The first exclusively online law review.

Author: JOLT Page 19 of 50

Spotify & the Music Modernization Act

By: Ilya Mirov,

Lawsuit Filed Against Spotify

Spotify, the world’s largest streaming service, has recently been sued by Wixen Music Publishing for allegedly using several thousand songs without a license and without compensation to the publisher.[1] According to Wixen, over 20% of the 30 million songs hosted on Spotify are unlicensed, and the plaintiff is asking for damages of at least $1.6 billion as well as injunctive relief.[2]

Wixen was founded by Randall Wixen in 1978 and licenses the catalog of more than 2,000 artists, including such notable artists as Tom Petty, Jefferson Airplane, the Beach Boys, and Rage Against the Machine.[3] Wixen’s artist songs make up five percent of all the music streamed on Spotify. [4]

Wixen’s lawsuit is just the latest of several legal actions that Spotify has been involved with in the past year.[5] These lawsuits against Spotify have been seeking compensation for songwriters and the copyright holders, who have struggled financially as the music industry has shifted away from physical album sales towards a streaming business model.[6]

Wixen’s legal action against Spotify may have been spurred by a recent proposed settlement involving rights holders and Spotify in Ferrick v. Spotify SUA Inc, No: 1:16-cv-8412 (S.D.N.Y.).[7] On May 26th, Spotify reached a settlement in a class action lawsuit which was consolidated out of two lawsuits brought by Melissa Ferrick and David Lowery involving compositions that Spotify streamed without paying for a license.[8] The settlement calls for Spotify to pay $43.45 million in compensation to the rightsholders for past infringement.[9] A resolution of all copyright disputes would allow Spotify to move forward trouble-free in its initial public offering expected later this year.[10] However, Wixen opted out of the proposed settlement in favor of pursuing its own legal action.[11]

The Music Modernization Act

All of this comes on the heels of what could be the most substantial update to copyright law since 1998.[12] If passed, the Music Modernization Act (MMA) promises to bring copyright laws into the 21st century.[13] The bill has been introduced to the House, and a mirrored bill was introduced in the Senate on January 24, 2018, with co-sponsors from both parties.[14]

The bill addresses key difficulties in music licensing that currently lead to digital music companies, like Spotify, regularly failing to pay songwriters and copyright owners for distribution of their songs. [15] Companies like Spotify often file bulk Notice of Intentions (NOIs) with the Copyright Office that allow them to obtain a license for music for which ownership information cannot be found. [16] Since this process was first instantiated in 2016, there have been an estimated 45 million NOIs filed with the Copyright Office.[17] This NOI process has taken millions in income away from songwriters who must rely on streaming services to link artists to their songs and issue fair payment.[18] The MMA will update the NOI process so that music creators can more often get payment for their work, thereby also reducing liability for digital companies who play the music.[19]

Second, the bill would establish a Mechanical Licensing Collective (MLC), an agency that would have streaming services compensate songwriters for the mechanical royalties earned through the streaming of licensed music content.[20] In exchange, the collective would allow digital providers, such as Spotify, to have blanket usage licenses for songs.[21] The MLC’s function would be to provide streaming services with efficient access to the information they need in order to know which songwriters to pay for songs.[22]

Third, the legislation would give both publishers and songwriters representation on the board of the MLC to ensure that its operations remain transparent and fair to both the streaming services and the creators.[23] The MMA would also provide songwriters with a chance to obtain fair-market mechanical royalty rates in the Copyright Royalty Board (CRB) proceedings that set royalty rates every five years.[24] Currently, CRB judges determine royalty rates based on an outdated standard, which will be replaced by the “willing buyer/willing seller” standard. This new standard will set rates based on open market negotiation between buyers and sellers.[25]

Fourth, the bill proposes an overhaul for the rate court system. Currently the American Society of Composers, Authors, and Publishers (ASCAP) and the Broadcast Music Inc. (BMI)– the two largest performance rights organizations in the country– are assigned a single judge who handles all rate court cases. The MMA would randomly assign a district judge in New York’s Southern District to each case going forward, and would allow those judges to consider relevant market-based evidence in determining the performance rate given to songwriters.[26]

Perhaps the most critical of the four changes promised by the MMA would be the creation of the Mechanical Licensing Collective, the new agency which would be responsible for creating a public database containing song ownership information, helping songwriters identify which songs haven’t been attributed to them and streaming services avoid lawsuits for not properly attributing rights to the holders of songs on their services.[27]

 

[1] Amanda G. Ciccatelli, Spotify Sued by Music Publishing Company for Unauthorized Use of Thousands of Songs, IPWatchdog (January 31, 2018), http://www.ipwatchdog.com/2018/01/31/spotify-sued-music-publishing-wixen/id=92993/.

[2] Id.

[3] Id.

[4] Id.

[5] Id.

[6] See Ciccatelli, supra note 1.

[7] Id.

[8] Robert Levine, What Will Spotify’s $43 Million Class Action Settlement Mean For Songwriters and Publishers?, Billboard (May, 30, 2017), https://www.billboard.com/articles/business/7809818/spotify-43-million-class-action-settlement-songwriters-publishers-analysis.

[9] Id.

[10] Id.

[11] Amanda G. Ciccatelli, Spotify Sued by Music Publishing Company for Unauthorized Use of Thousands of Songs, IPWatchdog (January 31, 2018), http://www.ipwatchdog.com/2018/01/31/spotify-sued-music-publishing-wixen/id=92993/.

[12] Rep. Doug Collins (R-GA.), The Music Modernization Act Will Provide a Needed Update to Copyright Laws, The Hill (January 10, 2018), http://thehill.com/blogs/congress-blog/technology/368385-the-music-modernization-act-will-provide-a-needed-update-to.

[13] Id.

[14] Ed Christman, Senate Moves Forward on Music Modernization Act, Billboard (January 24, 2018), https://www.billboard.com/articles/business/8096006/senate-bill-music-modernization-act-licensing-reactions.

[15] Rep. Doug Collins (R-GA.), The Music Modernization Act Will Provide a Needed Update to Copyright Laws, The Hill (January 10, 2018), http://thehill.com/blogs/congress-blog/technology/368385-the-music-modernization-act-will-provide-a-needed-update-to.

[16] Id.

[17] Id.

[18] Id.

[19] Id.

[20] See Collins, supra note 15.

[21] Id.

[22] Id.

[23] Id.

[24] Id.

[25] Ed Christman, Senate Moves Forward on Music Modernization Act, Billboard (January 24, 2018), https://www.billboard.com/articles/business/8096006/senate-bill-music-modernization-act-licensing-reactions.

[26] Id.

[27] Micah Singleton, Congress May Actually Fix Music Royalties, The Verge (January 26, 2018), https://www.theverge.com/2018/1/26/16931966/congress-music-modernization-act-licensing-royalties.

Image Source: https://techcrunch.com/2018/01/02/spotify-faces-1-6-billion-lawsuit-from-music-publisher-wixen/.

Technology and Criminal Law

By: Brooke Throckmorton,

It is hard to think of a time when technology was not an integral, driving force in the world. Technology has permeated many crevices of the average American’s daily life. Technology can change how crimes happen, types of evidence available after a crime is committed, how the police investigate a crime, and much more. This article touches on new and potential technologies and how those technologies can affect the criminal justice system, for good, bad, or complicated reasons. It should be noted that each new technology will have both good and bad aspects. “Good” simply means I believe the technology has the ability to be helpful. “Bad” means the technology has a stronger probability (in my opinion) of being manipulated and abused.

I will start with the “good.” There is a new technological system that can detect gun shots and pinpoint their exact location.[1] The gunfire pinpointing system, “ShotSpotter”, uses sensors to detect gunfire in a certain location and “triangulate the location of the incident.”[2] The location can be pinned down to the exact latitude and longitude of where the gun was fired.[3] It is then communicated to police.[4] Since not all criminal activity is reported, these gunfire sensors can insure police arrive on the scene of a crime before someone even dials 911.[5] More potentially helpful technology includes a national registry that can recognize mug shots (by facial recognition technology) in a matter of seconds[6], and computer-generated risk scores that can be used to decide when to detain arrestees.[7]

Next, the “bad” or potentially dangerous technologies are out there as well. First, there is talk of possible home incarceration technology as opposed to traditional imprisonment in prisons and jails.[8] While home incarceration would involve high technology surveillance equipment like cameras, microphones, and sensors[9], there is clear potential for abuse of the system. This technology raises many questions such as: How much can technology limit a person’s freedom? Would home incarceration be used for low level offenders (speeding tickets, failure to pay child support, etc.) or all offenses? Two main goals of the criminal justice system are to separate the guilty from the innocent[10] and to deter criminal behaviors with punishment. With that in mind, is being forced to watch Netflix on your couch for ten months truly a punishment? Will home incarceration have the same deterrence effect as prison incarceration?[11] I believe it depends on how the technology is implemented.  Another potential issue with technology when it comes to the criminal justice system is probably sitting next to you right now, or maybe you are using it to read this article: your iPhone. Apple released the latest version of the iPhone (iPhone X) in November 2017.[12] The iPhone X uses facial recognition to unlock your phone as opposed to a fingerprint or passcode. The iPhone X facial access raises serious Fifth Amendment issues when it comes to police forcing you to open your phone to obtain incriminating evidence.[13] Basically the Fifth Amendment protects you from being forced (by the police) to unlock your iPhone by using a passcode or pin ID because this is information you know; however, the Fifth Amendment does not  (conceivably) protect against being forced to use your face or thumbprint to open your phone because your face and thumbprint are things you are, not things you know.[14] There will need to be litigation (yet to come) to determine the courts’ stance on these issues.

Third, we have the complicated. While there are many complicated technologies, self-driving cars have to be close to the top of the list. Many liability questions pop up when there is a self-driving car involved such as: Who is liable when/if the car crashes? How does the car know to pull over when a police officer requests you to? The good news is self-driving cars are not fully functional on their own (yet).[15] This means self-driving cars still require driver input.[16] Some states are starting to implement laws to regulate self-driving cars. For example, North Carolina has a law mandating that no one under age twelve can ride in a self-driving car without adult supervision.[17] Further, owning a self-driving car does not require a driver’s license.[18] In addition, if the car receives a speeding ticket while in “auto-pilot” mode, the “driver” is responsible for paying the ticket.[19] These self-driving cars are not perfect. This is demonstrated by the fact that there have been many accidents, and a few fatalities, to date.[20] If a self-driving car does not remind you of Black Mirror[21] already, this next bit of information should do the trick. Ford recently filed a patent for an autonomous police car that could potentially decide on its own (via a learning algorithm) whether to issue a citation or a warning for a traffic infraction.[22] While patents do not always come to fruition, it is still a bit “unnerving” to think of an automated police car making decisions that a human being usually exercises judgment over.[23]

Some states have recognized technological advancements by making laws to deal with new technologies. For example, North Carolina recently implemented a law criminalizing flying drones within a certain proximity of a prison.[24] Merely flying a drone near a prison could land you with a misdemeanor; however, if you are trying to smuggle in contraband or weapons, you will be bumped up to felony status.[25]

New technology can be extremely helpful but at some point, we need to question the motives behind it, especially when it comes to the criminal justice system. Just because we CAN create something, does it mean we necessarily SHOULD create it?

 

[1] Quora, contributor, How Technology Is Impacting Our Criminal Justice System, Forbes (May 11, 2018), https://www.forbes.com/sites/quora/2017/05/11/how-technology-is-impacting-our-criminal-justice-system/#291183a8226d.

[2] Id.

[3] Id.

[4] Id.

[5] Id.

[6] Doug Irving, How Will Technology Change Criminal Justice?, RAND (Jan. 7, 2016), https://www.rand.org/blog/rand-review/2016/01/how-will-technology-change-criminal-justice.html.

[7] Quora, supra note 1.

[8] Id.

[9] Id.

[10] Corinna Lain, S.D. Roberts & Sandra Moore Professor of Law, University of Richmond School of Law, Criminal Procedure: Investigation Lecture (Feb. 1, 2018).

[11] See Quora, supra note 1.  

[12] Matt Swider, The iPhone X Release Date This Friday, Thank to ‘Hard Work’, techradar (Nov. 2, 2017), http://www.techradar.com/news/the-iphone-x-release-date-was-meant-for-2018-explaining-apples-odd-triple-phone-launch.

[13] Kaveh Waddell, Can Cops Force You to Unlock Your Phone With Your Face?, The Atlantic (Sept. 13, 2017), https://www.theatlantic.com/technology/archive/2017/09/can-cops-force-you-to-unlock-your-phone-with-your-face/539694/.

[14] Id.

[15] Jordan Cook, Ford Files a Patent for an Autonomous Police Car, TechCrunch (Jan. 26, 2018), https://techcrunch.com/2018/01/26/ford-files-a-patent-for-an-autonomous-police-car/.

[16] Id.

[17] Gary D. Robinson, New North Carolina Laws Address Longtime Crimes, New Technology, Citizen Times (Dec. 1, 2017), http://www.citizen-times.com/story/news/2017/12/01/new-north-carolina-laws-address-longtime-crimes-new-tech/913069001/.

[18] Id.

[19] Id.

[20] See Bill Vlasic, Neal E. Boudette, Self-Driving Tesla Was Involved in Fatal Crash, U.S. Says, N.Y. Times, June 30, 2016, https://www.nytimes.com/2016/07/01/business/self-driving-tesla-fatal-crash-investigation.html.

[21] Black Mirror (Netflix 2017) (An original Netflix series that depicts what a technological future might look like and implications technology can have on human kind.).

[22] Cook, supra note 16.

[23] Id.

[24] Robinson, supra note 18.

[25] Id.

Image Source: https://www.dreamstime.com/stock-photo-justice-gavel-laptop-computer-keyboard-concept-online-internet-auction-legal-assistance-image46763895.

FISA and EO 12333: Technology Allows Collection of Information of U.S. Citizens via Loopholes in the Law

By: Nicole Allaband,

“Technological developments are arriving so rapidly and are changing the nature of our society so fundamentally that we are in danger of losing the capacity to shape our own destiny. This danger is particularly ominous when the new technology is designed for surveillance purposes[.]”[1] Senator John Tunney (D-CA) said this in a hearing about the precursor to the bill that became the Foreign Intelligence Surveillance Act (“FISA”) in 1978.[2] Technology has continued to develop at a fast rate and yet the law is still trailing behind, leaving U.S. citizens open to privacy violations.

FISA established the Foreign Intelligence Surveillance Court (“FISC”) to review applications for authorization of electronic surveillance.[3] FISA governs the collection of “foreign intelligence.”[4] The probable cause required for authorization to collect information under FISA is very different from the probable cause required in domestic investigations. In domestic investigations, a court may issue a search or arrest warrant if probable cause is shown that a crime has been, or is being, committed.[5] However, under FISA, collection of information can occur, without a warrant, on finding probable cause that the target is a foreign power or agent, regardless of whether that foreign power or agent is suspected of criminal activity.[6] Only if the target of the FISA warrant is a U.S. citizen must there be probable cause that the person is involved in criminal activity.[7]

FISA has been amended several times since 1978. The 1994 and 1998 amendments allowed covert physical entries and pen/trap orders.[8] The USA-PATRIOT Act, passed shortly after 9/11, expanded the reach of FISA to circumstances in which foreign intelligence gathering is only a “significant” purpose of an investigation.[9] However, the amendments have not kept pace with new technologies.[10]

In addition to FISA, foreign intelligence is collected under Executive Order (“EO”) 12333.[11] The order was issued in 1981 by President Reagan and it governs surveillance the National Security Agency (“NSA”) conducts overseas.[12] Although U.S. citizens cannot be targeted under EO 12333, the NSA can conduct bulk collection which leads to incidental collection of large quantities of U.S. citizens’ communications.[13] Under EO 12333, when the NSA collects information abroad, it can presume the information collected belongs to non-U.S. citizens.[14]

EO 12333 and FISA were written before the Internet became what it is today but neither has been updated to match current technology. The Internet was not designed to conform to national borders; rather the Internet was built on efficiency, reliability, and minimizing costs.[15] Network traffic between two points in the United States may be naturally routed to a server abroad before reaching the endpoint in the United States.[16] Traffic between two domestic points that is routed abroad can therefore be swept up under EO 12333.[17] Unless the information collected specifically identifies the starting and ending point as being within the United States, the NSA can presume the communication is by and about a foreign national.[18] Unfortunately technology makes it “virtually impossible, in real time,” to determine the location or nationality of the target.[19] Information thus collected can be “retained for further processing.”[20]

Congress recently reauthorized Section 702 FISA.[21] Section 702 specifically authorizes the government to target and collect information from foreigners located abroad.[22] Despite the focus on foreign intelligence collection, Section 702 incidentally collects a large amount of communications from U.S. citizens (without a warrant).[23] Changes in technology coupled with outdated legislation has put Americans’ privacy at risk.[24] FISA defined “electronic surveillance” in 1978, and that definition has remained largely unchanged despite massive changes in technology.[25] The 2017 Reauthorization Act clarifies some procedures for the FBI to obtain collected information and mandates reporting requirements about material breaches.[26] However, the reauthorization does not update the definition of electronic surveillance to keep pace with current technology and the loopholes the intelligence community is able to exploit to collect information on U.S. citizens.[27] The current reauthorization lasts until 2023 but Congress should seriously consider updating the definition of electronic surveillance so that where the information is collected is not determinative of the collection process and the legal protections offered.[28]

 

[1] Joint Hearings on Surveillance Technology Before the Sen. Comm. On the Judiciary, Subcomm. on Const. Commercce, Spec. Subcomm. on Science, Tech., and Commerce, 94th Cong. 1 (1975) (Statement of Sen. John Tunney).

[2] See id; see also Foreign Intelligence Surveillance Act (FISA), Electronic Privacy Information Center, https://epic.org/privacy/surveillance/fisa/#Overview (last visited Jan. 30, 2018).

[3] See id.

[4] See id.

[5] See id.

[6] See id; see also Jessica Schneider, What is Section 702 of FISA, anyway?, CNN (January 11, 2018), https://www.cnn.com/2018/01/11/politics/trump-fisa-section-702-surveillance-data/index.html.

[7] See id. (only U.S. citizens are protected by the Fourth Amendment); Schneider, What is Section 702 of FISA, anyway?.

[8] See Schneider, What is Section 702 of FISA, anyway?.

[9] See id.

[10] See Jeffrey S. Brand, Eavesdropping on Our Founding Fathers: How a Return to the Republic’s Core Democratic Values Can Help Us Resolve the Surveillance Crisis, 6 Harv. Nat’l Sec. J. 1 (2015).

[11] See Foreign Intelligence Surveillance (FISA Section 702, Executive Order 12333, and Section 215 of the Patriot Act): A Resource Page, Brennan Center for Justice (last updated September 28, 2017), https://www.brennancenter.org/analysis/foreign-intelligence-surveillance-fisa-section-702-executive-order-12333-and-section-215.

[12] See id.

[13] See id.

[14] See id; see also Axel Arnbak & Sharon Goldberg, Loopholes for Circumventing the Constitution: Unrestrained Bulk Surveillance on Americans by Collecting Network Traffic Abroad, 21 Mich. Telecomm. Tech. L. Rev. 317, 335 (2015).

[15] See Arnbak & Goldberg, at 343.

[16] See id.

[17] See id. at 335.

[18] See id. at 321.

[19] See Williams C. Banks, Data Collection and Advancements in Surveillance Techniques: Next Generation Foreign Intelligence Surveillance Law: Renewing 702, 51 U. Rich. L. Rev. 671, 672 (2017).

[20] See Arnbak & Goldberg, at 321.

[21] See Robyn Greene, Americans Wanted More Privacy Protections. Congress Gave Them Fewer, Slate (Jan. 26, 2018), https://slate.com/technology/2018/01/congress-reauthorization-of-section-702-of-the-fisa-is-an-expansion-not-a-reform.html.

[22] See id.

[23] See id.

[24] See id; see also Arnbak & Goldberg, at 319.

[25] See Arnbak & Goldberg, at 329.

[26] See S.139 FISA Amendments Reauthorization Act of 2017, Congress.gov, https://www.congress.gov/bill/115th-congress/senate-bill/139/text?q=%7B%22search%22%3A%5B%22s.+139%22%5D%7D&r=1 (accessed Jan. 20, 2018).

[27] See id.

[28] See Arnbak & Goldberg, at 359.

Image Source:https://www.activistpost.com/2017/09/trump-admin-congress-renew-fisa.html.

The Increased Use of Electronic Messaging Evidence in Divorce Proceedings

By: Hayden-Anne Breedlove,

It is crucial for attorneys to keep up with societal changes in communication.[1] As a second-year law student, I recently finished my Evidence course, in which I learned about the ins-and-outs of the Federal Rules of Evidence. During a recent panel of guest speakers, the panelists kept emphasizing the importance of change and keeping up with the changes, specifically in regards to technology. As technology advances, so does the type and forms of messages we as society are able to send and receive. Gone are the days of sending a letter through snail mail or telephoning your ex-spouse to arrange a visitation. Instead, people communicate through text messages, emails, Facebook messages, Snapchats, and a plethora of other forms of electronic communication. It is, therefore, crucial for attorneys to understand and be on top of their knowledge of these new forms of social media and their admissibility in the courtroom.[2] In a recent case, service was even found to be acceptable via Facebook, when all other avenues had proved unsuccessful.[3]

As is the case with any piece of evidence, a proper foundation for admissibility must be laid.[4] This means that a background and context must be provided for your evidence to be admitted.[5] The evidence must also be relevant to the case and authenticated.[6]

Authentication is usually done by a witness giving testimony identifying what the document is or calling a custodian of record who can testify to the accuracy of the contents of the document.[7] However, issues with authentication arise with electronic messages, especially in divorce proceedings.[8]

Circumstantial evidence is necessary for authenticating electronic messages.[9] There must be 1) a printed out version of the messages along with 2) a statement of who the author or sender of the message was.[10]

The first step is simple, as there is a low threshold for providing a printed copy.[11] The second step, however, is more complicated.[12] Identifying who the sender of the message was requires testimony describing distinctive characteristics such as appearance, contents, substance, or a domain.[13] It would also be helpful to have a witness to testify as to the person writing the message.[14]

Text messages are an obvious form of evidence that can be used against a spouse in a divorce case. Flirty text messages or inappropriate photos being sent to someone other than the spouse seem obvious as something that can be used against the sender. A recent Virginia case held that text messages constitute a “writing” for purposes of the best evidence rule and are therefore, assuming other evidence rules and requirements are met, admissible.[15]

However, text messages sent to friends or family that express anger or frustration about a spouse or child can be helpful or harmful to the case, too. A text to a friend talking about how annoying the child is can be used to show the spouse’s state of mind and disposition towards the child.[16] This can be helpful in determining custody and visitation.

Cell phones are not just useful for finding incriminating text messages. Call logs can also be helpful in a divorce case. Joint phone plans allow a spouse to simply log into the account and look at the calls made to and from each spouse’s line in order to catch a suspected adultering spouse.

Social media has become a mecca of information for divorce attorneys. With people posting information and updates about their daily lives through Facebook posts, tweets, or Instagram photos, it is easy to find information about a person’s day-to-day routines. Information found on social media can tell what a person does each day, with whom, and what their reactions and emotions were towards these events.

GPS has become a feature available to everyone. Gone are the days of using maps and asking a gas station clerk for directions. It is easy to determine where a spouse has traveled by simply opening up their GPS app on their phone and looking at the recent locations. With the internet, it is easy to Google the address and find out where it is, whether it is a business, or a private residence.

It is illegal in Virginia to attach a GPS tracking system to someone’s car without their consent.[17] However, private investigators are a common resource used to follow your spouse.[18] Private investigators can follow and collect evidence of a cheating spouse that can be used in a case.

Social media, text messages, and call logs can be used in divorce cases to uncover hidden assets or income, provide proof of spousal misconduct, or provide evidence of poor parenting behavior. It can also be used to prove and calculate child and spousal support. Therefore, it is crucial for both attorneys and law students to understand the ins-and-outs of social media.

 

[1] See Judge Michele Lowrance & Pamela J. Hutul, Social Media in Divorce Proceedings, Family Law Magazine (Dec. 30, 2016), http://familylawyermagazine.com/articles/social-media-in-divorce-proceedings/; see also Shalamar Parham, How Social Media Posts Are Used as Evidence in Divorce and Family Law Cases, Divorce Magazine (Oct. 29, 2016), http://www.divorcemag.com/blog/how-social-media-posts-are-used-as-evidence-in-divorce-and-family-law-cases.

[2]  Id.

[3] Baidoo v. Blood-Dzraku, 48 Misc. 3d 309, 310 (2015).

[4] Va. R. Evid. 2:403.

[5] Id.

[6] Id.

[7] Va. R. Evid. 2:901.

[8] See generally Authentication of Electronically Stored Evidence, Including Text Messages and E-mail, 34 A.L.R.6th 253 (last accessed Jan. 24, 2018).

[9] Harlow v. Comm., 204 Va. 385 (1963).

[10] Brandon K. Fellers & Kristin M. Sempeles, How to Outsmart a Smartphone: Practical Tips on How to Use Electronic Messaging Evidence in the Courtroom, Virginia Lawyer (June 2017).

[11] Id.

[12] Id.

[13] Id.

[14] Id.

[15] Dalton v. Comm., 62 Va. App. 113 (2013).

[16] Digital Divorce, A Guide for Social Media & Digital Communications in Divorce, McKinley Irvin Family Law (last accessed Jan. 24, 2018), https://www.mckinleyirvin.com/Resources/Digital-Divorce-A-Guide-for-Social-Media-Digital/Social-Media-Divorce-Evidence.aspx.

[17] VA Code § 18.2-60.5.

[18] Id.

Image Source: http://www.amarallaw.com/blog/2013/04/using-cell-phones-and-social-media-in-divorce-in-massachusetts.shtml.

Technology-Assisted Review: Overcoming the Judicial Double-Standard

By: Kate Bauer,

Technology-Assisted Review: Overcoming the Judicial Double-Standard

Although it has been nearly six years since technology-assisted review (“TAR”) first garnered judicial approval as a permissible form of document review,[1] inconsistent rulings about the amount of disclosure TAR requires have hobbled its adoption.  Citing the importance of transparency, courts have tended to look more favorably on parties who agree to exchange the relevant and irrelevant documents used to train the algorithm.[2]  When a party refuses to turn over these documents, some courts have regarded TAR usage with skepticism, or even disallowed it.[3]  This emphasis on transparency overlooks a crucial point: courts do not have authority to compel parties to turn over irrelevant documents.[4]  Further, it makes little sense to hold TAR—which has been shown to be more accurate and more cost-effective than traditional human review[5]—to a higher standard than exhaustive manual review.  Indeed, concerns about accuracy are more appropriately leveled at the document review methods parties have traditionally used, which research has shown are notoriously inconsistent.[6]  Accordingly, a court should regard a party’s decision to use TAR with at least as much deference as is given to traditional methodologies.

 

Technology-assisted review (“TAR”) is a method of document review in which attorneys manually review a subset of documents—commonly referred to as a “seed set”—for relevance, then submit those decisions to a computer algorithm.[7]  The algorithm then (1) examines the documents the attorneys have coded, (2) identifies conceptually similar documents within the collection, and (3) predicts whether these conceptually similar documents are relevant or irrelevant based on how the attorneys coded similar documents in the seed set.[8]  By amplifying attorney decisions on these training documents to similar documents across the document universe, TAR enables attorneys to quickly and accurately categorize documents they have not laid eyes on.[9]  As with human reviewers, attorneys ensure they have properly trained the algorithm by reviewing samples of TAR predictions.[10]  Where TAR predictions are incorrect, attorneys correct erroneous coding on the original training document that informed the TAR predictions.[11]  TAR then adjusts its predictions for all similar documents in the database.[12]

 

Prior to the development of TAR algorithms, document review was understood to be a linear process in which teams of attorneys reviewed documents one by one. Linear human review is time-consuming, expensive, and inconsistent.[13] Reviewer coding errors amplify these issues because correcting errors requires manual re-review of existing coding decisions.  With the volume of electronically-stored information increasing year over year, the expense of this model has become increasingly unsustainable.[14] To reduce the volume of data for review, attorneys frequently rely on keyword searches (the equivalent of CTRL + F); however, this method has also been shown to have substantial shortcomings.[15]  The burdens of reviewing large amounts of data motivated recent revisions to the Federal Rules to emphasize “proportional[ity] to the needs of the case” as a factor that could be considered in limiting the scope of discovery.[16]

 

Despite increasing document volumes and research on the shortcomings of traditional review methods, the perception of linear human review as the “gold standard” of document review has stubbornly persisted.[17]  Although empirical data demonstrates that TAR can achieve results as good as or superior to exhaustive manual review,[18] courts hesitated to stray from the accepted linear review model.

 

In Da Silva Moore v. Publicis Groupe, the first opinion to approve the use of TAR, Judge Andrew Peck lauded the defendant’s decision to turn over the relevant and irrelevant documents it had used to train the algorithm (“seed sets”).[19]  Peck felt that this approach “reduced fears about the so-called ‘black box’ of technology,” and “highly recommend[ed] that counsel in future cases be willing to at least discuss, if not agree to, such transparency in the computer-assisted review process.”[20]  However, Judge Peck’s praise for the defendant’s decision to disclose its seed set should not be interpreted as a judicial requirement disclosure; indeed, as he himself noted in a later opinion, Da Silva Moore stopped short of any such requirement.[21]

 

The Federal Rules of Civil Procedure require cooperation in discovery,[22] but they also dictate that irrelevant documents are outside the scope of discovery.[23]  In defining scope, the Rules state, “Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense and proportional to the needs of the case” (emphasis added).[24]  Because relevance to a claim or defense is a prerequisite for obtaining discovery, documents which attorneys identify as irrelevant are, by definition, outside the scope of discovery.[25]

 

While parties are still free to agree to exchange irrelevant documents if they wish, the Rules do not authorize courts to mandate such disclosure.[26]  In the context of TAR, one court observed that requests for the whole seed set “reached well beyond the scope of any permissible discovery by seeking irrelevant or privileged documents used to tell the algorithm what not to find. That [an opposing party] has no right to discover irrelevant or privileged documents seems self-evident.”[27]

 

Good reasons exist for only authorizing courts to compel the production of relevant documents. As one court has observed, without such limitations a party seeking discovery might “obtain a permit to explore the documents in the possession of his adversary in the hope that he may find something which may adversely affect the adversary’s case, or that may prove helpful to the case of the movant.”[28]  Even if a fishing expedition would be unlikely to unearth anything of value, the client may still wish to withhold irrelevant materials to safeguard against potential disclosure of sensitive, damaging, or embarrassing information of no consequence to the instant litigation.  Because irrelevant materials often run the gamut from fantasy football updates and grocery lists to private medical information and romantic indiscretions, clients have compelling privacy interests at stake in withholding irrelevant materials.[29]

On the other hand, obstructionism in discovery has become an undeniably costly source of satellite litigation.[30] Transparency, it is argued, encourages parties to work together toward the resolution of substantive legal disputes rather than engaging in adversarial discovery disputes.[31] The influential Sedona Conference, for example, advocates for “cooperative, collaborative, transparent” discovery in order to reduce costs.[32] In this vein, the DOJ Antitrust Division requests that parties who utilize TAR provide one or more statistically significant samples of non responsive documents for DOJ review to ensure obviously responsive documents are not omitted. [33]  However, while transparency may well help to ensure accuracy and reduce litigation costs, it comes at the expenses of privacy. Therefore, the decision to waive such privacy concerns must repose with the parties themselves, not their judges.[34]

Nevertheless, several courts have opined that parties should provide access to irrelevant documents in the name of transparency.[35]  This sympathy may be based on misreading Da Silva Moore as requiring disclosure seed sets,[36] when in fact Peck merely praised and encouraged the defendant’s decision to disclose its seed sets.[37]  For example, in one case the court refused to allow a party to use TAR, noting that the party proposing to use it was “unwilling to engage in the type of cooperation and transparency that . . . is needed for a predictive coding protocol to be accepted by the court . . . .”[38]  In several other cases where the parties have agreed to exchange seed sets of their own volition, courts have made it clear that such transparency is expected.[39]  However, requiring that parties exchange documents outside the scope of discovery is an impermissible exercise of judicial authority.

Judge Peck, in his subsequent Rio Tinto v. Vale opinion, observed that whether disclosure of a seed set is required is an “open question.”  He points out that there are alternative methods to evaluate the adequacy of productions besides disclosing seed sets.  Peck mentions three alternatives to seed sets that a requesting party might use to evaluate a production it receives: (1) identifying gaps in the production, (2) calculating statistical recall, or (3) performing a quality control of samples of documents identified as not responsive.[40]  While identifying gaps can be performed by analyzing the contents of productions a party receives, the other two options—like disclosure of seed sets—would require the opposing party to disclose irrelevant documents in its possession.[41]  Here we see one concern motivating these transparency demands: that parties using TAR might be failing—whether by neglect or by design—to disclose relevant documents.  However, as with mandatory disclosure of seed sets, a judicial order requiring parties to reveal irrelevant documents as a condition of using TAR would be an ultra vires act.

The concern that relevant documents are being withheld from discovery is nothing new, and it is not specific to TAR.  Courts have grappled with discovery disputes for the past century, extensively revising discovery rules in the process.[42]  The following process emerged: relevant, unprivileged documents[43] are to be produced upon request,[44] and the producing attorneys must certify that they have made a reasonable inquiry in response to a discovery request.[45]  To ensure cooperation, the Rules impose mandatory sanctions for improper certifications[46] and discretionary sanctions for failure to cooperate in discovery.[47]  Ethical rules supply an affirmative obligation for attorneys to maintain technological competence[48] and to deal fairly with one another.[49]

If the existing discovery rules have been sufficient for traditional review, they must also be sufficient for TAR because both methods rely on the accuracy of human judgment.  Concerns about bad faith aside, when a traditional document production withholds relevant documents, it does so as a result of the inconsistent judgment calls made by humans.  Similarly, to the extent that a TAR production omits relevant documents, it does so because human judgments trained it to do so.[50]  Document review is only as accurate as the judgments of the reviewers performing the review.  Because TAR has been demonstrated to correctly amplify attorney coding decisions more consistently than teams of human reviewers,[51] concerns about the content of a production rest on the same foundation as they ever did: the potential for human error.

Elevated judicial scrutiny of TAR productions is also unwarranted because the rules already require attorneys to certify that they have made a reasonable inquiry in response to a discovery request, regardless of review methodology. [52]  Attorneys who certify unreasonably deficient productions face mandatory sanctions,[53] and discretionary sanctions remain available for failure to cooperate.[54]  These sanctions supply a powerful deterrent against lax review methodologies, whether TAR or traditional. Because TAR enables attorneys to apply their judgment across the document universe more consistently than manual review, TAR actually reduces deficiencies.[55]

For the reasons discussed, it is unreasonable to hold TAR to a higher standard than manual review methodologies.[56]  First, TAR has been shown to be more accurate, cost-effective, and efficient than manual review.[57]  Second, courts have no authority to require parties to disclose irrelevant documents.[58] Attempting to impose ultra vires disclosure requirements on the use of TAR forces parties who refuse to sacrifice their privacy to pursue costly, time-consuming manual review.  Ironically, this process is likely to be less accurate than using TAR in the first place. Third, procedural safeguards already exist to ensure that attorneys are making reasonable inquiries in response to discovery requests.[59] If these procedural safeguards are sufficient to govern manual review despite its shortcomings, they must also be sufficient when employing a superior methodology such as TAR.

The stark reality is that the volume of discoverable data is continuing to grow.  If judges don’t stop imposing unreasonable restraints on the use of TAR, litigation will become a privilege reserved for the few parties who can afford the exploding expense of discovery.

 

[1] Da Silva Moore v. Publicis Groupe & MSL Grp., 287 F.R.D. 182, 192 (S.D.N.Y. 2012).

[2] See, e.g., Rio Tinto PLC v. Vale S.A., 306 F.R.D. 125, 128-29 (S.D.N.Y. 2015) (Peck, M.J.); Progressive Cas. Ins. Co. v. Delaney, No. 2:11-cv-00678, 2014 U.S. Dist. WL 3563467, at *10 (D. Nev. 2014); In re Biomet M2a Magnum Hip Implant Prod. Liab. Litig., No. 3:12-MD-2391, 2013 U.S. Dist. WL 6405156, at *2 (N.D. Ind. 2013); Da Silva Moore, 287 F.R.D. at 192.

[3] See, e.g., Progressive Cas. Ins. Co., 2014 U.S. Dist. WL 3563467 at *10; Biomet, 2013 U.S. Dist. WL 6405156, at *1 (“An unexplained lack of cooperation in discovery can lead a court to question why the uncooperative party is hiding something, and such questions can affect the exercise of discretion. . . . But I don’t have any discretion in this dispute. I won’t order Biomet to reveal which of the documents it has disclosed were used in the seed set, but I urge Biomet to re-think its refusal.”).

[4] See Fed. R. Civ. P. 26(b)(1).

[5] See generally Maura R. Grossman & Gordon V. Cormack, Technology-Assisted Review in E-Discovery Can Be More Effective and More Efficient Than Exhaustive Manual Review, XVII Rich. J.L. & Tech. 1 (2011).

[6] Ellen M. Voorhees, Variations in Relevance Judgments and the Measurement of Retrieval Effectiveness, 36 Info. Processing & Mgmt. 697, 701 (2000) (concluding that assessors disagree that a document is relevant at least as often as they agree); David C. Blair & M.E. Maron, An Evaluation of Retrieval Effectiveness for a Full-Text Document-Retrieval System, 28 Commc’ns Ass’n Computing Mach. 289, 295-96 (1985) (finding that paralegals who thought they had retrieved 75% of relevant documents using iterative keyword searches had only found 20%).

[7] See Maura R. Grossman & Gordon V. Cormack, The Grossman-Cormack Glossary of Technology-Assisted Review, 7 Fed. Cts. L. Rev. 1, 29 (2013).

[8] See id. at 32.

[9] See id.

[10] Id. at 34.

[11] Id. at 33-34.

[12] Id.

[13] See The Sedona Conference, The Sedona Conference Best Practices Commentary on the Use of Search and Information Retrieval Methods in E-Discovery, 8 Sedona Conf. J. 189, 199 (2007);  see also Grossman & Cormack, supra note 5, at 37; Voorhees, supra note 6; Blair & Maron, supra note 6.

[14] See The Sedona Conference, supra note 13 (“Even assuming that the profession had the time and resources to continue to conduct manual review of massive sets of electronic data sets (which it does not), the relative efficacy of that approach versus utilizing newly developed automated methods of review remains very much open to debate.”).

[15] See Blair & Maron, supra note 6, at 295-96 (1985).

[16] Fed. R. Civ. P. 26 advisory committee notes to 2015 amendment.

[17] See The Sedona Conference, supra note 13 (“[T]here appears to be a myth that manual review by humans of large amounts of information is as accurate and complete as possible– perhaps even perfect–and constitutes the gold standard by which all searches should be measured.”).

[18] See Grossman & Cormack, supra note 5, at 37 (reporting that manual reviewers identified between 25% and 80% of relevant documents, while technology-assisted review returned between 67% and 86%).  See also Herbert L. Roitblat et al., Document Categorization in Legal Electronic Discovery: Computer Classification vs. Manual Review, J. of Am. Soc’y for Info.  Sci. & Tech. 70, 79 (2010) (performing an empirical assessment to “answer the question of whether there was a benefit to engaging in a traditional human review or whether computer systems could be relied on to produce comparable results,” and concluding that “[o]n every measure, the performance of the two computer systems was at least as accurate (measured against the original review) as that of human re-review.”).

[19] Da Silva Moore, 287 F.R.D. at 192.

[20] Id.

[21] Rio Tinto PLC v. Vale S.A., 306 F.R.D. 125, 128-29 (S.D.N.Y. 2015) (Peck, M.J.).

[22] Fed. R. Civ. P. 37.

[23] Fed. R. Civ. P. 26(b)(1).

[24] Id.

[25] Id.

[26] See id.

[27] Biomet, 2013 U.S. Dist. WL 6405156, at *1.

[28] United States v. Becton, Dickinson & Co., 30 F.R.D. 132, 134 (D.N.J. 1962).

[29] Matthew Lynch, Discovery Evolutions Hold Promise for Greater Privacy Benefits for Litigants, IT-Lex Technology Law, Oct. 22, 2013, available at https://www.foley.com/discovery-evolutions-hold-promise-for-greater-privacy-benefits-for-litigants-10-22-2013/.

[30] See The Sedona Conference, The Sedona Conference Cooperation Proclamation, 10 Sedona Conf. J. 331, 331 (2009).

[31] See id.

[32] Id.

[33] Tracy Greer, Technology-Assisted Review and Other Discovery Initiatives at the Antitrust Division, Department of Justice (2014), available at https://www.justice.gov/sites/default/files/atr/legacy/2014/03/27/304722.pdf.

[34] Fed. R. Civ. P. 26(b)(1).

[35] See, e.g., Bridgestone Ams., Inc. v. Int’l Bus. Machs. Corp., No. 3:13-1196, 2014 U.S. Dist. WL 4923014 at *1 (M.D. Tenn. 2014); Progressive Cas. Ins. Co., 2014 U.S. Dist. WL 3563467, at *11; Transcript of Record at 9, 14, Fed. Hous. Fin. Agency v. JPMorgan Chase & Co., No. 1:11-cv-06188 (S.D.N.Y. July 24, 2012).

[36] See Progressive Cas. Ins. Co., 2014 U.S. Dist. WL 3563467, at *11 (declining to allow predictive coding when counsel was “unwilling to engage in the type of cooperation and transparency that . . . is needed for a predictive coding protocol to be accepted by the court . . .”). But see Biomet, 2013 U.S. Dist. WL 6405156, at *2 (holding that, while a party’s failure to disclose seed set fell below Sedona Conference Cooperation Proclamation standard, the Proclamation “can’t provide [the court] with authority to compel discovery of information not made discoverable by the Federal Rules.”).

[37] See Da Silva Moore, 287 F.R.D. at 192. (“[Defendant] confirmed that ‘[a]ll of the documents that are reviewed as a function of the seed set, whether [they] are ultimately coded relevant or irrelevant, aside from privilege, will be turned over to’ plaintiffs. . . . This Court highly recommends that counsel in future cases be willing to at least discuss, if not agree to, such transparency in the computer-assisted review process.”).  See also Rio Tinto, 306 F.R.D. at 128 (Peck, M.J.) (“One TAR issue that remains open is how transparent and cooperative the parties need to be with respect to the seed or training set(s).”).

[38] Progressive Cas. Ins. Co., 2014 U.S. Dist. WL 3563467, at *11.

[39] See, e.g., Bridgestone, 2014 U.S. Dist. WL 4923014 at *1 (“[O]penness and transparency in what Plaintiff is doing will be of critical importance. Plaintiff has advised that they will provide the seed documents they are initially using to set up predictive coding. The Magistrate Judge expects full openness in this matter.”); Transcript of Record at 9, 14, Fed. Hous. Fin. Agency (bench decision requiring transparency and cooperation, including giving the plaintiff full access to the seed set’s responsive and non-responsive documents except privileged).

[40] Rio Tinto, 306 F.R.D. at 128-29 (“Requesting parties can insure that training and review was done appropriately by other means, such as statistical estimation of recall at the conclusion of the review as well as by whether there are gaps in the production, and quality control review of samples from the documents categorized as non-responsive.”).

[41] In order to calculate recall, a party must review a mix of relevant and irrelevant documents.  The party then codes the documents for relevance, and compares its decisions about relevance against the algorithm’s predictions about relevance.  The more alignment between human reviewer and the algorithm’s predictions, the better the recall. See Grossman & Cormack, supra note 7, at 27 (defining “recall” as “[t]he fraction of Relevant Documents that are identified as Relevant by a search or review effort.”).

[42] See, e.g., Fed. R. Civ. P. 26 advisory committee notes to 1946, 1970, 1980, 1983, 1993, 2000, 2006, and 2015 amendments; Fed. R. Civ. P. 37 advisory committee notes to 1970, 1980, 1993, 2000, 2006, and 2015 amendments.

[43] Fed. R. Civ. P. 26(b)(1).

[44] Fed. R. Civ. P. 34(a).

[45] Fed. R. Civ. P. 26(g).

[46] Fed. R. Civ. P. 26(g)(3).

[47] Fed. R. Civ. P. 37(b).

[48] Model Rules of Prof’l Conduct r. 1.1 (Am Bar Ass’n 2016).

[49] Id. at r. 3.4.

[50] See Grossman & Cormack, supra note 7, at 29.

[51] See Grossman & Cormack, supra note 5, at 37.

[52] Fed. R. Civ. P. 26(g).

[53] Id.

[54] Fed. R. Civ. P. 37(b).

[55] See Grossman & Cormack, supra note 5, at 61.

[56] Rio Tinto, 306 F.R.D. at 129 (“[I]t is inappropriate to hold TAR to a higher standard than keywords or manual review. Doing so discourages parties from using TAR for fear of spending more in motion practice than the savings from using TAR for review.”).

[57] See Grossman & Cormack, supra note 5; Voorhees, supra note 6; Blair & Maron, supra note 6.

[58] Fed. R. Civ. P. 26(b)(1).

[59] Fed. R. Civ. P. 26(g)(3); Fed. R. Civ. P. 37(b).

Image Source: http://www.ihi.org/communities/blogs/lean-accounting-how-to-turn-data-overload-into-continuous-improvement.

America’s Overlooked Surrogate Mothers

By: Kate Bauer,

Heart-warming stories of successful surrogacy arrangements permeate the media.[1] Jimmy Fallon, Nicole Kidman, Elizabeth Banks, Elton John, Amy Smart, and Sarah Jessica Parker are just a few of the celebrities who owe their children’s existence to gestational surrogates.[2]  Websites soliciting surrogates extoll the noble and generous “gift” a surrogate gives.[3]  Despite the rosy picture of altruism (for a price)[4] proffered by the success stories and websites, evidence suggests that these transactions prey on lower-income women with few alternatives.

Commercial surrogacy is a business transaction in which buyers rent a woman’s womb to gestate one or more babies.  In return for the rental fee, the woman agrees to surrender the babies she births to the buyers.  There are two types of surrogacy, traditional and gestational.  In traditional surrogacy, the woman’s own egg is artificially inseminated, making her the biological mother of the child she carries.[5]  Traditional surrogacy is generally disfavored due to the legal and emotional complexities involved.[6]  In gestational surrogacy, a child is created through in vitro fertilization (IVF) using the gametes of the buyers or third parties, and then implanted into the surrogate.[7]  A gestational surrogate is not biologically related to the child she carries.[8]

Policy arguments for and against surrogacy abound, but reliable information about surrogates is scarce.  Proponents of surrogacy emphasize a woman’s freedom to contract.[9]  Opponents contend that surrogacy contracts are characterized by unequal bargaining power and inability to accurately forecast costs.[10]  Missing from this debate is reliable information about the surrogates themselves.  Poor women and women carrying multiples are at greater risk of pregnancy complications and death than average,[11] yet anecdotal evidence suggests that these characteristics are common among surrogates.[12]

While the vast majority of developed countries have either banned surrogacy or limited it to altruistic arrangements (i.e. no fee),[13] the United States has no federal legislation regulating surrogacy. [14] State law is a patchwork.[15]  As a result, no reliable statistics are maintained regarding the women who become surrogates.[16]  Analysis of commercial surrogacy therefore rests on anecdotal evidence.  The anecdotal evidence paints a troubling picture.

In the United States, surrogate mothers generally earn between $30,000 and $50,000 to carry a baby to term,[17] though fees as low as $12,000 have been reported.[18]  This amount is just a fraction of the amount buyers invest in the process, generally $116,000 or more.[19]

Surrogacy agencies have revealed that military wives are popular as surrogates.[20] Though they account for just 1% of the population, agencies indicate that between 15 and 20% of surrogates are military wives.[21]  In some geographic locations, military wives make up 50% of the area surrogates.[22] This popularity provides insight into the characteristics that buyers find appealing in a surrogate.

Military wives make good surrogates for three main reasons: (1) they have few alternative job opportunities, (2) their husbands’ incomes are comparatively low, and (3) they have medical insurance.

Regarding lack of job opportunities, Melissa Brisman, who runs a New Jersey surrogacy agency observes, “[Military wives] move around a lot, so they really can’t get their teeth into a career, and if they want to contribute to society and do something useful, [surrogacy is] a good use of their time.”[23] A 2014 study corroborates Brisman’s assessment.[24] The Military Spouse Unemployment Report found that 90% of military wives were underemployed.[25]  Further, among wives 18-24 the unemployment rate was 30%, and among wives 25-44, the unemployment rate was 15%.[26] Study participants cited “frequent moves, deployments, living in areas with poor local labor market conditions, and long hours that keep service members from assisting with parenting” as factors that negatively impacted their employment opportunities.[27]

Low income is likely another factor driving military wives to surrogacy.  New enlistees in the Army start off making as little as $19,000 a year, while more senior enlisted individuals can make up to $37,000.[28] With standard surrogacy fees matching or surpassing yearly income and few realistic job alternatives, surrogacy begins to seem like an appealing option.

Lastly, the U.S. military offers numerous benefits to military families, including free healthcare.[29]  Women with their own healthcare are attractive to buyers of surrogate services, who otherwise must shoulder the surrogate’s medical costs as part of the agreement.  One surrogacy site, for example, expressly tiers its compensation according to whether potential surrogates possess their own healthcare.[30]  Women with health insurance are paid $5,000 more than their counterparts without it.[31]

The heavy utilization of military wives reveals characteristics of desirable surrogacy candidates: women with limited job opportunities, limited income, and minimal medical expenses. Further supporting this assessment is the ongoing trend of outsourcing surrogacy to India, where all medical expenses, including the surrogate’s fee, are available for $12,000.[32] These financial disparities between buyers and surrogates can give rise to unequal bargaining power in the surrogacy context.

Surrogacy contracts are another potential hazard to surrogates.  Due to lack of regulation, buyers employ lawyers to draft custom surrogacy contracts.[33]  These contracts commonly contain provisions requiring the surrogate to carry multiple babies (increasing the risk of pregnancy complications[34]), or to agree to abort one or more babies at the buyer’s request.[35] Though a woman cannot legally be compelled to undergo an abortion against her will,[36] some scholars have posited that the surrogate could be still liable for money damages for failure to comply.[37]  Fear of financial consequences and inability to afford independent legal counsel may coerce unwilling surrogates into honoring these illegal contract provisions.[38]

In addition to the risks of unequal bargaining power, the surrogate’s inability to reliably predict and value the damage her body may incur as a result of pregnancy is a pressing public policy concern.[39]  Individuals have a psychological tendency to underestimate negative consequences (“optimist bias”),[40] which may lead surrogates to irrationally discount the possibility of physical disability or death resulting from pregnancy complications.[41]

In the United States, the interplay between the optimist bias and the physical risks of pregnancy is particularly salient.  Maternal mortality in this country is the highest of any developed country, and rising.[42] The mortality risk is particularly severe for black women, who die from pregnancy-related complications at rate 3 to 4 times that of white women.[43]  Low income women and women in rural areas are also at increased risk,[44] as are women who are pregnant with multiples.[45]  With no official statistics on surrogacy, little data exists to validate the ability of surrogates to appropriately assess their risk of complications.

The risk of surrogate exploitation stands in stark contrast to the narrative of altruistic surrogacy that the media and surrogacy agencies strive to project.[46]  Though anecdotal evidence paints a troubling picture of surrogacy in the United States, little comprehensive analysis is possible without more information.  Collecting demographic data about the women who become surrogates, their pregnancy characteristics, and their maternal outcomes is vital to forming sound public policy regarding surrogacy arrangements.  It’s time to start paying attention to America’s surrogates.

 

[1] Graham Slaughter, Photo of Toronto Dads with Newborn Son Goes Viral, Toronto Star, July 3, 2014, https://www.thestar.com/life/2014/07/03/photo_of_toronto_dads_with_newborn_son_goes_viral.html.

[2] Jen Juneau, 32 Famous Families Who’ve Welcomed Children Through Surrogacy, People (Dec. 18, 2017, 6:55 PM), http://people.com/babies/celebrities-who-have-used-surrogates/.

[3] ART Parenting, About becoming a gestational surrogate mother in Virginia, http://www.artparenting.com/surrogate-mothers-virginia.html (“Becoming a surrogate mother requires a level of commitment that only a generous, capable and nurturing woman can meet. We know that raising children is one of the ultimate joys in life. A willingness to share that joy with others is truly admirable . . .”) (last visited Dec. 21, 2017); ConceiveAbilities, Becoming a Surrogate, https://www.conceiveabilities.com/surrogates/become-a-surrogate-mother (“Your desire to help intended parents build their family through gestational surrogacy is both generous and noble.”) (last visited Dec. 21, 2017); Modern Family Surrogacy Center, Become a Surrogate, http://www.modernfamilysurrogacy.com/page/become_a_surrogate (“Surrogate mothers provide an amazing gift for couples and individuals experiencing infertility. It takes a very special woman to become a Surrogate Mother. . . . Our Surrogates are generously compensated and are truly appreciated and admired for what they are doing.”) (last visited Dec. 21, 2017).

[4] Leslie Morgan Steiner, Who Becomes a Surrogate, The Atlantic, Nov. 25, 2013, https://www.theatlantic.com/health/archive/2013/11/who-becomes-a-surrogate/281596/.

[5] Joseph F. Morrissey, Surrogacy: The Process, the Law, and the Contracts, 51 Willamette L. Rev. 459, 470-71 (2015).

[6] Id. at 471.

[7] Id.

[8] Id.

[9] Molly J. Walker Wilson, Precommitment in Free-Market Procreation: Surrogacy, Commissioned Adoption, and Limits on Human Decision Making Capacity, 31 J. Legis. 329, 330 (2005).

[10] Id. at 329-30.

[11] Centers for Disease Control and Prevention, Pregnancy-Related Deaths, https://www.cdc.gov/reproductivehealth/maternalinfanthealth/pregnancy-relatedmortality.htm (page last updated Nov. 22, 2017); Centers for Disease Control and Prevention, ART and Multiple Births, https://www.cdc.gov/art/key-findings/multiple-births.html (page last updated Apr. 13, 2016).

[12] See Centers for Disease Control and Prevention, ART and Multiple Births, https://www.cdc.gov/art/key-findings/multiple-births.html (page last updated Apr. 13, 2016); see also discussion infra.

[13] Bruce Hale and Stephen Page, Whose Rights Are They, Anyway?, ABA SciTech Law., Summer 2016, 8, 10 (“The United States is alone among Western countries in affirmatively allowing women to be paid a fee to be a gestational surrogate.”).

[14] Joseph F. Morrissey, Surrogacy: The Process, the Law, and the Contracts, 51 Willamette L. Rev. 459, 486-87 (2015).

[15] Id.

[16] Ari Shapiro, Surrogate Parenting: A Worldwide Industry, Lacking Global Rules, NPR, June 11, 2015, https://www.npr.org/sections/parallels/2015/06/11/413406325/surrogate-parenting-a-worldwide-industry-lacking-global-rules.

[17] Circle Surrogacy & Egg Donation, Compensation and Benefits, http://www.circlesurrogacy.com/surrogates/compensation-and-benefits ($30,000-$40,000 base fee) (last visited Dec. 21, 2017); ConceiveAbilities, Surrogate Mother Pay, https://www.conceiveabilities.com/surrogates/surrogate-mother-pay ($35,000-$45,000 base compensation) (last visited Dec. 21, 2017); Modern Family Surrogacy Center, Surrogate FAQs, http://www.modernfamilysurrogacy.com/page/surrogate_faqs ($30,000-$50,000 compensation) (last visited Dec. 21, 2017).

[18] Elisabeth Eaves, Want To Work For $3 An Hour?, Forbes, July 24, 2009, https://www.forbes.com/2009/07/23/surrogate-motherhood-minimum-wage-opinions-columnists-elisabeth-eaves.html#3225102875ae.

[19] Morrissey, 51 Willamette L. Rev. at 483.

[20] Astrid Rodrigues and John Meyersohn, Military Wives Turn to Surrogacy: Labor of Love or Financial Boost?, ABC News, Oct. 15, 2010, http://abcnews.go.com/GMA/Parenting/military-wives-surrogates-carrying-babies-love-money/story?id=11882687.

[21] Id.

[22] Lorraine Ali, The Curious Lives of Surrogates, Newsweek, Mar. 29, 2008, http://www.newsweek.com/curious-lives-surrogates-84469.

[23] Astrid Rodrigues and John Meyersohn, Military Wives Turn to Surrogacy: Labor of Love or Financial Boost?, ABC News, Oct. 15, 2010, http://abcnews.go.com/GMA/Parenting/military-wives-surrogates-carrying-babies-love-money/story?id=11882687.

[24] Institute for Veterans and Military Families, Military Spouse Unemployment Report, Feb. 12, 2014 at 6, https://ivmf.syracuse.edu/wp-content/uploads/2016/06/MilitarySpouseEmploymentReport_2013.pdf.

[25] Id. at 6.

[26] Id.

[27] Id. at 4.

[28] U.S. Army, Army Pay Chart and Basic Pay: Active Duty Soldiers, https://www.goarmy.com/benefits/money/basic-pay-active-duty-soldiers.html (last visited Dec. 21, 2017).

[29] See, e.g., U.S. Army, Military Compensation: Army Benefits, https://www.goarmy.com/benefits/total-compensation.html (last visited Dec. 21, 2017), U.S. Navy, Military Pay, https://www.navy.com/joining/benefits/pay.html (last visited Dec. 21, 2017).

[30] Circle Surrogacy & Egg Donation, Compensation and Benefits, http://www.circlesurrogacy.com/surrogates/compensation-and-benefits ($30,000-$40,000 base fee) (last visited Dec. 21, 2017).

[31] Id.

[32] Abigail Haworth, Surrogate Mothers: Womb for Rent, Marie Claire, July 29, 2007, http://www.marieclaire.com/politics/news/a638/surrogate-mothers-india/.

[33] Joseph F. Morrissey, Surrogacy: The Process, the Law, and the Contracts, 51 Willamette L. Rev. 459, 516 (2015).

[34] Centers for Disease Control and Prevention, ART and Multiple Births, https://www.cdc.gov/art/key-findings/multiple-births.html (page last updated Apr. 13, 2016).

[35] Morrissey, 51 Willamette L. Rev. at 533; Jane Ridley, Confessions of a surrogate mother, New York Post, June 16, 2014, https://nypost.com/2014/06/16/as-the-demand-for-children-skyrockets-surrogates-speak-out/.

[36] See, e.g., Fla. Stat. Ann. § 63.213(3)(b); Tex. Fam. Code Ann. § 160.754(g).

[37] John A. Robertson, Precommitment Issues in Bioethics, 81 Tex. L. Rev. 1849, 1869 (2003).

[38] Brandy Zadrozny, Her Body, Their Choice: When a Surrogate Refuses to Abort, The Daily Beast (Dec. 19, 2015, 12:13 PM), https://www.thedailybeast.com/her-body-their-choice-when-a-surrogate-refuses-to-abort; Elizabeth Cohen, Surrogate offered $10,000 to abort baby, CNN, Mar. 6, 2013, http://www.cnn.com/2013/03/04/health/surrogacy-kelley-legal-battle/index.html.

[39] Molly J. Walker Wilson, Precommitment in Free-Market Procreation: Surrogacy, Commissioned Adoption, and the Limits on Human Decision Making Capacity, 31 J. Legis. 329, 329-30 (2005).

[40] Id. at 330-31 (“The optimistic bias relates to individuals’ tendency to underestimate risks or negative consequences down the road. In economic terms, the endowment effect captures the idea that people place particular value on goods that they already hold, and value them above other goods with equivalent market values.”).

[41] Morning Edition, Focus On Infants During Childbirth Leaves U.S. Moms In Danger, NPR, May 12, 2017, https://www.npr.org/2017/05/12/527806002/focus-on-infants-during-childbirth-leaves-u-s-moms-in-danger.

 [42] Id.

 [43] Centers for Disease Control and Prevention, Pregnancy-Related Deaths, https://www.cdc.gov/reproductivehealth/maternalinfanthealth/pregnancy-relatedmortality.htm (page last updated Nov. 22, 2017).

 [44] Morning Edition, Focus On Infants During Childbirth Leaves U.S. Moms In Danger, NPR, May 12, 2017, https://www.npr.org/2017/05/12/527806002/focus-on-infants-during-childbirth-leaves-u-s-moms-in-danger.

 [45] Centers for Disease Control and Prevention, ART and Multiple Births, https://www.cdc.gov/art/key-findings/multiple-births.html (page last updated Apr. 13, 2016).

 [46] See Juneau, supra note 2.

Image Source:  https://www.thestar.com/life/2014/07/03/photo_of_toronto_dads_with_newborn_son_goes_viral.html.

The Impact of Technological Illiteracy

By: Niesha Gibbs,

In today’s society, it is virtually impossible for anyone to excel with the absence of two things; education and computer literacy. Education is considered the great equalizer. Stated differently, it’s the universal key that opens the proverbial door of opportunity. But what happens when you don’t have the key?

At the Bronzeville Scholastic Institute, freshman Jerod Franklin and his peers work on writing assignments in their homework lab.[1] What appears as a common day for any high school, is anything but that. Nearly one thousand individuals, a vast majority of which do not have access to personal computers on a regular basis, share this moderately sized lab of twenty-four systems.[2] Not having access to such technology is a breeding ground for technological illiteracy.

While over 75% of American adults and over 80% of teens use the internet, “some poorer areas in the United States still see comparatively low rates of home computer use.”[3] This occurrence, most notably known as the “digital divide” fosters disparities in basic computer literacy, which translates into far greater socio-economic implications.[4] With the strong presence of cellphones and other smart devices, its counter-intuitive to think that some youth lack even the most minimal computer skills. However, access to the web does not render a person, in this case a school aged students, as having computer literacy.[5]

The blatant fact of the matter with this trend is that it affects the same demographic, which in this case is underprivileged inner city minorities. The lack of digital literacy may include the inability to perform simple functions such as, compose emails, log into online platforms, and even saving work to a thumb or disk drive.[6] Without these basic skills, one becomes unmarketable to potential universities and job opportunities. In attempt to sharpen these skills, 70% of teachers assign homework that requires Internet access.[7] However, the system that may appear to help these youngsters is only hurting them. How can one sharpen a tool without the proper materials? In an attempt to improve digital literacy, imagine the falling grades hundreds of children may receive because all of the aforementioned twenty-four computers in the school’s lab were all being used. Computer literacy programs that are implemented in the inner cities should take a more holistic approach.[8] While more devices are necessary, basic introductory courses should accompany them. Courses that will “enhance participants’ skill sets and ensure they become self-sufficient.” But, how? The answer appears to be funding.

A principal of a predominantly minority based elementary school, Pleasant View, has decided to pursue the answer on behalf of her students.[9] Over the course of one-year Principal Gara Field, applied for and received a grant totaling over $400,000 with some support from her district.[10] This, no doubt, will allow these impressionable students to have the access, capability and understanding of many digital resources. Principal Gara understands an important notion that many others may not. Seeking the answer, before the problems arises makes for the best solution.

 

[1] See Nick Pandolfo, As Some Schools Plunge into Technology, Poor Schools Are Left Behind, Hechinger Report (2012), http://hechingerreport.org/as-some-schools-plunge-into-technology-poor-schools-are-left-behind/.

[2] Id.

[3] See John Wihbey, Computer Usage and Access in Low-income Urban Communities, Journalist’s Resource (2013), https://journalistsresource.org/studies/society/internet/computer-usage-access-low-income-urban-communities.

[4] Id.

[5] Id.

[6] Id.

[7] See Gage William Salicki, Urban School Districts Still Don’t Have Equal Access to Digital Tools and Education, ctViewpoints (2017), https://ctviewpoints.org/2017/11/01/urban-school-districts-still-dont-have-equal-access-to-digital-tools-and-education/.

[8] Id.

[9] See Jennifer D. Jordan, How an Unconventional Principal Turned Around a Struggling urban School, pbs (2015), https://www.pbs.org/newshour/education/unconventional-principal-uses-blended-learning-help-turn-around-struggling-urban-school.

[10] Id.

Image Source: https://tribune.com.pk/story/936341/in-the-cyberspace-technology-illiteracy-leads-to-online-harassment/.

Could Social Media Be Used to Help Prevent Suicides Rather than a Source to Trigger Them?

By: Nicole Gram,

According to the Centers for Disease Control and Prevention (CDC), suicide was the tenth leading cause of death overall in the United States and the second leading cause among individuals between the ages of 15 and 34 in 2015.[1] To provide further perspective on the statistics, there were more than twice as many suicides in the United States as there were homicides.[2] While it is complex and difficult to predict, there are very often signs that an individual is struggling with suicidal thoughts and behaviors.[3] Social media applications provide a forum in which some individuals share emotions and issues they are experiencing. Facebook even experienced a number of live streamed suicides this past year.[4] As a result, as part of a call to action to proactively identify at risk individuals and prevent them from harming themselves, Facebook is using Artificial Intelligence (AI) technology to scan content with pattern recognition for specific phrases that indicate someone may need help.[5] An AI algorithm identifies and prioritizes the posts for action by the thousands of employee content reviewers.[6] The application then prompts the at-risk individual with options for a helpline, tips to address their issues and feelings, an option to contact another friend or will even notify First Responders in critical situations.[7] Users cannot opt out of this technology that is being tested in the US with plans to rollout to most countries, excluding the European Union due to their regulatory restrictions.[8]

Mental health professionals also recognize the advantage of leveraging technology beyond hospitals, emergency rooms, and ICU for psychiatrists’ offices.[9] The focus of their mission is “alleviating suffering with technology”.[10] The large amounts of data on smartphones and in social media applications are a valuable resource to supplement the patient interviews that mental health professionals are dependent on.[11] They too have an application, named Spreading Activation Mobile (SAM), that uses predictive machine learning to analyze speech and determine whether someone is likely to take their own life.[12] SAM is being tested in Cincinnati schools and looks for increases in negative words and/or decreases in positive words based on language, emotional state and social media footprint.[13]

Time is a key factor in the prevention of suicide and advancements in AI are a continuing trend toward performing more and more tasks that could only be performed by humans previously.[14] In the mental health arena, the availability and evolving quality of fresh data is creating improved and more effective algorithms that can drive earlier identification and action.[15] However, there are several legal implications and challenges with using AI as a tool to prevent suicide. Whenever personal data is involved, concerns about privacy and misuse top the list.  Given the mental health content, there is increased sensitivity about who has access and the potential impact on items such as insurance premiums and coverage.[16] With AI algorithms making decisions and driving actions, an equally important consideration is around who holds the moral and legal responsibility to be accountable when harm is caused.[17] This becomes even more complicated by the autonomous nature of AI technology. As the tool learns from experience and more data, it is possible that AI systems will grow to perform actions not anticipated by their creators.[18] Some experts have proposed a legal framework with a governing authority that certifies AI systems so that operators of certified AI systems have limited tort liability while operators of uncertified systems face strict liability.[19] This appears to provide an appropriate balance, at this point in time, with obtaining the advantage of AI tools and algorithms in preventing suicide while ensuring controls exist to mitigate the risks.[20]

 

[1] See Peter Holley, Teenage Suicide Is Extremely difficult to Predict. That’s Why Some Experts Are Turning to Machines for Help., Wash. Post (Sept. 26, 2017), https://www.washingtonpost.com/news/innovations/wp/2017/09/25/teenage-suicide-is-extremely-difficult-to-predict-thats-why-some-experts-are-turning-to-machines-for-help/?tid=a_inl&utm_term=.4ce68a113fd1.

[2] See Suicide, Nat’l Inst. of Mental Health (2015), https://www.nimh.nih.gov/health/statistics/suicide/index.shtml.

[3] See Hayley Tsukayama, Facebook Is Using AI to Try to Prevent Suicide, Wash. Post (Nov. 27, 2017), https://www.washingtonpost.com/news/the-switch/wp/2017/11/27/facebook-is-using-ai-to-try-to-prevent-suicide/?utm_term=.75045cbd8923.

[4] See id.

[5] See id.

[6] See id.

[7] See id.

[8] See Tsukayama, supra note 3.

[9] See Holley, supra note 1.

[10] See id.

[11] See id.

[12] See id.

[13] See id.

[14] See Matthew U. Scherer, Regulating Artificial Intelligence Systems: Risks, Challenges, Competencies, and Strategies, 29 Harv. J. Law & Tec 353 (2016).

[15] See id.

[16] See id.

[17] See id.

[18] See id.

[19] See Scherer, supra note 14.

[20] See id.

Image Source: http://www.valleynewslive.com/content/news/New-app-working-to-predict-suicidal-behaviors-among-teens–448339133.html.

Net Neutrality

By: David Hart,

Net Neutrality is the idea that your internet service provider must treat all lawful websites equally. They must not block lawful websites, throttle speeds of certain websites, or accept payment to prioritize the speed of the payer’s website. There is currently a proposal by the FCC that would effectively end Net Neutrality.[1] The heart of the issue is whether broadband internet should be classified as a common carrier or as an information service.

Since 2015, the internet has been effectively regulated under a common carrier classification, as opposed to an information service classification.[2] Before the change in 2015, Internet Service Providers were classified as an information service.[3] This changed after the Title II Order, in which the FCC classified providers as a common carrier, which brings with it much more stringent regulations.

An information service is defined as the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing, or making available information via telecommunications.[4] Contrastingly, telecommunication (which is classified as a common carrier) is defined as the transmission, between or among points specified by the user, of information of the user’s choosing, without change in the form or content of the information as sent and received.[5] The common carrier classification applies to services such as railroads, trucking companies, and telecommunication services.[6]  A common carrier provides a service to the general public and cannot discriminate among its users. They are statutorily prevented from discrimination in charges, practices, classifications, regulations, facilities, or services.[7] What this means to your Internet Service Provider is that they cannot increase speeds for websites that they own, or websites that pay them. If Netflix were to offer them money in order to prioritize the access to Netflix, relative to other sites, they are unable to accept. For another example, take Verizon. Verizon owns the Huffington Post. It makes sense that Verizon would want more people to access the Huffington Post. In theory, Verizon could increase their customers’ internet speed for accessing the Huffington Post while decreasing the speed of accessing other news sites, like CNN’s. Currently, they are unable to do so under the common carrier classification.[8] This would not be the case if Internet Service Providers’ classification is changed to that of an “information service.” Relative to a common carrier classification, the information service class is much less regulated. If Internet Service Providers become classified as an information service, instead of a common carrier, they would no longer be prevented from throttling or increasing speeds based on website and would be able to prioritize some sites over others.[9] However, the FCC proposal would require providers to let their customers (and potential customers) know if they blocked, slowed, or prioritized websites.[10]

The FCC will vote on the proposal December 14, 2017.[11] The FCC proposal argues that the regulatory environment of the common carrier classification has delayed new services and stifled innovation.[12] The proposal aims to end FCC micromanagement of innovative business models and restore the Federal Trade Commission’s power to protect consumers from unfair practices without burdensome regulation.[13] Opponents of the proposal argue that a change in classification would effectively allow providers to determine what websites consumers would be able to see and use.[14] This could be even more problematic as many areas of the country are dominated by a limited number of large internet providers, so even if a customer were to be dissatisfied with their provider’s decisions, they’d have few to no other options.[15]

 

[1] Restoring Internet Freedom, 82 Fed. Reg. 25,568 (Jun. 2, 2017).

[2] Protecting and Promoting the Open Internet, 47 C.F.R. § 8.5, §8.7, §8.9 (2015).

[3] Verizon Communications Inc. v. FCC, 740 F.3d 623 (2014).

[4] 47 U.S.C. § 153 (24) (2017).

[5] 47 U.S.C. § 153 (50) (2017).

[6] 47 U.S.C. § 153 (51) (2017).

[7] 47 U.S.C. § 202 (2017).

[8] Protecting and Promoting the Open Internet, 47 C.F.R. § 8.5, §8.7, §8.9 (2015).

[9] 47 U.S.C. § 202 (2017).

[10] Restoring Internet Freedom Fact Sheet ¶ 216, http://transition.fcc.gov/Daily_Releases/Daily_Business/2017/db1122/DOC-347927A1.pdf.

[11] Cecilia Kang, F.C.C. Plans Net Neutrality Repeal in a Victory for Telecoms (Nov. 21, 2017), https://www.nytimes.com/2017/11/21/technology/fcc-net-neutrality.html.

[12] Restoring Internet Freedom Fact Sheet, http://transition.fcc.gov/Daily_Releases/Daily_Business/2017/db1122/DOC-347927A1.pdf.

[13] Id.

[14] ACLU: What Is Net Neutrality (Jun. 2017), https://www.aclu.org/issues/free-speech/internet-speech/what-net-neutrality.

[15] Jeff Dunn, America Has An Internet Problem — but a Radical Change Could Solve It, Business Insider (Apr. 23, 2017), http://www.businessinsider.com/internet-isps-competition-net-neutrality-ajit-pai-fcc-2017-4/#-3.

Image Source: https://www.aclu.org/sites/default/files/styles/scale_1200w/public/wysiwyg/web15-siteimages-act-netneutrality-2400x960_0.jpg?itok=SWcUu9tK.

Page 19 of 50

Powered by WordPress & Theme by Anders Norén