ABA Recent Developments in State and Local Government Law – Live Webinar Teleconference Series May 19th

The National Law Review wanted to bring your attention to the upcoming Live Webinar and Teleconference Series on Recent Developments in State and Local Government Law

Program Information:    

Thursday, May 19, 2011—11:00 AM – 12:30 PM Eastern 
Sex, Drugs and Government?
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1sdg

Thursday, May 19, 2011—1:00 PM – 2:00 PM Eastern 
Cyberbullying
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1cbb

Thursday, May 19, 2011—2:30 PM – 3:30 PM Eastern 
Ethics of Social Networking (Ethics Credit)
Program Description Individual Online Registration | Group Online Registration 
Event Code: cet1esn

Register for the entire series or alternatively view additional information and register for individual programs by clicking here.   CLE credit available.


 

The Six Biggest Mistakes Law Firms Make When They Upgrade Technology

Recent featured blogger at the National Law Review –  Ben M. Schorr of Roland Schorr & Tower – provides some great insights into common mistakes made by lawfirms when upgrading technology.   

As an information services professional I’ve spent the past two decades helping law firms with their technology. Over that time I’ve come to identify 6 major mistakes that they tend to make when they install or upgrade new technology.

#1. They Don’t Have A Goal.

It’s important before you even consider upgrading your technology to ask this question: What problem are we solving? Too many firms forget what business they’re in and run around installing fancy new systems that don’t address any specific needs. Sometimes they’re talked into it by vendors or consultants; sometimes it’s the brainchild of a computer-savvy associate or staff member. Far too often the result is a lot of money spent for new systems and no increase in productivity. If you don’t have a goal, you’ll never reach it. Back home in Indiana folks say “If you don’t know where you’re going, pull over and stop ’cause you’re there.” This is rarely truer than in technology where you are constantly bombarded with possible routes – in the form of cool toys – but unless you have a destination it makes no sense to even start the car.

How can I avoid making this mistake?

Start by identifying the problem. Write it down. Write down the proposed answers. Review the problem (and proposed solutions) with the users and with your information services people (or consultants). Once you have a clearly defined (and agreed upon) problem and solution, set a timetable. Make it realistic. This can be one of the hardest parts of this step because you don’t want to rush things and end up with a hastily implemented, and poorly constructed, solution.  But at the same time you can’t drag your feet too much or the technology will change right out from under you and you may find that your preferred solution has been discontinued in favor of a new and improved (read that “more sophisticated and expensive”) solution.

#2. They Don’t Talk To Their Users.

Too many firms get a great idea for a new technology, throw the switch and roll it out to their users without even much warning to the users that it’s going to happen. As a result there is confusion, resentment, fear and a LOSS of productivity.

How can I avoid making this mistake?

Don’t just impose change from the top down or you’ll end up with users who resent and are intimidated by the new technology. Ask them what they need. Ask how they will use it. Have them compose a “wish list”. Observe their procedures. You’ll find that the users will accept the new systems much faster and easier if they have some input into its selection/creation. If you’re in a large firm consider putting together a users group of various staff members. Try to include at least two members of each category (partners, associates, paralegals, support staff, accounting, etc.) and don’t just pick the ones who know a lot about technology. Oftentimes the most valuable input will come from that partner or secretary who is awkward with the computers. Have them meet each month and ask them to talk about how the technology is (or isn’t) working for them. Have them suggest improvements. It’s important that you listen to their input and let you know that you value their contributions.

#3. They Don’t Do Their Homework (Or Pay The Smartest Kid In Class To Do It For Them).

I often see firms that buy a solution they don’t understand. What is it? How does it work? Why do we need this again? Many times they see a flashy ad or get a presentation from a salesman and sign the papers in the excitement of the moment.   They don’t clearly understand the problem or how this solution solves it.

How can I avoid making this mistake?

Do your research. Visit the Internet sites for the products you’re interested in. Visit the sites of some of their competitors. Read the trade magazines and try to keep a handle on what’s happening in the industry. Talk to the users (see #2) and vendors. Attend demos and seminars. You’ll probably have to start learning about the technology at least 3-4 months before you plan to upgrade or the hill will be too steep to climb. If you can’t (or don’t want to) do the research yourself, find a consultant that you feel comfortable with. Get recommendations from other firms in your area of people they’ve enjoyed working with. Ideally the consultant should be familiar with the solutions you’re interested in, but shouldn’t sell those solutions themselves (that way he has no financial interest in selling you something you don’t need). Never hire a consultant that you don’t trust completely. Your consultant should be able to explain the basics of the relevant technology to you in language you can understand and, most importantly, should be able to clearly explain the expected benefits to you.

#4. They Don’t Document Everything.

At one firm I worked for, I discovered that they had an entire floor of the building wired for network cabling but didn’t have a map or any other documentation about the cabling. All they had was plugs in the walls and loose wires in the computer closet. As you can imagine troubleshooting cabling problems became quite an adventure. It’s far too common to ask what kind of hardware is in use and have firms not know for sure.   Documentation failures go well beyond cabling – system configurations, numbers of licenses, software in use…oftentimes goes unrecorded and when it’s time to troubleshoot or upgrade there is not enough information available to make good decisions or accurately foresee potential problems.

How can I avoid making this mistake?

The solution is easy, but can be tedious. Insist upon complete documentation from your vendors. Maps of cabling. Labels on everything. When you deploy new equipment keep a file that indicates serial numbers and specifications (RAM, hard drive, processor, operating system, etc.). Often you can get that information from the invoice you received for the machine. Keep a list of what software you have in use, how many licenses you own, and what versions you’re running.  Document the date that the system or application was deployed and from where it was purchased. This documentation can make troubleshooting MUCH easier down the road.

#5. They Skimp On Training.

This is a VERY common error. It never fails to surprise me when I see a firm that will spend $50,000 on computer equipment but won’t spend $500 to train the users.

How can I avoid making this mistake?

The most important part of your system is the user – upgrade them! Would you fly an airline that advertises that “All of our pilots have driver’s licenses and we have a copy of “Big Planes for Dummies” in every cockpit!” I doubt it…yet many of you are flying your firms with crucial personnel who haven’t had even 20 minutes worth of training in the products that you depend upon to get your work done. Even long after the installation training can be productive. You may think that your assistant knows the ins & outs of your word processor, but what if a 2-hour class could teach him or her new tricks or secrets to get things done faster? If these new tricks saved them just 12 minutes a day that would be an entire HOUR each week that they’d gain. In a month they’d have recouped all of the time invested in the class, twice over. This goes for executives as well, by the way…

Consider bringing in an outside trainer (or even an inside resource) to do a 1-hour lunchtime training in your conference room.  Try producing an internal e-newsletter with tips and tricks for the products you use (ProLaw, Word, Excel, WordPerfect or whatever).  Encourage your users to have interest and discussions about technology.

Consider creating a “Trick of the Week” award where the person in your firm who submits the best new trick or tip for using your systems wins some prize – maybe a prime parking space in your lot for the week, an extra-long lunch break on Friday or a box of chocolates.

#6. They Don’t Follow-Up.

This comes back to talking to your users. If you don’t look out the window how do you know if you reached your destination? Don’t find out 6 months later that the staff hates the new software or that the new printers don’t work properly.

How can I avoid making this mistake?

After the upgrade is in place you need to contact your users and ask them if they’re happy. Try to be there when they first use it to get their initial reaction. Check in with them again the following day. Check in again the next week…and again weekly or bi-weekly for the next month or two. Look back at your written “goal” from #1 and see if you’ve solved your problem. If you didn’t, figure out why and make adjustments. Users will often forgive you if you find and fix problems quickly they often won’t forgive you if you give them a “solution” that doesn’t work and then leave them to deal with it on their own. Many times you’ll find that the problems are really “pilot error” and can be corrected with more (or better) training. Sometimes the problems will be equipment or software problems and finding them in the first days or weeks can mean the difference between getting your vendor to replace the inadequate product with something more suitable and getting stuck with it for the long term.

Preventing these mistakes takes a little effort but it’s not expensive. What’s expensive is making these mistakes and ending up with a system that you paid considerable money for and that leaves your users frustrated and your productivity down.

Copyright ©2011 Ronald Schorr

EPA Redefines “Solid Waste” to Incentivize Creative Fuel Technology: Garbage to Gold

Recent Guest Blogger at the National Law Review  Kim K. Burke  of  Taft Stettinius & Hollister LLP highlights how the EPA recently changed the definition of Solid Waste and how this can lead to new fuel technology

Since the Resource Conservation and Recovery Act (RCRA, 42 U.S.C. §6901, et seq.) first became law, consternation among the regulated community has grown as a principal purpose of RCRA, namely, to encourage discarded material reuse as fuel, appears to have been ignored in EPA’s rulemaking.  Perhaps that discouraging trend is coming to an end.  On February 21, 2011, EPA released a pre-publication version of a proposed Final Rule amending the definition of “solid waste.”  What is particularly encouraging about the Final Rule is that innovative technologies for creating fuels from materials that would have previously been characterized as a “solid waste” are excluded from the definition.  This opens the door to creative technologies to transform municipal garbage into useable fuels for utilities and industrial boilers.  Not only does this technology reduce the amount of precious landfill space being consumed by valuable organic material, but it also offers the prospect of reduced and more easily controlled emissions from industrial boilers and fossil-fueled electric utilities that promise to be large consumers of this significantly cheaper, high BTU content fuel.

In this Final Rule, EPA spells out how previously discarded non-hazardous secondary materials may be used in combustion units for fuel.   40 CFR §241.3(b)(4).  The Final Rule is careful to spell out the criteria for assuring the “legitimacy” of the non-hazardous secondary materials which are used as “fuel” or “ingredients” in combustion units.  40 CFR §§241.3(d)(1) and (d)(2).  With this change in approach by EPA to encourage development of fuels from discarded materials, entrepreneurs in the wings with off-the-shelf recycling technologies are now given EPA’s blessing to pursue a green solution to some of our country’s energy and emission reduction problems.

Copyright © 2011 Taft Stettinius & Hollister LLP. All rights reserved.

Defining “Journalist”: Whether and How A Federal Reporter’s Shield Law Should Apply to Bloggers

The National Law Review is proud to announce that  Laura Katherine Layton of  Georgetown University Law Center is one of our Student Legal Writing Contest Winners for March of 2011. Laura’s article focuses on whether there should be a federal reporter’s shield law and whether it should apply to bloggers.

In 2005, New York Times reporter Judith Miller garnered national attention for her refusal to disclose the identity of her source outing Valerie Plame Wilson as an operative of the Central Intelligence Agency. The D.C. Circuit rejected Miller’s claim that the identity of the source was protected by a reporter’s privilege. Her refusal to comply with a grand jury subpoena meant she was in contempt of court, and she spent eighty-five days in jail as a result.[1]

While Miller’s case reignited the public debate of the merits of a reporter’s privilege, the current issue for state and federal courts is defining the scope of the reporter’s shield law. Generally, areporter’s shield law is a “statutory privilege which allows a news gatherer to decline to reveal sources of information”[2] and newsgathering materials. Like the attorney/client and doctor/patient privileges, the reporter’s privilege attempts to foster the flow of information into public discussion.  The aim of the reporter’s privilege is to “increase the flow of information in circumstances in which society wishes to encourage open communication.”[3] The rationale for allowing nondisclosure about a reporter’s confidential source is based on the idea that forcing a reporter to reveal his source will cause  sources to communicate less openly with reporters as a result of  “fear of exposure” and will simultaneously cause “editors and critics to write with more restrained pens” due to “fear of accountability.”[4] The Second Circuit characterized the purpose of shield laws as the “public interest in the maintenance of a vigorous, aggressive and independent press capable of participating in robust, unfettered debate over controversial matters…”[5] To date, thirty-six states and the District of Columbia have enacted reporter shield laws codifying a reporter’s privilege,[6] though the scope of protection varies by state.  Congress has considered adopting a federal shield statute many times in the last forty years but has yet to pass the legislation.[7] Though in Branzburg v. Hayes the Supreme Court refused to recognize a special First Amendment privilege for journalists not to reveal their sources in the grand jury context,[8] it remains unclear whether a reporter’s privilege exists in criminal and civil proceedings.

Most states define the shield law protection by referring to a reporter or traditional news gatherer based on employment with an established media entity.[9] Currently, many courts are grappling with the scope of reporter’s shield laws due to the difficulty of defining who qualifies as a reporter, which is because of the changing nature of journalism—including the rise of internet publication of news by citizen journalists. There is a growing concern on how to define “journalist” so that current, unemployed, or freelance journalists are covered by the shield laws while “pajama-clad bloggers” are not entitled to invoke such a privilege.[10] There must be some limitation on the scope of the privilege; a shield law cannot apply to anyone with the ability to publish a blog on the internet.  As renowned media attorney Floyd Abrams stated, “If everybody’s entitled to the privilege, nobody will get it.”[11] Congress should pass a shield law granting a qualified privilege to persons who gather and disseminate information to the public with a true intent to do so at the outset of the newsgathering process.

If Congress were to draft a federal shield law, the main issue would be centered on how to define journalists. Implicit in that debate would be whether to include bloggers as persons covered by the privilege. Part I examines how state statutes have traditionally defined the privilege and how state courts have determined its scope. Part II analyzes the changing nature of journalism. Part III discusses the arguments in favor of and against including bloggers as journalists for shield law purposes, concluding that bloggers should qualify for protection. Part IV recommends how to appropriately tailor the privilege for citizen journalists publishing online. Part V weighs the costs and benefits of enacting a federal reporter’s shield law. Part VI recommends that Congress adopt a two-part test for a federal shield law for reporters that includes nontraditional journalists.

I.  Defining “Journalist”: Who is covered by Reporter’s Shield Laws

The struggle to define exactly who should be covered by reporter’s shield laws is not new.  Since state shield laws have existed since 1896, few shield laws explicitly include electronic news media. Courts have extended the scope of shield laws beyond only covering reporters working at newspapers to people working in magazines, radio, and television. Because many antiquated state shield laws define the privilege by medium, courts have decided whether publishing electronically meets the statutory definition. For example, California courts had to decide whether a website that conveyed confidential information about new Apple products was protected from divulging its sources by the shield law, which is codified in the state constitution.[12] The appellate court held the online publication constituted a “periodical publication” entitled to protection of the shield law because it published regularly.[13] States have amended their shield laws for advancing technologies of radio, television, and now the internet. Because the medium of communication is constantly changing, the medium of communication should not determine the scope of the privilege.

Instead of defining who qualifies to invoke the reporter’s privilege based upon a particular medium, some states embrace a definition of reporter based on the function of journalism. While some state statutes only provide the reporter’s privilege to persons employed by an established media entity, other states apply to any “person who is or has been directly engaged in the gathering, procuring, compiling, editing, or publishing of information for the purpose of transmission, dissemination, or publication to the public.”[14] State legislatures have rightly extended the privilege to all persons who gather and disseminate news to the public rather than limiting protection to only professional journalists.

Some courts have also embraced an intent standard based upon the function of journalism. In von Bulow, the Second Circuit held the privilege only protected a person who has the intent to disseminate the information to the public at the inception of the newsgathering process.[15] In this case, Andrea Reynolds invoked the reporter’s shield law to cover an unpublished manuscript of a book based on the notes she took as a paralegal to Claus von Bulow, who was charged with murdering his wife. The court rejected the claim that Reynolds’ manuscript and notes were privileged since she had not indicia of a freelance author and did not demonstrate that her intent to use the materials to disseminate the information to the public existed at the beginning of the newsgathering process.[16] The court emphasized a person invoking a journalist’s privileged need not be “associated with the institutionalized press because the ‘informative function asserted by representatives of the organized press is also performed by lecturers, political pollsters, novelists, academic researchers, and dramatists.’”[17] The privilege can be invoked by a novice, according to the Second Circuit; it is not limited to those who have a history of journalism, although “prior experience as a professional journalist may be persuasive evidence of present intent to gather for the purpose of dissemination.”[18]

Other courts have adopted the intent-based test when deciding whether a person protected by a journalist’s privilege. The First Circuit and the Ninth Circuit applied the von Bulow intent test when extending the privilege to a professor[19] and to a non-fiction writer of investigative books. [20] In determining whether the persons invoking the privilege were covered, both circuits analogized the function of an academic or of an author to the reporter’s role—the ultimate purposes are to aid investigative newsgathering. According to the Ninth Circuit: “[t]he journalist’s privilege is designed to protect investigative reporting, regardless of the medium used to report the news to the public. Investigative book authors, like more conventional reporters, have historically played a vital role in bringing to light ‘newsworthy’ facts on topical and controversial matters of great public importance.”[21] Basing its decision on the intent-based inquiry, the First Circuit extended the privilege to academic researchers because they “too are information gatherers and disseminators. Just as a journalist, stripped of sources, would write fewer, less incisive articles, an academician, stripped of sources, would be able to provide fewer, less cogent analyses.”[22]

State courts have also wrestled with whether a reporter’s privilege covers non-traditional journalists, including freelance writers,[23] authors,[24] documentary filmmakers,[25] academics,[26] and independent research consultants.[27] Hawaii is the only state to specifically include whether bloggers are protected by its shield law if certain conditions are met: “Non-traditional news gatherers, e.g., bloggers, are protected if (1) the individual invoking the privilege regularly participates in reporting or publishing news of significant public interest, (2) the person holds a position similar to a traditional journalist or newscaster, and (3) the public interest is served by extending the protection of the statute.” [28]

II.  Defining “Journalist”: The Changing Nature of Journalism

The Supreme’s Courts rejection of the press as the “fourth estate” of government in Branzburg was “remarkably (although unintentionally) prescient. As means of communication become more interactive and accessible to the public the ‘press’ of the twenty-first century is rapidly becoming more difficult to define.”[29] Because of the advent and ubiquity of the Internet, more people are able to contribute to the public discourse. The number of people contributing their ideas and opinions on the Internet has grown exponentially, including the number of blogs and blog-readers. There were over 34.5 million blogs at last count.[30]

While blogs blur the line between online diaries and news reporting, the influence of blogs on the mainstream media and the public dialogue cannot be overemphasized. Matt Drudge, the author of the Drudge Report, is but one example of a person setting the trend of breaking news by blogging.  He does not consider himself a journalist, but his website was the first to break the story of President Clinton’s affair with Monica Lewinsky. His blog also was the first to report that presidential candidate Bob Dole chose Jack Kemp as his running mate in the 1996 election, as well as that CBS fired Connie Chung. Other examples of blogs leading the national discussion include: bloggers recognized Senator Trent Lott’s controversial comments at Strom Thurmond’s one-hundredth birthday celebration, which led Lott’s resignation as Senate Majority Leader; bloggers revealed Dan Rather’s documents about President George W. Bush’s National Guard service were forged;  bloggers uncovered James Frey fictionalized portions of his memoir and also exposed the contents of inappropriate emails sent to House pages by Representative Mark Foley.[31]

Moreover, mainstream media outlets are embracing the changing nature of technology by incorporating the citizen journalism into reporting. Many mainstream media companies support blogs, and many reporters have their own blogs.[32] Most every news website encourages readers to leave comments online, and many mainstream media websites provide links to surveys and responses as well.[33] News organizations encourage members of the public to contribute content for publication by sharing photographs and stories of current events.  CNN promotes citizen journalism by asking viewers to submit pictures and videos of catastrophic weather events such as Hurricane Dennis.[34] Most recently, CNN encouraged people in Egypt to report on the uprisings in the country using Twitter, photographs, or videos.  CNN.com also created iReport, a section of its website “where people take part in the news with CNN. Your voice, together with other iReporters, helps shape how and what CNN covers every day.”[35]When one enters the site, the disclaimer pop-up on the browser declares: “So you know: iReport is the way people like you report the news. The stories in this section are not edited, fact-checked or screened before they post. Only ones marked ‘CNN iReport’ have been vetted by CNN.” [36] As part of a conscious effort to increase its circulation numbers by capitalizing on the popularity of blogs, Gannett, which owns over eighty newspapers around the United States, announced in November 2006 it was preparing to use non-journalists to develop content for its publications.[37]

The nature journalism is evolving; in fact, the notion of an institutional press is diminishing, if not vanishing. The inclusion of citizens as reporters of the news changes the role the mainstream media plays in our democracy.

III.  Should Bloggers Be Included as Journalists?

The purpose of a reporter’s shield law indicates that citizen journalists should be able to invoke the privilege. By allowing bloggers who disseminate information to the public to invoke a privilege to keep sources confidential, the purpose of the privilege is served: “to encourage sources to come forward with information for public debate while, at the same time, preventing both professional and non-profession journalists from becoming agents of the government, criminal defendants, or civil litigants.”[38] The purpose of the First Amendment, and thus journalists, is to enhance democracy through open, free debate. Citizen journalists who publish their content for the general public should qualify for the privilege. Because bloggers serve the essential purpose of disseminating news to the public, Mr. Abrams thinks many should be able to invoke privilege of traditional publishers:“I think a blogger…is not less deserving than a journalist who may communicate with a smaller audience through a small-town newspaper.”[39] According to the media attorney, “There should be protection so long as information was obtained for the purpose of dissemination to the public at large in some sort of analogous way to what journalists do.”[40]

In addition, Supreme Court precedent suggests bloggers should qualify for the privilege. Though at the time of Branzburg the Internet did not exist, the Court stated freedom of the press is “not confined to newspapers and periodicals” or “the large metropolitan publisher” but “necessarily embraces pamphlets and leaflets” and “every sort of publication which affords a vehicle of information and opinion.”[41] Indeed, the Court expressed a special concern for the “lonely pamphleteer who uses carbon paper or a mimeograph…”[42] Today’s version of the lonely pamphleteer is the “pajama-clad” blogger expressing his ideas and opinions in an online publication.

Some people argue that bloggers do not actually engage in journalism, but they are the next extension of the expanding categories of non-traditional journalists. State and federal courts have already found that the journalist’s shield law covers student journalists, professors, authors, and freelancers because these professions perform essentially the function as reporters: to gather and disseminate information to the public. Additionally, freedom of the press “is a right which belongs to the public; it is not the private preserve of those possess the implements of publishing.”[43] Moreover, claiming bloggers should not be able to invoke the privilege because they are “not trained,” do not “work as journalists full-time,” and/or are not “sufficiently dedicated to contributing to the public debate,” seems like a empty criticism at a time when “mainstream media organizations have substantially eroded their own credibility” with scandals such as Jayson Blair’s fabrication of sources and Dan Rather’s report based on inaccurate records. [44]

Many people criticize blogs as “opinion without expertise, without resources, without reporting.”[45] Blogs are often criticized as unreliable since bloggers, unlike journalists, do not have to submit their work to editors for approval before publication.  David Shaw, of the Los Angeles Times, complained “[m]any bloggers…don’t seem to worry much about being accurate. Or fair. They just want to get their opinions—and their ‘scoops’—out there as fast as they pop into their brains.”[46] Other critics carp that it is difficult for readers to differentiate between accurate and inaccurate blogs.[47]

Advocates of citizen journalism respond that many bloggers have incentives to report accurately, and mistakes are corrected as soon as they are posted.[48] Bloggers, like journalists, are liable for defamation; the threat of litigation “has a civilizing influence on the Internet communications by improving the quality of the discourse.”[49] In addition, blogs have the advantage of mustering the knowledge of millions of people, drawing upon the “wisdom of the crowds.” [50] Blogs certainly do not have a “monopoly on error”[51] as demonstrated by defamation suits filed against mainstream media companies.  Bloggers, like journalists, are concerned about their reputations with their readers. When interviewed by the Wall Street Journal, blogger Jeff Jarvis said, “[w]hen I make a mistake, people jump on me like white blood cells on a germ. If I don’t correct it, my reputation’s going to suffer.”[52] Additionally, conditioning the protection of a reporter’s shield on the accuracy of the individual claiming the privilege would be contrary to First Amendment principles espoused in New York Times v. Sullivan as “accuracy is relevant only in defamation actions, and even then there is no strict liability for falsehoods.” [53] Requiring accuracy would be “particularly troubling in the context of blogging, where the benefits of the medium do not come from complete accuracy of each posting but rather in its interactive nature with readers and critics.”[54]

Furthermore, blogs are not the only publications that are regarded with differing levels of trust; mainstream media outlets are subject to the same criticism.[55] Many critics object that major media entities are “too close to the corporations and politicians they cover to be trusted as watchdogs.”[56] Ironically, it may be that the escalation in the number and popularity of blogs is due to the public’s lack of confidence in mainstream journalism.[57] While the USA Today may be a more trusted source than the National Enquirer, reporters working for either publication “equally claim the title of ‘journalist.’”[58] Courts have refused “to segregate the media into tiers based on perceived quality or trustworthiness”[59] and should continue to do so when analyzing whether the reporter’s privilege applies to citizen journalists. The O’Grady court recognized the danger of a court evaluating the quality of journalism and thus “decline[d] the implicit invitation to embroil ourselves in questions of what constitutes ‘legitimate journalis[m]. The shield law is intended to protect the gathering and dissemination of news.”[60] Because the court could “think of no workable test or principle that would distinguish ‘legitimate’ from ‘illegitimate’ news,” it rejected “[a]ny attempt by courts to draw such a distinction” and warned that an attempt to draw such a distinction “would imperil a fundamental purpose of the First Amendment, which is to identify the best, most important, and most valuable ideas not by any sociological or economic formula, rule of law, or process of government, but through the rough and tumble competition of the memetic marketplace.”[61]

In its discussion of journalism, the California court also denied limiting the privilege to publications on matters of public concern. Though some have proposed a reporter’s privilege be available only to persons who publish information involving matters of public concern, the “administrative and theoretical difficulties”[62]of this approach are overwhelming. In the context of defamation law, the Supreme Court spent over fifteen years endeavoring to make a legal distinction based on “whether the content is a matter of public concern or newsworthy.”[63] According to Justice Douglas, “‘[P]ublic affairs’ includes a great deal more than merely political affairs. Matters of science, economics, business, art, literature, etc., are all matters of interest to the general public. Indeed, any matter of sufficient general interest to prompt media coverage may be said to be a public affair.”[64]It is imprudent to adopt an amorphous standard to limit the scope of a reporter’s privilege since it has been unworkable in the defamation context.

IV.  Defining “Journalist”: How to Include Bloggers in a Federal Shield Law

Since it is “neither possible nor prudent to limit a reporter’s privilege to professional journalists,”[65] a qualified privilege should be available to persons who disseminate information to the public with a real intent to do so at the inception of the newsgathering process.  Bloggers should be protected by reporter’s shield laws based on the function of journalism. Courts should examine the evidence of a blogger’s intent to publish in the same fact-specific manner as the court in von Bulow when it found no indicia that Andrea Reynolds was a freelance author.

In the 2009 version of a federal shield law, the Senate rightly defined “covered person” as a person

(i) with the primary intent to investigate events and procure material in order to disseminate to the public news or information…or other matters of public interest, [who] regularly gathers, prepares, …writes, edits, reports or publishes on such matters…

(ii) has such intent at the inception of the process of gathering the news or information sought; and

(iii) obtains the news or information sought in order to disseminate the news or information by [any] means…[66]

The “intent to disseminate” test is grounded in the rationale of the privilege— “to provide protection for the unfettered dissemination of information to the public.”[67] Those who contribute to the public discourse should be able to avail the privilege. However, one weakness of the standard is that it “focuses on the intent of the reporter at the time it was received.” [68] Most veteran reporters in the nation would “admit that many of their stories come to them when they are not even looking for them…Reporters often have no idea at the time they are collecting information whether they will in fact share that information with the public.”[69] Using the intent test alone, it is unclear whether a “reporter who has a friendly conversation with an acquaintance and then later decides to pursue a story based on what she learned in that conversation”[70] would be protected by the privilege. Although intended to disqualify a savvy person who “conveniently” characterizes herself as a journalist in order to invoke the privilege,  the von Bulow intent test could also have the “effect of denying the privilege to even the most established and dedicated full-time journalists.”[71]

This is why the federal statute should include a two-part test for the definition of a journalist: the traditional definition and the function test.[72] The first definition of a journalist should be the traditional definition that includes an association with a media entity, which would avoid the aforementioned problem of professional journalists possibly not being able to invoke the privilege. The second definition of journalist should be the intent-based test based on the function of journalism, which would cover bloggers and other non-traditional journalists. The test would be a fact-based inquiry like the close examination of Reynolds’s intent to publish in von Bulow. This tough standard would ensure limitations on the privilege rather than extending it to anyone with a computer and an Internet connection.

The qualified privilege could be overcome by showing three elements: “(1) the desired information is critical to the maintenance of a party’s claim, defense, or proof of an issue; (2) the information sought cannot be obtained by alternative means; and (3) there is a compelling interest in the information that outweighs the public’s interest in the free flow of information.”[73] The Senate essentially created the same parameters for a qualified privilege in its proposed legislation in 2009.[74] A qualified privilege would “soften the blow of an expansive definition of those persons and entities entitled to invoke it.”[75]

The federal reporter’s shield law should also include narrow exceptions to the privilege for “circumstances in which countervailing societal interests outweigh any societal interest in preserving the privilege.” This includes circumstances when a subpoena is “directed to someone who witnessed or participated in a criminal or tortious activity (exclud[ing] ‘leaks’ of classified or national security information).” [76] Another exception would include times when a “direct and imminent threat to national security warrants compelling testimony”[77] or when “reasonably certain death or substantial bodily harm” may occur.[78] These three basic exceptions were also outlined in the Senate’s most recent attempt to pass a federal reporter shield law.[79]

Most courts have held that journalists who participate in a crime are barred from invoking the privilege.[80] Accordingly, this exception does not harm the underlying purpose of the privilege since there is “no value in encouraging sources to commit crimes in front of journalists.”[81] Leaking classified information should not fall under the crime exception since “leaks of government information, whether classified or not, have become an essential means by which the public learns about government activities.” [82] Since current protection is inadequate for whistleblowers, and “as a result, leaking information to the press is often the only realistic means of shedding light on questionable or illegal government practices,”[83] a privilege protecting whistleblowers encourages such persons to come forward serves the public interest. Prosecuting those who leak national security or other classified information is not hindered by a reporter shield law.[84]

Though most fears that a federal shield law would undermine national security are misplaced, there should be an exception to the privilege “if the reporter’s testimony would help prevent a direct and imminent threat to national security.” [85] The Supreme Court recognized an exception  for “imminent threat” to national security in the Pentagon Papers case, which concluded that the “presumption against prior restraints could not be overridden absent an immediate and serious threat to national security.” [86] This is a reasonable standard that should apply to the reporter’s privilege.

Finally, an exception for preventing “death or bodily harm to another human being applies to other testimonial privileges, including the attorney-client privilege.”[87] It is prudent to extend this exception to the reporter’s privilege “because in such cases the public’s interest in the information far outweighs the public’s interest in encouraging anonymous sources from coming forward.”[88]

V.  The Costs and Benefits of a Federal Reporter Shield Law

The most significant cost of any privilege is that it deprives courts of evidence. Critics claim that a privilege closes the courts for individuals harmed as a result of the free press, that a shield creates an exception to courts as a place to redress injury.[89] However, defamatory statements are actionable regardless of the enactment of a shield law.  There is no privilege if the media caused the damage.[90]Moreover, some states “explicitly reject the privilege when a media entity is a party to the litigation, a situation that typically occurs in defamation cases,” while others supply the media with some “protection by requiring a plaintiff to demonstrate that the information is important for her case and that she has attempted to obtain the information through other means.”[91]

According to opponents of the privilege, it benefits the media; enacting a federal shield law would lead to accountability problems if reporters are not forced to reveal anonymous sources.[92] The purpose of the privilege is to help the free flow of information to the public rather than aid the press. The privilege benefits the public and whistleblowers and does not hinder law enforcement. In fact, adopting a reporter’s privilege is viewed “as a necessary component of a larger criminal law reform, based on the hope that with this new protection reporters would be more willing to publish stories revealing criminal activity. The states’ enthusiasm for shield laws suggests that such laws enhance rather than detract from the ability of law enforcement to fight crime.” [93] Not having a federal privilege actually hinders attorneys general. Federal and state privileges should mirror each other since reporters do not know where a subpoena will come from. A federal reporter shield law creates certainty for reporters and attorneys. [94]Thirty-five states with shield laws submitted an amici curiae brief to the Supreme Court of the United States arguing for a grant of certiorari in Judith Miller’s case because the lack of a federal  privilege undermines the judicial and legislative determinations of forty-nine states and the District of Columbia.[95]

The irony of not enacting a federal shield law in an age of Wikileaks means that websites such as Wikileaks are more likely to receive information and documents than a reporter, who would verify the information, edit statements, and redact necessary portions. Without a reporter’s shield law, it is likely that sources will go to Wikileaks, which sends information directly to the public and is not subject to professional ethics. Wikileaks is empowered if reporters are not allowed to protect their sources. [96]

VI.  Conclusion

A federal shield law for reporters and citizen journalists would benefit the public by protecting whistleblowers and encouraging anonymous sources to reveal information to responsible disseminators of the news. Because the purpose of the privilege is to help the flow of information to the public, Congress should pass a federal shield reporter’s shield law that protects traditional and citizen journalists. The privilege should not simply cover members of the traditional press, for “[t]he First Amendment does not guarantee the press a constitutional right… not available to the public generally.”[97] Congress should combine the traditional definition of a reporter associated with a media entity with an intent-based inquiry based on the function of journalism to create a federal reporter’s shield law to enhance the First Amendment and encourage the free flow of information in our democracy.


[1] See In re Grand Jury Subpoena, Judith Miller, 397 F.3d 964, 976-980 (D.C. Cir. 2005); Key Players in the CIA Leak Investigation, http://www.washingtonpost.com/wp-srv/politics/special/plame/Plame_KeyPla…

[2]81 Am. Jur. 2d Witnesses § 526 (2010).

[3] Mary-Rose Papandrea, Citizen Journalism and the Reporter’s Privilege, 91 Minn. L. Rev. 515, 535-36 (2007) (discussing the purpose of the privilege).

[4] Branzburg v. Hayes, 408 U.S. 665, 721 (1972) (Douglas, J., dissenting).

[5] von Bulow v. von Bulow, 811 F.2d 136, 144 (2d Cir. 1987).

[6] David Kohler & Lee Levine, Media and the Law 529 (Matthew Bender 2009).

[7] See, e.g.,Free Flow of Information Act of 2009, S.448, 111th Cong. § 1-11 (2009); Free Flow of Information Act of 2007, S.2035, 110th Cong. § 1-8 (2007).

[8] Branzburg, 408 U.S. at 682.

[9] See, e.g., Ala. Code § 12-21-142 ; 10 Del.C. § 4320 (4).

[10] See In re Grand Jury Subpoena, Judith Miller, 397 F.3d  at  976-980 (Sentelle, J., concurring) (noting the difficulties of determining who qualifies as a reporter and expressing concern about “whether the stereotypical ‘blogger’ sitting in his pajamas at his personal computer posting on the World Wide Web” would be entitled to invoke the privilege).

[11] Floyd Abrams Explains Why He Should Lose, http://www.pajamasmedia.com/instapundit-archive/archives/019677.php

[12] Cal. Const. art. I, § 2(b).

[13] O’Grady v. Superior Court, 44 Cal.Rptr.3d 72 (Cal. Ct. App. 2006).

[14] Minn. Stat. § 595.023 (2004).

[15] von Bulow, 811 F.2d  at 143.

[16] Id. at 145.

[17] Id. at 145 (quoting Branzburg v. Hayes, 408 U.S. 665, 705 (1972)).

[18] Id. at 144.

[19] Cusumano v. Microsoft Corp., 162 F.3d 708, 714 (1st Cir. 1998).

[20] Shoen v. Shoen, 5 F.3d 1289, 1293 (9th Cir. 1993).

[21] Id. at 1293.

[22] Cusumano, 162 F.3d at 714.

[23] See People v. Von Villas, 13 Cal. Rptr. 2d 62, 78-79 (Cal. Ct. App. 1992) (holding California privilege applied to freelance author ).

[24] See e.g., Shoen, 5 F. 3d at 1290-91.

[25] See Silkwood v. Kerr-McGee Corp., 563 F.2d 433, 436-37 (10th Cir. 1977) (holding privilege applied to documentary filmmaker whose “mission…was to carry out investigative reporting for use in the preparation of a documentary film”).

[26] See Cusumano, 162 F.3d at 714.

[27] See Summit Tech., Inc. v. Healthcare Capital Group, Inc., 141 F.R.D. 381, 384 (D. Mass. 1992)(holding independent research consultant was “engaged in the dissemination of investigative information to the investing business community” on “matters of public concern,” and was therefore “entitled to raise the claim of privilege”).

[28] See Privilege Compendium, http://www.rcfp.org/privilege/index.php?op=browse&state=HI

[29] Papandrea, supra note 3, at 523.

[30] Id.

[31] See id.

[32] See e.g, Ezra Klein’s blog, Economic Policy, and Lots of It, http://voices.washingtonpost.com/ezra-klein/.

[33] See e.g., http://www.nytimes.com/; http://www.washingtonpost.com/.

[34] See cnn.com/.

[35] http://ireport.cnn.com/.

[36] See id.

[37] See Papandrea, supra note 3, at 532.

[38] Id. at 585.

[39] Floyd Abrams, supra note 13.

[40] Id.

[41] Branzburg, 408 U.S. at 704.

[42] Id.

[43] State v. Buchanan, 436 P.2d 729, 731(Or. 1967).

[44] Papandrea, supra note 3, at 573-74.

[45] See id., at 528.

[46] Id.

[47] Id.

[48] See id.

[49] Id.at 530.

[50] See Papandrea, supra note 3, at 529.

[51] See id. at 530.

[52] See id. at 529.

[53] Id., at 576.

[54] Id.

[55] Id.at 530.

[56] See Papandrea, supra note 3,at 524.

[57] Id.

[58] Id.at 530.

[59] Id.

[60] O’Grady, 44 Cal.Rptr.3d at 97.

[61] Id.

[62] Papandrea, supra note 3, at 578.

[63] Id.

[64] Gertz v. Robert Welch, 418 U.S. 323, 357 (1974) Douglas, J. dissenting).

[65] Papandrea, supra note 3, at 520.

[66] Free Flow of Information Act of 2009, supra note 7.

[67] Papandrea, supra note 3, at 572.

[68] Id.

[69] Id.

[70] Id.

[71] Id.at 573.

[72] Interview with Kurt Wimmer, partner, Covington & Burling, in Washington, D.C. (Dec.17, 2010).

[73]Papandrea, supra note 3,  at 584.

[74] See Free Flow of Information Act of 2009, supra note 7.

[75] Papandrea, supra note 3, at 585.

[76] Id.

[77] Id.at 520-21.

[78] Id. at 588.

[79] See Free Flow of Information Act of 2009, supra note 7.

[80] Papandrea, supra note 3, at 587.

[81] Id.

[82] Id. at 588.

[83] Id.

[84] See id.

[85] Id.at 588-89.

[86] Papandrea, supra note 3, at 589.

[87] Id.

[88] Id.at 589-90.

[89] Interview with Mark Grannis, managing partner, Wiltshire & Grannis, in Washington, D.C. (Dec. 8, 2010).

[90] Interview with Kurt Wimmer, supra note 79.

[91] Papandrea, supra note 3, at 548.

[92] Interview with Mark Grannis, supra note 96.

[93] Papandrea, supra note 3, at 535.

[94] Interview with Kurt Wimmer, supra note 79.

[95] Brief of the States of Oklahoma, et al. as Amici Curiae in Support of the Petitions for Writs of Certiorari, Cooper v. United States, 545 U.S. 1150 (2005), denying cert. to In re Grand Jury Subpoena, Judith Miller, 397 F.3d 964 (D.C. Cir. 2005).

[96]Interview with Kurt Wimmer, supra note 79.

[97] Branzburg, 408 U.S. at  684.

© Copyright 2011 Laura Katherine Layton

A Brave New World for Commercial Buildings: ASTM's "BEPA" Standard

Recently posted at the National Law Review by Douglas J. Feichtner of Dinsmore & Shohl LLP –   ASTM BEPA standard is expected to become the standard for building energy use data collection. 

On February 10, 2011, ASTM formally published its Building Energy Performance Assessment (BEPA) Standard – E 2797-11. This standard will enable users to measure the energy performance of a commercial building in connection with a real estate transaction. Regulatory drivers spurred the development of the BEPA standard, even in the midst of a construction recession. In the past few years, several states and local governments passed mandatory building energy labeling and transactional disclosure regulations. These disclosure regulations, combined with some building codes that are now requiring specific energy-efficiency improvements, triggered the development of a standardized methodology to assess and report on a commercial building’s energy use. The BEPA’s passage arrives at a crucial time when building certification standards face increased scrutiny, both in the market and the courtroom.

The ASTM BEPA standard includes the following five components: (1) site visit; (2) records collection; (3) review and analysis; (4) interviews; and (5) preparation of a report. ASTM is not creating or implying the existence of a legal obligation for the reporting of energy performance or other building-related information. Rather, the BEPA offers certain guidelines to the industry to promote consistency when collecting (and perhaps reporting) buildings’ energy usage data, such as:

 

  • collecting building characteristic data (i.e., gross floor area, monthly occupancy, occupancy hours)
  • collecting a building’s energy use over the previous three years (with a minimum of one year) – including weather data representative of the area where the building is located;
  • analyzing variables to determine what constitutes the average, upper limit, and lower limit of a building’s energy use and cost conditions;
  • determining pro forma building energy use and cost; and
  • communicating a building’s energy use and cost information in a report

One of the options available to users of the BEPA standard is to identify government-sponsored energy efficiency grant and incentive programs that may be available for any energy efficiency improvements that could be installed at the building (thereby increasing its value, and making it more attractive to potential buyers).

Building benchmarking (i.e., comparing a building’s energy output to its peers) is not part of the ASTM BEPA standard’s primary scope of work, but rather a “non-scope consideration.” The BEPA certainly could be used in conjunction with building certification tools already in the marketplace, such as ASHRAE, Green Globes, and U.S. Green Building Council (LEED), to name a few.

However, as the economic noose has tightened in recent years, green building standards have received increased scrutiny. Indeed, builders and landlords who sell their properties with the promise that they have some green certification (which can be expensive to obtain), and that promise for whatever reason fails to translate to the economic savings contracted for, could face liability.

The Gifford v. USGBC lawsuit currently pending in the United States District Court for the Southern District of New York crystallizes the debate over green building certification (in this case – LEED). The core allegations in the lawsuit prompt this author to see significant value for stakeholders to use ASTM’s BEPA as a supplement to applying rating and benchmarking systems like LEED.

Gifford’s primary complaint is that LEED-certified buildings are not as energy-efficient as advertised. Support for this contention rests on Gifford’s analysis of a 2008 New Buildings Institute (NBI) study comparing predicted energy use in LEED-certified buildings with actual energy use. In the study, NBI concluded that LEED buildings are 25-30% more energy-efficient compared to the national average. To the contrary, Gifford concluded that LEED-certified buildings use 29% more energy than the national average. He further emphasized that the NBI results were skewed in part because the NBI study compared the median energy use of LEED buildings to the mean energy use of non-LEED buildings.

The purpose of this article is not to comment on the merits of the Gifford lawsuit or criticize LEED. But this apples-to-oranges argument articulated by Gifford magnifies the proverbial elephant in the “green” room – the need for sufficient objective data to accurately compare the energy use and energy cost of buildings against their relevant peer groups. With such data in hand, the benchmarking and rating systems already in place can be buttressed with a greater measure of consistency and transparency (a big issue for detractors of green building certification, like Gifford). Furthermore, the more stakeholders in the real estate industry (buyers, sellers, lenders) understand how a building’s energy performance was determined, the better equipped they will be to put a price on the economic and environmental benefits of green buildings.

In sum, the ASTM BEPA standard is expected to become the standard for building energy use data collection. It can be used to quantify a building’s energy use as well as its projected energy use and cost ranges, factoring in a number of independent variables (i.e., weather, occupancy rates), by way of a transparent process. Finally, the BEPA building energy use determination can complement compliance reporting under applicable building energy labeling or disclosure obligations. In the end, ASTM’s BEPA can provide the foundation by which an apples-to-apples comparison can take place in evaluating commercial building energy performance determinations and certifications.

© 2011 Dinsmore & Shohl LLP. All rights reserved.

Discrimination Charges Against Employers Hit Record High in 2010

Posted yesterday at the National Law Review by Laura Broughton Russell and David L. Woodard of Poyner Spruill LLP – EEOC statistics recently released  revealing a record-breaking number of charges of workplace discrimination filed against private sector employers in 2010. 

The Equal Employment Opportunity Commission (EEOC) has recently released its charge statistics for fiscal year 2010 (which ended September 30, 2010). The EEOC enforces federal laws prohibiting employment discrimination, which includes Title VII of the Civil Rights Act of 1964, the Equal Pay Act, the Age Discrimination in Employment Act, the Americans with Disabilities Act, and the Genetic Information Nondiscrimination Act.

Not surprisingly, these statistics reveal a record-breaking number of charges of workplace discrimination filed against private sector employers in 2010. The number of charges filed hit 99,922, an unprecedented number which amounts to a more than 7% increase over the previous year’s filings. The somber economy and the accompanying layoffs in 2009 and 2010 may be behind this increase, as well as the EEOC’s expansion of educational training and other outreach efforts to approximately 250,000 persons.

What the Statistics Foreshadow for 2011 

  • In its release, the EEOC noted its “concerted effort to build a strong national systemic enforcement program,” which resulted in 465 systemic investigations, involving more than 2,000 charges, being undertaken. This emphasis on systemic or class-wide discrimination means the EEOC is devoting more of its resources to bringing more multiple plaintiff cases against employers. This trend is expected to continue.

  • The new Genetic Information Nondiscrimination Act resulted in 201 charges being filed. Significantly more charges are expected in this area in 2011, due to the release of the accompanying regulations at the end of 2010 and the continuing publicity about and public awareness of this law.
     
  • Disability discrimination claims numbered 25,165 in 2010, which constituted slightly more than 25% of all claims filed with the EEOC. With the recent expansion of the Americans with Disabilities Act (ADA) by the ADA Amendments Act, and the anticipated 2011 release of the accompanying regulations, claims in this area are expected to continue to increase.

Some Final Observations 

The EEOC has been energized by the December 2010 Senate confirmations of its new Chair, as well as its General Counsel and two new Commissioners. The EEOC now has a full complement of members, which it has been lacking for quite some time. In addition, the EEOC recently has added to its front-line staff. Notably, the EEOC recently has held two significant Commission meetings during which it explored the use of credit histories as employment screening devices, and the impact of the economic situation on older workers. By reviewing their employment decisions in advance with counsel, as well as generally reviewing their employment policies and practices to ensure compliance with the law, employers can lower the risk of expensive and onerous legal proceedings filed by individuals and by the EEOC.
 

© 2011 Poyner Spruill LLP. All rights reserved.

Patent Reform Is Again Before Congress – The Patent Reform Act of 2011

Recently posted at the National Law Review by Ashley Merlo of Sheppard Mullin – details on recent bill introduced by Senator Leahy.  

Patent reform has been a topic of congressional debate since the introduction of the Patent Reform Act of 2005. Having failed to enact the 2005 legislation or any subsequently proposed reform, patent reform has again been introduced into the Senate, this time entitled The Patent Reform Act of 2011. (S. 23, 112th Cong. (2011).)

In introducing the new bill, Senator Leahy noted the following: “China has been modernizing its patent laws and promoting innovation while the United States has failed to keep pace. It has now been nearly 60 years since Congress last acted to reform American patent law. We can no longer wait.” (157 Cong. Rec. S131 (2011).)

As Leahy further explained, the proposed reforms aim to accomplish three goals: (1) “improve the application process by transitioning to a first-inventor-to-file system”; (2) “improve the quality of patents issued by the USPTO by introducing several quality-enhancement measures”; and (3) “provide more certainty in litigation.” The most significant changes to implement these goals are described below.

The Application Process: Shift To First-To-File System

In an effort to harmonize the U.S. patent system with the systems of other countries, The Patent Reform Act of 2011 proposes to change the U.S. Patent System from a first-to-invent to a first-to-file system. This change means that patents will be awarded to the earliest-filed application for a claimed invention, regardless of the date of actual invention. In other words, under the proposed reform, if A invents a new, novel and non-obvious widget in April but fails to file its patent application (or disclose it) until August, and B invents the same widget in June and files its patent application at that time, B gets the patent under the new system, not A.

The change to the first-to-file system also impacts the prior art analysis. Under current law, for prior art that is publicly — available less than one year before an application for a patent is filed, an inventor can still obtain a patent if she can prove that she invented the claimed invention prior to the date of the prior art. The new bill, however, appears to limit a patent applicant’s ability to negate prior art. Namely, only disclosures by the inventor or someone who obtained the disclosure from the inventor are excluded as prior art.

However, inventors that get beat to the patent office are not entirely out of luck; the reforms provide for “derivation” proceedings to determine if the inventor of an earlier-filed patent “derived” the invention from the inventor of a later-filed application. In other words, returning to the example above, if A could show that B’s widget invention was derived from his widget invention, A may nonetheless obtain a patent despite B’s earlier filing date.

Patent Quality: Submission of Prior Art / Post-Grant Review Procedures

In an effort to improve patent quality, the proposed act establishes the opportunity for third parties to submit information (i.e., prior art) related to a pending application. This, in turn, should assist the examiner in determining whether an applied-for patent is indeed patentable.

In addition, the proposed act incorporates a post-grant 9-month window in which a person who is not the patent owner can institute a post-grant review proceeding to cancel as unpatentable one or more claims of the patent. However, post-grant review can only commence if, following petition, it is determined that it is more likely than not that at least one of the claims challenged is unpatentable.

To protect against abuse of the post-grant review procedure, the act also specifies that an accused infringer may not seek review (1) after it has already filed a lawsuit in district court challenging the patent, or (2) more than three months after the date the accused infringer must answer, or otherwise respond to, a complaint for patent infringement filed by the patentee. The post-grant review proceeding also has estoppel effect, i.e., the petitioner in a post-grant review proceeding cannot raise in a subsequent action any ground of invalidity that was raised or reasonably could have been raised in the post-grant proceeding.

Improve Certainty Surrounding Litigation: Damages

The proposed legislation aims to provide more certainty to litigants as to damage calculations and enhanced damages.

Specifically, the act empowers judges to serve as a gatekeeper on damages. The proposed legislation specifies that the court “shall identify the methodologies and factors that are relevant to the determination of damages, and the court or jury shall consider only those methodologies and factors relevant to making such determination.” As Senator Leahy explained: “the gatekeeper compromise on damages . . . is what is needed to ensure an award of a reasonable royalty is not artificially inflated or based on irrelevant factors.”

In addition, on a showing of good cause, litigants are entitled to have the trial sequenced such that the trier of fact decides the questions of validity and infringement prior to damages.

Finally, the proposed legislation would codify case law regarding willfulness, requiring a plaintiff to demonstrate by “clear and convincing evidence that the accused infringer’s conduct with respect to the patent was objectively reckless.” Objectively reckless conduct will be found where the infringer acted “despite an objectively high likelihood that his actions constituted infringement of a valid patent, and this objectively-defined risk was either known or so obvious that it should have been known.” Mere knowledge of a patent is insufficient to show willfulness for an enhanced damage award.

Conclusion

As Senator Leahy explained in his remarks presenting the bill to the Senate, reform of the American patent law system is long overdue. Overall, the proposed legislation is similar to previously proposed legislation; indeed it was structured around the legislative proposal from 2005. The 2011 Patent Reform Act proposes significant changes to American patent law, surely to receive comment from those in favor and those against. Whether patent reform will actually make its way onto the books is a question yet to be determined.
 

Copyright © 2011, Sheppard Mullin Richter & Hampton LLP.

Got Klout? Measuring Your Law Firm Social Media Efforts

Many thanks to our Business of Law guest blogger Kevin Aschenbrenner of Jaffe PR who provided some truly useful information on how law firms can gauge the effectiveness of their social media programs.  Read on….

One of the most frustrating aspects of actively working on law firm social mediaefforts is the feeling that you’re in a vacuum. You often can’t tell if anyone is listening. And, posting, “Do you think I’m awesome?” just won’t cut it.

This is why influence is such a hot topic in social media. Essentially, the more influence you have online the more likely it is that people will not only pay attention to you but also act on what you post. I talk more about influence in this blog post. Go ahead and read it. I’ll wait.

Welcome back. So, influence. It’s a good concept, but it’s a bit of a vicious circle – you need influence to have an impact online but you need to know what your influence is to use it to assess your law firm social media efforts. It makes my head hurt, too.

Or, it used to. Now there’s an online tool that will measure your influence. It’s called Klout (www.klout.com) and it ranks your online influence with a number out of 100. For an example, here’s a link to my Klout Score:http://klout.com/kevinaschenbren. As Klout Scores go, I’m not up there with Brian Solis (85) or Chris Brogan (84), but it’s respectable and, I’m within kissing distance of 50, which is the Klout Score required by a few hotels in Las Vegas in order to qualify for free upgrades (http://adage.com/digitalnext/post?article_id=146189).

But I digress. I’ve found Klout very helpful as a sort of diagnostic tool for my social media efforts. It’s not perfect and I quibble with some of the other information you get in your report, but it’s not a bad guidepost.

To find out your Klout Score:

  • Go to www.klout.com and type in your Twitter handle.
     
  • To see your entire report, I suggest creating an account. It’s free and gives you access to additional data and it will also ensure your score is refreshed regularly.
     
  • You can increase the accuracy of your Klout Score by linking your Facebook and LinkedIn accounts.
     
  • Check back periodically to see how your Klout Score is doing.

And, if you really want to have fun with your online influence, check out Empire Avenue (www.empireavenue.com). I’ll leave you to explore that one on your own.

© Copyright 2008-2011, Jaffe PR

One of the most frustrating aspects of actively working on law firm social mediaefforts is the feeling that you’re in a vacuum. You often can’t tell if anyone is listening. And, posting, “Do you think I’m awesome?” just won’t cut it.

This is why influence is such a hot topic in social media. Essentially, the more influence you have online the more likely it is that people will not only pay attention to you but also act on what you post. I talk more about influence in this blog post. Go ahead and read it. I’ll wait.

Welcome back. So, influence. It’s a good concept, but it’s a bit of a vicious circle – you need influence to have an impact online but you need to know what your influence is to use it to assess your law firm social media efforts. It makes my head hurt, too.

Or, it used to. Now there’s an online tool that will measure your influence. It’s called Klout (www.klout.com) and it ranks your online influence with a number out of 100. For an example, here’s a link to my Klout Score:http://klout.com/kevinaschenbren. As Klout Scores go, I’m not up there with Brian Solis (85) or Chris Brogan (84), but it’s respectable and, I’m within kissing distance of 50, which is the Klout Score required by a few hotels in Las Vegas in order to qualify for free upgrades (http://adage.com/digitalnext/post?article_id=146189).

But I digress. I’ve found Klout very helpful as a sort of diagnostic tool for my social media efforts. It’s not perfect and I quibble with some of the other information you get in your report, but it’s not a bad guidepost.

To find out your Klout Score:

  • Go to www.klout.com and type in your Twitter handle.
     
  • To see your entire report, I suggest creating an account. It’s free and gives you access to additional data and it will also ensure your score is refreshed regularly.
     
  • You can increase the accuracy of your Klout Score by linking your Facebook and LinkedIn accounts.
     
  • Check back periodically to see how your Klout Score is doing.

And, if you really want to have fun with your online influence, check out Empire Avenue (www.empireavenue.com). I’ll leave you to explore that one on your own.

© Copyright 2008-2011, Jaffe PR

Crisis in Egypt: The Economical Repercussions

Two articles posted yesterday at the National Law Review address two key issues related Egypt to which impact the U.S. – Trade and the amount of foreign aid the U.S. sends to Egypt.  The Risk Management Monitor highlights some of the business issues impacted by the turmoil:  

The crisis in Egypt can soon turn from a political uprising to an economic catastrophe and humanitarian emergency if things don’t return to normal operation soon.

Shipping

In the port of Alexandria, among others, army tanks stand guard to ensure no one enters the area. Good plan, except that hardly anything is going out, including exports that are crucial to the country’s economy. Though reports claim that some ports are closed, the Suez Canal is apparently open to shipping traffic. Shipping companies, however, are hesitant to enter the area. If the Suez Canal should close, it would not only spell disaster for a country already in serious turmoil, but it would also mean a worldwide shipping disruption.

Production Plants

  • Nissan: the automaker suspended operations Sunday until February 3rd.
  • Unilever: the multinational corporation’s offices in Cairo have been closed since January 28th.
  • General Motors: the car maker’s plant near Cairo has not produced vehicles since January 28th with production estimated to resume Friday, February 4th.
  • Lafarge SA: the a French building materials company has temporarily stopped operations due to the situation. The company has six production sites in Egypt, six quarries and 62 ready-mix plants and employs 8,172 Egyptian workers.
  • Heineken NV: the Dutch brewer has halted operations and told its 2,040 employees in Egypt to stay home.

Tourism

The nation’s tourism sector has taken a huge hit that is expected to last for some time.

Foreigners are struggling to flee the country, tour and cruise companies are seeing cancellations and a growing list of Western and Arab nations are sending in flights to evacuate their nationals. The tourism sector is vital for Egypt — and is among one of the four top sources of foreign revenue for the country.

Tourism accounts for 5 to 6% of the country’s GDP, while Cairo International Airport is the second largest airport in Africa, after Johannesburg, handling 15 million tourists per year.

Call Centers and Online Retail

Egypt is home to numerous call centers and IT outsourcing companies. But little can be done when the government cuts internet access throughout the entire nation. Microsoft is just one of the 120 companies in Cairo’s Smart Village, an area built for major multinational and local, high-tech companies.

Asked about the situation in Egypt, Microsoft said in a written response to a query that it “is constantly assessing the impact of the unrest and Internet connection issues on our properties and services. What limited service the company as a whole provides to and through the region, mainly call-center service, has been largely distributed to other locations.”

Hewlett-Packard is another company with operations in the Smart Village. They have asked their employees there to stay home. Though President Obama has urged the Egyptian government to restore internet access, little has changed for fear that protesters will use social networks to organize further riots. For a country that has taken pride in its growing outsourcing and call center business, the suspension of internet access is taking a huge toll.

All of the above have affected financial markets worldwide. And with a “million man march” planned for tomorrow in the Arab world’s most populous nation, little is expected to change in the near future.

Risk Management Magazine and Risk Management Monitor. Copyright 2011 Risk and Insurance Management Society, Inc. All rights reserved.

 

Is Your Law Firm Capitalizing on Legal Market Opportunities in China? US Firms & China: Managing Your Overseas Presence Mar 21-22 Chicago, IL

China’s rapid economic growth has created numerous opportunities for U.S. law firms to better serve existing and prospective clients. Is your firm well-informed on the challenges and risks associated with establishing an overseas presence?  

Attend This Conference and You Will:

  • Hear from leading U.S. and international experts who have practical experience working in China
  • Learn about the underlying economic, cultural and legal foundations that lead U.S. law firms to conduct business in China
  • Gain knowledge about issues related to revenue, collections, operations, strategic planning and more
  • Understand the business culture in China
  • Discover how to establish strategic alliances with Chinese firms
  • Network with managing partners and firm administrators, and meet with organizations that represent companies and individuals doing business in China
  • Click Here for a detailed agenda

Who Should Attend:

Managing Partners, Lawyers Specializing in International or Intellectual Property Law, and Firm Managers representing law firms of any size who:

  • Represent clients whose legal needs stretch between the U.S. and China, and vice versa
  • Need information and facts regarding doing business in China
  • Thinking about establishing a branch office in China

When & Where: