...

MEDIA LAW & POLICY 185 West Broadway

by user

on
Category: Documents
138

views

Report

Comments

Transcript

MEDIA LAW & POLICY 185 West Broadway
MEDIA LAW & POLICY
Spring 2013 | Volume 20 | Number II
185 West Broadway
New York, NY 10013
EDITORIAL STAFF
EDITOR IN CHIEF
Jaclyn Tyndorf
MANAGING EDITOR
Ryan G. Lewis
EDITORS
Andrew J. Casas
Damion C. Josephs
Tara Hewitson
Jacqueline Merkher
William Palka
Jonathan Perl
STAFF
Jennifer Baek
Lorraine Galvis
Steven Schneider
Bryan Bortnick
Jen Mecum
Pamela Schwartz
Benjamin White
Rebekka Denenberg
Richard Meyer
Jason Sender
Andrew Witt
BOARD OF GOVERNORS
Jessica L. Campbell
Alexander Malyshev
Daniel Margolis
PUBLISHER
Michael Botein
Corporate Sponsors
ABC, Inc. • AC Nielsen • BRAINS, Int’l • Complan Associates • Bloomberg News • Bresnan
Communications Company • Cablevision Systems Corporation • Citicorp Foundation • Council of
Europe, European AudioVisual Observatory • Deutsche Bank • Empire One Telecommunications •
Greystone Foundation • Garvey Schubert & Barer • Hein & Co. • Hubbard Broadcasting, Inc. • Issue
Dynamics, Inc. • LexisNexus • Miller & Van Eaton PLLC • MITEL Telecommunications Systems,
Inc. • The New York Times Company • Nippon Television Network • NTT America, Inc. • NTV
International Corporation • Renaissance Communications, Inc. • Thomson-Reuters, Inc. • Tribune
Foundation • Verner, Liipfert, Bernhard, McPherson & Hand • Ward & Olivo • Wolf, Block, Schorr
& Solis-Cohen LLP • Thomson-West Publishing Company
Individual Sponsors
Geoffrey Allen • Robert C. Atkinson • John Howard Braun, Esq. • David Bronston, Esq. • John Cary
• John Haven Chapman • Bill Cibbarelli • Mark Conard, Esq. • Eileen Connell • Gerald C. Crotty •
Donna Demac • John A. Dimling • David Fendy • Kristina L. Fischer • Mark Foster • Don Franco •
John Friedman • Marlowe Froke • Darcy Gerburg • Nancy Lee Bercowitz, Esq. • Peter Johnson •
Erwin G. Krasnow • Sheila Mahoney, Esq. • Dilip Massand, Esq. • Nicholas Miller • A. Michael Noll
• Kenneth Norwick • Margaret O’Brien • Jeffrey Olson • Gregory Olinyk • John W. Olivo, Jr. •
Everett C. Parker • Lance R. Primis • Glenn S. Richmond • Kenneth Robinson • Bruno Ryterband •
Alfred R. Schneider • Gary Schober • Melvin Simensky • Samuel Simon, Esq. • John J. Southold •
Dale Stange • Peter Tannenwald • Patrick Turner • Howard White • Dovie F. Wingard • Randy Yaloz
Article Submissions
Media Law & Policy accepts articles from academics, government officials, professionals, and
graduate students in intellectual property, media and telecommunications. Submissions should be
approximately ten or more double spaced pages in length, and should be submitted by e-mail in a
Microsoft Word compatible format. Submissions should include a brief abstract and are subject to
editing.
All submissions should be sent to:
Media Law & Policy
Attn: Article Submission
[email protected]
MEDIA LAW & POLICY
Spring 2013 | Volume 20 | Number II
Table of Contents
INTELLECTUAL PROPERTY LEGAL DEVELOPMENTS 2011-2012: THE YEAR IN
REVIEW
PETER BROWN & RICHARD RAYSMAN.. ......................................................................................... 143
THE LEGAL PROTECTION OF EUROPEAN BROADCASTERS-CHALLENGES POSED
BY NEW SERVICES
PETER MATZNELLER & ANNE YLINIVA-HOFFMANN. ..................................................................... 157
MEDIA LITERACY: NO LONGER THE SHRINKING VIOLET OF EUROPEAN
AUDIOVISUAL MEDIA REGULATION?
DR. TARLACH MCGONAGLE .......................................................................................................... 187
TOLLS ON THE BROADBAND COMMUTE: STATE LIMITATIONS ON INTERSTATE
TELEWORK
NICOLE BELSON GOLUBOFF .......................................................................................................... 213
TECHNOLOGY LAW IN THE DIGITAL AGE: CURRENT DEVELOPMENTS
RICHARD RAYSMAN ...................................................................................................................... 239
FCC ANCILLARY JURISDICTION OVER INTERNET AND BROADBAND
MICHAEL BOTEIN .......................................................................................................................... 269
Media Law & Policy assumes no responsibility
for the views expressed by the authors in the contents of this issue
Media Law & Policy
INTELLECTUAL PROPERTY LEGAL DEVELOPMENTS 2011-2012: THE YEAR IN
REVIEW
Peter Brown*
Richard Raysman**
I. INTRODUCTION
The Internet has become an indispensable tool, one that has become an integral part of our
lives. It is utilized in almost every aspect of daily life: to gather information, to conduct financial
transactions, to communicate through social networks, and to sell or purchase items. However, along
with the Internet’s obvious benefits, it also presents unique issues and has resulted in new and
unexplored territory for those in the legal field. For example, online retailers collect, store, and share
consumer information, sometimes without the consumer’s knowledge. The ability to easily create
and use websites may allow online retailers to more easily sell counterfeit goods, sometimes without
the consumer having any knowledge.
This article will address several legal issues pertaining to the Internet. Recent developments in
online behavioral advertising and data collection will be addressed, followed by a discussion of
contributory online trademark infringement in relation to the sale of counterfeit goods. Both are
issues whose extent of risk and impact are not fully understood, are still being explored, and are not
clear-cut.
First, the authors explore what is known as behavioral or targeted advertising; advertising that
is tailored to each consumer.1 Typically, consumers are unaware that their online activities are being
tracked in this manner, since most sites do not collect personal information (e.g., a consumer’s name
or address), but instead track a consumer through the use of cookies.2 While contextual advertising,
or what seems to be the more traditional form of advertising, is simply random advertisements
popping up on someone’s Internet browser, behavioral advertising gives companies the ability to
track a consumer’s online behavior and target advertisements toward that individual consumer.3 This
form of advertising can be beneficial to both the advertiser and the consumer, but some inherent
privacy risks exist with this practice and raise valid concerns on the part of the consumer.4
The discussion explores online data collection, and considers the legal steps taken to regulate
this form of advertising. Potential issues involved with the practice of sharing consumers’
* Partner, Baker & Hostetler LLP. B.A., Dartmouth College (1968); J.D., Columbia University School of Law (1972).
** Partner, Holland & Knight LLP. B.S., MIT (1968); J.D., Brooklyn Law School (1973).
1
KATHLEEN ANN RUANE, CONG. RESEARCH SERV., RL 34693, PRIVACY LAW AND ONLINE ADVERTISING: LEGAL ANALYSIS OF
DATA GATHERING BY ONLINE ADVERTISERS SUCH AS DOUBLE CLICK AND NEBUAD 1 (2008).
2
See Yoriko Matsuda et al., Data Collection: Defining the Customer, DIRECT MARKETING ON THE INTERNET,
http://web.mit.edu/ecom/www/Project98/G2/data.htm. See Scott Killingsworth, Website Privacy Policies In Principle and In
Practice, 618 PRACTISING L. INST.: PATS., COPYRIGHTS, TRADEMARKS, & LITERARY PROP. COURSE HANDBOOK SERIES NO. G000DZ 667, 672, 726 (2000).
3
Ruane, supra note 1.
4
See id. at 1, 12.
143
Spring 2013 │ Volume 20 │ Number II
information with third parties are discussed, along with the regulations evolving in an attempt to
address the issue. As the authors discuss, advertisements are also appearing on smartphones, and
alleged misuses have resulted in lawsuits. Last, the article discusses whether the online marketing
industry’s self-regulation will meet the needs of the Federal Trade Commission (FTC) and Congress.
II. ROLE OF THE INTERNET IN SALES AND MARKETING
Online retailers and others are using new technologies to collect, store, manipulate, and share
ever-increasing amounts of consumer data at very little cost. The latest techniques in online targeted
advertising depend upon capturing consumer web browsing, social media, and location-based mobile
service data over time. However, recently the ease with which companies collect and combine online
information from consumers has raised some concerns about consumer privacy. Some consumers
are troubled by the sharing of their information or compiling of comprehensive profiles, others have
no idea that it is taking place, and still others may be aware of such online data collection but view it
as a worthwhile tradeoff for innovative products and convenience.
This article will discuss the current legal landscape surrounding online behavioral advertising
and data tracking, including recent actions by the marketing industry and Federal Trade Commission
(FTC) and the latest developments surrounding geolocation and the development of a Do Not Track
web browsing mechanism.
A. Behavioral Advertising Generally
Generally speaking, behavioral advertising is the tracking of a consumer's online activities
(e.g., search engines queried, web pages visited, e-commerce activities) to deliver advertising
targeted to that individual consumer's interests. The practice, which is typically invisible to
consumers, allows businesses to align their ads more closely to the inferred interests of their
audience.5 In many cases, the information collected is not personally identifiable in the traditional
sense and is "anonymized" by the data collectors – that is, the information does not include the
consumer’s name, physical address, or similar identifier that could be readily used to identify the
consumer in the offline world.6
Online data collection can be either active or passive. Active data collection requires a user to
deliberately share personal data, such as completing an online purchase or survey.7 Passive data
collection, on the other hand, includes capturing user preferences and usage behavior without
consumer interaction, such as the placing of "cookies" on a user’s computer or mobile device that
contain unique identifiers and browsing history information to track a user's online movements.8
Generally speaking, a cookie is a small text file that a website’s server places on a computer’s Web
browser. The cookie transmits information back to the website’s server about the user's browsing
activities on the site, including pages viewed, the time and duration of visits, search engine queries,
and whether an online advertisement was clicked on.9
5
Ruane, supra note 1.
6
Emily Steel & Julia Angwin, On the Web's Cutting Edge, Anonymity in Name Only, WALL ST. J., Aug. 4, 2010, at A1.
7
See supra note 2.
8
Id.
9
Tech Target: Software Quality, Definition: Cookie, http://searchsoftwarequality.techtarget.com/definition/cookie.
144
Media Law & Policy
The sharing of this collected data among third parties is poorly understood by individuals and
is not necessarily communicated transparently to users by many websites and applications. When a
user visits a website, beyond the site’s own first-party advertising cookies, the site might also insert
third-party advertising network cookies onto the user’s computing device containing a unique ID
number.10 Some websites (e.g. Wikipedia) do not place any tracking cookies,11 while other hightraffic sites place multiple cookies onto a user’s computer that transmit details about their visitors to
outside network advertisers.12 The practice of placing ordinary browser cookies has been upheld by
courts, and in one notable case, a federal district court held that website visitors do not suffer a
cognizable "economic loss" from the collection of their data.13 Ordinarily, computer users can delete
browser cookies by using tools within their Web browser to prevent third parties from associating the
user's browsing history information with their subsequent web activity.14
However, some entities have purportedly sidestepped consumer choices regarding behavioral
advertising through certain technological techniques, such as using supercookies (or “Flash cookies”)
which "respawn" browser cookies in a different location without notice to or consent of the user.15
The practice has prompted numerous civil actions.16 The placing of supercookies has also resulted in
enforcement actions.17
Once a Web user's browsing data is collected and stored in a browser cookie, it can be
aggregated by third party firms, or network advertisers that select and deliver advertisements across
the Internet on websites that participate in their networks. In subsequent web surfing sessions, if a
user visits websites that are served by the same advertising network, the networks can analyze the
10
Julia Angwin, The Web’s New Gold Mine: Your Secrets, WALL ST. J., Jul. 30, 2010, available at
http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html.
11
What They Know: Wikipedia.org Privacy Policy & Online Tracking Data, WALL ST. J. (Jul. 30, 2010),
http://blogs.wsj.com/wtk/2010/07/30/wikipediaorg/.
12
See What They Know: YouTube.com Privacy Policy & Online Tracking Data, WALL ST. J. (Jul. 30, 2010),
http://blogs.wsj.com/wtk/2010/07/30/youtubecom/. See also What They Know, WALL ST. J. (Jul. 30, 2010),
http://blogs.wsj.com/wtk/.
13
See In re DoubleClick, Inc. Privacy Litig., 154 F. Supp. 2d 497, 500 (S.D.N.Y. 2001).
14
Rick Maybury, How do I find and delete browser cookies?, THE TELEGRAPH, Jul. 17, 2011, available at
http://www.telegraph.co.uk/technology/advice/8641184/How-do-I-find-and-delete-browser-cookies.html. See Michael King,
How to Delete Cookies, PCWORLD (Nov. 2, 2011), http://www.pcworld.com/article/242939/how_to_delete_cookies.html.
15
Jonathan Mayer, Tracking the Trackers: Microsoft Advertising, THE CTR. FOR INTERNET AND SOC’Y AT STANFORD L. SCH.
(Aug. 18, 2011), http://cyberlaw.stanford.edu/node/6715. See Jennifer Valentino-DeVries, ‘Supercookie’ Code Seen on Hundreds
of Sites, Wall St. J. (Aug. 22, 2011), http://blogs.wsj.com/digits/2011/08/22/supercookie-code-seen-on-hundreds-of-sites/.
16
See LaCourt v. Specific Media, Inc., No. SACV 10–1256–GW(JCGx), 2011 WL 2473399 (C.D. Cal. Apr. 28, 2011) (court
dismissed a CFAA claim by individuals who alleged an advertising network installed Flash cookies on users' computers without
consent; plaintiff's inability to delete or control cookies may constitute a de minimis injury, but such injury was insufficient to
meet the CFAA $5,000.00 threshold).
17
See In re ScanScout, Inc., FTC File No. 1023185 (Settlement announced Oct. 8, 2011) (online advertiser agreed to settle FTC
charges that it deceptively claimed that consumers could opt out of receiving targeted ads by changing their browser settings to
block cookies, when in fact, the advertiser used Flash cookies that couldn't be blocked by browser settings).
145
Spring 2013 │ Volume 20 │ Number II
browsing history information associated with that computer and update the cookie.18 A profile forms
over the course of many website visits. Digital profiles become “contextual” maps, drawing on
immediate web surfing activities or upon more complex behavioral relationships as software
analyzes web surfing data and creates a demographic profile, predicting an age range, likes/dislikes,
current interests, level of income and education. Subsequently, when a computer user visits a web
page on which the ad network provides advertisements, the network uses a behavioral profile to
select tailored advertisements to serve on that computer.19 Profiles are sold daily to advertisers in
online exchanges which nearly instantaneously (while a website is loading) deliver targeted ads to
web users.20
B. Legal Landscape
There are several players in the debate over behavioral advertising and data tracking: (1)
privacy watchdog groups advocating for tighter regulation; (2) private litigants who have brought
suits over alleged violations of federal electronic privacy laws; (3) Congress and the FTC, which are
prompting the industry into implementing tighter self-regulation; and (4) the advertising industry,
which has released new self-regulatory principles and technical methods to provide notice and
transparency to website users regarding online advertising practices.21
Most notably, in December 2010, the FTC stated that the industry's efforts to address privacy
through self-regulation have been "too slow" and it continued with its initiative to encourage the
industry to offer consumers greater transparency and control with respect to online information
gathering. Accordingly, the FTC staff released a report announcing a proposed framework that
would apply broadly to online and offline commercial entities that collect, maintain, share, or
otherwise use consumer data that can be reasonably linked to a specific consumer, computer or
device.22 Moreover, the same year, the U.S. Department of Commerce issued its own green paper on
data privacy, echoing many of the FTC principles and concerns, and affirming the importance of
transparent privacy practices.23
In addition, Congress has waded into the debate. There have been a host of bills in both
chambers of Congress addressing privacy, online advertising and data tracking.24 In the Senate, for
18
Fact and Fiction: The Truth About Browser Cookies, LIFEHACKER (Feb. 21, 2010), http://lifehacker.com/5461114/fact-andfiction-the-truth-about-browser-cookies. See Alexis Madrigal, I'm Being Followed: How Google—and 104 Other Companies—
Track Me on the Web, THE ATLANTIC, Mar. 1, 2012, available at http://www.nationaljournal.com/tech/i-m-being-followed-howgoogle-and-104-other-companies-track-me-on-the-web-20120301.
19
Id. See also Privacy and Data Security: Protecting Consumers in the Modern World: Hearing Before the S. Comm. on
Commerce, Sci., and Transp., 112th Cong. 3 (2011).
20
Magrigal, supra note 18.
21
Iab. Self-Regulatory Program for Online Behavioral Advertising Factsheet, available at
http://www.iab.net/media/file/OBA_OneSheet_Final.pdf.
22
FED. TRADE COMM’N, PROTECTING CONSUMER PRIVACY IN AN ERA OF RAPID CHANGE: A PROPOSED FRAMEWORK FOR BUSINESS
AND POLICYMAKERS vi, vii (Dec. 2010), available at http://www.ftc.gov/os/2010/12/101201privacyreport.pdf.
23
See THE U.S. DEP’T OF COMMERCE, INTERNET POLICY TASK FORCE, COMMERCIAL DATA PRIVACY AND INNOVATION IN THE
INTERNET ECONOMY: A DYNAMIC POLICY FRAMEWORK (Dec. 2010), available at
http://www.ntia.doc.gov/files/ntia/publications/iptf_privacy_greenpaper_12162010.pdf.
24
See Do Not Track Me Online Act, H.R. 654, 112th Cong. (2011).
146
Media Law & Policy
example, there were at least two bills introduced, most notably, a bill co-sponsored by John Kerry
and John McCain (S. 799), the Commercial Privacy Bill of Rights Act of 2011. This would have,
among other things, instituted certain security requirements upon data collectors, given individuals
the right to opt-out of any information collection that is unauthorized by the Act and provide
affirmative opt-in consent for the collection of sensitive information.25 Both senators have also
called upon the FTC to finalize its 2010 preliminary report on online privacy so that the legislation
can move forward.26
In step with the FTC's policy reports, industry associations have outlined their own set of
principles embracing transparency and accountability in an attempt to avoid increased scrutiny and
restrictive privacy legislation. The industry has encouraged the use of an ‘Advertising Option Icon’
that users can click on to obtain basic information on the organization that served the ad, the location
of its advertising policy and methods on how to opt-out of such targeted advertisements in the
future.27 Consistent with the accountability provisions in its self-regulatory principles, the Council of
Better Business Bureaus recently announced that it had completed compliance cases under the
industry's Self-Regulatory Principles for Online Behavioral Advertising against six companies,
principally remedying inaccessible or quick-expiring consumer opt-out mechanisms.28
In addition, at the end of 2011, the Digital Advertising Alliance, which represents the leading
marketing associations, released its “Self-Regulatory Principles for Multi-Site Data” that established
industry standards governing the use of so-called "multi-site data," which is web browsing
information collected from a computer or other device over an extended time period and across nonaffiliated websites. The principles exempt certain practices, including the collection of data for
system management, market research or product development, or where the data has or will go
through a "de-identification process," which is defined as when an entity "has taken reasonable steps
to ensure that the data cannot reasonably be re-associated or connected to an individual or connected
to or be associated with a particular computer or device."29
C. 'Do Not Track'
The FTC, in its 2010 staff report, enunciated a privacy framework, including explicit support
for a so-called "Do Not Track" option to allow users to limit the collection and use of data regarding
their online searching and browsing activities, such as through the placement of a persistent setting
25
Commercial Privacy Bill of Rights Act of 2011, S. 799, 112th Cong. § 202 (2011).
26
The FTC issued its final report on protection of privacy in March 2012. See FED. TRADE COMM’N, PROTECTING CONSUMER
PRIVACY IN AN ERA OF RAPID CHANGE: RECOMMENDATIONS FOR BUSINESS AND POLICYMAKERS (Mar. 2012), available at
http://ftc.gov/os/2012/03/120326privacyreport.pdf. See also Adam M. Veness, FTC Issues Long-Awaited Privacy Report, NAT’L
L. REV. Mar. 26, 2012. See also John Kerry, John Kerry: We Need A Commercial Privacy Bill of Rights, THINK PROGRESS (Mar.
21, 2012), http://thinkprogress.org/justice/2012/03/21/449508/john-kerry-commercial-privacy-bill-of-rights/?mobile=nc.
27
Iab, supra note 21.
28
Press Release, Better Bus. Bureau, Accountability Program Achieves Voluntary Compliance with Online Behavioral Advert.
Self-Regulation (Nov. 8, 2011).
29
Digital Advert. Alliance, Self-Regulatory Principles for Multi-Site Data, 8 (Nov. 2011), available at
http://www.aboutads.info/resource/download/Multi-Site-Data-Principles.pdf.
147
Spring 2013 │ Volume 20 │ Number II
on the consumer’s browser signaling the consumer’s privacy choices.30 The FTC staff suggested that
such a mechanism should be different from the Do Not Call telemarketing program in that it should
not require a “registry” of unique identifiers.31 In its view, the most practical method would likely
involve the placement of a persistent setting, similar to a cookie, on the consumer’s browser
signaling the consumer’s choices about being tracked and receiving targeted ads.32
Both Internet Explorer33 and Firefox have added Do Not Track capabilities to their most recent
browsers, though a spokesman for Mozilla’s Firefox web browser stated that about 5% of desktop
users have turned on the Do Not Track tool (as compared with 17% of mobile users).34 For users of
the browser tool, it is up to the visited websites to honor users' Do Not Track requests and ultimately,
it may be difficult for a user to ascertain which websites and ad networks are respecting their choices.
In response to this inherent problem, the World Wide Web Consortium, an industry group, released a
draft of Do Not Track standards that define the methods for users to indicate their preferences,
techniques for websites to inform users whether they honor Do Not Track preferences, and a
mechanism for permitting the user to grant site-specific exemptions to their Do Not Track
preference.35
D. Geolocation
The latest generation of smartphones used by consumers lend themselves to numerous other
uses beyond basic communication, including mapping and GPS functionalities and a myriad of
downloadable personal or business applications—or "apps." Because consumers carry their mobile
devices with them at all times, marketers see great potential in providing consumers with real-time,
location-based advertising.36 There are two principal ways location-based advertising works.
Geolocation social networks, such as Foursquare, permit users to share their location with friends by
"checking-in" to an establishment or venue, which often gives rewards to frequent visitors.37 In
addition to business listings and map locations served on request and ranked by proximity to the user,
30
FED. TRADE COMM’N, supra note 22.
31
Id. at 67.
32
Id. at 66.
33
Nick Wingfield & Julia Angwin, Microsoft Adds Do-Not-Track Tool to Browser, WALL ST. J. (Mar. 14, 2011), available at
http://online.wsj.com/article/SB10001424052748703363904576200981919667762.html. See Michael Muchmore, The State of
'Do Not Track' in Current Browsers, PCWORLD (Mar. 27, 2012), http://www.pcmag.com/article2/0,2817,2402168,00.asp. See
also MOZILLA FIREFOX. Do Not Track, http://dnt.mozilla.org/.
34
Alex Fowler, Mozilla Publishes Developer Guide on DNT; Releases DNT Adoption Numbers, MOZILLA PRIVACY BLOG (Sept.
8, 2011), http://blog.mozilla.com/privacy/2011/09/08/mozilla-publishes-developer-guide-on-dnt-releases-dnt-adoption-numbers/.
35
See Roy T. Fielding & David Singer, Tracking Preference Expression (DNT), Working Draft, WORLD WIDE WEB
CONSORTIUM, (Mar. 13, 2012), http://www.w3.org/TR/tracking-dnt/. See also Roy T. Fielding, Tracking Preference Expression
(DNT), Working Draft, WORLD WIDE WEB CONSORTIUM, (Nov. 14, 2011), http://www.w3.org/TR/2011/WD-tracking-dnt20111114/.
36
See Adrianne Jeffries, For Advertisers, Location-Based Services "Blew Up Overnight," READWRITEWEB (Sept. 8, 2010),
http://www.readwriteweb.com/archives/for_advertisers_location-based_services_blew_up_ov.php.
37
See FOURSQUARE, https://foursquare.com/about/ (last visited Apr. 1, 2012). See also Corina Mackay, The Future of
Geolocation: What is Coming?, SOCIAL MEDIA EXAMINER (Apr. 21, 2011), http://www.socialmediaexaminer.com/the-future-ofgeolocation-what-is-coming/.
148
Media Law & Policy
providers are also rolling out location-based mobile advertising platforms that would serve ads to
users' mobile phone based on their movements.38
Given the personal nature of geolocation, it is not surprising that disputes have arisen over its
alleged misuse. For example, in In re iPhone Application Litigation, users claimed that Apple
violated their privacy rights by unlawfully allowing third-party apps that run on the iPhone and iPad
to collect and make use of, for commercial purposes, personal consumer information (including
address book, cell phone numbers, geolocation, photographs, SIM information) without user
consent.39 Plaintiffs claimed that such data could be merged to effectively “deanonymize”
consumers.40 The court dismissed the action for lack of standing, with leave to amend.41 The court
found that plaintiffs failed to allege a tangible injury, particularly since the complaint failed to
particularize which apps tracked their data, the resulting harm and Apple’s culpable conduct.42,43
In addition, Apple argued that its terms of service barred claims stemming from third-party
apps (e.g., “The Application Provider of each Third-Party Product is solely responsible for that
Third-Party Product”).44 Apple also argued that claims based on the design of the iPhone operating
system were barred by the iOS Software License Agreements.45 The court declined to rule that the
licenses were an absolute bar, but ordered plaintiffs to explain in an amended complaint why Apple
shouldn’t be immunized from suit based upon its terms of service.46 The court also found the
plaintiffs’ Computer Fraud and Abuse Act (CFAA) claim deficient, because, among other things,
negligent software design cannot form a CFAA computer fraud claim.47
In response to privacy concerns over geolocation, the mobile phone industry and Congress
have advanced potential solutions. There were at least two bills introduced into Congress concerning
geolocation privacy.48 The Senate bill would require any company that obtaining a customer’s
38
See Erin Griffith, Is Location-Based Mobile Advertising Real? Answer: yes, according to LocalResponse, Adweek (Oct. 13,
2011), available at http://www.adweek.com/news/technology/location-based-mobile-advertising-real-135758. See also Ryan
Kim, Mobile advertisers paying 4x more for location-based impressions, GIGAOM (Nov. 2, 2011),
http://gigaom.com/2011/11/02/mobile-advertisers-paying-4x-more-for-location-based-impressions/.
39
40
In re iPhone Application Litigation, No. 11–MD–02250–LHK, 2011 WL 4403963 at *2 (N.D. Cal. Sept. 20, 2011).
Id.
41
Id. at *7.
42
Id. at *4.
43
See also Low v. LinkedIn, No. 11–CV–01468–LHK, 2011 WL 5509848 (N.D. Cal. Nov. 11, 2011) (plaintiffs alleged that a
social media site disclosed “personally identifiable browsing histories” to third-party advertising companies via cookies; court
dismissed the action, with leave to amend, for lack of Article III standing due to the plaintiffs' failure to allege a particularized
harm).
44
45
Id. at *7.
Id.
46
Id. at *8.
47
Id. at *11.
48
See Location Privacy Protection Act of 2011, S.1223, 112th Cong. (2011). See also Geolocation and Privacy Surveillance
(GPS) Act, S. 1212, 112th Cong. (2011). See also Geolocation and Privacy Surveillance (GPS) Act, H.R. 2168, 112th Cong.
(2011).
149
Spring 2013 │ Volume 20 │ Number II
location information from his or her smartphone or other mobile device to (1) get that customer’s
express consent before collecting the location data; and (2) get that customer’s express consent
before sharing the location data with third parties.49
E. Regulatory Future
The growth of geolocation and other new technologies brings the promise of innovative ways
to provide consumers with better products and services. However, advances in such technologies stir
up privacy concerns. With the release of the online marketing's industry's latest consumer privacy
initiatives, it remains to be seen whether such self-regulatory efforts -- the behavioral advertising
principles, the ‘Advertising Option Icon’, the multi-site principles -- will satisfy the FTC and
members of Congress currently considering limits on the practice of behavioral advertising and data
tracking.
III. LIABILITY ISSUES
As the Internet is being accessed through computers, smartphones, and tablets, consumers,
rulemakers, and advertisers alike, are all still discovering the extent to which the broad reach of the
Internet can be both helpful and harmful. A number of areas of regulation are fairly unexplored. As a
result, certain aspects of Internet use, including use of behavioral/targeted advertising, raise many
new and unforeseen legal issues.
Similar to the area of behavioral advertising, another unexplored territory that has become
exponentially more serious and complicated due to the growth of the Internet is contributory
trademark infringement. Part of the reason for an increase in focus in the legal arena results from the
difficulty in tracking the infringers, and the ease of infringement from overseas. This specific area of
trademark infringement is tied to the increase in unauthorized sales of goods and sales of knockoff
products. As a result of this ability of others to use the Internet for such purposes, trademark owners
have shifted their focus to contributory infringers, such as service providers and payment processors,
instead of those parties directly infringing on their trademark.50 The article also explores the state of
online trademark infringement and the growing trend of the courts finding service providers,
payment processors, or online advertisement network providers liable for contributory trademark
infringement. The authors also discuss notice and takedown procedures through various court
decisions.
IV. ROLE OF THE INTERNET IN CONTRIBUTORY TRADEMARK INFRINGEMENT
The ubiquity of the Web, on computers, mobile phones, and tablets, offers businesses the
opportunity to connect with consumers throughout the world in ways they never could before.
Unfortunately, along with the success of legitimate e-commerce, the distribution and sale of
counterfeit products through professional-looking websites has also increased dramatically,
particularly in the clothing, consumer electronics, pharmaceutical and footwear industries.
49
S.1223, § 3.
50
See Press Release, Dep’t of Justice, Federal Courts Order Seizure of 150 Website Domains Involved in Selling Counterfeit
Goods as Part of DOJ, ICE HSI and FBI Cyber Monday Crackdown (Nov. 28, 2011). See also Press Release, U.S. Immigration
& Customs Enforcement, Sweetheart, but fake, deals put on ICE "Operation Broken Hearted" protects consumers from
counterfeit Valentine's Day goods (Feb. 14, 2011). See also Louis Vuitton Malletier SA v. Akanoc Solutions, Inc., 658 F.3d 936
(9th Cir. 2011).
150
Media Law & Policy
While estimates of the harm differ greatly among analysts, the sale of counterfeit and knockoff
goods has been reported to cost American creators and producers billions of dollars per year.51
Online infringement harms many facets of the economy: trademark owners suffer lost sales and lost
brand value; consumers receive inauthentic products, or, at worst, dangerous goods; and federal and
state governments lose tax revenues and incur law enforcement costs.52 In many cases, consumers
are not fully aware of the nature of a transaction, since such virtual stores have legitimate-sounding
domain names, often accept payment through major credit card companies, and run online
advertisements from trusted providers, all portraying the appearance of legitimacy.
As part of the task of policing their marks, many trademark owners maintain a close watch on
counterfeit goods on the Internet and take an aggressive stance against unauthorized uses and sales,
including bringing suit against sellers of knockoff goods. However, many so-called rogue web
sellers are located abroad and rely solely on digital means to communicate, making it especially
difficult to locate and permanently shut them down. As a result, trademark owners have begun to
seek recovery from a number of third-party online entities, including Internet service providers,
payment processors, and online ad network providers, all of whom may play some role (knowingly
or unknowingly) in enabling consumers to access an infringing website, purchase content and
products, and view advertisements.
This section will discuss contributory trademark infringement in general and recent actions by
trademark owners against online service providers for contributory liability for the sales of
counterfeit goods. It will also review the ongoing Congressional debate surrounding online
intellectual property infringement.
A. Contributory Infringement
Contributory trademark infringement is a judicially created doctrine that derives from the
common law of torts. There are two ways in which a party may commit contributory infringement:
first, if a provider “intentionally induces another to infringe a trademark,” and the second, more
commonly pled theory, if a provider “continues to supply its [product or service] to one whom it
knows or has reason to know is engaging in trademark infringement.”53 On its face, the Inwood test
applies to manufacturers and distributors of goods. However, courts have extended the test to service
providers that exercise sufficient control over the means of the infringing conduct. Indeed, several
circuit courts have determined that a plaintiff must establish that the service provider have “direct
control and monitoring of the instrumentality used by a third party to infringe.”54
B. Notice and Takedown Principles
51
Press Release, Patrick Leahy, U.S. Sen. for Vt., Senators Introduce Bipartisan Bill To Combat Online Infringement (Sept. 20,
2010). See also Targeting Websites Dedicated to Stealing American Intellectual Property: Hearing Before the S. Comm. on the
Judiciary, 112th Cong. (2011) (Statement of Al Franken, U.S. Sen. for Minn.).
52
See Press Release, Patrick Leahy, U.S. Sen. for Vt., Senate Judiciary Committee Unanimously Approves Bipartisan Bill To
Crack Down On Rogue Websites (May 26, 2011). See also The Preventing Real Online Threats to Economic Creativity and Theft
of Intellectual Property Act: Hearing Before the S. Comm. on the Judiciary, 112th Cong. (2011) (Statement of Patrick Leahy,
U.S. Sen. for Vt.).
53
Inwood Labs., Inc. v. Ives Labs., Inc., 456 U.S. 844, 854 (1982).
54
See Lockheed Martin Corp. v. Network Solutions, Inc., 194 F.3d 980 (9th Cir. 1999). See also Perfect 10, Inc. v. Visa Intern.
Service Ass'n, 494 F.3d 788 (9th Cir. 2007). See also Tiffany (NJ) Inc. v. eBay Inc., 600 F.3d 93 (2d Cir. 2010).
151
Spring 2013 │ Volume 20 │ Number II
Ultimately, the contours of contributory trademark liability are fashioned by the courts. The
Digital Millennium Copyright Act's (DMCA) safe harbors protect qualifying websites and online
service providers from copyright liability, and essentially seek to offer strong incentives for service
providers and copyright owners to cooperate and deal with online copyright infringement.55 While
there is no similar statutory counterpart under trademark law, in recent years, trademark holders and
online providers have borrowed the principles from the DMCA safe harbors in creating a de facto
notice and takedown regime to combat the online sale of counterfeit or unauthorized goods. While
not mandated by statute, recent court decisions have underscored the importance for online providers
of instituting a program for responding to trademark-related takedown notices.
One of the most notable decisions that affirmed this idea was Tiffany (NJ) Inc. v. eBay, Inc., in
which an appeals court upheld the judgment in favor of the defendant on the plaintiff's trademark and
dilution claims.56 In that case, the district court found, after a bench trial, that eBay, an online
marketplace, had generalized knowledge that some portion of the Tiffany goods sold on its website
might be counterfeit, but that such knowledge was insufficient to impose a duty upon eBay to remedy
the problem.57 As such, the court found that eBay was not liable for contributory trademark
infringement.58
The court specifically held that eBay was not willfully blind and did not ignore the information
it was given about counterfeit sales on its website.59 Rather, eBay spent millions of dollars to
identify and remove counterfeit listings and consistently developed and improved its anti-fraud
measures.60 The court rejected the plaintiff’s argument that generalized notice that a percentage of
the plaintiff’s goods being sold on the defendant’s site were counterfeit required the site to
preemptively remedy the problem.61
C. Liability for Online Service Providers
Websites selling counterfeit or knockoff goods can be elusive since they are often located
abroad, can quickly reappear under a different domain name following a cease and desist letter or
adverse judgment, and have no appreciable assets for a plaintiff to recover.62 As such, aggrieved
trademark holders have begun to allege contributory infringement claims against various online
55
Digital Millennium Copyright Act, 17 U.S.C. § 512 (1998).
56
Tiffany, supra note 54.
57
Id. at 107.
58
Id. at 109.
59
Id. at 110.
60
Id. at 100, 109.
61
Id. at 106. See also Sellify Inc. v. Amazon.com, Inc., No. 09 Civ. 10268(JSR), 2010 WL 4455830 (S.D.N.Y. Nov. 4, 2010)
(contributory trademark infringement claims dismissed because there was no evidence that Amazon.com had particularized
knowledge of, or direct control over, its affiliate’s disparaging, keyword-triggered ads and when Amazon gained knowledge of
the ads, it acted promptly to disable the affiliate’s account).
62
Press Release, Dep’t of Justice, Federal Courts Order Seizure of 150 Website Domains Involved in Selling Counterfeit Goods
as Part of DOJ, ICE HSI and FBI Cyber Monday Crackdown (Nov. 28, 2011). See also Press Release, U.S. Immigration &
Customs Enforcement, Sweetheart, but fake, deals put on ICE "Operation Broken Hearted" protects consumers from counterfeit
Valentine's Day goods (Feb. 14, 2011).
152
Media Law & Policy
providers that materially contribute to an online retailer’s ability to make a profit off of counterfeit
goods. These parties enable U.S. consumers to access the infringing website, purchase content and
products, and view advertisements; without the services provided by these entities, the financial
incentive to run an infringing website is greatly diminished. In the past year, at least two notable
online trademark disputes went to trial, with juries finding in favor of the trademark owner.
In Louis Vuitton Malletier SA v. Akanoc Solutions, Inc., the Ninth Circuit affirmed a jury
verdict of contributory trademark infringement against a web host that ignored multiple takedown
notices and knowingly enabled infringing conduct by leasing packages of server space, bandwidth
and IP addresses to foreign-based websites that sold the plaintiff’s knockoff goods.63 To prevail, the
plaintiff had to establish that the defendant continued to supply its services to one who it knew or had
reason to know was engaging in trademark infringement and that the defendant had direct control and
monitoring over the “means of infringement.”64 The court rejected the defendant’s argument that the
servers and internet services provided were not the “means of infringement,” rather that the websites
themselves were the sole means of infringement.65 Instead, the appeals court stated that even though
they exist in cyberspace, “websites are not ethereal” and would not exist without physical roots in
servers and internet services and that defendants had direct control over the “master switch” that kept
the websites online.66
In another dispute, a golf equipment company brought suit against, among others, the web
hosting company that participated in the design and support of the websites selling knockoff golf
gear.67 While the defendant web host denied any knowledge that its clients were selling counterfeit
golf clubs, the plaintiff countered that beyond offering hosting services, the defendant provided extra
coaching and counseling advice to the site operators on search engine optimization, website
development, and locating preferred vendors, and otherwise should have known about the nature of
the site given its domain name, <www.copycatclulbs.com> and its slogan as the “one stop shop for
the best COPIED and ORIGINAL golf equipment on the internet.”68 At trial, a jury found the web
host liable for willful secondary trademark infringement and awarded the plaintiff over $770,000 in
damages.69
Another dispute involving trademark holders was resolved after the threat that a contributory
infringement claim might proceed to trial. In Gucci America, Inc. v. Frontline Processing Corp., the
court found that a national retailer could proceed with contributory infringement claims against
various credit card processors based upon sufficient allegations that the providers exerted sufficient
control over the infringing transactions and knowingly provided its services to an internet merchant
63
Louis Vuitton Malletier SA v. Akanoc Solutions, Inc., 658 F.3d 936, 940, 941 (9th Cir. 2011).
64
Id. at 942.
65
Id.
66
Id. at 942-943.
67
Roger Cleveland Golf Co., Inc. v. Prince, No. 09-02119 (D. S.C. filed Mar. 14, 2011).
68
Roger Cleveland Golf Co., Inc. v. Price, No. 2:09-CV-2119-MBS, 2010 WL 5019260, at *1, *3
(D. S.C. Dec. 3, 2010).
69
Roger Cleveland, supra note 67.
153
Spring 2013 │ Volume 20 │ Number II
that sold “replica” products.70 The court denied the defendants’ motion to dismiss, concluding that
the defendants facilitated the replica website’s ability to efficiently transact sales for counterfeit
products by enabling customers to use personal credit cards to pay for purchases.71
The court found that the plaintiff made substantial allegations that the defendants knew that the
replica site traded in counterfeit products, or were willfully blind to that fact, including: one
defendant charged a higher transaction fee for processing credit cards for high risk replica goods
merchants; and another helped the counterfeit goods website set up a system to avoid chargebacks,
requiring customers to check a box that said “I understand these are replicas” and otherwise assisted
in refund requests from customers that necessitated an investigation of products sold.72
Notably, the Gucci court distinguished the case from Perfect 10, Inc. v. Visa Int’l Service
Ass’n, where the Ninth Circuit declined to hold a credit card processor liable for contributory
trademark and copyright infringement for the unauthorized reproduction and display of Perfect 10’s
images by certain websites and users.73 The court pointed out that in the Perfect 10 dispute, the
plaintiff failed to allege that the credit card service provider had the “power to remove infringing
material” because the infringement occurred on the third-party websites and a credit card transaction
was not needed for the websites to continue posting infringing photographs.74 In the Gucci case,
however, the court stated that the plaintiff’s allegations were concerned primarily with the sale of
tangible counterfeit goods to customers, which allegedly could not be accomplished without the
defendants’ ability to process the credit card-based purchases.75
Beyond payment processors and website design and management providers, at least one court
has considered the secondary liability (in the copyright context) of an online advertising network
company that placed third-party advertisements on an allegedly infringing website and shared the
proceeds with the website owner. In Elsevier Ltd. v. Chitika, Inc., the court found that an online
advertising provider that was not familiar with the content of an allegedly infringing free download
site and had not received any notice of infringing activity from the plaintiff was not liable for
contributory copyright infringement.76 The court also noted, in dicta, that the defendant did not
“materially contribute to the infringement” merely because the shared advertising revenue made it
easier for the website owner’s infringement to be profitable.77
D. ‘Rogue Website’ Legislation
Recent court decisions have given trademark holders some ammunition in seeking recovery for
infringement against responsible service providers. Regardless, rights holders maintain that they still
70
Gucci America, Inc. v. Frontline Processing Corp., 721 F.Supp.2d 228, 253 (S.D.N.Y. 2010).
71
Id. at 252-253.
72
Id. at 249, 252.
73
Perfect 10, Inc. v. Visa Inte’l Service Ass’n, 494 F.3d 788, 804-805 (9th Cir. 2007).
74
Id. at 807.
75
Gucci America, supra note 70, at 252-253.
76
Elsevier Ltd. v. Chitika, Inc., No. 11–10026–RGS, 2011 WL 6008975 at *4-5, (D. Mass. Dec. 2, 2011).
77
Id. at *5-6.
154
Media Law & Policy
possess a limited number of effective remedies to fight online purveyors of infringing goods,
particularly legal tools that would hamper websites located abroad from continuing to sell infringing
goods on the Internet.78,79
V. CONCLUSION
As this piece illustrates, the Internet is a vast, ever-changing, and expanding technology that
continues to create new and unforeseen legal issues for regulators, advertisers, and consumers alike.
78
Press Release, Patrick Leahy, U.S. Sen. for Vt., Leahy: Senate Should Focus On Stopping Online Theft That Undercuts
Economic Recovery (Jan. 23, 2012).
79
Congress has tried to seek a legislative solution that would give the Department of Justice and content owners an expedited
process for cracking down on U.S.-directed foreign rogue websites that traffic in pirated or counterfeit goods or digital
entertainment.
155
Spring 2013 │ Volume 20 │ Number II
156
Media Law & Policy
THE LEGAL PROTECTION OF EUROPEAN BROADCASTERS – CHALLENGES
POSED BY NEW SERVICES
Peter Matzneller*
Anne Yliniva-Hoffmann**
I. INTRODUCTION
Digitisation and convergence, especially the enormous increase in capacity and performance in
the case of Internet access, computers and storage media, have simplified and speeded up the
distribution and consumption of programme content. This impacts on all electronic media, but
particularly on broadcast services, under the European definition. In addition to the growth in the
number of legal services, piracy has benefited from the greater efficiency of the new technologies.
Digital signals can be copied in high quality and distributed, and programmes delivered via the
Internet are particularly vulnerable. The programme-carrying signals are often the direct objective
and “quarry” of the pirates, and broadcasters are trying to protect their signals by technical means.
Digital identification systems, such as watermarks and fingerprints, are suitable for marking and
recognising stolen signals and are being employed. There are also technical protection measures to
prevent unauthorised access to and/or the (further) use of the audiovisual content. The problem of
protecting the broadcast signal has been raised once again, and perhaps even more clearly than in the
past, as a result of the considerable stepping up of the broadcasters’ own Internet activities, that is to
say the live broadcasting of programmes using this particular distribution channel (web- and
simulcasting) and making available to the user for individual access at any time and place
audiovisual content that has already been broadcast or is scheduled to be broadcast in the near future.
This also applies, incidentally, to services available from broadcasters for mobile reception devices.
All this once again raises the question of whether the protection granted broadcasters is sufficient. Is
the existing legal framework capable of meeting the challenges brought about by technological
progress and the introduction of new business models?
The protection of broadcasters is governed by an entire range of legal provisions at both
international and Council of Europe level, as well as by EU law. These measures will not be outlined
individually here as they were the subject of an earlier article.1 It is worth briefly mentioning the
considerable degree of heterogeneity that characterises these provisions. This applies for example to
the definition of broadcasting - in the European rather and U.S. sense - as the subject of legal
protection. In some cases, it does not cover the distribution of broadcast signals via wire-bound
technologies or sometimes only refers to television (as in the U.S.) and often – at least explicitly –
does not include distribution using new transmission channels, such as the Internet or the mobile
telephone networks. Especially in the latter context, it must be assumed that the legal instruments
* Research Associate at the Institute of European Media Law (EMR), Saarbrücken/Brussels. B.A., Leopold-Franzens University
(2007); LL.M. Eur., Europa-Institute at University of Saarland (2009).
** Institute for Eurpoean Media Law (EMR), Saarbrücken/Brussels.
1
See Lucie Guibault & Roy Melzer, The Legal Protection of Broadcast Signals, 2004-10 IRIS PLUS, LEGAL
OBSERVATIONS OF THE EUROPEAN AUDIOVISUAL OBSERVATORY (2004), available at
http://www.obs.coe.int/oea_publ/iris/iris_plus/iplus10_2004.pdf.en.
157
Spring 2013 │ Volume 20 │ Number II
mainly leave out of account those transmissions preceded by an individual user request. Both
programmes broadcast originally on the Internet in linear form (webcasting) and non-linear
programmes (on-demand services) are consequently not protected. This inconsistency concerning the
level of protection intended also exists in other areas, for example with regard to the actions for
which broadcasters are granted exclusive exploitation rights after an item has been broadcast.
Differences also exist in the way in which any public or third party interests that may stand in the
way of comprehensive protection are mentioned.2 The extent and content of provisos and derogations
accordingly differ, for example on the question of reporting daily news events, on use for science and
research purposes, on private use and so on.
In many cases, the inconsistency in the amount of protection afforded in this context continues
at the national level. It is also due to the fact that, although international legal instruments normally
lay down a minimum degree of protection, states can go further either individually or collectively
(for example in connection with the harmonisation of provisions through EU law).3 This may seem
surprising bearing in mind the increased global dimension of audiovisual content distribution
resulting from the digitisation and convergence process (especially in the form of the Internet). This
may explain the need for reform perceived by many observers.
This article primarily discusses the protection afforded the European broadcaster’s
programme-carrying signal as the object of the copyright-related protection that it has been granted.
It also includes a discussion of the idea that some broadcasters can enjoy copyright protection with
regard to programme content on the basis of either primary or derived law. Furthermore, it takes
account of the fact that the extent of the broadcaster's legal protection is also determined by the
nature of the authorisation rights4 granted to copyright holders and by the extent to which reference is
made to the latter.5 The protection of the broadcast signal is based on the (technical and
organisational) efforts made by the broadcaster for transmission purposes. Broadcasters should not
have to tolerate third parties benefiting from their investments without being able to defend
themselves. Here, the parallel to the protection under competition law provided at the domestic level
becomes clear (protection against the unlawful exploitation of another’s work – “business
parasitism”; prohibited competitive edge brought about by a breach of the law). It will accordingly
also be necessary to discuss some issues connected with this.
In the following, the challenges and problems caused by current developments will be
discussed in depth (section II). An overview will then be provided of the present state of the debate
on whether and, if so, to what extent broadcasters need new or additional legal protection (section
III). A brief summary of the conclusions drawn is provided in section IV.
2
See the overview of the individual measures in the ZOOM part of this IRIS plus.
3
For reasons of space, it is not possible here to provide a more comprehensive review of the protection of broadcasters provided
by national provisions, whether it be the protection of copyright or copyright-related rights or both.
4
This means the exclusive (exploitation) rights to which the rightsholder is entitled with respect to permitting or prohibiting the
use of its works, i.e. granting or refusing usage rights. If national law permits the use without requiring permission in certain
defined cases or following an examination and a consideration of the mutual interests involved in an individual case, then the
authorisation right is (usually) replaced by the right to appropriate remuneration. As far as retransmission by cable is concerned,
where the transmission right is affected as a sub-right of the right of public performance, collecting societies exercise the power
to grant usage rights, but this does not apply to a broadcaster’s own programmes.
5
See A. Blocman, Conseil d’Etat Cancels the Conventions of Two Terrestrially Broadcast Digital TV Channels, 2008-5 IRIS
PLUS, LEGAL OBSERVATIONS OF THE EUROPEAN AUDIOVISUAL OBSERVATORY, 7-8 (2008).
158
Media Law & Policy
II. NEW OFFERS OF AUDIOVISUAL PROGRAMME CONTENT AND THE PROTECTION OF
BROADCASTERS
In this age of digitisation and convergence, the broadcast signal can be captured in various
ways: apart from the permission-free use of programme content by “viewing” or “listening,” there is
also the possibility of (direct) access to the signal, which can be obtained for example by breaching a
conditional access system or through the unauthorised onward transmission of the signal. In addition,
the signal can be (indirectly) used for offering already broadcast content for downloading or
distribution via so-called streaming. It is first necessary to store the signal before it is retransmitted.
The possibility for the user to access programmes that have already been broadcast is increasingly
becoming the focus of attention.
The following selection of types of use made possible by new business models is based on the
circumstances in which the user seeks access to the broadcast signal or its content. Portals and
navigators are examples of arrangements that make it easier for the user to choose from various
programmes or locate a specific programme (see II.1. below). In the case of virtual video recorders
and "intelligent recording software," the primary aim is to satisfy the user’s interest in storing
programme content already selected (II.2.). So-called peer-to-peer technologies turn the (mere)
receiver into a device for offering content to additional users at the same time (II.3.). Programs or
devices that make it possible to circumvent measures that provide protection against the unauthorised
use of conditional access services enable content that is not (legally) available in this way to be
accessed (II.4.). While the applications mentioned normally target private use, the very popular bigscreen showings of major sports events constitute a special form of the public use of television
programmes. Although they are permission-free for the viewers themselves, this raises a number of
questions for the organisers of such events (II.5.). Here, as in the case of ad-skipping technology or
the ability to supplement the television signal with Internet content accessible on the screen (II.6.),
the interest of third parties in offering services that exploit the attractiveness of the content carried by
the broadcast signal in pursuit of their own aims, including commercial objectives, becomes
particularly clearly evident.
It emerges that, depending on the situation, various intellectual property rights and
authorisation rights of broadcasters may be affected. However, unlawful interference with rights
granted does not always occur. Given the services and technologies now available, it is hard to avoid
the impression that they have often been conceived with certain “gaps” in the broadcasters’
protection in mind. For example, they take advantage of any technical criteria limiting the application
of the (related) rights or – adopting the user perspective – are tailored to existing exceptions from the
protection of the signal and limitations to that protection. Here, the question of the lawfulness of a
private copy and the amount of scope allowed for its use becomes relevant again and again.
A. Portals and Navigators
A number of interesting services enable the user to access audiovisual content (that is being or
has been transmitted by the broadcaster) by “sorting” the items available. Such portals may supply
professionally produced content only (II.1.1.) or they may also be based on content made available
by users themselves. However this “user-generated content” (UGC) may contain legally protected
material owned by third parties (II.1.3.). Combinations of the two types of content may be found at
one and the same portal. Electronic programme guides, as an advanced form of navigator, have a
function comparable to that of a portal in the sense described above (II.1.2.). Some portals give
159
Spring 2013 │ Volume 20 │ Number II
potential users the impression that they provide a largely fixed range of items while others serve as a
starting-point from which users can actually call up content by means of varying degrees of
interaction (own search and/or selection). The following examples show that this difference may
have a role to play for the legal assessment.
1. Portals
Portals are understood to be services that enable users to access programme content by taking
one or more selection steps. They are organised either in the form of real-time onward transmission
or make programmes available on a time-shifted basis.
a. Live or Library Access to Television Programmes
In a case brought by the Warner Bros. and Universal film studios against the online TV service
Zattoo, the Landgericht Hamburg (Hamburg Regional Court) ruled on 8 April 20096 that the
defendant was in breach of German copyright law.
With its portal Zattoo.de, Zattoo offers a service through which programmes are provided at
the same time as they are broadcast on public free-to-air television. In order to do this, it captures and
encrypts the broadcasters’ signals. To this end, the signals are not stored permanently but only
temporarily. The data are then forwarded to Zattoo’s registered customers, who can view the
programmes they want using the free software available. The transmissions are subject to territorial
limitations in accordance with the agreements reached with the broadcasters concerned. The service
is funded by advertising. In the case in issue, several feature films in which the plaintiff film studios
held the exclusive exploitation rights had been retransmitted via the Zattoo service. The public
service broadcasters ARD and ZDF had broadcast the films in question with the relevant licence
from the plaintiffs and at the same time permitted, subject to their agreement with the collecting
societies concerned, the simultaneous and unaltered retransmission via Zattoo. The plaintiffs
considered that their right in the public transmission had been breached and applied for an injunction.
The Regional Court allowed the claim for injunctive relief against Zattoo under section 97(1)
in conjunction with sections 2(1)(6), 2(2) and 15(2) of the Urheberrechtsgesetz (Copyright Act),7
stating that, according to the national treatment principle enshrined in section 121(4) of the Copyright
Act in conjunction with Article 2 and 5 of the Revised Berne Convention, the protection of the
United States based plaintiffs had to be assessed under German law. In the court’s opinion, contrary
to the assumption of the contracting broadcasters and Zattoo, the latter’s service could not be
classified as cable retransmission within the meaning of sections 20b and 87 of the Copyright Act, so
that the broadcasters had no effective contractual agreement to transfer the rights. Although the
wording of the Act allowed the term “cable system” to be interpreted to mean that it included the
network infrastructure used by Zattoo (the Internet), the historical context and the intention of the
legislature militated against such an interpretation. The court pointed out that when the rule was
introduced in 1998 in transposition of Directive 93/83/EEC8 it related to the retransmission of
6
Landgericht Hamburg [LG] [Hamburg Regional Court] Apr. 8, 2009 (Ger.), available at
http://www.landesrecht.hamburg.de/jportal/portal/page/bshaprod.psml;jsessionid=D0EE59E4F4B727BF37EAB3766448FAB8.jp
j4?showdoccase=1&doc.id=KORE220512009&st=ent.
7
Urheberrechtsgesetz vom 9. September 1965 [Urheberrechtsgesetz] [German Copyright Law], Sept. 9, 1965,
BUNDESGESETZBLATT, Teil I [BGBL. I] at 1273, last amended by Art. 2 Abs. 53 (Article 2, ¶ 53), Dec. 22, 2011, BGBL. I at 3044
(Ger.).
160
Media Law & Policy
programmes via the existing coaxial cable network. The technologies and business models for the
transmission of such programmes via the Internet did not yet exist. Nor did the preparatory
documents for the Act allow the conclusion to be drawn that the legislature intended the term “cable
system” to be understood without reference to a specific technology and therefore subject to change.
The same applied, the court went on, to the preparatory documents for the enactment of the directive
and for Article 11bis(1)(2) of the Revised Berne Convention, which explicitly made the exercise of
the broadcasters’ rights subject to the relevant domestic legislation. It was also necessary to note that,
according to the sytematic built into the law, a narrow interpretation had to be given to section 20b of
the Copyright Act, in which the statutory requirement for rights to be managed collectively by
collecting societies constituted considerable interference with freedom of contract. Consequently,
section 20b of the Copyright Act could not be applied to the service provided by Zattoo.9 The right
concerned was the right of public performance under section 15(2) of the Copyright Act, which
comprised the right of transmission (section 20) and the right to make publicly accessible (section
19a). However, Zattoo had no licence to exploit those rights and the permission of the film studios
themselves was required to retransmit the films on the Internet.
In this context, it is also worth mentioning the judgment of the Paris Tribunal de Grande
Instance (Regional Court) of 18 June 2010. The proceedings concerned an action brought by the
French private broadcasters M6 and W9 against the company SBDS Active, which provides the
Internet service tv-replay.fr.10 The main objective of the service is the collection and user-friendly
compilation of references to individual programmes in the freely available media libraries of
France’s best-known television channels (catch-up TV). The broadcasters considered the
unauthorised public transmission of their programmes to be a breach of their copyrights. In the
court’s opinion, however, the service only provides the user with assistance in finding the desired
programmes, whereas they are actually accessed via the original provider. The court therefore came
to the conclusion that a mere compilation of references did not constitute the public transmission of
the content and therefore rejected the plaintiffs’ claim of a breach of Article L 122-2 of the French
Intellectual Property Code.11
b. Indexing Services
Similar to the portal described above, there are other services that make audiovisual content
easily accessible to users. However, they do this without remaining on the surface of the web (in the
8
See id; Übergangsregelung bei Umsetzung der Richtlinie 93/98/EWG [Transitional provision in implementation of Directive
93/98/EEC] (1998) (especially in context of the cable retransmission right, see P. Bernt Hugenholtz, SatCab Revisited: The Past,
Present and Future of the Satellite and Cable Directive, 2009-8 IRIS PLUS, LEGAL OBSERVATIONS OF THE EUROPEAN
AUDIOVISUAL OBSERVATORY, (2009), available at http://www.obs.coe.int/oea_publ/iris/iris_plus/iplus8_2009.pdf.en.
9
German Patent and Trade Mark Office, Arbitration Board, Case Sch-Urh 07/08 (settlement proposal), Feb. 22, 2010.
10
Tribunal de grande instance [TGI] [ordinary court of original jurisdiction] Paris, June 18, 2010 (Fr.), available at
http://www.legalis.net/spip.php?page=jurisprudence-decision&id_article=2941.
11
The court also held that there had been no breach of the sui generis database protection right resulting from the transposition of
the Database Directive 96/9/EC. Although the television channel had set up a database, it could not prove that considerable
investments had had to be made for this, as required by Article L 341-1 of the Intellectual Property Code. The unfair competition
claim was also dismissed – M6 and W9 had claimed that their refinancing by carrying advertising was being made more difficult,
whereas tv-replay.fr was making money itself from the advertising on its website. However, the reason for dismissing this claim
was that M6 and W9 had advanced the same arguments as those already employed to support the allegation of a breach of
copyright.
161
Spring 2013 │ Volume 20 │ Number II
figurative sense) but locate items hidden in the depths of the Internet. As a rule, they supply
references to content for which they evidently lack the right of exploitation in the form concerned.
The indexing service TV Links was the subject of a legal dispute in the United Kingdom. It
provided links to other websites from which television programmes, films and similar items could be
called up. The court acquitted the company of the charge of copyright violation and therefore of a
breach of its duties as an Internet service provider. In the court’s opinion, merely providing links to
audiovisual content “directly” available on the Internet did not constitute a public performance.12
Also in the United Kingdom, the High Court recently delivered a judgment on the Usenet
indexing website Newzbin.13 This registration based service addresses its users as “members” and –
depending on the status acquired – calls on them “only” to collect sources of, inter alia, audiovisual
content on the Usenet or to add information on existing content and feed the file produced (so-called
“reports”) into a database. According to the operators of the website, about 250 such “editors” are
involved in this work. Depending on the nature of the membership rights, the sources can be
searched with varying ease. The court held that this service breached the ban on communicating
copyrighted works to the public without the rightsholder’s permission within the meaning of section
20(2)b of the Copyright, Designs and Patents Act 1988 (CDPA). The service, it said, was not limited
to merely making simple references available to television programmes, films, etc., but it offered its
users an active facility that extended far beyond that. As a result of the detailed configuration of the
premium membership area together with the additional options available (more precise searches,
automatic downloads) the operators of Newzbin had also conveyed the impression to their paying
members that they were authorised to grant permission to copy the film. Making available the
“reports” and technical user support and the fact that the service provider was aware that its conduct
was in breach of copyright was also to be seen as involvement in the breach of copyright by its users
resulting from their unlawful copying of copyrighted works within the meaning of section 16 of the
CDPA.14
Another case involves focusing on the technical aspects of the transmission of stored
audiovisual content to the user: in the case of streaming and so-called “progressive downloads” of
audio and video items, the content called up individually by the user is transmitted in packages.
Unlike "persistent downloads," the content begins to play before all of it has been transmitted.
Another difference from a download is that the content transmitted is not permanently recorded on
the user’s device because the data stream is normally only stored temporarily in the user’s cache.15 In
12
See Regina v. Rock & Overton, Crown Court at Gloucester, Feb. 9, 2010 (Eng.), available at
http://www.obs.coe.int/oea_publ/legal/reginavsrockoverton.pdf; see also David Goldberg, TV Links Acquitted of Copyright Theft
Charges, 2010-4:1/26 IRIS, LEGAL OBSERVATIONS OF THE EUROPEAN AUDIOVISUAL OBSERVATORY (2010), available at
http://merlin.obs.coe.int/iris/2010/4/article26.en.html.
13
See Twentieth Century Fox Film Corporation & Anor v. Newzbin Ltd [2010] EWHC (Ch) 608 (Eng.), available at
http://www.bailii.org/ew/cases/EWHC/Ch/2010/608.html.
14
Cf. Landgericht Hamburg [LG] [Hamburg Regional Court] Jan. 28, 2009 (Ger.), available at http://openjur.de/u/306525_u_255-07.html (Comparable situation in Germany, in which the court establishes that a Usenet service is liable for breaches of
copyright by its members if it is not only aware of the abuse of its service but clearly solicits this and makes software available
and considerably facilitates the imroper use of the Usenet).
15
See JURGEN ENSTHALER, HANBUCH URHEBERRECHT UND INTERNET (COPYRIGHT AND INTERNET GUIDE) 3 B 49 (2d. ed. 2010).
This has to be distinguished from so-called live streaming, for example of a broadcaster’s programme, where the relevant data
stream is transmitted by the provider at a fixed time (such as simulcasting in the form of the parallel transmission of a television
programme via the Internet).
162
Media Law & Policy
the case of streaming services, which are currently the subject of much discussion, the broadcast
signal and, often the logos of the television broadcasters are used without authorisation, and the
platform providers generate income from the programme concerned using their own marketing
concept (for example, “in-stream advertising”). They also benefit from the high carrying capacity and
the relatively low costs of setting up and maintaining the service. The portal kino.to,16 for example,
offers free downloads of films, series and documentaries in German via streaming. It also redirects
the user to websites where (normally illegally) copied films – allegedly in close co-operation with
kino.to – have been uploaded. The user can view the films offered at any time by means of Internet
access on his/her own PC. Here the question arises as to whether those who make use of such
offerings are also in breach of copyright if they produce an unauthorised copy. Depending on the
software employed to play the audiovisual content (video player), such a copy may be illegal when
the entire content rather than only parts of it are saved temporarily on the recipient’s PC and the
memory is not (automatically) deleted at comparably short intervals, for example when the computer
is shut down. German legal commentators generally agree that the private copying exception
pursuant to section 53(1) of the Copyright Act does not apply here because a copy, which was
obviously unlawfully produced or made publicly available, is being used for making a further copy
or copies.17
2. Electronic Programme Guides
Electronic programme guides (EPGs) are available to help viewers select the programmes they
want to watch. While the teletext service, which is incorporated by the broadcaster into the broadcast
signal, is text-based and often only contains brief items of information, EPGs, which are often
provided by third parties (manufacturers of reception devices such as set-top boxes or operators of
technical platforms such as cable networks), offer users more detailed information in the form of
overviews of programme schedules, text and (moving) images and, like a portal, “guide” them to the
programmes themselves. They are closer to the broadcast signal in the way they are organised and
their use is more akin to the traditional situation involving a (simple) television set. That is why they
will be discussed here in section II.1. and separately from hybrid TV (see II.6.2.).18
Problematic in this connection is the use by the EPG providers of accompanying materials
(text and, especially, images) owned by the television channels. These providers usually take the
content concerned directly from the information pages (“press lounges”) made available by the
broadcasters themselves. It is a matter of debate whether the accompanying materials in the EPGs
may be used “copyright-free” or whether the EPG providers have to acquire the necessary licences.
The Oberlandesgericht Dresden (Dresden Court of Appeal – OLG) decided on 15 December
2009 in appeal proceedings between the collecting society Verwertungsgesellschaft Media (VG
Media) and the online programme magazine tvtv.de that television broadcasters may demand a
licence fee for the EPG use of their programming information. With this decision, the OLG
16
Further information is available at:
http://rsw.beck.de/rsw/shop/default.asp?sessionid=681E4C40E7624985BAFDB1E615369699&docid=298438&highlight=kino.t
o.
17
Friedrich Radmann, Kino.ko – Filmegucken kann Sünde sein, 54 ZEITSCHRIFT FÜR URHEBER- UND MEDIENRECHT [Journal of
Copyright and Media Law] 387 (2010).
18
For further information on EPGs, see also Searching for Audiovisual Content, published by the European Audiovisual
Observatory, IRIS Special 2008-2.
163
Spring 2013 │ Volume 20 │ Number II
confirmed the lower court’s judgment and rendered it final.19 VG Media had demanded that tvtv.de
should not use for its EPG any of the text or images owned by the broadcasters represented by the
collecting society as the copyrights and related rights existing in the works had been granted to those
broadcasters. The OLG allowed VG Media’s application against tvtv.de to order it to cease copying
the text and images and making them publicly available on the Internet, basing its decision on section
97(1) of the Copyright Act in conjunction with sections 2(1)(1) and 2(1)(5) and sections 72(1), 19a
and 16. The defendant company, it said, could not rely on section 50 of the Copyright Act, which
permitted the use of copyrighted works in the case of reporting on daily news events because the text
and images used for the programme guide lacked the necessary connection to any event that had
taken place (the programme had yet to be broadcast).
Another interesting judgment in this context was delivered by the Bundesgerichtshof (Federal
Supreme Court – BGH) on 19 November 2009. First of all, that court established that the
unauthorised inclusion of 593 film stills in an online archive and making them available to view and
download did not constitute cinematographic exploitation within the meaning of section 91 of the old
version of the Copyright Act (now section 89(4)).20 This was not altered by the fact that the Internet
offering was advertised as an “online film scene archive.” The mere fact that the photographs
originated from a film did not mean their use could be regarded as cinematographic exploitation
within the meaning of section 91 of the Copyright Act, so the online database provider had not
breached the filmmaker’s right to cinematographic exploitation (of stills produced when making a
cinematographic work). At the same time, however, the BGH sent the case back to the Court of
Appeal, instructing it to examine once again to what extent the plaintiff was entitled to damages for a
breach of the right in the photographs pursuant to section 72 of the Copyright Act. For procedural
reasons, with which the BGH did not agree, the Court of Appeal had dismissed this claim despite
acknowledging that it subsisted in principle.
3. Portals Predominantly Designed for UGC
Platforms like YouTube, Google Video, Dailymotion, Clipfish, MyVideo and many others
offer users the possibility of making their own video content and/or content produced by them
publicly available and exchanging it among themselves. However, these platforms often contain
items that are, at least partially, protected by third party copyright and their use has not been
permitted by the relevant rightsholder. In many cases, the items consist of recordings from
broadcasters’ programmes that – illegally – find their way onto the video platforms. The platforms
co-operate in different ways with the rightsholders. First, television broadcasters have their own socalled “channels” on these websites; second, the portals employ technical measures to mark content
in order to meet their obligations to protect the copyright and related rights of third parties.21
19
Compare VG Media v. tvtv.de, Landgericht Leipzig [LG Leipzig] [Leipzig Regional Court] May 22, 2009 (Ger.), available at
http://openjur.de/u/31830.html, and VG Media v. tvtv.de, Oberlandesgericht Dresden [OLG Dresden] [Dresden Appeals Court]
Dec. 15, 2009 (Ger.), available at http://openjur.de/u/32285.html with VDZ v. VG Media, Landgericht Köln [LG Köln]
[Cologne Regional Court] Dec. 23, 2009 (Ger.), available at http://openjur.de/u/140813.html.
20
Bundesgerichtshof [BGH] [Federal Court of Justice] Nov. 19, 2009 (Ger.), available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh&Art=en&sid=d9b548f83e71a11d7287655e9a513e12&nr=52132&pos=0&anz=1.
21
For other instances of intermediary liability, especially (preventive) filtering obligations, see Christina Angelopoulos, Filtering
the Internet for Copyrighted Content in Europe, 2009-4 IRIS PLUS, LEGAL OBSERVATIONS OF THE EUROPEAN AUDIOVISUAL
OBSERVATORY 3 (2009), available at http://www.obs.coe.int/oea_publ/iris/iris_plus/iplus4_2009.pdf.en; see also Francisco Javier
164
Media Law & Policy
a. Mediaset v. YouTube
The Tribunale Ordinario di Roma (Rome District Court)22 decided on 16 December 2009 in
proceedings between the media company Mediaset and the video platform YouTube, which belongs
to Google, that YouTube had to delete all content complained about by Mediaset in this context.
Mediaset had accused the portal of making available illegally uploaded video and audio files
from broadcasts in which it held the rights, in particular episodes of the television programme
“Grande Fratello” (Big Brother). Mediaset demanded that the platform cease these activities and pay
damages of EUR 500 million for breach of copyright. In a decision on a part of the action, the court
allowed Mediaset’s application and ordered that the content in issue be taken down, stating that
YouTube was not to be regarded as a hosting provider but a publisher and was consequently fully
responsible for the published content. YouTube’s objection that its function was limited to making
web space available was, the court went on, untenable in view of its obvious and repeated conduct in
breach of copyright.
From the point of view of authors’ rights, the agreement announced at the end of July 2010
between the Italian collecting society Società Italiana degli Autori ed Editori (SIAE) and YouTube is
interesting in this connection.23 The agreement provided for the payment of compensation for
rightsholders if their copyrighted works are used in any form on the video platform. However, it is
not expected to have any influence on the above-mentioned proceedings as Mediaset is not
represented by SIAE.
b. Viacom v. YouTube
On 23 June 2010, a court in New York24 dismissed the action filed against YouTube by the
media company Viacom, to which, inter alia, the music channel MTV and the Paramount films
studios belong. The subject of the legal dispute was videos – including MTV videos – that users had
uploaded onto the platform without the rightsholders’ permission. Viacom saw in this a breach of its
reproduction, distribution and performance rights and accused YouTube of doing nothing to prevent
these rights’ violations and demanded damages.
The court dismissed this claim with reference to the provisions of the Digital Millennium
Copyright Act (DMCA).25 According to the limitation on liability contained in that Act, the operator
cannot be held liable for breaches of the law committed by third parties if it is not, and did not have
to be, aware of those breaches. In addition, it must work with the rightsholders and take down any
potentially infringing material without delay,26 and YouTube had met those obligations. Viacom
announced its intention to appeal against the decision.
Cabrera Blázquez, User-Generated Content Services and Copyright, 2008-5 IRIS PLUS, LEGAL OBSERVATIONS OF THE EUROPEAN
AUDIOVISUAL OBSERVATORY 5 (2008), available at http://www.obs.coe.int/oea_publ/iris/iris_plus/iplus5_2008.pdf.en.
22
Tribunale Ordinario di Roma, 16 dicembre 2009 (It.) available at http://www.tgcom.mediaset.it/res/doc/sentenzatribunale.pdf.
23
See Press Release, Società Italiana degil Autori ed Editori, SIAE and YouTube Sign a License Agreement (July 28, 2010),
available at http://www.siae.it/edicola.asp?click_level=0500.0100.0200&view=4&open_menu=yes&id_news=9444.
24
Viacom Int'l. Inc. v. YouTube, Inc., 718 F.Supp. 2d (S.D.N.Y. 2010).
25
Digital Millennium Copyright Act of 1998, 17 U.S.C. § 512 (2006).
26
17 U.S.C. §§ 512(c), (m), (n) (2006). See also Landgericht Hamburg [LG Hamburg] [Hamburg Regional Court], April 20,
2012 (Ger.), available at http://gmriccio.wordpress.com/2012/04/29/hamburg-district-court-gema-v-youtube-english-translation.
165
Spring 2013 │ Volume 20 │ Number II
B. Personal Video Recorders (PVRs) and Intelligent Recording Technologies (IRTs)
The term PVR refers to a service provider’s offer to record specific programmes and make
them available later for downloading. IRTs enable users to make copies of broadcast content both
from analogue radio and streamed Internet radio broadcasts.
1. Personal Virtual and Online Video Recorders
In order to be able to avail themselves of a PVR service, users have to register with the
relevant provider. In accordance with the procedure laid down by the provider, they determine what
programmes from what channels are to be recorded for them. The provider receives the broadcasters’
signals and records the programmes chosen by the user. The recording is then stored on the
provider’s hard drives in an online archive reserved exclusively for the registered user (“online video
recorder”). The user can access this archive at any time, download the recordings and/or store them
on his/her own PC.
a. ProSiebenSat1 and Others v. Shift.TV
In the cases of ProSiebenSat1 v. Shift.TV,27 RTL v. save.tv28 and RTL v. Shift.TV29 (all
decisions dating from 22 April 2009), the Bundesgerichtshof (BGH) considered PVRs and examined,
inter alia, whether the services concerned were in violation of broadcasting rights. The plaintiff
television stations regarded the PVR service as violating their broadcasting rights under section 87(1)
of the Copyright Act and sought injunctive relief, information and damages from the PVR providers.
The BGH initially examined whether storing the programmes in the user’s online archive
interfered with the broadcasters’ exclusive reproduction rights (sections 87(1)(2) and 16 of the
Copyright Act) and ruled that this was not the case. In principle, it said, recording programmes on the
user’s online video recorder interfered with the plaintiff’s reproduction rights as the PVR had to be
considered an “image and sound carrier” within the meaning of section 16 of the Copyright Act.
However, the question arose as to whether the provider or the user was the producer of the copy. The
lower court had regarded the provider as the producer as it offered an overall service package that, on
the basis of standard assessment criteria, was not limited to making storage space available.
Consequently, and also because the service was free of charge, the copy was not a private copy
within the meaning of section 53(1) of the Copyright Act. The BGH did not share this assumption,
stating that anyone who made the copy had to be assessed on the basis of purely technical and
mechanical criteria and, therefore, according to who physically makes it by technical means. If the
producer of the copy acted on the instructions of a third party who had it made for his/her own
private use, then under section 53(1), second sentence, of the Copyright Act the responsibility for this
act had to belong to the individual commissioning the copy. The key criterion here, in the court’s
27
Bundesgerichtshof [BGH] [Federal Court of Justice] Apr. 22, 2009 (Ger.), available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh
&Art=en&sid=b2ddd48d74f4aa0eea54f8d38aaf2ab0&nr=48391&pos=1&anz=2.
28
Bundesgerichtshof [BGH] [Federal Court of Justice] Apr. 22, 2009 (Ger.), available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh&Art=en&sid=7f170b3f18d677efe88700097d51e60b&nr=48390&pos=1&anz=2.
29
Bundesgerichtshof [BGH] [Federal Court of Justice] Apr. 22, 2009 (Ger.), available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh
&Art=en&sid=db97285140686c9068a05b3a52637261&nr=48686&pos=1&anz=2.
166
Media Law & Policy
view, is whether the producer in the case in issue merely acted “as a necessary tool”30 – exercising
the function of a duplicating device – or whether it “brings about a copyright-relevant use to an
extent that can no longer be reconciled with the private use exception.”31 In the first case, the court
went on, responsibility for making the copy had to be assumed to belong to the individual
commissioning it, in the second to the actual producer.32 In the second case, the consequence was
that neither the exception for private use pursuant to section 53(1), first sentence, of the Copyright
Act nor the limitation laid down in section 53(1), second sentence applied, as the copy was not free
of charge. As the facts had not been sufficiently clarified by the lower courts, the BGH decided that it
should be assumed in the defendant’s favour that the recording of the programmes chosen by the
customer had been made “fully automatically without any (human) outside influence” – in other
words that it had been produced by the customer. The BGH also discussed whether the
retransmission to the PVR of the programmes received via a (satellite) aerial breaches the right to
retransmit a broadcast (sections 87(1)(1) and 20 of the Copyright Act). A retransmission within the
meaning of the relevant provisions was, it said, to be understood to mean a simultaneous
retransmission. If it was assumed (as the BGH did) that the recording process – and in consequence
the use of the PVR – had been carried out by the customer, then the decisive issue was whether the
signal received by the defendant had been sent on simultaneously to the PVR. This question had to
be answered in the affirmative. That process could also be a “transmission” within the meaning of
section 20 of the Copyright Act as it involved “uses involving a work being made publicly available
by means of wireless signals” and in a way in which the "transmission of the work (concerned) can
be described as a communication to the public."33 The service offered by the defendant was not
limited to retransmitting the signals received to the customers’ PVRs but also involved making
available the very reception facilities with which the customers were able to view the programmes
received. As the facts had been insufficiently clarified by the lower courts, the BGH was unable to
judge in this particular case whether the transmission of the programme was in the form of a
retransmission to an "audience."
The BGH ruled that making the stored programmes available for interactive retrieval did not
breach the exclusive right to communication to the public (sections 87(1)(2) and 19a of the Copyright
Act). If storing the programmes on the PVR was assumed to have been carried out by the defendant,
then the latter had communicated the programmes to the public within the meaning of section 19a of
the Copyright Act by enabling the customer to retrieve them at any time and at any place. However,
the “public communication” element, which required that the broadcast be made available to a
majority of members of the public (section 15(3) of the Copyright Act) was lacking. In the case
30
Bundesgerichtshof [BGH] [Federal Court of Justice] Feb. 25, 1999 (Ger.), available at http://lexetius.com/1999,808.
31
Bundesgerichtshof [BGH] [Federal Court of Justice] Dec. 10, 1998 (Ger.), available at http://www.online-recht.de/
vorent.html?BGH981210+auswahl=1&st_num=1&case=-i&pattern=OLG+D%FCsseldorf&mark=
32
It is worth comparing this judgment with a decision of the Munich Court of Appeal concerning a case of copying “in the real
world”. See Oberlandesgericht [OLG] [Munich High Regional Court], 29 U 5494/02, Mar. 20, 2003, Zeitschrift für Urheber –
und Medienrecht 911, 2004 (Ger.). The case involved a so-called “coin-operated CD copier”, that is to say a machine that
enabled a customer to make a copy on his/her own blank CD of a recording he/she had provided. The offer of this service was
worded in such a way that even assistance from the shop staff should be ruled out. The court assumed in that case that the
“producer” of the copy was the customer and not the service provider.
33
Bundesgerichtshof [BGH] [Federal Court of Justice] July 8, 1993 (Ger.) available at
http://dejure.org/dienste/vernetzung/rechtsprechung?Text=I%20ZR%20124/91.
167
Spring 2013 │ Volume 20 │ Number II
concerned, the individual recordings were only available to the (individual) customer. The crucial
factor was that at the time the offer to record future broadcasts and make them available for retrieval
was made to the general public “the work concerned ... [could] not be accessed” by the defendant to
enable it to be retrieved by the public.The BGH also considered whether the possibility existing at
any time for programmes with content unsuitable for children and young people to be called up had
any effect on aspects of competition law and the protection of minors in the media.34 After due
consideration, it affirmed that there had been a breach of sections 5(1) and 3(1) of the
Jugendmedienschutz-Staatsvertrag (Inter-State Agreement on Youth Protection in the Media –
JMStV)35 and, consequently, ruled that the plaintiff was entitled to injunctive relief under sections 3
and 4(11) of the Gesetz gegen den unlauteren Wettbewerb (Unfair Competition Act – UWG).36 The
plaintiff and the defendant were in competition with one another as a result of the action in issue
despite the fact that their companies belonged to different branches of the industry. The defendant
had breached section 5(1) and 3(1) of the JMStV because it was easy to circumvent the age
verification system it had employed to protect children and young people from unsuitable content.
One purpose of section 5 of the JMStV, the court said, was “to regulate market behaviour in the
interests of the market players”. As there was a danger of repetition, the claim for injunctive relief
was justified.
Summarising its conclusions, the BGH established that the availability of Internet based PVRs
“may breach the broadcasters’ copyright-related rights under the Copyright Act and is as a rule
unlawful”.37 As the BGH was of the opinion that the lower court had not sufficiently clarified all
aspects, it remanded the case for reconsideration and a decision.
b. Twentieth Century Fox and others v. Cablevision
In the United States, the Supreme Court38 on 29 June 2009 confirmed an appeal court’s
judgment39 in favour of Cablevision against several film producers who had filed an action for breach
of copyright. In proceedings before the District Court, American media companies (including
Twentieth Century Fox and Universal City Studios Productions) successfully brought an action
against the cable television operator Cablevision, which offered registered customers a PVR service.
The plaintiffs considered that the service had breached their copyrights as Cablevision was copying
their programmes and communicating them to the public without authorisation. The PVR service
was, they claimed, comparable to video-on-demand services and accordingly required a licence. The
Court of Appeals rejected this argument, stating that, although the programmes were recorded at a
central facility, the actual copying was done by the users themselves – with no influence on the part
of Cablevision, which only made the system available. Furthermore, the court went on, the fact that
34
See supra note 29.
35
Jugendmedienschutz-Staatsvertrag [JMStV] [Inter-State Agreement on Youth Protection in the Media] April 1, 2010 (Ger.),
available at: http://www.kjm-online.de/files/pdf1/_JMStV_Stand_13_RStV_mit_Titel_english.pdf.
36
Gesetz gegen den unlauteren Wettbewerb [UWG] [The Act Against Unfair Competition], March 3, 2010, BGBI. I at 254 (Ger.)
available at http://www.gesetze-im-internet.de/englisch_uwg/the_act_against_unfair_competition.pdf.
37
See supra note 29.
38
Cable News Network, Inc. v. CSC Holdings, Inc., 129 S.Ct. 2890 (2009).
39
Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F.3d 121 (2d Cir. 2008).
168
Media Law & Policy
every registered user could only retrieve the recording made for him/her ruled out the assumption of
a public performance, so that the PVR service did not differ substantially from a traditional VCR and
the private copy for home use made on it.
c. M6 and Others v. Wizzgo
The Paris Tribunal de Grande Instance (TGI, a regional court) came to a different conclusion40
in two decisions dated 6 August and 25 November 2008. In the proceedings concerned, several
French television channels (M6, W9, NT1 and TF1) brought an action against Wizzgo, a PVR
provider, because they believed the service had breached their copyrights.
In both cases, the court ruled (without giving any reasons) that a programme recorded by
means of a PVR was not to be described as a private copy of the user and that this constituted a copy
unlawfully made by Wizzgo (followed by its communication to the public). It ordered the provider to
pay damages and prohibited it from continuing to offer the PVR service.
2. Intelligent Recording Software
“Intelligent recording software” explicitly relies on the exception made for private copies in
German law (section 53 of the Copyright Act). With the help of such programs, copies of broadcast
content are made by employing the software to record music items automatically and depositing the
file on the user’s PC. The software cuts out all advertising and news items.
Rightsholders’claim in this connection that this automatic generation of copies of
copyrighted content runs counter to the original idea of a private copy, which would lose the
subordinate role it has had up to now, so that the standard fee for a private copy should be increased.
Some people also demand a ban on such programs as control over the procedure does not lie with the
private individual but a third party, namely the program provider and the operator of the necessary
server.
No response in terms of actual legislation has so far been given to the question raised by the
German Federal Ministry of Justice in 2009 after the completion of the reform of copyright
legislation41 concerning the extent to which a statutory ban on “intelligent recording software” would
be conceivable.
C. Peer-to-Peer Technologies
Peer-to-Peer (P2P) technology is severely criticised by many people as it enables a group of
users that it has helped to set up to exchange files for which the necessary rights in the content
exchanged have often not been cleared.
1. Joost
However, the online service provided by Joost.com is an example of the lawful application of
these technologies. The free Joost software automatically forwards the relevant data, especially
40
Tribunal de grande instance [TGI] [ordinary court of original jurisdiction] Paris, Aug. 6, 2008 (Fr.), available at
http://www.foruminternet.org/specialistes/veille-juridique/jurisprudence/IMG/pdf/tgi-par20080806.pdf; Tribunal de grande
instance[TGI] [ordinary court of original jurisdiction] Paris, Nov. 25, 2008 (Fr.), available at
http://www.juriscom.net/documents/tgiparis20081125-Wizzgo.pdf.
41
Cf. Nicola Lamprecht-Weissenborn, “Second Basket” of Copyright Reform Approved, 2007-10: 9/15 IRIS LEGAL
OBSERVATIONS OF THE EUROPEAN AUDIOVISUAL OBSERVATORY (2007), available at
http://merlin.obs.coe.int/iris/2007/10/article15.en.html.
169
Spring 2013 │ Volume 20 │ Number II
among users connected to the P2P network. Only when part of the content is temporarily unavailable
on the users’ computers connected to the P2P network is it supplied from a central memory location.
The service comprises both video on demand and linear channels comparable to traditional television
broadcasts. Users can also participate in blogs, online chats and news services. For the content
distributed by Joost, the provider negotiates licence agreements with the rightsholders, for instance in
the United States with Viacom and Warner. In Germany, Joost concluded agreements with 13
content providers at its launch in 2009. According to Joost itself, it is possible to carry out the central
monitoring of the content exchange procedure and thus establish whether it meets the conditions of
the licences acquired by Joost.42 Geographic markets are separated from one another using
geolocation technology. Joost is financed by advertising.
2. CyberSky
On the other hand, in the following case P2P technology appears in the unfavourable (because
unlawful) light alluded to above: the pay-TV operator Premiere (now Sky Deutschland) sought an
injunction against the operator of CyberSky TV software under section 97(1) in conjunction with
section 87(1) of the Copyright Act.43 In the plaintiff’s opinion, the distribution of software that
enables users to set up a P2P network and quickly exchange large quantities of data within that
network interferes with the exclusive right under section 87(1) of the Copyright Act to retransmit
their broadcast signals and make them publicly accessible. Moreover, the networks set up permitted
the exchange of entire television programmes with only a minimal time delay. The software was
advertised as having this feature, and particular emphasis was placed on the fact that pay-TV
programmes could also be exchanged in this way if one of the P2P users received a programme as
part of a subscription and fed it into the network. In the opinion of the BGH, breaches of copyright
by subscribers are to be feared as a result of bringing the software into circulation and specifically
advertising it for an unlawful use, so the defendant was accordingly liable for the impending
breaches of the law. The court regarded the fact that the plaintiff had not employed any copy
protection mechanism as insignificant, stating that the rights violation claimed did not involve the
unauthorised storage or copying of Premiere’s programmes but their unauthorised retransmission to
non-subscribers, which violated the plaintiff’s exclusive transmission right enshrined in section
87(1)(1) of the Copyright Act.44 For these reasons, the BGH granted the plaintiff’s application for an
injunction concerning the distribution and advertising of the software.
D. Technical Measures for Protection Against Unauthorised Use and the Making of Private
Copies
1. Digital Rights Management (DRM)/Technical Protection Measures (TPM)
42
About Joost.com, JOOST.COM, http://www.joost.com/about/joost/ (last visited Apr. 15, 2012). By the publishing date of this
article, Joost was no longer in service.
43
Bundesgreichtshof [BGH] [Federal Court of Justice] Jan. 15, 2009 (Ger.) available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh&Art=en&sid=
f76fc892eefcdc29a6d8736952874ce8&nr=48631&pos=0&anz=1.
44
Id. In the view of the BGH, this also provided grounds for denying a claim under the Gesetz über den Schutz von
zugangskontrollierten Diensten und von Zugangskontrolldiensten (Act on the legal protection of services based on, or consisting
of, conditional access), which transposed Directive 98/84/EC.
170
Media Law & Policy
Both providers and distributors of media content – for example, offline in the case of DVDs
and online in connection with pay-TV services – can employ various technical measures to protect
items from unauthorised access (for example, encrypting and access authorisation systems) and/or
unauthorised reproduction (copy protection) or make it easier to investigate rights violations
(watermarks). In this context, broadcasters’ current plans concerning “new” technical measures to
protect their signals are interesting. For example, through use of the CI Plus technology45
broadcasters can decide how the user can proceed with the signal received: for instance, in
accordance with the so-called “usage rules information”, which is also transmitted, it is determined
whether the user is in principle to be given authorisation to record programmes and whether they
may also be shared with others. The problem consequently arises that technical protection measures
may result in users not being able to exercise the right which is in principle granted to them to make
copies for private use (without the provider’s consent).46 It is therefore not hard to understand why
digital rights management (DRM) has for a long time led to the offer of programs or devices that
(also) enable access restrictions to be circumvented.
In 2003, the Frankfurt Court of Appeal gave its opinion on the ban on the production, import
and distribution of circumvention devices designed or adapted to permit the unauthorised use of a
conditional access service. The court made it clear in its decision that this ban also covers devices
originally not put on the market for the purpose of circumventing conditional access and went on to
say that determining the purpose of a device not only followed from the manufacturer’s instructions
but also from a consideration of all the circumstances involved. In the court’s opinion, such factors as
the technical knowledge of potential users, existing practices or advice from third parties could even
override the different purpose stated by the manufacturer.47
2. (Link With) Private Copies
In 2006, France’s Cour de Cassation, the country’s highest appellate court, had to rule on the
extent to which a copy protection mechanism (in this case DRM) is compatible with the private copy
exception.48 The action had been brought by a citizen who had been prevented from making a copy
on a VHS cassette by the copy protection installed on his legally acquired DVD and regarded this as
a breach of his “right to a private copy”. The court ruled that there was no right to a private copy but
only an exception to the copyright protection. With reference to the three-step test, it said making a
copy of a DVD on a VHS cassette adversely affected the normal use of the work, so that the
installation of the technical protection mechanism was lawful.49 Protection mechanisms, including
45
COMMERCIAL INTERFACE PLUS (Apr. 15, 2012), http://www.ci-plus.com/index.php (This also enables a check to be made to see
whether any advertising skipping technology installed in the user’s devices can be effectively employed (see also II.6.1. below).
46
Press Release, Consumer Rhineland-Palatinate, IAAF World Cup in HDTV: Consumer Sees HD + and CI + is Highly Critical
(Aug. 3, 2009) available at http://www.verbraucherzentrale-rlp.de/UNIQ133462682228733/link591451A.html (Critics also
complain that it is possible to extensively monitor what the end user does with the programmes).
47
Oberlandesgericht Frankfurt [OLG Frankfurt] [Frankfurt Appeals Court], Case no. 6 U 7/03, June 5, 2003 (Ger); see also Ingo
Beckendorf, Illicit Decoding of Conditional Access Services, 2003-8:14/28 IRIS LEGAL OBSERVATIONS OF THE EUROPEAN
AUDIOVISUAL OBSERVATORY (2003), available at http://merlin.obs.coe.int/iris/2003/8/article28.en.html.
48
Cour de cassation [Cass.] [supreme court for judicial matters] 1e civ., Feb. 28, 2006, Bull. civ. I, No. (Fr.), available at
http://www.foruminternet.org/telechargement/documents/cass20060228.pdf.
49
For a further discussion of rights management systems and their relationship with private copies, see Francisco Javier Cabrera
Blázquez, Digital Rights Management Systems (DRMs): Recent Developments in Europe, 17.1 MEDIA L. & POL’Y 2 (2007).
171
Spring 2013 │ Volume 20 │ Number II
DRM, are protected by the French regulations implementing the Copyright and Related Rights Act of
2006, which makes it a punishable criminal offence to possess or use devices that enable a technical
protection mechanism installed in a work to be rendered inoperative or one or more information
elements that identify the rightsholder to be destroyed.50
A decision delivered in 2007 by the Aix-en-Provence Court of Appeal also related to the
private copy exception. In that decision, the court ordered a student to pay damages and a fine for a
breach of Articles L 335-2 and L 335-3 of the French Intellectual Property Code51 of 1992. The
accused had collected 507 different film titles by downloading them from the Internet and copying
borrowed CD-ROMs, lent some to friends and distributed some on P2P networks. He had also
watched some of the films with friends. In the Court of Appeal’s opinion, his conduct had resulted in
a breach of the ban on copying, making publicly available, performing and distributing copyrighted
works without the rightsholder’s permission. The court dismissed the defendant’s claim in respect of
the private performance and private copy exceptions pursuant to section L 122-5(1) and (2) of the
Intellectual Property Act on the ground that showing various films in a group of friends was not
covered by the term "inner family circle," which had to be subjected to a narrow interpretation. Also,
lending the copied CD-ROMs to friends did not constitute “private use” as it resulted in the
defendant losing control over the further use and distribution of the works by his friends. With regard
to the private copy of the downloaded films, the court ruled that the defendant could not rely on the
private copy exception if the work to be copied had not been legally acquired.52
Many European legislatures have provided for rightsholders to be compensated for losses of
revenue that may be caused by the exploitation of the exception granted under domestic law to make
a “private copy”. Private broadcasters (represented by VG Media) recently brought a state liability
action against the Federal Republic of Germany on the ground that it had not properly transposed
Directive 2001/29/EC.53 The aim of the action was to secure a share of the receipts of copying fees
levied on blank media (section 54(1) of the Copyright Act) as compensation for private recordings
(section 53 of the Copyright Act). In contrast to holders of other copyright-related rights,
broadcasters are excluded from the levy (section 87(4) of the Copyright Act), and the plaintiff
considered this incompatible with Article 5(2)(b) of the Directive, stating that Article 2(e) of the
Directive provided that it was always the broadcaster that held the reproduction right. It went on to
state that Article 5(2)(b) provided that the rightsholders should “receive fair compensation” in
connection with the private copy exception. These rules had not been properly transposed into
German law, which was why the plaintiff was claiming damages with reference to state liability
under Community law.
50
Décret 2006-1763 du 23 décembre 2006 relatif à la répression pénale de certaines atteintes portées au droit d'auteur et aux
droits voisins [Decree No. 2006-1763 of December 23, 2006 on the Criminal Punishment of Certain Infringements of Copyright
and Related Rights], JOURNAL OFFICIEL DE LA REPUBLIQUE FRANCAISE [J.O][OFFICIAL GAZETTE OF FRANCE], Dec. 30, 2006, p.
20161.
51
Loi 92-597 du 1 juillet 1992 relative au code de la propriete intellectuelle [Law No. 92-597 of July 1, 1992 on the Intellectual
Property Code], JOURNAL OFFICIEL DE LA REPUBLIQUE FRANCAISE [J.O.] [OFFICIAL GAZETTE OF FRANCE], July 1, 1992, (amended
by Loi 97-283 du 27 mars 1997 [Law No. 97-283 of March 27, 1997]).
52
Cour d’appel [CA] [regional court of appeal] Aix-en-Provence, 5th Chamber, Sept. 5, 2007 (Fr.), available at
http://www.juriscom.net/documents/caaixenprovence20070905.pdf.
53
See Directive 2001/29/EC, of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain
Aspects of Copyright and Related Rights in the Information Society, 2001 O.J. (L 167) 10.
172
Media Law & Policy
The Kammergericht Berlin (Berlin Court of Appeal) agreed with the lower court and dismissed
the claim,54 stating that it presupposed that section 87(4) of the Copyright Act had to be incompatible
with mandatory Community provisions. Moreover, that violation had to constitute an obvious and
significant breach of Community law. It could not be definitively concluded from the wording of
Article 5(2)(b) of the Directive that the “fair compensation” had to be made through a share of the
levy on devices – or, indeed, through a “reward, indemnification or payment”. The member states
were given considerable scope with regard to enacting relevant provisions, and this view was
supported both by Recitals 35 and 38 and the genesis of the Directive, according to which the “fair
compensation” was to be understood as a generic term and given a flexible interpretation. This
flexibility also allowed the rightsholders concerned to be treated differently. As was clear from the
preparatory documents, the domestic legislature had decided not to allow the broadcasters a share of
the levy on devices as they received payment for the production of sound carriers and films and the
permission to make private copies did not affect the “core area” of their copyright entitlement under
section 87(1) of the Copyright Act.55 This core area was the right of retransmission and of public
performance. In contrast, the manufacture and sale of copies formed the core of the activity of the
sound carrier and film producers, and that area was directly affected by the right to make private
copies. The defendant had not exceeded the broad legislative scope granted it by the Directive, so
that no obvious and significant breach of Community law had taken place and the claim made by VG
Media was ill founded. No leave to appeal against this judgment on points of law was granted.
E. Public Viewing Exhibitions
Public viewing exhibitions involve live television images being broadcast at locations
accessible to the public – usually in connection with popular major sports events such as the recent
football World Cup.56 The broadcasts are shown in public venues or at open-air locations as part of
(large-scale) specially organised events, as well as at schools, sports clubs and local council
premises.
It is first of all difficult to draw a firm distinction between a private celebration (such as a
World Cup party) and public viewing exhibitions of television broadcasts in their various
manifestations – organised event or not, commercial or non-commercial – and the different issues
involved, such as the licences required (for example from GEMA, the Fédération Internationale de
Football Association (FIFA) or the Union of European Football Associations (UEFA)57). In the case
of a party held by an exclusively private group of people, with guests who know one another, no
54
Kammergericht Berlin [KG][Berlin Court of Appeal] Apr. 14, 2009 (Ger.), available at
http://www.gerichtsentscheidungen.berlinbrandenburg.de/jportal/portal/t/1ckl/bs/10/page/sammlung.psml?pid=Dokumentanzeige&showdoccase=1&js_peid=Trefferliste&d
ocumentnumber=116&numberofresults=187&fromdoctodoc=yes&doc.id=KORE406372009%3Ajurisr01&doc.part=L&doc.price=0.0&doc.hl=1#focuspoint.
55
DEUTSCHER BUNDESTAG: DRUCKSACHE [BT] 16/1828, (Ger.), available at
http://dipbt.bundestag.de/dip21/btd/16/018/1601828.pdf, at 16.
56
Fabian Reinholz, Lizenzgebühren für Public Viewing?, 6 KOMMUNIKATION & RECHT 364 (2010)(Ger.).
57
On public performances as far as UEFA is concerned, see Union of European Football Associations, UEFA Public Viewing
Terms and Conditions for matches of the UEFA European Football Championship 2008, available at
http://www1.uefa.com/MultimediaFiles/Download/Competitions/Finals08/68/63/77/686377_DOWNLOAD.pdf. The discussion
here is limited to the rules established by FIFA and GEMA.
173
Spring 2013 │ Volume 20 │ Number II
licences are necessary – with the exception of any television licence fees payable. Such a party
differs from the public performance in that it is not directed at the general public.
FIFA requires all exhibitors to apply to it for a licence but only demands licence fees in the
case of commercial events. The public exhibition is commercial when the exhibitor carries it out for
commercial purposes, which is assumed to be the case when an admission charge is made,
sponsorship is involved or other business benefits are obtained.58 Expressly excluded are “pubs, clubs
and bars” (paragraph 1 of the relevant FIFA regulations). FIFA stipulates what broadcast coverage is
to be selected (paragraph 2; with any pay-TV costs payable by the exhibitor). The broadcast coverage
must be simultaneous and shown in its entirety (paragraphs 4 and 7) and no sponsors that are not
FIFA marketing affiliates may be involved. An exception may be made for local sponsors if they are
not competitors of FIFA marketing affiliates (paragraph 5). Public viewing exhibitions are
considered non-commercial59 when no admission charges are made (paragraph 10) and no sponsors
are involved (paragraph 5). Non-commercial organisers are not obliged to pay any licence fees but
are subject to the same (strict) conditions concerning the choice of match broadcast coverage
(paragraph 2) and the form of the coverage (paragraph 7).
In Germany, GEMA60 manages – irrespective of any obligation to obtain a licence from FIFA
– the rights concerning any music played during a public viewing exhibition as well as the rights of
journalists and sports reporters of which the management has been assigned to it by the collecting
society VG Wort. It draws a distinction between public exhibition that does not have the character of
an event – in pubs, retail stores or similar locations – which is subject to a lower rate, and public
exhibition that does have the character of an event, is advertised separately from the normal business
operation, involves additional services and is often accessible against payment of an admission
charge. The relevant rate is payable on a case-by-case basis.
From the copyright point of view, it needs to be pointed out that the FIFA regulations do not
have the force of law and that any claims are always determined by reference to domestic law. In
Germany, section 87(1)(3) of the Copyright Act gives broadcasters the exclusive right to allow the
public to view or listen to their programmes against payment of an admission charge. However, this
right is transferable under section 87(2) of the Copyright Act, so FIFA can in principle exploit the
television rights after they have been acquired. In this case too, however, it follows from the wording
of the provision that a public viewing exhibition may only be prohibited if it is accessible "against
payment of an admission charge," which is to be understood as the direct payment for admission to
an event,61 and any indirect payment, for example charges added to prices of food and drink. It is the
predominant view, however, that this does not include the involvement of a sponsor,62 so the
58
See International Federation of Association Football (FIFA), FIFA Regulations for Public Viewing Exhibitions, available at
http://pt.fifa.com/mm/document/tournament/loc/01/12/91/88/fwc2010_regulations_for_commercial_public_viewing_exhibitions
_100330.pdf.
59
See International Federation of Association Football (FIFA), Non-Commercial Public Viewing Events of the 2010 FIFA World
Cup South Africa, available at http://www.fifa.com/mm/document/tournament/loc/01/12/91/96/fwc2010_regulations_for_noncommercial_public_viewing_exhibitions_100330.pdf
60
Public viewing exhibition rates for the 2010 World Cup: https://www.gema.de/presse/pressemitteilungen/pressedetails/article/gema-bietet-sondertarif-zur-fussball-wm.html
61
Reinholz, supra note 56, at 366.
62
Id. at 366.
174
Media Law & Policy
obligation to obtain a licence under the FIFA regulations goes beyond what can be demanded under
the German Copyright Act. A public viewing exhibition organised without making an admission
charge cannot be effectively prohibited under section 87(1)(3) of the Copyright Act.
F. Ad-Skipping and Hybrid TV
Broadcasters’ rights may also be affected due to unfair competition. There are parallels here to
the core copyrights and related rights granted broadcasters (to protect their investments), to which we
shall now turn our attention.
1. Skipping Commercial Messages
In the context of “traditional” television, the BGH had to pass judgment on a case in 2004
involving a complaint by a private, advertising funded television station, which had sued the
manufacturer of a device programmed to switch automatically at the beginning of a commercial
break to another television channel not interrupted by advertising.63 The plaintiff considered this
practice a breach of section 1 of the Gesetz gegen den unlauteren Wettbewerb (Unfair Competition
Act). In particular, it claimed, it constituted an impediment to its business and a “general disruption
of the market”. The court ruled that the plaintiff had not been actually impeded in any way as the
defendant neither exerted direct influence on its transmissions nor the commercials they contained.
The device merely offered viewers the possibility of cutting out the advertising. The court also
denied that there had been a general disruption of the market because, although the distribution of the
device made its economic activity more difficult, the plaintiff was not yet threatened to an extent that
jeopardised its livelihood.
2. Hybrid TV
So-called Hybrid TV is a technology that is mainly available from manufacturers of reception
devices (television sets, set-top boxes) and permits both the reception of programmes broadcast by
radio waves and of content available via broadband Internet using the Internet Protocol (IP).
In particular, Hybrid TV makes it possible to create an “Internet framework” for displaying
television signals on-screen. This can be used to display different types of content that will normally
have been specially adapted for this purpose. The non-broadcast content that the user can access is
always controlled by the company that makes the application available through the use of the end
devices it markets. This control is mainly possible by pursuing a so-called “walled-garden” policy, in
which case it is rendered impossible to switch to the open Internet. There are, however, end devices
that impose virtually no restrictions on this, i.e. involve no or very little control.
The incorporation of access to IP-based content/applications not controlled by the
manufacturer is, among other things, the subject of a standard accepted on 1 July 2010 by the
European Telecommunications Standards Institute (ETSI) in version 1.1.1 of the HbbTV64
specification.65 In the broadcasters’ opinion, its importance mainly lies in the fact that they can
63
Bundesgerichtshof [BGH] {Federal Court of Justice] June 24, 2004 (Ger.), available at http://juris.bundesgerichtshof.de/cgibin/rechtsprechung/document.py?Gericht=bgh&Art=en&sid=95f0c7769655158b8ee1219b652f0b18&nr=30179&pos=0&anz=1.
64
HBBTV (July 16, 2012), http://www.hbbtv.org.
65
European Telecommunications Standards Institute, Hybrid Broadcast Broadband TV, ESTI TS 102 796 (June 2010).
175
Spring 2013 │ Volume 20 │ Number II
program applications that permit the retrieval of content via media libraries and/or are suitable for the
supplementary display of (audiovisual) commercial communication. The question of what
information the user can retrieve – when this program is employed – can accordingly be decided by
different bodies.
Hybrid TV also raises both competition and copyright related issues with regard to
broadcasters’ rights. In Germany, television stations regard as a breach of the Unfair Competition
Act the conduct of an Internet provider that in response to an enquiry from a user places its content
next to the actual television picture or even superimposes it on it. They claim that the Internet
provider unfairly exploits its competitors’ prior outlays (investment in infrastructure, setting and
developing the signal range) and is thus in breach of section 1 of the Unfair Competition Act. This
view can be countered by reference to a BGH judgment in 2004 establishing that unfair competition
can always be ruled out when the user himself/herself brings about the situation complained of by
taking an autonomous decision.66 This is the case here: it is entirely up to the user to decide to what
extent he/she makes use of the services of an Internet provider in addition to receiving the actual
television signal.
Broadcasters’ rights enshrined in section 87 of the German Copyright Act may also be affected
by the new technologies. Here, too, in the rightsholders’ opinion the Internet provider is easily able to
turn the television broadcasters’ prior investments to its own advantage. However, as superimposing
Internet-based content on the television signal does not result in its being changed or copied,
retransmitted or made publicly accessible or the subject of a public performance, the protection
afforded by section 87 does not apply. Broadcasters are therefore clearly endeavouring to bring about
a widening of the scope of the relevant provision that would result in also giving protection to a
“further exploitation” involving a new technical development.67
G. Interim Conclusions: New Services and Legal Challenges
The discussion of current economic and technical developments and their legal classification in
the previous parts of this section has shown that the assessment is not always entirely clear.
It is obvious that the unlawfulness or, indeed, lawfulness of new business models based on the
audiovisual content distributed by broadcasters first of all depends of their actual technical features –
including in the case of functionally comparable services. Second, the decisive factor is the scope of
the provisions protecting the broadcast signal (and the exceptions to these provisions) in an
individual case and, in particular, what rights are actually affected. Even within one legal system, but
even more when a comparative analysis is made of different systems, it is in the details that
differences emerge. For example, although European Union directives have harmonised national
provisions in respect of individual issues – including bringing about a minimum level of protection –
the nature and/or interpretation of rights in individual states and/or the limits imposed on them may
differ from one another, which may be the reason why the impression is gained that the protection is
(has become) “porous”.
66
See BGH, supra note 63.
67
Cf. Kitz, Hybride Empfangsgeräte – Prüfstein für Europäisches Medienordnung in: Festschrift aus Anlass des 20-jährigen
Bestehens des Instituts für Europäisches Medienrecht, Kleist/Rossnagel/Scheuer (EMR), vol. 40, Baden-Baden 2010.
176
Media Law & Policy
III. THE CURRENT LEGAL DISCUSSION AT THE INTERNATIONAL LEVEL
At the international level, the existing level of protection for broadcasters is felt to be
problematic. In 1996, the Performances and Phonograms Treaty, a WIPO treaty in favour of other
holders of copyright-related rights, was adopted. Its clear purpose was to take account of the
challenges expected as a result of digitisation. Broadcasters were not included at that time, which
explains why great efforts continue to be made to push through amendments to existing agreements
and treaties and/or create new instruments. During the 22nd session of the Standing Committee on
Copyright and Related Rights (SCCR) held in June 2011, the commitment on WIPO level towards
the development of a new Treaty on the Protection of Broadcasting Organizations has been
substantiated by the establishment of some detailed elements for a Draft Treaty on the Protection of
Broadcasting Organizations.68 These were grounded on an informal consultation meeting of the
WIPO Members with observers on the protection of broadcasting organizations as well as technical
experts (14-15 April 2011). The participants of the meeting agreed that the Chair should outline a
non-paper on this issue for the 22nd session, considering the impact of technological – particularly
digital – development as well as following a technology-neutral and signal-based approach. The
Elements for a Draft Treaty on the Protection of Broadcasting Organizations delineate the objectives
and define the scope and object of protection of the Treaty to come under negotiation. Such
commitment has been further affirmed by the conclusions of the SCCR to its 23rd session held in
November and December 2011,69 during which the delegations of South Africa and Mexico
presented a draft version of such Treaty and a work plan was drawn up.70 In this plan the WIPO
Members were called upon to comment the proposal of the named delegations, which should then
revise the proposal at hand. The outcome of this should subsequently build the base of the next
session. According to the work plan the scheduling of a Diplomatic Conference on the topic in due
time shall be aimed at. Informal consultations on the protection of broadcasting organizations held
during the 23rd session resulted in further statements of intent.71 During the 24th session from 16-25
July 2012, the SCCR reaffirmed its commitment to work, on a signal-based approach, towards
developing an international treaty to update the protection of broadcasting and cablecasting
organizations in the traditional sense. In this regard, the Committee adopted a text titled "Working
document for a treaty on the protection of broadcasting organizations," which will constitute the
basis of further text-based discussions.72
68
WIPO, Elements for a Draft Treaty on the Protection of Broadcasting Organizations, STANDING COMM. ON COPYRIGHT AND
RELATED RIGHTS (May 30, 2011), http://www.wipo.int/edocs/mdocs/copyright/en/sccr_22/sccr_22_11.pdf.
69
WIPO, Conclusions of the Twenty-Third Session of the Standing Committee on Copyright and Related Rights, STANDING
COMM. ON COPYRIGHT AND RELATED RIGHTS (Dec. 2, 2011),
http://www.wipo.int/edocs/mdocs/copyright/en/sccr_23/sccr_23_ref_conclusions.pdf.
70
WIPO, Draft Treaty on the Protection of Brodcasting Organizations: Proposal Presented by the Delegations of South Africa
and Mexico, STANDING COMM. ON COPYRIGHT AND RELATED RIGHTS (Nov. 28, 2011),
http://www.wipo.int/edocs/mdocs/copyright/en/sccr_23/sccr_23_6.pdf.
71
WIPO, Report on the Informal Consultations on the Protection of Broadcasting Organizations: Prepared by the Chair of the
Informal Consultations on the Protection of Broadcasting Organizations, STANDING COMM. ON COPYRIGHT AND RELATED RIGHTS
(Jan. 27, 2012), http://www.wipo.int/edocs/mdocs/copyright/en/sccr_23/sccr_23_9.pdf.
72
WIPO, Conclusions of the Twenty-fourth Session of the Standing Committee on Copyright and Related Rights, STANDING
COMM. ON COPYRIGHT AND RELATED RIGHTS (Jul. 25, 2012)
http://www.wipo.int/edocs/mdocs/copyright/en/sccr_24/sccr_24_ref_conclusions.pdf. WIPO, Draft Agenda for the Twenty-fifth
177
Spring 2013 │ Volume 20 │ Number II
The Council of Europe Committee of Ministers decided that at least the Council of Europe
should strive to bring about internationally binding rules on the protection of broadcast signals in
order to be able to safeguard audiovisual content against piracy, and it instructed the Steering
Committee on the Media and New Communication Services to carry out the necessary work.73 This
initiative was taken after an international treaty on neighbouring rights for broadcasters (the so-called
WIPO Broadcasting Treaty) had been discussed under the auspices of WIPO for a long time but had
come to a standstill without any appreciable results in 2007, when the negotiations were broken off
because of insurmountable differences of opinion on fundamental issues.74 The aim of the
consultation carried out, in which the European Community and its member states (as well as the
then applicant countries Bulgaria and Romania) were involved and issued statements,75 was to bring
about the revised, modernised and balanced protection of broadcasters in view of the complex
developments in the area of the communication and information technologies. On December 13,
2011, the Council of the European Union confirmed that the European Commission will be entitled
to participate in these negotiations on behalf of the European Union as regards matters falling within
the Union’s competence and in respect of which the Union has adopted rules. The member states
shall participate on their own behalf in the negotiations only in so far as matters that arise in the
course of the negotiations fall within their competence.76
The Council of Europe’s Steering Committee initially decided to set up a group of experts,
which then took stock of the rules of protection applying under international and European law. With
reference to a Committee of Ministers recommendation adopted in 2002,77 the group reached the
conclusion in 2008 that there was a need for a stronger initiative. In the course of 2009, the Steering
Committee took important preliminary decisions concerning this initiative, among other things the
setting up of an ad hoc advisory group. At a consultation meeting held at the end of January 2010, the
group identified several aspects that would have to be taken into account in the creation of a binding
instrument.78
Session: Prepared by the Secretariat, STANDING COMM. ON COPYRIGHT AND RELATED RIGHTS (Sep. 7, 2012),
http://www.wipo.int/edocs/mdocs/copyright/en/sccr_25/sccr_25_1_prov.doc.
73
Steering Committee on the Media and New Communications Services (Nov. 29, 2011-Dec. 2, 2011), available at
http://www.coe.int/t/dghl/standardsetting/media/cdmc/CDMC(2011)028_en.pdf.
74
Non-Paper on the WIPO Treaty on the Protection of Broadcasting Organisations (Apr. 20, 2007), available at
http://www.wipo.int/edocs/mdocs/copyright/en/sccr_s2/sccr_s2_paper1.pdf
75
See Submission to the WIPO on the Treaty for the Protection of Broadcasting Organisations, THE EUROPEAN COMMUNITY AND
(July 20, 2006),
http://ec.europa.eu/internal_market/copyright/docs/wipo/wipo-broadcasting2006_en.pdf.
ITS MEMBER STATES AND THE ACCEDING STATES BULGARIA AND ROMANIA
76
Decision of the Council and of the Representatives of Governments on the Member States Meeting Within the Council on the
Participation of the European Union and its Member States in negotiations for a Convention of the Council of Europe on the
Protection of the Rights of Broadcasting Organisations, (Dec. 13, 2011),
http://register.consilium.europa.eu/pdf/en/11/st18/st18061.en11.pdf; Press Release, Council of the European Union, 3139th
Council Meeting, Environment (Dec. 19, 2011),
http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/en/envir/127063.pdf; Memorandum from the General
Secretariat of the Council of the European Union to the Permanent Representatives of the Committee/Council (Dec. 8, 2011),
available at http://register.consilium.europa.eu/pdf/en/11/st18/st18062-ad01.en11.pdf.
77
Recommendation Rec (2002)7 of the Committee of Ministers to Member States on Measures to Enhance the Protection of the
Neighbouring Rights of Broadcasting Organisation, COUNCIL OF EUR., COMM. OF MINISTERS (Sept. 11, 2002),
http://www.ebu.ch/CMSimages/en/leg_ref_coe_r2002_7_nr_110902_tcm6-4398.pdf.
178
Media Law & Policy
However, the Steering Committee, on its meeting from March 27-30, 2012, agreed that the
question of neighboring rights of broadcasting organizations will be put on hold awaiting
developments within the European Union.79 This is remarkable insofar as the Council of the
European Union, as mentioned above, already confirmed in December 2011 the competences of the
European Commission to participate in the respective negotiations.
Summarising the state of the discussion at the level of WIPO and in the context of the new
Council of Europe initiative, the key aspects include the following:
 Clear definitions: There is general agreement on the need to clarify what activities of
broadcasters should enjoy rights protection and how signals should be treated before they
are broadcast. The term “broadcasting” should be defined in a technology-neutral way
and a signal-based approach should be adopted.
 Clarification of the time aspect with regard to the object of protection: According to one
opinion, the strictly signal-based approach logically means that a treaty based on it would
not cover any uses to which the signal is put after it has been broadcast as these uses no
longer relate to the signal but to the broadcast and recorded content. In our opinion,
however, the effectiveness of the protection of the signal also requires the inclusion of
actions undertaken after the recording has been made – and the inclusion of the relevant
copyright-related rights. “Signal-based protection” should be understood to mean that the
compilation of the content and its transmission result in its protection.
 Clarification of the area of application as far as content is concerned: According to the
discussions, linear services are to be covered irrespective of the methods and platforms
via which they are distributed. However, in the WIPO negotiations no agreement was
reached on whether a future treaty should also refer to webcasting. Broadcasters called
for exclusive rights for programmes transmitted over the Internet, but critics saw in this a
threat to freedom of expression and information on the Internet. The European
Community was moving towards having simulcasting at any rate fall within the scope of
the protection provided.80 There is disagreement in particular on whether on-demand
services should be covered. One view is that they are already protected under other
provisions, for example by the copyright protection of databases or the protection of
conditional access services. This view is countered by reference to the fact that the
distribution of the signal provided by the broadcasters serves the purpose in both cases of
transmitting content to the user, so that no distinction should be drawn with regard to the
object of protection.
 Object of protection: The elements on which the 1961 Rome Convention and other
international treaties are based should be included here, in particular investments carried
out, programme planning and organisation, preparation for public reception, liability for
rights acquired and the publisher’s responsibility.
78
Consultation Meeting on the Protection of Rights of Broadcasting Organisations (Jan. 28-29, 2010), available at
http://www.coe.int/t/dghl/standardsetting/media/MC-S-NR/MC-S-NR_2010_Misc1rev%20EN%20Meeting%20Report.pdf.
79
Steering Committee on the Media and Information Society, (Mar. 27-30, 2012), available at
http://www.coe.int/t/dghl/standardsetting/media/CDMSI/CDMSI_2012_002Rev_Abridged_report_en.pdf.
80
Cf. WIPO, Proposal of the European Community and its Member States, STANDING COMM. ON COPYRIGHT AND RELATED
RIGHTS (June 24, 2003), http://ec.europa.eu/internal_market/copyright/docs/wipo/wipo-broadcasting_en.pdf.
179
Spring 2013 │ Volume 20 │ Number II





Scope of protection: A binding instrument should grant broadcasters exclusive rights,
comparable to the creators’ authorisation rights, with regard to the retransmission, public
performance (against an admission charge), recording, reproduction of recordings,
making publicly accessible, further transmission and distribution of their protected
broadcasts. Here, too, the individual rights should be defined in a technology-neutral
way.
Pre-broadcast signals: The need to protect such signals (for example raw data or content
that is transferred but not broadcast) is in principle recognised. If this content were not
protected, third parties could easily appropriate it and claim rights in it in some form or
other.
Obligation to protect technical rights management measures: No agreement on this was
reached in the WIPO negotiations. Supporters argued that this was a fundamental aspect
that clearly showed the need for a new instrument. Broadcasters had no obligation to
introduce technical measures to manage their rights but if they did so those measures also
had to be protected. Others held the view that this would make it harder for the general
public to access information already in the public domain. Moreover, they pointed out, it
was to be feared that the mere fact that this protection was enshrined in law would result
in the more extensive use of technical measures.
Duration of protection: With regard to the duration of the protection afforded, no
agreement could be reached either in the WIPO negotiations or in the ad hoc group’s
initial deliberations. Those holding the view that the signal should only be protected until
the time of the recording logically regarded the introduction of a specified duration as
superfluous because only simultaneous transfers would be covered in any case. The
proposals of the supporters of the principle of protection beyond the time of the recording
varied between 20 and 50 years.
Exceptions to and limitations on rights: In the WIPO negotiations, no agreement was
reached on the arrangements concerning exceptions and limitations. The consultation at
the Council of Europe came out against drawing up an exhaustive list and in favour of
employing the three-step test approach. In the WIPO negotiations, the European Union
unequivocally supported drawing up an exhaustive list of possible exceptions and
limitations.81
IV. CONCLUSIONS AND FUTURE OUTLOOK
The controversies surrounding personal video recorders and portals illustrate with respect to all
new services how different national ways of addressing issues can be. On the one hand, PVR services
(offered by providers that are independent of television broadcasters) are generally regarded as
unlawful in Europe (Wizzgo in France and Shift.TV and save.tv in Germany), whereas in the United
States the same service (offered by a cable TV operator, Cablevision) was considered lawful. On the
other hand, in the case of the legal disputes concerning the various types of portal it is clear that a big
distinction has to be drawn between cases where the user is simply guided to the broadcasters’
81
See supra note 53.
180
Media Law & Policy
(original) services (tv-replay.fr) and those where the “service” is much more extensive, especially
because it enables unlawfully produced copies of programmes to be made more or less directly
accessible (Newzbin). The reason for a portal being able to avoid a verdict of illegality, with the
result that the broadcasters cannot take any action against it, is sometimes to be found in the
exceptions for such services contained in provisions outside copyright law that limit their liability
under certain circumstances. A great deal depends in an individual case on how much and, in
particular, how promptly the providers co-operate with the rightsholders (see on the one hand the
U.S. case Viacom v. YouTube and on the other hand the Italian case of Mediaset v. YouTube). Finally,
it has become clear that the effectiveness of the protection also depends on the systematic
arrangements for (and interpretation of!) exceptions in favour of third parties – in this area, the
greater harmonisation of the legal approaches seems just as difficult as it is necessary. An example
that might be mentioned here is the view still held today by a German court of appeal that – with
reference to a view expressed by the legislature and irrespective of the enormous increase in the
capacity of broadband Internet access for private individuals and of the storage media they possess –
the core of the protection of broadcasters is not protection against (private) copying.
The discussion concerning the legal protection of broadcasters and the need to adapt it to
current challenges shows that extremely complex questions are involved. They are also complex
given the need to formulate any changes to neighbouring rights in a way that ensures that the
protection granted to creators and other rightsholders is not adversely affected. The reform debate
will be continued, both at the Council of Europe at a first (regular) meeting of the Steering
Committee’s ad hoc advisory group82 and by WIPO, whose SCCR – after having presented a study
produced on this subject at its 21st session in November 201083 – proceeded to formulate a Draft
Treaty on the Protection of Audiovisual Performances after having reached an agreement on the
transfer of rights from the performed to the producer.84
V. AMERICAN PERSPECTIVES***
A. Portals and Navigators
Section 512(c) of the Copyright Act attempts to balance the rights of copyright-owning
broadcasters with the interests of the digital-consuming public. Commonly referred to as the “Safe
Harbor” provision, this part of the Copyright Act is aimed at protecting online service providers
(OSP’s) of digital content from liability of copyright infringement. In order to be free from liability,
the OSP must not have knowledge that the material it posts is infringing, must not receive a financial
*** Co-Authors William Palka, B.S., Syracuse University (2009); J.D., New York Law School (2013) and Ryan G. Lewis, B.S.,
Villanova University (2009); J.D., New York Law School (2013).
82
Cf. WIPO, Study on the Socioeconomic Dimension of the Unauthorized Use of Signals – Part III: Study on the Social and
Economic Effects of the Proposed Treaty on the Protection of Broadcasting Organizations, STANDING COMM. ON COPYRIGHT AND
RELATED RIGHTS (Aug. 4, 2010), http://www.coe.int/t/dghl/standardsetting/media/MC-S-NR/default_en.asp
83
WIPO, Study on the Socioeconomic Dimension of the Unauthorized Use of Signals – Part III: Study on the Social and
Economic Effects of the Proposed Treaty on the Protection of Broadcasting Organization, STANDING COMM. ON COPYRIGHT AND
RELATED RIGHTS (Aug. 10, 2010), http://www.wipo.int/edocs/mdocs/copyright/en/sccr_21/sccr_21_2.pdf.
84
E.g., Press Release, World Intellectual Property Organization, Agreement on Transfer of Rights Paves Way to Treaty on
Performers’ Rights (June 24, 2011), available at http://www.wipo.int//pressroom/en/articles/2011/article_0018.html.
181
Spring 2013 │ Volume 20 │ Number II
benefit directly attributable to the infringing activity, and must remove the content expeditiously if
given warning by the copyright owner of infringing activity.85
While measures such as the safe harbor provision have been taken to protect OSP’s, legislation
has also been introduced that increases punishment for those who illegally transmit copyrighted
material for financial gain.86 In March 2011, the Intellectual Property Enforcement Coordinator
(IPEC) suggested that criminal enforcement of copyright laws were not adequate because there were
questions as to whether streaming copyrighted content constituted distribution of a copyrighted work
or performance of those works. If the streaming constituted distribution it was considered a felony,
while performance was merely classified as a misdemeanor.87 On May 12, 2011, a bill was
introduced in the Senate aimed at increasing penalties for criminal copyright infringement. Enacted
on June 20, 2011, the bill expanded felony infringement to include public performance of a work.88
Supporters of this bill argue that the law needs to be changed in order to keep up with advancements
of technology. Since illegal streaming over the Internet has become more popular and indicates an
infringement of the public performance right, supporters argue that the punishment for streaming
should be classified as a penalty.89 Opponents of the bill have argued that the law is too broad and is
likely to be misapplied. Some worry that bloggers who post infringing YouTube videos on their sites
may be targeted by the bill if they run the infringing material alongside advertising, which could be
evidence of “private financial gain.”90
1. Viacom v. YouTube
In April 2012, the Second Circuit reversed the district court’s grant of summary judgment to
YouTube in Viacom’s suit against the user generated content web site.91 The decision opened up the
door for future litigation against YouTube by ruling that “a reasonable jury could find that YouTube
had actual knowledge or awareness of specific infringing activity on its website.”92 Although the
court reversed the grant of summary judgment, it reaffirmed that the safe harbor provisions of the
DMCA protected YouTube so long as they removed infringing content expeditiously upon request.
85
17 U.S.C. § 512(c)(1)(2006).
86
S. 978, 112th Cong. § 1(a)(2011).
87
U.S. Intellectual Property Enforcement Coordinator, Administration’s White Paper on Intellectual Property Enforcement
Legislative Recommendations, March 2011, at 10, http://www.whitehouse.gov/sites/default/files/ip_white_paper.pdf.
88
See supra note 2; see also Brian T. Yeh, Illegal Internet Streaming of Copyrighted Content: Legislation in the 112th Congress,
CONGRESSIONAL RESEARCH SERVICE, 7 (Aug. 29, 2011), http://ipmall.info/hosted_resources/crs/R41975_110829.pdf.
89
Yeh, at 9 (citing Promoting Investment and Protecting Commerce Online: The ART Act, The NET Act, and Illegal Streaming:
Hearing Before the Subcommittee on Intellectual Property, Competition and the Internet of H. Comm. on the Judiciary, 112th
Cong., 1st Sess. (2011) (written statement of Maria A. Pallante, Register of Copyrights)).
90
Yeh, at 10 (citing Nathan Pollard, Senate Panel Mulls Online Streaming Bill, Takes No Vote Amid Lingering Concerns, June
15, 2011, BNA’S ELECTRONIC COMMERCE & LAW REPORT (quoting Senator Klobuchar)).
91
Viacom Int’l, Inc. v. YouTube, Inc., No. 10-3270-cv (2d. Cir. April 5, 2012), available at
http://www.ca2.uscourts.gov/decisions/isysquery/c5792ca8-db37-4107-b0f7-67548a6a5a5f/1/doc/10-3270_103342_opn.pdf#xml=http://www.ca2.uscourts.gov/decisions/isysquery/c5792ca8-db37-4107-b0f7-67548a6a5a5f/1/hilite/.
92
Id. at 2.
182
Media Law & Policy
Some have analyzed that this decision will potentially cost Google/YouTube millions of dollars in
future litigation.93
2. Aereo
In March 2012, a group of broadcasters sued Aereo, an unlicensed service that provides
streaming television content to subscribers over the Internet onto personal mobile devices and
tablets.94 The broadcasters sought a preliminary injunction against Aereo and alleged that the
Internet company infringed the broadcasters’ public performance right and reproduction right and
alleged that the new service constituted unfair competition. In July, 2012, Aereo received an early
victory, as a federal district court judge denied the broadcasters’ request for a preliminary injunction.
The judge ruled that “although [the plaintiffs] have demonstrated that they face irreparable harm,
they have not demonstrated that the balance of hardships decidedly tips in their favor.”95 On April 1,
2013, the Second Circuit Court of Appeals essentially affirmed the district court’s decision, leaving
the case to proceed to trial.
B. Peer-to-Peer Technologies
The CyberSky TV decision mirrors the decision the United States Supreme Court handed
down in MGM v. Grokster in regards to advertising infringing features.96 In the 2005 case, the
Supreme Court applied the rule of inducement of infringement to Grokster's activities. The court
held that "one who distributes a device with the object of promoting its use to infringe copyright, as
shown by a clear expression or other affirmative steps taken to foster infringement is liable for the
resulting acts of infringement by third parties."97 "The classic instance of inducement is by
advertisement or solicitation that broadcasts a message designed to stimulate others to commit
violations."98
Traditionally the inducement rule has been used to hold liable an indirect infringer. The
District Court for the Southern District of California in Perfect 10 v. Megaupload, recently found that
"creat[ing] distinct websites, presumably in an effort to streamline users' access to different types of
media . . . [Megaupload] encourages and, in some cases pays its users to upload" copyrighted
media.99 The court found this action along with the knowledge of infringing activity taking place on
its websites to be volitional conduct and denied Megauploads motion to dismiss.100 The District
93
Sam Gustin, Federal Court Revives Landmark $1 Billion Viacom vs. YouTube Case, TIME BUSINESS, April 6, 2012,
http://business.time.com/2012/04/06/federal-court-revives-landmark-1-billion-viacom-vs-youtube-case/?iid=biz-main-lede.
94
See Complaint for Injunctive Relief and Damages (Mar. 1, 2012),
http://www.nab.org/documents/newsRoom/pdfs/030112_Aereo_complaint.pdf.
95
American Broadcasting Companies, Inc. v. Aereo, Inc., (S.D.N.Y 2012); see also Christina Warren, Aereo Gets Early Win in
Lawsuit Against Broadcasters, MASHABLE ENTERTAINMENT, July 11, 2012, http://mashable.com/2012/07/11/aereo-injunctiondenied/.
96
MGM Studios Inc. v. Grokster, Ltd., 545 U.S. 913(2005).
97
Id., at 936-37.
98
Id. at 937.
99
Perfect 10, Inc. v. Megaupload Ltd., 2011 U.S. Dist. LEXIS 81931 11-12 (S.D. Cal. 2011).
100
Id. at 12-13.
183
Spring 2013 │ Volume 20 │ Number II
Court for the Central District of California has issued permanent injunctions against websites such as
torrentbox.com and isohunt.com after finding they induced infringement.101 The court enjoined the
sites from hosting or providing access to any copyrighted works and assisting users in reproduction
of copyrighted works.102
C. Technical Measures for Protection Against Unauthorized Use and the Making of Private
Copies
In 1998, Congress passed the Digital Millennium Copyright Act (DMCA), part of which is
embodied in section 1201 of the Copyright Act.103 The DMCA concerns circumvention technological
protections designed to restrict access to and preserve the right to copyrighted works.104 The Act
prohibits individual acts of circumvention that control access to a work105, manufacturing or offering
devices that circumvent and provide access to a work106 or designed for the purpose of circumventing
a protection that protects an exclusive right of a copyright owner.107
In 2005, Sony BMG was using copy protected CDs to install digital rights management
(DRM) technology onto personal computers (PC).108 CDs purchased from Sony were installing a root
kit on to the consumers' PCs that enacted a restrictive DRM including possible incompatibility with
common devices used for playing the CDs.109 This resulted in a public relations fiasco for Sony
BMG. The means used to employ the software was criticized and eventually classified as "spyware"
by Computer Associates, which provided tools for its removal.110 This incident highlights the fragile
balancing a company must take to protect their intellectual property without alienating the consumer.
D. Public Viewing Exhibitions – Section 110 of the Copyright Act
Section 110 of the Copyright Act lists the types of performances and displays that are exempt
from copyright infringement.111 For example, food and drink establishments smaller than 3,750
gross square feet are among the exemptions under U.S. Copyright law, which explains why so many
restaurants and bars are permitted to show sporting events. Food and drink establishments larger
101
See Columbia Pictures Indus. v. Fung, 2010 U.S. Dist. LEXIS 91169 (C.D. Cal. 2010).
102
See id., at 20-30.
103
See 17 U.S.C. 1201 (2012).
104
See §1201(a)(1)(A).
105
§1201(a)(1).
106
§1201(a)(2).
107
§1201(b).
108
See Molly Wood, DRM this, Sony!, CNET.COM, Nov. 10, 2005, http://www.cnet.com/4520-6033_1-6376177-1.html.
109
Id.
110
See Suzi Turner, CA Targets Sony DRM as Spyware, ZDNET.COM, Nov. 8, 2005, http://www.zdnet.com/blog/spyware/catargets-sony-drm-as-spyware/698.
111
See generally 17 U.S.C. § 110 (2006).
184
Media Law & Policy
than 3,750 gross square feet are also exempt, although subject to restrictions regarding the size and
number of televisions broadcasting the sporting event.112
When it comes to the Super Bowl, America’s most-watched sporting event, the National
Football League (“NFL”) has sought to strictly enforce its copyright in recent years. In particular,
the NFL has targeted churches that violated federal copyright law when hosting gatherings for the
Super Bowl. For example, in 2007, the NFL warned Fall Creek Baptist Church in Indianapolis about
hosting a Super Bowl party that it planned on showing on its projector to about 400 people.113 Under
the Copyright Act, venues other than food and drink establishments smaller than 2,000 gross square
feet are exempt. Such venues that are larger than 2,000 gross square feet are also exempt so long as
they comply with the same restrictions imposed upon food and drink establishments.114 The NFL
targeted churches in large part because a significant number of churches had projection screens
exceeding the 55-inch maximum size restriction under the Copyright Act.115
On February 4, 2008, a bill was introduced in the United States Senate that sought to amend
the Copyright Act to provide an exemption for non-profit organizations.116 Although the bill was
never enacted into law, it caused enough publicity for the NFL to reverse its hard stance in seeking to
enforce its copyright against churches.117 While the NFL has relaxed its stance against churches,
these establishments still must comply with certain requirements in order to host Super Bowl parties
without facing potential liability. First, churches may not charge admission for any of its guests.
Second, churches must show the game on equipment that they use in the regular course of ministry at
their venue. Finally, although not explicitly required, churches should refrain from advertising the
event as a “Super Bowl” party since the NFL has trademarked the term.118
The NFL’s aggressive efforts in enforcing its copyright have caused some to criticize the
league for abusing and overstating its copyright protection under the current law.119 Since the
Copyright Act allows rights holders to define what constitutes infringement of their work, critics
argue that it adds an incentive for a powerful organization such as the NFL to issue warnings about
infringement that a court may deem to be fair use. Further, such organizations make it more
112
17 U.S.C. § 110 (5)(B)(ii) (2006).
113
Robert Marus, Church Super Bowl Parties OK as Long as NFL Rules Followed, Experts Say, ASSOCIATED BAPTIST PRESS,
Jan. 29, 2010, http://www.abpnews.com/content/view/4787/53/.
114
17 U.S.C. § 110 (5)(B)(i) (2006).
115
Id. See also Susan Fontaine Goodwin, Avoid Penalties of Super Bowl Copyright Infringement, COPYRIGHT COMMUNITY, Jan.
25, 2012, http://www.copyrightcommunity.com/avoid-being-tackled-by-super-bowl-copyright-infringement.
116
S. 2591 110th Cong. § 1 (2008).
117
Jacqueline L. Salmon, NFL Reverses Call on Church Parties, THE WASHINGTON POST, Feb. 21, 2008, available at
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/20/AR2008022002772.html.
118
Goodwin, supra note 31.
119
See Tyler McCormick Love, Throwing the Flag on Copyright Warnings: How Professional Sports Organizations
Systematically Overstate Copyright Protection, 15 J. INTELL. PROP. L. 369 (2008).
185
Spring 2013 │ Volume 20 │ Number II
confusing for the general public to realize what constitutes infringement.120 As a result, innovation is
stifled, as businesses are prevented from profiting from fair use of copyrighted material.121
E. Recent Developments
In 2011, the United State Senate introduced the Protect IP Act (PIPA), an anti-piracy bill.122
Later in 2011, Representative Lamar Smith of Texas introduced PIPA’s counterpart in the House, the
Stop Online Piracy Act (SOPA).123 SOPA’s stated purpose was “[t]o promote prosperity, creativity,
entrepreneurship, and innovation by combating the theft of U.S. property, and for other purposes.”124
Both bills would permit the United States Justice Department and copyright-holders broader power in
seeking injunctions against copyright-infringing websites. While PIPA was aimed directly at foreign
web sites, SOPA targeted both foreign and domestic sites.125 Critics of the proposed legislation fear
that aggressive copyright-holders will further overstep their boundaries if the law was enacted.
Further, critics worry that social media web sites could be shut down if the sites linked to infringing
material.126 With the bill facing much scrutiny, Representative Smith withdrew his proposed
legislation in early 2012, stating, “I have heard the critics and I take seriously their concerns
regarding proposed legislation to address the problem of online piracy. It is clear that we need to
revisit the problem of foreign thieves that steal and sell American inventions and products.”127 Both
bills thus are now defunct, with the beginning of a new session of Congress.
120
Id at 389-90.
121
Id. at 396.
122
S. 968, 112th Cong. (2011).
123
H.R. 3261, 112th Cong. (1st Sess. 2011).
124
Id.
125
Luke Johnson, What is SOPA? Anti-Piracy Bill Explained, THE HUFFINGTON POST (Jan. 19, 2012, 3:27 PM),
http://www.huffingtonpost.com/2012/01/19/what-is-sopa_n_1216725.html.
126
Id.
127
Todd Wasserman, SOPA is Dead: Smith Pulls Bill, MASHABLE US & WORLD, Jan. 20, 2012,
http://mashable.com/2012/01/20/sopa-is-dead-smith-pulls-bill/.
186
Media Law & Policy
MEDIA LITERACY:
NO LONGER THE SHRINKING VIOLET OF EUROPEAN AUDIOVISUAL MEDIA
REGULATION?
Tarlach McGonagle*
I. INTRODUCTION
Media literacy is very much in the ascendant in European regulatory and policy-making circles
at the moment, prompting the suggestion that it has now lost its erstwhile shrinking-violet status in
the European audiovisual media sector. For a discussion of the term’s definitions, see Section II
infra.1
The article will commence with a brief exploration of selected theories surrounding media
literacy. More precisely, it will canvas the main rationales for promoting media literacy, definitional
issues, and the groups centrally implicated in media literacy initiatives – both as target groups and as
other stakeholders. The article will then identify, contextualise and scrutinise the key reference points
for the promotion of media literacy in the European audiovisual regulatory and policy frameworks.
Both the EU and the Council of Europe have adopted a number of legally binding and policy
instruments that aim to improve media literacy levels across Europe. Finally, the article will consider
the prospects for the future development of media literacy within European regulatory structures.
II. THEORETICAL APPROACHES
A. Rationales
Different rationales are advanced for the promotion of media education or literacy. According
to some experts, a coherent rationale could be developed if governments were to prioritise “the three
P’s of sound Public Policy:”
 Provision of media education for all their citizens;
 Participation of all their citizens in social, cultural and economic activities, and
 Protection of all citizens in need (either because of their age, their disabilities or their
income).2
*
Senior Researcher and Assistant Professor, Institute for Information Law (IViR), Faculty of Law, University of Amsterdam,
Netherlands. B.A., National University of Ireland, Galway (1998); LL.M., University of Essex (2001); Ph.D., University of
Amsterdam (2008). This is an updated and slightly adjusted version of an article with the same title that was published in
Susanne Nikoltchev, Ed., Media Literacy, IRIS plus 2011-3 (Strasbourg, European Audiovisual Observatory, 2011), pp. 7-27.
The author is very grateful to Kevin van ‘t Klooster, research intern at IViR, for his valuable research assistance and background
summaries relied on during the preparation of this article. He is also very grateful to Freek Ingen Housz, Department for Media,
Literature and Libraries at the Dutch Ministry of Education, Culture and Science, for sharing his keen insights into the
organisation and activities of the Mediawijzer.net initiative. Thanks are also due to Irene Andriopoulou, Media Researcher and
Head of the Media Literacy Department of the Hellenic Audiovisual Institute (IOM, website: www.iom.gr) for helpful
information provided about the IOM.
1
Discussion at note 10 infra et seq.
2
Divina Frau-Meigs & Jordi Torrent, Media Education Policy: Towards a Global Rationale, in MAPPING MEDIA EDUCATION
POLICIES IN THE WORLD 14, 20 (The United Nations Alliance of Civilization in co-operation with Grupo Communicar, Divina
Frau-Meigs & Jordi Torrent eds., 2009), available at http://unesdoc.unesco.org/images/0018/001819/181917e.pdf..
187
Spring 2013 │ Volume 20 │ Number II
While a coherent overarching rationale might be welcome from a theoretical perspective, its
absence should not and does not hamper the development of media literacy in practice. Indeed, the
diversity of rationales underpinning media literacy is instructive insofar as it captures the different,
cross-sectoral, multi-stakeholder interests involved.
For the purposes of this article, the main rationales for promoting media literacy have been
selected and organised as follows:
 Civic participation/empowerment;
 Bridging the digital divide;
 Risk reduction/protection from harmful content;
 Informed decision-making/consumer protection.3
These rationales have achieved resonance in academic discourse and in practice. The European
Broadcasting Union (an umbrella organisation representing the interests of public service
broadcasters and media in Europe), for instance, has organised its Principles on Media Literacy along
three main axes: “[b]ridging the digital divide,” “inform[ing] and empower[ing] citizens to
democracy,” and “creating a trusted space.”4 The relevance of these (groups of) rationales becomes
more evident after having summarised the essence of what media literacy is and involves, i.e., a
critical, civic activity with important technological and ethical ramifications, is described.5 Many
summaries exist, including the following one:
Learning to analyze news and advertising, examining the social functions of
music, distinguishing between propaganda, opinion and information, examining
the representation of gender, race and class in entertainment and information
media, understanding media economics and ownership, and exploring ways in
which violence and sexuality are depicted in media messages continue to matter
as important life skills. With the rise of digital media, there are a range of
important new media literacy skills, where we must consider issues of personal
and social identity, the complex interplay between what’s private and what’s
public, and legal and ethical issues. The powerful conceptual framework of
audiences and authors, messages and meanings, representations and realities can
deepen students’ reflexivity, critical thinking, and communication skills.6
A powerful participatory rationale underpins media literacy. Drawing on the foregoing citation,
media literacy can be described as “a prerequisite for full participation in late modern society,
involving as it does the critical skills of analysis and appreciation of the social dynamics and social
centrality of media as framing the cultures of the everyday.”7 It empowers individuals and enables
them to participate more fully in democratic societies, which are increasingly reliant on media and
information and communication technologies (ICTs).
3
For a rich exploration of relevant issues, see generally EMPOWERMENT THROUGH MEDIA EDUC. (Ulla Carlsson et al. Eds, 2008).
4
Empowering Citizenship Through Media Literacy: the Role of Public Service Media, EUROPEAN BROAD. UNION VIEWPOINT 1
(Feb. 3, 2012),
http://www3.ebu.ch/files/live/sites/ebu/files/Knowledge/Publication%20Library/Viewpoint_Media_literacy.pdf.
5
See generally Roger Silverstone, Regulation, Media Literacy and Media Civics, 26 MEDIA, CULTURE, AND SOCIETY 440, esp.
447 (2004), available at http://www.infoamerica.org/documentos_pdf/silverstone06.pdf
6
Renee Hobbs & Amy Jensen, The Past, Present, and Future of Media Literacy Education, 1 JOURNAL OF MEDIA LITERACY
EDUC. 1, 9 (2009).
7
Silverstone, supra note 4, at 448.
188
Media Law & Policy
The aim to reduce or eliminate the digital divide stems from the realisation that access to
digital resources and the ability to use them effectively is empowering in political, economic, social
and cultural terms. Disadvantage, in terms of digital capacity, can therefore create new societal
divisions or exclusions or exacerbate existing ones.
Analytical, evaluative and technological skills are required to protect against and minimise the
risk of adverse consequences from exposure to harmful media content. These skills facilitate the
making of “informed choices when using the Internet and other ICT’s by using and referring to
diverse media forms and content from different cultural and institutional sources; understanding how
and why media content is produced; critically analysing the techniques, language and conventions
used by the media and the messages they convey; and identifying media content and services that
may be unsolicited, offensive or harmful.”8 Similarly, by facilitating informed decision-making about
media content, these skills can also enhance awareness, alertness and consumer protection.
The process of forging a definition of media literacy necessarily draws on the rationales for
and objectives of media literacy. The consideration of its objectives sometimes includes an
itemisation of the competences that media literacy seeks to develop, as in the Preamble to the EU’s
Audiovisual Media Services Directive,9 or in the civil society initiative that culminated in the drafting
of the European Charter for Media Literacy. According to this Charter, media-literate people “should
be able to:
 Use media technologies effectively to access, store, retrieve and share content to meet
their individual and community needs and interests;
 Gain access to, and make informed choices about, a wide range of media forms and
content from different cultural and institutional sources;
 Understand how and why media content is produced;
 Analyse critically the techniques, languages and conventions used by the media, and the
messages they convey;
 Use media creatively to express and communicate ideas, information and opinions;
 Identify, and avoid or challenge, media content and services that may be unsolicited,
offensive or harmful;
 Make effective use of media in the exercise of their democratic rights and civic
responsibilities.10
In the same vein, some experts refer to “the 6 C’s of the Competences for media education:
Comprehension, Critical Capacity, Creativity, Consumption, Citizenship and Cross-Cultural
Communication.”11
The integration of the many diverse elements discussed in this section into a definition of
media literacy is no easy task, as will duly be explained.
B. Definitional Difficulties
8
Recommendation of the Committee of Ministers to Member States on Measures to Promote the Public Service Value of the
Internet, 1010th Sess., Rec. No. R 16 (2007), available at https://wcd.coe.int/ViewDoc.jsp?id=1207291.
9
See infra note 33.
10
The European Charter for Media Literacy, EUROMEDIALITERACY, para. 2, available at
http://www.euromedialiteracy.eu/charter.php.
11
Frau-Meigs & Torrent, supra note 1, at 20-21.
189
Spring 2013 │ Volume 20 │ Number II
On the back of the foregoing general introduction, it is useful to dwell on the question of how
media literacy is defined, because, as noted by a leading authority on the subject, Sonia Livingstone,
it “has consequences for the framing of the debate, the research agenda and policy initiatives.”12
The term, media literacy, has so far proved somewhat resistant to a fully consensual
definition.13 It means different things to different people in different sectors. As Livingstone notes,
“confusion” tends to arise when a given term is used “across diverse disciplines.”14 There is not even
agreement on the superiority of the term to other adjacent terms, like media education or media
literacy education. Different terms, reflecting different priorities, rationales and emphases, have been
in vogue during different periods of scholarship and policy-making.15 Whereas terminological
choices usually result from considered calculation, they can also, on occasion, result from the
convenience of convention. For the purposes of this article, the term media literacy will be used as
consistently as possible because it is the term preponderantly used in key regulatory texts at the
European level.16
The difficulty in defining the term media literacy stems partly from its compound nature: it
comprises two discrete terms, each of which is definitionally resistant in its own right. A recurrent
question in scholarship and in policy-making circles concerns the scope of the term media.
Increasingly, in the context of media literacy (at least), the term media is taken to be an inclusive
term, covering all types of media. In light of the contemporary reality of media convergence, an
inclusive understanding of media seems logical. An integrated approach to media literacy would
therefore also seem logical: “With the rapid growth of ICTs and the resulting convergence of new
and traditional media, it is necessary that media and information literacy be considered holistically
and applied to all forms of media, regardless of their nature and the technologies used.”17
Nevertheless, partly in recognition of the different functionalities of the plethora of media
operating today, it is debatable whether a unified form of “literacy” can be considered appropriate.
Distinctions are frequently made between media, digital and other types of literacy (e.g. search
engine literacy).18 These distinctions reflect, amongst other things, the different nature and
functionality of various media types. Following this horses-for-courses logic, it can be argued that
different literacies are required. As explored below, there is a marked tendency in European-level
regulatory and policy-making circles to accentuate the need for literacy in respect of digital or online
12
Sonia Livingstone, Media Literacy and the Challenge of New Information and Communication Technologies 7 COMM. REV. 3,
5 (2004), available at http://eprints.lse.ac.uk/1017/1/MEDIALITERACY.pdf.
13
For more on scholarly and civil society approaches to the term “media literacy” see W. James Potter, The State of Media
Literacy, 54 J. BROAD. AND ELECTRONIC MEDIA 675, 676 (2010).
14
Livingstone, supra note 10, at 5.
15
For an overview see Hobbs & Jensen, supra note 5.
16
For example, see infra note 31.
17
Abdul Waheed Khan, Foreword to MAPPING MEDIA EDUC. POLICIES IN THE WORLD 9-10 (Divina Frau-Meigs & Jordi Torrent
eds., 2009).
18
“Search engine literacy” was included as a sub-set of media literacy in para. 19 of the Recommendation of the Committee of
Ministers to Member States on the Protection of Human Rights With Regard to Search Engines, 1139thSess. Rec. No. R. 3
(2012), available at
https://wcd.coe.int/ViewDoc.jsp?Ref=CM/Rec(2012)3&Language=lanEnglish&Ver=original&BackColorInternet=C3C3C3&Ba
ckColorIntranet=EDB021&BackColorLogged=F5D383.
190
Media Law & Policy
media, due to the newness, relative complexity, and unfamiliarity of the underlying technologies for
many people. This implies that strategies to develop literacy have to engage the relationship between
technology and media dynamics, uses, and effects.
It is also useful to pry open the term literacy and group the main understandings of the term.
Some approaches emphasise that the primary aim of media literacy is to increase skills, build
knowledge, or both.19 Media literacy is also perceived as an activity or a “political, social, and
cultural practice.”20 As recalled from the previous section, media literacy can also be described as a
critical activity and a civic activity with moral underpinnings.21
Notwithstanding all of the aforementioned definitional difficulties, a definition of media
literacy has been developed and widely endorsed in academic, regulatory and policy-making circles.
Drawing on the work of others, Livingstone synthesises “media literacy” as “the ability to access,
analyze, evaluate, and create messages in a variety of forms.”22 These four components of the
definition point to: (i) the natural affinity of media literacy with questions of technological access to
media content; (ii) the centrality of critical, i.e., analytical and evaluative skills needed to interpret
and process media content, and (iii) the complementary nature of first-hand experience of production
and content-creation as a learning tool to enhance relevant critical competences.23 Livingstone
describes this as a “nonlinear, dynamic learning process” in which each component supports the
others: “Learning to create content helps one to analyze that produced professionally by others; skills
in analysis and evaluation open the doors to new uses of the Internet, expanding access, and so
forth.”24 Very significantly, the definition of media literacy relied upon by the European Commission
closely resembles Livingstone’s synthesised definition.
C. Key Target Groups and Constituents
Bearing in mind the four main rationales for the promotion of media literacy outlined above, a
number of target groups can be identified: children/minors; adolescents; parents; the public; the
elderly; persons with disabilities; linguistic minorities; the socially and economically deprived; media
users; consumers; etc.
There is a clear tendency to prioritise children/minors (and parents – by virtue of their
relationship to children). The protection and empowerment aims underlying that prioritisation
sometimes also include adolescents. Relevant strategies tend to focus on both formal, informal (e.g.
in the home) and non-formal (e.g. awareness campaigns outside of school and the home) education.
When measures promoting media literacy target other groups, strategies often differ. For
instance, when targeting general members of the public, lifelong/ongoing and non-formal educational
measures are likely to be preferred to formal educational measures. The public is, however, a very
19
Potter, supra note 11, at 679.
20
Id. at 680.
21
Silverstone, supra note 4, at 447 [this is actually on page 15 of document cited in the URL cited above].
22
Livingstone, supra note 10, at 3 .
23
For a detailed exploration of the interface between media literacy and user-generated content from a broadcasting perspective
see Martin Scott, GUIDELINES FOR BROADCASTERS ON PROMOTING USER-GENERATED CONTENT AND MEDIA AND INFO. LITERACY
(Commonwealth Broadcasting Assoc. & UNESCO, 2009).
24
Livingstone, supra note 10, at 5.
191
Spring 2013 │ Volume 20 │ Number II
diffuse term. It can therefore be useful to identify particular subsets of the public that have a
heightened need to acquire media literacy. The elderly, persons with disabilities and those suffering
from socio-economic disadvantage are all recognised as having particular needs in respect of the
various components of the definition of media literacy and based on the various rationales for
promoting media literacy: civic participation/empowerment, reduction of (informational)
inequalities, protection, informed decision-making.
It is important to reflect upon the extent to which the specific needs of these groups are
meaningfully catered to by existing regulatory and institutional frameworks, processes and initiatives
to promote media literacy at the European and national levels. This question will be revisited, after
having examined the approach taken by the European Union and the Council of Europe, in the
section, “Outlook,” below.
Media literacy has a broad constituency that extends well beyond its most obvious target
groups. Stakeholders typically include: regulatory authorities; policy-makers; administrative
authorities; media organisations and professionals; educational institutions and professionals; civil
society interest groups, etc. The involvement of stakeholders stretches from the international level to
the most local level. The roles of stakeholders vary enormously, depending on the nature of a given
measure, its aim(s) and target group(s), the context in which it is employed, etc.
An excellent illustration of the multiplicity and interconnectedness of themes, target groups
and stakeholders is provided by the Dutch media literacy expertise centre/network, Mediawijzer.net.25
It has developed an interactive Media Literacy map that is an adaptation of a subway map, with
stakeholders26 dotted along the main thematic lines, often intersecting.27 This map is divided into
three main sections, each of which is divided into sub-sections:
Media Use & Creation
Social Participation
Innovation
Information and strategic
Identity management
Innovation
skills
Empowerment
Practical skills
Copyright
Media consciousness
Responsible use and safety
The target groups, which are divided into “primary groups” (children, youth, parents, teachers)
and “secondary groups” (everyone/citizens, civil society, media professionals, elderly, the socially
disadvantaged, leaders), form the stops. By clicking on the stops, the user is transferred to the
relevant information linked to the specific target group and sub-category.
25
For an overview of the centre/network see Expertise centre for media literacy, MEDIAWIJZER,
http://www.mediawijzer.net/about-mediawijzer; See also Freek Ingen Housz, “Dutch Policy on Media Literacy and Digital
Skills”, in Susanne Nikoltchev, Ed., Media Literacy, op. cit., pp. 39-43.
26
The stakeholders featured on the map are children, youth, parents, teachers, leaders, civil society, media professionals,
everyone/citizens, and the socially disadvantaged.
192
Media Law & Policy
III. NORMATIVE APPROACHES AT THE EUROPEAN LEVEL
It is important to note the particular (de-)regulatory context in which the promotion of media
literacy has recently come to the fore in Europe. The promotion of media literacy has traditionally
often been coupled with the aim of preventing or minimising “negative media effects.”28 This
explains its prominence in the broader policy discourse about the protection of minors, especially in
an online environment.29 It also explains the EU’s promotion of media literacy in respect of
commercial communications.
The emergence of the promotion of media literacy as a policy and regulatory goal has also
coincided with strong deregulatory trends. In such a context, educational measures are presented as
alternatives to regulation. Writing in 2004, Roger Silverstone opined that “[v]ery little critical
attention ha[d] been given either to [media] literacy or [media] civics as an alternative to the
blunderbuss of media regulation, or to the possibility of developing an ethical agenda which would
inform such a project”.”30 More recently, regulatory emphases on media literacy have been criticised
by various expert commentators as being proxies for content regulation seeking to minimise the
effects of harmful media content.31 The criticism is that the promotion of media literacy has been
used to make the deregulatory thrust more palatable to those concerned about the protection of
individual fundamental rights and interests. The onus for the prevention of harm is shifted, the
argument runs, from public institutions to the private sphere.32 Jackie Harrison and Lorna Woods
capture the dilemma well when they observe that:
[R]eliance on information technology and the viewer not only changes the
relationship between the viewer and the regulatory system but may result in
some viewers failing to make active choices, instead relying on the default
positions programmed in by the technology. Regulation has been devolved to
the viewer, but in this instance, in effect, returns to an industry player. An
industry player, however, might not have primary regard to the public interest
(which is at least what regulators claim to do) or to the needs of citizen
viewers.33
28
Potter, supra note 11, at 690.
29
See Safer Internet Programme: Empowering and Protecting Children Online, EUROPEAN COMMISSION’S INFO. SOC’Y
THEMATIC PORTAL, http://ec.europa.eu/information_society/activities/sip/index_en.htm (Demonstrating the centrality of the goal
of promoting media literacy in the European Commission’s Safer Internet Programme); See also EU Kids Online, LSE MEDIA
AND COMMUNICATIONS, http://www.eukidsonline.net (last updated March 29, 2012) (Describing the work of the thematic network
funded by the Programme EU Kids Online II); See also Recommendation of the European Parliament and the Council on the
Protection of Minors and Human Dignity and on the Right of Reply in Relation to the Competitiveness of the European
Audiovisual and On-Line Information Services Industry 2006 O.J. (L 378) 72 (EU), available at http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:378:0072:0077:EN:PDF.
30
Silverstone, supra note 4, at 447.
31
See Divina Frau-Meigs, L’éducation aux medias est-elle nécessaire? A quelles conditions?, Les e-Dossiers de l’audiovisuel,
INA Sup (January 2011), http://www.ina-sup.com/node/1591; See also Brian O’Neill, Current Policy Developments in European
Media Literacy, 6 INT’L JOURNAL OF MEDIA AND CULTURAL POLITICS 235, 237 (2010).
32
Brian O’Neill, Media Literacy and Communication Rights: Ethical Individualism in the New Media Environment, 72 INT’L
COMM. GAZETTE 323, 325 (2012).
33
Jackie Harrison & Lorna Woods, European Broad. Law and Policy, 241 (Cambridge University Press, 2007).
193
Spring 2013 │ Volume 20 │ Number II
Silverstone’s enthusiasm for media literacy as an alternative to regulation and scepticism about
the manner in which media literacy is currently being promoted in regulatory frameworks are not
necessarily mutually exclusive. What Silverstone had in mind was a well thought-out, multi-stranded
approach to be developed progressively. The criticism of the current regulatory approach that media
literacy has been devised as a quick fix in an accelerated deregulatory process does not rule out the
suitability of a well-calibrated approach promoting media literacy. That goal is a real and legitimate
challenge for the future development of the media literacy agenda, as will be discussed below.
Meeting that challenge head-on requires an appreciation of the potential and limitations of media
literacy. It has been noted, for instance, that “moves to foster critical media literacy will not, of
themselves, be enough to eliminate the various detrimental aspects of content provision, such as
gratuitous violence in the media, the breach of consumer rights by media services, the lack of
authenticity and validity, and manipulation.”34
A. European Union
1. Audiovisual Media Services Directive
In the Introduction to this article, it was hinted that recent regulatory developments have been
decisive in altering the perceived status of media literacy in the European regulatory framework. A
major regulatory development was the explicit inclusion of media literacy in the Audiovisual Media
Services Directive (AVMSD).35 Alongside the AVMSD, media literacy has been steadily growing in
prominence on the EU agenda in recent years, and in particular on the agendas of the European
Commission, European Parliament, Council of the European Union and Committee of the Regions,
so much so that it can now be said to have reached the high-ground of policy-making for the
European audiovisual sector.36
The term media literacy is introduced and partially explained in Recital 47 of the Preamble to
the AVMSD:
‘Media literacy’ refers to skills, knowledge and understanding that allow
consumers to use media effectively and safely. Media-literate people are able to
exercise informed choices, understand the nature of content and services and
take advantage of the full range of opportunities offered by new
communications technologies. They are better able to protect themselves and
their families from harmful or offensive material. Therefore the development of
media literacy in all sections of society should be promoted and its progress
followed closely. The Recommendation of the European Parliament and of the
Council of 20 December 2006 on the protection of minors and human dignity
and on the right of reply in relation to the competitiveness of the European
audiovisual and on-line information services industry [footnote omitted] already
contains a series of possible measures for promoting media literacy such as, for
example, continuing education of teachers and trainers, specific Internet training
aimed at children from a very early age, including sessions open to parents, or
34
Committee of the Regions, Opinion on Regional Perspectives in Developing Media Literacy and Media Educ. in EU
Educational Policy, 2010 O.J. (C141) 16, para. 18.
35
See Directive 2010/13 of the European Parliament and of the Council on the Coordination of Certain Provisions Laid Down By
Law, Regulation or Administrative Action in Member States Concerning the Provision of Audiovisual Media Services, 2010 O.J.
(L95) 2 (EU).
36
O’Neill, supra note 30, at 324.
194
Media Law & Policy
organisation of national campaigns aimed at citizens, involving all
communications media, to provide information on using the Internet
37
responsibly.
The introduction and explanation are heavily coloured by relevant EU priorities. The Recital
underscores the potential of media literacy to “allow consumers to use media effectively and safely,”
enable “people” to “exercise informed choices,” and better enable them to “protect themselves and
their families from harmful or offensive material.”38 These examples of the value of media literacy
together prompt a call for its development to be promoted in “all sections of society.”39
Recital 47 also calls for progress in the development of media literacy to be “followed closely”
and thereby sets up a new reporting obligation for the European Commission. The obligation is
provided for in the first sentence of Article 33 of the Directive, as follows:
Not later than 19 December 2011, and every 3 years thereafter, the Commission
shall submit to the European Parliament, to the Council and to the European
Economic and Social Committee a report on the application of this Directive
and, if necessary, make further proposals to adapt it to developments in the field
of audiovisual media services, in particular in the light of recent technological
developments, the competitiveness of the sector and levels of media literacy in
all member states.
This reporting obligation is unusual because the Directive does not create any (substantive)
obligation on EU Member States to promote media literacy. In other words, the Commission is
obliged to report periodically on "levels of media literacy in all member states," but there is no prior,
formal obligation on Member States to improve levels of media literacy. The cyclical nature of the
envisaged reporting could facilitate a close following of progress in the development of media
literacy across member states, but the first report, issued in May 2012, provided only very scant
information. It revealed that 28% of the EU's population has a basic level of critical understanding,
41% a medium level and 31%, an advanced level.40
2. Commission Communication
The European Commission adopted its Communication, titled “A European approach to media
literacy in the digital environment,” in December 2007.41 The European Parliament had earlier called
37
See Directive 2010/13 of the European Parliament and of the Council on the Coordination of Certain Provisions Laid Down By
Law, Regulation or Administrative Action in Member States Concerning the Provision of Audiovisual Media Services, 2010 O.J.
(L95) 2.
38
39
Id.
Id.
40
First Report from the Commission to the European Parliament, the Council, the European Economic and Social Committee and
the Committee of the Regions on the Application of Directive 2010/13/EU “Audiovisual Media Services Directive”, COM(2012)
203 final, 4 May 2012, p. 10. These statistics are based on monitoring conducted during the reference period for the report, 20092010: Danish Technological Institute and European Association for Viewers’ Interests, Testing and Refining Criteria to Assess
Media Literacy Levels in Europe, April 2011.
41
Communication from the Committee to the European Parliament, the Council, the European Economic and Social Committee
and the Comm. of the Regions, A European Approach to Media Literacy in the Digital Environment, COM (2007) 833 final (Dec.
20, 2007) (“A European Approach To Media Literacy in the Digital Environment”).
195
Spring 2013 │ Volume 20 │ Number II
on the Commission to adopt a Communication on education in media.42 The adoption of the
Communication also followed the establishment of an Expert Group on Media Literacy and a public
consultation on media literacy in 2006.43
The Communication states that media literacy is “generally defined as the ability to access the
media, to understand and to critically evaluate different aspects of the media and media contents and
to create communications in a variety of contexts.”44 As already mentioned above, this definition
resonates with the definition synthesised by Sonia Livingstone, thereby making for a measure of
consistency across academic and policy approaches at the European level. The Communication states
that a “European approach to media literacy should relate to all media” and identifies various levels
of media literacy: “feeling comfortable with all existing media;” “actively using media;” “having a
critical approach to media;” “using media creatively;” “understanding the economy of media and the
difference between pluralism and media ownership,” and “being aware of copyright issues which are
essential for ‘a culture of legality.’”45
An important section of the Communication, entitled “media literacy in the digital environment
– good practices,” concentrates on three areas: commercial communication, audiovisual works and
online. The three focus areas are designed to organise and group relevant priorities.
The Communication concludes by calling on member states to:
 encourage greater involvement by the authorities in charge of audiovisual and electronic
communication regulation in the improvement of the various identified levels of media
literacy;
 “promote systematic research into and regular observation of and reporting on the
different aspects and dimensions of media literacy;”
 “develop and implement codes of conduct and, as appropriate, co-regulatory frameworks
in conjunction with all interested parties at national level, and promote self-regulatory
initiatives.”46
The Communication was welcomed by the Council of the European Union as “a further
building block to European audiovisual policy.”47 The Council endorsed the Commission’s linking of
media literacy to “active citizenship in today’s information society.”48 It recognised the diversity of
efforts undertaken in member states to promote media literacy and the importance of identifying and
promoting relevant best practices, partly against the absence of “common criteria and indicators for
measuring media literacy.”49 The importance of education, training and teacher-training are also
42
Report on the transition from analogue to digital broadcasting: an opportunity for European audiovisual policy and cultural
diversity (2005/2212 (INI)), European Parliament Committee on Culture and Education (Rapporteur: Henri Weber), Doc. No.
A6-0075/2006, 23 March 2006, para. 9.
43
See generally Media Literacy Consultation, EUROPEAN COMM’N,
http://ec.europa.eu/culture/media/literacy/act_prog/consultation/index_en.htm.
44
See European Parliament Resolution on Media Literacy in a Digital World, EUR. PARL. DOC. INI 2129 (2008) at 3.
45
Id. at 4.
46
Id. at 8-9.
47
Council Conclusions on a European Approach to Media Literacy in the Digital Environment, 2008 O.J. (C140) 8 (EU).
48
Id.
196
Media Law & Policy
recognised. Finally, the Council invited member states to take further action, echoing the three
conclusions of the Communication, and additionally emphasising the need for a multi-stakeholder
approach, the usefulness of awareness-raising strategies and the desirability of integrating media
literacy into lifelong learning strategies.50
3. Commission Recommendation
The Commission’s Recommendation on media literacy in the digital environment for a more
competitive audiovisual and content industry and an inclusive knowledge society, adopted in 2009,51
follows the same definition of media literacy as the Communication.52 The essence of the
Recommendation is directly addressed to member states and the media industry – and surprisingly,
perhaps, not the educational sector, as such. The recommendations for member states are envisaged
as being “in cooperation with the authorities in charge of audiovisual and electronic communication
regulation and in collaboration with supervisory data protection authorities where appropriate.”53 The
recommendations focus on co- and self-regulatory initiatives, continued research, educational
measures (including lifelong learning) and awareness-raising activities. For their part, the
recommendations for the media industry focus on information-provision and awareness-raising
strategies.
Like the Commission’s Communication, the Recommendation elicited a number of responses
from other EU bodies. The Conclusions of the Council of the European Union on Media Literacy in
the Digital Environment welcomed the Recommendation and stressed as additional considerations:
inter alia: the multi-dimensional nature of efforts to promote media literacy (including self- or coregulatory initiatives); the relevance of different levels of access to, and understanding of, media and
new communicative technologies and the relevance of different educational models for promoting
media literacy.54
It also recognised one of the key ambiguities about the development of media literacy: while it
is clear that it “is a dynamic and evolving concept and that common understanding of the concept is
affected by cultural, technological, industrial and generational differences, it is also clear that, with
the development of a global internet as a key part of the communications infrastructure, the citizens
of Europe and of the rest of the world are increasingly facing and living in a media landscape with
similar features.”55 As such, the progressive development of criteria to assess levels of media literacy
in member states should also reflect differentiated approaches at state-level.
4. European Parliament
49
Id. at 9.
50
Id.
51
Recommendation on Media Literacy in the Digital Environment for a More Competitive Audiovisual and Content Industry and
an Inclusive Knowledge Society, COM (2009) 6464 final (Aug. 20, 2009).
52
Id. at 3-4.
53
Id.
54
Conclusions of the Council of the European Union on Media Literacy in the Digital Environment, 27 November 2009.
55
Id. at 3.
197
Spring 2013 │ Volume 20 │ Number II
The European Parliament provided a very structured and detailed examination of media
literacy issues in its 2008 Resolution on media literacy in a digital world.56 It first inventoried key
European and international (e.g. UNESCO) regulatory and policy reference points for media
education and literacy. It then placed media literacy and its importance in current-day societal and
communicative contexts, before setting out key principles for the promotion of media literacy.
Among the key principles, there is attention for the role of regulatory authorities for audiovisual and
electronic communications to cooperate at various levels to improve media literacy (levels) as part of
a broader multi-stakeholder approach involving the development of codes of conduct and common
regulatory initiatives.57 A wide range of stakeholders are identified: journalists, broadcasters and
media organisations, as well as, importantly: “libraries, adult education centres, citizens’ cultural and
media centres, further education and training establishments and citizens’ media (e.g. community
media).”58 A call is made on the Commission, in the context of Article 33, AVMSD, to devise media
literacy indicators “with a view to fostering media literacy in the EU in the long term.”59 The critical,
communicative and creative skills inherent in media literacy are dwelt upon,60 before its importance
for intellectual property rights, consumer information, democratic participation and the promotion of
intercultural dialogue is noted.61
A focus on aims and target groups followed, and then an exploration of access questions and
educational angles, e.g. in schools, as part of teacher training and for the elderly. One of the specific
listed aims of media education is to “shed light on copyright aspects of media use and on the
importance of respecting intellectual property rights, in particular regarding the Internet, as well as
on data and privacy security and the right of informational self-determination.”62
5. The Committee of the Regions
The Committee of the Regions, one of the EU bodies to which the Commission’s
Communication was formally addressed, has also responded to the Communication and engaged in
other ways with issues surrounding media literacy.
In its Opinion on “Media Literacy” and “Creative Content Online”63 the Committee stressed
that the reporting exercise envisaged under Article 33, AVMSD,64 and other related activities “must
allow for the differences and progress made in media literacy at regional level in Europe and provide
examples of good practice by local and regional authorities and other stakeholders.”65 It underscored
56
57
58
59
60
61
Supra note 42.
Id.
Id.
Id.
Id.
Id.
62
Id.
63
Opinion of the Committee of the Regions on Media Literacy and Creative Content Online, 2008 (CdR 94).
64
In the original text, reference is made to Article 26, AVMSD, which was previously the operative provision.
65
Id.
198
Media Law & Policy
the vital role that can be played by local and regional authorities in developing educational and other
collaborative projects on media literacy, targeting a variety of groups, “especially children and young
people, the disabled and social groups that are at risk of exclusion.”66
In its Opinion on regional perspectives in developing media literacy and media education in
EU educational policy, the Committee reaffirmed the role of local and regional authorities in respect
of media literacy.67 It also stressed the importance of media literacy from a consumer rights
perspective. It also tapped into one aspect of the debate outlined in the section of definitional
difficulties, above, by highlighting that “a clear and substantive distinction must be made between
the main components of media literacy, because the development of each component requires its own
strategy, players and resources.68”
6. Miscellaneous Developments
Finally, three recent developments which are likely to influence the future promotion of media
literacy within the European Commission also deserve mention: (i) the conclusion of the activities of
the Media Literacy Expert Group; (ii) the transfer of responsibility for the development of media
literacy from the Commission’s Directorate-General for Information Society and Media to its
Directorate-General for Education and Culture, and (iii) the explicit inclusion of “Enhancing digital
literacy, skills and inclusion” as a key prong of the Commission’s Digital Agenda for Europe.69
First, following requests by the European Parliament,70 industry players and a number of
member states, the European Commission established the Media Literacy Expert Group:
To analyse and define media literacy objectives and trends, to highlight and
promote good practices at European level and propose actions in the field. In
particular, certain issues should be highlighted such as the importance of
promoting the protection of children, young people and human dignity in the
media and support the creation of a media environment appropriate for citizens’
social, educational and cultural needs. Also, working on the development of
reliable means of evaluation is fundamental.71
The Expert Group, which comprised European media literacy experts from a variety of
backgrounds, held its first meeting in March, 2006 and its tenth and final meeting in December
2010.72 Having been involved in the preparation of the Commission’s Communication and
Recommendation on media literacy, the Expert Group was adjudged by the Commission to have
66
Id..
67
Opinion of the Committee of the Regions on regional perspectives in developing media literacy and media education in EU
educational policy, 2010 O.J. (C 141) 16, 29 May 2010.
68
Id.
69
Digital Agenda for Europe, EUROPEAN COMMISSION’S INFORMATION SOCIETY, Media Literacy Expert Group,
http://ec.europa.eu/information_society/digital-agenda/index_en.htm.
70
See Report on the transition from analogue to digital broadcasting: an opportunity for European audiovisual policy and cultural
diversity (2005/2212 (INI)), European Parliament Committee on Culture and Education, supra note 40.
71
Supra note 67.
72
See generally The EU Media Literacy Expert Group 2006-2010, EUROPEAN UNION, available at:
http://www.nordicom.gu.se/cl/publ/letter.php?id=138#The%20EU%20Media%20Literacy%20Expert%20Group%202006%20%202010.
199
Spring 2013 │ Volume 20 │ Number II
fulfilled its objectives and completed its work, which led to the decision to discontinue its activities.
The Expert Group provided a valuable forum in which various aspects of media literacy could be
discussed; its access to the Commission also facilitated the political development of the media
literacy agenda. It is too early yet to speculate on how the absence of such an expert forum will
impact on the further development of media literacy at the European level. There had been earlier
calls for the Audiovisual Media Services Directive’s Contact Committee to do more work on media
literacy.73
In addition, as with the previous development, it is still too soon to predict what the likely
consequences of the “re-location” of media literacy under DG Education and Culture will be.
Whereas this could suggest an intention to embed media literacy more firmly in an educational
approach, it does not necessarily imply that the topic will be sidelined from media regulatory policy.
This also houses it alongside the EU’s MEDIA Programmes,74 which is interesting in light of earlier
calls for a “specific strand on media literacy” to be included in future MEDIA Programmes.75
Finally, the Commission’s Communication, A Digital Agenda for Europe, states that the
“digital era should be about empowerment and emancipation; background or skills should not be a
barrier to accessing this potential.”76 As noted in the section titled Definitional Difficulties above,
digital literacy is not identical to media literacy but the terms do interface in some important ways
(See supra p. 6). The shared objective of avoiding or reducing social and other forms of exclusion is
relevant in this connection. The inclusion of the item “Enhancing digital literacy, skills and
inclusion” in the Communication prepares the ground for further EU-level cross-institutional action
in the field.77
B. Council of Europe
It was noted in the Introduction that there is considerable terminological variety in discussions
of media literacy. This observation is borne out by Council of Europe standard-setting texts with
focuses on media literacy. An astonishing array of different terms is used across those texts,
including: visual literacy, audiovisual literacy, mass-media education, media education, media
literacy, information literacy, media (and information) literacy and digital literacy. Notwithstanding
this high incidence of terminological variation, there is a broad overall congruence to the texts in
question, as relevant provisions for the promotion of media literacy are based on a few distinct
rationales (see further, infra).
1. European Ministerial Conferences on Mass/New Media Policy
73
Council Conclusions on a European Approach to Media Literacy in the Digital Environment, 2008 O.J. (C140) 8
(EU), supra fn. 48?
74
See generally European Commission, MEDIA, http://ec.europa.eu/culture/media/index_en.htm (Summarizing the MEDIA
Programmes).
75
Opinion of the Committee of the Regions on Media literacy and Creative Content Online,
2008 O.J. (C 325) 70 (EU); See also Resolution on Media Literacy in a Digital World, EUR. PARL. DOC. INI 2129 (2008).
76
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee
and the Committee of the Regions, A Digital Agenda for Europe, at 24, COM (2010) 245 Final (May 19, 2010) (EC).
77
Id at 26-27.
200
Media Law & Policy
European Ministerial Conferences on Mass Media Policy have been held periodically since the
mid-1980s. Those conferences involved the participation of ministers (or their delegates) with
relevant portfolios at national level. As such, the Ministerial Conferences can be distinguished from
the day-to-day activities of the Council of Europe. Their relevance stems from their purpose to map
out future European media policy, supplemented by action plans for its implementation.
The promotion of media education or literacy has been an intermittently recurrent agenda item
at these European Ministerial Conferences. Resolutions adopted at the first two conferences called
briefly for the development of media education (and “a critical awareness”) as an integral part of the
tasks of general education78 and among viewers,79 without further elaboration. Resolutions adopted at
the third and fifth conferences focused on media education targeting the public at large and in respect
of new communications technologies and information services, again without any real elaboration.80
For its part, the sixth conference identified “media education and media literacy in new services” as
instrumental for “developing a critical and discerning attitude towards media content, as well as
ensuring greater awareness by individuals concerning the opportunities offered and challenges posed
by these services and thus contributing to greater social cohesion.”81
It was only at the seventh ministerial conference, “Integration and diversity: the new frontiers
of European media and communications policy,” held in Kyiv (Ukraine) in 2005, that media literacy
was explored in slightly more detail.82 In the context of the aim of enhancing protection of minors,
media literacy is put forward as a way of helping children “benefit from the positive aspects of the
new communication services and avoid exposure to harmful content.”83 The Action Plan adopted at
the conference advocates the promotion of media literacy in respect of all media and at all stages of
education and ongoing learning.84
At the first Conference of Ministers responsible for Media and New Communication Services
(in 2009, the ministerial conference was titled and calibrated differently in order to reflect changing
notions of the media),85 media literacy featured in the Resolution entitled “Towards a new notion of
78
Council of Europe, Media Division Directorate General of Human Rights, EUROPEAN MINISTERIAL
CONFERENCES ON MASS MEDIA POLICY: TEXTS ADOPTED, 16 (2006),
http://www.coe.int/t/dghl/standardsetting/media/doc/DH-MM (2006)004_en.pdf.
79
Id. at 15.
80
See id at 27-29; see also id. at 54-57.
81
Id. at 67.
82
7th European Ministerial Conference on Mass Media Policy Kyiv, 10-11 March 2005, COUNCIL OF EUROPE,
http://www.coe.int/t/e/com/files/ministerial-conferences/2005-kiev/.
83
Eur. Consult. Ass., Integration and diversity: the new frontiers of European media and communications policy,
7th European Ministerial Conference on Mass Media Policy, Resolution 3 (2005), available at
http://www.ebu.ch/CMSimages/en/leg_ref_coe_mcm_media_policy_100305_tcm6-36861.pdf.
84
Eur. Consult. Ass., Action Plan, 7th European Ministerial Conference on Mass Media Policy, Sub-theme 3, para.
4 (2005) (Discussing human rights and regulation of the media and new communication services in the Information
Society).
85
COUNCIL OF EUROPE, A New Notion of Media? Political Declaration and Resolutions, 1st Council of Europe Conference
of Ministers Responsible for Media and New Communication Services (May 28-29, 2009), available at
http://www.coe.int/t/dghl/standardsetting/media/MCM(2009)011_en_final_web.pdf; See also Tarlach McGonagle & Kim de
201
Spring 2013 │ Volume 20 │ Number II
media” and in its corresponding Action Plan.86 The Resolution identifies media literacy as “essential”
in the context of a people-centred, participatory, multi-stakeholder approach to the new media
environment.87 The Resolution calls for the recognition of media literacy “as part of the education for
democratic citizenship” and describes it as “a particularly important tool in optimising children’s and
young people’s comprehension, critical thinking, citizenship, creativity and critical awareness of the
media.”88 It views media literacy as a way to make people “critical, competent and responsible” in
their use of media and media-like services.89 The Action Plan seeks to pursue work on media literacy
in consultation with a range of stakeholders, including education specialists, “with the aim of making
users, creators and distributors of content (in particular children and young people) responsible,
informed and critical participants in the information society.”90 Non-formal education and the role of
the media are mentioned as meriting attention in relevant strategies.
The above overview of relevant provisions in policy texts adopted at periodic ministerial
conferences on mass/new media suggests that there has only been limited engagement with media
literacy to date. Relevant provisions prioritise children as a target group. They favour formalising
media education within broad educational settings, but also acknowledge the relevance of non-formal
and lifelong/ongoing education. They underscore the importance of multi-stakeholder approaches.
These summary priorities and observations are unpacked in various texts adopted by the Committee
of Ministers and the Parliamentary Assembly.
2. Committee of Ministers
The objective of promoting media literacy is adverted to, with varying levels of emphasis, in
several of the standard-setting texts adopted by the Committee of Ministers. The following table
provides an overview of selected Committee of Ministers texts containing focuses on media literacy:
Year Title
1985 Recommendation No. R (85) 8 on the
conservation of the European film heritage
1997
Recommendation No. R (97) 19 on the
portrayal of violence in the electronic media
Focus
Relevance of film heritage for
“mass-media education” and
“studies in universities and
research institutes”
Responsibilities of different
sectors
of
society
for
promoting
and
providing
media education; responsibility
of parents and teachers for
stimulating
children
and
adolescents to develop a
Para.
Preamble
Guidelines
Nos. 2, 4.
Beer, A Brave New Media World, MEDIAFORUM, 146-156 (2010), available at
http://www.ivir.nl/publicaties/mcgonagle/Mediaforum_2010_5.pdf.
86
A New Notion of Media? Political Declaration and Resolutions, supra note 87, at 7.
87
Id. at 4.
88
Id. at 5.
89
Id. at 6.
90
Id. at 8.
202
Media Law & Policy
2003
Recommendation Rec(2003)9 on measures to
promote the democratic and social contribution
of digital broadcasting
2006
Recommendation Rec(2006)12 on empowering
children in the new information and
communications environment
critical attitude, e.g. through
media education within the
family and in schools; shared
responsibility
for
media
education
(states,
those
responsible
for
content,
various sectors of society)
Media literacy as a key factor
in reducing risk of digital
divide; special mention of the
elderly and the less advantaged
sectors of the population
Structured
educational
approach from an early age;
identification
of
specific
harms,
disaggregation
of
multi-stakeholder approach
8
Numerous
preambular
and
substantive
paragraphs.
2007
Recommendation CM/Rec(2007)2 on media
pluralism and diversity of media content
2007
Recommendation CM/Rec(2007)3 on the remit
of public service media in the information
society
Recommendation
CM/Rec(2007)11
on
promoting freedom of expression and
information in the new information and
communications environment
2007
2007
2008
2009
Recommendation
CM/Rec(2007)16
on
measures to promote the public service value of
the Internet
Recommendation CM/Rec(2008)6 on measures
to promote the respect for freedom of
expression and information with regard to
Internet filters
Declaration on the role of community media in
promoting social cohesion and intercultural
Promotion of digital media
literacy to bridge the digital
divide
Public service media’s central
role in education, media
literacy and lifelong learning
Particular importance of media
education in empowering
individual users in the new
information
and
communications environment
Policies to protect/enhance the
right to education, incl. media
and
information
literacy;
promotion of media and
information literacy in formal
and non-formal education
sectors for children and adults
(to empower them in their use
of
media
technologies;
encourage
exercise
of
democratic rights and civic
responsibilities;
encourage
informed
choice-making
online)
Inform children and young
people about the benefits and
dangers of Internet content and
its filtering as part of media
education strategies in formal
and non-formal education
Multi-stakeholder approach,
direct involvement of citizens
203
2.2
21
Section I of
Guidelines
Appendix,
I – Human
Rights
and
Democracy;
II – Access
Preamble,
Guideline II
(iv)
Preamble &
Spring 2013 │ Volume 20 │ Number II
2009
2012
2012
2012
dialogue
and as part of lifelong learning
para. (iv)(c)
Recommendation CM/Rec(2009)5 on measures
to protect children against harmful content and
behaviour and to promote their active
participation in the new information and
communications environment
Inter alia, multi-stakeholder
approach; development of
Internet skills and literacy in
tandem with promotion of safe
and secure spaces on Internet
and labelling of online content;
awareness-raising;
school
curricula; countering sexism in
online content, etc.
Internal management and
resource allocation
Variety of information, content
and services; functioning of
search engines Iselecting,
ranking and prioritising search
results; implications for private
life, personal data); searchengine
literacy
and
its
incorporation into national
media literacy strategies
Rights of users of social
networking sights and rights of
others
1, 6, 8, 9,
Recommendation CM/Rec(2012)1 on public
service media governance
Recommendation CM/Rec(2012)3 on the
protection of human rights with regard to search
engines
Recommendation CM/Rec(2012)4 on the
protection of human rights with regard to social
networking services
14, 15, 16
33
6,
8;
Appendix
(19, 20)
4
The rationales advanced for the promotion of media literacy in the above texts (sometimes
separately and sometimes in parallel) can be grouped as follows:
 the civic empowerment of individuals;
 the reduction/elimination of the digital divide;
 the facilitation of informed decision-making, especially in respect of harmful and illegal
online content. On occasion, texts prise open the nature and objectives of media literacy, e.g. by deepening
levels of understanding of how the media work and by sharpening critical attitudes towards the
media. A sense of shared responsibility for media education91 has steadily grown into an explicit
insistence on the importance of a multi-stakeholder approach to the promotion of media literacy. This
is clearly a reflection of the increasingly complex constellation of involved parties. The enumeration
of relevant stakeholders facilitates the identification of specific roles for each, e.g. public service
media’s educational role92 and the roles expected of private-sector and civil-society actors.93
91
See generally COUNCIL OF EUROPE, RECOMMENDATION OF THE COMM. OF MINISTERS TO MEMBER STATES ON THE PORTRAYAL OF
VIOLENCE IN ELECTRONIC MEDIA, 607TH SESS., REC. NO. R(97)19 (1997), available at
http://www.coe.int/t/dghl/standardsetting/media/doc/CM/Rec(1997)019&ExpMem_en.asp.
92
See generally COUNCIL OF EUROPE, Recommendation of the Comm. of Ministers to Member States on the Remit of Public
Service Media in the Information Society, 985th Sess., Rec no. R (2007) 3 (2007), available at
https://wcd.coe.int/ViewDoc.jsp?id=1089759&BackColorInternet=9999CC&BackColorIntranet=FFBB55&BackColorLogged=F
FAC75.
93
See generally COUNCIL OF EUROPE, Recommendation on Empowering Children in the New Information and Communications
Environment, 974th Sess., Rec no. R(2006)12 (2006), available at
https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2006)12&Sector=secCM&Language=lanEnglish&Ver=original&BackColorInternet=
9999CC&BackColorIntranet=FFBB55&BackColorLogged=FFAC75.
204
Media Law & Policy
Finally, it is useful to draw attention to an attempt by the Committee of Ministers to identify
the different types of content that can prove harmful for children. Very often, reference is made in
policy documents to harmful content as an expansive and undifferentiated term. In its
Recommendation Rec (2006)12 on empowering children in the new information and
communications environment, the Committee of Ministers identifies selected types of harm, which
facilitates the follow-on task of devising appropriate, tailored strategies for countering them. It
recommends that Council of Europe member states should:
ensure that such skills enable children to better understand and deal with content
(for example violence and self-harm, pornography, discrimination and racism)
and behaviours (such as grooming, bullying, harassment or stalking) carrying a
risk of harm, thereby promoting a greater sense of confidence, well-being and
respect for others in the new information and communications environment.94
3. Parliamentary Assembly
The following table provides an overview of selected Parliamentary Assembly of the Council
of Europe (PACE) texts containing focuses on media education or literacy:
Year
1987
Title
Recommendation 1067 (1987) on the cultural
dimension of broadcasting in Europe
1989
Recommendation 1098 (1989) on East-West
audiovisual co-operation
Recommendation 1215 (1993) on the ethics
of journalism
1993
1995
1998
1999
2000
2002
2005
2007
2008
2009
Recommendation 1276 (1995) on the power
of the visual image
Resolution 1165 (1998), Right to privacy
Recommendation 1407 (1999), Media and
democratic culture
Recommendation 1466 (2000), Media
education
Recommendation 1586 (2002), The digital
divide and education
Recommendation 1706 (2005), Media and
terrorism
Recommendation 1789 (2007), Professional
education and training of journalists
Recommendation 1836 (2008), Realising the
full potential of e-learning for education and
training
Recommendation
1855
(2009),
The
regulation of audio-visual media services
Focus
(i)
(ii)
school courses;
adults and not only
parents
Audiovisual literacy, research,
teacher training and exchanges
Foster the setting up of citizens’
media associations; encourage
schools
to
provide
media
education
Visual images – part of literacy,
promotion
Governments – media education
wider scale – education on human
rights and responsibilities, privacy
Curricula
See below, for detailed analysis
Quality appreciation of digital
information
Curricula - terrorism
Para.
20(h)
15
5(iii)
7, 11(ii)
16(iii)
9(viii)
Numerous
provisions
G
10(iv)
Globalisation
of
media,
differences in cultural and media
practices
Digital literacy for all as strategy
against digital divide
7
Develop policy guidelines for new
means of content control, incl.
12.4
10
94
Id.
205
Spring 2013 │ Volume 20 │ Number II
2009
Recommendation
1882
(2009),
The
promotion of Internet and online media
services appropriate for minors
media literacy of users
Media literacy & harmful content,
children, adolescents, parents,
teachers, Internet and online
media services, opportunities and
risks
1, 18
A tentative pattern emerges from the above overview: the PACE tends to focus more on the
need to embed media education in formal and non-formal educational structures than on theoretical
justifications for the promotion of media education or literacy. It is only in its most recent relevant
texts that the PACE has begun to meaningfully engage with the specificities of media literacy’s
relevance in an online environment. Different target groups and stakeholders are identified, but in a
more limited fashion than in comparable texts adopted by the Committee of Ministers.
Recommendation 1882 (2009) is the text which sets out the potential roles for a diversity of
stakeholders in the most detailed way.
The PACE’s most sustained engagement with media education/literacy in a single text can be
found in its Recommendation 1466 (2000), entitled “Media education.”95 It sets out the essence of its
vision and ambitions in respect of media education/literacy.
The Recommendation defines media education of citizens as “teaching practices which aim to
develop media competence, understood as a critical and discerning attitude towards the media in
order to form well-balanced citizens, capable of making their own judgments on the basis of the
available information.”96
The PACE documents some examples of media effects, on the basis of which it identifies an
urgent need to develop media education in order to promote “active, critical and discerning use of the
media.”97 Media education teaches individuals to interpret and produce messages, select the most
appropriate media for communicating and, eventually, and have a greater say in the media offer and
output. It enables them to exercise their right to freedom of expression and right to information and is
beneficial for their personal development. Furthermore, it stimulates active democratic citizenship
and political awareness.
The PACE recommends that the Committee of Ministers: (i) call on Council of Europe
member states to encourage the elaboration and the development of media literacy programmes for
children, adolescents and adults, and (ii) teacher-training programmes in the field of media
education. It also calls for a (quantitatively and qualitatively) satisfactory offering of educational
programmes (including media education) to be provided by the different media.
C. Comparison of EU and Council of Europe Approaches
There is much commonality between the approaches to the promotion of media literacy
adopted by the EU and the Council of Europe, in terms of their objectives, thematic and
programmatic emphases and key target groups and stakeholders. The EU’s approach has more formal
circularity than that of the Council of Europe. This can be explained partly by shared textual
reference points and the formal exchanges that they engender between relevant actors within the EU
95
Parliamentary Assembly of the Council of Europe, 19th Sess. Rec No.1466 (June 17, 2000), available at
http://assembly.coe.int/main.asp?Link=/documents/adoptedtext/ta00/erec1466.htm.
96
97
Id. at para. 8.
Id.
206
Media Law & Policy
institutions. The existence of focal texts facilitates the incorporation of different intra-institutional
perspectives in policy-making. It also makes for coordinated action across different platforms at the
EU-level. The ability to embed media literacy simultaneously in different programmes facilitates a
diversified approach, financial underwriting and multi-annual planning - three essential requirements
for the progressive development of media literacy.
On the other hand, the less systematic and less formalised cross-referencing that is evident in
Council of Europe texts also has advantages, e.g. the ability to explore specific emergent themes in a
very detailed and contextualised way. Such an approach could usefully lend itself to, for example,
developing a multi-dimensional approach to media literacy for the elderly or the disabled (see
further, below). It is also important to note that the Council of Europe has steadily developed a very
practical approach to the promotion of media literacy through its Internet Literacy Handbook.98
IV. OUTLOOK AND CHALLENGES OF CONSOLIDATION AND FURTHER DEVELOPMENT
The previous section reveals that the main European-level regulatory focuses on media literacy
are based on the rationales of participation, protection and social inclusion and that they primarily
target children/minors and the public at large. It is useful at this juncture to attempt to explain why
other key target groups identified above are not more centrally positioned in regulatory provisions
(and their implementation). The elderly and persons with disabilities will be taken as sample key
target groups for present purposes, which will again implicate the rationales of participation,
protection and social inclusion.
A. The Elderly
The participatory capacities of the elderly are often largely shaped by the nature and level of
assistance and stimulation they receive to engage with new predominantly digital media or edemocracy. The relevance of participation of the elderly members of society has been underscored at
the EU level.99
There are good examples of structural and programmatic initiatives promoting media literacy
for the elderly at the national level. For instance, Ofcom UK has had a special Advisory Committee
on Older and Disabled People (ACOD) since 2004 that advises Ofcom about the interests and
opinions of older and disabled persons living in the UK.100 In its Annual Report for 2009/10, ACOD
called on Ofcom to “ensure that older and disabled people are equal players and full participants
across current and emerging convergent telecommunications and broadcasting technologies, new
media platforms and digital and traditional broadcast media.”101 Ofcom’s audit of media literacy
98
COUNCIL OF EUROPE, INTERNET LITERACY
HANDBOOK,http://www.coe.int/t/dghl/standardsetting/internetliteracy/hbk_EN.asp.
99
European Parliament Resolution on Media Literacy in a Digital World, supra note 58, at 14; See also European
Commission Study on Assessment Criteria for Media Literacy Levels Final Report, at 14, 87 (Oct. 2009), available
at
http://ec.europa.eu/culture/media/literacy/docs/studies/eavi_study_assess_crit_media_lit_levels_europe_finrep.pdf.
100
See generally Functions and Role of OFCOM, OFCOM, http://www.ofcom.org.uk/about/how-ofcom-is-run/committees/olderand-disabled-people/functions-and-role.
101
Advice to Ofcom, ACOD Annual Report 2009/10, OFCOM, http://www.ofcom.org.uk/about/how-ofcom-isrun/committees/older-and-disabled-people/annual-reports/2009-10/.
207
Spring 2013 │ Volume 20 │ Number II
across the UK contained a special focus on older people102 and over the past few years ACOD has
published numerous research reports on different aspects of media literacy for older people, e.g.
digital switchover issues and how manufacturers, suppliers and retailers can address the needs of the
elderly and disabled.103 The most recent research study, Next Generation Services for Older and
Disabled People,104 set out to identify and report:
(i) details of new and near-future Next Generation Services (NGS)105 that have the potential
to benefit older and disabled people’s lives;
(ii) the potential benefits from such services; and
(iii) the risks and challenges to the realisation of the potential benefits to older and disabled
people.106
In the Netherlands, the aforementioned Mediawijzer.net dedicates a dossier to assisting the
elderly in the digital environment.107 The goal of the dossier is to assist the elderly to find their way
along the digital freeway. One of the partners of Mediawijzer.net is SeniorWeb. In a joint
collaborative initiative with public libraries, SeniorWeb has created 370 education centres in which it
offers courses on media literacy for elderly members of society.108
Other initiatives at member-state level come from the BBC. Its ‘First Click’ campaign was
designed to help people who would not ordinarily use a computer to access a step-by-step beginner’s
guide to computers and the internet.109 Its ‘Give an Hour’ campaign “encourages digital-savvy
citizens to give an hour of their time to help someone else become media literate.”110 Both campaigns
include the elderly among their target groups.
2. Persons with Disabilities
The importance of persons with disabilities as a specific target group for media literacy goals
has been recognised explicitly inter alia by various EU bodies.111 Nevertheless, the recent studies
102
Ofcom Media Literacy Audit: Report on Media Literacy Among Older People, OFCOM (April 3, 2006),
http://www.ofcom.org.uk/advice/media_literacy/medlitpub/medlitpubrss/older/.
103
For details see Next Generation Services for Older and Disabled People, ADVISORY COMMITTEE ON OLDER AND
DISABLED PEOPLE (Sep. 13, 2010), http://www.ofcom.org.uk/files/2010/09/ACOD-NGS.pdf.
104
See Id.
105
Next generation services (NGS) are new and improved telecommunications services that make use of the speed and capacity
of next generation networks and are delivered to end users via next generation access.
106
Supra note 104, at iii.
107
Senioren op het web (Seniors on the Web), MEDIAWIJZER.NET, http://www.mediawijzer.net/dossiers/publiek/senioren-ophet-web.
108
Handig zoeken met internet, SENIORWEB, http://www.seniorweb.nl/handigmetinternet.
109
First Click campaign homepage, BRITISH BROADCASTING CORPORATION, www.bbc.co.uk/connect/campaigns/first_click.shtml.
110
Give an Hour campaign homepage, BRITISH BROADCASTING CORPORATION,
www.bbc.co.uk/connect/campaigns/give_an_hour.shtml.
111
See A European Approach To Media Literacy in the Digital Environment, supra note 41, at 5; See also European Parliament
Resolution on Media Literacy in a Digital World, supra note 57, at paras. 11; A Digital Agenda For Europe, at 24-27 COM
(2010); Opinion of the Committee of the Regions on Media Literacy and Creative Content Online 2008 O.J. (C 325) 70 (EU).
208
Media Law & Policy
commissioned by the European Commission pay little or no attention to the group or its specific
needs and interests. In the 2009 Study on Assessment Criteria for Media Literacy Levels, persons
with disabilities are not even mentioned in its recommendations.
However, this does not mean that European states do not pay attention to this group. For
instance, as already mentioned, the ACOD is a special Advisory Committee to Ofcom that addresses
the importance of older and persons with disabilities in society.
In the Netherlands, Mediawijzer.net also has a separate dossier devoted to media literacy for
persons with disabilities.112 The dossier contains background information, tips and a list of partner
websites for persons with disabilities. One of the partners is EDDY: Electronic Distance-learning for
Disabled Youngsters.113 This is a digital educational platform that assists high school students with
disabilities who are not able to attend classes due to their disabilities.
Aside from the obvious arguments of principle for directing media literacy at persons with
disabilities, there are also clear legal arguments to do so. The EU’s recent ratification114 of the United
Nations Convention on the Rights of Persons with Disabilities115 means that the Convention’s very
detailed, technology-attuned and forward-looking provisions on access to information and content
will have to be implemented at a national level. For instance, Article 9 (“Accessibility”) of the
Convention includes the obligations for States Parties to:
(f) Promote other appropriate forms of assistance and support to persons with disabilities to
ensure their access to information;
(g) Promote access for persons with disabilities to new information and communications
technologies and systems, including the Internet;
(h) Promote the design, development, production and distribution of accessible information
and communications technologies and systems at an early stage, so that these
technologies and systems become accessible at minimum cost.
These obligations are supplemented by those set out in Article 21 (“Freedom of expression and
opinion, and access to information”), including:
(c) Urging private entities that provide services to the general public, including through the
Internet, to provide information and services in accessible and usable formats for persons
with disabilities;
(d) Encouraging the mass media, including providers of information through the Internet, to
make their services accessible to persons with disabilities
Here, the “access” component to the definition of media literacy is of paramount importance.
112
Mediawijs met een beperking (Media Wise With Disabilities), MEDIAWIJZER.NET,
http://www.mediawijzer.net/?q=dossiers/professionals/mediawijs-met-een-beperking.
113
Project EDDY: Electronic Distance-Learning for Disabled Youngsters, LIESA (June 25, 2009),
http://www.liesa.nl/index.php?mod=front_page&pageid=545.
114
The treaty was ratified on Dec. 23, 2010. See A landmark victory as the European Union ratifies the United Nations
Convention on the Rights of Persons with Disabilities, CENTRE ON HUMAN RIGHTS FOR PEOPLE WITH DISABILITIES (Jan. 6, 2011),
http://www.disabilityaction.org/centre-on-human-rights/news/item/257/a-landmark-victory-as-the-european-union-ratifies-theunited-nations-convention-on-the-rights-of-persons-with-disabilities/.
115
Convention on the Rights of Persons with Disabilities, U.N. Doc. G.A. Res. 61/100 (Dec. 13, 2006).
209
Spring 2013 │ Volume 20 │ Number II
V. MEDIA LITERACY IN THE UNITED STATES**
Media literacy is a growing integral part of American culture, however it does not seem to be
getting the same attention as once did telephone, radio, and television.116 In the 1990s, the federal
Office of National Drug Control Policy incorporated media literacy education into student substanceabuse programs. States then started including media literacy education in their health education
instruction segments in order to help students to understand the different influences that may affect
their health decisions.117
In 2007, the Federal Trade Commission (FTC) announced in a statement to the United States
Senate that it planned to create a media literacy initiative.118 Following a series of data privacy and
security issues, the FTC decided that it would attack the issue not only from the business side, but the
consumer side as well. They have since created ftc.gov/YouAreHere, a website for children to play
games while learning media literacy skills. In 2010, the FTC introduced Admongo.gov. The purpose
of the campaign was to raise awareness of advertising and marketing messages, teach critical
thinking skills in order for tweens to better analyze and interpret advertisements, and demonstrate the
benefits of being an informed consumer. It is a single player game in an everyday setting where part
of the goal is to search for hidden advertisements. Both YouAreHere and Admongo have sections
dedicated to parents and teaches them ways to help supplement children’s media literacy education.
Unlike Canada and Europe, the United States does not have any centralized or national media
literacy education program,119 which is why YouAreHere and Admongo strongly encourage parent
and teacher participation. There are many privately funded and non-profit organizations dedicated to
promoting a more cohesive media literacy education, such as the National Association of Media
Literacy Education in particular. This organization is often cited in media literacy reports, but no
national policy for a media literacy education standard has been discussed.
The FTC recently published a report, “Protecting Consumer Privacy in an Era of Rapid
Change: Recommendations for Businesses and Policymakers.”120 The report puts forth best practices
for business to protect the privacy of American consumers and give them greater control over the
**
Jacqueline Merkher, B.F.A., Pratt Institute (2010); J.D., New York Law School (2013).
116
Media literacy is a term which has been used since the 1990s in the U.S. It refers to the ability to understand and process
online information. With the growing use of online media – from social websites to filing government forms – it is important that
users are well-versed enough in the online language to make educated decisions. The Federal Communications Committee refers
to media literacy as how to assess online media in general (see the FCC’s The Information Needs of Communities report from
2011, which can be found here: http://www.fcc.gov/info-needs-communities#read). The National Association for Media Literacy
Education (NAMLE) describes media as a system of “active inquiry and critical thinking about the messages we receive and
create.” Overall, media literacy involves, “adapting critical thinking skills to a multimedia age.” Being literate is no longer a
singular term. It refers to a much more abstract and multi-tiered way of understanding language and symbols, particularly on an
online platform.
117
See generally: FCC, THE INFORMATION NEEDS OF COMMUNITIES (2011) [herein after THE FCC MEDIA
INFORMATION REPORT], available at http://www.fcc.gov/info-needs-communities#read.
118
See generally: FTC, PREPARED STATEMENT OF THE FTC (Apr. 10, 2007), available at http://www.fcc.gov/info-needscommunities#read.
119
FCC MEDIA REPORT, supra note 2, at 221.
120
See generally: FTC REPORT, PROTECTING CONSUMER PRIVACY IN AN ERA OF RAPID CHANGE (2012) [hereinafter FTC REPORT],
available at http://www.ftc.gov/os/2012/03/120326privacyreport.pdf.
210
Media Law & Policy
collection and use of their personal data.121 While many media literacy initiatives by the FTC target
children and young consumers, this report focuses on the producer rather than the end user, and
criticizes the techniques used to create online programs and devices. The FTC also recommends that
Congress consider enacting general privacy legislation, data security and breach notification
legislation, and data broker legislation.122 The FTC brings up several points, including privacy by
design, simplified choice for businesses and consumers, and greater transparency.123 Interestingly, the
FTC has not tried to pass any sort of regulation, but only makes recommendations to online
companies.
The United States has not yet tried to regulate media literacy, but rather attempts to raise
awareness for both the producer and end user. Media literacy is on the rise, and being encouraged in
classrooms. Meanwhile, media literacy is also being addressed from the production point of view, in
order to make privacy a priority. Instead of trying to regulate media literacy, the government has put
the onus on producers and consumers to strike a balance of shrewd, discerning consumers and
privacy-driven producers. On the other hand, the European Union has a much more developed
program for media literacy. The EU has taken the stance that media literacy should be
comprehensive and part of a national program. In stark contrast, the EU has gone as far as trying to
craft policies for media literacy education.
VI. CONCLUSION
The best answer to the question posed in the title of this article is probably a qualified “yes,”
but challenges remain for the consolidation of media literacy’s new-found status within the European
audiovisual regulatory framework. Challenges also exist at the national level.124
The refinement that is likely to result from new reporting obligations and processes under the
AVMSD should facilitate the distillation of best practices and the development of bench-marking
activities. However, it has been noted that media literacy education in Europe is a “highly
contextualized activity that takes many forms in many different cultural and learning
environments.”125 The search for increased consistency across national and cultural situations for
reporting and evaluation purposes must leave sufficient space for the recognition and appreciation of
variation in strategies and progress at the national and sub-national levels.
In light of these challenges, there remains a need to continue to reflect on the position and role
of media literacy in European (and national) regulatory frameworks. It must not be (perceived as)
merely a sweetener for deregulation. A firm obligation on States to promote media literacy needs to
121
FTC REPORT, supra note 16, at 1.
122
FCC MEDIA REPORT, supra note 1, at 379.
123
At this stage of online development, the FTC chose to target regulation of producers (such as online companies and
technology companies) rather than consumers. As a precautionary measure, the FTC advises companies to make products and
services with the initial idea that they should always provide reasonable security for consumer data. This has a foreseeable end
goal: a standardized level of reasonable care in product and service design. The FTC also recommends that companies make it
easier for consumers to control the tracking of their online activities, a feature which has yet to be standardized for all online
services. Finally, the FTC recommends that online companies be much more visible with what information they collect on users.
124
See Emmanuelle Machet, Media Literacy – What Role for the Regulators?, BACKGROUND PAPER EPRA 2008/02 (2008) (A
comprehensive overview of regulatory issues at the national level), available at http://epra3production.s3.amazonaws.com/attachments/files/272/original/literacy_final.pdf.
125
Hobbs & Jensen, supra note 5, at 2.
211
Spring 2013 │ Volume 20 │ Number II
be introduced into the AVMSD, otherwise the reporting on levels of media literacy in EU Member
States envisaged by the Directive, will prove to be tokenistic. Genuine commitment to the
development of a multi-stakeholder approach to media literacy is essential in this respect.126
So far, the promotion of media literacy by the EU and the Council of Europe has resulted in
detailed engagement with the specificities of children as a target group and also, to a lesser extent,
adults and the public at large. Such detailed engagement could usefully be replicated in respect of
other target groups, e.g. the elderly, persons with disabilities, linguistic minorities, the
socially/economically disadvantaged. The same rationales for the promotion of media literacy for
children apply mutatis mutandis to these groups. Detailed engagement with the specificities of these
target groups must begin with an understanding of their particular needs and requirements – an
ongoing process facilitated by relevant multi-stakeholder involvement.
It has been claimed that “[t]he promise of media literacy, surely, is that it can form part of a
strategy to reposition the media user – from passive to active, from recipient to participant, from
consumer to citizen.”127 How long it will take to deliver fully on that promise remains to be seen.
126
See Brian O'Neill, Current Policy Developments in European Media Literacy, 6 INT’L J. of MEDIA AND CULTURAL POL., 240
(2010).
127
Sonia Livingstone, What Is Media Literacy?, 32 INTERMEDIA, 20 (2004).
212
Media Law & Policy
TOLLS ON THE BROADBAND COMMUTE: STATE TAX LIMITATIONS ON
INTERSTATE TELEWORK
Nicole Belson Goluboff*
I. INTRODUCTION
Broadband-enabled telecommuting offers critical benefits to individuals, businesses,
communities, and governments. These include economic, energy, environmental, and transportation
benefits. Although the advantages demand a regulatory environment that promotes telecommuting
(or “telework”), some states balk: they cling to anachronistic tax policies – or adopt new ones – that
discourage the practice.
This article examines two such telework-hostile policies. The first of these state policies,
known as the “convenience of the employer” rule, imposes a punitive tax on nonresidents of the state
who telecommute to in-state employers. The second punishes out-of-state businesses that employ instate telecommuters. The article describes the significant adverse consequences these policies can
have, and argues that, to realize the full promise of broadband, the policies should be dismantled.
Section II of this article details the key advantages of telework, including the enabling of more
people to work and businesses to hire.
Section III details the tax barriers. Section III-A looks at the convenience of the employer rule.
Focusing on the rule as applied in New York, this section explains how the convenience rule is
implemented in the Empire State, and why escaping the penalty the rule imposes is impossible for
most nonresident telecommuters. It describes the harm the rule causes workers, companies, states
applying the rule, and states where telecommuters live. The subsection further discusses two leading
cases upholding the rule against constitutional challenges. It then describes federal legislation that
has been proposed to abolish the rule – the Telecommuter Tax Fairness Act – and argues that this
legislation is a necessary cure for the problems the rule creates. Section III-A also discusses related
but distinct legislation that has been reintroduced in the United States House of Representatives, the
Mobile Workforce State Income Tax Simplification Act (the “Mobile Workforce Bill”). It explains
how the Mobile Workforce Bill differs from the Telecommuter Tax Fairness Act and why the Mobile
Workforce Bill must be amended to include the provisions of the Telecommuter Tax Fairness Act.
Section III-B addresses the policy of some states that subjects an out-of-state company to an
income-based tax when the company’s sole connection to the state is the employment of a single
telecommuter – or just a few telecommuters – within the state. The discussion includes a review of
two recent cases upholding a state’s authority to tax in these circumstances. It also reports on a
survey of state tax departments that suggests (but does not demonstrate definitively) a trend among
states to favor this policy. Section III-B examines the impact the business income tax policy can have
on the growth of telework, explaining how the policy can actually promote telework as well as
discourage it. However, because the potential of the policy to deter telework is much greater than its
potential to promote it, Section III-B details the negative impact the policy can have on employees,
employers, and the states applying the policy. It concludes that, instead of penalizing out-of-state
* Legislative Advisor to The Telework Coalition. B.A., Columbia University (1987); J.D., Columbia University School of Law
(1990).
213
Spring 2013 │ Volume 20 │ Number II
companies that employ a handful of in-state workers on a telecommuting basis, states should create
incentives for those companies to do so.
II. KEY BENEFITS OF TELEWORK
A. Telework Can Increase Employment
The National Broadband Plan (“NBP”), issued by the Federal Communications Commission
(“FCC”) in March 2010, rightly identifies telework’s capacity to increase employment as a key
reason to encourage the practice. Telework can boost the employment rate by enabling more
individuals to work and more businesses to hire.1
1. Telework Enables More People to Work
According to the NBP, “[m]aking telework a more widespread option [could] open …
opportunities for 17.5 million individuals.”2 These potential new teleworkers include, among others,
retirees, homemakers, and adults with disabilities.3
In addition to enabling such non-workers to enter the workforce, telework can help employees
who have been laid off return to work more quickly by broadening the region where they can search
for new jobs. It can also help workers who are repeatedly forced to relocate, like military spouses,
replace sporadic, fleeting engagements with sustained employment.4
2. Telework Enables More Businesses to Hire
Telework can make hiring easier for companies by making it less expensive.5 For example,
telework can reduce recruitment costs, making the firm an easy sell to applicants seeking flexible
or tech-savvy employers and eliminating employee relocation expenses.6 It can reduce real
estate and other overhead costs,7 allowing businesses to expand their staff without expanding
their facilities.
1
Nicole Belson Goluboff, The Telecommuter Tax Fairness Act of 2011: A Tool for Economic Recovery, STATE TAX NOTES, Dec.
5, 2011, 695, 695.
2
FCC, CONNECTING AMERICA: NATIONAL BROADBAND PLAN (2010), section 13.3, available at
http://www.broadband.gov/plan/13-economic-opportunity/#s13-3 [hereinafter NBP] (citing Comments of Connected Nation, Inc.
in response to NBP Public Notice #3, Sept. 22, 2009, at 16-17 [hereinafter Comments of Connected Nation]).
3
Id.
4
See, e.g., Goluboff, supra note 1, at 695-96. See also Moran Banai et al., Iraq and Afghanistan Veterans of America (“IAVA”),
IAVA Issue Report: [Unsung Heroes] Military Families After Ten Years of War, Dec. 2011, at 5, 13, available at
http://www.blueshieldcafoundation.org/sites/default/files/publications/downloadable/Unsung_Heroes.pdf (“Frequent moves are
one of the biggest challenges military spouses face when looking for full-time employment…. [Among IAVA’s]
recommendations to improve military families’ economic and financial situation [is to] … create greater flexibility for virtual and
tele-work for military spouses so they can keep their jobs when they move”).
5
Goluboff, supra note 1.
6
See, e.g., Culture Rx, Case Study: Gap Inc. Outlet, available at
http://info.gorowe.com/Portals/170696/docs/CaseStudy_GAPOutlet_09SEPT10.pdf (As a result of the company’s Results-Only
Work Environment (“ROWE”) pilot, during which employees were evaluated based on performance rather than presence, Gap
Inc. Outlet realized “[s]everal hundred thousand dollars in savings” from “reduced recruiting and relocation costs”).
7
See, e.g., David Wessel, Out of the Office but Still on the Job, WALL ST., J., Dec. 20, 2012, at A4 (“Today, nearly half - 47% of Aetna's 35,000 U.S. employees work [full-time] from home…. Aetna estimates that real-estate and related costs are 15% to
214
Media Law & Policy
Telework also encourages hiring by offering a strong return on investment. It can improve
the results of recruitment efforts,8 enabling businesses to choose the most qualified candidates
from anywhere in the country, increase employee retention, and slash turnover costs.9 It can also
increase productivity.10 Specifically, it can increase the efficiency of both telecommuters and
their on-site colleagues; increase the number of hours available to telecommuters to get their
work done,11 decrease absenteeism,12 and decrease presenteeism (a phenomenon that involves
employees coming to the office when they are too sick to work effectively and could
compromise overall productivity by infecting co-workers).13 Further, telework can strengthen a
company’s business continuity plan, helping to assure that employees remain productive even
when a destructive storm, terrorist threat, flu pandemic, or other emergency renders work at the
main office impossible.14
25% lower than they would otherwise be - annual savings of about $80 million. Working at home has reduced Aetna's total office
space by 2.7 million square feet, the company estimates”); AT&T, 2011 Sustainability Report Issue Brief on Telecommuting,
available at http://www.att.com/gen/corporate-citizenship?pid=18039 [hereinafter AT&T 2011 Sustainability Report] (As a
result of its telework program, which included over 17,000 employees, AT&T “realized [a] … $6,500 potential cost reduction for
every telecommuter who gives up his or her workstation”); Culture Rx, Case Study: Suntell, available at
http://gorowe.web12.hubspot.com/Portals/170696/docs/Case_Study_SUNTELL.pdf (“Because [of ROWE], we were able to
move to a smaller space which resulted in a rent reduction of 30%”).
8
See, e.g., Press Release, Chief Financial Officers Look Beyond Employee Issues for Business Benefits of Work Life Flexibility
according to BDO Seidman, LLP and Work+Life Fit, Inc. Study (Sept. 11, 2008), available at
http://worklifefit.com/blog/2008/09/chief-financial-officers-look-beyond-employee-issues-for-business-benefits-of-work-lifeflexibility-according-to-bdo-seidman-llp-and-worklife-fit-inc-study [hereinafter BDO Seidman/Work+Life Fit Press
Release](88% of CFOs in the 2008 CFO Perspectives on Work Life Flexibility study gave flexibility a rating of “high” or
“moderate” for its ability to improve recruitment efforts).
9
See, e.g., AT&T 2011 Sustainability Report (AT&T’s telework program achieved a “72% lower turnover rate for
telecommuters”); BDO Seidman/Work+Life Fit Press Release (90% of CFOs in the 2008 CFO Perspectives on Work Life
Flexibility study gave flexibility a rating of “high” or “moderate” for its ability to improve employee retention). See also Culture
Rx, Gap Inc. Case Study: Quality and Productivity Through Trust (2012), available at
http://info.gorowe.com/Portals/170696/docs/results_only_work_environment_gap_case_study.pdf (As a result of Gap’s ROWE
pilot, “[s]everal hundred thousand dollars in savings were realized by reduced employee turnover costs”); Culture Rx, Case
Study: Best Buy, available at http://www.gorowe.com/about/case-study-best-buy [hereinafter Best Buy Study] (“Voluntary
turnover rates went down as much as 90% on ROWE teams. [F]or one team, this meant savings of $2.2 million over the course of
two years”).
10
See, e.g., AT&T 2011 Sustainability Report (An August 2010 telecommuting survey, which included more than 11,000
employees and their supervisors, “concluded that productivity increases, often dramatically, by enabling employees to perform
work away from their central job locations. It indicated that 98 percent of supervisors ‘agree’ or ‘strongly agree’ that their
employees are productive when working from their home office”). See also BDO Seidman/Work+Life Fit Press Release (75% of
CFO’s in the 2008 CFO Perspectives on Work Life Flexibility study gave flexibility a rating of “high” or “moderate” for its
ability to improve productivity); Best Buy Study (“Average of 41% increase in productivity on ROWE teams”).
11
AT&T 2011 Sustainability Report (94% of respondents to the August 2010 telecommuting survey indicated that time
employees “would have spent commuting [included] time that was given back to the company as additional productive time”).
12
Id. (In 2011, AT&T’s telework program achieved a “17 percent lower absentee rate for telecommuters”).
13
Press Release, CCH, CCH Survey Finds Most Employees Call in “Sick” for Reasons Other Than Illness (Oct. 10, 2007),
available at http://www.cch.com/press/news/2007/20071010h.asp (“Thirty percent of employers [said] they use telecommuting
programs as another way to deter presenteeism”).
14
See, e.g., Jolie Lee, Telework helps PTO employees stay productive through Sandy, FederalNewsRadio.com, Nov. 2, 2012,
available at http://www.federalnewsradio.com/367/3104184/Telework-helps-PTO-employees-stay-productive-through-Sandy
(“Despite the federal government closing its offices to the public … due to [S]uperstorm Sandy, the U.S. Patent and Trade Office
was still able to maintain a rate of 70 percent productivity, thanks to its telework policy…. The trademark assistance call center to
215
Spring 2013 │ Volume 20 │ Number II
B. Telework Can Shrink the Federal Deficit and Ease State Budgetary Woes
Telework’s capacity to fuel employment promises significant revenue gains and cost savings
for governments. Consider data provided in 2009 by Connected Nation, a non-profit organization
working to expand access to and use of broadband. According to the organization, the introduction
into the workforce of the 17.5 million new teleworkers described in Section II-A-1 of this article
could produce for the federal government an estimated net increase of more than $256 billion a year
in income tax revenue, social security revenue, and federal disability savings.15 The increased
spending power of these new workers would likely increase sales of goods and services, generating
greater business income tax revenue for the federal government.
The arrival of these new teleworkers would increase personal income tax and business income
tax revenue for state governments, too, and the same sales that would bring states greater business
income tax revenue would bring them greater sales tax revenue.16 In addition to the earnings of
individuals who use telework to enter the workforce, the earnings of employees who use telework to
return to the workforce following a layoff could also strengthen both federal and state treasuries.
Further, telework’s capacity to create jobs – and increase the number of taxpaying consumers –
is not the only reason it can boost federal and state tax revenue. Telework can also increase business
income tax revenue by enabling companies to operate more profitably – to be more productive at less
cost.
C. Telework Can Mitigate Energy, Environmental, and Transportation Challenges
By decreasing reliance on cars and mass transit, telework reduces the demand for fuel.17 This
reduced demand can help stabilize fuel prices and strengthen the country’s energy independence.
Telework can also reduce carbon emissions18 and traffic congestion – congestion that, in 2011,
cost the nation $121 billion in wasted time and fuel.19 Further, by reducing the wear and tear on roads
answer questions about the trademark process was fully operational during those two days, with ‘100 percent participation from
the work-at-home employees’”); Diane Brady, Sandy Puts Mobile Workers to the Test, BLOOMBERG BUSINESSWEEK, Oct. 30,
2012, available at http://www.businessweek.com/articles/2012-10-30/sandy-puts-mobile-workers-to-the-test (Ernst & Young
“has its 167,000 employees scattered around the globe, with most well-equipped to work from home. [As a result,] even with its
U.S. headquarters in Times Square and thousands of employees living in the path of Superstorm Sandy, [the company] was able
to essentially continue operating as it often does - virtually”). See also Centers for Disease Control and Prevention, Guidance for
Businesses and Employers To Plan and Respond to the 2009 - 2010 Influenza Season, Feb. 22, 2010, available at
http://www.cdc.gov/h1n1flu/business/guidance/ (As part of their flu pandemic plans, employers should “[e]xplore whether [they]
can establish policies and practices, such as flexible worksites (e.g., telecommuting) … to [increase] the physical distance among
employees and between employees and others if local public health authorities recommend the use of social distancing strategies.
[Employers should also ensure that they] have the information technology and infrastructure needed to support multiple
employees who may be able to work from home”).
15
Comments of Connected Nation at 17-19, available at http://apps.fcc.gov/ecfs/document/view?id=7020039177.
16
Goluboff, supra note 1, at 696.
17
AT&T 2011 Sustainability Report (Based on 2010 data, AT&T concluded that its “telecommuter population avoids 175
million commute miles per year, with annual fuel savings of approximately 8.7 million gallons”).
18
Id. (Based on 2010 data, AT&T concluded that its telecommuters achieve a reduction of over 76,000 metric tons of greenhouse
gas emissions per year).
19
David Schrank et al., Texas A & M Transportation Institute, 2012 Urban Mobility Report, Dec. 2012, at 1, 5, 23, available at
http://d2dtl5nnlpfr0r.cloudfront.net/tti.tamu.edu/documents/mobility-report-2012.pdf.
216
Media Law & Policy
and rails, telework can cut the costs of maintaining, repairing, and expanding transportation
infrastructure.
III. TAX BARRIERS TO TELEWORK
Notwithstanding the critical benefits telework offers, state tax authorities have embraced
policies that frustrate both individuals and companies seeking to adopt it. This section of the article
will examine two state tax policies that pose a significant threat to widespread reliance on telework –
one policy that imposes a penalty on telecommuters and one policy that imposes a penalty on
employers.
A. Tax Penalty Imposed On Telecommuters
1. The “Convenience Of The Employer” Rule: An Overview
Perhaps chief among the regulatory obstacles to telework is the convenience of the employer
rule. While a number of states maintain the rule,20 New York has earned considerable notoriety for its
vigorous enforcement of the rule. For this reason, this discussion will focus on the convenience rule
as New York applies it.21
Under the rule in New York, if nonresidents work for New York employers and telecommute
part-time – either for their own convenience or the convenience of their employer – they must
pretend that the days spent working at home were days spent working in New York. Because all
workdays are deemed New York days, they must pay taxes to New York on all of their wages – both
the wages earned in New York and the wages earned at home, outside New York.
The penalty the convenience rule imposes is steep: because the states where telecommuters
live can also tax the wages they earn at home, employees telecommuting to New York risk double
taxation – taxation once by their home state and a second time by New York. While some states
provide a credit to their telecommuting residents for taxes they pay New York on the wages they earn
at home, many telecommuters still face a fine: when New York’s tax rate is higher than the home
state’s tax rate, the telecommuter must pay the New York rate on the home state wages.
While telecommuters may be able to avoid the telecommuter penalty tax if they never come to
New York for work, conducting business in New York for just a few days or weeks could trigger
liability. By its terms, the convenience rule applies to a nonresident employee who “performs
services for his employer both within and without New York State.”22 It sets no minimum period of
20
N.Y. COMP. CODES R. & REGS. tit. 20, § 132.18(a); DEL. SCHEDULE W; 61 PA. CODE § 109.8; 316 NEB. ADMIN. CODE § 22003.01C(1).
21
N.Y. COMP. CODES R. & REGS. tit. 20, § 132.18(a) (“If a nonresident employee … performs services for his
employer both within and without New York State, his income derived from New York State sources includes that
proportion of his total compensation for services rendered as an employee which the total number of working days
employed within New York State bears to the total number of working days employed both within and without New
York State…. However, any allowance claimed for days worked outside New York State must be based upon the
performance of services which of necessity, as distinguished from convenience, obligate the employee to out-ofstate duties in the service of his employer. In making the allocation provided for in this section, no account is taken
of nonworking days, including Saturdays, Sundays, holidays, days of absence because of illness or personal injury,
vacation, or leave with or without pay”).
22
Id.
217
Spring 2013 │ Volume 20 │ Number II
time the nonresident must spend in New York before being subject to the rule. Thus, nonresidents
risk taxation in New York on 100 percent of their income even if they spend only a negligible
amount of time there.23
2. The “Employer Necessity” Test
As noted above, New York’s convenience rule applies to any nonresident employee of a New
York firm who works partly from home, either for his own convenience or his employer’s. If an
employee can prove that his telework arrangement is an employer “necessity,” rather than a mere
convenience, he may be permitted to allocate the wages he earned at home to his home state.
However, proving that telework is an employer necessity will often be impossible.
a. The Necessity Test Before May 2006
Before May 2006, New York maintained that telework was an employer necessity only if the
tasks the employee performed at home were of such a kind that they could not possibly be performed
at his employer’s office in New York. Consider, for example, the case of Manohar Kakar.24
Kakar, a resident of New Jersey, worked for a computer consulting firm located in Manhattan.
His job required him to work with highly confidential financial information, which his employer did
not want other employees to see. He initially worked in the New York City office. However, when
financial constraints forced the firm to reduce its office space, it created multi-purpose rooms for
employees to share, and the new, shared work space did not provide the privacy Kakar needed to
keep the financial data he managed confidential. As a result, his employer directed him to work parttime from home. The firm paid all the expenses associated with establishing and maintaining his
home office in New Jersey. Kakar subsequently moved to Arizona and continued to telecommute
from there. His firm paid all the expenses associated with his new home office, as well. As before, he
spent some days working in the New York office.
For the two tax years at issue, Kakar treated as New York income only the income he earned in
New York. New York, however, insisted that all of his compensation – including the pay he earned
in New Jersey and Arizona – was New York income. Kakar argued that he should be allowed to
allocate the wages he earned in New Jersey and Arizona to those states, rather than New York,
because working from home was an employer necessity. He based his claim of employer necessity
partly on the fact that there was inadequate workspace in his employer’s office to assure the privacy
he needed to work with the confidential data.
23
Cf. Huckaby v. N.Y. Div. of Tax Appeals, 4 N.Y.3d 427, cert. denied, 546 U.S. 976 (2005). (A Tennessee resident with a New
York employer spent approximately 75% of his work time working in Tennessee and 25% of his work time working in New
York. The telecommuter argued before the Court of Appeals that, “read and applied literally, the convenience of the employer
test would allow New York to tax 100% of the income of a nonresident who worked out of his employer’s place of business in
New York just one day a year” and that “due process demands proportionality in order to prevent [such] overreaching.” The
Court declined to resolve the issue: “Whether due process would countenance … taxation of 100% of the income of a
nonresident who spends a trivial amount of time working in New York … is simply not before us. We conclude that the minimal
connection required by due process plainly exists in this case where petitioner accepted employment from a New York employer
and worked in his employer’s New York office approximately 25% of the time”).
24
In re Kakar, N.Y. Div. of Tax Appeals, DTA No. 820440 (Feb. 16, 2006).
218
Media Law & Policy
The Division of Tax Appeals rejected Kakar’s argument, concluding that “with but a minimum
of ingenuity, arrangements could have been made to provide a secure work environment” for him.25
That is, even though the employer made the business decision to eliminate privacy in the main office,
New York took the position that the employer could easily restore privacy and obviate the telework
arrangement.
A key difficulty with the pre-2006 employer necessity test is that most telecommuters will be
hard-pressed to prove that the work they do at home cannot, under any circumstances, be done in a
New York office. Generally, the very reason employees can telecommute is that their work can be
done in more than one place.
b. The Necessity Test After May 2006
In May 2006, New York’s Department of Taxation and Finance issued guidance purporting to
offer a “revised position concerning the application of the convenience of the employer test.”26
Although New York made no changes to the convenience rule itself – the rule still required
nonresident employees to prove employer necessity in order to avoid the double tax threat – the goal
of the guidance appeared to be to make it easier for nonresident employees to prove employer
necessity. However, the “revision” was hollow: Proving employer necessity remains as hard to do
today as it was before the guidance was issued.
According to the guidance,
For tax years beginning on or after January 1, 2006, it is the Tax Department’s
position that in the case of a taxpayer whose assigned or primary office is in
New York State, any normal work day spent at the home office will be treated as
a day worked outside the state if the taxpayer’s home office is a bona fide
employer office…. Any day spent at the home office that is not a normal work
day would be considered a nonworking day.27
Thus, New York now requires telecommuters to establish two basic elements to demonstrate
that telework is necessary: (1) the days the telecommuter spends at home are “normal” work days;
and (2) the telecommuter’s home office qualifies as a “bona fide employer office.” Each of these
elements can be hard to prove.
i. “Normal Work Day”
According to New York, a “normal work day” is,
any day that the taxpayer performed the usual duties of his or her job. For this
purpose, responding to occasional phone calls or emails, reading professional
journals or being available if needed does not constitute performing the usual
duties of his or her job.28
25
Id.
26
N.Y. Dep’t of Tax. and Finance, Office of Tax Policy Analysis, Technical Services Div., New York Tax Treatment of
Nonresidents and Part-Year Residents Application of the Convenience of the Employer Test to Telecommuters and Others, TSBM-06(5)I (May 15, 2006) [hereinafter TSB-M-06(5)I].
27
28
Id. at 2.
Id.
219
Spring 2013 │ Volume 20 │ Number II
This definition of a “normal work day” may not encompass days that most employees and
employers regard as normal work days. For example, consider an oncologist at a university hospital
located in New York who is writing a paper on treatments for pancreatic cancer. He spends the day at
his home in New Jersey doing research, conducting a comprehensive review of the literature
published on the topic in the last twenty years. While at home, he receives some email messages and
phone calls, which he answers. Although both he and the university might consider the research day
a “normal work day,” New York might not agree. Rather, New York might insist that he was merely
“reading professional journals” and “responding to occasional phone calls or emails,” which – under
the state’s narrow definition – do not qualify the day as a “normal work day.”
ii. “Bona Fide Employer Office”
Even if a telecommuter can prove that the days he spent at home were “normal” work days, he
must also prove that his home office is a “bona fide employer” office. The test for such an office can
present an even greater challenge.
New York provides three categories of factors employees must use to determine if their home
offices qualify as a “bona fide employer office.” These categories include a “primary factor,” a set of
“secondary factors,” and a third set of factors called “other factors.” To satisfy the “bona fide
employer office” test, telecommuters must establish either:
a) “the primary factor, or
b) at least 4 of the secondary factors and 3 of the other factors.”29
The primary factor offers telecommuters absolutely no relief from the pre-2006 employer
necessity test, because it is the pre-2006 test. According to New York, a telecommuter’s home office
will satisfy the primary factor “[i]f the employee’s duties require the use of special facilities that” are
“available at or near the employee’s home” and “cannot be made available at the employer’s place of
business.”30 To illustrate the point, New York explains,
[I]f the employee’s duties require the use of specialized scientific equipment that
is set up at the employee’s home (or at a facility near the employee’s home) but
could physically be set up at the employer’s place of business located in New
York, then the home office would not meet this factor.31
Thus, just like the pre-2006 employer necessity test, the 2006 guidance provides that an
employee can prove telework is necessary if the nature of the work he does at home is such that it
cannot be done at the New York office. This test was virtually impossible to meet before 2006, and it
remains so.32
29
Id.
30
Id. at 3 (emphasis added).
31
Id. (emphasis added).
32
Comparing a case decided under the pre-2006 employer necessity test with New York’s illustration of the primary factor in the
2006 guidance underscores New York’s intent to preserve, rather than relax, the old test. Compare In re Fass v. State Tax
Comm’n, 68 A.D.2d 977 (App. Div. 3d Dept. 1979), aff’d, 50 N.Y.2d 932 (1980) (One element of the taxpayer’s job was to test
sports cars. To perform this job function, he needed access to “a garage to store [the vehicles] for testing and evaluation.” This
specialized facility - and others he needed for work - were “established … at [his] farm and residence in New Jersey…. [T]hey
were not available at or near his employers’ New York City offices.” The Court found that the work he did in New Jersey “could
not have been performed at his employers’ New York City office” and held that he “qualified for an allocation of his income”) to
TSB-M-06(5)I at 3 (“[I]f the employee’s duties require the use of a test track to test new cars,” a track “is available near the
220
Media Law & Policy
While telecommuters who are unable to satisfy the primary factor can still try to prove the
requisite number of both “secondary” and “other factors,” many of these factors are absent in the
typical telework arrangement. Consider, for example, the following conditions that might help
establish a “bona fide employer office:”
 The employer requires the employee to work from home as a condition of employment;
 The employer has a “bona fide business purpose” for establishing an office in the specific
locale where the employee lives;
 The employee meets or deals with clients, patients, or customers on a regular and
continuous basis at his home office;
 The employer pays the employee rent for the home office;
 The employer maintains a separate telephone listing for the employee’s home office;
 The employer lists the telecommuter’s home address on the company’s letterhead or
business cards;
 The employee uses his home office “exclusively” for work (that is, the employee never
makes a personal phone call, pays a bill, or shops on-line in his home office);
 The employee displays a sign at his home indicating that it is a company office; and
 The employer identifies the telecommuter’s home office as a company place of business
in its advertising.33
Because many of the secondary and other factors do not exist in most telework arrangements,
most home offices will not qualify. As a result, most telecommuters are just as likely to fail New
York’s “revised” employer necessity test as they were to fail the pre-2006 test it purported to replace.
3. The Harm the Convenience Rule Causes
The convenience rule causes considerable harm to workers, businesses, and states, including
both New York (and any other state applying the rule) and the states where telecommuters live.
a. How Workers Suffer
The convenience rule can make telework too expensive for individuals, preventing disabled
people, older Americans, caretakers, and others who cannot work full-time in a conventional office
setting from using broadband to join the workforce. By making telework unaffordable, the rule also
limits opportunities for Americans who have lost their jobs, are struggling to find local employment,
and need the option to telework to be able to include distant companies in their job searches. Further,
the rule harms workers who are currently employed but cannot use telework to reduce their
commuting costs, work/family conflicts, and carbon footprint.
employee’s home” and “is not available at the employer’s offices in New York City,” then the home office will satisfy the
primary factor, and the employee may qualify for an allocation of his income)(emphasis added).
33
TSB-M-06(5)I at 3-5.
221
Spring 2013 │ Volume 20 │ Number II
The convenience rule also generates considerable confusion for telecommuters and would-be
telecommuters. A New Yorker who relocates to a distant state and continues working for his New
York firm on a telecommuting basis can be startled to learn, upon receiving his first post-move
paycheck, that his firm has continued to withhold New York taxes on all of his salary. The surprise
can be especially disruptive for New Yorkers who moved to a no-tax state and mistakenly believed
they were leaving behind the obligation to pay taxes to New York (or any state) on 100 percent of
their income. Consider an older worker, who relocates to Florida but continues to telecommute to his
Manhattan employer as a way of phasing into retirement. He travels to New York occasionally to
meet with colleagues. He may have chosen to move to Florida, at least partly, because Florida does
not tax personal income, and he may have made long-term financial decisions based on the tax
savings he expected. The fact that he will still owe taxes to New York on his entire salary may raise
questions about the viability of his plans.
Workers who are considering telecommuting to an employer located in another state and who
realize, in advance, that they might have tax liability in the company’s state are often on no surer
footing than those who are blindsided. Even if a worker learns that the state where his employer (or
prospective employer) is located does have a convenience rule, he may find it difficult to determine
whether the rule covers him. For example, nonresidents of New York may be uncertain whether their
telework arrangements satisfy the multi-factor test for exemption from the convenience rule that New
York set forth in its 2006 guidance.34 Some workers considering telecommuting may abandon the
plan if the tax implications are too difficult to untangle.
b. How Businesses Suffer
By forcing employees to reject the telework option (either by making telework too expensive
or by making the tax consequences of telework inscrutable), the convenience rule prevents
businesses from growing a distributed workforce. As a result, companies struggle to take advantage
of the business benefits of telework identified in Section II-A-2 of this article.
In addition, the convenience rule slams payroll departments with needlessly complex
compliance challenges. For example, just as telecommuters and would-be telecommuters are often
confused about where they owe taxes, payroll personnel struggle to determine whether the company
must withhold income tax in the states where telecommuters live, the company’s state, or both. And
just as employees may dismiss telework because the tax consequences are impenetrable, companies
may reject telework because the administrative costs of sorting out their withholding obligations are
too great.
Even businesses with no interest in employing telecommuters can suffer because of the
convenience rule. As noted in Section III-A-1 of this article, New York’s convenience rule applies
only to nonresident employees who spend at least some time working in New York. Thus,
nonresidents can avoid the rule if they never travel to New York for work – if they telecommute on a
truly full-time basis or take jobs in other states. However, when nonresidents eliminate New York as
a work destination, they either do not patronize New York businesses at all or they patronize them far
less often. They do not buy five lunches per week in New York, buy memberships in New York
gyms, or go to movie theaters in New York after work. New York’s businesses lose revenue.
c. How States Suffer
34
TSB-M-06(5)I.
222
Media Law & Policy
When New York’s businesses are less profitable, the state loses sales tax revenue and business
income tax revenue. In addition, when nonresidents stay out of New York for work purposes, the
state loses personal income tax revenue: once nonresidents stop working in New York altogether,
New York has no opportunity to tax any part of their wages.35 Thus, the convenience rule, which is
intended to swell New York’s treasury, actually imperils it.
In addition to harming New York, the convenience rule harms the states where telecommuters
live. For example, states that give their telecommuting residents a credit for the taxes they pay to
New York on the wages earned at home forfeit to New York the personal income tax revenue that is
due to them. By surrendering that revenue, they finance New York’s public services – like police,
fire, and other emergency services – even as the telecommuters regularly work from home and
depend on the home state’s services. Indeed, the home states may be sustaining New York’s services
while making hard choices about which of their own they must curtail or shutter.
Another reason the convenience rule can harm workers’ home states is that, by preventing
jobless residents from using telework to take positions with remote companies, the rule may
needlessly prolong the unemployment of these workers and further diminish the home states’
personal income tax revenue. In addition, because unemployed residents are forced to limit their
purchases, the rule can shrink sales tax revenue, and since reduced sales yield less business income,
the rule can decrease business income tax revenue.
4. Constitutional Challenges to the Rule
Two taxpayers have argued that the convenience of the employer rule is not just
counterproductive, but unconstitutional. In Zelinsky v. Tax Appeals Tribunal of New York,36 the
taxpayer was a Connecticut resident and a professor at Cardozo Law School in Manhattan. His job
responsibilities included teaching, meeting with students, grading, research, and writing. During the
two taxes years at issue (1994 and 1995), Zelinsky divided his work time between New York and
Connecticut: he taught classes and met with students in Manhattan, and he did his grading, research,
and writing at home, in Connecticut. He spent the majority of his working days in Connecticut.
Treating the part of Zelinsky’s salary that he earned at home as Connecticut source income,
Connecticut taxed that income.37 Treating the part of his salary that he earned at home as New York
source income (i.e., applying its convenience of the employer rule), New York taxed that income,
too.
35
See, e.g., Edward A. Zelinsky, Combining the Mobile Workforce and Telecommuter Tax Acts, STATE TAX TODAY, Jul. 30, 2012
(“As a constitutional matter, the U.S. Supreme Court has distinguished between the broad authority of states to tax their residents'
incomes and the states' more limited power to tax nonresidents' incomes. A state has the plenary authority to tax all income of a
resident wherever that income is earned. However, that state has more limited, source-based authority to tax nonresidents. A state
can tax a nonresident only on the income the nonresident earns within the borders of that state”).
36
Zelinsky v. Tax Appeals Trib. of N.Y., 1 N.Y.3d 85 (2003), cert. denied, 541 U.S. 1009 (2004).
37
See Petition for a Writ of Certiorari at 13 n.6, Zelinsky v. Tax Appeals Trib. of N.Y., 541 U.S. 1009 (2004)(“Connecticut taxed
the petitioner on the basis of his status as a Connecticut resident. On the days when the petitioner worked at home, Connecticut
was also the State of source, i.e., the State … in which the petitioner’s income-producing activity (writing, research and grading)
actually occurred”).
223
Spring 2013 │ Volume 20 │ Number II
Zelinsky challenged New York’s application of the convenience rule in the New York courts,
claiming that application of the rule to him violated the Commerce and Due Process Clauses of the
U.S. Constitution. Specifically, he argued that the tax the convenience rule imposed was not fairly
apportioned, as the Commerce Clause requires, and that New York’s imposition of tax on his
Connecticut wages violated the prohibition in the Due Process Clause against extraterritorial
taxation. New York’s Court of Appeals denied both claims. Zelinsky appealed his case to the U.S.
Supreme Court, but the Court refused to hear his appeal.
Just under a year later, the New York Court of Appeals again upheld the convenience rule
against constitutional challenges. In Huckaby v. New York State Division of Tax Appeals,38 the
taxpayer was a Tennessee resident and a computer programmer with an organization based in
Queens, New York. During the two tax years at issue in his case (also 1994 and 1995), he spent
about 75 percent of his work time working from home, in Tennessee, and 25 percent of his work time
working in New York. As in Zelinsky’s case, the New York Department of Taxation and Finance
insisted that he allocate 100 percent of his income to New York and pay taxes on it.
Like Zelinsky, Huckaby challenged the Department’s position in the New York courts. He
argued that application of the convenience rule to him violated the Due Process Clause and the Equal
Protection Clause of the U.S. Constitution. However, in a 4-3 decision, the New York Court of
Appeals rejected his claims. Like Zelinsky, Huckaby appealed the decision to the U.S. Supreme
Court, and, as in Zelinsky’s case, the Supreme Court denied review. The Supreme Court’s refusal to
consider these two cases underscored for members of Congress the need for legislative relief:
Congress would have to do what the courts would not – remove the threat of double or excessive
taxation for telecommuting across state lines, ease telecommuters’ confusion about where they owe
taxes, and ease employers’ confusion about where to withhold.
5. The Telecommuter Tax Fairness Act
The Telecommuter Tax Fairness Act39 is the federal remedy lawmakers have proposed. This
legislation would prohibit states from taxing the compensation a nonresident earns when he is
physically present in a different state. For purposes of determining physical presence, states would be
barred from treating a nonresident individual as present in the state merely because he is working at
home for convenience or because his work at home or office at home fails a convenience of the
employer test, or any similar test. That is, states would not be able to force nonresidents to pretend
that they were present in the state when they were actually present in their home state.
Further, under the proposal, states would be prohibited from treating a period of time during
which a nonresident is physically present in another state and performing certain tasks there to be
time that is not normal work time, nonworking time, or uncompensated time – unless the
nonresident’s employer regarded the time that way.40 The goal of this provision is to bar a state like
New York from unilaterally asserting that days a nonresident elected to work from home were non-
38
Huckaby v. N.Y. Div. of Tax Appeals, 4 N.Y.3d 427, cert. denied, 546 U.S. 976 (2005).
39
H.R. 5615; S. 1811 (112th Cong.).
40
Id.
224
Media Law & Policy
working days or unpaid days and that, consequently, all of his compensation was earned in New
York and subject to New York tax.41
The legislation has been introduced in multiple sessions of Congress. In the 112th session,
Representative Jim Himes and Representative Chris Murphy (now Senator Murphy) introduced it in
the House, and Representative Rosa DeLauro co-sponsored it. Senator Joseph Lieberman (now
retired) and Senator Richard Blumenthal introduced the bill in the Senate. These lawmakers are all
from Connecticut, where many victims of the convenience rule reside. Efforts are underway to secure
reintroduction in the current session. It is possible that a new bill would bear a different name, but its
objectives would be the same.
In past sessions of Congress, the bill has generated considerable support both within and
outside government. Lawmakers from both sides of the aisle and all across the country signed on –
Maine, Massachusetts, New Jersey, Maryland, Virginia, and Georgia, Mississippi, Illinois, Kansas,
and Arizona, Washington State, and even New York.
The bill won the support of the FCC. In the National Broadband Plan, the FCC specifically
recommended that Congress take up the Telecommuter Tax Fairness Act because of the negative
impact the penalty has on telework adoption.42
Outside government, organizational stakeholders with a wide range of missions have also
endorsed telecommuter tax fairness. In addition to advocates for telework,43 such supporters have
included, for example, advocates for small businesses,44 taxpayers,45 transportation alternatives,46
homeowners,47 flexible work arrangements,48 work/life balance49 and energy security.50 Individuals
41
Nicole Belson Goluboff, Telecommuting Tax Confusion: Why the Federal Proposal for a Uniform Nexus Standard for MultiState Employees Won’t Work, STATE TAX BLOG (Oct. 22, 2012), available at http://www.bna.com/telecommuting-tax-confusionb17179870408.
42
NBP, Recommendation 13.6.
43
The Telework Coalition, www.telcoa.org.
44
Letter from Karen Kerrigan, President and CEO, Small Business & Entrepreneurship Council, to Senator Joseph Lieberman
(Jan. 5, 2012), available at http://www.sbecouncil.org/2012/01/05/s-1811-telecommuter-tax-fairness-act.
45
Letter from Jordan Forbes, Federal Government Affairs Manager, National Taxpayers Union, to Representative Jim Himes
(July 22, 2009), available at http://www.ntu.org/news-and-issues/taxes/hr2600-telecommuter-tax-fairness.html.
46
Association for Commuter Transportation Telework Council,
https://netforum.avectra.com/eWeb/DynamicPage.aspx?Site=ACT1&WebCode=Telework.
47
Modernizing the Tax Code: Updating the Internal Revenue Code to Help Small Businesses Stimulate the Economy, Hearing
Before the House Comm. on Small Business, 110th Cong., 2d Sess. (2008) (written testimony submitted by the American
Homeowners Grassroots Alliance), available at
http://www.americanhomeowners.org/AHGA/Testimony/simplifyandreducehomeownerstaxes.htm.
48
Workplace Flexibility 2010, Public Policy Platform on Flexible Work Arrangements, May 2009, available at
www.workplaceflexibility2010.org.
49
Take Back Your Time, Take Back Your Time Supports Telecommuting Bill, Newsletter, Spring 2010, available at
http://www.timeday.org/news_Spring2010.pdf.
50
Justin Horner, Telework: Saving Gas and Reducing Traffic from the Comfort of your Home, Mobility Choice white paper, Mar.
9, 2011, available at
http://www.mobilitychoice.org/index.php?option=com_content&view=article&id=408:telecommuting&catid=100:news&Itemid
=494.
225
Spring 2013 │ Volume 20 │ Number II
nationwide have called for telecommuter tax reform, as well: a petition in support of the bill includes
signatures from residents of nearly all of the 50 states.51
The broad support makes sense. As location becomes increasingly irrelevant to productivity,
there is simply no place for a tax that penalizes the use of broadband to reach the office and perform
work.
6. The Mobile Workforce State Income Tax Simplification Act
a. The Relation Between the Mobile Workforce Bill and the Telecommuter Tax
Fairness Act
The Mobile Workforce Bill is a federal proposal that would also affect the state income
taxation of interstate telecommuters. Like the Telecommuter Tax Fairness Act, a version of the
Mobile Workforce Bill has been introduced in multiple sessions of Congress. In the 112th Congress,
the measure passed in the House but stalled in the Senate Finance Committee.52 On March 20, 2013,
it was reintroduced in the 113th Congress as H.R. 1129.53
The Mobile Workforce Bill and the Telecommuter Tax Fairness Act both aim to simplify tax
compliance for multi-state workers and their employers. However, the two bills focus on different
aspects of the tax quagmire these workers and employers face.
When an employee, who works in multiple states, is considering his state income tax
obligations, a basic question is: what is my tax exposure in a state where I work but do not live?
This question consists of two parts:
1. Does the state where I am not a resident have authority to tax any of my salary?; and
2. If it does, what part of my salary can it tax?
The first part of the question addresses the issue of “nexus,” whether there is a sufficient
connection between the worker and the state to justify the state’s imposition of any tax at all on the
worker’s wages. The second part addresses the issue of “apportionment.” It assumes there is
sufficient nexus for the state to tax the worker’s income and asks how much of his income the state
may tax.54
The Mobile Workforce Bill concerns nexus. As things stand now, different states have
different standards for determining whether a nonresident has a nexus in the state. The disparity
among nexus standards is one reason multi-state workers struggle to determine where they owe taxes
and their employers struggle to determine where they must withhold. The aim of the Mobile
Workforce Bill is to eliminate this particular source of confusion by establishing a uniform nexus
51
The Telework Coalition, Support the Telecommuter Tax Fairness Act, available at
http://www.petitiononline.com/totp02/petition.html.
52
H.R. 1864; S. 3485 (112th Cong.).
53
H.R. 1129 (113th Cong.).
54
See Goluboff, supra note 41.
226
Media Law & Policy
rule:55 Under the legislation, a state would be permitted to tax the income of a nonresident employee
only if the employee was present and working in the state for more than 30 days during the year.56
The Telecommuter Tax Fairness Act, in contrast, addresses the second part of the multi-state
worker’s tax question – the part concerning apportionment.57 As the earlier discussion of the
Zelinsky case indicates,58 different states may apply different standards for determining how to
source the income an employee earns in multiple states and, therefore, how to apportion the tax on
that income. Connecticut, for example, treats income that a Connecticut resident with a New York
employer earns at home as Connecticut source income, subject to tax in Connecticut, while New
York applies a convenience rule and treats the income that Connecticut telecommuters choose to earn
at home as New York source income, subject to tax in New York. The disparity between these
sourcing and apportionment standards is another reason (in addition to the disparity among nexus
standards) that multi-state workers struggle to determine where they owe taxes and their employers
struggle to determine where they must withhold. A key goal of the Telecommuter Tax Fairness Act is
to eliminate this particular source of confusion by establishing a uniform rule. Under the
Telecommuter Tax Fairness Act, a state would be permitted to tax only the part of a nonresident’s
compensation that he earned when he was physically present in the state.
b. Why the Mobile Workforce Bill Must be Amended
While the Mobile Workforce Bill and the Telecommuter Tax Fairness Act address distinct
elements of the state income tax analysis for multi-state workers, the Mobile Workforce Bill is likely
to fail in its simplification mission unless it is amended to include the provisions of the
Telecommuter Tax Fairness Act.
A primary reason this amendment is necessary is that, if the convenience of the employer rule
is not eliminated, states will be able to use the convenience rule to dodge the core element of the
Mobile Workforce Bill: the 31-day threshold for nexus. New York, for example, will be able to
require nonresidents who telecommute part-time for convenience to treat their home state days as
New York days when figuring whether they spent 31 days or more in New York. Thus, a California
resident who works for a New York employer, telecommutes for convenience, and travels to New
York for work only 20 days during the year will have to pretend that he spent his California days in
New York. As a result, he will reach the 31-day threshold for nexus in New York without having
spent 31 days there – perhaps even before he has set foot in New York for the first time. The goal of
a uniform 31-day nexus standard will be defeated, and the current confusion caused by disparate
nexus rules will prevail.59
55
Id.
56
H.R. 1864; S. 3485 (112th Cong.).
57
See Zelinsky, supra note 35.
58
Section III-A-4.
59
The legislative history of the Mobile Workforce Bill underscores how real the risk is that New York and other states will use
the convenience rule to circumvent the 31-day nexus rule. Versions of the Mobile Workforce Bill introduced in the 109th and
110th Congressional Sessions provided that a state could tax the income of a nonresident employee only if he was “physically
present” and working in the state for the specified number of days. H.R. 3359 (110th Cong.); H.R. 6167 (109th Cong.). However,
in subsequent versions of the bill, the word “physically” was removed from the nexus rule. These later versions provided, instead,
that a state could tax a nonresident employee’s income only if he was “present” and working in the state for the specified period.
227
Spring 2013 │ Volume 20 │ Number II
Moreover, if the convenience of the employer rule is not eliminated, the current confusion will
do more than persist; it will get worse. Nonresident employees may be forced to use contradictory
standards for determining when a home state day qualifies as a home state day, depending on
whether they are addressing the nexus or apportionment part of the income tax question.
For example, suppose everyone agrees that, under the Mobile Workforce Bill, a taxpayer
trying to determine whether he has nexus in his employer’s state may treat his home state days as
home state days. Our California telecommuter, when determining whether he has nexus in New
York, counts as New York days only the days he was physically present in New York and determines
that he spent 40 days there. He concludes that, having spent more than 30 days inside New York, he
does have nexus there and is subject to New York tax. However, when he turns to the question of
apportionment – the question of how much of his income is subject to tax in New York – he will
have to apply the convenience of the employer rule. He will have to treat his California days – which
he just counted as California days for nexus purposes – as New York days. This fluctuating
characterization of home state days will only yield greater confusion.
To avoid these problems, lawmakers should revise the Mobile Workforce Bill. For example,
the 31-day nexus rule set forth in the bill should be amended to provide that:
(1) A state can tax a nonresident on wages he earned in the state only if the nonresident was
physically present in the state for more than 30 days during the year (rather than merely “present” in
the state, as the current version of the bill provides); and
(2) States may not apply a convenience of the employer test or any similar test to determine
whether the nonresident was physically present there.
Further, to assure that the bill truly simplifies the personal income tax analysis for multi-state
workers and their employers, the Mobile Workforce Bill should be amended to provide a uniform,
physical presence standard for determining, not just nexus, but apportionment, as well. Adding the
provisions of the Telecommuter Tax Fairness Act to the Mobile Workforce Bill would accomplish
this goal. As described in Section III-A-5 of this article, incorporating the terms of the Telecommuter
Tax Fairness Act would make clear that, when a nonresident employee does have nexus in a state, the
state would be able to tax only the part of his income that he earned when he was physically present
in that state and it would not be able to use a convenience of the employer test to determine whether
the nonresident was physically present. States would also be barred from treating days a nonresident
worked at home as non-working days or unpaid days, unless the nonresident’s employer considered
the days non-working or unpaid days.
To strengthen the Mobile Workforce Bill further, its sponsors should also adopt the
Telecommuter Tax Fairness Act’s scope of coverage: the Mobile Workforce Bill covers only
employees while the Telecommuter Tax Fairness Act covers both employees and independent
contractors. Amending the Mobile Workforce Bill to cover both employees and independent
contractors would ease tax compliance burdens for the greatest number of multi-state workers and
companies.60
B. Tax Penalty Imposed on Businesses
H.R. 2110 (111th Cong.); H.R. 1864; S. 3485 (112th Cong.). The removal of the word “physically” from the nexus rule leaves
any state free to apply a convenience rule and to force nonresidents to treat the days they worked outside the state for
convenience as if they were days the nonresidents were “present” inside the state.
60
Goluboff, supra note 41.
228
Media Law & Policy
Just like nonresident individuals, out-of-state (“foreign”) companies must have nexus in a state
before the state can subject them to income tax: they must have a sufficient connection with the state
– sufficient activity in the state – to justify the state’s imposition of tax. Another obstacle to telework
is the policy states may adopt of asserting that a foreign company has income tax nexus in the state
when its only connection to the state is that it employs a single telecommuter there. Some recent
cases have thrown a spotlight on this policy.
1. Telework as a Basis for Nexus in New Jersey: The Telebright Case
Telebright Corp. v. Director61 is the leading case addressing telework as a basis for corporate
income tax nexus. Telebright was a Delaware corporation with its principal place of business in
Maryland. Its business was developing software. In 2001, the company hired Srisathya Thirumalai, a
Maryland resident, to develop and write software code. She signed an employment contract, which
included various restrictive covenants. After a few years, due to her husband’s relocation, she moved
to New Jersey. Telebright agreed to retain her on a telecommuting basis.
Thirumalai travelled to Maryland approximately twice a year to attend company-wide
meetings, but otherwise worked entirely from home. Most of her assignments, which she received
daily at home by phone or email, consisted of writing software code. This code became part of a web
application Telebright supplied to its customers. She had no sales responsibilities.
Telebright had no activity in New Jersey apart from her presence. It did not maintain an office
or financial accounts in New Jersey, did not have other employees there, nor solicit sales there.
When Thirumalai first began telecommuting, the company gave her a laptop computer to use
for work. However, she later replaced it at her own expense. Telebright did not reimburse her for any
household bills related to her work or for the costs she incurred when she travelled to Maryland.
Telebright withheld New Jersey Gross Income Tax from Thirumalai’s paycheck. However, it
did not file New Jersey Corporation Business Tax returns. New Jersey’s Division of Taxation
determined that, under New Jersey’s tax law, the company was obligated to file such returns because,
by employing a telecommuter in New Jersey, it was “doing business” there.
Telebright challenged the Division’s determination before the Tax Court. The company argued
that it was not “doing business” within the meaning of New Jersey’s Corporation Business Tax Act
(“CBT Act”) and, therefore, was not subject to the Act. In addition, it argued that application of New
Jersey’s tax law to Telebright violated both the Due Process Clause and the Commerce Clause of the
U.S. Constitution. The Court rejected both the statutory and constitutional claims.
The Tax Court found that the company was “doing business” in New Jersey within the
meaning of the CBT Act, because it had an employee in the state who performed nearly all her duties
there. According to the Court, “[w]hile … Telebright … never maintained an office in New Jersey,
nor solicited business [t]here, its daily contact with the State through its employee is sufficient to
trigger application of the” Act.62 The fact that Telebright initially provided Thirumalai with a laptop
computer to use for work further supported the conclusion that the company was “doing business” in
New Jersey: it was “employing property” there.63
61
Telebright Corp. v. Director, 25 N.J. Tax 333 (2010), aff’d, 424 N.J. Super. 384 (2012).
62
Id. at 346.
63
Id. at 348.
229
Spring 2013 │ Volume 20 │ Number II
The Court noted that the fact that Thirumalai made a personal choice to move to New Jersey
was irrelevant to whether Telebright was subject to tax: “Ms. Thirumalai’s residence is not the
determinative factor. It is the location at which she receives her assignments, performs her
responsibilities and delivers her work product for Telebright that controls application of the CBT
Act…. From a substantive perspective, it is not relevant that she works in the same building in which
she resides.”64
Turning to Telebright’s claim that subjecting the company to tax violated the Due Process
Clause of the U.S. Constitution, the Court explained that there is no Due Process violation where the
company to which the state’s law is applied “has had ‘fair warning that [its] activity may subject [it]
to’” the state’s jurisdiction.65 Telebright’s “regular employment of Ms. Thirumalai” in New Jersey
gave it fair warning that it could be subject to the state’s laws.66 Telebright “acquiesced”67 in her
relocation to New Jersey, delivered her work assignments to her every day in New Jersey, and
supervised her in New Jersey. It also withheld New Jersey tax from her paycheck.68
Finally, the Court explained that a state’s tax on interstate economic activity satisfies the
Commerce Clause when the tax is applied to an activity that has a substantial nexus to the state, is
fairly apportioned, does not discriminate against interstate commerce, and is fairly related to the
services the state provides.69 The Court found that none of these Commerce Clause requirements
barred subjecting Telebright to the CBT Act.
With respect to the substantial nexus requirement, the Court said that Thirumalai’s “daily
presence in [New Jersey] for the purpose of carrying out her responsibilities as an employee of
Telebright is sufficient to” establish substantial nexus.70 It observed that Telebright “chose to
establish a work place for Ms. Thirumalai”71 in the state, “regularly enjoy[ed] the benefits of [the
state’s] labor market” by employing her,72 and had access to the state’s courts if she violated her
employment contract.73
The Court also indicated that Telebright enjoyed no protection from tax under P.L. 86-272,74 a
federal law that, in addition to the U.S. Constitution, limits states’ authority to assert income tax
64
Id. at 347.
65
Id. at 349 (alteration in original)(citation omitted).
66
67
68
Id.
Id.
Id.
69
Id. at 350 (citing Complete Auto Transit, Inc. v. Brady, 430 U.S. 274, 279 (1977)).
70
Id. at 351.
71
Id.
72
Id. at 350.
73
Id. at 350-51.
74
Id. at 355 n.1.
230
Media Law & Policy
nexus over out-of-state companies. Under P.L. 86-272,75 states are not permitted to impose income
tax on a foreign corporation when the corporation’s activities within the state are limited to the
solicitation of orders for the sale of tangible personal property, the orders are sent outside the state
for approval or rejection, and approved orders are filled from outside the state.76 Because Thirumalai
“was not engaged in soliciting orders from customers on behalf of Telebright,” P.L. 86-272 provided
no relief for Telebright.77
In March 2012, New Jersey’s Appellate Division affirmed the Tax Court’s decision,
“substantially for the reasons set forth in [the Tax Court’s] opinion.”78 However, the analysis
included a number of distinct observations. For example, the Appellate Division agreed with the Tax
Court that Telebright was doing business in New Jersey. It noted, however, that under New Jersey’s
Administrative Code, a for-profit corporation that is “‘carrying out any of the purposes of its
organization’” in New Jersey is “doing business” there,79 Telebright’s full-time employee was
carrying out the purpose of the company in New Jersey by creating computer code that became part
of the company’s web-based service;80 and, this activity (for purposes of applying the Corporation
Business Tax) is no different from “a foreign manufacturer employing someone to fabricate parts in
New Jersey for a product that will be assembled elsewhere.”81
In affirming the Tax Court’s conclusion that subjecting Telebright to New Jersey tax did not
violate the Due Process Clause, the Appellate Division emphasized that Thirumalai produced
computer code for Telebright in New Jersey, Thirumalai was entitled to all the legal protections
afforded New Jersey residents, and, if she violated the restrictive covenants in her employment
contract, Telebright would be able to bring suit in the New Jersey courts to enforce the contract.82
According to the appellate court, the only issue under the Commerce Clause that Telebright
had preserved the right to challenge on appeal was whether the substantial nexus requirement was
satisfied. The company argued that employing one person in New Jersey is “de minimis and does not
create the ‘definite link’ or ‘minimum connection’ between Telebright and [the] State so as to justify
imposition” of the Corporation Business Tax.83 Telebright also argued that, “given the prevalence of
telecommuting, taxing businesses on the basis that their employees work from remote locations will
impose ‘unjustifiable local entanglements’ and an undue accounting burden on those businesses.”84
75
76
15 U.S.C. § 381 (2011).
Id.
77
Telebright Corp., 25 N.J. Tax at 355 n.1.
78
Telebright Corp. v. Director, 424 N.J. Super. 384, 388 (2012).
79
Id. at 390 (citing N.J. ADMIN. CODE tit. 18, § 18:7-1.9(a)(1)).
80
Telebright Corp. v. Director, 424 N.J. Super. at 390.
81
Id. at 390-91.
82
Id. at 392.
83
Telebright Corp. v. Director, 424 N.J. Super. at 393-94 (citations omitted).
84
Id. at 394.
231
Spring 2013 │ Volume 20 │ Number II
The Appellate Division indicated that having one employee in the state was not “de
minimis.”85 Thirumalai was producing part of the company’s product in New Jersey, and Telebright
“benefit[ted] from all … the protections New Jersey law affords [its] employee.”86 The fact that
Thirmualai worked from a home office, rather than an office owned by Telebright, was irrelevant to
the substantial nexus analysis, the Court said.87
With respect to the “regulatory burden”88 Telebright said the tax imposed, the appellate court
was not persuaded the burden would be onerous. Telebright was already withholding income tax
from Thirumalai’s salary. It was subject to New Jersey’s labor and anti-discrimination laws
concerning the employee and was obligated to “remain apprised”89 of those laws. According to the
court, the company offered “no explanation as to why the additional effort of calculating and paying
the [Corporation Business Tax] would constitute an undue burden on its conduct of interstate
commerce.”90
The Appellate Division noted repeatedly that Thirumalai worked for Telebright on a full-time
basis.91 Although the case did not require it to opine on the issue, had Ms. Thirumalai worked in
New Jersey only part-time, it is possible the Court might have reached a different conclusion.
2. Telework as a Basis for Nexus in California: The Warwick McKinley Case
New Jersey courts are not alone in adopting the view that an out-of-state company may have
income tax nexus in a state where its only connection is the presence of a telecommuter performing
activities not protected by P.L. 86-272 (“non-solicitation activities”).92 Consider the Warwick
McKinley case,93 decided in 2012 by the California State Board of Equalization.
Warwick McKinley, Inc. (“Warwick”), a company incorporated in Massachusetts, provided
“marketing and recruiting consulting services in the environmental, engineering/construction and
green technology sectors.”94 According to Warwick, the company had only one office, located in
Massachusetts; from 2006-2008, it had an employee who worked from home in California, but her
85
Id. at 393-95.
86
Id. at 395.
87
88
89
90
Id.
Id.
Id.
Id.
91
See, e.g., id. at 390 (“We add only that Telebright’s full-time New Jersey employee ‘carr[ies] out the purpose of its
organization’ here”)(alteration in original); Id. at 392 (The State “is imposing the tax because [Ms. Thirumalai] performs work
for Telebright on a full-time basis in this State. Taxing a business based on its employing one full-time employee in the taxing
state does not violate the Due Process Clause”); Id. at 395 (“The fact that Telebright’s full-time employee works from a home
office rather than one owned by Telebright is immaterial” to the substantial nexus analysis).
92
See discussion supra Part III-B-I.
93
In re Warwick McKinley Inc., No. 489090, 2012 Cal. Tax LEXIS 14 (State Bd. Equalization. Jan. 11, 2012).
94
Id. at *2.
232
Media Law & Policy
home office was not “‘publicly attributed’”95 to the company; calls for the employee were directed to
the Massachusetts office and forwarded to her cell phone; and the company had no clients in
California.96 Warwick registered in California only to provide workers compensation insurance for
the telecommuter.97
California’s Franchise Tax Board notified Warwick that “the activities of its employee in
California created a nexus with California sufficient to require the filing of a [2006] tax return”98 and
advised the company that failure to file by a specified date would result in an assessment of tax and
penalties. The Franchise Tax Board did not receive a return by that date and made the assessment.
Warwick appealed.
On appeal, the Equalization Board agreed with the Franchise Tax Board. According to the
Equalization Board,
By operating through its employee in California, [Warwick] was afforded
substantial and enduring benefits and protections of the state that enabled [the
company] to generate business for its recruiting services. Thus, we find that
[Warwick] conducted a regular, systematic and substantial connection with, and
physical presence within, California[,] establishing substantial nexus to support
the imposition of the corporate franchise tax….99
Further, although Warwick argued that the telecommuter “engaged in protected sales
activities as defined in P.L. 86-272,”100 the Equalization Board disagreed. The employee’s
activities in California consisted of consulting and recruiting services, not the solicitation of
sales of tangible personal property. Consequently, P.L. 86-272 did not protect Warwick from
taxation.101
3. Treating Telework as a Basis for Nexus: More Common Than Not?
In April 2012, Bloomberg BNA issued its 12th Annual Survey of State Tax Departments.102
One goal of this survey is to clarify the positions of state tax departments concerning whether
particular in-state activities, when conducted by out-of-state companies, would create income tax
nexus in the state for those companies.103 Telecommuting was one of the activities the survey
addressed.
95
Id. at *5.
96
Id. at *5-6.
97
Id. at *4.
98
Id. at *4-5.
99
Id. at *21-22.
100
Id. at *6.
101
Id. at *26.
102
2012 Survey of State Tax Departments, [19 Spec. Rep.] Multistate Tax Rep. (BNA), No. 4, (Apr. 27, 2012).
103
Id. at S-35.
233
Spring 2013 │ Volume 20 │ Number II
Specifically, Bloomberg BNA asked whether a foreign corporation would have income tax
nexus in the state if six or fewer employees telecommuted from their homes in the state and all of
these employees performed non-solicitation activities. Respondents were asked to assume that the
foreign company engaged in no activity in the state apart from the employment of these
telecommuters and activities that are protected by P.L. 86-272.104
Forty-two jurisdictions responded to the question, including 40 states, the District of Columbia,
and New York City. Of the 42 respondents, 35 reported that having six or fewer employees who
telecommute from their homes in the jurisdiction and who all perform non-solicitation activities
would create nexus for an out-of-state business. Consistent with the rulings in Telebright and
Warwick McKinley, New Jersey and California were among them.105
States were also asked to indicate whether they “would reach a different answer if the
corporation made no sales in [the] state or if the employees telecommute for only part of their total
work time.”106 Sixteen states responded affirmatively to both parts of this additional question,
asserting expressly that a few telecommuters would create nexus even if the company had no in-state
sales or the employees telecommuted only part-time.107
Notably, New Jersey’s response was incomplete. Citing the Tax Court’s opinion in Telebright
(where the Maryland company had a telecommuter but no sales in New Jersey), New Jersey reported
that six or fewer telecommuters performing non-solicitation activities would create nexus in New
Jersey even if the foreign company made no sales there. However, the state was silent on the subject
of whether nexus would be established if the employees telecommuted for only part of their total
work time.108 This silence strengthens the hypothesis that the New Jersey Appellate Division –
which repeatedly described the telecommuter in Telebright as a “full-time” employee – might not
have found that the company had nexus if the case had involved a part-time telecommuter.109
The results of the Bloomberg BNA survey appear to reflect a trend among states to treat
telework as a basis for income tax nexus: a majority of all states said the employment of just one
telecommuter who does not solicit sales would create nexus for a foreign company, and over 40
percent of that majority said there would still be nexus even if the company made no sales in the state
or the employee telecommuted only part-time. Nonetheless, Bloomberg BNA cautioned readers
about the limits of the survey results:
[The] annual survey offers insights for practitioners who must gauge whether a
corporation’s activities within a state could result in a tax assessment. Because
guidance, in the form of case law or statutes setting forth the types of activities
that trigger nexus and taxability, is lacking in many states, this survey fills in
essential details. However, because nexus determinations are fact-specific and
104
Id. at S-64 n.8, S-235, S-238.
105
Id. at S-64 to S-66.
106
Id. at S-238.
107
Id. at S-64 to S-66.
108
Id. at S-65 n.41.
109
See discussion supra Part III-B-I.
234
Media Law & Policy
subject to interpretation, the states’ answers should not be relied upon as
definitive policy statements.110
Indeed, in the 2013 survey, due to be published in April, 2013, Bloomberg BNA has inquired
more extensively about the factors that may influence a state’s position on whether telework is a
basis for income tax nexus:
The questionnaire for the survey that will be published in April [2013] asks
revenue officials to provide more details regarding issues such as … [t]he
income tax nexus consequences of telecommuting. For years, most states have
indicated that income tax nexus will result for an out-of-state corporation with
an employee that telecommutes from within the state’s borders. This year, we’re
asking these states if they would reach the same determination if the employee
[were] performing back-office administrative functions such as payroll.111
Thus, the appearance of a trend notwithstanding, companies considering whether to
authorize an employee to telecommute from out-of-state need to consider how the tax
authorities –and courts – in the telecommuter’s home state would view not telework in
general, but the particular telework arrangement the company is contemplating.
4. The Impact of Treating Telework as a Basis for Nexus
a. Impact of the Nexus Policy on the Growth of Telework
State policies that treat a foreign company’s employment of a limited number of in-state
telecommuters as a basis for nexus can have two somewhat contradictory effects: they can promote
telework as well as discourage it. This section will discuss both the positive and negative impact such
policies can have on telework’s growth.
i. How Treating Telework as a Basis for Nexus Promotes Telework
Telework has long been misperceived either as a dispensable perk that thriving businesses can
offer their workers or a special accommodation that an employer might make for a favored
employee. Similarly, telecommuters and would-be telecommuters have long battled the
preconception of managers that, on their telework days, employees are more likely to watch
television or play with their children than to work. However, when a state asserts that a
telecommuter’s work at home in the state constitutes sufficient business activity on the part of her
out-of-state employer to justify subjecting the company to tax, the state validates telework as real
work, a business practice that is profitable for corporations as well as employees.
The two opinions in the Telebright case underscore this point. For example, the New Jersey
Tax Court made clear that a foreign company’s employment of a telecommuter in New Jersey is a
form of interstate commerce that benefits the company.112 Discussing whether Telebright’s
110
2012 Survey of State Tax Departments, supra note 102, at S-9.
111
State Tax Snapshot: 2013 BBNA State Tax Department Survey to Cover Additional Topics, STATE TAX BLOG (Oct. 15, 2012),
http://www.bna.com/state-tax-snapshot-b17179870231/.
112
Nicole Belson Goluboff, As White House Seeks to Promote Telecommuting, States Are Raising Barriers Through
Counterproductive Tax Policies, 17 Multistate Tax Rep. (BNA) No. 7, at 369, 374 (Jul. 23, 2010).
235
Spring 2013 │ Volume 20 │ Number II
employment of Ms. Thirumalai satisfied the substantial nexus requirement of the Commerce Clause,
the Court said,
Telebright regularly enjoys the benefits of New Jersey’s labor market through
the employment of Ms. Thirumalai. When Ms. Thirumalai moved to New
Jersey[,] she became part of the talent available to employers in this State.
Telebright decided, presumably for business reasons, that Ms. Thirumalai is
valuable enough as an employee to warrant granting her permission to work
from home despite her relocation to New Jersey.113
Similarly, the Court made clear that Ms. Thirumalai’s days at home were true work days.114
Discussing whether Telebright was “doing business” within the meaning of New Jersey’s tax law, the
Court said,
It is the location at which [the employee] receives her assignments, performs her
responsibilities and delivers her work product for Telebright that controls
application of the [Corporation Business Tax] Act…. From a substantive
perspective, it is not relevant that she works in the same building in which she
resides.115
The Appellate Division shared the Tax Court’s view that Ms. Thirumalai’s telework days were
genuine work days. Discussing whether subjecting Telebright to tax was consistent with the Due
Process Clause, the Court explained that New Jersey was “imposing the tax because [Telebright’s
employee] performs work for Telebright on a full-time basis in this State.”116 Similarly, in its
discussion of whether the tax satisfied the substantial nexus requirement of the Commerce Clause,
the Court said, “The fact that Telebright’s full-time employee works from a home office rather than
one owned by Telebright is immaterial for purposes of [the substantial nexus analysis.] She is
producing a portion of the company’s web-based product here….”117
Thus, both courts recognized telework as commercial activity intended to serve the financial
interests of the company. In so doing, both helped to erode stubborn myths about telework that have
long stifled adoption of the practice.
ii. How Treating Telework as a Basis for Nexus Deters Telework
Despite the New Jersey courts’ well-informed understanding of telework, the conclusion they
reached as a result of that understanding – that a single telecommuter in the state established income
tax nexus for her out-of-state employer – can easily discourage other companies outside New Jersey
from offering telework opportunities to New Jersey residents. A firm with a veteran employee who is
forced to relocate to New Jersey for personal reasons may want, as Telebright did, to use telework to
retain that employee. But, in the wake of Telebright, it will likely decide that it must let the employee
go to avoid income tax exposure in New Jersey. Similarly, a company trying to recruit a uniquely
113
Telebright Corp., 25 N.J. Tax at 350 (emphasis added).
114
Goluboff, supra note 112.
115
Telebright Corp., 25 N.J. Tax at 347.
116
Telebright Corp. v. Director, 424 N.J. Super. at 392 (emphasis added).
117
Id. at 395 (emphasis added).
236
Media Law & Policy
qualified candidate in New Jersey – someone who would need to telecommute to accept the position
– may decide not to extend the job offer because of the corporate tax risk.
As a practical matter, treating the presence of a limited number of in-state telecommuters as a
basis for income tax nexus is much more likely to discourage telework than to promote it. States
weighing whether to adopt or retain such a nexus policy should consider the significant harm this
deterrent can cause. Workers, businesses, and even the states applying the nexus policy can suffer.
b. Impact of the Nexus Policy on Workers
Just like the convenience of the employer rule, the nexus policy articulated in Telebright harms
workers by restricting telework opportunities. It harms both workers who have jobs and workers who
have lost their jobs.
A worker who is currently employed and needs to start telecommuting from his out-of-state
home will not be able to do so if his employer does not want to risk tax liability in the worker’s home
state. For some employees denied the opportunity to telework, the consequences may include budgetstraining fuel or transit expenses, harrowing work/family conflicts, excessive fatigue from lengthy
commutes on congested roads or rails, and suboptimal productivity. For other employees denied
telework, the consequence may be unemployment: workers who must relocate to a distant state for
personal reasons, nonresident workers who become obligated to care for chronically ill or aging
family members, or nonresident workers who are struck with a long-term injury or illness themselves
may be forced to leave their jobs because interstate telework is not an option.
Similarly, employees who have been laid off and need the option of telecommuting to expand
the region where they can look for new work will not have that option if companies in other states
cannot abide the tax risk of hiring them as telecommuters. By shrinking the pool of businesses to
which unemployed Americans can apply, the nexus policy can prolong their unemployment.
c. Impact of the Nexus Policy on Businesses
Also like the convenience of the employer rule, a Telebright-type nexus policy harms
businesses. The businesses that suffer include both companies outside the state asserting nexus and
companies within that state.
The nexus policy harms foreign companies that want to employ telecommuters in the state by
forcing those companies to forego telework opportunities. These businesses may lose valued
employees or desired recruits who cannot make a daily commute to the firm. They may lose the costsavings, productivity increases, and emergency preparedness benefits that a widely distributed
workforce offers.
The nexus policy harms businesses inside the state asserting nexus as well, by threatening their
sales. As noted in Section III-B-4(b), when foreign companies are discouraged from employing the
state’s residents, unemployed residents may remain unemployed for a needlessly long time. And, as
noted in the discussion concerning the harmful effects of the convenience rule, when residents are
unemployed for an extended period, they lose buying power.118 Thus, they spend less money in the
state’s stores, recreational facilities, and other businesses, and the health of those businesses is
endangered.
118
See discussion supra Part III-A-3(c).
237
Spring 2013 │ Volume 20 │ Number II
d. Impact of the Nexus Policy on States
When the residents of the state asserting nexus cannot use telework to look outside the state for
work – and they remain unemployed for significant stretches of time – they generate less personal
income tax revenue for the state. And, as noted in the discussion of the convenience rule,119 when
their prolonged unemployment causes losses for the state’s businesses, the state can lose both sales
tax revenue and business income tax revenue.
Thus, while states may decide to treat telework as a basis for nexus in order to increase their
revenue, the strategy may very well backfire. Certainly states shrewd enough to recognize interstate
telework as commercial activity profitable to both businesses and workers should reject a nexus
policy that discourages the practice. But all states should reject such a policy. They should, instead,
adopt incentives for out-of-state companies to hire their residents to telecommute; states should make
it, not only effortless, but enticing for businesses nationwide to offer jobs to their residents on terms
that do not require those residents to abandon the state.120
IV. CONCLUSION
Given the profound challenges facing our nation that broadband-enabled telework can help
address – including intractable unemployment, steep government deficits, a dangerous oil addiction,
and inadequate transportation choices – workers and businesses should be encouraged to adopt the
practice. State tax policies that frustrate increased use of telework are grossly misguided.
The convenience of the employer rule, which threatens workers with double or excessive
taxation for telecommuting from one state to another, subverts the financial goals of businesses and
states as well as individuals. It also generates tremendous confusion for workers and corporations
trying to meet their tax obligations. The Telecommuter Tax Fairness Act, proposed federal legislation
that would abolish the rule, is a common sense solution. It would remove a powerful deterrent to
telework and simplify tax compliance considerably. Congressional lawmakers should reintroduce and
finally enact this long overdue measure.
The state policy of subjecting a foreign company to an income-based tax when the
company’s sole connection to the state is its employment of a small number of in-state
telecommuters is similarly destructive for individuals, businesses, and the very states imposing the
tax. Although this nexus policy reflects an enlightened understanding of telework as a business
management tool that is gainful for employers and employees alike, states maintaining the policy
apply this progressive understanding to achieve a backward result: the policies discourage out-ofstate companies from using telework to boost in-state employment. The wiser course would be to
create incentives for such companies to do so.
State taxes that impede interstate telework dim the promise of broadband. For this reason,
broadband advocates should urge Congress to enact the Telecommuter Tax Fairness Act. They
should also prevail upon states to reject nexus policies that deter companies from hiring broadband
commuters.
119
120
Id.
Goluboff, supra note 112, at 375.
238
Media Law & Policy
TECHNOLOGY LAW IN THE DIGITAL AGE: CURRENT DEVELOPMENTS
*
Richard Raysman
I. INTRODUCTION
The secure establishment, in business and personal use, of the Internet and other modes of
accessing information in digital form has raised novel and complex legal issues for today's
technology and intellectual property lawyers. The fast pace of this "information highway" stands in
stark contrast to the traditional landscape of commercial transactional and intellectual property law.
Many existing laws were not designed to deal with a technology that disseminates information at the
speed, with the convenience, and to the mass audience now possible in the modern information age.
Just as the number of Internet and wireless device users continues to multiply, the number of legal
issues of first impression continues to make technology law an exciting and engaging area of
practice.
The information technology industry is constantly changing, and its evolution continues apace.
New data and media formats, new applications and services, and new methods to access and store
data are constantly introduced into the business and consumer markets. It is not only important for
the technology law attorney to keep abreast of these changes, but also of the changes in the law. As
such, this article provides a concise resource of some of the latest legal developments in technology
law, data security and privacy, and e-commerce and licensing.1
II. SOCIAL NETWORKS AND ONLINE ADVERTISING
In recent years, online social network websites have received a fair amount of media coverage.
The attention has not only concerned their rapid growth and enormous popularity, but also, and
perhaps more importantly, has focused on the novel privacy issues that have emerged vis-à-vis the
websites and their members, as well as what party should be responsible for the posting of offensive
or infringing content or for offsite harms that result from social network interactions.
Broadly speaking, an online social network is a structure that allows its members to share
personal information and enables personal contacts through a website or other Internet portal.
Member pages of "core" social network websites usually contain information and audio and visual
content of a personal nature, though such information may vary widely among individual users.
Other interactive websites that allow for the viewing and sharing of media or bring together a
community of like-minded users often contain social networking features. Often, this data includes
the age, gender and personal interests and hobbies of the individual and is shared with others whom
the member determines to be “friends.”
*
Partner at Holland & Knight LLP. B.S., MIT (1968); J.D., Brooklyn Law School (1973).
1
For a more thorough discussion and consideration of these issues, please refer to Computer Law: Drafting and Negotiating
Forms and Agreements, co-authored by Richard Raysman and Peter Brown (Law Journal Press 1984-2012), Intellectual Property
Licensing: Forms and Analysis (Law Journal Press 1999-2012), co-authored by Richard Raysman, Edward A. Pisacreta,
Kenneth A. Adler and Seth H. Ostrow, and Emerging Technologies and the Law: Forms & Analysis (Law Journal Press 19942012), co-authored by Richard Raysman, Peter Brown, Jeffrey D. Neuburger and William E. Bandon, III. For a compendium of
recent articles and alerts that discuss technology law issues in greater depth, please visit www.hklaw.com and the Digital
Technology & E-Commerce Blog.
239
Spring 2013 │ Volume 20 │ Number II
In some instances, the social network websites themselves have used this data in connection
with marketers, albeit in different ways. In turn, this “sharing” has not only stoked the resentment of
some social networking members and privacy advocates, but also has drawn the attention of the
Federal Trade Commission (FTC), particularly with respect to online behavioral advertising. The
FTC defines online behavioral advertising as the tracking of consumers’ online activities in order to
deliver tailored advertising. The agency notes that in many cases, the information collected is not
personally identifiable in the traditional sense – that is, the information does not include the
consumer’s name, physical address, or similar identifier – rather, businesses generally use “cookies”
to track consumers’ activities and associate those activities with a particular computer or device.
In response, the FTC staff and industry groups, among others, have released best practices
guides for this nascent advertising model. Indeed, with the proliferation of social networking
websites and the marketing opportunities of behavioral advertising, it is likely that existing privacy
issues will continue to emerge as the online public and the websites themselves determine when
disclosure of personal information or online activities runs counter to users’ expectations, industry
principles, and emerging law.
In December 2010, the FTC issued a preliminary staff report to address the privacy issues
associated with new technologies and business models. The report outlined a proposed framework to
guide policymakers and other stakeholders regarding the best practices for consumer privacy.
Generally speaking, the proposed framework called on companies to build privacy protections into
their business operations, offer simplified choice mechanisms that give consumers more meaningful
control, and increase the transparency of their data practices. In its Final Report in March 2012, the
Commission adopted the staff’s preliminary framework with certain clarifications and revisions.2 The
FTC recommends that Congress consider baseline privacy legislation and the industry implement the
Report's final privacy framework through individual company initiatives and enforceable selfregulation. To the extent the Report's framework goes beyond existing legal requirements, it is not
intended to serve as a template for enforcement actions. Echoing the preliminary report, the FTC
prompts companies to: (1) adopt a “privacy by design” approach by building privacy protections into
their everyday business practices, including providing reasonable security for consumer data,
collecting only the data needed for a specific business purpose, retaining data only as long as
necessary to fulfill that purpose, safely disposing of data no longer being used, and implementing
reasonable procedures to promote data accuracy; (2) offer a simplified choice for businesses and
consumers and give consumers the ability to make decisions about their data at a relevant time and
context, including through a Do Not Track mechanism; and (3) make information collection and use
practices transparent.
The Final Report clarifies at least three important principles from the preliminary report.
First, the FTC addressed concerns about undue burden on small business. The Final Report's privacy
framework applies to “all commercial entities that collect or use consumer data that can be
‘reasonably linked’ to a specific consumer, computer, or other device, unless the entity collects only
2
See FTC REP., PROTECTING CONSUMER PRIVACY IN AN ERA OF RAPID CHANGE: RECOMMENDATIONS FOR BUSINESSES AND
POLICYMAKERS (Mar. 2012), available at http://www.ftc.gov/os/2012/03/120326privacyreport.pdf. See also U.S. DEP’T OF
COMMERCE, INTERNET POLICY TASK FORCE, COMMERCIAL DATA PRIVACY AND INNOVATION IN THE INTERNET ECONOMY: A
DYNAMIC POLICY FRAMEWORK (Dec. 2010) (stating that diminished trust in data privacy may impede innovative and productive
uses of new technologies, such as cloud computing systems, and stressed the need to enlist the expertise of the private technology
sector and consult existing best practices to create voluntary codes of conduct that promote informed consent and safeguard
consumer information).
240
Media Law & Policy
non-sensitive data from fewer than 5,000 consumers per year and does not share the data with third
parties.” Notably, the framework applies in all commercial contexts, both online and offline. As to
the definition of “reasonably linked,” the Final Report clarifies that data is not “reasonably linkable”
to the extent that a company: (1) takes reasonable measures to ensure that the data is de-identified;
(2) publicly commits not to try to re-identify the data; and (3) contractually prohibits downstream
recipients from trying to re-identify the data. Second, the FTC revised its approach to how
companies should provide consumers with privacy choices. The preliminary report had set forth a list
of five categories of “commonly accepted” information collection practices for which companies
need not provide consumers with choice (product fulfillment, internal operations, fraud prevention,
legal compliance and public purpose, and first-party marketing). Under the Final Report, the
Commission set forth a modified approach that focuses on the context of the consumer’s interaction
with the business. Under this approach, companies would not need to provide choice before
collecting and using consumers’ data for “practices that are consistent with the context of the
transaction, consistent with the company’s relationship with the consumer, or as required or
specifically authorized by law.” Although many of the “commonly accepted practices” previously
identified in the preliminary report would generally meet this standard, there may be exceptions. For
data collection practices requiring choice, the agency stated that companies should offer the choice at
a time and in a context in which the consumer is making a decision about his or her data. Moreover,
the Report stated that companies should obtain affirmative express consent before (1) using
consumer data in a materially different manner than claimed when the data was collected; or (2)
collecting sensitive data for certain purposes. Third, the FTC recommends that Congress consider
enacting targeted legislation to provide greater transparency for, and control over, the practices of
information brokers. The agency also called on Congress to enact legislation addressing data
security.
Last, the Final Report announced that the agency would focus its future policymaking efforts
on five main privacy items: (1) Do Not Track: The FTC summarized current industry efforts on this
front, but stressed that it would continue to work with these groups to complete implementation of an
easy-to use, persistent, and effective Do Not Track system; (2) Mobile Privacy: The Report calls on
mobile service companies to establish standards that address data collection, transfer, use, and
disposal, particularly for location data; (3) Data Brokers: To address the issue of transparency and
consumer control over data brokers’ collection and use of consumer information, the FTC stated that
it supports targeted legislation that would provide consumers with access to information about them
held by a data broker. The agency also advocated the creation of a centralized website where data
brokers could detail the access rights and other choices regarding consumer data; (4) Large Platform
Providers: The Report reemphasizes that large platforms (e.g., ISPs, operating systems, browsers,
and social media) that seek to comprehensively track consumers’ online activities raise heightened
privacy concerns; and (5) Promoting Enforceable Self-Regulatory Codes: The FTC will continue to
facilitate the development of industry-specific codes of conduct and will use the FTC Act to take
action against companies that engage in unfair or deceptive practices, including the failure to abide
by self-regulatory programs they join.
In January 2010, the Financial Industry Regulatory Authority (FINRA), the independent
regulator for securities firms doing business in the United States, issued Regulatory Notice 10-06, a
guidance to securities firms and brokers regarding the use of social networking websites for business
241
Spring 2013 │ Volume 20 │ Number II
purposes.3 Among its key provisions: (1) Recordkeeping Responsibilities: "Every firm that intends to
communicate, or permit its associated persons to communicate, through social media websites must
first ensure that it can retain records of those communications" as required by law; (2) Suitability
Responsibilities: Regarding recommendations of specific investment products, the Notice urges firms
to adopt specific policies, namely, prohibiting recommendations through social media websites
without approval of a registered principal, or in the alternative, maintaining a database of
recommendations previously approved by a registered principal that can be accessed by personnel;
(3) Interactive Forums: Real-time interactive communications from a blog or social network page
do not require such approval from a principal prior to posting, yet would require that the firm have in
place adequate supervisory procedures to minimize compliance risks, such as lexicon-based or
random reviews of such interactive electronic communications; (4) Social Media Restrictions:
Generally speaking, the Notice requires firms to adopt procedures to ensure that personnel using
social media websites are adequately supervised and trained; (5) Third-Party Content: FINRA does
not deem third-party posts as a firm's public communication subject to approval, content, and filing
requirements. However, the FINRA Notice states that third-party content might be ascribed to the
firm if the firm is “entangled” with the preparation of the content or has “adopted” or implicitly or
explicitly endorsed the third-party content.
In July 2009, leading industry associations developed a set of consumer protection principles
for online behavioral advertising, meant to correspond with the FTC Staff Report on the issue.4 The
industry's Self-Regulatory Program is broken down into seven principles, which propose that
participating organizations and websites, among other things, clearly disclose data collection and use
practices with links and disclosures on the Web page where the advertisement appears; permit
consumers to choose whether or not their data will be collected, used, or transferred to another entity
for behavioral advertising purposes; prohibit service providers from collecting data for behavioral
advertising purposes without affirmative consumer consent; adopt reasonable security practices and
limit data retention; obtain consent when making material changes to its data collection practices that
results in more data collection; and make special considerations for sensitive data, including not
collecting financial account numbers, Social Security numbers, pharmaceutical prescriptions, or
medical records for behavioral advertising purposes without consumer consent.
The Working Party, an independent European advisory body on data protection and privacy,
issued an Opinion informing social network websites on how they can work to comply with the EU
data protection law, including the 1995 Data Protection Directive (95/46/EC) (Directive).5 The
Opinion notes that social network website providers and, in many cases, third party application
providers, are data controllers under the Directive because they provide the means for the processing
of user data and undertake the basic service of user management (e.g. registration and deletion of
accounts). The Opinion makes clear that websites should maintain appropriate technical safeguards
to prevent unauthorized access of users' information and make available to users easy-to-use default
3
FINRA REGULATORY NOTICE 10-6, SOCIAL MEDIA WEBSITES: (Jan. 2010), available at http://www.finra.org/web/
groups/industry/@ip/@reg/@notice/documents/notices/p120779.pdf.
4
AM. ASS’N OF ADVER. AGENCIES ET AL., SELF REGULATORY PRINCIPLES FOR ONLINE BEHAVIORAL ADVERTISING (2009),
available at http://www.iab.net/media/file/ven-principles-07-01-09.pdf.
5
Article 29 Data Protection Working Party, Opinion 5/2009 on online social networking (June 12, 2009), available at
http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2009/wp163_en.pdf.
242
Media Law & Policy
settings to restrict access to users' personal information beyond their desired contacts. Regarding the
use of information, the Opinion states that websites should inform users of the different purposes for
which they process personal data, including using members' data for marketing functions, the sharing
of data with third-parties and the use of users' sensitive data. The Opinion also states that personal
data of users should be removed as soon as their accounts are deleted and that inactive accounts
should no longer be visible to the outside world.
In Facebook, Inc. v. Power Ventures, Inc., the Northern District of California looked at
whether a social network profile aggregating service may be liable for copyright infringement for
gaining consent from users to make copies of their social network profile pages and then "scraping"
the data from the social network for use on its own website.6 The court denied the defendant's
motion to dismiss, rejecting the defendant's argument that no infringement was possible because the
profile user pages were not protected by copyright and the social network website did not hold any
rights to user content. The court conceded that the defendant correctly asserted that the social
network website did not have a copyright on the user content the defendant sought, but found that if
the defendant first had to make a copy of a user’s entire profile page in order to collect that user
content, such action might violate the website's terms of use, citing Ticketmaster L.L.C. v. RMG
Techs, Inc.7 The court also refused to dismiss the “indirect” copyright infringement claims, finding
that the defendant's inducement of users to exceed their authorized usage and thereby allow the
defendant to make copies of their profile pages may support a contributory claim. The court also let
stand the social network's Digital Millennium Copyright Act (DMCA) claims for the defendant's
automated activities that allegedly circumvented certain anti-scraping technological measures on the
website that were designed to protect copyrighted content.
In further proceedings, the court granted the plaintiff's motion for summary judgment on its
CAN-SPAM and Computer Fraud and Abuse Act (CFAA) claims.8 The court rejected the
defendant's argument that because Facebook's own servers sent the commercial e-mails at issue, the
defendants did not “initiate” the e-mails as a matter of law. The court found that although Facebook
servers did automatically send the emails at the instruction of the defendant's software, it was clear
that the defendants’ actions – in creating a friend referral promotion with monetary incentives,
importing users’ friends to the guest list, and authoring the e-mail text – served to “originate” the emails as is required by the CAN-SPAM Act. Regarding the CFAA claim, the court found that the
defendant circumvented technical barriers to access Facebook website, and thus accessed the website
“without authorization” and that the plaintiff established that its losses exceeded the $5,000 CFAA
threshold by offering evidence of the IT costs of attempting to thwart the unauthorized access into its
network.
In Pietrylo v. Hillstone Restaurant Group, a jury found that an employer violated federal and
state computer privacy laws, and was liable for back pay and damages for terminating two employees
6
Facebook, Inc. v. Power Ventures, Inc., 2009 WL 1299698 (N.D. Cal. May 11, 2009). In further proceedings the court found
denied the plaintiff's motion on the pleadings on its state law computer fraud claim, finding that the defendant did not act
“without permission” within the meaning of Section 502 of the statute when Facebook account holders utilized the defendant's
website to access and manipulate their user content on Facebook, even if such action violated Facebook’s Terms of Use.
However, the court ruled that to the extent that the plaintiff can prove that in doing so, the defendant Power circumvented
Facebook’s technical barriers, the defendant may be held liable for violation of Section 502. See Facebook, Inc. v. Power
Ventures, Inc., 2010 WL 3291750 (N.D. Cal. July 20, 2010).
7
8
507 F. Supp. 2d 1096 (C.D. Cal. 2007).
Facebook, Inc. v. Power Ventures, Inc., 844 F.Supp.2d 1025 (N.D. Cal. 2012).
243
Spring 2013 │ Volume 20 │ Number II
after gaining unauthorized access to a private MySpace page that was created by the plaintiffs and
was critical of the company.9 The jury concluded that the company violated the federal Stored
Communications Act and the New Jersey state computer privacy law when a manager asked another
employee, presumably under the duress of maintaining her employment, for the password to the
private MySpace page and then shared its contents with upper management, resulting in the
termination of the plaintiffs. The jury also found that the employer was not liable for invasion of
privacy.
The court in Yath v. Fairview Clincs, N.P. determined that the “publicity” element of a state
law invasion of privacy claim, which required, in part, that the matter be made public by
communicating it to the public at large, was satisfied when private healthcare information was posted
on a publicly accessible social network website for 24 hours.10
In Romano v. Steelcase Inc., the court held that a defendant is entitled to compel production of
the plaintiff's social network data (including current and historical, deleted pages and related
information) based upon a review of the public portions of the plaintiff's social network pages that
allegedly revealed an active lifestyle that conflicted with the plaintiff's injury claims.11 Rejecting the
plaintiff's objections to producing her social network data, the court ruled that the information was
both material and necessary to the defense of this action and that the plaintiff could not hide relevant
information "behind self-regulated privacy settings."
In Moreno v. Hanford Sentinel, Inc., the court held that the author of an article posted to a
social network website cannot state a cause of action for invasion of privacy against the person who
submitted that article to a newspaper for republication.12 However, the court declined to dismiss the
9
Pietrylo v. Hillstone Rest. Group, No. 06-5754 (D. N.J. jury verdict June 16, 2009).
10
Yath v. Fairview Clinics, N.P., 767 N.W.2d 34 (Minn. Ct. App. 2009). See also Arenas v. Shed Media, 881 F.Supp.2d 1181
(C.D. Cal. 2011) (basketball player not likely to succeed on right of publicity claims against reality TV show due to the
availability of a "public interest" defense; plaintiff had made aspects of his personal life a matter of public concern based on his
series of posts to his Twitter account). But see Lalonde v. Lalonde, 2011 WL 832465 (Ky. Ct. App. Feb. 25, 2011) (holding that
under ordinary circumstances, “[t]here is nothing within the law that requires permission when someone takes a picture and posts
it on a Facebook page. There is nothing that requires permission when she [is] ‘tagged’ or identified as a person in those
pictures”).
11
Romano v. Steelcase Inc., 30 Misc.3d 426 (N.Y. Sup. Ct. Suffolk Cty. 2010). See also Thompson v. Autoliv ASP, Inc., 2012
WL 2342928 (D. Nev. June 20, 2012) (plaintiff ordered, with certain restrictions, to upload five years of social media materials
onto external hard drive for inspection; plaintiff’s public Facebook profile provided evidence of the plaintiff’s post-accident
activities and mental state and were relevant to the claims and defenses in the case); Davenport v. State Farm Mutual Auto. Ins.
Co., 2012 WL 555759 (M.D. Fla. Feb. 21, 2012) (finding that defendant's discovery requests for social media access were overly
broad and limited the defendant to discovery of photographs added to any social networking website since the date of the subject
accident that depict the plaintiff, including photos that she posted online or ones in which she was "tagged"; court denied
defendant's request that the plaintiff grant access to all electronic devices used by the plaintiff to access social networks,
commenting that the defendant did not have a generalized right to rummage at will through information that the plaintiff has
limited from public view). But see McCann v. Harleysville Ins. Co. of N.Y., 78 A.D.3d 1524 (N.Y. App. Div., 4th Dept. 2010)
(affirming lower court decision to deny of the defendant's motion to compel a signed authorization for access to the plaintiff's
social network account because defendant "failed to establish a factual predicate with respect to the relevancy of the evidence"
and essentially sought permission to conduct "a fishing expedition into plaintiff's Facebook account"); Tompkins v. Detroit
Metro. Airport, 278 F.R.D. 387 (E.D. Mich. 2012) (declining to allow the defendant to view the plaintiff's entire Facebook
account or all posted photographs, finding that public postings and surveillance photographs that showed the plaintiff holding a
toy dog and pushing a shopping cart did not belie the plaintiff's claims of injury and were not a sufficient predicate showing that
the private Facebook material would be reasonably calculated to lead to the discovery of admissible evidence); Mailhoit v. Home
Depot U.S.A., Inc., 285 F.R.D. 566 (C.D. Cal. 2012) (denying motion to compel social media postings relating to emotional
events or reactions as overly vague, but allows discovery into postings between plaintiff and fellow employees that referenced
her employment or the ongoing litigation).
12
Moreno v. Hanford Sentinel, Inc., 172 Cal.App.4th 1125 (2009).
244
Media Law & Policy
defendant's intentional infliction of emotional distress claim, concluding that it was a question of
fact, since reasonable people might differ on whether the defendant's action were extreme and
outrageous.
In Facebook Inc. v. Wallace, a social network was entitled to a preliminary injunction against
an alleged spammer who accessed user accounts without authorization or through phishing schemes
and allegedly perpetrated a widespread spam and phishing campaign.13
In a formal opinion, the Association of the Bar of the City of New York Committee on
Professional Ethics stated that a lawyer may not attempt to gain access to a social networking website
under false pretenses, either directly or through an agent.14 Rather, a lawyer should rely on discovery
procedures sanctioned by the ethical rules and case law to obtain relevant evidence, such as the
truthful “friending” of unrepresented parties or by using formal discovery devices such as subpoenas
directed to non-parties in possession of information maintained on an individual’s social networking
page.
III. PRIVACY RIGHTS AND DATA SECURITY
There is no comprehensive set of privacy rights or legislation in the United States addressing
the collection, storage, transmission or use of personal information on the Internet or in other
business environments. Instead, privacy has generally been protected by common law and by federal
and state legislation enacted as new technologies develop, to target specific privacy-related issues.
For example, the Electronic Communications Privacy Act (ECPA) is the federal statute that
updated wiretapping laws to include protection for electronic communications, such as emails. The
Act further proscribes the intentional use of the contents of any wire, oral, or electronic
communication, obtained through interception, and allows for both criminal penalties and civil
causes of action for violations of its provisions. Specifically, the ECPA protects “point-to-point”
electronic communications, or communications as they travel through cyberspace. The ECPA
contains two sections: Title 1 amended the Wiretap Act, and Title II created the Stored
Communications Act. Consequently, the ECPA established a two-tier system, creating separate
categories of violations predicated upon whether the electronic communications are accessed while
“in transit” or while “in storage.”
13
Facebook, Inc. v. Wallace, 2009 WL 840391 (N.D. Cal. Mar. 24, 2009). See also Facebook, Inc. v. Fisher, 2011 WL 250395
(N.D. Cal. Jan. 26, 2011) (large default judgment against spammers).
14
Ass'n of the Bar of N.Y.C. Comm. on Prof’l Ethics, Formal Op. 2 (2010) (Obtaining Evidence From Social Networking
Websites). See also NYCLA Comm. on Prof’l Ethics, Formal Op. 743 (2011) (a lawyer may search a prospective or sitting
juror's social networking profile, provided there is no contact or communication with the prospective or sitting juror and the
lawyer does not seek to "friend" jurors, or subscribe to their Twitter accounts, or otherwise contact them; if a lawyer discovers
juror misconduct, he or she must promptly bring such misconduct to the attention of the court, under N.Y. Rules of Professional
Conduct 3.5(d)); San Diego Cty. Bar Ass’n., Legal Ethics Op. 2 (2011) (rules of ethics bar an attorney from making an ex parte
friend request to a represented party because an attorney’s communication to a represented party intended to elicit information
about the subject matter of the representation is impermissible no matter what words are used in the communication; moreover,
an attorney may not send a friend request to an unrepresented witnesses without disclosing the purpose of the request); NY State
Bar Ass'n, Comm. on Prof’l Ethics, Op. 843 (2010) (lawyer representing a client in pending litigation may access the public
pages of another party's social networking website for the purpose of obtaining possible impeachment material for use in the
litigation); The Phila. Bar Ass’n Prof’l. Guidance Comm., Op. 2 (2009) (act of hiring an investigator to mislead a potential
witness by becoming social network "friends" with the witness in order to obtain access to personal pages for future impeachment
was deemed a violation of ethical rules); Carino v. Muenzen, 2010 WL 3448071 (N.J. Super. A.D. Aug. 30, 2010) (unpublished)
(searching prospective jurors in the courtroom is permissible).
245
Spring 2013 │ Volume 20 │ Number II
Although many privacy laws address the government's use of personal information, many
others address the use of personal information by private entities, whether it be financial, medical, or
sensitive consumer information, commercial messages sent via email, facsimile or SMS, or electronic
data intercepted during transmission or improperly accessed from data storage. Moreover, federal
and state data security laws that impact electronic privacy concerns have recently been enacted to
stem the scourge of malicious software and identity theft, and at least 46 states have passed some
form of a data security breach notification law requiring notice in the event of a qualifying data
breach of sensitive consumer information.
Advances in Internet technology have also allowed website operators and advertisers to collect,
compile and distribute personal information about users’ Internet browsing activities, both with and
without the user's consent. Such practices will almost always implicate privacy concerns.
In Patco Constr. Co. v. People's United Bank, the First Circuit held that a bank's security
procedures for a commercial account holder, who was the victim of fraudulent wire transfers, were
not commercially reasonable under UCC Article 4A.15 The appeals court reversed the lower court's
grant of summary judgment to the bank and remanded the case. The court concluded that the bank,
whose security system prompted users logging in to answer challenge questions on any transaction
over $1, increased the risk that such answers would be captured by keyloggers or other malware.
Moreover, the court concluded that the bank's failure to monitor and immediately notify customers of
abnormal transactions that had been flagged by its security software was not commercially
reasonable. The court stated that such collective failures taken as a whole rendered the bank's
security system commercially unreasonable under the UCC. The appeals court also reinstated some
of the plaintiff's common law claims, finding that while Article 4A displaced the plaintiff's
negligence claim, the plaintiff's breach of contract and breach of fiduciary duty were not preempted
by Article 4A because such claims were not inherently inconsistent or in conflict with the plaintiff's
overarching Article 4A claim. However, despite ruling that the bank's security procedures were not
commercially reasonable, the appeals court affirmed the denial of the plaintiff's summary judgment
claim. The court noted several disputed issues of fact surrounding the question of whether the
plaintiff had satisfied its obligations and responsibilities under Article 4A, or at least to the question
of damages.
Users alleging that a social media website disclosed “personally identifiable browsing
histories” and unique identifiers to third-party advertising companies via cookies have standing via
the Stored Communications Act (SCA), but failed to state a cognizable SCA claim on the merits
because LinkedIn was neither acting as a “electronic communication service” (e.g., email provider)
or “remote computing service” (e.g., virtual storage provider) when it disclosed LinkedIn IDs and
URLs of users' viewed pages to third parties.16 The court dismissed the plaintiffs' amended
complaint, including the plaintiffs' common law invasion of privacy claim because they failed to
meet the high standards for the type of invasion that is actionable (i.e., an intrusion that is “highly
15
Patco Constr. Co. v. People's United Bank, 684 F.3d 197 (1st Cir. 2012). See also Experi-Metal, Inc. v. Comerica Bank, 2011
WL 2433383 (E.D. Mich. June 13, 2011) (genuine issue of material fact as to whether the defendant bank accepted in "good
faith" fraudulent wire transfers initiated by unknown phishers in the plaintiff's name); Choice Escrow and Land Title, LLC v.
BancorpSouth Bank, No. 10-03531 (W.D. Mo. order denying motion regarding sufficiency of plaintiff’s responses at deposition
Aug. 20, 2012) (in a dispute between a customer and bank over unauthorized ACH wire transfers, UCC Article 4A preempts
indemnity provision whereby the customer agreed to indemnify the bank for any losses, costs, liabilities, or expenses).
16
Low v. LinkedIn Corp., 2012 WL 2873847 (N.D. Cal. July 12, 2012).
246
Media Law & Policy
offensive to a reasonable person”). The court also dismissed the plaintiffs' breach of contract claim
because the alleged decrease in the value of plaintiffs’ personal information did not constitute
cognizable contract damages for the purposes of a contract claim.
The Northern District of California held in Keller v. Electronic Arts, Inc. that a former college
athlete may proceed with right of publicity claims against a video game maker that designed a game
with virtual football players to resemble real-life college football athletes because the game maker's
use of the player's image was not sufficiently transformative that the First Amendment would bar his
California right of publicity claims as a matter of law.17 The court stated that the game maker's use
of the player's image was not transformative, because the game presented virtual players that were
nearly identical to their real-life counterparts (i.e. sharing the same jersey numbers, similar physical
characteristics and background information); depicted the plaintiff in the same setting he was known
for, namely, a collegiate football field; and allowed users to download actual team rosters and
players' names into the game. The court distinguished the Eighth Circuit's holding in C.B.C.
Distribution and Marketing v. Major League Baseball Advanced Media,18 which involved a
company's use of player's names and statistics for "fantasy sports" games, concluding that the
defendant's game “does not merely report or publish Plaintiff’s statistics and abilities. On the
contrary, [the defendant] enables the consumer to assume the identity of various student athletes and
compete in simulated college football matches.”
An individual who was the victim of his ex-spouse's installation of keylogging software on his
computer could not bring federal communications privacy or state law negligence claims against the
software maker for his emotional distress and humiliation, the Eastern District of Tennessee held in
Hayes v. SpectorSoft Corp.. The court dismissed the plaintiff’s complaint.19 The court found that the
plaintiff's federal communications privacy claim failed because plaintiff failed to rebut evidence of
the software maker's lack of intent to divulge the plaintiff's private communications and the software
maker's right to expect that its software should be used in accordance with the accompanying
licensing agreement. In addition, the court dismissed the plaintiff’s product liability claim, finding it
noticeably lacking in any suggestion of the kind of injury required by Tennessee law, namely,
personal injury, death, or property damage. The court also deemed the plaintiff's negligence claim
deficient, concluding that no authority suggested that a manufacturer of monitoring software owed a
duty to avoid emotional injury to the victim of the misuse of that software in violation of the
software's licensing agreement.
17
Keller v. Elec. Arts, Inc., 2010 WL 530108 (N.D. Cal. Feb. 8, 2010). But see The Univ. of Ala. Bd. of Trs. v. New Life Art,
Inc., 683 F.3d 1266 (11th Cir. June 11, 2012) (artist's First Amendment interests clearly outweigh whatever consumer confusion
that might exist concerning his paintings depicting University of Alabama football games; Lanham Act claims over the sale of
paintings, prints and calendars that include the University’s football crimson and white uniforms are dismissed); Hart v.
Electronic Arts, Inc., 808 F.Supp.2d 757 (D.N.J. 2011) (finding sufficient elements of the videogame maker's own expression in
the game such that its use of a former college football player's image in a NCAA football videogame was transformative and the
First Amendment barred plaintiff's right of publicity claim); Habush v. Cannon, 2011 WL 2477236 (Wis. Cir. Ct. June 8, 2011)
(attorneys right of publicity claims against a competing law firm that purchased their last names as keywords dismissed because
while the plaintiffs had shown that the keyword purchase was an unauthorized use under the statute, the plaintiff failed to show
that the use was done "unreasonably," given the general nature of competition and the fact that the competing law firm did not
use the plaintiffs' names in the advertisement text, among other things).
18
C.B.C. Distribution and Marketing v. Major League Baseball Advanced Media, 505 F.3d 818, 820-21 (8th Cir. 2007).
19
Hayes v. SpectorSoft Corp., 2009 WL 3713284 (E.D. Tenn. Nov. 3, 2009). But see Klumb v. Goan, 884 F.Supp.2d 644 (E.D.
Tenn. 2012) (finding that "interception" occurs when spyware automatically routes a copy of an email, which is sent through the
internet, back through the internet to a third party's email address when the intended recipient opens the email for the first time).
247
Spring 2013 │ Volume 20 │ Number II
In Markert v. Becker Technical Staffing Inc., the court held that the federal SCA is not violated
simply by reading printouts of emails that were electronically stored at one point; instead, the Act
attaches liability to the accessing of the stored communication without authorization.20 The court
granted the moving defendants' motion to dismiss the SCA claims, as well as state privacy law
intrusion upon seclusion claims. Similar to the reasoning behind the dismissal of the SCA claim, the
court found the plaintiff did not automatically have a cause of action against those who subsequently
viewed his previously private emails. The court stated that once the emails were obtained from the
plaintiff’s personal email, the intrusion upon seclusion was complete and that any cause of action that
the plaintiff had for invasion of privacy would be against the person who initially invaded the privacy
and subsequently disseminated the information.
Zheng v. Yahoo! Inc. held there is no language in the ECPA itself, nor to any statement in the
legislative history indicating Congress intended the statute to apply to activities occurring outside the
United States.21 The court dismissed the plaintiff's federal electronic privacy-related claims
stemming from an alleged disclosure of user information to Chinese authorities. The court also
rejected the plaintiffs’ argument that because the defendant email provider had servers located
around the globe, email communications may have traveled through the defendant's networks in the
United States. The court stated that because the alleged interceptions and disclosures occurred
“locally” within China, the ECPA did not apply, even if the communications, prior to their
interception and disclosure, traveled electronically through a network located in the United States.
According to the District of Connecticut in McLoughlin v. People's United Bank, Inc., theft of
personal consumer data that resulted in a risk of future injury, but no actual misuse of information,
does not represent an ascertainable loss under Connecticut state law.22 While the district court found
that the plaintiff alleged an adequate injury-in-fact for standing purposes, it ultimately granted the
20
Markert v. Becker Technical Staffing, Inc., 2010 WL 1856057 (E.D. Pa. May 7, 2010). See also Van Alstyne v. Elec.
Scriptorium Ltd., 560 F.3d 199 (4th Cir. 2009) (finding that proof of actual damages is a prerequisite to recovering statutory
damages under the Stored Communications Act, though not for an award of either punitive damages or attorney’s fees under the
statute); Worix v. MedAssets Inc., 2012 WL 787210 (N.D. Ill. Mar. 8, 2012) (finding that alleged failure to take steps to protect
database from theft and security breach did not constitute “knowingly divulging” information under the SCA); Thompson v.
Ross, 2010 WL 3896533 (W.D. Pa. Sept. 30, 2010) (unauthorized access of previously received email messages that had been
downloaded by the recipient and saved to the hard drive of a personal laptop computer does not violate the Stored
Communications Act because SCA protection does not extend to emails and messages stored only on a personal computer and
not with an ISP or other electronic communications service); Chasten v. Franklin, 2010 WL 4065606 (N.D. Cal. Oct. 14, 2010)
(Stored Communications Act bars the enforcement of a subpoena directed to an email service provider to obtain the contents of
an account holder's emails, absent the consent of the account holder); In re Beluga Shipping GMBH v. Suzlon Energy, Ltd., 2010
U.S. Dist. LEXIS 104705 (N.D. Cal. Sept. 23, 2010) (SCA prohibits email service from divulging the stored messages of a nonparty witness pursuant to a civil subpoena, absent application of certain statutory exceptions or the account holder's consent);
Fontenot v. Brouillette, No. 10-01053 (S.D. Tex. Feb. 9, 2012) (because email messages were still maintained on the system and
not downloaded or removed from electronic storage, subpoena to service provider seeking plaintiff's personal emails was
quashed); Bower v. Bower, 808 F.Supp.2d 348 (D. Mass. 2011) (court cannot imply an intent to consent to the disclosure of
electronic information from email providers under the SCA based upon the party's default or status as a fugitive). But see Pure
Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC, 759 F.Supp.2d 417 (S.D.N.Y. 2010) (small award of SCA damages
for employer's unauthorized access to ex-employee's private email accounts).
21
Zheng v. Yahoo! Inc., 2009 WL 4430297 (N.D. Cal. Dec. 2, 2009). But see Suzlon Energy Ltd. v. Microsoft Corp., 671 F.3d
726 (9th Cir. 2011) (the protections of the ECPA extend to the contents of communications of foreign citizens; however, “the
Court does not address here whether the ECPA applies to documents stored or acts occurring outside of the United States”).
22
McLoughlin v. People's United Bank, Inc., 2009 WL 2843269 (D. Conn. Aug. 31, 2009). See also FAA v. Cooper, 132 S.Ct.
1441 (2012) (the federal Privacy Act does not unequivocally authorize damages for mental or emotional distress; because
Congress did not speak unequivocally, the Court adopted an interpretation of “actual damages” limited to proven pecuniary
harm).
248
Media Law & Policy
defendant's motion to dismiss the plaintiff's negligence, unfair trade practice and other state law
claims. The court concluded that the plaintiff's alleged injuries were solely the result of a perceived
and speculative risk of future injury that might never occur, unsupported by any allegation of
malfeasance, and as such, could not form a cognizable claim.
In Quon v. Arch Wireless Operating Co., Inc., the Ninth Circuit held that under the SCA, a text
message service is prohibited from disclosing contents of text messages, absent the consent of the
addressee or intended recipient of such communications.23 The appeals court reversed the lower
court's ruling that the text message service permissibly released transcripts of the plaintiff-police
officer's text messages sent and received from his work-issued pager for the purpose of an audit by
his employer. The court also ruled that the government employer had violated the employer's
reasonable expectation of privacy under the Fourth Amendment. The court found that, under the
SCA, the text message service was an “electronic communication service” (i.e., any service which
provides users the ability to send or receive wire or electronic communications). Accordingly, the
text message service was prohibited from releasing the contents of a communication without the
lawful consent of the addressee or intended recipient.
In further proceedings, the Supreme Court granted certiorari on the sole issue of ruling on the
Ninth Circuit's holding that the city employer violated the Fourth Amendment.24 The Court was
reticent to fashion a general principle about electronic privacy around text messages sent or received
by government employees and decided the case on narrower grounds. The Court stated that even
assuming the city employee had a reasonable expectation of privacy in his text messages, the city did
not necessarily violate the Fourth Amendment by obtaining and reviewing the transcripts of the
messages because (1) there were reasonable grounds for suspecting that the search was necessary for
a non-investigatory work-related purpose; (2) the review of the transcripts was an efficient and
expedient way to determine whether the employee's excess usage was due to personal use; and (3)
even if the SCA forbade the cellular phone carrier from turning over the transcripts, it did not follow
that the city's actions were unreasonable under the Fourth Amendment.
In United States v. Weaver, the Central District of Illinois held that under the federal SCA, a
court can compel an ISP to comply with a trial subpoena and produce the contents of a subscriber’s
previously-opened Web-based emails that had not been downloaded onto the subscriber's computer
but remained in online storage and were less than 181 days old.25 The court commented that under §
2703 of the Act, governmental entities must use a warrant to obtain certain types of electronic
communications, but they can access others using only a trial subpoena such as emails less than 181
23
Quon v. Arch Wireless Operating Co., 529 F. 3d 892 (9th Cir. 2008).
24
City of Ontario v. Quon, 130 S.Ct. 2619 (2010).
25
United States v. Weaver, 636 F.Supp.2d 769 (C.D. Ill. 2009). But see United States v. Warshak, 631 F.3d 266 (6th Cir. 2010)
(a subscriber enjoys a reasonable expectation of privacy in the contents of emails that are stored with, or sent or received through,
a commercial ISP and the government may not compel a commercial ISP to turn over the contents of a subscriber’s emails
without first obtaining a warrant based on probable cause); Matter of Historical Cell-Website Information, 809 F.Supp.2d 113
(E.D.N.Y. 2011) (request for 113 days of cumulative cell-website location records for the cell phone of an individual who was
the target of a criminal investigation constitutes a search under the Fourth Amendment); United States v. Jones, 132 S.Ct. 945
(U.S. Jan. 23, 2012) (attachment of a GPS tracking device to an individual’s vehicle, and subsequent use of that device to monitor
the vehicle’s movements on public streets for an extended period, constituted a search within the meaning of the Fourth
Amendment); In re Applications for Search Warrants for Info. Associated with Target Email Address, 2012 WL 4383917 (D.
Kan. Sept. 21, 2012) (Fourth Amendment protects emails stored with, sent to or received from an email service provider;
Government's warrant seeking all emails and online faxes linked to the account deemed overly broad and not particularized).
249
Spring 2013 │ Volume 20 │ Number II
days old, under certain circumstances. The court found that the ISP's Web-based email service held
or maintained subscribers' emails solely to provide customer storage or computer processing
services, and not for the purpose of backup protection (which would have triggered the warrant
requirement), and thus the ISP was required to comply with the government’s subpoena.
The warrantless search of data within a cell phone seized incident to an arrest is prohibited by
the Fourth Amendment when the search is unnecessary for the safety of police officers and there are
no exigent circumstances, according to State v. Smith.26 The Ohio Supreme Court there reversed and
remanded to the trial court for a new trial based upon the trial court's improper admission of the call
records and phone numbers from the defendant's phone. In an issue of first impression, the court
rejected the state's argument that a cell phone is akin to a closed container and subject to search for
the preservation of evidence, concluding that even the more basic models of modern cell phones are
capable of storing a wealth of digitized information wholly unlike any physical object found within a
closed container, giving the individual a privacy interest in the contents that goes beyond the privacy
interest in a simple address book or pager.
In Merritt, Flebotte, Wilson, Webb & Caruso, PLLC v. Hemmings, an employer that removed
all biographical information and links pertaining to departing employees from its website, but did not
take steps to remove the photo files that were stored on an outside server such that an Internet search
engine might return links to some of the deleted biographical pages, was not liable for
misappropriation for a commercial purpose of the employees' image or biographies.27
According to Boring v. Google, Inc., residents’ state privacy claims against a search engine
that offered online “street view” mapping images from their private driveway, including images of
the outside of the plaintiffs' residence, are not cognizable because such conduct would not be highly
offensive to a person of ordinary sensibilities.28 The appeals court affirmed the dismissal of privacy
and negligence claims against the search engine, but reversed the lower court's dismissal of the
plaintiffs’ trespass claim. The court allowed the trespass claim to go forward, because the plaintiffs
alleged that the defendant entered their property without permission, which, if proven, would
constitute a trespass. The court commented that there was no requirement under Pennsylvania law
that damages be pled, either nominal or consequential, in trespass cases, even though “it may well be
26
State v. Smith, 920 N.E.2d 949 (2009). See also United States v. Kirschner, 823 F.Supp.2d 665 (E.D. Mich. 2010) (subpoena
requesting that defendant reveal password to encrypted contents of his computer was deemed testimony and violated the
defendant's right against self-incrimination under the Fifth Amendment). But see United States v. Fricosu, 841 F.Supp.2d 1232
(D. Colo. 2012) (Fifth Amendment is not implicated by requiring production of the unencrypted contents of a criminal
defendant's laptop that had previously been authenticated as the defendant's personal home computer); United States v. Skinner,
690 F.3d 772 (6th Cir. 2012) (criminal suspect did not have a reasonable expectation of privacy in the data emanating from his
pay-as-you-go cell “burner” mobile phone that emanated GPS data revealing its location to police); United States v. FloresLopez, 670 F.3d 803 (7th Cir. 2012) (warrantless search of individual's cell phone as an incident to arrest to ascertain its assigned
telephone number did not violate Fourth Amendment); People v. Diaz, 51 Cal.4th 84 (Cal. 2011) (a warrantless search of the text
message folders of an arrestee's cell phone 90 minutes after being taken into custody was valid as being “incident to a lawful
custodial arrest”); Sitton v. Print Direction, Inc., 718 S.E.2d 532 (Ga. App. 2011) (employer's viewing and printing of
incriminating emails viewable from plaintiff's laptop open on office desk showed plaintiff was impermissibly conducting a
competing business did not constitute computer theft or trespass since it was not done “without authority” and pursuant to the
company's computer usage policy that stated that “[Employer] will ... inspect the contents of computers, voice mail or electronic
mail in the course of an investigation triggered by indications of unacceptable behavior”).
27
Merritt, Flebotte, Wilson, Webb & Caruso, PLLC v. Hemmings, 676 S.E.2d 79 (N.C. Ct. App. 2009).
28
Boring v. Google Inc., 362 Fed.Appx. 273 (3rd Cir. 2010).
250
Media Law & Policy
that, when it comes to proving damages from the alleged trespass, the [plaintiffs] are left to collect
one dollar and whatever sense of vindication that may bring.”
The court in Burnett v. County of Bergen held that a request by a commercial entity for the
bulk release of land title records that contain citizens’ social security numbers must be redacted
before release to protect citizen privacy, with the requestor ordered to pay the redaction and
duplication costs.29 The court found that the twin aims of public access and the protection of personal
information weighed in favor of redacting social security numbers from the requested records before
releasing them. The court limited its holding to the facts of this case, which involved a bulk request
for millions of realty records, spanning decades, containing a substantial number of social security
numbers the requestor did not need, whose dissemination via a centralized computer database would
pose an increased risk of identity theft to countless individuals with no possibility of advance notice
to those individuals and where the request does not further the state Open Public Records Act’s core
aim of transparency in government.
In Pinero v. Jackson Hewitt Tax Service Inc., mere violations of a firm’s written privacy policy
following the alleged mishandling of the disposal of confidential documents cannot form the basis of
a fraudulent inducement action, absent showing of actual damages and heightened factual pleading.30
After the plaintiff filed an amended complaint, the defendants again moved to dismiss, arguing that
the plaintiff failed to plead fraud with the requisite particularity. The court denied the defendant’s
motion, concluding that the plaintiff’s new allegations that delineated nine specific ways the
defendants failed to maintain policies and procedures to protect customer privacy satisfied the
heightened pleading requirements and could form the basis of a claim that the defendant’s alleged
misrepresentation as to its written privacy policy induced the plaintiff to transact business with the
defendant.31
A. Privacy-Related Enforcement Actions
The FTC has taken an active role with respect to protecting privacy rights in connection with
the collection and use of personal information for commercial purposes. Most notably, the FTC has
undertaken enforcement actions against entities that sold information to third parties for commercial
purposes contrary to a website privacy policy, failed to keep consumer information secure, installed
malicious spyware or adware onto unknowing consumers' computers, or violated the federal do-notcall list with an unlawful telemarketing campaign. In addition, federal civil rights laws and the
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, together protect
individuals' rights of nondiscrimination and health information privacy, with enforcement falling
upon the Department of Health and Human Services (HHS) Office for Civil Rights (OCR). In In re
29
Burnett v. County of Bergen, 968 A.2d 1151 (N.J. 2009).
30
Pinero v. Jackson Hewitt Tax Service Inc., 594 F.Supp.2d 710 (E.D. La. 2009). See also Cornelius v. Deluca, No. 10-27 (D.
Idaho Mar. 15, 2011) (non-party, volunteer website moderator's First Amendment right to post anonymously outweighs
plaintiffs’ need for relevant discovery; moderator had an expectation of privacy based on the website's Terms of Service and
Privacy Policy). See generally Lee v. The Picture People Inc., No. 10C-07-002 (Del. Super. Ct. Mar. 19, 2012) (breach of
warranty claims related to sale of photographs cannot be based on company's unrelated website privacy policy).
31
See Pinero, 594 F.Supp.2d at 710. See also Smith v. Trusted Univ. Standards in Electronics Transactions, Inc., 2010 WL
1799456 (D. N.J. May 04, 2010) (plaintiff's alleged reliance on certain online privacy policy provisions allegedly violated by his
ISP could form the basis of a contract action, but the claim failed because the plaintiff did not plead any loss stemming from the
alleged breach).
251
Spring 2013 │ Volume 20 │ Number II
ScanScout, Inc., the court held that an online advertiser agreed to settle FTC charges that it
deceptively claimed that consumers could opt out of receiving targeted ads by changing their browser
settings to block cookies, when in fact, the advertiser used flash cookies that could not be blocked by
browser settings.32 The proposed settlement, among other things, bars misrepresentations about the
company’s data-collection practices, and requires that the advertiser provide a user-friendly
mechanism to allow consumers to opt out of being tracked, including the use of a hyperlinked,
embedded within or immediately next to its targeted display ads, to take consumers to a choice
mechanism where consumers can opt out of receiving targeted ads.
A healthcare insurer agreed to pay a civil fine of $1,500,000 to settle certain HIPAA violations
stemming from the theft of 57 unencrypted computer hard drives that contained the protected health
information of over a million individuals in In re Blue Cross Blue Shield of Tennessee.33 According
to the HHS allegations, the insurer failed to implement appropriate administrative safeguards to
adequately protect data servers remaining at an unused, leased facility by not performing the required
security evaluations and implementing appropriate physical protections as required by the HIPAA
Security Rule. Notably, this was the first enforcement action under the data breach rules mandated
by the Health Information Technology for Economic and Clinical Health Act (“HITECH Act”).
In FTC v. Frostwire LLC, a peer-to-peer file-sharing application developer settled FTC charges
that its software likely would cause consumers to unwittingly expose sensitive personal files stored
on their mobile devices.34 According to the FTC complaint, the mobile file-sharing application was
likely to cause consumers to unwittingly disclose personal files stored on their smartphones and
tablet computers because the application’s default settings were configured such that immediately
upon installation and set-up, it would publicly share users’ files stored on those devices. Among
other things, the settlement bars the developer from using default settings that share consumers’ files
and requires clear and prominent disclosures about file sharing and how to disable it.
A retailer agreed to settle FTC charges that it failed to disclose adequately the scope of
consumers’ personal information it collected via a downloadable software application in In Re Sears
Holdings Mgmt. Co.35 According to the FTC’s administrative complaint, the retailer represented to
consumers that the marketing software, which consumers agreed to download in exchange for a
monetary payment, would track their “online browsing.” The FTC charged that the software
monitored consumers’ online sessions to a greater degree than disclosed by the retailer and that the
extent of the tracking was only recited in a lengthy user license agreement available to consumers at
the end of the multi-step registration process. Under the final consent order, the retailer would stop
collecting data from the consumers who downloaded the software and destroy all data previously
32
ScanScout, Inc., 76 Fed. Reg. 71566 (proposed Nov. 18, 2011). See also United States v. Rental Research Services, Inc., No.
09-00524 (D. Minn. settlement announced Mar. 5, 2009) (consumer reporting agency that failed to properly screen prospective
customers and, as a result, sold multiple credit reports to identity thieves, settled FTC charges that it violated the Fair Credit
Reporting Act); In re Genica Corp., FTC File No. 082 3113 (settlement announcement Feb. 5, 2009) (online computer seller that
collected sensitive information from consumers and allegedly failed to take basic security measures settled FTC charges); United
States v. Central Florida Investments, Inc., No. 09-104 (M.D. Fla. Jan. 20, 2009) (company that called consumers whose phone
numbers were on the Do Not Call Registry without consent or an “established business relationship” settled FTC charges that it
violated the Do Not Call Registry provisions).
33
In re Blue Cross Blue Shield of Tennessee (HHS Settlement announced Mar. 13, 2012).
34
FTC v. Frostwire LLC, No. 11-23643 (S.D. Fla. Stipulated Final Order Oct. 12, 2011).
35
In Re Sears Holdings Mgmt. Co., No. C-4264 (Decision and Order Aug. 31, 2009).
252
Media Law & Policy
collected, as well as prominently disclose the types of data the software will monitor, record, or
transmit in the future prior to installation and separate from any user license agreement.
In In re CVS Caremark Corp., a national pharmacy agreed to settle FTC charges that it failed
to take appropriate security measures to protect the sensitive financial and medical information when
it disposed of pill bottles containing labels bearing sensitive personal information of its customers.36
In a coordinated action by the HHS OCR, the pharmacy agreed to pay $2.25 million and to
implement a robust correction action plan for safeguarding patient information during disposal.
B. Computer Fraud and Abuse Act
Among other things, the CFAA37 prohibits accessing a computer and obtaining information
“without authorization” or by “exceeding authorized access.” The statute lists many different types of
criminal “hacking” conduct punishable by fines or imprisonment. In relevant part, §1030(a)(2)(C)
provides: “[Whoever] intentionally accesses a computer without authorization or exceeds authorized
access and thereby obtains…information from any protected computer if the conduct involved an
interstate or foreign communication…shall be punished,” and in related statutory language,
§1030(a)(4) prohibits similar behavior with an intent to defraud.
The court held in United States v. Nosal that under the criminal provisions of the CFAA, a
departing employee who accessed his employer's databases to help start a competing business did not
“exceed authorized access” of the computer system even if such use of the proprietary materials
violated the employer’s computer use policy.38 The Ninth Circuit, sitting en banc, affirmed the lower
court's dismissal of the criminal CFAA claim and rejected the Government's broad interpretation of
the CFAA that would have “transform[ed] the CFAA from an anti-hacking statute into an expansive
misappropriation statute.” The court held that the language “exceeds authorized access” in the
CFAA is limited to violations of restrictions on “access” to information, and not restrictions on its
“use,” that the statute targets “the unauthorized procurement or alteration of information, not its
misuse or misappropriation.” Clarifying the two-prongs of the CFAA's prohibitions, the court stated:
“‘[W]ithout authorization” would apply to outside hackers (individuals who have no authorized
access to the computer at all) and ‘exceeds authorized access’ would apply to inside hackers
(individuals whose initial access to a computer is authorized but who access unauthorized
information or files).” Construing the criminal statutory language narrowly, the appeals court found
that a broad interpretation of the CFAA would turn minor online dalliances by employees using
company computers into federal crimes and that significant notice problems would arise if criminal
liability turned on the vagaries of corporate computer use polices that are lengthy, opaque, subject to
change and seldom read.
36
In re CVS Caremark Corp., FTC File No. 072 3119 (settlement announced Feb. 18, 2009).
37
18 U.S.C. §1030 (2008).
38
United States v. Nosal, 676 F.3d 854 (9th Cir. 2012). See also WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199
(4th Cir. 2012) (CFAA fails to provide a remedy for misappropriation of trade secrets or violation of a use policy where
authorization has not been rescinded (citing Nosal); based on the ordinary meaning of “authorization,” an employee is authorized
to access a computer when his employer approves or sanctions his admission to that computer and acts "without authorization"
when he gains admission to a computer without approval; similarly, an employee "exceeds authorized access" when he has
approval to access a computer, but uses his access to obtain or alter information that falls outside the bounds of his approved
access; neither of these definitions extends to the improper use of information validly accessed).
253
Spring 2013 │ Volume 20 │ Number II
A misdemeanor violation under the 18 U.S.C. §§ 1030(a)(2)(C) and 1030(c)(2)(A) of the
CFAA upon the conscious violation of a website’s terms of service runs afoul of the void-forvagueness doctrine, because of the absence of minimal guidelines to govern law enforcement and
actual notice deficiencies, according to the decision reached in United States v. Drew.39 The court
granted the defendant's motion for a post-verdict acquittal and vacated her CFAA misdemeanor
conviction. The court commented that the concept of accessing a computer “without authorization”
usually involved a computer hacker, a disloyal employee accessing proprietary files, or an entity in
breach of a contract. Within the breach of contract approach, the court determined that most judges,
in the civil law context, have held that a conscious violation of a website’s terms of service will
render the access unauthorized and/or cause it to exceed authorization. It cannot be considered “a
stretch of the law to hold that the owner of an Internet website has the right to establish the extent to
(and the conditions under) which members of the public will be allowed access,” according to the
court. However, the court stated that individuals of “common intelligence” are arguably not on
notice that a breach of a terms of service contract can become a crime under the CFAA. Notably, the
court reasoned that if a website’s terms of service controls what is “authorized” and what is
“exceeding authorization” – which in turn governs whether an individual’s conduct is criminal or not
– the statute would be unacceptably vague because "it is unclear whether any or all violations of
terms of service will render the access unauthorized, or whether only certain ones will."
Although principally a criminal statute, the CFAA also provides for a private civil right of
action, allowing for awards of damages and injunctive relief in favor of any person who suffers a loss
due to a violation of the act. Although the CFAA was enacted almost 25 years ago, courts continue
to decide how the statute applies to new factual scenarios in a rapidly and ever-changing
computerized world.
According to the Northern District of Illinois in Cassetica Software, Inc. v. Computer Sciences
Corp., the unauthorized downloading of software from a computer system after a licensing
agreement had expired does not satisfy the “damage” element under the CFAA, because the statute
only recognizes damage when the violation causes a diminution in the completeness or usability of
the data on a computer system.40 The court found that the plaintiff failed to allege that the
defendant’s downloads resulted in lost data, the inability to offer downloads to its customers, or that
the downloads affected the availability of the software. The court also found that the plaintiff’s
allegations of “loss” were not cognizable because they were costs that were not related to the
impairment or damage to a computer or computer system.
39
United States v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009). See also United States v. Aleynikov, 737 F.Supp.2d 173 (S.D.N.Y.
2010) (government's argument that defendant, who was authorized to access his employer's trading system source code, violated
the criminal provisions of the CFAA by misappropriating the source code was rejected), reversed by, United Stated v. Aleynikov
676 F.3d 71 (2nd Cir. 2012) (conviction under federal EEA overturned because, among other things, the wrongful uploading of
his employer's proprietary source code did not implicate a system that was “produced for” or “placed in” interstate or foreign
commerce). See generally United States v. Zhang, 2012 WL 1932843 (N.D. Cal. May 29, 2012) (applying the Ninth Circuit's
holding in Nosal, departing employee who misappropriated confidential information in violation of nondisclosure agreement did
not exceed authorized access and was not guilty of CFAA charges; defendant convicted for theft of trade secrets under federal
law); Lee v. PMSI, Inc., 2011 WL 1742028 (M.D. Fla. May 6, 2011) (court rejects employer's CFAA claim against employee
that allegedly engaged in excessive Internet usage and visited social network websites and personal webmail accounts, because,
among other things, the employer failed to allege damage to its computer system; “both the letter and the spirit of the CFAA
convey that the statute is not intended to cover an employee who uses the internet instead of working”).
40
Cassetica Software, Inc. v. Computer Sciences Corp., 2009 WL 1703015 (N.D. Ill. June 18, 2009).
254
Media Law & Policy
In State Analysis Inc. v. American Financial Services Assoc., the Eastern District of Virginia
held that a company that accessed a password-protected proprietary database using the “shared”
password of another entity could be liable for common law trespass and unauthorized access under
the CFAA, while the entity that allowed the company to use its old password may be liable for
trafficking in passwords under the CFAA, but not unauthorized access.41
The Sixth Circuit in Pulte Homes Inc. v. Laborers International Union of North America held
that a company that suffered impairment to its systems and networks due to a union's intentional
campaign to bombard the company with emails and voicemails may proceed with CFAA
transmission claims, which, in part, concern knowingly causing the transmission of information that
causes damage without authorization to a computer.42 The appeals court reversed the lower court's
dismissal of the plaintiff's CFAA transmission claim, finding that the email campaign prevented the
plaintiff's employees from accessing or sending some emails and voicemails, which could be deemed
"damage" under the statute. The court, however, affirmed the dismissal of the plaintiff's CFAA
unauthorized access claims because the union's calls and emails did not enter the plaintiff's networks
"without authorization" since the company used unprotected public communications systems.
Most notably, the CFAA has been used increasingly in civil suits by employers to sue former
employees and their new companies for misappropriation of information from the employer’s
computer system, beyond the standard state causes of action for trade secret misappropriation and
breach of contract. A civil cause of action under the CFAA frequently is pleaded in cases where an
employer is suing a former employee for misappropriation of trade secrets or proprietary
information, where the misappropriation involved some kind of access to or use of the employer's
computer network. However, federal courts disagree in interpreting the term “unauthorized access.”
Under an expansive view, courts have found that an employee’s access was unauthorized after she
engaged in conduct, which could constitute a breach of her duty of loyalty to the company. Taking a
narrower reading of the statute, many courts have found that a departing employee, who copied
proprietary files while still having full access to his employer’s protected computer databases, did not
access information “without authorization” or otherwise “exceed authorized access” under the
CFAA.43
A departing employee who emailed certain company documents to his own personal computer
before departure did not access the computers “without authorization” or in excess of “authorized
access” as required under the CFAA to establish a violation, according to the decision in LVRC
Holdings, LLC v. Brekka.44 The Ninth Circuit affirmed the dismissal of the CFAA claims against the
41
State Analysis Inc. v. American Financial Services Assoc., 621 F. Supp. 2d 309 (E.D. Va. 2009). See also AtPac Inc. v.
Aptitude Solutions Inc., 2010, 730 F.Supp.2d 1174 (E.D.Cal. 2010) (third parties are not always liable under the CFAA for
exploiting a licensee’s violation of its license agreement; rather, such liability is perhaps best applied in situations where the
third-party defendant uses subterfuge-–like using user names and passwords that do not belong to it—to gain access to a
licensor's protected materials on the licensor's own website, computers, or servers).
42
Pulte Homes Inc. v. Laborers Int'l Union of North America, 648 F.3d 295 (6th Cir. 2011).
43
See also Flynn v. Liner Grode Stein Yankelevitz Sunshine Regenstreif & Taylor LLP, 2011 WL 2847712 (D. Nev. July 15,
2011) (no aiding and abetting civil liability does not exist under §1030).
44
LVRC Holdings, LLC v Brekka, 581 F.3d 1127 (9th Cir. 2009). See also ReMedPar Inc. v. AllParts Medical LLC, 683 F.
Supp. 2d 605 (M.D. Tenn. 2010) (CFAA does not extend to situations where the employee's access was technically authorized
but the particular use of the information was not; also, the employer's “loss” at issue (i.e., the misappropriation of trade secret
information) as well as the costs incurred by the employer in its efforts to seek redress for those acts and retain new employees
are not the type of losses covered by the statute because they are unrelated to any interruption in computer service); Lewis-Burke
255
Spring 2013 │ Volume 20 │ Number II
ex-employee. The court found that a person uses a computer “without authorization” when the
person has not received permission to use the computer for any purpose (e.g., a hacker) or when the
employer has rescinded permission to access the computer and the employee thereafter accesses the
company network. In this case, the court concluded that the employee's use of the company
computers to email documents did not violate the CFAA, because he was authorized to access the
company computers during his employment. The court reasoned that there was no language in the
CFAA that supported the proposition that authorization to use a computer ceases when an employee
resolves to use the computer contrary to the employer’s interest. The court declined to follow the
Seventh Circuit decision, International Airport Centers, LLC v. Citrin,45 which held that an employee
acts without authorization under the CFAA when he obtains company information for an improper
purpose.
In TelQuest Int'l Corp. v. Dedicated Business Systems, Inc., the District of New Jersey held
that departing employees who allegedly violated a non-competition employment agreement and used
private customer information to initiate their own business did not violate the CFAA because the
employer failed to allege facts that the damage or loss it incurred was related to investigating or
remedying damage to its computer system.46 The court dismissed the employer's CFAA claims. The
court found that the employer allegations regarding losses related to hiring a computer expert failed
to provide the type of investigation or description of how its computer system was interrupted,
Assocs. LLC v. Widder, 2010 WL 2926161 (D.D.C. July 28, 2010) (following Brekka, an employer's decision to allow or
terminate an employee's authorization is the determining factor as to whether the employee acted with or without authorization;
whether defendant had permission to copy documents onto a thumb drive or to subsequently use the data after he had left the
plaintiff's employ, is not a question that relates to his liability under the CFAA); Orbit One Communications, Inc. v. Numerex
Corp., 692 F. Supp. 2d 373 (S.D.N.Y. 2010) (departing employees had unfettered access to employer's computers prior to leaving
the company and thus plaintiff-employer failed to advance any evidence that the departing employees accessed the plaintiff's
computer system without authorization or exceeded their authorized access in violation of the CFAA); Oce North America Inc. v.
MCS Services Inc., 2010 WL 3703277 (D. Md. Sept. 16, 2010) (ex-employee who allegedly copied printer diagnostic software
from his ex-employer and used it during his work for a competitor did not access the software "without authorization" under the
CFAA; CFAA claims against the employee's new employer were also dismissed because the plaintiff did not allege that the
defendant accessed any “protected computer” without authorization or in excess of that authorization to obtain the plaintiff’s
software); Sebrite Agency, Inc. v. Platt, 884 F.Supp.2d 912 (D. Minn. 2012) (misuse or misappropriation of confidential
information stored on a employer's computer to which the defendant had authority to access does not give rise to liability).
45
Int’l Airport Centers, LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006).
46
TelQuest Int'l Corp. v. Dedicated Business Systems, Inc., 2009 WL 3234226 (D. N.J. Sept. 30, 2009). See also Mintel Int'l
Group Ltd. v. Neergheen, 636 F.Supp.2d 677 (N.D.Ill. 2009) (departing employee's act of copying and emailing electronic files
from his employer's computer database is not enough to satisfy the damage requirement of the CFAA; fees paid to expert to
assess the ex-employee's improper actions are not “losses” under the CFAA because an alleged “loss” must relate to the
investigation or repair of a computer or computer system following a violation that caused impairment or unavailability of data or
interruption of service); Catapult Communications Corp. v. Foster, 165 F.3d 747 (9th Cir. 1999) (alleged losses in the form of
expenses incurred from conducting forensic analysis on defendant’s computer are not compensable losses under the CFAA,
without any evidence that plaintiffs' computers were damaged by defendant’s alleged unauthorized access); M-I LLC v. Stelly,
2010 WL 733 F.Supp.2d 759 (S.D.Tex. 2010) (employer allegations of damages “to its business in the form of lost profits, loss of
customers and loss of future business opportunities” caused by departing employees cannot form a cognizable CFAA claim; “[the
plaintiff] asserts no damages whatsoever relating to their investigation of computer damage, or costs incurred because any
computer service was interrupted”); General Scientific Corp. v. Sheervision, Inc., 2011 WL 3880489 (E.D. Mich. Sept. 2, 2011)
(losses under the CFAA are limited to costs incurred and profits lost as a direct result of interrupted computer service; the
CFAA’s damage requirement is not concerned with sales lost through the use of the information accessed); Schatzki v. Weiser
Capital Management LLC, 2012 WL 2568973 (S.D.N.Y. July 3, 2012) (plaintiffs’ claim inadequate to meet the definition of
damages and losses under the CFAA; the complaint does not allege that the defendant, a former business partner, destroyed or
impaired the plaintiff's proprietary data, nor does it make any specific allegation as to the cost of identifying, securing or
remedying the alleged damage caused by the defendant's access).
256
Media Law & Policy
damaged, or restored. The court also commented that gathering evidence from a computer to prove
state law employment claims does not turn employee conduct–even allegedly disloyal conduct in
breach of contract–into the kind of conduct that violates the CFAA.
As discussed in Vurv Technology LLC v. Kenexa Corp., departing employees who were
authorized to access the information they copied from a company laptop, but allegedly did so for a
wrongful purpose, did not access their employer's computers “without authorization” as required
under the CFAA to establish a violation, notwithstanding the existence of a employment
confidentiality agreement.47 However, the court found that the employer may proceed with CFAA
claims relating to the copying of proprietary information after the defendants left the employment of
the plaintiff.
The costs that would be incurred by examining other parties’ computers – computers onto
which the defendant allegedly copied material taken from the plaintiff's thumb drive – and
permanently deleting any such material found are not cognizable losses under the CFAA that can
satisfy the jurisdictional threshold, according to the decision reached in Doyle v. Taylor.48 The court
granted the defendant's motion for summary judgment on the CFAA claim and declined to exercise
supplemental jurisdiction on the related state claims. The court found that while the act of accessing
another's thumb drive without authorization may fall within the scope of the CFAA, there was no
basis in the record to find that the thumb drive was impaired or that the plaintiff will incur any costs
associated with restoring any interruption of service. The court noted that the CFAA's definitions of
47
Vurv Technology LLC v. Kenexa Corp., 2009 WL 2171042 (N.D. Ga. July 20, 2009). See also Mortgage Now Inc. v. Stone,
2009 WL 4262877 (M.D. Fla. Nov. 24, 2009) (departing employees who allegedly stole proprietary information from their
employer's computers and “scrubbed” their computers’ hard drives to conceal their activity did not violate the CFAA because a
party who is permitted to view proprietary information does not act “without authorization” when he accesses it); Clarity Services
Inc. v. Barney, 698 F.Supp.2d 1309 (M.D.Fla. 2010) (departing employee that checked email and reformatted laptop after
resigning neither accessed the employer's computers “without authorization” nor “exceeded his authorized access”); American
Family Mut. Ins. Co. v. Hollander, 2009 WL 535990 (N.D. Iowa Mar. 3, 2009) (departing employee that reviewed his
employer’s client lists before departure did not access the computers “without authorization” or in excess of “authorized access”
as required under the CFAA to establish a violation); Envtl. Safety Consultants, Inc. v. Allied Safety Consultants Inc., 95 Fed.Cl.
77 (2010) (company's allegations that it suffered damages as a result of an ex-employee's misappropriation of proprietary
information were insufficient to state a claim under the CFAA where the company failed to plead any interruption of computer
service; lost revenue was only recoverable if it was incurred because of an “interruption in service”). But see Musket Corp. v.
Star Fuel of Oklahoma LLC, 2012 WL 3595048 (W.D. Okla. Aug. 21, 2012) (departing employee that downloaded shareware
against company policy and then used it to copy proprietary files for use with his new position at a competitor contrary to a nondisclosure agreement may have exceeded authorized access" under the CFAA); see also Deloitte & Touche LLP v. Carlson, 2011
WL 2923865 (N.D. Ill. July 18, 2011) (CFAA claims may proceed against departing employee who destroyed and replaced hard
drive before returning company-issued laptop to allegedly cover his tracks in wrongfully soliciting a competitor in violation of
employee agreement); LKQ Corp. v. Thrasher, 785 F.Supp.2d 737 (N.D. Ill. 2011) (no allegation that the employer specifically
restricted its employees is necessary to state a CFAA claim against a departing employee who wiped his company laptop before
returning it; the employer's allegation of a breach of duty is enough to allege a lack of authorization); Lasco Foods Inc. v. Hall,
600 F.Supp.2d 1045 (E.D.Mo. 2009) (while a departing employee ordinarily may have been authorized to access the information
appropriated from his employer, that authorization was terminated when the defendant destroyed the agency relationship by
accessing and appropriating the protected information for his own personal gain and contrary to the interest of the employer).
48
Doyle v. Taylor, 2010 WL 2163521 (E.D. Wash. May 24, 2010). See also Intl. Chauffeured Services, Inc. v. Fast Operating
Corp., 2012 WL 1279825 (S.D.N.Y. Apr. 16, 2012) (expenses for monitoring network for future unauthorized activity not a
“loss” under the CFAA; “loss” only encompasses costs to repair and costs associated with investigating the damage). But see
Navistar, Inc. v. New Baltimore Garage, Inc., 2012 WL 4338816 (N.D. Ill. Sept. 20, 2012) (plaintiff can satisfy the requirements
of loss under the CFAA by alleging costs reasonably incurred to respond to an alleged CFAA offense, even if the offense turned
out not to have caused damage to the computer system; using a password to access a copyrighted work, even without
authorization, does not constitute circumvention under the DMCA because it does not involve descrambling, decrypting, or
otherwise bypassing a technological measure).
257
Spring 2013 │ Volume 20 │ Number II
“damages” and “loss” should be strictly construed and that the plaintiff must identify impairment of
or damage to the computer system that was accessed without authorization.
In Ervin & Smith Adver. & Public Relations, Inc. v. Ervin, the court held departing employees
who, against company policy, emailed themselves proprietary data may be liable under CFAA as per
the Seventh Circuit's decision in International Airport Centers LLC v. Citrin.49 The court stated that
while the defendants ordinarily may have been authorized to access the information they
appropriated from the plaintiff, such authorization was terminated when the defendants destroyed the
agency relationship by accessing and appropriating the protected information for their own personal
gain and against the interest of their employer.
Most CFAA claims were dismissed against ex-employees who had initial access to proprietary
information that was allegedly copied from employer’s computer system in US Bioservices Corp. v.
Lugo. However, the court allowed the plaintiff to proceed on those claims that were based upon
violations for exceeding authorized access when defendants allegedly accesses certain information to
which they were not entitled.50
Beyond federal law, a majority of states have enacted computer trespass and fraud statutes that
allow claims for various degrees of unauthorized access and copying, schemes to defraud, and the
unlawful destruction of proprietary data.
The District of Nebraska held in Joseph Oat Holdings Inc. v. RCM Digesters Inc. that an entity
who secretly accessed the servers of its former business partner, copied proprietary files and changed
administrative passwords following the dissolution of the parties’ joint venture violated California
and New Jersey state computer trespass laws.51 The court granted summary judgment on defendant's
computer trespass counterclaims, holding that at the time the plaintiff accessed the defendant's
computer server (which had formerly been used by the joint venture), the server had reverted back to
the property of the defendant because the joint venture had been officially defunct. The court
rejected the plaintiff’s argument that it copied the defendant's files to preserve evidence pursuant to a
litigation hold letter, finding that an adversary’s counsel’s letter regarding the duty to preserve
evidence does not “afford a party carte blanche authority” to secretively copy computer files located
on the adversary’s computer server, even if many of those files on the server had once been property
of that party, and even if that party still had access to those files.
C. Commercial Email and Spam
The CAN-SPAM Act,52 which imposes requirements on those who send commercial email
messages to consumers and establishes civil and criminal penalties for the transmission of unsolicited
commercial electronic mail, or spam, that does not comport with the Act’s requirements, continues to
garner the public’s attention as spam remains a stubborn problem. Essentially, the CAN-SPAM Act
protects consumers by offering them a legal right to “opt out” of future spam. In most situations, it is
not required that a business get permission from a potential recipient before sending commercial
49
Ervin & Smith Adver. & Public Relations, Inc. v. Ervin, 2009 WL 249998 (D. Neb. Feb. 3, 2009).
50
US Bioservices Corp. v. Lugo, 595 F.Supp.2d 1189 (D. Kan. Jan. 21, 2009).
51
Joseph Oat Holdings Inc. v. RCM Digesters, Inc., 665 F. Supp. 2d 448 (D.NJ 2009).
52
15 U.S.C. §7701.
258
Media Law & Policy
email. Still, businesses are not permitted to send commercial emails to those who request to be
removed from the businesses’ lists.
Notably, the Act expressly preempts all state laws to the extent that they address the
permissibility of unsolicited commercial email, except for those that apply “falsity or deception in
any portion of a commercial electronic mail message or information attached thereto.” Courts have
wrestled with the question of what constitutes falsity or deception under the statute, whether
cognizable state claims must be based on the traditional tort theory of common law fraud and deceit,
which usually requires a plaintiff to plead it with particularity, or whether state consumer or antispam laws may survive preemption for regulating something less than fraud. District courts to have
addressed the issue have reached differing results.
The CAN-SPAM Act applies to social networking communications—including internal
messages to users’ walls, “news feeds,” the “home” page of users’ friends, and the Facebook inbox
of users' friends—despite the fact that such electronic messages are not delivered to a traditional
email “inbox.”53 In Facebook, Inc. v. Maxbounty, Inc., the court refused to dismiss the plaintiff's
CAN-SPAM claims against an Internet marketer that had allegedly set up fraudulent fan pages
through its affiliates to draw traffic to outside websites and advertisers through a series of messages
and notifications to Facebook users. The court rejected the defendant's argument that an “electronic
mail message” under the CAN-SPAM Act must be capable of characterization as “email” or must be
directed to a traditional email inbox or address with a local part and domain part (i.e.,
[email protected]).
A provider of free email accounts for a small number of individuals who took no steps to stem
the flow of spam emails does not have standing to pursue claims under the CAN-SPAM Act as a
result of unsolicited commercial email sent to its users, according to Gordon v. Virtumundo, Inc..54
The Ninth Circuit affirmed the lower court's grant of summary judgment to the defendant and also
ruled that the plaintiff's state anti-spam claims were preempted by the CAN-SPAM Act. The court
held that the plaintiff was not a “provider of an Internet access service” who was adversely affected
by a statutory violation, and thus, did not have private standing to bring CAN-SPAM Act claims.
While the court recognized that statutory standing was not limited to traditional ISPs (and included
providers such as social network websites), the court rejected any overly broad interpretation of
“Internet access service” (IAS) that would include an entity that merely provided email accounts and
email access. The court commented that the plaintiff neither had physical control over nor access to
the hardware at issue, which was owned by another provider, and was “troubled” by the extent to
which the plaintiff failed to operate as a “bona fide email provider,” such that the plaintiff
purposefully avoided taking even minimal efforts to avoid or block spam messages and accumulated
53
Facebook, Inc. v. Maxbounty, Inc., 274 F.R.D. 279 (N.D. Cal. 2011).
54
Gordon v. Virtumundo, Inc., 575 F.3d 1040 (9th Cir. 2009). See also Asis Internet Servs. v. Azoogle.com, Inc., 357 Fed.Appx.
112 (9th Cir. 2009) (mere cost of ordinary filtering and carrying spam over plaintiff’s facilities does not constitute a harm as
required by the CAN-SPAM Act; plaintiff did not suffered a harm within the meaning of the statute and lacked standing.), further
proceedings at Asis Internet Servs. v. Optin Global, Inc., 2010 WL 2035327 (N.D. Cal. May 19, 2010) (defendant awarded
attorney's fees in the amount of $806,978.84); Asis Internet Services v. Active Response Group, 2010 WL 519830 (N.D. Cal.
Feb. 9, 2010) (following Virtumundo and Azoogle in dismissing the plaintiff's action for lack of standing because the mere cost of
carrying spam emails over plaintiff’s facilities does not constitute a harm under the CAN-SPAM Act); RJ Prod. Co. v. Nestle
USA, Inc., 2010 WL 1506914 (D.D.C. Apr. 15, 2010) (digital media outsourcing and consulting firm that made no allegations
that it was an Internet access service that suffered any network harms lacked standing under the CAN-SPAM Act); Melaleuca
Inc. v. Hansen, No 07-212 (D. Idaho Sept. 30, 2010) (marketing company that possessed a domain name and also offered email
services through a third party was not a bona fide ISP under the CAN-SPAM Act and lacked standing to pursue a claim).
259
Spring 2013 │ Volume 20 │ Number II
spam through a variety of means for the purpose of facilitating litigation. As to the “adversely
affected” standing requirement, the court stated that the fact that the plaintiff received a large volume
of commercial email was not enough to establish his statutory standing. Rather, the court found that
a plaintiff must plead those types of harms uniquely encountered by IAS providers, that is, network
crashes, higher bandwidth utilization, and increased costs for hardware and software upgrades,
network expansion and additional personnel, such that, in most cases, “evidence of some
combination of operational or technical impairments and related financial costs attributable to
unwanted commercial email would suffice.” Interestingly, the appeals court noted that trial courts
must take a closer look at services that may not be bona fide providers and “be careful to distinguish
the ordinary costs and burdens associated with operating an Internet access service from actual
harm,” and that courts should also expect a legitimate service provider to “secure adequate
bandwidth and storage capacity and take reasonable precautions, such as implementing spam filters,
as part of its normal operations.”
In Ferguson v. Active Response Group, the Ninth Circuit held that an Internet access service
provider that offers free email forwarding services lacks standing under the CAN-SPAM Act because
he was not “adversely affected” by incoming spam when he was forced to switch to a broadband
connection.55 The appeals court affirmed the district court's grant of summary judgment to the
defendant online marketing company because the plaintiff failed to prove more than negligible harm
due to the spam, such as increased costs for server maintenance, network harm, or for customer
service personnel to handle complaints.
Claims under California's deceptive email advertising law are not preempted by the CANSPAM Act.56 Regarding CAN-SPAM Act preemption of state laws, the Asis Internet Services v.
Consumerbargaingiveaways LLC court ruled that “falsity or deception” was not limited just to
common-law fraud and other similar torts such that anti-deception state actions not insisting on every
element of common-law fraud are not preempted.
55
Ferguson v. Active Response Group, 348 Fed. Appx. 255 (9th Cir. 2009). See also Haselton v. Quicken Loans Inc., 2010 WL
1180353 (W.D. Wash. Mar. 23, 2010) (website host that attempted to grow a spam business and did not use any e-mail filtering
programs was not bona fide IAS provider and accordingly lacked standing to pursue a claim under the CAN-SPAM Act; in
addition, the plaintiff did not show it was “adversely affected” by any alleged violation of the CAN-SPAM Act since it suffered
harm, if at all, by its own failure to implement spam reducing measures and its actions to actively seek out such
communications).
56
Asis Internet Services v. Consumerbargaingiveaways LLC, 622 F. Supp. 2d 935 (N.D. Cal. 2009). See also Hypertouch, Inc.
v. Valueclick, Inc., 191 Cal.App.4th 1209 (Cal. App. 2011) (CAN-SPAM Act’s savings clause applies to any state law that
prohibits material falsity or material deception in a commercial e-mail regardless of whether such laws require plaintiff to prove
and plead each and every element of common law fraud; moreover, the application of California's spam statute is not limited to
entities that “send” the offending e-mails nor does it require a plaintiff to establish that defendant had knowledge of such emails); Hoang v. Reunion.com, No. 08-03518 (N.D. Cal. Mar. 31, 2010); Asis Internet Services v. Subscriberbase Inc., 2009 WL
4723338 (N.D. Cal. Dec. 4, 2009); Asis Internet Services v. Member Source Media, LLC, No. 08-1321 (N.D. Cal. Apr. 20, 2010)
(state anti-spam law claims based upon header deficiencies preempted by CAN-SPAM Act; claims based upon deceptive subject
lines not preempted); Ferron v. SubscriberBase Holdings, Inc., 2009 WL 650731 (S.D. Ohio Mar. 11, 2009) (claims stemming
from allegedly deceptive commercial email solicitation brought under state consumer protection statute are not preempted by the
CAN-SPAM Act). But see Hypertouch, Inc. v. Azoogle.com, Inc., 2010 WL 2712217 (9th Cir. July 09, 2010) (unpublished)
(claims under California anti-spam law for commercial email advertisements that contained "falsified," "misrepresented,"
"forged," or misleading information must comply with the Federal Rules of Civil Procedure's heightened pleading standards for
fraud).
260
Media Law & Policy
It is not a violation of Section 17519.5(a)(2) of the California anti-spam law, which prohibits
“falsified or forged header information,” to send commercial email advertisements from multiple,
accurately-registered domain names for the purpose of bypassing spam filters.57
The disclosure of an email address that resulted in the receipt of spam, but no other misuse, is
not sufficient to constitute damage to the plaintiff or sustain breach of contract and fiduciary claims.58
D. Telephone Consumer Protection Act
The Telephone Consumer Protection Act (TCPA) was originally adopted in 1991 to, among
other things, protect the privacy of citizens by restricting the use of telephones for unsolicited
advertising and, more specifically, curb telemarketers from using autodialers to make millions of
unsolicited calls to residential and business telephone numbers, fax machines and cellular telephones.
The TCPA also prohibits the use of any fax machine, computer, or other device to send unsolicited
fax advertisements, absent certain consent requirements.
According to Satterfield v. Simon & Schuster, the transmission of an SMS text message to a
cellular telephone is a “call” within the meaning of the TCPA.59 The Ninth Circuit reversed the
district court's grant of summary judgment to the defendant and remanded the case to determine if the
text message at issue was sent using an “automatic telephone dialing system” as required under the
statute, that is, whether the equipment used for transmission had the “capacity” to both (1) store or
produce numbers to be called using a random or sequential number generator and (2) to dial such
numbers. The court found that the TCPA’s prohibition on certain automated calls to wireless
numbers encompasses both voice calls and SMS text messages, deferring to the FCC's regulations
and interpretation of the Act and the plain meaning of the term “call.” The court reasoned that the
purpose and history of the TCPA indicated that Congress was trying to prohibit the use of automatic
dialers to communicate with others by telephone in an invasive manner, and that a voice message or
a text message were not distinguishable in terms of being an invasion of privacy. The court further
held that while the TCPA exempts those calls “made with the prior express consent of the called
party,” no express consent was given in this case because the plaintiff's consent to receive
promotional material from a third-party marketer and its “affiliates and brands,” cannot be read as
consenting to the receipt of the commercial messages of the defendant, an unrelated entity.
The court in Abbas v. Selling Source, LLC held that an unsolicited, commercial SMS message
is a “call” within the meaning of the TCPA because Congress intended to restrict unsolicited,
automated advertisements and solicitations by telephonic means, which includes text messages.60
57
Kleffman v. Vonage Holdings Corp., 49 Cal.4th 334 (2010).
58
Cherny v. Emigrant Bank, 604 F.Supp.2d 605 (S.D.N.Y. 2009).
59
Satterfield v. Simon & Schuster, 569 F.3d 946 (9th Cir. 2009). See also In re Jiffy Lube Intl., 847 F.Supp.2d 1253 (N.D. Cal.
2012) (advertiser not permitted to avoid TCPA liability merely because it hired a different firm to send text message
advertisements to its customers). But see Thomas v. Taco Bell Corp., 879 F.Supp.2d 1079 (C.D. Cal. 2012) (a party can be held
liable under the TCPA directly if it personally “makes” a call in the method proscribed by the statute, or vicariously, such as, if it
was in an agency relationship with the party that sent the text message; plaintiff failed to present any evidence that defendant
directed or supervised the manner and means of the text message campaign conducted by an association of its franchisees).
60
Abbas v. Selling Source, LLC, 2009 WL 4884471 (N.D. Ill. Dec. 14, 2009). See also Lozano v. Twentieth Century Fox Film
Corp., 702 F. Supp.2d 999 (N.D. Ill. 2010) (promotional text message sent to plaintiff constitutes a “call” for the purposes of the
TCPA; the plain language of the TCPA does not require plaintiff to allege that he was charged for receipt of the text message that
forms the basis for his complaint). But see Ibey v. Taco Bell Corp., 2012 WL 2401972 (S.D. Cal. June 18, 2012) (advertiser's
261
Spring 2013 │ Volume 20 │ Number II
The court denied the defendant's motion to dismiss the defendant's TCPA claims. The court rejected
the defendant's argument that the TCPA was inapplicable because there was no evidence that the
plaintiff was “charged for the call,” concluding that beyond “cost-shifting” concerns, Congress was
just as concerned with consumers’ privacy rights and the nuisances of telemarketing such that a
cellular phone customer need not necessarily be charged for the call to make that call actionable.
The New York Court of Appeals held in Stern v. Bluestone that unsolicited, faxed
“commentaries containing short essays on legal topics in an attorney's field of practice that also list
the sending attorney's law firm name and contact information fit the FCC's framework for an
“informational message.” and are not unlawful "unsolicited advertisements" under the TCPA.61 The
Court of Appeals reversed the lower court's grant of summary judgment to the plaintiff on his TCPA
claims. The court found that the defendant's commentaries, which provided academic legal
information, did not promote a commercial product and to the extent that the defendant devised the
commentaries as a way to advertise his expertise to other attorneys and gain referrals, the faxes
contained at most, “[a]n incidental advertisement of his services, which [did] not convert the entire
communication into an advertisement.”
Certain regulatory violations of the TCPA fall outside the scope of private enforcement
actions.62 The New York court concluded that there was no private right of action for failure on the
part of an automated telemarketing call to identify itself or provide its phone number since the
enforcement of such identification requirements was within the province of state attorneys general
and the FCC, and could not form the basis of a private enforcement action.
E. First Amendment Issues in Digital Content
The First Amendment's freedom of speech and the press provide protection for certain uses of
content on the Internet or in a digital application and can limit rights of publicity in one's name or
likeness for newsworthy and other purposes. Moreover, in certain instances, students and public
employees can be subject to restrictions in the name of school discipline and the objectives of a
public employer.
single, confirmatory text message in response to an opt-out request from plaintiff, who voluntarily had provided his phone
number by sending the initial text message, does not violate the TCPA).
61
Stern v. Bluestone, 12 N.Y.2d 873 (2009). See also Holmes v. Back Doctors, Ltd, 2009 WL 3425961 (S.D. Ill. Oct. 21, 2009)
(faxed newsletter that contained bona fide medical information that changed each month and was sent to specific recipients on a
regular schedule does not constitute an “advertisement” under the TCPA; while the faxes contained some advertising material, “it
is worth noting that the TCPA actually requires the sender of a fax to include its contact information in the fax…and the Court
sees no reason why [defendant's] compliance with the statute should become…the linchpin for finding that [defendant's] faxes
constitute advertising”); Holtzman v. Turza, 2010 WL 3076258 (N.D. Ill. Aug. 3, 2010) (faxed newsletters that contained
editorial and promotional content that were ghostwritten and transmitted on attorney's behalf as part of a paid marketing
campaign were deemed unsolicited advertisements under the TCPA), further proceedings at Holtzman v. Turza, 2011 WL
3876943 (N.D. Ill. Aug. 29, 2011) (plaintiff granted summary judgment, with the court awarding $4,215,000 in damages, $500
in statutory damages for each of the 8,430 times faxes successfully sent to the class members).
62
Burdge v. Ass’n Health Care Mgmt., 2009 WL 414595 (S.D. Ohio Feb. 18, 2009). See also Dobbin v. Wells Fargo Auto
Finance, Inc., 10-268 (N.D. Ill. June 14, 2011) (recipients of cell phone calls failed to establish a genuine issue of fact regarding
whether manually dialed calls made from a bank call center desk phone were made "using" equipment with the capacity to
autodial within the meaning of the TCPA since such desk phones could be used independently of the predictive dialing
technology employed by the bank); CE Design, Ltd. v. Prism Bus. Media, Inc., 606 F.3d 443 (7th Cir. 2010)) (the “established
business relationship exception” to the TCPA's junk fax prohibitions applies to both business and residential customers).
262
Media Law & Policy
According to FreeLife Int'l Inc. v. American Educational Music Publications, Inc., a nondisparagement clause contained in an online adhesion contract between a direct sales company and a
prospective independent distributor is enforceable because it is neither procedurally nor substantively
unconscionable and does not violate the First Amendment.63 In ruling on the enforceability of the
online contract's non-disparagement clause, the court found that the defendant completed the
application and stated affirmatively that he accepted the terms and that the non-disparagement clause
was not objectively bizarre or oppressive such that the adhering party “would not have assented to
the particular term had he or she known of its presence.” The court commented that the defendant
accepted the contract with the non-disparagement clause, and after that he allegedly had breached it,
cannot be heard to claim it is unfair because of the possible consequences of his breach. The court
also rejected the defendant’s First Amendment argument, stating that the First Amendment protects
individuals from government infringement on speech, not private infringement.
The Northern District of California in Estavillo v. Sony Computer Entertainment held that a
user that was banned from the defendant's videogame network after multiple violations of its terms of
use cannot state a plausible First Amendment claim for relief, because the defendant was merely
providing a private commercial product and did not have a sufficient structural or functional nexus to
the government for the First Amendment to apply.64
In Richerson v. Beckon, the transfer of an education instructional coach to another position
after it was discovered that she wrote a publicly-available blog that included several highly personal
and vituperative comments about her employers and fellow teachers did not violate the instructional
coach's First Amendment rights.65 The court found that the legitimate administrative interests of the
school district outweighed the plaintiff’s First Amendment interests in not being transferred because
of her speech, despite the fact that it arguably touched on matters of public concern.
A state administrative hearing officer's termination due to her personal blog that addressed the
same special education topics that she heard in her judicial capacity called did not violate her First
Amendment or other civil rights in Stengle v. Office of Dispute Resolution.66 The court granted the
government agency’s motion for summary judgment on the plaintiff's constitutional and civil rights
claims, finding that her blog posed a legitimate threat to the efficient operation of the government
63
FreeLife Int'l Inc. v. Am. Educ. Music Publ’ns, Inc., 2009 WL 3241795 (D. Ariz. Oct. 1, 2009).
64
Estavillo v. Sony Computer Entm’t, 2009 WL 3072887 (N.D. Cal., Sept. 22, 2009). See also Stern v. Sony Corp., No. 09-7710
(C.D. Cal. Feb. 8, 2010) (“To the extent Plaintiff is suing Sony as a manufacturer of video games, and the provider of online
services, Sony is not a ‘place of public accommodation’ and is therefore not liable for violating Title III of the ADA”).
65
Richerson v. Beckon, 337 Fed.Appx. 637 (9th Cir. 2009). See also Yoder v. Univ. of Louisville, 2012 WL 1078819 (W.D. Ky.
Mar. 30, 2012) (nursing school that expelled student for making social media posting about a patient's birth did not violate her
First Amendment rights; the school had a legitimate pedagogical purpose in requiring students to sign a confidentiality policy and
the student "cannot now complain that she had a First Amendment right to publish on the internet the information she agreed not
to reveal").
66
Stengle v. Office of Dispute Resolution, 631 F.Supp.2d 564 (M.D. Pa. 2009). See also Zellner v. Herrick, 639 F.3d 371 (7th
Cir. 2011) (teacher dismissal for violating computer use policy against viewing adult materials was warranted and unrelated to
his outside union activities). But see Love v. Rehfus, 946 N.E.2d 1 (Ind. 2011) (firefighter was improperly terminated for
sending a private email supporting a local political candidate to a small group of citizens because the email was constitutionally
protected speech and there was little evidence suggesting the speech caused or had the potential to cause disruption or harm to the
Fire Department's operations); Rubino v. City of New York, 950 N.Y.S.2d (2012) (public school teacher's termination for
tasteless Facebook posting about her students was not warranted where the petitioner had a long and otherwise unblemished
employment history).
263
Spring 2013 │ Volume 20 │ Number II
agency such that the plaintiff’s free speech rights as a government officer could be constitutionally
abridged in these circumstances. A California state court stated that the plaintiff failed to show that
her blogging activities had no potential to disrupt the governmental operations, particularly since her
blog had the potential to induce recusal motions from those who came before her in her hearing
officer capacity and encourage losing parties to question her impartiality following an adverse
decision.
A school’s transfer and discipline of student who created a slide show that was later posted on
YouTube that depicted violence against a teacher was likely justified.67 The court reasoned that even
if the student’s posting was protected speech, it was reasonable, given the violent language and
unusual photos depicted in the video slide show, for school officials to forecast substantial disruption
of school activities.
IV. JURISDICTION AND PROCEDURE
As plaintiffs increasingly have urged courts to exercise jurisdiction over non-resident parties
based on their Web presence, two lines of analysis have arisen in the judicial opinions. One line of
reasoning developed from the opinion in Zippo Manufacturing Co. v. Zippo Dot Com Inc.,68 where
the Eastern District of Pennsylvania proposed that “the likelihood that personal jurisdiction can be
constitutionally exercised is directly proportional to the nature and quality of commercial activity that
an entity conducts over the Internet.” The Zippo court established a “sliding scale” of Internet
activity. On one end of the scale lie passive websites that only provide information and do not allow
any interaction between a user and the website, and thus, are unlikely to provide a basis for the
exercise of jurisdiction. On the other end of the scale are fully interactive websites where a
defendant conducts business over the Internet, a website much more likely to provide a basis for the
exercise of jurisdiction.
67
O.Z. v. Bd. of Trs. of Long Beach Unif. Sch. Dist., 2008 WL 4396895 (C.D. Cal. Sept. 9, 2008). See also Kowalski v.
Berkeley Cnty Schs., 652 F.3d 565 (4th Cir. 2011) (student suspension over creation of MySpace page dedicated to ridiculing a
fellow student did not violate the plaintiff's free speech rights because it was foreseeable that such conduct would reach the
school via computers and smartphones and create a foreseeable substantial disruption there); D.J.M. v. Hannibal Pub. Sch. Dist.,
647 F.3d 754 (8th Cir. 2011) (suspension upheld where student sent violent threats over instant messenger program from his
home); Harris v. Pontotoc Cnty. Sch. Dist., 635 F.3d 685 (5th Cir. 2011) (school did not violate student's due process rights in
suspending for causing a denial of service attack against the school network); Doninger v. Niehoff, 642 F.3d 334 (2d Cir. 2011)
(school officials acted reasonably and deserved qualified immunity for prohibiting a student from running for Senior Class
Secretary because of offensive off-campus blog posts that pertained to a school event); Tatro v. Univ. of Minn., 816 N.W.2d 509
(Minn. 2012) (university mortuary sciences program did not violate the free speech rights of graduate student by imposing
sanctions for her Facebook posts that violated academic program rules where the academic program rules were narrowly tailored
and directly related to established professional conduct standards); Bell v. Itawamba Cnty. Sch. Bd, 859 F.Supp.2d 834 (N.D.
Miss. 2012) (student's suspension over rap video posted on YouTube and Facebook containing allegations against a teacher was
upheld because lyrics caused a material and/or substantial disruption at school and it was reasonably foreseeable to school
officials the song would cause such a disruption). But see J.S. v. Blue Mountain Sch. Dist., 650 F.3d 915 (3d Cir. 2011) (en
banc) (school that suspended student for creating a lewd MySpace profile of the principal violated student's First Amendment
rights because the facts simply do not support the conclusion that the School District could have reasonably forecasted a
substantial disruption of or material interference with the school as a result of fake social media profile created off-campus);
Layshock v. Hermitage Sch. Dist., 650 F.3d 205 (3d Cir. 2011) (en banc) (student's suspension for creating fictitious, offensive
social media profile of school official not justified under exceptions that allow punishment for off-campus behaviors); R.S. v.
Minnewaska Area Sch. Dist., 2012 WL 3870868 (D.Minn. Sept. 6, 2012) (First Amendment and privacy claims against school
may proceed based upon search of student's Facebook account after a posting that was not truly threatening or disruptive to the
school environment).
68
952 F.Supp. 1119 (E.D. Pa. 1997).
264
Media Law & Policy
Another line of cases follow the reasoning of the Supreme Court's decision in Calder v.
Jones,69 a pre-Internet defamation case in which the Court held that jurisdiction could be premised on
the intentional conduct of defendants outside the forum state that is calculated to cause injury to the
plaintiffs within the forum state. Courts typically apply the Calder “effects test” in cases involving
defamation or some other intentional tort, including trademark infringement.
The Northern District of California held in Zynga Game Network Inc. v. Does that an online
videogame company that sought discovery from third-party web hosting companies and other
websites seeking the identity of domain name holders who are allegedly operating infringing
websites must narrow the scope of its subpoenas to information related to the identify and name the
John Doe defendants.70 The court granted the plaintiff’s motion to conduct limited discovery, but
narrowed the scope of the subpoenas, stating that the plaintiff's request for items such as server logs,
website content transaction histories and correspondence remotely linked to the defendants was
overbroad. The court ultimately limited the reach of the subpoena to “all documents necessary to
obtain the name, current and permanent addresses, telephone numbers, and valid email addresses of
the owner(s) of [the defendant's allegedly infringing website] or similar information suitable for
identification and location of defendants.”
In copyright infringement cases involving the uploading of a copyrighted printed literary work
onto the Internet, the situs of injury for purposes of determining long-arm is the location of the
principal place of business of the copyright holder, according to Penguin Group, Inc. v. Am.
Buddha.71 In answering a certified question from the Second Circuit, the New York Court of
Appeals rejected the defendant’s argument that a derivative economic injury felt in New York based
solely on the domicile of the plaintiff was insufficient to establish an in-state injury within the
meaning of the long-arm statute. The court commented that in the case of online infringement and
digital piracy, where the harm is dispersed throughout the country, the place of uploading is
inconsequential and it is difficult, if not impossible, to correlate lost sales to a particular geographic
area, such that the out-of-state location of the infringing conduct carries less weight in the
jurisdictional inquiry. Indeed, the court noted, “the absence of any evidence of the actual
downloading of Penguin's four works by users in New York is not fatal to a finding that the alleged
injury occurred in New York.”
According to the Florida Supreme Court in Internet Solutions Corp. v. Marshall, a nonresident
defendant commits the tortious act of defamation in Florida for purposes of Florida’s long-arm
statute when the nonresident makes allegedly defamatory statements about a Florida resident by
69
465 U.S. 783 (1984).
70
Zynga Game Network Inc. v. Does 1-5, 2010 WL 271426 (N.D. Cal., Jan. 21, 2010). See also Pacific Century Int'l Ltd. v.
Does, 2011 WL 2690142 (N.D. Cal. July 8, 2011) (mere allegation that multiple Doe defendants used the same BitTorrent
network to infringe a copyrighted work is insufficient to meet the standards for joinder set forth in Rule 20; court found no
evidence that users acted together to download the work, despite the collaborative nature of members of a BitTorrent “swarm”).
71
Penguin Group, Inc. v. Am. Buddha, 16 N.Y.3d 295 (2011). Following the ruling by the New York Court of Appeal on the
certified question, the Second Circuit vacated the lower court's order and remanded to determine whether the plaintiff established
the four remaining jurisdictional requistes under the New York long-arm statute, and the extent to which the assertion of personal
jurisdiction would be consistent with the requirements of Due Process. Penguin Group Inc. v. Am. Buddha, 640 F.3d 497 (2d Cir.
May 12, 2011). But see Troma Entm’t Inc. v. Centennial Pictures Inc., 853 F.Supp.2d 326 (E.D.N.Y. 2012) (mere claims of
infringement against New York copyright holder is insufficient to trigger Penguin rule; downloading of films over the Internet
and subsequent unauthorized licensing of the works is far different than the uploading of copyrighted works and online
distribution that occurred in Penguin).
265
Spring 2013 │ Volume 20 │ Number II
posting those statements on a website, provided that the website posts containing the statements are
accessible in the forum and accessed in the forum.72 In answering this certified question from the
Eleventh Circuit, the Florida Supreme Court did not address the second part of the long-arm
jurisdictional analysis, namely whether an exercise of jurisdiction over a non-resident defendant
under these circumstances violates the due process clause.
In CoStar Realty Information Inc. v. Field, unauthorized users’repeated exposure to website
terms of use a over several year period bound them to terms, subjecting them to jurisdiction in the
forum based upon their express and implied assent to the forum selection clause contained in the
terms of use.73
In Consulting Engineers Corp. v. Geometric Ltd., foreign software developers were not subject
to personal jurisdiction in a Virginia forum based upon email and telephone contacts concerning a
project in India, particularly since no agreement to perform work was ever reached.74
A social network website that allegedly used technology to embed advertisements into
infringing, user-uploaded videos is subject to long-arm jurisdiction in the forum based upon evidence
that the defendant sold advertisements to New York companies and sought to participate in
advertising campaigns specifically directed at New York users, according to the decision in Capitol
Records LLC v. VideoEgg Inc..75 The court found that such a showing was sufficient to establish that
the defendant used its website to “transact business” in the forum.
The court held in Chanel, Inc. v. Lin that service of process by alternative means through an
email address is not warranted where there is doubt that the defendant sends and receives emails
from the address.76 The court concluded that the plaintiff had not demonstrated that such alternative
service would reasonably notify the defendant that litigation was pending against him.
72
Internet Solutions Corp. v. Marshall, 2010 WL 2400390 (Fla. June 17, 2010). But see Penachio v. Benedict, 2012 WL 10971
(2d Cir. Jan. 4, 2012) (out-of-state witnesses in a family court proceeding who posted allegedly defamatory videos on YouTube,
but had no related commercial interest in the forum, are not amenable to long-arm jurisdiction in New York).
73
CoStar Realty Info. Inc. v. Field, 39 So.3d 1201 (Fla. 2010). In further proceedings, the court ruled that the plaintiffs’ claim of
loss based solely on the lost revenue from the license fees that plaintiffs would have recouped had some defendants entered into a
license agreement to use its services is insufficient to qualify as a loss under the CFAA. See CoStar Realty Info. Inc. v. Field, 737
F.Supp.2d 496 (D. Md. 2010. Subsequently, the court ruled that the defendants were liable for breach of contract and copyright
infringement for unauthorized uses that violated the database license agreement. See also CoStar Realty Information Inc. v.
Field, 2010 WL 5391463 (D. Md. Dec. 21, 2010).
74
Consulting Eng’rs Corp. v. Geometric Ltd., 561 F.3d 273 (4th Cir. 2009). But see Gallup, Inc. v. Bus. Research Bureau (PVT.)
Ltd., 2008 WL 4857027 (N.D. Cal. Nov. 10, 2008) (federal court had subject matter jurisdiction over foreign defendants to hear
the plaintiff’s Lanham Act claims based upon allegation that “Gallup” trademark had an adverse effect on U.S. commerce).
75
Capitol Records LLC v. VideoEgg Inc., 611 F. Supp. 2d 349 (S.D.N.Y. 2009).
76
Chanel, Inc. v. Lin, 2009 WL 1034627 (S.D. Fla. Apr. 16, 2009). See also Chanel Inc. v. Zhibing, 2010 WL 1009981 (W.D.
Tenn. Mar. 17, 2010) (email service of process on alleged online counterfeit product seller permitted where defendant's physical
address could not be determined and he conducted business electronically via email); Chanel Inc. v. Zhixan, 2010 WL 1740695
(S.D. Fla. Apr. 29, 2010) (service via email to apparently active email accounts permitted where defendant had falsified WHOIS
listing information and had no verifiable address in China); Gaffigan v. Does 1-10, 689 F.Supp.2d 1332, 1342 (S.D. Fla. 2010)
(“[I]n this case, email was the method of communication used by Defendants in confirming orders placed on its websites, and
thus, email should be calculated to provide Defendants with notice.”); McCluskey v. Belford High Sch., 2010 WL 2696599 (E.D.
Mich. June 24, 2010) (while the court disallowed alternate service via the defendant's web hosting company and posting on a
website related to the ongoing lawsuit, it granted the plaintiff's motion to serve process to a working fax number and email
address, as well as through the “live chat” feature on the defendants’ website); Fortunato v. Chase Bank USA, N.A., 2011 WL
5574884 (S.D.N.Y. June 7, 2012) (court disallows service of process on individual via Facebook or her listed email address as on
Facebook, but directed the defendant to serve third-party defendant via publication).
266
Media Law & Policy
Service of process via a functional email address and international mail was authorized against
an alleged foreign cybersquatter in an in rem action under the ACPA, captioned Jenkins v. Pooke.77
In Chang v. Virgin Mobile USA, LLC, an Australian company that downloaded a Flickr photo
of a Texas resident pursuant to a Creative Commons License was not subject to Texas long-arm
jurisdiction based upon tenuous contacts with the forum and the fact that the computer contracting
processing may have been routed through servers located in the forum.78
V. CONCLUSION
The development of the Internet and new electronic media has created a host of new issues in
almost all areas of the law – a not unsurprising form of new wine in old bottles. Digital media have
impacted on subjects ranging from intellectual property, to privacy, to the First Amendment, and
labor. As shown by the diversity of the above discussion, today’s lawyers have had to develop new
knowledge and skills. They seem to be off to a good, creative, and productive start.
77
Jenkins v. Pooke, 2009 WL 412987 (N.D. Cal. Feb. 17, 2009). See also Chanel, Inc. v. Song Xu, 2010 WL 396357 (W.D.
Tenn. Jan. 27, 2010) (effecting service of process on e-commerce merchants at their preferred email addresses permitted where
WHOIS mailing address was invalid and email provided the greatest likelihood of generating a response from the served parties);
Craigslist, Inc. v. Meyer, 2010 WL 2975938 (N.D. Cal. July 26, 2010) (service via email is appropriate since plaintiff
demonstrated that, despite best efforts, it was unable to obtain a physical address for the defendant and the defendant conducted
business solely through the Internet, and email service would not be prohibited by international agreement); Alfred E. Mann
Living Trust v. ETIRC Aviation S.A.R.L., 78 A.D.3d 137 (1st Dept. 2010) (guaranty's provision waiving personal service of
process and authorizing service of notices, demands, requests or other communications to a specific email address constitutes a
waiver of personal service and the requirements that would otherwise dictate the manner to serve the foreign defendant, namely,
CPLR 308 and the Hague Convention); U.S. Commodity Futures Trading Com’n v. Rubio, 2012 WL 3614360 (S.D. Fla. Aug.
21, 2012) (court allows service of process via defendant's still-active Yahoo email address that defendant previously swore under
oath was used by him because it is reasonably calculated to give defendant notice of the action and defendant's address is
unknown).
78
Chang v. Virgin Mobile USA, LLC, 2009 WL 111570 (N.D. Tex. Jan. 16, 2009).
267
Spring 2013 │ Volume 20 │ Number II
268
Media Law & Policy
FCC ANCILLARY JURISDICTION OVER INTERNET AND BROADBAND
Michael Botein
I. INTRODUCTION
As new technologies develop, legal means of regulating their behavior become necessary—
whether wireless telegraphy or wireless video.1 Incompatible engineering formats, interconnection
problems, and offensive material are common examples of issues for which the public demands
regulation. These problems often can be resolved by custom, usage, and private self-regulation—
hence the large number of trade associations in the media-telecommunications field. For example, the
transition from analog to digital broadcast and cable television was a disaster waiting to happen, and
was averted largely by the efforts of broadcast, cable, film, and computer interests though a “Grand
Alliance”—guided by a former FCC chairman—in arriving at the current digital video compromise
format.2 Similarly, broadcasting was spared rigorous censorship of “indecent” material through
negotiations among groups with different views of propriety.
One of the longest-running examples of this phenomenon during the 20th century was the
development of cable television. As discussed below, cable managed to elude regulation by the
Federal Communications Commission (FCC) for more than three decades.3
Much the same situation now faces regulation of the Internet and broadband—referred to
collectively here as cybermedia.4 Although federal statutes selectively limit or prohibit some types of
content—mainly pornographic material5—neither the FCC nor any other federal body has national
*
Professor of Law and Director, Media Center, New York Law School. B.A., 1966, Wesleyan University; J.D., 1969, Cornell
University; J.S.D., 1979, Columbia University. The author wishes to thank his energetic research assistants, Tara C. Hewitson
and Joshua Druckerman for their rigorous and thorough help in researching, writing, and editing this piece.
1
For excellent storytelling about and a good history of the first wireless—i.e., telegraphy—see Erik Larson, THUNDERSTRUCK
(2007).
2
Joel Brinkley, DEFINING VISION: HOW BROADCASTERS LURED THE GOVERNMENT INTO INCITING A REVOLUTION IN TELEVISION
(1997).
3
Cable first developed in the late 1940s and early 1950s, literally as low-capacity stands of primitive coaxial cable strung from
telephone poles, or often from trees. On a good day, most cable systems could carry a maximum of a dozen video signals, and
had absolutely no voice, interactive, or data capability. In some respects, it thus resembled the Internet before development of the
World Wide Web.
At first, the Federal Communications Commission (FCC) eschewed jurisdiction over cable. Frontier Broadcasting Co.
v. Laramie Community TV Co., 24 F.C.C. 251, 253 (1958). The Commission reasoned that cable was neither a common carrier
under Title II nor a broadcaster under Title III of the Communications Act, as discussed infra note 12. During this interregnum,
states and municipalities as their delegates exercised substantial power over many consumer aspects of cable. These areas did not
include industry structure or operation, of course, because of geographic limitations. Their powers generally derived from broad
police power provisions in state constitutions of statutes, and they naturally did not have national scope.
4
There is disagreement as to what constitutes “broadband.” The FCC recently attempted to clarify this by redefining
“broadband” as any sort of “mass-market retail service by wire or radio that provides the capability to transmit data to and
receive data from . . . [the] Internet . . . but excluding dial-up Internet access service.” Preserving the Open Internet, 47 C.F.R. §
8.11(a) (2011).
5
E.g., the now largely eviscerated Communications Decency Act of 1996, 47 U.S.C. §223 (3d ed. 1998), which was largely
struck down in Reno v. ACLU, 521 U.S. 844 (1997).
269
Spring 2013 │ Volume 20 │ Number II
plenary jurisdiction over cybermedia. The development and economic structure of cybermedia thus
hava been largely piecemeal. At present, perhaps the most vexing problem is implementation of
“network neutrality,” the facially simple requirement that a broadband provider not block, slow down
or discriminate against lawful websites, network traffic, applications, services, or applications that
compete with services that they provide.6
II. THE FCC’S STATUTORY (PLENARY) CABLE JURISDICTION
A traditional legislative approach has been to pass statutes with new regulatory norms. This
worked reasonably well in the early days of U.S. electronic communications. Congress largely
dodged legal issues as to early telephony by passing very broad statutes and dumping their resolution
in the lap of administrative agencies—such as the Interstate Commerce Commission and later the
FCC.7
A hands-off strategy was less workable with radio frequency (RF) over-the-air spectrum uses,
most significantly broadcasting. Electrical interference between stations inevitably results in some
parts of the population receiving poor service and others none at all.8 National federal regulation thus
was necessary, and the answer was the Federal Radio Commission in 1927 and then the creation of
the FCC as a separate federally mandated regulatory body as part of the Communications Act of
1934 (Communications Act).9
Through the Communications Act, Congress had essentially and unknowingly adopted three
different types of regulatory regimes: (1) common carriage under Title II; (2) broadcasting under
Title III; and 35 years later; (3) ancillary jurisdiction under Title I and some combination of Title II
and/or Title III.
As most policy planners increasingly have discovered, very often the Communications Act’s
statutory icons are of little use in adapting to new technologies and their challenges. Although
vesting telecommunications jurisdiction in the Interstate Commerce Commission may have seemed
sensible in the early 20th century—after all, telephone and railroads were both carriers—the devil
was in the details, particularly since an older agency often had little or no expertise in a new
technology, such as telephony.
One result of this was the New Deal’s “headless fourth branch,”10 which gave broad enabling
powers to administrative agencies through hopelessly general phrases such as “public interest,
convenience, and necessity.”11 That approach created difficulties in designing detailed regulatory
responses to new economic and engineering issues, particularly for agencies from the New Deal era
that had been conceived to deal with particular industries and economic problems. By the 1950s,
agencies often were faced with the need of fabricating new grants of jurisdiction in order to deal with
6
Open Internet Report & Order, 25 FCC Rcd. 17905, 17906 (2010); see also In re Comcast Corp. for Secretly Degrading Peerto-Peer Applications, 233 FCC Rcd. 13028 (2008).
7
Michael Botein, FEDERAL REGULATION OF THE ELECTRONIC MASS MEDIA 22-30 (3d ed. 1998).
8
Id. at 22–24.
9
47 U.S.C. § 101 et seq. In the process, the FCC also acquired the FCC′s moribund common carrier jurisdiction.
10
Report of the President’s Committee on Administrative Management 7, 83 (1937).
11
See, e.g., 47 U.S.C. §§ 257(c), 309(a), § 311(c)(3)(A).
270
Media Law & Policy
the details. For example, production of oil and gas had changed from a policy of limitation—because
of excess capacity12—to one of promotion.
In some cases creative construction of enabling statutes was enough, simply because of broad
“public interest” language. In other situations, however, absolutely nothing in an agency’s enabling
legislation supported a body’s power to act. Many statutes were relatively narrow in their scope;
unlike many other nations, the United States was loathe to give agencies true plenary jurisdiction
over their areas of responsibility. This required a search for other sources of power. Not
unsurprisingly, these other sources often turned out to be implied—sometimes from the enabling
statute’s language, sometimes from the overall purpose of the legislation.
III. THE FCC AND REASONABLY ANCILLARY (NON-PLENARY) JURISDICTION: CABLE
TELEVISION
The FCC’s history exemplifies an agency’s ongoing need to expand its jurisdiction through
implied powers. Although the Commission’s basic powers were laid out in the Communications
Act,13 in the last 50 years, it has faced at least two major needs to expand its jurisdiction beyond the
plain language interpretation of its enabling act: first, with cable television in the 1960s and currently
with the internet in the new millennium. This discussion does not include Chevron deference to
agency interpretation14 for the purposes of brevity.
As in 1934, the Communications Act still is divided into three parts:
 Title I: Administrative Powers
 Title II: Common Carriers
 Title III: Radio Frequency (RF) Transmission15
Until the advent of cable, the coverage of each title was pretty self-evident. When the
Commission first had to deal with cable in the mid-1960s, however, it recognized that it was dealing
with an entity that was neither a common carrier (such as a telephone provider) nor a broadcaster
(such as a radio station).
Early cases treated cable as just an extension of broadcasting, and based the Commission’s
jurisdiction on its power over broadcasting under Title III.16 In effect, cable jurisdiction became part
of a broadcast station’s compliance with Title III, even though a cable operator was functionally and
financially totally separate from—and often at odds with—the television stations from which it
carried signals.
As was to be the case with the Internet, Congress was unwilling (at least initially) to amend the
Communications Act to add a section explicitly designed to regulate cable. In response, the
12
Panama Refining Co. v. Ryan, 293 U.S. 388 (1935).
13
47 U.S.C. § 101 et seq.
14
Chevron U.S.A., Inc. v. National Resource Defense Council, Inc., 467 U.S. 837 (1984).
15
In 1984 and 1992, Congress added statutory coverage of cable in what became Title VI of the Communications Act. Cable
Communications Act of 1984, 47 U.S.C. §§ 521–573 (2006); Cable Television Consumer Protection and Competition Act of
1992, Pub. L. No. 102–385, 89 Stat. 1503 (codified in scattered sections of 47 U.S.C.). This granted the agency plenary power
over a few areas—e.g., concentration of control, programming sales, pole attachments—and left most other areas such as
franchises, street usage fees, and access channels, to state and/or local governments.
16
Carter Mountain Transmission Corp. v. FCC, 321 F.2d 359 (D.C.Cir), cert. denied 375 U.S. 951 (1963).
271
Spring 2013 │ Volume 20 │ Number II
Commission expanded the “reasonably ancillary” jurisdictional approach into a completely new form
of regulatory power.17 This essentially was a combination of Title I administrative powers with
jurisdiction from Title II and/or Title III. The game thus became putting together elements from two
or more titles to construct a basis for jurisdiction.
The keystone was Title I, Section 1 of the Communications Act, which provides that the
statutory purpose of the Act is “to make available . . . a rapid, efficient, Nation-wide and world-wide
wire and radio communication service.”18 This language was supplemented by Title I, Section 2,
which states that this act “shall apply to all interstate and foreign communication by wire or radio and
all interstate and foreign transmission of energy by radio.”19
Assuming that a lynchpin existed in sections 1 and/or 2, the first part of the reasonably
ancillary equation was in place. Depending upon the source of the second factor, the Title II or Title
III substantive source of jurisdiction, the schematic would resemble the following:
Title I
Section 1 or 2
Title II and/or Title III
The obvious difficulty was establishing the connection between the two foundations of
ancillary jurisdiction.20
This quandary first arose in United States v. Southwestern Cable Co.21 The Supreme Court
in that case reviewed the Commission’s requirement that a San Diego cable system demonstrate
that its transmission of a “distant” Los Angeles broadcast station would not endanger the
financial health of local broadcast stations or advertisers on them.22 The Commission’s concern
was that additional signals would reduce local viewing—and hence advertising revenues—for
San Diego television stations.
Regulation of distant signal importation—one of the most controversial cable issues in the
1960s and 1970s—thus became a high priority for the FCC. But neither Title II nor Title III
conferred any jurisdictional basis over cable, as would be revisited in the 1979 Midwest Video II
case.23 Cable was not a telephone-style common carrier, and since it did not use RF transmission,
it was not subject to Title III.
17
Michael Botein, CATV Regulation: A Jumble of Jurisdictions, 45 N.Y.U. L. REV. 816 (1970).
18
47 U.S.C. §151.
19
47 U.S.C. § 152. Most cable systems did not fall within this, since they transmitted signals by wire, not radio. Where cable
operations used microwave transmission to receive broadcast television or other programming, they were deemed to be RF
carriers under Title III, and hence there was no need to find ancillary jurisdiction.
20
E.g., Echostar Satellite, L.L.C. v. F.C.C., 704 F.2d 992, 998 (2013) adopts a similar analysis.
21
392 U.S. 157 (1968).
22
Then 47 C.F.R. § 74.1107 put the burden on a cable system to show that importation of distant signals into any of the nation’s
100 largest television markets would be “consistent with the public interest, and specifically the establishment and healthy
maintenance of television broadcast service in the area.” Shortly after Southwestern, the Supreme Court refused to review a
decision upholding the validity of the provision. Bucks County Cable TV, Inc. v. United States, 427 F.2d 438 (3d Cir. 1970),
cert. denied, 400 U.S. 831 (1970).
23
See discussion infra pp. 278-279.
272
Media Law & Policy
In effect, the FCC’s argument was that if an unregulated industry impacted a regulated one,
an agency with jurisdiction over the latter could extend its reach to the former. Taken to its
extreme, this rationale would allow federal agencies to assert jurisdiction to an extent
coterminous with Congress’s legislative power under the Constitution. The Federal Aviation
Administration presumably would have jurisdiction over running shoes, since their performance
might affect an airline passenger’s speed in reaching a departing flight. The Court naturally was
interested not in federalizing the national’s economy, but merely in resolving a relatively minor
dispute of concern to the then-powerful broadcast lobby. After all, at this time the entire U.S.
cable industry had about 950,000 subscribers24—less than one percent of national households,
versus the two-thirds it serves today.
The Court neatly sidestepped these concerns in Southwestern in its first application of
reasonably ancillary jurisdiction to telecommunications. It simply held that cable impacted on
the economic viability of Title III television broadcast stations. As a result, the combination of
the general administrative language in Sections 1 and 2 gave the Commission power to protect
television broadcasting under Title III’s mandate.
The Court was quick to hedge its bets, however, as to the scope of ancillary jurisdiction. It
noted that “the authority which we recognize today . . . is restricted to that reasonably ancillary to
the effective performance of the Commission’s various responsibilities for the regulation of
television broadcasting.”25
There naturally were several difficulties with this approach. First, the information
regarding cable’s impact on broadcast television was limited at best, as indicated by the
industry’s small size. The cable industry studies purported to show that it increased broadcast
revenues by expanding the total audience; conversely, the broadcast white papers claimed that
cable importation of distant signals—and eventually of non-broadcast signals, such as CNN or
HBO—reduced viewers for broadcast television programs.
Second, the Commission’s and the Court’s analysis assumed that the goal of protecting
broadcast television was sufficient to justify regulating cable. The difficulty with this approach
was that it based regulation of non-broadcast media on the preservation of (perhaps even failing)
broadcast stations. The Court’s rationale analogizing the regulation of cable to the regulation of
radio or television broadcast stations to prevent interference and loss of listeners simply did not
work. The cable rules were not designed to prevent electrical interference or to provide universal
service to the public—major goals of broadcasting. Some observers viewed this as sacrificing
cable to pay for broadcasting’s sins.
The overall weakness of the Southwestern decision may have resulted from the Court’s
desire to slow cable growth without making new law. Since the Court seemed to go out of its
way to restrict the reasonably ancillary doctrine to cable’s impact on broadcast television, it very
well may have planned to settle the cable-broadcast dispute quickly through a doctrine which
never would be heard of again.
For better or worse, this was not the case, since the cable-broadcast wars continued
unabated through the enactment of Communications Act cable legislation in Title VI between
24
Will 1971 give CATV a green light?, BROADCASTING YEARBOOK at 14 (1971), available at
http://www.americanradiohistory.com/Archive-BC-YB/1971/Section-Intro-Broadcasting-Yearbook-1971-9.pdf.
25
Southwestern, 392 U.S. at 178.
273
Spring 2013 │ Volume 20 │ Number II
1984 and 1996.26 Until Congress finally acted, the industries tried any other available avenue—
including litigation. As lobbyists sometimes observe, all that any regulated industry wants is one
unfair advantage.
In 1972, the Court revisited the reasonably ancillary issue in United States v. Midwest
Video Corp (Midwest I).27 The Commission there had adopted a rule requiring cable systems
with more than 3,500 subscribers to engage in “mandatory origination”—producing primarily
local programs with news, public affairs, and programming by third parties. Unlike the signal
importation rules in Southwestern, these regulations did not purport to protect the economic
viability of broadcast television stations. In upholding the rules, the Court relied upon Section 1
and held that cable systems effectively owed these services to the public as a quid pro quo for
use of broadcast television signals. The Court viewed mandatory origination as a means of
achieving public service goals not already served by broadcast television stations.
The Court’s emphasis on promoting public service was a radical departure from
Southwestern’s view of the Commission’s jurisdiction over cable as conditional on its statutory
powers over broadcasting. Although not viewed as a substantial change in approach, the Court’s
rationale approached a grant of plenary jurisdiction over cable.
As in Southwestern, the Court’s emphasis on using cable regulation to reach traditional
broadcast goals ignored the fact that cable did not use RF transmissions like broadcasting. The
rationale amounted to insuring that cable viewers could be able to receive signals not supplied by
broadcast television providers because of economic limitations. This attempt to draw a
connection between cable carriage and improvements in broadcast service lacked the logical
nexus generally present in ancillary jurisdiction.28 Although not labeled as plenary jurisdiction,
the decision approached that result.
In addition, the Commission had estimated—and the Court agreed—that the cost of
mandatory origination to a cable operator would be steep but not economically infeasible. The
FCC’s projected capital costs were $21,000 for a black-and-white origination system and
$56,000 for color. By the standards of 1972, these figures were wildly conservative. Today’s
estimates would be 10-15 percent as much.29
It thus was less than surprising that Chief Justice Burger provided a concurring fifth vote to
uphold the rules only with difficulty. Although hardly a technologist, he found the nexus
between statutory goals and Commission jurisdiction to be tenuous at best. He saw a serious
disconnect in the fact that cable operators were not RF, while broadcasters were. Burger noted
that: “candor requires acknowledgment, for me at least, that the Commission’s position strains
the outer limits of even the open-ended and pervasive jurisdiction that has evolved by decisions
of the Commission and the courts.”30
26
47 U.S.C. § 601 et. seq.
27
406 U.S. 649 (1972).
28
406 U.S. at 664–65.
29
Cable quality cameras cost as little as $3,000, including lenses.
30
406 U.S. at 676 (Burger, J., dissenting).
274
Media Law & Policy
This too might have been the end of the ancillary jurisdiction doctrine, were it not for the
Commission’s continued tinkering with cable operators’ obligations to provide local
programming. These requirements eventually were invalidated by the Court in FCC v. Midwest
Video Corporation (Midwest Video II).31
In 1976 the Commission embarked upon a departure from what had been a relatively
unsatisfying experience with mandatory origination. The agency repealed the existing rule and
adopted instead a new “access” requirement. Under this rule, cable operators had to make
available four types of channels to unaffiliated third parties: public, educational, governmental
(PEG), and leased. Although the Court found a nexus between the Commission’s jurisdiction and
the rules’ requirements, it held that the FCC had pushed the regulatory envelope too far.
One of the goals of the new rules was to enable third parties to use an operator’s cable
access channels—particularly PEG—without any control by the cable system. Although the
Court found some public interest goals in the rules, it invalidated them on the ground that they
imposed common carrier obligations on cable carriers: requiring operators to hold out their
facilities to unaffiliated entities; barring them from content control; and limiting leased access
channel charges. The Court did not pass on the First Amendment status of the rules, however,
which effectively allowed Congress and state/local governments to implement access channels
later—as they did, beginning with the 1984 Cable Act just a few years later.32
In effect, the nexus existed between the agency’s overall administrative powers, but the
rules’ broadcast-style goals violated the Act. Section 153(10) provides that “a person engaged in
radio broadcasting shall not, insofar as such person is so engaged, be deemed a common
carrier.”33 Using its reasoning from prior decisions that a cable system was analogous to a
broadcaster and thus could be subject to broadcasting goals, the incorporation of carrier-style
obligations invalidated an otherwise valid connection between the Commission’s administrative
powers and broadcast-like goals. Although Congress ultimately preserved access rules on a local
level in the 1984 Cable Act, from Midwest Video II until recently, ancillary jurisdiction played
little role in telecommunications regulation.
IV. REASONABLY ANCILLARY JURISDICTION OVER THE INTERNET
After two decades of cable access channel regulation under Title VI of the Communications
Act, ancillary jurisdiction was virtually off the regulatory radar screen. Today, however, the history
of ancillary jurisdiction may be relevant again with the cable-style “explosive growth”34 of the
Internet and broadband (referred to collectively as cyber media). This development brought with it a
perceived need by some for a further expansion of the FCC’s jurisdiction.
As had been the case with cable, there is no statutory grant of Commission power over
cybermedia, and thus no clear regulatory niche for it under the Communications Act. Like cable, the
Internet and broadband are not carriers, since operators are subject only to general antitrust
constraints in dealing with third parties and setting rates. Increase use of mobile devices, wifi and the
31
440 U.S. 689 (1979).
32
This now is incorporated into Title VI of the Communications Act, as discussed supra note 19.
33
47 U.S.C. § 153(11).
34
Second Report and Order, 2 F.C.C.2d 725, 738 (1966).
275
Spring 2013 │ Volume 20 │ Number II
like naturally may move cyber media into the RF domain. Although many observers—somewhat
ironically, mainly cable operators—argued that the Internet should be treated as a form of cable
under Title VI, it clearly was not a one-way distribution system.
In occasional references, courts have suggested that cybermedia might be regulable under
ancillary jurisdiction. In a rather convoluted opinion, the Supreme Court in National Cable &
Telecommunications Association v. Brand X Internet Services, Inc.,35 held that the Commission could
regulate the Internet as an “information” rather than as a “telecommunications” service. After a
debate sometimes resembling a food fight between Justices Scalia and Thomas,36 the plurality hastily
noted that “the Commission remains free to impose special regulatory duties on facilities-based ISPs
under its Title I ancillary jurisdiction.”37
In the recent past, the most significant issue arose in Comcast Corporation v. FCC.38 At issue
there was the FCC’s prior version of its “network neutrality” restrictions, resulting from a complaint
against Comcast. At that point, the Commission’s policy was mainly to prevent Internet Service
Providers (“ISPs”) from blocking third parties from using all or part of their bandwidth, imposing
unreasonable discrimination, as to price or availability, engaging in paid prioritization of one user
over another, and allowing “reasonable network management.”
The Commission argued that it had ancillary jurisdiction to impose these policies. The FCC
relied on Section 1 as well as Section 230 of the Communications Act, which prohibits blocking of
transmissions. The agency was somewhat vague as to the nexus, however, between its administrative
power and Titles II, III, or VI. The court ultimately concluded, however, that the Commission had
“failed to tie its assertion of ancillary authority over Comcast’s Internet service to any ‘statutorily
mandated responsibility’”39—i.e., Title II, III, or VI. Three years later in 2013, the D.C. Circuit used
similar reasoning to hold that the FCC could not adopt rules to prohibit satellite broadcasters from
using encoding to exclude third parties.40
The D.C. Circuit’s decision in Comcast came just as the new (now former) Chairman of the
Commission, Julius Genachowski, was beginning negotiations with ISPs as to network neutrality
rules. The dealings eventually broke down, and the Commission adopted rules similar to what had
been on the table.41 The case appeared destined for a lengthy appellate process.42
And while the litigation proceeded, Congress moved towards a legislative ban on further
Commission action concerning network neutrality.
35
545 U.S. 967 (2005).
36
Id. at 1018.
37
Id . at 980-986.
38
600 F.3d 642 (D.C. Cir. 2010).
39
600 F.3d at 661.
40
Echostar, supra note 20, at 998-999.
41
In the Matter of Preserving the Open Internet, Broadband Industry Practices, Notice of Proposed Rulemaking, GN Docket No.
09-191, 07-52 (released October 22, 2009).
42
Brendan Sasso, FCC Urges Court to Uphold Net Neutrality Rules, THE HILL, Oct. 9, 2012, available at http://thehill.com/
blogs/ hillicon-valley/technology/248619-fcc-urges-court-to-uphold-net-neutrality.
276
Media Law & Policy
V. CONCLUSION
The courts and the Congress have been stalled in defining any type of plenary FCC jurisdiction
over the Internet and broadband.43 This naturally left the Commission with little ability to implement
a potentially wide variety of public policies—just as it initially was with cable.
Although the discussion of cable jurisdiction in Section II is largely historical now, it shows
that a willing Supreme Court can give an agency at least a temporary form of power to deal with
perceived public interest issues. Whether particular cable policies made sense at the time or today,
the mere fact that a responsible agency felt them to be necessary suggests that similar reasoning may
apply to the Internet and broadband.
This is not to suggest that the courts should exercise unbridled discretion in empowering
administrative agencies. After all, in purely regulatory situations such as cable or cybermedia,
Congress eventually will step in to modify—or perhaps even abolish—any powers implied from
sources such as ancillary jurisdiction. While a broader policy debate is pending, however, use of an
obvious artifice such as ancillary jurisdiction may be a sound way of plugging a policy lacuna. It thus
may be worth considering in the context of the Internet and broadband, just as with cable.
43
Ironically, the Administration carved out a part of its general stimulus program in the Broadband Stimulus Act of 2009.
American Recovery and Reinvestment Act of 2009, Pub, L. 111-5, 123 Stat. 115 (Feb. 17, 2009). This part of the general
stimulus act provided substantial grants for broadband projects under the Broadband Technology Opportunities Program, even
though federal agencies had no statutory powers to regulate the funded activities. See 47 U.S.C. §§ 1304, 1305. The FCC’s only
role was in producing a National Broadband Plan on March 18, 2010. FEDERAL COMMUNICATIONS COMMISSION, CONNECTING
AMERICA: THE NATIONAL BROADBAND PLAN (2010), available at http://download.broadband.gov/plan/national-broadbandplan.pdf.
277
Fly UP