS. But according to this piece, I may need to consider another cloud service option. Maybe I shouldn't uninstall Dropbox just yet. Time to research the cloud a little more closely!
Wednesday, July 18, 2012
Legal Education in the Digital Age
With the latest news of U-Va. joining a consortium of schools promoting online education, it seems only a matter of time before law schools will have to confront the possibility of much larger chunks of the educational experience moving into the virtual world. Along with Law 2.0 by David I.C. Thomson, there is now Legal Education in the Digital Age, edited by Ed Rubin at Vanderbilt. The book is primarily about the development of digital course materials for law school classes, with chapters by Ed Rubin, John Palfrey, Peggy Cooper Davis, and Larry Cunningham, among others. The book comes out of a conference hosted by Ron Collins and David Skover at Seattle U. My contribution follows up on my thoughts about the open source production of course materials, which I have previously written about here and here. You can get the book from Cambridge UP here, or at Amazon in hardcover or on Kindle.
One question from the conference was: innovation is coming, but where will it come from? Some possibilities:
- Law professors
- Law schools and universities
- Legal publishers
- Outside publishers
- Tech companies such as Amazon or Apple
- SSRN and BePress
- Some combination(s) of these
I think we all agree that significant change is coming down the pike. But what it ultimately will look like is still very much up in the air. What role will law professors play?
Tuesday, July 03, 2012
How Not to Criminalize Cyberbullying
My co-author Andrea Pinzon Garcia and I just posted our essay, How Not to Criminalize Cyberbullying, on ssrn. In our essay, we provide a sustained constitutional critique of the growing body of laws criminalizing cyberbullying. These laws typically proceed by either modernizing existing harassment and stalking laws or crafting new criminal offenses. Both paths are beset with First Amendment perils, which our essay illustrates through 'case studies' of selected legislative efforts. Though sympathetic to the aims of these new laws, we contend that reflexive criminalization in response to tragic cyberbullying incidents has led law-makers to conflate cyberbullying as a social problem with cyberbullying as a criminal problem, leading to pernicious consequences. The legislative zeal to eradicate cyberbullying potentially produces disproportionate punishment of common childhood wrongdoing. Furthermore, statutes criminalizing cyberbullying are especially prone to overreaching in ways that offend the First Amendment, resulting in suppression of constitutionally protected speech, misdirection of prosecutorial resources, misallocation of taxpayer funds to pass and defend such laws, and the blocking of more effective legal reforms. Our essay attempts to give legislators the First Amendment guidance they need to distinguish the types
of cyberbullying that must be addressed by education, socialization, and stigmatization from those that can be remedied with censorship and criminalization. To see the abstract or paper, please click here or here.
Posted by Lyrissa Lidsky on July 3, 2012 at 03:44 PM in Article Spotlight, Constitutional thoughts, Criminal Law, Current Affairs, First Amendment, Information and Technology, Lyrissa Lidsky, Web/Tech | Permalink | Comments (0) | TrackBack
Saturday, June 09, 2012
Cyberbullying News: Parts of Missouri's Cyberharassment Law Unconstitutional
In 2006, Missouri teen Megan Meier committed suicide after being "cyberbullied" on MySpace by Lori Drew, a former friend's 49-year-old mom. Megan's suicide in response to Drew's cruel online hoax galvanized national attention around the problem of cyberbullying and prompted widespread calls for legal reforms. Missouri, naturally, was one of the first states to respond. There, state legislators modernized and updated their existing cyberharassment and cyberstalking laws in an attempt to cover conduct such as that that led to Megan's suicide. A week and a half ago, the Missouri Supreme Court dealt a setback to Missouri's efforts to combat cyberbullying by striking down a portion of the amended harassment law , and its decision may contain lessons for those pushing new legislation to criminalize bullying.
Notably, Missouri v. Vaughn, the Missouri Supreme Court's decision striking down portions of the law under the First Amendment, did not involve cyberharassment. Instead, it involved a defendant who repeatedly telephoned his ex-wife, leading prosecutors to charge him under subdivision (5) of Mo. Rev. State 565.090.1 for ""knowingly mak[ing] repeated unwanted communication to another person," and under subdivision (6) for "[w]ithout good cause engag[ing] in an[ ] act with the purpose to frighten, intimidate, or cause emotional distress to another person, [which does in fact] cause such person to be frightened, intimidated, or emtionally distressed, and such person's response to the act is one of a person of average sensibility considering the age of such person."
The court held that section 565.090.1(5) was constitutionally overbroad, despite the State's proffer of a narrowing construction that would have made the statute applicable only when the defendant's communications were repeated, unwanted, and targeted at a "particularized person," whatever that means. The court held that "[e]ven with the State's suggested constructions, subdivision (5) still criminalizes any person who knowingly communicates more than once with another individual who does not want to receive the communications." The court gave examples illustrating subdivision (5)'s overbreadth, noting that it would apply to peaceful picketers or teachers calling on students once asked to stop. The court also found that the statute stretched well beyond what might be justified by the protection of residential privacy or "captive audience" members. The court therefore "severed" and struck subdivision (5) from the statute.
The court, by contrast, upheld subdividision (6) by reading it narrowly to address only fighting words and finding that prohibition of speech made "without good cause" was not vague. Section 565.090.1(6) makes it a crime to "[w]ithout good cause engage[ ] in any other act with the purpose to frighten, intimidate, or cause emotional distress to another person, cause such person to be frightened, intimidated, or emotionally distressed, and such person's response to the act is one of a person of average sensibilities considering the age of the person." The court found that the legislature's exclusion of "the sorts of acts for which there could be good cause" meant that it only applied to expressive conduct that was intended to and actually did provoke "immediate substantial fright, intimidation, or emotional distress." (emphasis in original) Though the reasoning is opaque [I'm being generous], the court seemed to believe that the "legislature's intent" underlying the good cause requirement transformed the statutory provision into one that only addressed "unprotected fighting words." Specifically, the court stated: "because the exercise of constitutionally protected acts clearly constitutes 'good cause,' the restriction of the statute to unprotected fighting words comports with the legislature's intent."
Separately, the court found that subdivision (6) was not vague. According to the court, there is a "common understanding" regarding what would "frighten, intimidate, or cause emotional distress" to a reasonable person. More dubiously, the court asserted that the "good cause" language of the statute would give a citizen adequate notice of what expression was unprotected by the statute as well as adequately constrain law enforcement discretion. Relying on prior case law, the court stated: "'Good cause' in subdivision (6) means 'a cause that would motivate a reasonable person of like age under the circumstances under which the act occurred." Although earlier in the opinion, the court seemed to equate "good cause" with "protected by the First Amendment," here the court seemed to be using a standard legal definition of good cause, meaning done with justifiable motive. Regardless, court's determination that the "good cause" language is not vague is certainly contestable.
Although the court upheld subdivision (6), the victory is probably a pyrrhic one for advocates of broad laws to address bullying behaviors. The court apparently saved the constitutionality of subdivision (6) by adopting a ridiculously strained interpretation of it; under this interpretation, it only covers fighting words--those "which by their very utterance inflict injury or tend to incite an immediate breach of peace"--as defined by the Supreme Court in its 1942 decision in Chaplinsky v. New Hampshire. It is worth noting that the Supreme Court has not upheld a conviction for the utterance of fighting words in the seventy years since it decided Chaplinsky. Moreover, as Rodney Smolla has noted, there is a "strong body of law expressly limiting the fighting words doctrine to face-to-face confrontations likely to provoke immediate violence." In other words, the Missouri Supreme Court's interpretation of subdivision (6) makes it difficult to use as a tool for addressing cyberharassment, since it is unlikely to trigger immediate violence in the manner envisioned by Chaplinsky.
There are no doubt more conclusions to be drawn from Missouri v. Vaughn, and I hope to draw them in an article that my co-author Andrea Pinzon Garcia and I are rushing to complete. That article is currently called Coming to Terms with Cyberbullying as Crime, though the title is subject to change. Look for a link to it here or on SSRN before the end of the month.
Thursday, June 07, 2012
The Virtual Honesty Box
As a fan of comic book art, I'm often thrilled to encounter areas where copyright or trademark law and comic books intersect. As is the case in other media, the current business models of comic book publishers and creators has been threatened by the ability of consumers to access their work online without paying for it. Many comic publishers are worried about easy migration of content from paying digital consumers to non-paying digital consumers. Of course, scans of comics have been making their way around the internet on, or sometimes before, a given comic's onsale date for some time now. As in other industries, publishers have dabbled with DRM, and publishers have enbraced different (and somewhat incompatible) methods for providing consumers with authorized content. Publishers' choices sometimes lead to problems with vendors and customers, as I discuss a bit below.
While services like Comixology offer a wide selection of content from most major comics publishers, they are missing chunks of both the DC Comics and Marvel Comics catalogues. DC entered a deal to distribute 100 of its graphic novels (think multi-issue collections of comic books) exclusively via Kindle. Marvel Comics subsequently struck a deal to offer "the largest selection of Marvel graphic novels on any device" to users of the Nook.
Sometimes exclusive deals leave a bad taste in the mouths of other intermediaries. DCs graphic novels were pulled from Barnes & Noble shelves because the purveyor of the Nook was miffed. Independent publisher Top Shelf is an outlier, offering its books through every interface and intermediary it can. But to date, most publishers are trying to make digital work as a complement to, and not a replacement for, print.
Consumers are sometimes frustrated by a content-owner's choice to restrict access, so much so that they feel justified engaging in "piracy." (Here I define "piracy" as acquiring content through unauthorized channels, which will almost always mean without paying the content owner.) Some comics providers respond with completely open access. Mark Waid, for example, started Thrillbent Comics with the idea of embracing digital as digital, and in a manner similar to Cory Doctorow, embracing "piracy" as something that could drive consumers back to his authorized site, even if they didn't pay for the content originally.
I recently ran across another approach from comic creators Leah Moore and John Reppion. Like Mark Waid, Moore and Reppion have accepted, if not embraced, the fact that they cannot control the flow of their work through unauthorized channels, but they still assert a hope, if not a right, that they can make money from the sales of their work. To that end, they introduced a virtual "honesty box," named after the clever means of collecting cash from customers without monitoring the transaction. In essence, Moore and Reppion invite fans who may have consumed their work without paying for it to even up the karmic scales. This response strikes me as both clever and disheartening.
I'll admit my attraction to perhaps outmoded content-delivery systems -- I also have unduly fond memories of the 8-track cassette -- but I'm disheartened to hear that Moore and Reppion could have made roughly $5,500 more working minimum wage jobs last year. Perhaps this means that they should be doing something else, if they can't figure out a better way to monetize their creativity in this new environment. Eric Johnson, for one, has argued that we likely don't need legal or technological interventions for authors like Moore and Reppion in part because there are enough creative amateurs to fill the gap. The money in comics today may not be in comics at all, but in licensing movies derived from those comics. See, e.g., Avengers, the.
I hope Mark Waid is right, and that "piracy" is simply another form of marketing that will eventually pay greater dividends for authors than fighting piracy. And perhaps Moore and Reppion should embrace "piracy" and hope that the popularity of their work leads to a development deal from a major film studio. Personally, I might miss the days when comics were something other than a transparent attempt to land a movie deal.
As for the honesty box itself? Radiohead abandoned the idea with its most recent release, King of Limbs, after the name-your-price model adopted for the release of In Rainbows had arguably disappointing results: according to one report, 60% of consumers paid nothing for the album. I can't seen Moore and Reppion doing much better, but maybe if 40% of "pirates" kick in a little something into the virtual honesty box, that will be enough to keep Moore and Reppion from taking some minimum wage job where their talents may go to waste.
Thursday, May 31, 2012
A Coasean Look at Commercial Skipping...
Readers may have seen that DISH has sued the networks for declaratory relief (and was promptly cross-sued) over some new digital video recorder (DVR) functionality. The full set of issues is complex, so I want to focus on a single issue: commercials skipping. The new DVR automatically removes commercials when playing back some recorded programs. Another company tried this many years ago, but was brow-beaten into submission by content owners. Not so for DISH. In this post, I will try to take a look at the dispute from a fresh angle.
Many think that commercial skipping implicates derivative work rights (that is, transformation of a copyrighted work). I don't think so. The content is created separately from the commercials, and different commercials are broadcast in different parts of the country. The whole package is probably a compiliation of several works, but that compilation is unlikely to be registered with the copyright office as a single work. Also, copying the work of only one author in the compilation is just copying of the subset, not creating a derivative work of the whole.
So, if it is not a derivative work, what rights are at stake? I believe that it is the right to copy in the first place in a stored DVR file. This activity is so ubiquitous that we might not think of it as copying, but it is. The Copyright Act says that the content author has the right to decide whether you store a copy on your disk drive, absent some exception.
And there is an exception - namely fair use. In the famous Sony v. Universal Studios case, the Court held that "time shifting" is a fair use by viewers, and thus sellers of the VCR were not helping users infringe. Had the Court held otherwise, the VCR would have been enjoined as an agent of infringement, just like Grokster was.
I realize that this result is hard to imagine, but Sony was 5-4, and the initial vote had been in favor of finding infringement. Folks can debate whether Sony intended to include commercial skipping or not. At the time, remote controls were rare, so skipping a recorded commercial meant getting off the couch. It wasn't much of an issue. Even now, advertisers tolerate the fact that people usually fast forward through commercials, and viewers have always left the TV to go to the bathroom or kitchen (hopefully not at the same time!).
But commercial skipping is potentially different, because there is zero chance that someone will stop to watch a catchy commercial or see the name of a movie in the black bar above the trailer as it zooms by. I don't intend to resolve that debate here. A primary reason I am skipping the debate is that fair use tends to be a circular enterprise. Whether a use is fair depends on whether it reduces the market possibilities for the owner. The problem is, the owner only has market possibilities if we say they do. For some things, we may not want them to have a market because we want to preserve free use. Thus, we allow copying via a DVR and VCR, even if content owners say they would like to charge for that right.
Knowing when we should allow the content owner to exploit the market and when we should allow users to take away a market in the name of fair use is the hard part. For this reason, I want to look at the issue through the lens of the Coase Theorem. Coase's idea, at its simplest, is that if parties can bargain (which I'll discuss below), then it does not matter with whom we vest the initial rights. The parties will eventually get to the outcome that makes each person best off given the options, and the only difference is who pays.
One example is smoking in the dorm room. Let's say that one person smokes and the other does not. Regardless of which roommate you give the right to, you will get the same amount of smoking in the room. The only difference will be who pays. If the smoker has the right to smoke, then the non-smoker will either pay the smoker to stop or will leave during smoking (or will negotiate a schedule). If you give the non-smoker the right to a smoke-free room, then the smoker will pay to smoke in the room, will smoke elswhere, or the parties will negotiate a schedule. Assuming non-strategic bargaining (hold-ups) and adequate resources, the same result will ensue because the parties will get to the level where the combination of their activities and their money make them the happiest. The key is to separate the analysis from normative views about smoking to determine who pays.
Now, let's apply this to the DVR context. If we give the right to skip commercials to the user, then several things might happen. Advertisers will advertise less or pay less for advertising slots. Indeed, I suspect that one reason why ads for the Super Bowl are so expensive, even in a down economy, is that not only are there a lot of viewers, but that those viewers are watching live and not able to skip commercials. In response, broadcasters will create less content, create cheaper content, or figure out other ways to make money (e.g. charging more for view on demand or DVDs). Refusing to broadcast unless users pay a fee is unlikely based on current laws. In short, if users want more and better content, they will have to go elsewhere to get it - paying for more channels on cable or satellite, paying for video on demand, etc. Or, they will just have less to watch.
If we give the right to stop commercial skipping to the broadcaster, then we would expect broadcasters will broadcast the mix they have in the past. Viewers will pay for the right to commercial skip. This can be done as it is now, through video on demand services like Netflix, but that's not the only model. Many broadcasters allow for downloading via the satellite or cable provider, which allows the content owner to disable fast forwarding. Fewer commercials, but you have to watch them. Or, in the future, users could pay a higher fee to the broadcaster for the right to skip commercials, and this fee would be passed on to content owners.
These two scenarios illustrate a key limit to the Coase Theorem. To get to the single efficient solution, transactions costs must be low. This means that the parties must be able to bargain cheaply, and there must be no costs or benefits that are being left out of the transaction (what we call externalities). Transactions costs are why we have to be careful about allocating pollution rights. The factory could pay a neighborhood for the right to pollute, but there are costs imposed on those not party to the transaction. Similarly, a neighborhood could pay a factory not to pollute, but difficulty coordinating many people is a transaction cost that keeps such deals from happening.
I think that transactions costs are high in one direction in the commercial skipping scenario, but not as much in the other. If the network has the right to stop skipping, there are low cost ways that content aggregators (satellite and cable) can facilitate user rights to commercial skip - through video on demand, surcharges, and whatnot. This apparatus is already largely in place, and there is at least some competition among content owners (some get DVDs out soon, some don't for example).
If, on the other hand, we vest the skipping right with users, then the ability for content owners to pay (essentially share their advertising revenues) with users is lower if they want to enter into such a transaction. Such a payment could be achieved, though, through reduced user fees for those who disable channel skipping. Even there, though, dividing among all content owners might be difficult.
Normatively, this feels a bit yucky. It seems wrong that consumers should pay more to content providers for the right to automate something they already have the right to do - skip commercials. However, we have to separate the normative from the transactional analysis - for this mind experiment, at least.
Commercials are a key part of how shows get made, and good shows really do go away if there aren't enough eyeballs on the commercials. Thus, we want there to be an efficient transaction that allows for metered advertising and content in a way that both users and networks get the benefit of whatever bargain they are willing to make.
There are a couple of other relevant factors that imply to me that the most efficient allocation of this right is with the network:
1. DISH only allows skipping after 1AM on the day the show is recorded. This no doubt militates in favor of fair use, because most people watch shows on the day they are recorded (or so I've read, I could be wrong). However, it also shows that the time at which the function kicks in can be moved, and thus negotiated and even differentiated among customers that pay different amounts. Some might want free viewing with no skipping, some might pay a large premium for immediate skipping. If we give the user the right to skip whenever, it is unlikely that broadcasters can pay users not to skip, and this means they are stuck in a world with maximum skipping - which kills negotiation to an efficient middle.
2. The skipping is only available for broadcast tv primetime recordings - not for recordings on "cable" channels, where providers must pay for content. Thus, there appears to already be a payment structure in practice - DISH is allowing for skipping on some networks and not others, which implies that the structure for efficient payments are already in place. If, for example, DISH skipped commercials on TNT, then TNT would charge DISH more to carry content. The networks may not have that option due to "must carry" rules. I suspect this is precisely why DISH skips for broadcasters - because it can without paying. In order to allow for bargaining however, given that networks can't charge more for DISH to carry content is to vest the right with networks and let the market take over.
These are my gut thoughts from an efficiency standpoint. Others may think of ways to allow for bargaining to happen by vesting rights with users. As a user, I would be happy to hear such ideas.
This is my last post for the month - time flies! Thanks to Prawfs again for having me, and I look forward to guest blogging in the future. As a reminder, I regularly blog at Madisonian.
Friday, May 11, 2012
App Enables Users to File Complaints of Airport Profiling
Following the terrorist attacks of September 11, 2001, Muslims and those perceived to be Muslim in the United States have been subjected to public and private acts of discrimination and hate violence. Sikhs -- members of a distinct monotheistic religion founded in 15th century India -- have suffered the "disproportionate brunt" of this post-9/11 backlash. There generally are two reasons for this. The first concerns appearance: Sikh males wear turbans and beards, and this visual similiarity to Osama bin Laden and his associates made Sikhs an accessible and superficial target for post-9/11 emotion and scrutiny. The second relates to ignorance: many Americans are unaware of Sikhism and of Sikh identity in particular.
Accordingly, after 9/11, Sikhs in the United States have been murdered, stabbed, assaulted, and harassed; they also have faced discrimination in various contexts, including airports, the physical space where post-9/11 sensitivities are likely and understandably most acute. The Sikh Coalition, an organization founded in the hours after 9/11 to advocate on behalf of Sikh-Americans, reported that 64% of Sikh-Americans felt that they had been singled-out for additional screening in airports and, at one major airport (San Francisco International), nearly 100% of turbaned Sikhs received additional screening. (A t-shirt, modeled here by Sikh actor Waris Ahluwalia and created by a Sikh-owned company, makes light of this phenomenon.)
In response to such "airport profiling," the Sikh Coalition announced the launch of a new app (Apple, Android), which "allows users to report instances of airport profiling [to the Transportation Security Administration (TSA)] in real time." The Coalition states that the app, called "FlyRights," is the "first mobile app to combat racial profiling." The TSA has indicated that grievances sent to the agency by way of the app will be treated as official complaints.News of the app's release has generated significant press coverage. For example, the New York Times, ABC, Washington Post, and CNN picked up the app's announcement. (Unfortunately, multiple outlets could not resist the predictable line, 'Profiled at the airport? There’s an app for that.') Wade Henderson, president and CEO of The Leadership Conference on Civil and Human Rights and The Leadership Conference Education Fund, tweeted, "#FlyRights is a vanguard in civil and human rights."
It will be interesting to see whether this app will increase TSA accountability, quell profiling in the airport setting, and, more broadly, trigger other technological advances in the civil rights arena.
Monday, May 07, 2012
Oracle v. Google - Round I jury verdict (or not)
The jury came back today with its verdict in round one of the epic trial between two giants: Oracle v. Google. This first phase was for copyright infringement. In many ways, this was a run of the mill case, but the stakes are something we haven't seen in a technology copyright trial in quite some time.
Here's the short story of what happened, as far as I can gather.
1. Google needed an application platform for its Android phones. This platform allows software developers to write programs (or "apps" in mobile device lingo) that will run on the phone.
2. Google decided that Sun's (now Oracle's) Java was the best way to go.
3. Google didn't want to pay Sun for a license to a "virtual machine" that would run on Android phones.
4. Google developed its own virtual machine that is compatible with the Java programming language. To do so, Google had to make "APIs" that were compatible with Java. These APIs are essentially modules that provide functionality on the phone based on a keywords (instructions) from a Java language computer program. For example, if I want to display "Hello World" on the phone screen, I need only call print("Hello World"). The API module has a bunch of hidden functionality that takes "Hello World" and sends it out to the display on the screen - manipulating memory, manipulating the display, etc.
5. The key dispute is just how much of the Java source code was copied, if any to create the Google version.
The jury today held the following:
1. One small routine (9 lines) was copied directly - line for line. The court said no damages for this, but this finding will be relevant later
2. Google copied the "structure, sequence, and organization" of 37 Java API modules. I'll discuss what this means later.
3. There was no finding on whether the copying was fair use - the jury deadlocked.
4. Google did not copy any "documentation" including comments in the source code.
5. Google was not fooled into thinking it had a license from Sun.
To understand any of this, one must understand the levels of abstraction in computer code. Some options are as follows:
A. Line by line copying of the entire source code.
B. Line by line paraphrasing of the source code (changing variable names, for example, but otherwise idential lines).
C. Copying of the structure, sequence and organization of the source code - deciding what functions to include or not, creative ways to implement them, creative ways to solve problems, creative ways to name and structure variables, etc. (The creativity can't be based on functionality)
D. Copying of the functionality, but not the stucture, sequence and organization - you usually find this with reverse engineering or independent development
E. Copying of just the names of functions with similar functionality - the structure and sequence is the same, but only as far as the names go (like print, save, etc.). The Court ruled already that this is not protected.
F. Completely different functionality, including different structure, sequence, organization, names, and functionality.
Obviously F was out if Google wanted to maintain compatibility with the Java programming language (which is not copyrightable).
So, Google set up what is often called a "cleanroom." The idea is not new - AMD famously set up a cleanroom to develop copyrighted aspects of its x86 compatible microprocessors back in the early 1990's. Like Google now (according to the jury), AMD famously failed to keep its cleanroom clean.
Here's how a cleanroom works. One group develops a specification of functionality for each of the API function names (which are, remember, not protected - people are allowed to make compatible programs using the same names, like print and save). Ideally, you do this through reverse engineering, but arguably it can be done by reading copyrighted specifications/manuals, and extracting the functionality. Quite frankly, you could probably use the original documentation as well, but it does not appear as "clean" when you do so.
Then, a second group takes the "pure functionality" description, and writes its own implementation. If it is done properly, you find no overlapping source code or comments, and no overlapping structure, sequence and organization. If there happens to be similar structure, sequence and organization, then the cleanroom still wins, because that similarity must have been dictated by functionality. After all, the whole point of the cleanroom is that the people writing the software could not copy because they did not have the original to copy from.
So, where did it all go wrong? There were a few smoking guns that the jury might have latched on to:
1. Google had some emails early on that said there was no way to duplicate the functionality, and thus Google should just take a license.
2. Some of the code (specifically, the 9 lines) were copied directly. While not big in itself, it makes one wonder how clean the team was.
3. The head of development noted in an email that it was a problem for the cleanroom people to have had Sun experience, but some apparently did.
4. Oracle's expert testified (I believe) that some of the similarities were not based on functionality, or were so close as to have been copied. Google's expert, of course, said the opposite, and the jury made its choice. It probably didn't help Google that Oracle's expert came from hometown Stanford, while Google's came from far-away Duke.
So, the jury may have just discounted the Google cleanroom story, and believed Oracle's. And that's what it found. As someone who litigated many copyight cases between competing companies, this is not a shocking outcome. This issue will not doubt bring the copyright v. functionality issue to the forefront (as it did in Lotus v. Borland and Intel v. AMD), this stuff is bread and butter for most technology copyright lawyers. It's almost always factually determined. Only the scope of this case is different in my book - everything else looks like many cases I've litigated (and a couple that I've tried).
So, what happens now in the copyright phase? (A trial on patent infringement started today.) Judge Alsup has two important decisions to make.
First, the court has to decide what to do with the fair use ruling. Many say that a mistrial is warranted since fair use is a question of fact and the jury deadlocked. I'm not so sure. The facts on fair use are not really disputed here - only the legal interpretation of them; my experience is that courts are more than willing to make a ruling one way or the other when copying is clear (as the jury now says it is). I don't know what the court will do, but my gut says no fair use here. My experience is that failed cleanrooms fail fair use - it means that what was copied was more than pure functionality, and it is for commercial use with market substitution. The only real basis for fair use is that the material copied was pure functionality, and that's the next inquiry.
Second, the court must determine whether the structure, sequence, and organization of these APIs can be copyrightable, or whether they are pure functionality. I don't know the answer to that question. It will depend in large part on:
a. whether the structure, etc., copied was at a high level (e.g. structure of functions) or at a low level (e.g. line by line and function by function);
b. the volume of copied (something like 11,000 lines is at issue);
c. the credibility of the experts in testifying to how much of structure that is similar is functionally based. On a related note, the folks over at groklaw think for the most part think this is not copyrightable. They have had tremendous coverage of this case.
I've been on both sides of this argument, and I've seen it go both ways, so I don't have any predictions. I do look forward to seeing the outcome, though. It has been a while since I've written about copyright law and computer software; this case makes me want to rejoin the fray.
Thursday, March 22, 2012
Wired, and ThreatenedI have a short op-ed on how technology provides both power and peril for journalists over at JURIST. Here's the lede:
Journalists have never been more empowered, or more threatened. Information technology offers journalists potent tools to gather, report and disseminate information — from satellite phones to pocket video cameras to social networks. Technological advances have democratized reporting... Technology creates risks along with capabilities however... [and] The arms race of information technology is not one-sided.
Wednesday, February 08, 2012
Criminalizing Cyberbullying and the Problem of CyberOverbreadth
In the past few years, reports have attributed at least fourteen teen suicides to cyberbullying. Phoebe Prince of Massachusetts, Jamey Rodemeyer of New York, Megan Meier of Missouri, and Seth Walsh of California are just some of the children who have taken their own lives after being harassed online and off.
These tragic stories are a testament to the serious psychological harm that sometimes results from cyberbullying, defined by the National Conference of State Legislatures as the "willful and repeated use of cell phones, computers, and other electronic communications devices to harass and threaten others." Even when victims survive cyberbullying, they can suffer psychological harms that last a lifetime. Moreover, an emerging consensus suggests that cyberbullying is reaching epidemic proportions, though reliable statistics on the phenomenon are hard to come by. Who, then, could contest that the social problem of cyberbullying merits a legal response?
In fact, a majority of states already have legislation addressing electronic harassment in some form, and fourteen have legislation that explicitly uses the term cyberbullying. (Source: here.) What's more, cyber-bullying legislation has been introduced in six more states: Georgia, Illinois, Kentucky, Maine, Nebraska, and New York. A key problem with much of this legislation, however, is that legislators have often conflated the legal definition of cyberbullying with the social definition. Though understandable, this tendency may ultimately produce legislation that is unconstitutional and therefore ineffective at remedying the real harms of cyberbullying.
Consider, for instance, a new law proposed just last month by New York State Senator Jeff Klein (D- Bronx) and Congressman Bill Scarborough. Like previous cyberbullying proposals, the New York bill was triggered by tragedy. The proposed legislation cites its justification as the death of 14-year-old Jamey Rodemeyer, who committed suicide after being bullied about his sexuality. Newspaper accounts also attribute the impetus for the legislation to the death of Amanda Cummings, a 15 year old New York teen who committed suicide by stepping in front of a bus after she was allegedly bullied at school and online. In light of these terrible tragedies, it is easy to see why New York legislators would want to take a symbolic stand against cyberbullying and join the ranks of states taking action against it.
The proposed legislation (S6132-2011) begins modestly enough by "modernizing" pre-existing New York law criminalizing stalking and harassment. Specifically, the new law amends various statutes to make clear that harassment and stalking can be committed by electronic as well as physical means. More ambitiously, the new law increases penalties for cyberbullying of "children under the age of 21," and broadly defines the activity that qualifies for criminalization under the act. The law links cyberbullying with stalking, stating that "a person is guilty of stalking in the third degree when he or she intentionally, and for no legitimate purpose, engages in a course of conduct directing electronic communication at a child [ ], and knows or reasonably should know that such conduct: (a) causes reasonable fear of material harm to the physical health, safety or property of such child; or (b) causes material harm to the physical health, emotional health, safety or property of such child." (emphasis mine) Even a single communication to multiple recipients about (and not necessarily to) a child can constitute a "course of conduct" under the statute.
Like the sponsors of this legislation, I deplore cyber-viciousness of all varieties, but I also condemn the tendency of legislators to offer well intentioned but sloppily drafted and constitutionally suspect proposals to solve pressing social problems. In this instance, the legislation opts for a broad definition of cyberbullying based on legislators' desires to appear responsive to the cyberbullying problem. The broad statutory definition (and perhaps resorting to criminalization rather than other remedies) creates positive publicity for legislators, but broad legal definitions that encompass speech and expressive activities are almost always constitutionally overbroad under the First Amendment.
Again, consider the New York proposal. The mens rea element of the offensive requires only that a defendant "reasonably should know" that "material harm to the . . . emotional health" of his target will result, and it is not even clear what constitutes "material harm." Seemingly, therefore, the proposed statute could be used to prosecute teen girls gossiping electronically from their bedrooms about another teen's attire or appearance. Likewise, the statute could arguably criminalize a Facebook posting by a 20-year-old college student casting aspersions on his ex-girlfriend. In both instances, the target of the speech almost certainly would be "materially" hurt and offended upon learning of it, and the speakers likely should reasonably know such harm would occur. Just as clearly, however, criminal punishment of "adolescent cruelty," which was a stated justification of the legislation, is an unconstitutional infringement on freedom of expression.
Certainly the drafters of the legislation may be correct in asserting that "[w]ith the use of cell phones and social networking sites, adolescent cruelty has been amplified and shifted from school yards and hallways to the Internet, where a nasty, profanity-laced comment, complete with an embarrassing photo, can be viewed by a potentially limited [sic] number of people, both known and unknown." They may also be correct to assert that prosecutors need new tools to deal with a "new breed of bully." Neither assertion, however, justifies ignoring the constraints of First Amendment law in drafting a legislative response. To do so potentially misdirects prosecutorial resources, misallocates taxpayer money that must be devoted to passsing and later defending an unconstitutional law, and block the path toward legal reforms that would address cyberbullying more effectively.
With regard to criminal law, a meaningful response to cyberbullying--one that furthers the objectives of deterrence and punishment of wrongful behavior--would be precise and specific in defining the targeted conduct. A meaningful response would carefully navigate the shoals of the First Amendment's protection of speech, acknowledging that some terrible behavior committed through speech must be curtailed through educating, socializing, and stigmatizing perpetrators rather than criminalizing and censoring their speech.
Legislators may find it difficult to address all the First Amendment ramifications of criminalizing cyberbullying, partly because the term itself potentially obscures analysis. Cyberbullying is an umbrella term that covers a wide variety of behaviors, including threats, stalking, harassment, eavesdropping, spoofing (impersonation), libel, invasion of privacy, fighting words, rumor-mongering, name-calling, and social exclusion. The First Amendment constraints on criminalizing the speech behavior involved in cyberbullying depends on which category of speech behavior is involved. Some of these behaviors, such as issuing "true threats" to harm another person or taunting them with "fighting words," lie outside the protection of the First Amendment. (See Virginia v. Black and Chaplinsky v. New Hampshire; but see R.A.V and my extended analysis here.). Some other behaviors that may cause deep emotional harm, such as name-calling, are just as clearly protected by the First Amendment in most contexts. (Compare, e.g., Cohen v. California with FCC v. Pacifica).
But context matters profoundly in determining the scope of First Amendment protection of speech. Speech in schools and workplaces can be regulated in ways that speech in public spaces cannot (See, e.g., Bethel School Dist. No. 403 v. Fraser). Even within schools, the speech of younger minors can be regulated in ways that speech of older minors cannot (Cf. Hazelwood with Joyner v. Whiting (4th Cir)) , and speech that is part of the school curriculum can be regulated in ways that political speech cannot. (Compare, e.g., Tinker with Hazelwood). Outside the school setting, speech on matters of public concern receives far more First Amendment protection than speech dealing with other matters, even when such speech causes tremendous emotional upset. (See Snyder v. Phelps). But speech targeted at children likely can be regulated in ways that speech targeted at adults cannot, given the high and possibly compelling state interest in protecting the well-being of at least younger minors. (But see Brown v. Ent. Merchants Ass'n). Finally, even though a single instance of offensive speech may be protected by the First Amendment, the same speech repeated enough times might become conduct subject to criminalization without exceeding constitutional constraints. (See Pacifica and the lower court cases cited here).
Any attempt to use criminal law to address the social phenomenon should probably start with the jurisprudential question of which aspects of cyberbullying are best addressed by criminal law, which are best addressed by other bodies of law, and which are best left to non-legal control. Once that question is answered, criminalization of cyberbullying should proceed by identifying the various forms cyberbullying can take and then researching the specific First Amendment constraints, if any, on criminalizing that form of behavior or speech. This approach should lead legislators to criminalize only particularly problematic forms of narrowly defined cyberbullying, such as . While introducing narrow legislation of this sort may not be as satisfying as criminalizing "adolescent cruelty," it is far more likely to withstand constitutional scrutiny and become a meaningful tool to combat serious harms.
Proposals to criminalize cyberbullying often seem to proceed from the notion that we will know it when we see it. In fact, most of us probably will: we all recognize the social problem of cyberbullying, defined as engaging in electronic communication that transgresses social norms and inflicts emotional distress on its targets. But criminal law cannot be used to punish every social transgression, especially when many of those transgressions are committed through speech, a substantial portion of which may be protected by the First Amendment.
[FYI: This blog post is the underpinning of a talk I'm giving at the Missouri Law Review's Symposium on Cyberbullying later in the week, and a greatly expanded and probably significantly changed version will ultimately appear in the Missouri Law Review, so I'd particularly appreciate comments. In the article, I expect to create a more detailed First Amendment guide for conscientious lawmakers seeking to regulate cyberbullying. I am especially excited about the symposium because it includes mental health researchers and experts as well as law professors. Participants include Barry McDonald (Pepperdine), Ari Waldman (Cal. Western), John Palfrey (Berkman Center at HLS), Melissa Holt (B.U.), Mark Small (Clemson), Philip Rodkin (U. Ill.), Susan P. Limber (Clemson), Daniel Weddle (UMKC), and Joew Laramie (consultant/former direction of Missouri A.G. Internet Crimes Against Children Taskforce).]
Posted by Lyrissa Lidsky on February 8, 2012 at 08:37 AM in Constitutional thoughts, Criminal Law, Current Affairs, First Amendment, Information and Technology, Lyrissa Lidsky, Web/Tech | Permalink | Comments (8) | TrackBack
Monday, December 19, 2011
Breaking the Net
Mark Lemley, David Post, and Dave Levine have an excellent article in the Stanford Law Review Online, Don't Break the Internet. It explains why proposed legislation, such as SOPA and PROTECT IP, is so badly-designed and pernicious. It's not quite clear what is happening with SOPA, but it appears to be scheduled for mark-up this week. SOPA has, ironically, generated some highly thoughtful writing and commentary - I recently read pieces by Marvin Ammori, Zach Carter, Rebecca MacKinnon / Ivan Sigal, and Rob Fischer.
There are two additional, disturbing developments. First, the public choice problems that Jessica Litman identifies with copyright legislation more generally are manifestly evident in SOPA: Rep. Lamar Smith, the SOPA sponsor, gets more campaign donations from the TV / movie / music industries than any other source. He's not the only one. These bills are rent-seeking by politically powerful industries; those campaign donations are hardly altruistic. The 99% - the people who use the Internet - don't get a seat at the bargaining table when these bills are drafted, negotiated, and pushed forward.
Second, representatives such as Mel Watt and Maxine Waters have not only admitted to ignorance about how the Internet works, but have been proud of that fact. They've been dismissive of technical experts such as Vint Cerf - he's only the father of TCP/IP - and folks such as Steve King of Iowa can't even be bothered to pay attention to debate over the bill. I don't mind that our Congresspeople are not knowledgeable about every subject they must consider - there are simply too many - but I am both concerned and offended that legislators like Watt and Waters are proud of being fools. This is what breeds inattention to serious cybersecurity problems while lawmakers freak out over terrorists on Twitter. (If I could have one wish for Christmas, it would be that every terrorist would use Twitter. The number of Navy SEALs following them would be... sizeable.) It is worrisome when our lawmakers not only don't know how their proposals will affect the most important communications platform in human history, but overtly don't care. Ignorance is not bliss, it is embarrassment.
Cross-posted at Info/Law.
Posted by Derek Bambauer on December 19, 2011 at 01:49 PM in Blogging, Constitutional thoughts, Corporate, Current Affairs, Film, First Amendment, Information and Technology, Intellectual Property, Law and Politics, Music, Property, Television, Web/Tech | Permalink | Comments (1) | TrackBack
Wednesday, December 14, 2011
Six Things Wrong with SOPA
America is moving to censor the Internet. The PROTECT IP and Stop Online Piracy Acts have received considerable attention in the legal and tech world; SOPA's markup in the House occurs tomorrow. I'm not opposed to blacklisting Internet sites on principle; however, I think that thoughtful procedural protections are vital to doing so in a legitimate way. Let me offer six things that are wrong with SOPA and PROTECT IP: they harm cybersecurity, are wildly overbroad and vague, enable unconstitutional prior restraint, undercut American credibility on Internet freedom, damage a well-working system for online infringement, and lack any empirical justification whatsoever. And, let me address briefly Floyd Abrams's letter in support of PROTECT IP, as it is frequently adverted to by supporters of the legislation. (The one-word summary: "sellout." The longer summary: The PROTECT IP letter will be to Abrams' career what the Transformersmovie was to that of Orson Welles.)
- Cybersecurity - the bills make cybersecurity worse. The most significant risk is that they impede - in fact, they'd prevent - the deployment of DNSSEC, which is vitally important to reducing phishing, man-in-the-middle attacks, and similar threats. Technical experts are unanimous on this - see, for example, Sandia National Laboratories, or Steve Crocker / Paul Vixie / Dan Kaminsky et al. Idiots, like the MPAA's Michael O'Leary, disagree, and simply assert that "the codes change." (This is what I call "magic elf" thinking: we can just get magic elves to change the Internet to solve all of our problems. Congress does this, too, as when it includes imaginary age-verifying technologies in Internet legislation.) Both bills would mandate that ISPs redirect users away from targeted sites, to government warning notices such as those employed in domain name seizure cases. But, this is exactly what DNSSEC seeks to prevent - it ensures that the only content returned in response to a request for a Web site is that authorized by the site's owner. There are similar problems with IP-based redirection, as Pakistan's inadvertent hijacking of YouTube demonstrated. It is ironic that at a time when the Obama administration has designated cybersecurity as a major priority, Congress is prepared to adopt legislation that makes the Net markedly less secure.
- Wildly overbroad and vague- the legislation (particularly SOPA) is a blunderbuss, not a scalpel. Sites eligible for censoring include those:
- primarily designed or operated for copyright infringement, trademark infringement, or DMCA § 1201 infringement
- with a limited purpose or use other than such infringement
- that facilitate or enable such infringement
- that promote their use to engage in infringement
- that take deliberate actions to avoid confirming high probability of such use
If Flickr, Dropbox, and YouTube were located overseas, they would plainly qualify. Targeting sites that "facilitate or enable" infringement is particularly worrisome - this charge can be brought against a huge range of sites, such as proxy services or anonymizers. User-generated content sites are clearly dead. And the vagueness inherent in these terms means two things: a wave of litigation as courts try to sort out what the terminology means, and a chilling of innovation by tech startups.
- Unconstitutional prior restraint - the legislation engages in unconstitutional prior restraint. On filing an action, the Attorney General can obtain an injunction that mandates blocking of a site, or the cutoff of advertising and financial services to it - before the site's owner has had a chance to answer, or even appear. This is exactly backwards: the Constitution teaches that the government cannot censor speech until it has made the necessary showing, in an adversarial proceeding - typically under strict scrutiny. Even under the more relaxed, intermediate scrutiny that characterizes review of IP law, censorship based solely on the government's say-so is forbidden. The prior restraint problem is worsened as the bills target the entire site via its domain name, rather than focusing on individualized infringing content, as the DMCA does. Finally, SOPA's mandatory notice-and-takedown procedure is entirely one-sided: it requires intermediaries to cease doing business with alleged infringers, but does not create any counter-notification akin to Section 512(g) of the DMCA. The bills tilt the table towards censorship. They're unconstitutional, although it may well take long and expensive litigation to demonstrate that.
- Undercuts America's moral legitimacy - there is an irreconciliable tension between these bills and the position of the Obama administration - especially Secretary of State Hillary Clinton - on Internet freedom. States such as Iran also mandate blocking of unlawful content; that's why Iran blocked our "virtual embassy" there. America surrenders the rhetorical and moral advantage when it, too, censors on-line content with minimal process. SOPA goes one step farther: it permits injunctions against technologies that circumvent blocking - such as those funded by the State Department. This is fine with SOPA adherents; the MPAA's Chris Dodd is a fan of Chinese-style censorship. But it ought to worry the rest of us, who have a stake in uncensored Internet communication.
- Undercuts DMCA - the notice-and-takedown provisions of the DMCA are reasonably well-working. They're predictable, they scale for both discovering infringing content and removing it, and they enable innovation, such as both YouTube itself and YouTube's system of monetizing potentially infringing content. The bills shift the burden of enforcement from IP owners - which is where it has traditionally rested, and where it belongs - onto intermediaries. SOPA in particular increases the burden, since sites must respond within 5 days of a notification of claimed infringement, with no exception for holidays or weekends. The content industries do not like the DMCA. That is no evidence at all that it is not functioning well.
- No empirical evidence - put simply, there is no empirical data suggesting these bills are necessary. The content industries routinely throw around made-up numbers, but they have been frequently debunked. How important are losses from foreign sites that are beyond the reach of standard infringement litigation, versus losses from domestic P2P networks, physical infringement, and the like? Data from places like Switzerland suggests that losses are, at best, minimal. If Hollywood wants America to censor the Internet, it needs to make a convincing case based on actual data, and not moronic analogies to stealing things off trucks. The bills, at their core, are rent-seeking: they would rewrite the law and alter fundamentally Internet free expression to benefit relatively small yet politically powerful industries. (It's no shock two key Congressional aides who worked on the legislation have taken jobs in Hollywood - they're just following Mitch Glazier, Dan Glickman, and Chris Dodd through the revolving door.) The bills are likely to impede innovation by the far larger information technology industry, and indeed to drive some economic activity in IT offshore.
The bills are bad policy and bad law. And yet I expect one of them to pass and be signed into law. Lastly, the Abrams letter: Noted First Amendment attorney Floyd Abrams wrote a letter in favor of PROTECT IP. Abrams's letter is long, but surprisingly thin on substantive legal analysis of PROTECT IP's provisions. It looks like advocacy, but in reality, it is Abrams selling his (fading) reputation as a First Amendment defender to Hollywood. The letter rehearses standard copyright and First Amendment doctrine, and then tries to portray PROTECT IP as a bill firmly in line with First Amendment jurisprudence. It isn't, as Marvin Ammori and Larry Tribe note, and Abrams embarrasses himself by pretending otherwise. Having the government target Internet sites for pre-emptive censorship, and permitting them to do so before a hearing on the merits, is extraordinary. It is error-prone - look at Dajaz1 and mooo.com. And it runs afoul of not only traditional First Amendment doctrine, but in particular the current Court's heightened protection of speech in a wave of cases last term. Injunctions affecting speech are different in character than injunctions affecting other things, such as conduct, and even the cases that Abrams cites (such as Universal City Studios v. Corley) acknowledge this. According to Abrams, the constitutionality of PROTECT IP is an easy call. That's only true if you're Hollywood's sockpuppet. Thoughtful analysis is far harder.
Cross-posted at Info/Law.
Posted by Derek Bambauer on December 14, 2011 at 09:07 PM in Constitutional thoughts, Culture, Current Affairs, Film, First Amendment, Information and Technology, Intellectual Property, Law and Politics, Music, Property, Web/Tech | Permalink | Comments (1) | TrackBack
Tuesday, December 06, 2011
Revisiting the Scary CFAA
Last April, I blogged about the Nosal case, which led to the scary result that just about any breach of contract on the internet can potentially be a criminal access to a protected computer. I discuss the case in extensive detail in that post, so I won't repeat it here. The gist is that employees who had access to a server in their ordinary course of work were held to have exceeded their authorization when they accessed that same server with the intent of funneling information out to a competitive ex-employee. The scary extension is that anyone breaching a contract with a web provider might then be considered to be accessing the web server in excess of authorization, and therefore committing a crime.
I'm happy to report that Nosal is now being reheard in the Ninth Circuit. I'm hopeful that the court will do something to rein in the case.
I think most of my colleagues agree with me that the broad interpretation of the statute is a scary one. Where some depart, though, is on the interpretive question. As you'll see in the comments to my last post, there is some disagreement about how to interpret the statute and whether it is void for vagueness. I want to address some of the continuing disagreement after the jump.
I think there are three ways to look at Nosal:
1. The ruling was right, and the extension to all web users is fine (ouch);
2. The ruling was right as to the Nosal parties, but should not be extended to all web users; and
3. The ruling was not right as to the Nosal parties, and also wrong as to all web users.
I believe where I diverge from many of my cyberlaw colleagues is that I fall into group two. I hope to explain why, and perhaps suggest a way forward. Note that I'm not a con law guy, and I'm not a crim law guy, but I am a internet statute guy, so I call the statutory interpretation like I see it.
I want to focus on the notion of authorization. The statute at issue, the Computer Fraud and Abuse Act (or CFAA) outlaws obtaining information from networked computers if one "intentionally accesses a computer without authorization or exceeds authorized access."
Orin Kerr, a leader in this area, wrote a great post yesterday that did two things. First, it rejected tort based tresspass rules like implied consent as too vague for a criminal statute. On this, I agree. Second, it defined "authorization" with respect to other criminal law treatment of consent. In short, the idea is if you consent to access in the first place, then doing bad things in violation of the promises made is does not mean lack of consent to access. On this, I agree as well.
But here's the rub: the statute says "without authorization or exceeds authorized access." And this second phrase has to mean something. The goal, for me at least, is that it covers the Nosal case but not the broad range of activity on the internet. Professor Kerr, I suspect, would say that the only way to do that is for it to be vague, and if so, then the statute must be vague.
I'm OK with the court going that way, but here's my problem with the argument. The statute isn't necessarily vague. Let's say that the scary broad interpretation fron Nosal means that every breach of contract is now a criminal act on the web. That's not vague. Breach a contract, then you're liable; there's no wondering whether you have committed a crime or not.
Of course, the contract might be vague, but that's a factual issue that can be litigated. It is not unheard of to have a crime based on failure to live up to an agreement to do something. A dispute about what the agreement was is not the same as being vague. Does that mean I like it? No. Does that mean it's crazy overbroad? Yes. Does that mean everyone's at risk and someone should do something about this nutty statute? Absolutely.
Now, here is where some vagueness comes in - only some breaches lead to exceeded access, and some don't. How are we to decide which is which? The argument Professor Kerr takes on is tying it to trespass, and I agree that doesn't work.
So, I return to my suggestion from several months ago - we should look to the terms of authorization of access to see whether they have been exceeded. This means that if you are an employee who accesses information for a purpose you know is not authorized, then you are exceeding authorization. It also means that if the terms of service on a website say explicitly that you must be truthful about your age or you are not authorized to access the site, then you are unauthorized. And that's not always an unreasonable access limitation. If there were a kids only website that excluded adults, I might well want to criminalize access obtained by people lying about their age. That doesn't mean all access terms are reasonable, but I'm not troubled by that from a statutory interpretation standpoint.
I'm sure one can attack this as vague - it won't always be clear when a term is tied to authorization. But then again, if it is not a clear term of authorization, the state shouldn't be able to prove that authorization was exceeded. This does mean that snoops all over and people who don't read web site terms (me included) are at risk for violating terms of access we never saw or agreed to. I don't like that part of the law, and it should be changed. I'm fine with making it more limiting in ways that Professor Kerr and others have suggested.
But I don't know that it is invalid as vague - there are lots of things that may be illegal that people don't even know are on the books. Terms of service, at least, people have at least some chance of knowing and choose not to. That doesn't mean it isn't scary, because I don't see behavior (including my own) changing anytime soon.
Sunday, November 27, 2011
Threading the Needle
Imagine that Ron Wyden fails: either PROTECT IP or SoPA / E-PARASITE passes and is signed into law by President Obama. Advocacy groups such as the EFF would launch an immediate constitutional challenge to the bill’s censorship mandates. I believe the outcome of such litigation is far less certain than either side believes. American censorship legislation would keep lots of lawyers employed (always a good thing in a down economy), and might generate some useful First Amendment jurisprudence. Let me sketch three areas of uncertainty that the courts would have to resolve, and that improve the odds that such a bill would survive.
First, how high is the constitutional barrier to the legislation? Both bills look like systems of prior restraint, which loads the government with a “heavy presumption” against their constitutionality . The Supreme Court’s jurisprudence in the two most relevant prior cases, Reno v. ACLU and Ashcroft v. ACLU, applied strict scrutiny: laws must serve a compelling government interest, and be narrowly tailored to that interest. This looks bad for the state, but wait: we’re dealing with laws regulating intellectual property, and such laws draw intermediate scrutiny at most. This is what I call the IP loophole in the First Amendment. Copyright law, for example, enjoys more lenient treatment under free speech examination because the law has built-in safeguards such as fair use, the idea-expression dichotomy, and the (ever-lengthening) limited term of rights.
Moreover, it’s not certain that the bills even regulate speech. Here, I mean “speech” in its First Amendment sense, not the colloquial one. Burning one’s draft card at a protest seems like speech to most of us – the anti-war message is embodied within the act – but the Supreme Court views it as conduct. And conduct can be regulated so long as the government meets the minimal strictures of rational review. The two bills focus on domain name filtering – they impede users from reaching certain on-line material, but formally limit only the conversion of domain name to IP address by an Internet service provider. (I’m skipping over the requirement that search engines de-list such sites, which is a much clearer case of regulating speech.) DNS lookups seem akin to conduct, although the Court’s precedent in this area is hardly a model of lucidity. (Burning the American flag = speech; burning a draft card = conduct. QED.) Other courts have struggled, most notably in the context of the anti-circumvention provisions of the Digital Millennium Copyright Act, to categorize domain names as speech or not-speech, and thus far have found a kind of Hegelian duality to them. That suggests an intermediate level of scrutiny, which would resonate with the IP loophole analysis above.
Second, who has standing? It seems that our plaintiffs would need to find a site that conceded it met the definition of a site “dedicated to the theft of U.S. property.” That seems hard to do until filtering begins – at which point whatever ills the legislation creates will have materialized. (It might also expose the site to suits from affected IP owners.) Perhaps Internet service providers could bring a challenge based on either third-party standing (on behalf of their users, if we think users’ rights are implicated, or the foreign sites) or their own speech interests. However, I think it’s unlikely that users would have standing, particularly given the somewhat dilute harm of being unable to reach material on allegedly infringing sites. And, as described above, it’s not clear that ISPs have a speech interest at all: domain name services simply may be conduct.
Finally, how can we distinguish E-PARASITE or PROTECT IP from similar legislation that passes constitutional muster? Section 1201 of the DMCA, for example, permits liability to be imposed not only on those who make tools for circumventing access controls available, but even on those who knowingly link to such tools on-line. The government can limit distribution of encryption technology – at least as object code – overseas, by treating it as a munition. And thus far, the federal government has been able to seize domain names under civil forfeiture provisions, with nary a quibble from the federal courts.
To be plain: I think both bills are terrible legislation. They’re certain to damage America’s technology innovation industries, which are the crown jewels of our economy and our future competitiveness. They turn over censorship decisions to private actors with no interest whatsoever in countervailing values such as free expression or, indeed, anything other than their own profit margins. And their procedural protections are utterly inadequate – in my view. But I think it is possible that these bills may thread the constitutional needle, particularly given the one-way ratchet of copyright protection before the federal courts. The decision in Ashcroft, for instance, found that end user filtering was a narrower alternative than the Children’s Online Protection Act. But end user filtering doesn’t work when the person installing the software is not a parent concerned about on-line filth, but one eager to download infringing movies. And that means that legislation may escape narrowness analysis as well. As I wrote in Orwell’s Armchair:
focusing only on content that is clearly unlawful – such as child pornography, obscenity, or intellectual property infringement – has constitutional benefits that can help a statute survive. These categories of material do not count as “speech” for First Amendment analysis, and hence the government need not satisfy strict scrutiny in attacking them. Recent bills seem to show that legislators have learned this lesson – the PROTECT IP Act, for example, targets only those Web sites with “no significant use other than engaging in, enabling, or facilitating” IP infringement. Banning only unprotected material could move censorial legislation past overbreadth objections.
So: the outcome of any litigation is not only highly uncertain, but more uncertain than free speech advocates believe. Please paint a more hopeful story for me, and tell me why I’m wrong.
Cross-posted at Info/Law.
Posted by Derek Bambauer on November 27, 2011 at 08:37 PM in Civil Procedure, Constitutional thoughts, Current Affairs, First Amendment, Information and Technology, Intellectual Property, Law and Politics, Web/Tech | Permalink | Comments (0) | TrackBack
Monday, November 21, 2011
How Not To Secure the Net
In the wake of credible allegations of hacking of a water utility, including physical damage, attention has turned to software security weaknesses. One might think that we'd want independent experts - call them whistleblowers, busticati, or hackers - out there testing, and reporting, important software bugs. But it turns out that overblown cease-and-desist letters still rule the day for software companies. Fortunately, when software vendor Carrier IQ attempted to misstate IP law to silence security researcher Trevor Eckhart, the EFF took up his cause. But this brings to mind three problems.
First, unfortunately, EFF doesn't scale. We need a larger-scale effort to represent threatened researchers. I've been thinking about how we might accomplish this, and would invite comments on the topic.
Second, IP law's strict liability, significant penalties, and increasing criminalization can create significant chilling effects for valuable security research. This is why Oliver Day and I propose a shield against IP claims for researchers who follow the responsible disclosure model.
Finally, vendors really need to have their general counsel run these efforts past outside counsel who know IP. Carrier IQ's C&D reads like a high school student did some basic Wikipedia research on copyright law and then ran the resulting letter through Google Translate (English to Lawyer). If this is the aptitude that Carrier IQ brings to IP, they'd better not be counting on their IP portfolio for their market cap.
When IP law suppresses valuable research, it demonstrates, in Oliver's words, that lawyers have hacked East Coast Code in a way it was not designed for. Props to EFF for hacking back.
Cross-posted at Info/Law.
Posted by Derek Bambauer on November 21, 2011 at 09:33 PM in Corporate, Current Affairs, First Amendment, Information and Technology, Intellectual Property, Science, Web/Tech | Permalink | Comments (2) | TrackBack