Richmond Journal of Law and Technology

The first exclusively online law review.

Blog: How many Virginians Does it Take to Screw-up a Light Bulb Phase-Out?

by: Kit Mathers,  Associate Copy Editor

 

In January, Congress, through overwhelming bipartisan cooperation, approved, and President Obama signed into law, a $1.1 trillion omnibus spending bill; a provision of which precludes the U.S. Department of Energy (“DOE”) from spending allocated funds to enforce twilight measures of a “light bulb phase-out” mandated by the 2007 Energy Independence and Security Act (“EISA”).[1]  The phase-out, which effectively began in January 2012, requires that light bulbs produce a certain level of brightness at specified energy levels.[2]  Of particular significance to the average consumer, traditional incandescent light bulbs are incapable of fulfilling the new energy efficiency standards and as of January 1, 2014 60- and 40-watt incandescent light bulbs (which represent half of the consumer light bulb market) are no longer allowed to be manufactured or imported into the U.S.[3]  Overall, the standards set forth by the EISA are predicted to result in annual electric bill savings of nearly $13-billion, power savings equivalent to the output of 30 large power plants,  and will reduce carbon dioxide emissions by about 100 million tons per year.[4]

The spending bill’s ban is not particularly formidable from the perspective of many environmentalists and “pro phase-out” light bulb manufacturers who have characterized it as a nuisance that can’t possibly derail the “market shift” toward more energy-efficient light bulbs.[5]   But should we be more supportive of the spending bill’s ban despite the EISA’s potential environmental benefits?  In support of the ban, House Republicans have stated that EISA phase-out requirements are characteristic of government overreach, and enforcement measures should not be tolerated.[6]   Is there any merit to the House Republicans’ argument?  Is federal product regulation really the proper avenue for catalyzing change in consumer power consumption?  The tension at the heart of the light bulb phase-out is representative of a fundamental issue that must be addressed in any discussion of “where” energy regulations should be focused.  I tend to agree with House Republicans who are wary of the government’s reach into consumer purchasing power, but perhaps end-user regulation (“downstream”) is the most parsimonious way of realizing change in energy use and accompanying (upstream) emissions.  Upstream regulation is inescapably difficult.  State and federal regulation of power plants and their emissions is tedious work, often drawn out interminably by litigation.  But then again, why not increasingly regulate power plants themselves if we are operating under the guise that the end goal is to limit carbon emissions and power plant out-put?  It’s not as though the light bulbs are the source of poor energy management decisions or egregious carbon emissions.   Understanding why the EISA, in large part, came to be makes the decision to regulate downstream consumer choice even less palatable.

While the EISA does not outrightly proscribe the manufacture or importation of all incandescent light bulbs, it has the net effect of increasing market  prevalence  and selection of more expensive, compact fluorescent light bulbs  (“CFLs”) and light emitting diodes (“LEDs”) which is extremely beneficial to major light bulb manufacturers.  As Timothy Carey of the Washington Examiner details, the 2007 Energy Independence and Security Act “wasn’t a case of an industry getting on board with an inevitable regulation in order to tweak it.  The lighting industry was the main reason the legislation was moving.”[7]  The light bulb industry is, by its nature, a competitive market with no significant impediments to entry.  Characteristic of such competitive markets, under the neoclassical economic model, is product pricing at marginal cost – the cost of producing one additional unit of output- which results in low profit margins.[8]  GE, Phillips and Sylvania, which dominate the U.S. incandescent light bulb market, want to “convert their dominance into price hikes,” but because market entry is not significantly encumbered by manufacturing or regulatory costs, consumers will gladly purchase new alternative brands that offer bulbs at, or close to, marginal cost.[9]   Market giants, with significant capital available for research and development programs, sought to extinguish the threat of competition (which keeps profit margins low) by expending significant money to improve the incandescent light bulb, primarily through advancing halogen, LED and fluorescent technologies.[10]  These “energy efficient bulbs” sell at a much higher price point compared to incandescent light bulbs, and because of this, consumer choice has remained somewhat stagnant and heavily biased toward incandescents.  Light bulb manufacturers, aware that consumers won’t willingly skirt cost benefit considerations in light bulb selection, have thus collaborated with groups like the NRDC in lobbying for the phase out of incandescents; their agenda being the “push” of profitable products rather than environmental conservancy.[11]  Undoubtedly, there are great advantages to newer bulb technologies, as well as associated costs.[12]  However, it’s extremely hard to justify the handcuffing of consumer freedom of choice when it is being instituted by government elites and unelected bureaucrats.[13]

 All in all, it is extremely important to ask, where (or at what phase) should regulatory efforts be focused (and why)?  The upstream power plants, downstream consumers, or both?  Perhaps the fact that light bulb manufacturers are sustaining windfall profits from federal regulation is an inevitable consequence; in any regulatory effort there will always be a party that benefits, perhaps grossly, from regulation.  It will be interesting to see what happens to the spending bill’s ban in the coming months, and whether or not downstream regulation will accomplish its goals.


[1] Bill Chappell, Obama Signs Trillion-Dollar Spending Bill, NPR, (January 17, 2014), http://www.npr.org/blogs/thetwo-way/2014/01/17/263511534/obama-signs-trillion-dollar-federal-spending-bill.

[2] Jeremy Kaplan, Last light: Final Phaseout of Incandescent Bulbs Coming Jan. 1, FOX NEWS, (December 13, 2013), http://www.foxnews.com/tech/2013/12/13/final-phase-out-incandescent-light-bulbs-jan-1/.

[3] Patrick J. Kiger, U.S. Phase-out of Incandescent Light Bulbs Continues in 2014 with 40-, 60-Watt Varieties, NATIONAL GEOGRAPHIC, (December 31, 2013), http://energyblog.nationalgeographic.com/2013/12/31/u-s-phase-out-of-incandescent-light-bulbs-continues-in-2014-with-40-60-watt-varieties/.

[4] NRDC Fact Sheet, Shedding New Light on the U.S. Energy Efficiency Standards for Everyday Light Bulbs, NRDC, (January 2013), http://www.nrdc.org/energy/energyefficientlightbulbs/files/shedding-new-light-FS.pdf.

[5] Wendy Koch, Congress to Bar Enforcement of Light-bulb Phaseout, USA TODAY, (January 14, 2014), http://www.usatoday.com/story/news/nation/2014/01/14/coal-projects-light-bulb-rules/4476103/.

[6] Timothy P. Carney, Industry, not Environmentalists, Killed Traditional Light Bulbs, WASHINGTON EXAMI
NER, (January 1, 2014), http://washingtonexaminer.com/article/2541430.

[7] Id.

[8] See id.

[9] See id.

[10] See id.

[11] For a comical portrayal of the “story behind the ban” (in both the U.S. and Canada) see this crude cartoon: http://www.youtube.com/watch?v=ta2ozf_uJJ8 (a feature from infra note 15).

[12] It’s contended that new light bulb technologies are not all that “efficient” when used by the average consumer. I recommend looking at Paul Wheaton’s website for a critique of the science behind the phase-out:  http://www.richsoil.com/CFL-fluorescent-light-bulbs.jsp.

[13] See id. 

Blog: Echo Design Group Files Lawsuits Against Major Fashion Designers Alleging Infringement of Glove Touchscreen Technology

by Brittani Lemonds, Associate Manuscripts Editor

 

Society’s dependency on smartphone technology has undoubtedly benefitted the fashion industry worldwide.  Gone are the days where cell phone users were limited to the cases and tech accessories available at the storefront of their service provider or local office supply store.  The iPhone opened the door for upscale accessories including designer phone cases, handbags created to fashionably (and conveniently) hold the iPhone’s slender structure, and even winter accessories that allow users to engage with touchscreen technology without removing their gloves.

Enter Echo Design Group – a prominent fashion designer and retailer specializing in home décor, stationary, women’s handbags, scarves, and other cold weather accessories including the aforementioned touchscreen compatible gloves.

Since November 2013, Echo Design Group has been aggressively filing lawsuits against major fashion brands, designers and high-end retailers alike for alleged infringement of its U.S. Patent 8528117 titled “Gloves for Touchscreen Use.”[1]  The most recent fashion heavyweight involved in this patent controversy is American fashion designer and former Project Runway judge, Michael Kors.[2]  On February 24, 2014 Echo Design Group filed a complaint against Michael Kors (USA), Inc. and Michael Kors Stores LLC., in the United States District Court, Southern District of New York for patent infringement of Kors’ Touch Screen Zip Glove.[3]

Just weeks earlier, in January 2014 Echo Design Group filed a similar complaint against Henri Bendel in the United States District Court, Southern District of New York for patent infringement of Bendel’s NB Polka Dot Glove.[4] 

But Michael Kors and Henri Bendel are not the only designers facing legal threats for their touchscreen compatible gloves.  Echo has targeted other fashion designers for alleged infringement of the same patent, filing at least four other lawsuits in November 2013 against the likes of Fownes Brothers & Co., Inc. for the Touchscreen Compatible Gloves sold under UGG, G-III Apparel Group, Ltd., for the Calvin Klein Text Enabled Gloves, Kate Spade for the iPhone Gloves sold under the Jack Spade brand, and Marc Jacobs International, LLC. for the various touchscreen gloves retailed under the brand.[5]

All of the filed complaints state that Echo invested significant time and resources into developing the touchscreen glove concept and that Echo secured intellectual property rights to the “Gloves for Touchscreen Use” on September 10, 2013 when USPTO (the Patent 117) issued U.S. Patent No. 8528117 to Echo.[6]

The complaints allege that all of the defendants “without permission or license from Echo, has made, is making, is having made, has sold, is selling, is causing to be sold, has offered for sale, is offering to sell, is causing to be offered for sale, and/or has imported, is importing, and/or is causing to be imported into the United States, within this State and elsewhere, of the products.  The products directly infringe, contributorily infringe, and/or induce others to infringe, at least one claim of the ‘117 Patent, including but not limited to claim 1, in violation of 35 U.S.C. § 271.”[7]  Echo is seeking damages, preliminary and permanent injunction and fees.[8]  It will be interesting to see whether Echo succeeds in its myriad of lawsuits against the fashion industry.


[1] Kimareanna Ross, Daughter Protecting Parents Brand: Michael Kors, Henri Bendel, Calvin Klein, Kate Spade, UGG Sued, Accused Of Infringing Touchscreen Glove Concept, Fashion L. Blog (Feb. 27, 2014), http://thestyleofthecase.com/2014/02/27/daughter-protecting-parents-brand-michael-kors-henri-bendel-calvin-klein-kate-spade-ugg-sued-accused-of-copying-touchscreen-glove-concept/.

[2] Id.

[3] Amber Ryland, Project Runway Star & Designer Michael Kors Sued, Accused Of Stealing Touchscreen Glove Concept, Radar Online (Feb. 26, 2014, 4:03 AM), http://radaronline.com/exclusives/2014/02/michael-kors-designer-sued/.

[4] Ross, supra note 1.

[5] Kimareanna Ross, Echo Design Sues Marc Jacobs For Infringement, Fashion L. Blog (Dec. 18, 2013), http://thestyleofthecase.com/2013/12/18/echo-design-sues-marc-jacobs-for-infringement/.

[6] Id.

[7] Ross, supra note 1.

[8] Ross, supra note 5. 

Blog: Facebook Post Results in Loss of $80k Settlement

by Fiona Clancy, Associate Notes and Comments Editor

 

A Florida dad learned a costly lesson about sharing confidential information with his daughter and the ramifications of a subsequent social media post in a case that has gotten a lot of media attention lately. 

Patrick Snay sued his employer, Gulliver Prep School, when his 2010-2011 contract as the school’s headmaster was not renewed.[1]  Mr. Snay filed a two count complaint under the Florida Civil Rights Act alleging age discrimination and retaliation.[2]  On November 3, 2011, the parties executed a settlement agreement with various payments to be made by Gulliver Prep including $10,000 in back pay to Mr. Snay, (known as “Check #1), $80,000 to Mr. Snay as a “1099” (known as “Check #2), and $60,000 to Mr. Snay’s attorneys (known as “Check #3).[3]  Central to the agreement was a confidentiality clause that read in part:

 “13. Confidentiality…The plaintiff shall not either directly or indirectly, disclose, discuss or communicate to any entity or person, except his attorneys or other professional advisors or spouse any information whatsoever regarding the existence or terms of this Agreement…A breach…will result in disgorgement of the Plaintiffs portion of the settlement payments.”[4] 

On November 7, 2011, only four days after the agreement was signed, Gulliver Prep notified Mr. Snay that he had breached the Agreement based on his daughter Dana Snay’s Facebook post which stated[5]:

 “Mama and Papa Snay won the case against Gulliver.  Gulliver is now officially paying for my vacation to Europe this summer.  SUCK IT.”[6]

The Facebook post went out to approximately 1,200 of Dana Snay’s Facebook friends, which included many current or past Gulliver Prep students.[7]

Gulliver Prep also informed Mr. Snay that it would not be tendering Check #2, the $80,000 payment.[8]  Mr. Snay moved to enforce the settlement agreement and receive payment, and the trial court held that the Facebook posting did not constitute a breach of the agreement.[9]  However, Florida’s Third District Court of Appeals reversed the trial court’s ruling on February 26, 2014, stating that Mr. Snay’s $80,000 settlement with Gulliver Prep was null and void because his daughter breached the terms of the non-disclosure clause when she posted about it on Facebook.[10]  The Court of Appeals ruled in favor of Gulliver Prep in finding that Snay violated the agreement when he told his daughter about the settlement and acknowledged that Dana Snay did precisely what the confidentiality agreement was designed to prevent– advertising to the Gulliver Prep community that Snay had been successful in his age discrimination and retaliation case against the school.[11] 

The internet has been buzzing with legal commentary regarding this case with many lawyers weighing in and discussing the lessons learned.

A Chicago based, self-described “social media” attorney feels “this case illustrates why (1) it is important for parties to abide by the confidentiality provisions of settlement agreements and (2) people who learn confidential information should keep their social media mouths shut.”[12] 

One employment attorney commented that in most cases, the discussion revolves around the liability that social media can cause employers, while this case represents a turn of events with Facebook working in the employer’s favor.[13]  That attorney believes this case serves as a reminder that social media can open “Pandora’s box” with respect to liability for employers, but it can also provide a wealth of information during litigation for both sides.[14] 

Another employment attorney believes this case illustrates the need for well drafted confidentiality clauses.[15]  After all, employers include confidentiality clauses in their agreements precisely because they do not want a former employee openly disclosing the amount or existence of a settlement payment as that can encourage additional legal challenges and/or cause discord among current employees.[16]  While Gulliver did not end up paying Mr. Snay the $80,000, the information it wanted to protect is nevertheless now public.  The valuable lesson for employers, the attorney opines, is that a well written confidentiality clause is essential if an employer wants to prevent disclosure of the existence or amount of a settlement payment.[17]  The attorney suggests drafting the clauses to permit disclosure to immediate family members (which the agreement in the Snay case did not) because it is unlikely that families will not share the information with people who have been aware of and involved in the litigation process.  The key is to permit disclosure to those immediate family members but subject those family members to the same confidentiality requirements as the employee, preventing disclosure outside the immediate family.[18]  During the appeals process, Mr. Snay testified that he “knew the litigation was important to his daughter and that he and his wife would have to tell her something.”[19]  The appellate judge stated in her opinion that “[t]he fact that Snay testified that he knew he needed to tell his daughter something did not excuse this breach” and that there was “no evidence that [Snay] made this need known to the school or to his or its attorneys so that the parties might hammer out a mutually acceptable course of action in the agreement.”[20]  The court was not swayed by Mr. Snay’s testimony that he had not told his daughter he had “won” the case, and that she did not go to Europe, nor had she planned such a trip.[21]

A Michigan based employment attorney summed it up by stating “Facebook and confidentiality agreements do not mix.”[22]  The attorney also posits that it is “unrealistic to think that a family cannot be told since the fact of litigation is undoubtedly known” and suggests language in the agreement that allows for the disclosure of the settlement to immediate family members which specifically defines what family members may be told, while also specifically prohibiting any disclosures.[23]  Such a provision would not have authorized Dana Snay’s Facebook post, and would have better protected Gulliver Prep’s interests.[24]

While acknowledging that people may feel sympathy for the Snay family, the Michigan employment attorney feels this case provides important comfort to employers who settle cases with the express intention that the settlement remains confidential, and properly emphasizes to plaintiffs that nondisclosure means nondisclosure—even when third parties or family members are involved.[25]  Furthermore, this case serves as an important reminder that social media is now an established part of everyday life, that prohibitions against disclosure should specifically mention social media, and that our lawyering and agreements should adapt to the ever present technologies and platforms that permeate our lives.[26]  Appropriately planning for these situations is something both clients and attorneys can “Like.”


[1] Gulliver S
ch., Inc. v. Snay
, 3D13-1952, 2014 WL 769030 (Fla. Dist. Ct. App. Feb. 26, 2014).

[2] Id.

[3] Id.

[4] Id.

[5] Dana Snay was a recent Gulliver Prep graduate at the time of her Facebook post regarding her father’s settlement.

[6] Id.

[7] Id.

[8] Matthew Stucker, Girl Costs Father $80,000 with “SUCK IT” Facebook Post, CNN (March 4, 2014, 9:58 AM), http://www.cnn.com/2014/03/02/us/facebook-post-costs-father/index.html.

[9] Id.

[10] Jennifer Reass, Did You Know…An $80,000 Facebook Post Costs $80,000, Employment Law E-Buzz (March 7, 2014), http://www.jdsupra.com/legalnews/did-you-knowan-80000-facebook-post-10667/.

[11] Gulliver Sch., Inc. v. Snay, 3D13-1952, 2014 WL 769030 (Fla. Dist. Ct. App. Feb. 26, 2014).

[12] Evan Brown, Daughter’s Facebook Post Costs Dad $80,000, internetcases (March 1, 2014), http://blog.internetcases.com/2014/03/01/social-media-confidentiality-facebook/.

[13] Tawny Alvarez, Daughter’s Facebook Post Sink’s Father’s Settlement, Taking Care of HR Business (March 5, 2014, 3:08 PM), http://www.hrlawupdate.com/home/2014/3/5/daughters-facebook-post-sinks-fathers-settlement.html.

[14] Id.

[15] Jamie LaPlante, Daughter’s Facebook Brag Underscores the Enforceability of Confidentiality Clauses in Settlement and Severance Agreements, Employer Law Report (March 6, 2014), http://www.employerlawreport.com/2014/03/articles/eeo/daughters-facebook-brag-underscores-the-enforceability-of-confidentiality-clauses-in-settlement-and-severance-agreements/.

[16] Id.

[17] Id.

[18] Id.

[19] Facebook “SUCK IT” Costs Dad $80,000, Lowering the Bar (March 4, 2014), http://www.loweringthebar.net/2014/03/facebook-suck-it-costs-dad-80000.html.

[20] Gulliver Sch., Inc. v. Snay, 3D13-1952, 2014 WL 769030 (Fla. Dist. Ct. App. Feb. 26, 2014).

[21] Id.

[22] John Holmquist, Facebook and Confidentiality Agreements Do Not Mix, Michigan Employment Law Connection (March 5, 2014, 2:11 PM), http://www.michiganemploymentlawconnection.com/2014/03/facebook-and-confidentiality-agreements.html.

[23] Id.

[24] Id.

[25] Id.

[26] Id. 

 

JOLT Articles Set For Use In Sedona Conference/ARMA International Conference

On April 14-15, 2014 The Sedona Conference and the Association of Records Managers and Administrators (ARMA) International will be co-hosting an Executive Conference on Information Governance at Amelia Island, Florida for approximately 100 information governance, records management, compliance, legal, privacy, and security professionals. More information about this event can be found at https://thesedonaconference.org/conference/2014/tsc-arma-executive-conference-information-governance

Four JOLT articles will be included in the materials for the conference including:

Peter Sloan, What Is Information Governance? http://jolt.richmond.edu/index.php/symposium-series-what-is-information-governance/

Peter Sloan, The Compliance Case for Information Governance, 20 Rich. J.L. & Tech. 4 (2014),http://jolt.richmond.edu/v20i2/article4.pdf

Charles R. Ragan, Information Governance: It’s a Duty and It’s Smart Business, 19 Rich. J.L. & Tech. 12 (2013), available at http://jolt.richmond.edu/v19i4/article12.pdf

Bennett B. Borden & Jason R. Baron, Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 Rich. J.L. & Tech. 7 (2014), http://jolt.richmond.edu/v20i2/article7.pdf

 

Blog: Trapping "Trappy"; the FAA's Attempt to Regulate Model Aircrafts

by Laura Bedson, Associate Symposium and Survey Editor

 

Say it isn’t so!  The days of unregulated model airplane flying may well be behind us, particularly if the Federal Aviation Administration (FAA) has anything to say about it.  As the use of Unmanned Aircraft Systems (UAS) or drones, as they are more commonly known, has literally skyrocketed in recent years, the FAA has gone to work crafting laws geared towards regulating the use of these devices.

The potential loopholes in these new regulations were pointed out in a recent case that came out of Charlottesville, Virginia.  Back in October of 2011, Raphael Pirker piloted a $130 foam glider above the University of Virginia’s Medical Center in the hopes of capturing aerial footage of the school for advertisements.[1]  Despite this seemingly innocent motive, the FAA came down hard on Mr.Pirker for operating a UAS or drone without obtaining prior authorization from the FAA.  As a result, the FAA imposed a $10,000 civil penalty on Mr.Pirker for operating this commercial drone.  The FAA’s complaint alleged that Mr.Pirker had carelessly operated the drone in a manner that potentially endangered life and property.

To someone such as myself, Mr.Pirker seems like an innocent, model airplane enthusiast who got mixed up in this emerging area of law.  That is not the case.  After doing some research, I learned that Mr.Pirker, aka “Trappy” is a 29-year-old “aerial anarchist”[2] who has been on the FAA’s list of least favorite people for a few years now.  He has taken videos of the Statue of Liberty, French Alps, and Costa Concordia using the small model aircrafts.[3]  It wasn’t until he arrived on UVA’s campus to take videos of the MedicalSchool however, that the FAA was able to get its hands on him. 

Leaping at the opportunity to make an example of “Tappy” and push through model aircraft regulation, the FAA pursued the case by arguing that model aircrafts were covered under its regulations, and even suggested that  model airplanes should be classified as drones.  Currently, the FAA defines a UAS as the device flown by a pilot “via a ground control system, or autonomously through use of an on-board computer”.[4]  Based on this basic definition, Mr.Priker could have been considered to have been operating a UAS and thus in violation of not obtaining prior authorization per FAA rules.

            Despite the FAA’s arguments that Mr.Priker was recklessly operating this commercial drone in a manner that endangered human life and property, a National Transportation and Safety Board (NTSB) administrative judge was not convinced.  In the first case of its kind, the judge dismissed the FAA’s case against Mr.Priker.[5]  The Judge held that Mr. Pirker was not operating a drone, or what the FAA traditionally considers to be a drone, but instead, merely a model airplane, which is a device that is not subject to FAA regulation and enforcement.[6] 

            This decision and the arguments from both parties will likely prove to be more monumental than we may think, particularly because the holding perfectly coincides with newly publicized FAA restrictions regarding the commercial use of drones.  The FAA, for some time (since 2007), has banned the commercial use of model aircrafts and this decision ultimately makes that policy unenforceable.[7]  Unsurprisingly the FAA has appealed the ruling, which means that the case will now be brought before the full NTSB board for a ruling.  While there is no guarantee as to how the full board will rule, there is no question that drones are here to stay and cases such as this are just the beginning of a long race to regulate these aircrafts.


[1] Mike M. Ahlers, Pilot wins case against FAA over commercial drone flight, CNN U.S. (Mar. 6, 2014, 10:07 PM), http://www.cnn.com/2014/03/06/us/drone-pilot-case-faa/.

[2] Jason Koebler, Drones Could Be Coming to American Skies Sooner Than You Think, Politico Magazine (Jan. 28, 2014), http://www.politico.com/magazine/story/2014/01/drones-faa-lawsuit-coming-to-american-skies-102754.html#.UyHwwvldWSo.

[3] Id.

[4] Unmanned Aircraft (UAS) Questions and Answers, Federal Aviation Administration (July 26, 2013, 12:29 PM),  http://www.faa.gov/about/initiatives/uas/uas_faq/#Qn1.

[5] Ahlers, supra note 1.

[6] Ahlers, supra note 1. 

[7] Ahlers, supra note 1.

Blog: Will “Smart Guns” be Accepted as a Trailblazing Technology or Lead to Constitutional Issues?

by Taylor Linkous, Associate Technology and Public Relations Editor

            Gun control is one of the most controversial and divisive issues in America and with a slew of mass shootings in recent years, the debate seems to have only intensified.  To make things more interesting, over the past few years, personalized guns or “smart guns” have also entered the conversation.  While at one point, smart guns seemed to be out-of-reach concepts used in movies like Skyfall, the Oak Tree Gun Club in California recently became the first store in the nation to put a smart gun on sale.[1]

            Smart guns were created with the aim of reducing the misuse of guns and accidents caused by guns by using radio-frequency identification (“RFID”) chips, fingerprint recognition, or magnetic rings which would allow only authorized persons to use the weapon.[2]  The thought is that this technology could prevent accidental shootings by children or even prevent violent gun crimes by barring anyone but an authorized user to fire the gun.[3]   

            As noted above, just recently, Oak Tree Gun Club, one of the largest gun stores in California, became the first in the nation to sell a smart gun.[4]  Oak Tree Gun Club is selling the Armatix iP1, which requires the user to be wearing a black waterproof watch in order to fire.[5]  The gun and the watch both contain electronic chips and when the watch is within reach of the gun, a light on the grip of the gun turns green and the user is able to fire.[6]

             Proponents of smart guns insist this technology is revolutionary and a momentous step in the right direction when it comes to controlling the use of guns and reducing gun violence.[7]  However, opponents of the new technology are mostly gun rights advocates who worry about its reliability and that the government will trample on their Second Amendment rights by eventually requiring all guns to have this technology.[8] 

Other opponents include the Violence Policy Center, a strong advocate of reducing gun violence, who argues smart guns won’t reduce gun violence because most gun homicides happen between people who know each other and the new technology would not prevent such crimes.[9]  Moreover, the Violence Policy Center argues smart guns could increase the number of people purchasing guns because those who were once opposed to owning guns may change their minds if they think this technology makes guns safer.[10]

Some of the concerns about Oak Tree Gun Club’s sale of smart guns come from a New Jersey law passed in 2002 which requires all handguns in the state to be personalized within three years of a smart gun being sold anywhere in the U.S.[11]  With the store selling the first smart gun in the country, arguably the clock on the New Jersey law has started running, putting many opponents of the technology in a panic.  The backlash against Oak Tree Gun Store has been so strong that the store has actually denied ever selling the gun, despite photos of the gun for sale at the facility.[12]

Just recently, Senator Edward Markey, a Democrat from Massachusetts has revealed a gun control bill requiring all new guns to be personalized so they can only be fired by their owners.[13]  While the benefits of such a technology seem obvious, smart guns have already gained some strong enemies and it unlikely Congress will pass such a bold law with so much controversy and debate already surrounding it.

                                                 


[1] http://www.washingtonpost.com/local/california-smart-gun-store-prompts-furious-backlash/2014/03/06/43432058-a544-11e3-a5fa-55f0c77bf39c_story.html

[2] http://en.wikipedia.org/wiki/Personalized_gun#Prototypes

[3] http://www.usatoday.com/story/opinion/2014/02/21/gun-control-smart-technology-personalized-column/5645119/

[4] http://www.washingtonpost.com/local/we-need-the-iphone-of-guns-will-smart-guns-transform-the-gun-industry/2014/02/17/6ebe76da-8f58-11e3-b227-12a45d109e03_story.html

[5] Id.

[6] Id.

[7] Id.

[8] http://www.washingtonpost.com/local/california-smart-gun-store-prompts-furious-backlash/2014/03/06/43432058-a544-11e3-a5fa-55f0c77bf39c_story.html

[9]  http://www.washingtonpost.com/local/we-need-the-iphone-of-guns-will-smart-guns-transform-the-gun-industry/2014/02/17/6ebe76da-8f58-11e3-b227-12a45d109e03_story.html

[10] Id.

[11] http://www.usatoday.com/story/opinion/2014/02/20/smart-guns-new-jersey-california-washington-post-column/5610543/

[12] http://www.washingtonpost.com/local/california-smart-gun-store-prompts-furious-backlash/2014/03/06/43432058-a544-11e3-a5fa-55f0c77bf39c_story.html

[13] http://www.foxnews.com/politics/2014/02/20/dem-bill-would-require-all-new-guns-be-personalized/

Blog: The Overbroad Computer Fraud and Abuse Act: Its Implications and Why Its Scope Should be Narrowed

by Barry Gabay, Associate Staff

If you are at work and you are reading this, you may be subject to federal criminal sanctions.

The Computer Fraud and Abuse Act, the federal government’s key anti-hacking law, was originally enacted in 1986 to deter hackers from wrongfully obtaining confidential governmental and financial information, or inflicting “federal interest” computers with harmful viruses.  In passing the act, Congress sought to regulate only those computer crimes that were interstate in nature, particularly those involving large financial institutions and governmental organizations.[1]  However, the statute was amended several times to ultimately broaden the CFAA’s reach.  In the mid-90s, for example, Congress placed criminal misdemeanor liability upon individuals who acted merely “recklessly” in their computer use,[2] and later placed liability upon individuals who obtained and read “any information of any kind so long as the conduct involved an interstate or foreign communication.”[3]  But Congress went even further in 2008 when it most recently amended the CFAA.  For starters, Congress eliminated the $5,000 misappropriation threshold for CFAA liability.  But further, while previously a defendant must have stolen information through interstate commerce or foreign communication to be prosecuted under the CFAA, the statute was amended to now encompass all information obtained “from any protected computer.”[4]  

Today, liability under the CFAA can be proven by showing that a defendant (1) intentionally accessed a computer (2) without authorization or exceeding authorized access, and thereby (3) obtained information from a protected computer.[5]  The pertinent definition of “protected computer” is any computer “which is used in or affecting interstate or foreign commerce or communication.”[6]  Courts have found that the Internet is “an instrumentality and channel of interstate commerce,” thus within the realm of Congressional regulation, and for purposes of CFAA violations, the defining characteristic of a “protected computer.”[7]  To put it in perspective, this criminal statute was broadened from pertaining only to computers with direct “federal interest” to now any computer connected to the Internet.

Nevertheless, the main litigable issue has proven to be determining when an individual is “authorized” to use a computer.  Under the CFAA the phrase “exceeds authorized access” is “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled to obtain or alter.”[8]  Whereas an employee who uses a computer “without authorization” has “no rights, limited or otherwise, to access the computer in question,” an employee who “exceeds authorized access” had initial authorization to use the computer “for certain purposes but goes beyond those limitations.”[9]  However, the phrase, “without authorization” is not defined in the CFAA, and a circuit split has thus developed over the interpretation of the phrase.  

The majority broad view, adopted by the First, Fifth, Seventh and Eleventh Circuits, holds that an employee’s computer authorization is terminated the moment that an employee acts contrary to his employer’s interest.[10]  These circuits hold that any time an employee uses a company computer in a way not in direct benefit to his employer the Department of Justice has jurisdiction to prosecute.  As Justice Floyd noted in the summer of 2012, “[s]uch a rule would mean that any employee who checked the latest Facebook posting or sporting event scores in contravention of his employer’s use policy would be subject to the instantaneous cessation of his agency and, as a result, would be left without any authorization to access his employer’s computer systems.”[11]

However, in the two most recent federal appellate cases on the issue, the Fourth and Ninth Circuits both adopted a narrow interpretation of the statute.  Those circuits held that an employee is “authorized” to use a company computer when the employer gives that employee permission to use it.  An employee’s subsequent misuse of an employer’s computer would not be subject to federal sanctions, as that employee was “authorized” to use that computer under the CFAA. [12]

While a broad interpretation of the CFAA may deter some individuals from using computers in ways not intended by their employers, that deterrence derives from ludicrous sentencing for comparatively innocuous criminal actions.  Aaron Swartz, the well-documented Internet activist who allegedly downloaded millions of articles from MIT’s online library, faced a maximum sentence of 35 years incarceration before the 26-year-old took his own life. [13]  In comparison, the maximum federal sentence for a first-time felon guilty of attempted murder who left the victim with life-threatening bodily injury is 24 years.  A first-time child pornographer who distributes images of a child under the age of 12 engaged in explicit sexual acts would receive a maximum federal sentence of 30 years imprisonment.  If an employee merely getting fired by her employer is not enough deterrence for misusing a company computer, then state criminal statutes and tort and contract law surely provide adequate deterrence.  Thus, in practice, the broad interpretation of the CFAA merely serves to make ordinary working individuals, who, while perhaps distracted during the workday possess no real criminal intent whatsoever, into federal criminals. 

In the wake of Aaron Swartz’s suicide, the Justice Department and members of Congress have recently expressed their willingness to narrow the scope of the Computer Fraud and Abuse Act.[14]  The bipartisan Aaron’s Law was introduced in the House of Representatives to limit the scope of the CFAA.  That limitation is long overdue.  It is a well-established canon of statutory construction that courts must construe criminal statutes narrowly, so as to avoid over-criminalization.  But courts, obviously unable to define a crime, are relegated merely to the text, and hinge liability on the terms “without authorization” and “exceeding authorized access.”  With the firmly entrenched circuit split now in place, the Supreme Court may in the not too distant future weigh in on the issue if Congress does not first amend this overbroad statute.


[1] See Sarah A. Constant, The Computer Fraud and Abuse Act: A Prosecutor’s Dream and a Ha
cker’s Worst Nightmare—The Case Against Aaron Swartz and the Need to Reform the CFAA
, 16 Tul. J. Tech. & Intell. Prop. 231, 233 (2013).  

[2] Computer Abuse Amendments Act, Pub. L. No. 103-322, tit. XXIX, 108 Stat. 2097 (1994).

[3] Economic Espionage Act, Pub. L. No. 104-294, tit. II, 110 Stat. 3488, 3491 (1996). 

[4] 18 U.S.C. §1030(a)(2)(C) (2008).

[5] Id.

[6] 18 U.S.C. § 1030(e)(2)(B). 

[7] United States v. Trotter, 478 F.3d 918, 920-21 (8th Cir. 2007) (internal citations omitted). 

[8] 18 U.S.C. § 1030(e)(6). 

[9] LVRC Holdings LLC v. Brekka, 581 F.3d 1127, 33 (9th Cir. 2009). 

[10] See See E.F. Cultural Travel BV v. Explorica, 274 F.3d 577 (1st Cir. 2001); United States v. John, 597 F.3d 263 (5th Cir. 2010); Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006); United States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010).

[11] WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012).

[12] Brekka, supra note 10, at 1133.

[13] See generally David Amsden, The Brilliant Life and Tragic Death of Aaron Swartz, Rolling Stone (2013), available at http://www.rollingstone.com/culture/news/the-brilliant-life-and-tragic-death-of-aaron-swartz-20130215.

[14] Brian Fung, The Justice Department Used This Law to Pursue Aaron Swartz. Now It’s Open to Reforming It. Wash. Post. (Feb. 7, 2014 at 4:03 PM), http://www.washingtonpost.com/blogs/the-switch/wp/2014/02/07/the-justice-department-used-this-law-to-pursue-aaron-swartz-now-its-open-to-reforming-it/.

Blog: How Will the Government Deal with Bitcoin?

By: Associate Technology and Public Relations Editor, Taylor Linkous

 

            As bitcoin continues to rise in popularity and value and steadily establishes itself in the mainstream economy, it has simultaneously revealed its flaws and weaknesses.  Will bitcoin successfully establish itself as a revolutionary technology that is here to stay or will its faults cause it to eventually fade out?  Moreover, if it is here to stay, what should the government do with it?

            First of all, bitcoin is a virtual form of currency that was created in 2009 by an anonymous programmer who goes by the code name, “Satoshi Nakamoto.”[1]  Bitcoin is not backed by any government or banks and actually exists only online.[2]  What makes it attractive yet dicey is that transactions are made directly between users with no middle men and buyers and sellers remain anonymous.[3]  Bitcoins are created through “mining.”  Explained in those most basic terms, “mining” is when people solve very complex math puzzles on computers and are rewarded with bitcoins.[4]  Many businesses have already decided to accept bitcoins including a Subway sandwich shop in Pennsylvania, CheapAir.com, and even some law firms.[5]

Bitcoin’s rise in popularity and value is evidenced by the steep increase in its value.  As of December 2013, bitcoins were worth $1,100 each.[6]  Further, the first Bitcoin ATM was installed in a coffee shop in Vancouver, Canada and had 81 transactions on its first day.[7]  In fact, just recently, the first Bitcoin ATMs offering Bitcoins for cash in the United States opened up in Boston and Albuquerque and the first Bitcoin ATM Machine to dispense cash for Bitcoins is set to open in a bar in downtown Austin this week.[8]  These Bitcoin ATMs are predicted to encourage people to use the virtual currency in their everyday lives, bringing it out of the deep, complex tech world and into the “real world.”[9]

However, despite bitcoin becoming increasingly recognized as legitimate, it is still unregulated and there are remaining concerns about its prevalent use for criminal activities because of the anonymity.  Bitcoin was the currency used for Silk Road, a website that was shut down by the FBI last year for facilitating the purchase and sale of drugs and other illegal items such as guns and child pornography.[10]  Silk Road 2.0 was launched after the original website’s shutdown; however, a glitch in the website allowed hackers to steal $2.7 million from the customers who had their money in Silk Road’s accounts.[11]  Thus, not only are there concerns about bitcoin use for criminal activity, this incident with Silk Road 2.0 has called into question bitcoin’s credibility and hurt its chances of becoming more mainstream.[12]

Regardless, the growing popularity and value did spark a conversation in the Senate Committee on Homeland Security and Government Affairs this past November.[13]  At the hearing, law enforcement officials expressed concerns about anonymity and their need for help in catching people who are using bitcoin for criminal activity.[14]  On the other side, bitcoin users and The Bitcoin Foundation stated the government should leave the virtual currency unregulated and allow it to continue to grow and thrive on its own.[15]

Currently, even though users of bitcoin are not regulated, businesses acting as “money transmitters” are covered under current law.  Other existing statutes, such as mail and wire fraud, could be used to prosecute some misuse of bitcoin.[16]  Other than that, regulators are having a hard time deciding how to deal with it.  It is unclear whether bitcoin should even be treated as a legitimate currency.[17]  For example, Canada has taken the position that bitcoin is not considered currency and they will not regulate it.[18]  Germany is treating bitcoin like a foreign currency and Brazil passed a law in October 2013 specifically dealing with electronic currencies, such as bitcoin.[19] 

It will be interesting to see whether the introduction of the Bitcoin ATM’s will help bitcoin secure its spot as a legitimate currency or whether the Silk Road 2.0 incident will stunt bitcoin’s otherwise rising popularity.  Even more importantly, if bitcoin is here to stay, will the government allow it to remain unregulated or recognize it as currency and step in to create a regulation?


[1]  http://money.cnn.com/infographic/technology/what-is-bitcoin/

[2]  http://blogs.wsj.com/moneybeat/2014/02/17/bitcoins-crisis-is-turning-point-for-currency/

[3]  http://money.cnn.com/infographic/technology/what-is-bitcoin/

[4]  See id.

[5]  http://money.cnn.com/gallery/technology/2013/11/25/buy-with-bitcoin/7.html

[6]  http://blogs.wsj.com/moneybeat/2014/02/17/bitcoins-crisis-is-turning-point-for-currency/

[7]  http://www.forbes.com/sites/kashmirhill/2013/10/31/why-are-people-so-excited-about-a-bitcoin-atm/

[8]  http://www.usatoday.com/story/money/business/2014/02/19/bitcoin-atm-austin/5623387/

[9]  http://www.forbes.com/sites/kashmirhill/2013/10/31/why-are-people-so-excited-about-a-bitcoin-atm/

[10] http://www.usatoday.com/story/news/nation/2013/10/21/fbi-cracks-silk-road/2984921/

[11] http://money.cnn.com/2014/02/14/t
echnology/security/silk-road-bitcoin/

[12]  See id.

[13]  http://money.cnn.com/2013/11/18/technology/bitcoin-regulation/index.html

[14]  See id.

[15] See id.

[16] http://www.abajournal.com/news/article/should_virtual_currencies_be_subjected_to_real-life_regulation/

[17] See id.

[18] http://www.forbes.com/sites/kashmirhill/2014/01/31/bitcoins-legality-around-the-world/

[19] See id.

Blog: Snapchat – Defeating an Authenticity Objection in Court

by Danielle Bringard, Associate Survey and Symposium Editor       

             We’ve all done it.  We’ve all taken the “selfie.”  Facebook, Twitter, Tinder, Instagram, and Snapchat are just a few of these social media applications that allow users to transmit photos and videos to each other from various electronic devices.  However, unlike most social media sites, Snapchat has a unique feature.  Unless a user takes a “screenshot” of the photo or video while it is being received, than the photo or video is deleted after up to 10 seconds.[1] 

            The only information you can obtain from Snapchat about a user is: the user’s email, the user’s phone number, the username, a log of the last 200 snaps that have been sent and received, and the date the user created the account.[2]  The exception being if either the sender or the recipient downloaded the message, kept it saved, and was able to be retrieved from the actual device rather than from the Snapchat application.  The Richmond Journal of Law and Technology has recently published an article which explores the dangers of Snapchat and sexting,[3] but what about the admissibility of a Snapchat history in a court of law?

            While there have been no cases specifically dealing with Snapchat, there have evolved two competing theories regarding the authenticity of social media evidence in general.[4]  First, in the Griffin case, the court requires: the testimony of the creator, documentation from the creator’s computer, or information obtained directly from the social media site which would tend to show that the evidence seeking to be admitted was not falsified or created by another person.[5]  Under the Griffin Test, Snapchat could be authenticated with the report from Snapchat Legal which gives the user’s email, phone number and username provided the party seeking admission could show a match with the purported author.  Second, in the Tienda case, the court will admit social media evidence on a ruling from the judge that a jury could reasonably find that the proffered evidence is authentic.[6]  Under this ruling authenticity could also easily be established with a report from Snapchat Legal.

            While the Griffin test appears to be more stringent that the Tienda test, both courts examined the content and the context of the social media page seeking admission in making its ruling.  Given that requesting the proper authenticating information from Snapchat Legal is no series of hoops to jump through, it is likely that most courts will overrule any objection to the authenticity of a user’s history report from Snapchat Legal.

             


[1] Snapchat Law Enforcement Guide 3 (last updated Dec. 1, 2012) available at http://www.mrcac.org/content/uploads/2013/02/Snapchat_Law_Enforcement_Guide_12112.pdf.

[2] Id. at 4.

[3] Nicole A. Poltash, Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials, 19 Rich. J. L. & Tech. 4 (2013) available at http://jolt.richmond.edu/v19i4/article14.pdf.

[4] Tienda v. Texas, 358 S.W.3d 633 (Ct. Crim. App. Tex. 2012); Griffin v. Maryland, 19 A.3d 415 (Ct. App. Md. 2011).

[5] Griffin, 19 A.3d at 427-428.

[6] Tienda, 358 S.W.3d at 638.

Page 76 of 84

Powered by WordPress & Theme by Anders Norén