Articles Posted in Constitutional Law

On March 19, 2013, the Supreme Court reached a decision in Kirtsaeng v. John Wiley & Sons, Inc. In this case, respondent John Wiley & Sons, Inc. (“Wiley”), a publisher, brought suit against Petitioner Supap Kirtsaeng alleging violation of the Copyright Act, under Title 17 U.S.C. §§ 101-810. Kirstaeng a student in the United States, studying mathematics at Cornell University and the University of Southern California, sold textbooks to help pay for his education and living expenses. Kirtsaeng’s relatives would buy these textbooks in Thailand, where they live, and ship them to Kirtsaeng, who would sell the textbooks in America once he was done using them for his classes. Wiley’s subsidiaries in Thailand manufactured these textbooks.

Wiley contended that by selling foreign manufactured textbooks in America, Kirtsaeng was violating Title 17 U.S.C. § 602(a)(1) of the Copyright Act. According to 17 U.S.C. § 602(a)(1), a copyright owner’s exclusive distribution right encompasses the importation of copyrighted work into the United States. Importing copyrighted work into the United States without the consent of the copyright owner constitutes a violation of copyright law. Under copyright law, a copyright owner has the exclusive right to distribute copies of a copyrighted work to the public. However, Kirtsaeng argued that the First Sale Doctrine protects him from any liability because according to the doctrine the copyright owner loses an exclusive interest in copyrighted work after the first sale. The First Sale Doctrine, which is codified under Title 17 U.S.C. § 109, limits copyright owners’ distribution right to the first sale of the copyrighted work. Once the work is transferred, the copyright owner no longer retains an interest in the work.

In its opinion, the Supreme Court held that copyright law, and specifically the First Sale Doctrine, applies to copyrighted works manufactured abroad. Accordingly, copyright owners, such as the publisher in this case, lose their distribution rights and interests in a foreign manufactured copyrighted work after the first sale of the work. As such, Wiley lost its exclusive distribution right in the textbooks when its subsidiaries first sold the textbooks to Kirtsaeng’s relatives in Thailand. When the relatives then sent the textbooks to Kirtsaeng, who proceeded to resell the textbooks in America, Wiley no longer retained a copyright interest in the textbooks.

President Obama signed the Patient Protection and Affordable Care Act (“Act”), or ObamaCare, as it is more commonly known, into law on March 23, 2010. The Act intends to decrease the number of Americans who do not have medical insurance. Additionally, the Act aims to decrease the overall cost of healthcare in the nation. One of the primary provisions of the Act requires employers that have at least 50 full-time employees to provide healthcare benefits for their employees. If such employers fail to provide benefits adequate under government standards, the employers will have to pay a fine. In National Federation of Independent Business v. Sebelius, the plaintiffs questioned the constitutionality of ObamaCare, arguing that the federal government did not have the authority to require businesses to provide health care. Ultimately, the Supreme Court of the United States upheld the constitutionality of ObamaCare.

Although, ObamaCare will not go into effect until 2014, it is already starting to have an effect on small businesses in America. Indeed, the Treasury Department and the Internal Revenue Service released regulations, in December of 2012, that require companies that average 50 or more full-time employees to provide healthcare or pay a fine now.

The way small businesses structure in 2013 could determine their status under ObamaCare next year. Companies have considered limiting growth to eliminate the need for additional employees. Accordingly, employers are choosing to outsource work instead of hiring full-time employees in order to avoid the cost of providing government-approved health care. Also, employers are hiring employees only on a part-time basis to avoid meeting the standard under ObamaCare.

In light of recent news that America’s cyber-network is vulnerable to outside attack, President Obama signed an Executive Order to improve cyber-security for the nation’s “critical infrastructure.” According to the Order, “critical infrastructure” applies to the vital physical and virtual systems in the United States that are essential to the country’s economic security, public health, and safety. This definition is in line with the definition of “critical infrastructure” in the Cybersecurity Act of 2012, which the federal government failed to pass.

The Executive Order is meant to promote greater information sharing among members of the same network. This will ensure that all network providers are adequately aware of potential threats to the system in time to plan and implement an effective response. Accordingly, American companies now bear the responsibility of evaluating whether “critical infrastructure” applies to their operations. Alternatively, the Executive Order may also apply to companies that provide goods or services to other companies that the Executive Order implicates. In this case, the Executive Order would also apply to the companies that provide the goods or services. These companies would then bear the same responsibility to abide by the Executive Order and participate in the information-sharing network.

The Executive Order also requires various federal agencies to participate in this network. The Office of the Attorney General, the Department of Homeland Security, and the Office of National Intelligence, among others, are responsible for participating to create an information-sharing network. Such a network will make it easier to detect and ward off cyber-threats. Additionally, the information-sharing network will allow the participating agencies to quickly notify the President of any legislation that is necessary to further protect the nation’s cyber-network. Furthermore, a working and productive network will incentivize other agencies and companies to join the network. Increased participants will improve the breadth of the network, work to expand the reach of the network, and add to the information that is available within the network.

The proliferation of cloud computing has given rise to increased privacy concerns. These concerns are especially grounded in Google’s new terms of service that allow the company to gather user information and data and release it to government entities upon request, without obtaining user consent. According to these new terms, as of March 1, 2012, Google has been consolidating data on users who access Google and creating a single profile that contains all of this information. Google’s new terms have caused concern with the Electronic Privacy Information Center (“EPIC”), which argues that these terms conflict with an FTC Consent Order that outlined privacy standards for all Google products and services. The order required Google to obtain users’ consent before gathering and sharing personal user information with third parties.

In response to Google’s new terms, EPIC petitioned the Federal Trade Commission (“FTC”) to compel Google to abide by the terms of the 2011 consent order. EPIC brought suit in the United States District Court of the District of Columbia against the FTC, urging the organization to enforce the consent order, and stop Google’s new policy of gathering and storing user information in individual profiles. The court heard EPIC v. FTC in 2012 and ruled that the court lacked the jurisdiction over the FTC to compel it to act according to EPIC’s demands. Nonetheless, the court noted that it had “serious concerns” regarding Google’s revised terms of service.

The National Association of Attorneys General sent a letter to Google on behalf of 36 states, expressing concern with Google’s intention to gather information about users from all products that utilize Google services, such as cell phones, computers, and tablets. This is especially concerning for Android smartphones, which rely heavily on Google systems and products. Users with electronic devices use various Google products, such as Gmail, YouTube, and the Google search engine, in different ways. However, according to Google’s new terms, user profiles would consolidate usage from all such products into a single profile for each user. The Attorneys General also voiced a specific complaint towards users’ inability to opt out of these new terms. According to the letter, the lack of choice poses a severe threat to individual privacy.

The possibility of identity theft is a growing concern. However, banks, credit card companies, and various other institutions that house private information regularly take steps to protect customers’ identities. Nonetheless, a different type of identity theft continues to thrive. Online impersonation is a quick and easy form of identity theft that takes place over the Internet. It is an easy type of identity theft given the breadth and convenience of social media and expanding networking sites. However, in light of the Sandy Hook Elementary School incident, state and federal authorities are considering the possibility of bringing criminal charges for online impersonation.

State legislatures called for laws against online impersonation following the case of Megan Meier, a 13-year-old girl who killed herself after a woman impersonated a boy and engaged in cyberbullying. After the Sandy Hook shooting, people began posting incorrect information about the shooting and the suspect. Others began posing as the shooter and staging crime scenes similar to the shooting. Connecticut State Police Lieutenant J. Paul Vance called attention to this matter in a public press conference. He noted that these posts, in addition to being highly inappropriate, were also threatening and criminal in nature.

A spokesman for Commissioner Reuben Bradford stated that, harassing anyone who was a victim of the shooting would be criminally prosecuted. He noted that harassment would not only include in person contact, but also harassment through via the Internet and social media sites. Charges could include criminal impersonation and criminal misrepresentation. California and several other states have established online impersonation as a criminal offense. Critics argue that criminal regulations that prohibit online impersonation may arm interest groups with the power to suppress speech. For example, Electronic Frontier Foundation argues that such laws could silence groups like The Yes Men, which utilizes online impersonation as a form of commentary on the government and large corporations.

Former CIA Director David Petraeus from his position after the FBI looked through Petraeus’ private Gmail account and discovered that he was having an extramarital affair. These events have brought to light the fragile state of individual privacy on the Internet, particularly in relation to individual email accounts.

According to the Electronic Communications Privacy Act of 1986 (“ECPA”), which is current and applicable cyber law, the FBI has the authority to look through any email account simply by accessing the account through providers such as Yahoo or Gmail. Under the ECPA, law enforcement agencies do not need a search warrant to look through such accounts if the message is more than 180 days old.

In addition, the Foreign Intelligence Surveillance Act of 1978 (“FISA”), under Title 50, sections 1801 et seq. of the United States Code, allows the government to monitor communications between foreign parties, without a search warrant. A 2008 amendment to FISA further allows the government to monitor communications between American parties if the government does not know of the parties’ exact locations or identities. A group of attorneys raised a constitutional challenge to this amendment, and the matter is now before the United States Supreme Court. The justices have focused on whether the amendment offers the government an inappropriate range of power, or whether the amendment simply expands the government’s resources to protect America.

Facebook is struggling to decide how to handle its pictures. While consumer companies urge Facebook to profit from its face recognition technology, international regulators insist that user identities remain protected. According to a New York Times article entitled, Facebook Can ID Face, But Using Them Grows Tricky, Facebook agreed to delete user identification information, which the site gathers through facial recognition technology. The technology at issue is Facebook’s “tag suggestion” which automatically matches names with faces when a user uploads a photo. Facebook has deactivated this feature to make improvements that international regulators can approve.

Chris Hoofnalge, a professor at the University of California Berkeley, School of Law stated in the article that increasing developments in this field “directly affects civil liberties.” Although, the public is more likely to accept using identifying information from facial recognition technology for security purposes, Wall Street is now pressuring Facebook to utilize its users’ personal data for profit. Legislators, such as Senator Al Franken, have expressed concern over Facebook’s “database of face prints,” which Facebook has gathered “without the explicit consent of its users.” Franken urged Facebook to provide the same right of privacy to its American users as it does its European counterparts.

The Federal Trade Commission (“FTC”) has issued a guide, “Facing Facts Best Practices for Common Uses of Facial Recognition Technologies,” aimed at defining facial recognition technology and outlining authorized uses. In addition, earlier this year Google announced a new tool that would allow individuals to blur their faces in YouTube videos. This is one of the first steps to provide “visual anonymity” in cyberspace.

The technological advancements and the ever-expansive world of cyberspace are in a perpetual state of conflict with individual privacy concerns. For example, a recent research project by the Massachusetts Institute of Technology demonstrates that independent component analysis allows companies to track changes in pulse by the subsequent change in skin color that is readily visible through a video signal. In addition, employers, credit agencies, and health insurance providers can now purchase indexes that contain consumer profiles based on individual consumer’s browsing history, site membership, and online purchases.

The Federal Trade Commission has issued a report that proposes the steps companies can take to ensure optimal protection of consumer privacy. The report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers,” urges companies to incorporate privacy protection in every stage of their products, provide a mechanism against online activity tracking, and fully disclose what user information it shares with other entities.

The California legislature has proposed a new bill that would impose new restrictions on social networking sites, which would limit the information available about users. The proposed legislation would allow users to select privacy settings before ever using the site, which limits the sites accessibility. Social Networking sites, such as Facebook, have responded that such legislation would inappropriately burden the sites, in turn devastating cyber-business in California.

With a growing concern for national security and expanding information sharing networks, the government is making efforts to establish legislation protecting the American cyber community.

Most recently, in February 2012 Congress considered the Cybersecurity Act (“Act”) as a means to provide for information sharing across different industries to establish cybersecurity. The Act also places the burden of monitoring sites and infrastructures on the owners of the sites, rather than any managers hired to maintain the sites.

Congress ultimately has not passed the Act because there is such a divide among politicians regarding the most effective means to establish protection for the American cyber community. See http://articles.cnn.com/2012-08-02/politics/politics_cybersecurity-act_1_cybersecurity-bill-homeland-security-cyberattacks for more information.

As some of readers, who have active facebook profiles know, the like button is a way to express your support for a cause or idea. However, a federal judge states that, clicking it doeos not constitute constitutionally protected speech.

For example, the employees of a local police department sued their boss (Sheriff B.J. Roberts) for firing them after they supported his opponent in his 2009 re-election campaign. One of those workers, Daniel Ray Carter, had “liked” the Facebook page of Roberts’ opponent, Jim Adams. Exactly what a “like” means – if anything is the main question. The ex-employees posit that their First Amendment rights were violated.

While public employees are allowed to speak as citizens on matters of public concern, the United States District Judge, the Honorable Raymond Jackson, ruled that clicking the “like” button does not amount to expressive speech. Express conduct, also referred to as “symbolic speech,” relates to the communication of ideas through one’s conduct. Expressive conduct raises some interesting constitutional questions because it combines expression, which typically receives First Amendment protection, and conduct, which typically does not receive First Amendment protection. This dualistic nature may account for the court’s position of affording expressive conduct some constitutional protection, but substantially less protection than pure speech.