NLRB A 'Twitter Over Employers' Social Media Policies

Recently posed at the National Law Review by Laura M. Lawless Robertson of Greenberg Traurig, LLP – updates of the National Labor Relation Board’s (NLRB’s) recent recent scrutiny of  employer’s social media policies for compliance with the National Labor Relations Act (NLRA):  

The National Labor Relations Board’s (NLRB) recent scrutiny of social media policies for compliance with the National Labor Relations Act (NLRA) has alarmed many employers – including non-union employers. Two recent developments in this area add fuel to an already heated debate over employer actions based on employees’ use of social media.

The first case is Lee Enterprises, Inc. d/b/a Arizona Daily Star. The Daily Star newspaper did not have a social media policy, but urged its reporters to use social media, including Twitter, to disseminate information to the public. After deciding that its crime/public safety reporter had gone too far with his unprofessional, sexually inappropriate, and pro-violence tweets, including one in which he called the reporters on a local television station “stupid,” the newspaper’s managing editor admonished him to refrain from engaging in any further social media postings. The reporter was later terminated, after which he filed a charge with the NLRB, contending that his termination violated the NLRA.

The NLRB General Counsel’s Office acknowledged that, “in warning the Charging Party to cease his inappropriate tweets, and then discharging him for continuing to post inappropriate tweets, the Employer made statements that could be interpreted to prohibit activities protected by Section 7 [of the NLRA],” but nevertheless concluded that the newspaper terminated him for violating workplace policies and disregarding its repeated warnings to cease his unprofessional tweets. The General Counsel’s Office concluded that “it would not effectuate the purposes and policies of the [NLRA] to issue a complaint where the statements were directed to a single employee who was lawfully discharged,” and recommended dismissal of the charge.

If employers presumed, based on the Arizona Daily Star outcome, that the NLRB had backed down from its aggressive stance regarding employers’ social media policies, they would be mistaken. On May 9, 2011, the NLRB issued a complaint alleging that Hispanics United of Buffalo, a nonprofit social service agency, unlawfully discharged five employees who complained about their working conditions on their Facebook accounts. After one employee questioned how hard the staff worked to help the agency’s clients, several employees chimed in on her Facebook status, defending their job performance and blaming workload and staffing issues for any unmet client needs. After learning about the posts, Hispanics United fired all of the employees who participated in the flame war. The NLRB issued a complaint, alleging that the Facebook dialogue was protected concerted activity under the NLRA – a discussion among coworkers about the terms and conditions of their employment and undertaken for mutual aid and protection. The case is set for a hearing before an administrative law judge on June 22, 2011, absent settlement (which seems to be the trend in these sort of cases).

These two cases illustrate that employers may discipline employees for social media misconduct, such as disclosing confidential and proprietary information, engaging in “textual harassment,” or libeling competitors, but must scrupulously avoid instituting or enforcing social media policies that impinge on employees’ rights to discuss the terms and conditions of their employment, e.g., wages and working conditions. One thing is for certain…we haven’t heard the last of this topic from the NLRB.

©2011 Greenberg Traurig, LLP. All rights reserved.

Just JDs — Business Development Strategies for Lawyers – June 8th Chicago, IL

Looking for new ideas on how to grow your client base?  Trying to determine if social media is a time waister or a great way to reach new audiences or stay in touch with current business contacts? Looking for CLE Credits before the June 30th Illinois Deadline?  The National Law Review  would like to bring your attention to a unique opportunity designed for attorneys by the legal marketing authorities (LMA).  

Just JDs — Business Development Strategies for Lawyers is a one-day program is designed exclusively for lawyers at firms of all sizes who want to build their personal books of business or have responsibility for practice or firm business development efforts including marketing partners, marketing committee members and administrators.

LMA members: Refer attorneys from your firm and they can register at the member rate, a savings of $100.

Click Here For More Details & to Register Online Today
$395 for LMA members
$495 for nonmembers

Wage and Hour Headaches for Employers: The Department of Labor Has an App for That

Posted this week at the National Law Review  by Mitchell W. QuickBrian P. Paul and Steven A. Nigh of Michael Best & Friedrich LLP – details for employers about the Department of Labor’s (DOL) new App to track wages and work hours….

The U.S. Department of Labor Wage & Hour Division (“WHD”) recently released a free application (“app”) for iPhone and iPod Touch that allows employees to track their wages and work hours. The “Timesheet” app allows employees to enter their hourly rate and hours worked for multiple employers. The app also lets employees record time spent on meal breaks and “other” breaks. Time can be recorded manually or by using the app’s embedded stopwatch. Timesheet calculates employee pay, including overtime, and lets employees export Timesheet data via e-mail in Microsoft Excel format. While the current version calculates pay based on an hourly rate, WHD is exploring the possibility of adding functions for commission pay, shift differentials and other methods of compensation in future versions, along with Android- and Blackberry-compatibility. The app currently is available in both English and Spanish.

Timesheet presents a number of challenges to employers. WHD perceives the app as an enforcement aid that contains potentially “invaluable” information about alleged hours worked. Timesheet also encourages employees to file claims by giving them contact information for both local and national wage and hour agencies.  Furthermore, employee complaints about pay for alleged “off-the-clock” work—such as voluntarily checking work e-mails when at home—may increase as such time can be easily recorded. Employees might also record any work issues raised during break time, raising the specter of employers having to treat that time as compensable “hours worked.” Finally, employees improperly classified as exempt and for whom the employer kept no time records would now have “documentation” to support their damage claims.

Fortunately, employers can take steps to protect themselves:

  • Keep accurate records. This obvious best practice has only become more important now that some employees may keep records of their own.
  • Require non-exempt employees to sign off on company time sheets. This will help ensure both sides agree on the number of hours worked, and can help wage and hour disagreements surface—and get resolved—sooner rather than later.
  • Audit exempt employees to make sure they are exempt. This is particularly true for employees for whom the company has limited time records
  • Update employee handbooks. Make sure employees know that they cannot falsify any company records, including time records. Also consider establishing a complaint process for employees to use when they are told not to report work time.
  • Do not retaliate against employees who keep their own time records. Retaliation claims are on the rise, and Timesheet is another possible pitfall for employers.

“Timesheet” should serve as a reminder of the importance of maintaining complete, accurate wage and hour records.

© MICHAEL BEST & FRIEDRICH LLP

Additional Information on this is also available here:

Bill Allowing More Offshore Drilling Introduced to Congress

Posted today at the National Law Review by Sabrina Mizrachi of Greenberg Traurig, LLP – news on the Infrastructure Jobs and Energy Independence Act introduced in Congress yesterday……

The Infrastructure Jobs and Energy Independence Act was introduced on May 12, 2011, and seeks to allow more offshore drilling in order to reduce U.S. reliance on imported fuels and create jobs. The bill was introduced by a bipartisan group of four congressmen, Democrats Jim Costa of California and Tim Walz of Minnesota in collaboration with Pennsylvania Republicans Tim Murphy and Bill Shuster.

The bill contains no new taxes or increase of existing taxes, and would allow drillers to reach natural-gas reservoirs that could fuel industry in the U.S. for 63 years and the U.S. oil industry for 80 years, and also create 1.2 million jobs per year.

©2011 Greenberg Traurig, LLP. All rights reserved.

Appeals Court Overturns Stem Cell Ban

Recently posted at the National Law Review  by WarrenWoessner of  Schwegman, Lundberg & Woessner, P.A.– an update in the U.S. Court of Appeals for the D.C. Circuit concerning research using human embryonic stem cells.

On April 29th, in Sherley v. Sebelius, the U.S. Court of Appeals for the D.C. Cir., overturned the injunction imposed by the district court, which had blocked the implementation of the 2009 NIH Guidelines on finding research using human embryonic stem cells. 74 Fed. Reg. 32170(2009). The Guidelines, in turn, had been formulated to implement President Obama’s executive order 13505 that lifted President Bush’s executive order banning such funding. The suit, brought by two researchers working with adult stem cells, argued that the Guidelines were in conflict with the 1996 Dickey-Wicker Act, which banned funding for both research that would create human embryos for research purposes or would destroy human embryos. For more background, see my post of Sept. 1, 2010.

The Court found that preliminary injunction was improperly granted “becauseDickey-Wicker is ambiguous and the NIH seems reasonably to have concluded that, although [D-W] bars funding for the destructive act of deriving an ESC from an embryo, it does not prohibit funding a research project in which an ESC will be used.”  In other words, if some other unfunded entity disassembles an unwanted embryo obtained with informed consent of the donor from an in vitro fertilization clinic and provides the ESCs to a researcher, the researcher can obtain federal funding to study them. Since establishing the Guidelines, the NIH has approved additional ESC lines for federal funding. While this is good news for researchers working with embryonic stem cell lines approved under the NIH Guidelines, the underlying suit will continue to threaten the administration’s more liberal view of stem cell research.

© 2011 Schwegman, Lundberg & Woessner, P.A. All Rights Reserved.

ABA Recent Developments in State and Local Government Law – Live Webinar Teleconference Series May 19th

The National Law Review wanted to bring your attention to the upcoming Live Webinar and Teleconference Series on Recent Developments in State and Local Government Law

Program Information:    

Thursday, May 19, 2011—11:00 AM – 12:30 PM Eastern 
Sex, Drugs and Government?
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1sdg

Thursday, May 19, 2011—1:00 PM – 2:00 PM Eastern 
Cyberbullying
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1cbb

Thursday, May 19, 2011—2:30 PM – 3:30 PM Eastern 
Ethics of Social Networking (Ethics Credit)
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1esn

Register for the entire series or alternatively view additional information and register for individual programs by clicking here.   CLE credit available.


 

The Six Biggest Mistakes Law Firms Make When They Upgrade Technology

Recent featured blogger at the National Law Review –  Ben M. Schorr of Roland Schorr & Tower – provides some great insights into common mistakes made by lawfirms when upgrading technology.   

As an information services professional I’ve spent the past two decades helping law firms with their technology. Over that time I’ve come to identify 6 major mistakes that they tend to make when they install or upgrade new technology.

#1. They Don’t Have A Goal.

It’s important before you even consider upgrading your technology to ask this question: What problem are we solving? Too many firms forget what business they’re in and run around installing fancy new systems that don’t address any specific needs. Sometimes they’re talked into it by vendors or consultants; sometimes it’s the brainchild of a computer-savvy associate or staff member. Far too often the result is a lot of money spent for new systems and no increase in productivity. If you don’t have a goal, you’ll never reach it. Back home in Indiana folks say “If you don’t know where you’re going, pull over and stop ’cause you’re there.” This is rarely truer than in technology where you are constantly bombarded with possible routes – in the form of cool toys – but unless you have a destination it makes no sense to even start the car.

How can I avoid making this mistake?

Start by identifying the problem. Write it down. Write down the proposed answers. Review the problem (and proposed solutions) with the users and with your information services people (or consultants). Once you have a clearly defined (and agreed upon) problem and solution, set a timetable. Make it realistic. This can be one of the hardest parts of this step because you don’t want to rush things and end up with a hastily implemented, and poorly constructed, solution.  But at the same time you can’t drag your feet too much or the technology will change right out from under you and you may find that your preferred solution has been discontinued in favor of a new and improved (read that “more sophisticated and expensive”) solution.

#2. They Don’t Talk To Their Users.

Too many firms get a great idea for a new technology, throw the switch and roll it out to their users without even much warning to the users that it’s going to happen. As a result there is confusion, resentment, fear and a LOSS of productivity.

How can I avoid making this mistake?

Don’t just impose change from the top down or you’ll end up with users who resent and are intimidated by the new technology. Ask them what they need. Ask how they will use it. Have them compose a “wish list”. Observe their procedures. You’ll find that the users will accept the new systems much faster and easier if they have some input into its selection/creation. If you’re in a large firm consider putting together a users group of various staff members. Try to include at least two members of each category (partners, associates, paralegals, support staff, accounting, etc.) and don’t just pick the ones who know a lot about technology. Oftentimes the most valuable input will come from that partner or secretary who is awkward with the computers. Have them meet each month and ask them to talk about how the technology is (or isn’t) working for them. Have them suggest improvements. It’s important that you listen to their input and let you know that you value their contributions.

#3. They Don’t Do Their Homework (Or Pay The Smartest Kid In Class To Do It For Them).

I often see firms that buy a solution they don’t understand. What is it? How does it work? Why do we need this again? Many times they see a flashy ad or get a presentation from a salesman and sign the papers in the excitement of the moment.   They don’t clearly understand the problem or how this solution solves it.

How can I avoid making this mistake?

Do your research. Visit the Internet sites for the products you’re interested in. Visit the sites of some of their competitors. Read the trade magazines and try to keep a handle on what’s happening in the industry. Talk to the users (see #2) and vendors. Attend demos and seminars. You’ll probably have to start learning about the technology at least 3-4 months before you plan to upgrade or the hill will be too steep to climb. If you can’t (or don’t want to) do the research yourself, find a consultant that you feel comfortable with. Get recommendations from other firms in your area of people they’ve enjoyed working with. Ideally the consultant should be familiar with the solutions you’re interested in, but shouldn’t sell those solutions themselves (that way he has no financial interest in selling you something you don’t need). Never hire a consultant that you don’t trust completely. Your consultant should be able to explain the basics of the relevant technology to you in language you can understand and, most importantly, should be able to clearly explain the expected benefits to you.

#4. They Don’t Document Everything.

At one firm I worked for, I discovered that they had an entire floor of the building wired for network cabling but didn’t have a map or any other documentation about the cabling. All they had was plugs in the walls and loose wires in the computer closet. As you can imagine troubleshooting cabling problems became quite an adventure. It’s far too common to ask what kind of hardware is in use and have firms not know for sure.   Documentation failures go well beyond cabling – system configurations, numbers of licenses, software in use…oftentimes goes unrecorded and when it’s time to troubleshoot or upgrade there is not enough information available to make good decisions or accurately foresee potential problems.

How can I avoid making this mistake?

The solution is easy, but can be tedious. Insist upon complete documentation from your vendors. Maps of cabling. Labels on everything. When you deploy new equipment keep a file that indicates serial numbers and specifications (RAM, hard drive, processor, operating system, etc.). Often you can get that information from the invoice you received for the machine. Keep a list of what software you have in use, how many licenses you own, and what versions you’re running.  Document the date that the system or application was deployed and from where it was purchased. This documentation can make troubleshooting MUCH easier down the road.

#5. They Skimp On Training.

This is a VERY common error. It never fails to surprise me when I see a firm that will spend $50,000 on computer equipment but won’t spend $500 to train the users.

How can I avoid making this mistake?

The most important part of your system is the user – upgrade them! Would you fly an airline that advertises that “All of our pilots have driver’s licenses and we have a copy of “Big Planes for Dummies” in every cockpit!” I doubt it…yet many of you are flying your firms with crucial personnel who haven’t had even 20 minutes worth of training in the products that you depend upon to get your work done. Even long after the installation training can be productive. You may think that your assistant knows the ins & outs of your word processor, but what if a 2-hour class could teach him or her new tricks or secrets to get things done faster? If these new tricks saved them just 12 minutes a day that would be an entire HOUR each week that they’d gain. In a month they’d have recouped all of the time invested in the class, twice over. This goes for executives as well, by the way…

Consider bringing in an outside trainer (or even an inside resource) to do a 1-hour lunchtime training in your conference room.  Try producing an internal e-newsletter with tips and tricks for the products you use (ProLaw, Word, Excel, WordPerfect or whatever).  Encourage your users to have interest and discussions about technology.

Consider creating a “Trick of the Week” award where the person in your firm who submits the best new trick or tip for using your systems wins some prize – maybe a prime parking space in your lot for the week, an extra-long lunch break on Friday or a box of chocolates.

#6. They Don’t Follow-Up.

This comes back to talking to your users. If you don’t look out the window how do you know if you reached your destination? Don’t find out 6 months later that the staff hates the new software or that the new printers don’t work properly.

How can I avoid making this mistake?

After the upgrade is in place you need to contact your users and ask them if they’re happy. Try to be there when they first use it to get their initial reaction. Check in with them again the following day. Check in again the next week…and again weekly or bi-weekly for the next month or two. Look back at your written “goal” from #1 and see if you’ve solved your problem. If you didn’t, figure out why and make adjustments. Users will often forgive you if you find and fix problems quickly they often won’t forgive you if you give them a “solution” that doesn’t work and then leave them to deal with it on their own. Many times you’ll find that the problems are really “pilot error” and can be corrected with more (or better) training. Sometimes the problems will be equipment or software problems and finding them in the first days or weeks can mean the difference between getting your vendor to replace the inadequate product with something more suitable and getting stuck with it for the long term.

Preventing these mistakes takes a little effort but it’s not expensive. What’s expensive is making these mistakes and ending up with a system that you paid considerable money for and that leaves your users frustrated and your productivity down.

Copyright ©2011 Ronald Schorr

EPA Redefines “Solid Waste” to Incentivize Creative Fuel Technology: Garbage to Gold

Recent Guest Blogger at the National Law Review  Kim K. Burke  of  Taft Stettinius & Hollister LLP highlights how the EPA recently changed the definition of Solid Waste and how this can lead to new fuel technology

Since the Resource Conservation and Recovery Act (RCRA, 42 U.S.C. §6901, et seq.) first became law, consternation among the regulated community has grown as a principal purpose of RCRA, namely, to encourage discarded material reuse as fuel, appears to have been ignored in EPA’s rulemaking.  Perhaps that discouraging trend is coming to an end.  On February 21, 2011, EPA released a pre-publication version of a proposed Final Rule amending the definition of “solid waste.”  What is particularly encouraging about the Final Rule is that innovative technologies for creating fuels from materials that would have previously been characterized as a “solid waste” are excluded from the definition.  This opens the door to creative technologies to transform municipal garbage into useable fuels for utilities and industrial boilers.  Not only does this technology reduce the amount of precious landfill space being consumed by valuable organic material, but it also offers the prospect of reduced and more easily controlled emissions from industrial boilers and fossil-fueled electric utilities that promise to be large consumers of this significantly cheaper, high BTU content fuel.

In this Final Rule, EPA spells out how previously discarded non-hazardous secondary materials may be used in combustion units for fuel.   40 CFR §241.3(b)(4).  The Final Rule is careful to spell out the criteria for assuring the “legitimacy” of the non-hazardous secondary materials which are used as “fuel” or “ingredients” in combustion units.  40 CFR §§241.3(d)(1) and (d)(2).  With this change in approach by EPA to encourage development of fuels from discarded materials, entrepreneurs in the wings with off-the-shelf recycling technologies are now given EPA’s blessing to pursue a green solution to some of our country’s energy and emission reduction problems.

Copyright © 2011 Taft Stettinius & Hollister LLP. All rights reserved.

Defining “Journalist”: Whether and How A Federal Reporter’s Shield Law Should Apply to Bloggers

The National Law Review is proud to announce that  Laura Katherine Layton of  Georgetown University Law Center is one of our Student Legal Writing Contest Winners for March of 2011. Laura’s article focuses on whether there should be a federal reporter’s shield law and whether it should apply to bloggers.

In 2005, New York Times reporter Judith Miller garnered national attention for her refusal to disclose the identity of her source outing Valerie Plame Wilson as an operative of the Central Intelligence Agency. The D.C. Circuit rejected Miller’s claim that the identity of the source was protected by a reporter’s privilege. Her refusal to comply with a grand jury subpoena meant she was in contempt of court, and she spent eighty-five days in jail as a result.[1]

While Miller’s case reignited the public debate of the merits of a reporter’s privilege, the current issue for state and federal courts is defining the scope of the reporter’s shield law. Generally, areporter’s shield law is a “statutory privilege which allows a news gatherer to decline to reveal sources of information”[2] and newsgathering materials. Like the attorney/client and doctor/patient privileges, the reporter’s privilege attempts to foster the flow of information into public discussion.  The aim of the reporter’s privilege is to “increase the flow of information in circumstances in which society wishes to encourage open communication.”[3] The rationale for allowing nondisclosure about a reporter’s confidential source is based on the idea that forcing a reporter to reveal his source will cause  sources to communicate less openly with reporters as a result of  “fear of exposure” and will simultaneously cause “editors and critics to write with more restrained pens” due to “fear of accountability.”[4] The Second Circuit characterized the purpose of shield laws as the “public interest in the maintenance of a vigorous, aggressive and independent press capable of participating in robust, unfettered debate over controversial matters…”[5] To date, thirty-six states and the District of Columbia have enacted reporter shield laws codifying a reporter’s privilege,[6] though the scope of protection varies by state.  Congress has considered adopting a federal shield statute many times in the last forty years but has yet to pass the legislation.[7] Though in Branzburg v. Hayes the Supreme Court refused to recognize a special First Amendment privilege for journalists not to reveal their sources in the grand jury context,[8] it remains unclear whether a reporter’s privilege exists in criminal and civil proceedings.

Most states define the shield law protection by referring to a reporter or traditional news gatherer based on employment with an established media entity.[9] Currently, many courts are grappling with the scope of reporter’s shield laws due to the difficulty of defining who qualifies as a reporter, which is because of the changing nature of journalism—including the rise of internet publication of news by citizen journalists. There is a growing concern on how to define “journalist” so that current, unemployed, or freelance journalists are covered by the shield laws while “pajama-clad bloggers” are not entitled to invoke such a privilege.[10] There must be some limitation on the scope of the privilege; a shield law cannot apply to anyone with the ability to publish a blog on the internet.  As renowned media attorney Floyd Abrams stated, “If everybody’s entitled to the privilege, nobody will get it.”[11] Congress should pass a shield law granting a qualified privilege to persons who gather and disseminate information to the public with a true intent to do so at the outset of the newsgathering process.

If Congress were to draft a federal shield law, the main issue would be centered on how to define journalists. Implicit in that debate would be whether to include bloggers as persons covered by the privilege. Part I examines how state statutes have traditionally defined the privilege and how state courts have determined its scope. Part II analyzes the changing nature of journalism. Part III discusses the arguments in favor of and against including bloggers as journalists for shield law purposes, concluding that bloggers should qualify for protection. Part IV recommends how to appropriately tailor the privilege for citizen journalists publishing online. Part V weighs the costs and benefits of enacting a federal reporter’s shield law. Part VI recommends that Congress adopt a two-part test for a federal shield law for reporters that includes nontraditional journalists.

I.  Defining “Journalist”: Who is covered by Reporter’s Shield Laws

The struggle to define exactly who should be covered by reporter’s shield laws is not new.  Since state shield laws have existed since 1896, few shield laws explicitly include electronic news media. Courts have extended the scope of shield laws beyond only covering reporters working at newspapers to people working in magazines, radio, and television. Because many antiquated state shield laws define the privilege by medium, courts have decided whether publishing electronically meets the statutory definition. For example, California courts had to decide whether a website that conveyed confidential information about new Apple products was protected from divulging its sources by the shield law, which is codified in the state constitution.[12] The appellate court held the online publication constituted a “periodical publication” entitled to protection of the shield law because it published regularly.[13] States have amended their shield laws for advancing technologies of radio, television, and now the internet. Because the medium of communication is constantly changing, the medium of communication should not determine the scope of the privilege.

Instead of defining who qualifies to invoke the reporter’s privilege based upon a particular medium, some states embrace a definition of reporter based on the function of journalism. While some state statutes only provide the reporter’s privilege to persons employed by an established media entity, other states apply to any “person who is or has been directly engaged in the gathering, procuring, compiling, editing, or publishing of information for the purpose of transmission, dissemination, or publication to the public.”[14] State legislatures have rightly extended the privilege to all persons who gather and disseminate news to the public rather than limiting protection to only professional journalists.

Some courts have also embraced an intent standard based upon the function of journalism. In von Bulow, the Second Circuit held the privilege only protected a person who has the intent to disseminate the information to the public at the inception of the newsgathering process.[15] In this case, Andrea Reynolds invoked the reporter’s shield law to cover an unpublished manuscript of a book based on the notes she took as a paralegal to Claus von Bulow, who was charged with murdering his wife. The court rejected the claim that Reynolds’ manuscript and notes were privileged since she had not indicia of a freelance author and did not demonstrate that her intent to use the materials to disseminate the information to the public existed at the beginning of the newsgathering process.[16] The court emphasized a person invoking a journalist’s privileged need not be “associated with the institutionalized press because the ‘informative function asserted by representatives of the organized press is also performed by lecturers, political pollsters, novelists, academic researchers, and dramatists.’”[17] The privilege can be invoked by a novice, according to the Second Circuit; it is not limited to those who have a history of journalism, although “prior experience as a professional journalist may be persuasive evidence of present intent to gather for the purpose of dissemination.”[18]

Other courts have adopted the intent-based test when deciding whether a person protected by a journalist’s privilege. The First Circuit and the Ninth Circuit applied the von Bulow intent test when extending the privilege to a professor[19] and to a non-fiction writer of investigative books. [20] In determining whether the persons invoking the privilege were covered, both circuits analogized the function of an academic or of an author to the reporter’s role—the ultimate purposes are to aid investigative newsgathering. According to the Ninth Circuit: “[t]he journalist’s privilege is designed to protect investigative reporting, regardless of the medium used to report the news to the public. Investigative book authors, like more conventional reporters, have historically played a vital role in bringing to light ‘newsworthy’ facts on topical and controversial matters of great public importance.”[21] Basing its decision on the intent-based inquiry, the First Circuit extended the privilege to academic researchers because they “too are information gatherers and disseminators. Just as a journalist, stripped of sources, would write fewer, less incisive articles, an academician, stripped of sources, would be able to provide fewer, less cogent analyses.”[22]

State courts have also wrestled with whether a reporter’s privilege covers non-traditional journalists, including freelance writers,[23] authors,[24] documentary filmmakers,[25] academics,[26] and independent research consultants.[27] Hawaii is the only state to specifically include whether bloggers are protected by its shield law if certain conditions are met: “Non-traditional news gatherers, e.g., bloggers, are protected if (1) the individual invoking the privilege regularly participates in reporting or publishing news of significant public interest, (2) the person holds a position similar to a traditional journalist or newscaster, and (3) the public interest is served by extending the protection of the statute.” [28]

II.  Defining “Journalist”: The Changing Nature of Journalism

The Supreme’s Courts rejection of the press as the “fourth estate” of government in Branzburg was “remarkably (although unintentionally) prescient. As means of communication become more interactive and accessible to the public the ‘press’ of the twenty-first century is rapidly becoming more difficult to define.”[29] Because of the advent and ubiquity of the Internet, more people are able to contribute to the public discourse. The number of people contributing their ideas and opinions on the Internet has grown exponentially, including the number of blogs and blog-readers. There were over 34.5 million blogs at last count.[30]

While blogs blur the line between online diaries and news reporting, the influence of blogs on the mainstream media and the public dialogue cannot be overemphasized. Matt Drudge, the author of the Drudge Report, is but one example of a person setting the trend of breaking news by blogging.  He does not consider himself a journalist, but his website was the first to break the story of President Clinton’s affair with Monica Lewinsky. His blog also was the first to report that presidential candidate Bob Dole chose Jack Kemp as his running mate in the 1996 election, as well as that CBS fired Connie Chung. Other examples of blogs leading the national discussion include: bloggers recognized Senator Trent Lott’s controversial comments at Strom Thurmond’s one-hundredth birthday celebration, which led Lott’s resignation as Senate Majority Leader; bloggers revealed Dan Rather’s documents about President George W. Bush’s National Guard service were forged;  bloggers uncovered James Frey fictionalized portions of his memoir and also exposed the contents of inappropriate emails sent to House pages by Representative Mark Foley.[31]

Moreover, mainstream media outlets are embracing the changing nature of technology by incorporating the citizen journalism into reporting. Many mainstream media companies support blogs, and many reporters have their own blogs.[32] Most every news website encourages readers to leave comments online, and many mainstream media websites provide links to surveys and responses as well.[33] News organizations encourage members of the public to contribute content for publication by sharing photographs and stories of current events.  CNN promotes citizen journalism by asking viewers to submit pictures and videos of catastrophic weather events such as Hurricane Dennis.[34] Most recently, CNN encouraged people in Egypt to report on the uprisings in the country using Twitter, photographs, or videos.  CNN.com also created iReport, a section of its website “where people take part in the news with CNN. Your voice, together with other iReporters, helps shape how and what CNN covers every day.”[35]When one enters the site, the disclaimer pop-up on the browser declares: “So you know: iReport is the way people like you report the news. The stories in this section are not edited, fact-checked or screened before they post. Only ones marked ‘CNN iReport’ have been vetted by CNN.” [36] As part of a conscious effort to increase its circulation numbers by capitalizing on the popularity of blogs, Gannett, which owns over eighty newspapers around the United States, announced in November 2006 it was preparing to use non-journalists to develop content for its publications.[37]

The nature journalism is evolving; in fact, the notion of an institutional press is diminishing, if not vanishing. The inclusion of citizens as reporters of the news changes the role the mainstream media plays in our democracy.

III.  Should Bloggers Be Included as Journalists?

The purpose of a reporter’s shield law indicates that citizen journalists should be able to invoke the privilege. By allowing bloggers who disseminate information to the public to invoke a privilege to keep sources confidential, the purpose of the privilege is served: “to encourage sources to come forward with information for public debate while, at the same time, preventing both professional and non-profession journalists from becoming agents of the government, criminal defendants, or civil litigants.”[38] The purpose of the First Amendment, and thus journalists, is to enhance democracy through open, free debate. Citizen journalists who publish their content for the general public should qualify for the privilege. Because bloggers serve the essential purpose of disseminating news to the public, Mr. Abrams thinks many should be able to invoke privilege of traditional publishers:“I think a blogger…is not less deserving than a journalist who may communicate with a smaller audience through a small-town newspaper.”[39] According to the media attorney, “There should be protection so long as information was obtained for the purpose of dissemination to the public at large in some sort of analogous way to what journalists do.”[40]

In addition, Supreme Court precedent suggests bloggers should qualify for the privilege. Though at the time of Branzburg the Internet did not exist, the Court stated freedom of the press is “not confined to newspapers and periodicals” or “the large metropolitan publisher” but “necessarily embraces pamphlets and leaflets” and “every sort of publication which affords a vehicle of information and opinion.”[41] Indeed, the Court expressed a special concern for the “lonely pamphleteer who uses carbon paper or a mimeograph…”[42] Today’s version of the lonely pamphleteer is the “pajama-clad” blogger expressing his ideas and opinions in an online publication.

Some people argue that bloggers do not actually engage in journalism, but they are the next extension of the expanding categories of non-traditional journalists. State and federal courts have already found that the journalist’s shield law covers student journalists, professors, authors, and freelancers because these professions perform essentially the function as reporters: to gather and disseminate information to the public. Additionally, freedom of the press “is a right which belongs to the public; it is not the private preserve of those possess the implements of publishing.”[43] Moreover, claiming bloggers should not be able to invoke the privilege because they are “not trained,” do not “work as journalists full-time,” and/or are not “sufficiently dedicated to contributing to the public debate,” seems like a empty criticism at a time when “mainstream media organizations have substantially eroded their own credibility” with scandals such as Jayson Blair’s fabrication of sources and Dan Rather’s report based on inaccurate records. [44]

Many people criticize blogs as “opinion without expertise, without resources, without reporting.”[45] Blogs are often criticized as unreliable since bloggers, unlike journalists, do not have to submit their work to editors for approval before publication.  David Shaw, of the Los Angeles Times, complained “[m]any bloggers…don’t seem to worry much about being accurate. Or fair. They just want to get their opinions—and their ‘scoops’—out there as fast as they pop into their brains.”[46] Other critics carp that it is difficult for readers to differentiate between accurate and inaccurate blogs.[47]

Advocates of citizen journalism respond that many bloggers have incentives to report accurately, and mistakes are corrected as soon as they are posted.[48] Bloggers, like journalists, are liable for defamation; the threat of litigation “has a civilizing influence on the Internet communications by improving the quality of the discourse.”[49] In addition, blogs have the advantage of mustering the knowledge of millions of people, drawing upon the “wisdom of the crowds.” [50] Blogs certainly do not have a “monopoly on error”[51] as demonstrated by defamation suits filed against mainstream media companies.  Bloggers, like journalists, are concerned about their reputations with their readers. When interviewed by the Wall Street Journal, blogger Jeff Jarvis said, “[w]hen I make a mistake, people jump on me like white blood cells on a germ. If I don’t correct it, my reputation’s going to suffer.”[52] Additionally, conditioning the protection of a reporter’s shield on the accuracy of the individual claiming the privilege would be contrary to First Amendment principles espoused in New York Times v. Sullivan as “accuracy is relevant only in defamation actions, and even then there is no strict liability for falsehoods.” [53] Requiring accuracy would be “particularly troubling in the context of blogging, where the benefits of the medium do not come from complete accuracy of each posting but rather in its interactive nature with readers and critics.”[54]

Furthermore, blogs are not the only publications that are regarded with differing levels of trust; mainstream media outlets are subject to the same criticism.[55] Many critics object that major media entities are “too close to the corporations and politicians they cover to be trusted as watchdogs.”[56] Ironically, it may be that the escalation in the number and popularity of blogs is due to the public’s lack of confidence in mainstream journalism.[57] While the USA Today may be a more trusted source than the National Enquirer, reporters working for either publication “equally claim the title of ‘journalist.’”[58] Courts have refused “to segregate the media into tiers based on perceived quality or trustworthiness”[59] and should continue to do so when analyzing whether the reporter’s privilege applies to citizen journalists. The O’Grady court recognized the danger of a court evaluating the quality of journalism and thus “decline[d] the implicit invitation to embroil ourselves in questions of what constitutes ‘legitimate journalis[m]. The shield law is intended to protect the gathering and dissemination of news.”[60] Because the court could “think of no workable test or principle that would distinguish ‘legitimate’ from ‘illegitimate’ news,” it rejected “[a]ny attempt by courts to draw such a distinction” and warned that an attempt to draw such a distinction “would imperil a fundamental purpose of the First Amendment, which is to identify the best, most important, and most valuable ideas not by any sociological or economic formula, rule of law, or process of government, but through the rough and tumble competition of the memetic marketplace.”[61]

In its discussion of journalism, the California court also denied limiting the privilege to publications on matters of public concern. Though some have proposed a reporter’s privilege be available only to persons who publish information involving matters of public concern, the “administrative and theoretical difficulties”[62]of this approach are overwhelming. In the context of defamation law, the Supreme Court spent over fifteen years endeavoring to make a legal distinction based on “whether the content is a matter of public concern or newsworthy.”[63] According to Justice Douglas, “‘[P]ublic affairs’ includes a great deal more than merely political affairs. Matters of science, economics, business, art, literature, etc., are all matters of interest to the general public. Indeed, any matter of sufficient general interest to prompt media coverage may be said to be a public affair.”[64]It is imprudent to adopt an amorphous standard to limit the scope of a reporter’s privilege since it has been unworkable in the defamation context.

IV.  Defining “Journalist”: How to Include Bloggers in a Federal Shield Law

Since it is “neither possible nor prudent to limit a reporter’s privilege to professional journalists,”[65] a qualified privilege should be available to persons who disseminate information to the public with a real intent to do so at the inception of the newsgathering process.  Bloggers should be protected by reporter’s shield laws based on the function of journalism. Courts should examine the evidence of a blogger’s intent to publish in the same fact-specific manner as the court in von Bulow when it found no indicia that Andrea Reynolds was a freelance author.

In the 2009 version of a federal shield law, the Senate rightly defined “covered person” as a person

(i) with the primary intent to investigate events and procure material in order to disseminate to the public news or information…or other matters of public interest, [who] regularly gathers, prepares, …writes, edits, reports or publishes on such matters…

(ii) has such intent at the inception of the process of gathering the news or information sought; and

(iii) obtains the news or information sought in order to disseminate the news or information by [any] means…[66]

The “intent to disseminate” test is grounded in the rationale of the privilege— “to provide protection for the unfettered dissemination of information to the public.”[67] Those who contribute to the public discourse should be able to avail the privilege. However, one weakness of the standard is that it “focuses on the intent of the reporter at the time it was received.” [68] Most veteran reporters in the nation would “admit that many of their stories come to them when they are not even looking for them…Reporters often have no idea at the time they are collecting information whether they will in fact share that information with the public.”[69] Using the intent test alone, it is unclear whether a “reporter who has a friendly conversation with an acquaintance and then later decides to pursue a story based on what she learned in that conversation”[70] would be protected by the privilege. Although intended to disqualify a savvy person who “conveniently” characterizes herself as a journalist in order to invoke the privilege,  the von Bulow intent test could also have the “effect of denying the privilege to even the most established and dedicated full-time journalists.”[71]

This is why the federal statute should include a two-part test for the definition of a journalist: the traditional definition and the function test.[72] The first definition of a journalist should be the traditional definition that includes an association with a media entity, which would avoid the aforementioned problem of professional journalists possibly not being able to invoke the privilege. The second definition of journalist should be the intent-based test based on the function of journalism, which would cover bloggers and other non-traditional journalists. The test would be a fact-based inquiry like the close examination of Reynolds’s intent to publish in von Bulow. This tough standard would ensure limitations on the privilege rather than extending it to anyone with a computer and an Internet connection.

The qualified privilege could be overcome by showing three elements: “(1) the desired information is critical to the maintenance of a party’s claim, defense, or proof of an issue; (2) the information sought cannot be obtained by alternative means; and (3) there is a compelling interest in the information that outweighs the public’s interest in the free flow of information.”[73] The Senate essentially created the same parameters for a qualified privilege in its proposed legislation in 2009.[74] A qualified privilege would “soften the blow of an expansive definition of those persons and entities entitled to invoke it.”[75]

The federal reporter’s shield law should also include narrow exceptions to the privilege for “circumstances in which countervailing societal interests outweigh any societal interest in preserving the privilege.” This includes circumstances when a subpoena is “directed to someone who witnessed or participated in a criminal or tortious activity (exclud[ing] ‘leaks’ of classified or national security information).” [76] Another exception would include times when a “direct and imminent threat to national security warrants compelling testimony”[77] or when “reasonably certain death or substantial bodily harm” may occur.[78] These three basic exceptions were also outlined in the Senate’s most recent attempt to pass a federal reporter shield law.[79]

Most courts have held that journalists who participate in a crime are barred from invoking the privilege.[80] Accordingly, this exception does not harm the underlying purpose of the privilege since there is “no value in encouraging sources to commit crimes in front of journalists.”[81] Leaking classified information should not fall under the crime exception since “leaks of government information, whether classified or not, have become an essential means by which the public learns about government activities.” [82] Since current protection is inadequate for whistleblowers, and “as a result, leaking information to the press is often the only realistic means of shedding light on questionable or illegal government practices,”[83] a privilege protecting whistleblowers encourages such persons to come forward serves the public interest. Prosecuting those who leak national security or other classified information is not hindered by a reporter shield law.[84]

Though most fears that a federal shield law would undermine national security are misplaced, there should be an exception to the privilege “if the reporter’s testimony would help prevent a direct and imminent threat to national security.” [85] The Supreme Court recognized an exception  for “imminent threat” to national security in the Pentagon Papers case, which concluded that the “presumption against prior restraints could not be overridden absent an immediate and serious threat to national security.” [86] This is a reasonable standard that should apply to the reporter’s privilege.

Finally, an exception for preventing “death or bodily harm to another human being applies to other testimonial privileges, including the attorney-client privilege.”[87] It is prudent to extend this exception to the reporter’s privilege “because in such cases the public’s interest in the information far outweighs the public’s interest in encouraging anonymous sources from coming forward.”[88]

V.  The Costs and Benefits of a Federal Reporter Shield Law

The most significant cost of any privilege is that it deprives courts of evidence. Critics claim that a privilege closes the courts for individuals harmed as a result of the free press, that a shield creates an exception to courts as a place to redress injury.[89] However, defamatory statements are actionable regardless of the enactment of a shield law.  There is no privilege if the media caused the damage.[90]Moreover, some states “explicitly reject the privilege when a media entity is a party to the litigation, a situation that typically occurs in defamation cases,” while others supply the media with some “protection by requiring a plaintiff to demonstrate that the information is important for her case and that she has attempted to obtain the information through other means.”[91]

According to opponents of the privilege, it benefits the media; enacting a federal shield law would lead to accountability problems if reporters are not forced to reveal anonymous sources.[92] The purpose of the privilege is to help the free flow of information to the public rather than aid the press. The privilege benefits the public and whistleblowers and does not hinder law enforcement. In fact, adopting a reporter’s privilege is viewed “as a necessary component of a larger criminal law reform, based on the hope that with this new protection reporters would be more willing to publish stories revealing criminal activity. The states’ enthusiasm for shield laws suggests that such laws enhance rather than detract from the ability of law enforcement to fight crime.” [93] Not having a federal privilege actually hinders attorneys general. Federal and state privileges should mirror each other since reporters do not know where a subpoena will come from. A federal reporter shield law creates certainty for reporters and attorneys. [94]Thirty-five states with shield laws submitted an amici curiae brief to the Supreme Court of the United States arguing for a grant of certiorari in Judith Miller’s case because the lack of a federal  privilege undermines the judicial and legislative determinations of forty-nine states and the District of Columbia.[95]

The irony of not enacting a federal shield law in an age of Wikileaks means that websites such as Wikileaks are more likely to receive information and documents than a reporter, who would verify the information, edit statements, and redact necessary portions. Without a reporter’s shield law, it is likely that sources will go to Wikileaks, which sends information directly to the public and is not subject to professional ethics. Wikileaks is empowered if reporters are not allowed to protect their sources. [96]

VI.  Conclusion

A federal shield law for reporters and citizen journalists would benefit the public by protecting whistleblowers and encouraging anonymous sources to reveal information to responsible disseminators of the news. Because the purpose of the privilege is to help the flow of information to the public, Congress should pass a federal shield reporter’s shield law that protects traditional and citizen journalists. The privilege should not simply cover members of the traditional press, for “[t]he First Amendment does not guarantee the press a constitutional right… not available to the public generally.”[97] Congress should combine the traditional definition of a reporter associated with a media entity with an intent-based inquiry based on the function of journalism to create a federal reporter’s shield law to enhance the First Amendment and encourage the free flow of information in our democracy.


[1] See In re Grand Jury Subpoena, Judith Miller, 397 F.3d 964, 976-980 (D.C. Cir. 2005); Key Players in the CIA Leak Investigation, http://www.washingtonpost.com/wp-srv/politics/special/plame/Plame_KeyPla…

[2]81 Am. Jur. 2d Witnesses § 526 (2010).

[3] Mary-Rose Papandrea, Citizen Journalism and the Reporter’s Privilege, 91 Minn. L. Rev. 515, 535-36 (2007) (discussing the purpose of the privilege).

[4] Branzburg v. Hayes, 408 U.S. 665, 721 (1972) (Douglas, J., dissenting).

[5] von Bulow v. von Bulow, 811 F.2d 136, 144 (2d Cir. 1987).

[6] David Kohler & Lee Levine, Media and the Law 529 (Matthew Bender 2009).

[7] See, e.g.,Free Flow of Information Act of 2009, S.448, 111th Cong. § 1-11 (2009); Free Flow of Information Act of 2007, S.2035, 110th Cong. § 1-8 (2007).

[8] Branzburg, 408 U.S. at 682.

[9] See, e.g., Ala. Code § 12-21-142 ; 10 Del.C. § 4320 (4).

[10] See In re Grand Jury Subpoena, Judith Miller, 397 F.3d  at  976-980 (Sentelle, J., concurring) (noting the difficulties of determining who qualifies as a reporter and expressing concern about “whether the stereotypical ‘blogger’ sitting in his pajamas at his personal computer posting on the World Wide Web” would be entitled to invoke the privilege).

[11] Floyd Abrams Explains Why He Should Lose, http://www.pajamasmedia.com/instapundit-archive/archives/019677.php

[12] Cal. Const. art. I, § 2(b).

[13] O’Grady v. Superior Court, 44 Cal.Rptr.3d 72 (Cal. Ct. App. 2006).

[14] Minn. Stat. § 595.023 (2004).

[15] von Bulow, 811 F.2d  at 143.

[16] Id. at 145.

[17] Id. at 145 (quoting Branzburg v. Hayes, 408 U.S. 665, 705 (1972)).

[18] Id. at 144.

[19] Cusumano v. Microsoft Corp., 162 F.3d 708, 714 (1st Cir. 1998).

[20] Shoen v. Shoen, 5 F.3d 1289, 1293 (9th Cir. 1993).

[21] Id. at 1293.

[22] Cusumano, 162 F.3d at 714.

[23] See People v. Von Villas, 13 Cal. Rptr. 2d 62, 78-79 (Cal. Ct. App. 1992) (holding California privilege applied to freelance author ).

[24] See e.g., Shoen, 5 F. 3d at 1290-91.

[25] See Silkwood v. Kerr-McGee Corp., 563 F.2d 433, 436-37 (10th Cir. 1977) (holding privilege applied to documentary filmmaker whose “mission…was to carry out investigative reporting for use in the preparation of a documentary film”).

[26] See Cusumano, 162 F.3d at 714.

[27] See Summit Tech., Inc. v. Healthcare Capital Group, Inc., 141 F.R.D. 381, 384 (D. Mass. 1992)(holding independent research consultant was “engaged in the dissemination of investigative information to the investing business community” on “matters of public concern,” and was therefore “entitled to raise the claim of privilege”).

[28] See Privilege Compendium, http://www.rcfp.org/privilege/index.php?op=browse&state=HI

[29] Papandrea, supra note 3, at 523.

[30] Id.

[31] See id.

[32] See e.g, Ezra Klein’s blog, Economic Policy, and Lots of It, http://voices.washingtonpost.com/ezra-klein/.

[33] See e.g., http://www.nytimes.com/; http://www.washingtonpost.com/.

[34] See cnn.com/.

[35] http://ireport.cnn.com/.

[36] See id.

[37] See Papandrea, supra note 3, at 532.

[38] Id. at 585.

[39] Floyd Abrams, supra note 13.

[40] Id.

[41] Branzburg, 408 U.S. at 704.

[42] Id.

[43] State v. Buchanan, 436 P.2d 729, 731(Or. 1967).

[44] Papandrea, supra note 3, at 573-74.

[45] See id., at 528.

[46] Id.

[47] Id.

[48] See id.

[49] Id.at 530.

[50] See Papandrea, supra note 3, at 529.

[51] See id. at 530.

[52] See id. at 529.

[53] Id., at 576.

[54] Id.

[55] Id.at 530.

[56] See Papandrea, supra note 3,at 524.

[57] Id.

[58] Id.at 530.

[59] Id.

[60] O’Grady, 44 Cal.Rptr.3d at 97.

[61] Id.

[62] Papandrea, supra note 3, at 578.

[63] Id.

[64] Gertz v. Robert Welch, 418 U.S. 323, 357 (1974) Douglas, J. dissenting).

[65] Papandrea, supra note 3, at 520.

[66] Free Flow of Information Act of 2009, supra note 7.

[67] Papandrea, supra note 3, at 572.

[68] Id.

[69] Id.

[70] Id.

[71] Id.at 573.

[72] Interview with Kurt Wimmer, partner, Covington & Burling, in Washington, D.C. (Dec.17, 2010).

[73]Papandrea, supra note 3,  at 584.

[74] See Free Flow of Information Act of 2009, supra note 7.

[75] Papandrea, supra note 3, at 585.

[76] Id.

[77] Id.at 520-21.

[78] Id. at 588.

[79] See Free Flow of Information Act of 2009, supra note 7.

[80] Papandrea, supra note 3, at 587.

[81] Id.

[82] Id. at 588.

[83] Id.

[84] See id.

[85] Id.at 588-89.

[86] Papandrea, supra note 3, at 589.

[87] Id.

[88] Id.at 589-90.

[89] Interview with Mark Grannis, managing partner, Wiltshire & Grannis, in Washington, D.C. (Dec. 8, 2010).

[90] Interview with Kurt Wimmer, supra note 79.

[91] Papandrea, supra note 3, at 548.

[92] Interview with Mark Grannis, supra note 96.

[93] Papandrea, supra note 3, at 535.

[94] Interview with Kurt Wimmer, supra note 79.

[95] Brief of the States of Oklahoma, et al. as Amici Curiae in Support of the Petitions for Writs of Certiorari, Cooper v. United States, 545 U.S. 1150 (2005), denying cert. to In re Grand Jury Subpoena, Judith Miller, 397 F.3d 964 (D.C. Cir. 2005).

[96]Interview with Kurt Wimmer, supra note 79.

[97] Branzburg, 408 U.S. at  684.

© Copyright 2011 Laura Katherine Layton

A Brave New World for Commercial Buildings: ASTM's "BEPA" Standard

Recently posted at the National Law Review by Douglas J. Feichtner of Dinsmore & Shohl LLP –   ASTM BEPA standard is expected to become the standard for building energy use data collection. 

On February 10, 2011, ASTM formally published its Building Energy Performance Assessment (BEPA) Standard – E 2797-11. This standard will enable users to measure the energy performance of a commercial building in connection with a real estate transaction. Regulatory drivers spurred the development of the BEPA standard, even in the midst of a construction recession. In the past few years, several states and local governments passed mandatory building energy labeling and transactional disclosure regulations. These disclosure regulations, combined with some building codes that are now requiring specific energy-efficiency improvements, triggered the development of a standardized methodology to assess and report on a commercial building’s energy use. The BEPA’s passage arrives at a crucial time when building certification standards face increased scrutiny, both in the market and the courtroom.

The ASTM BEPA standard includes the following five components: (1) site visit; (2) records collection; (3) review and analysis; (4) interviews; and (5) preparation of a report. ASTM is not creating or implying the existence of a legal obligation for the reporting of energy performance or other building-related information. Rather, the BEPA offers certain guidelines to the industry to promote consistency when collecting (and perhaps reporting) buildings’ energy usage data, such as:

 

  • collecting building characteristic data (i.e., gross floor area, monthly occupancy, occupancy hours)
  • collecting a building’s energy use over the previous three years (with a minimum of one year) – including weather data representative of the area where the building is located;
  • analyzing variables to determine what constitutes the average, upper limit, and lower limit of a building’s energy use and cost conditions;
  • determining pro forma building energy use and cost; and
  • communicating a building’s energy use and cost information in a report

One of the options available to users of the BEPA standard is to identify government-sponsored energy efficiency grant and incentive programs that may be available for any energy efficiency improvements that could be installed at the building (thereby increasing its value, and making it more attractive to potential buyers).

Building benchmarking (i.e., comparing a building’s energy output to its peers) is not part of the ASTM BEPA standard’s primary scope of work, but rather a “non-scope consideration.” The BEPA certainly could be used in conjunction with building certification tools already in the marketplace, such as ASHRAE, Green Globes, and U.S. Green Building Council (LEED), to name a few.

However, as the economic noose has tightened in recent years, green building standards have received increased scrutiny. Indeed, builders and landlords who sell their properties with the promise that they have some green certification (which can be expensive to obtain), and that promise for whatever reason fails to translate to the economic savings contracted for, could face liability.

The Gifford v. USGBC lawsuit currently pending in the United States District Court for the Southern District of New York crystallizes the debate over green building certification (in this case – LEED). The core allegations in the lawsuit prompt this author to see significant value for stakeholders to use ASTM’s BEPA as a supplement to applying rating and benchmarking systems like LEED.

Gifford’s primary complaint is that LEED-certified buildings are not as energy-efficient as advertised. Support for this contention rests on Gifford’s analysis of a 2008 New Buildings Institute (NBI) study comparing predicted energy use in LEED-certified buildings with actual energy use. In the study, NBI concluded that LEED buildings are 25-30% more energy-efficient compared to the national average. To the contrary, Gifford concluded that LEED-certified buildings use 29% more energy than the national average. He further emphasized that the NBI results were skewed in part because the NBI study compared the median energy use of LEED buildings to the mean energy use of non-LEED buildings.

The purpose of this article is not to comment on the merits of the Gifford lawsuit or criticize LEED. But this apples-to-oranges argument articulated by Gifford magnifies the proverbial elephant in the “green” room – the need for sufficient objective data to accurately compare the energy use and energy cost of buildings against their relevant peer groups. With such data in hand, the benchmarking and rating systems already in place can be buttressed with a greater measure of consistency and transparency (a big issue for detractors of green building certification, like Gifford). Furthermore, the more stakeholders in the real estate industry (buyers, sellers, lenders) understand how a building’s energy performance was determined, the better equipped they will be to put a price on the economic and environmental benefits of green buildings.

In sum, the ASTM BEPA standard is expected to become the standard for building energy use data collection. It can be used to quantify a building’s energy use as well as its projected energy use and cost ranges, factoring in a number of independent variables (i.e., weather, occupancy rates), by way of a transparent process. Finally, the BEPA building energy use determination can complement compliance reporting under applicable building energy labeling or disclosure obligations. In the end, ASTM’s BEPA can provide the foundation by which an apples-to-apples comparison can take place in evaluating commercial building energy performance determinations and certifications.

© 2011 Dinsmore & Shohl LLP. All rights reserved.