Using “fairness” in IP Laws

There seem to be a major overhaul of intellectual property laws in India.  And these amendments are bound to pester lot of DRM/DMCA proponents. According to the proposed changes “fair use” seems to have broader definition (when compared to USA) and as long as there is no intention to infringe, it’ll be considered as legal. Furthermore, the usage of tools like DeCSS for personal use is also legal.

Link to the article published on arstechnica: http://arstechnica.com/tech-policy/news/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad.ars

It would be interesting to see how DRM proponents react to these changes since these amendments are contrasting to what we have in the USA or most of the western world. Secondly, it raises the questions of “priacy”. In  country like India where piracy is rampant, should it have an easy IP laws like these or much more stricter to clamp down the piracy.

However, these amendments give significant latitude to people who are looking towards some non-commercial personal/educational use. Current IP laws in US have very narrow definition of fair use. As we have seen in the class, under DMCA circumvention is unacceptable for any type of use. Ars Technica published another excellent article titled “Can we have fair use without fair use technology?” that debates about broadening the definition of  “fair use” for non-commercial personal and educational usage.

Mobile Advertising Practices – Killing Privacy

Each new decade is a genesis for its own consumer and technology trends. During the 2000s mobile cemented its place in the global society fabric and its use became addictive and pervasive across all classes of people. With greater than 2.5 billion subscribers, the mobile phone dwarfs every other media platform. The reach is greater than TV, the effectiveness is stronger than print and the targeting is more precise than the Web. The mobile phone is a personal, interactive device that is always on and engaged throughout the day. It’s the first one ever in the history of the planet that people go to bed with. It’s ubiquitous across the world, across demographics and age groups. People are giving these devices even to younger children for safety and communication.

Innovation blossomed and now mobile devices have evolved to full-scale Internet-enabled mini computers. Mobile has also become the ultimate ad vehicle. The unique features of handheld devices, including their mobility, personalization and location-awareness are luring the advertisers to move from print, Internet, TV, radio to mobile. With 3G, rich media advertising like video & audio ads, are becoming a viable proposition and gaining popularity among a critical mass of mobile users. The possibilities for ad placements are just as vast in the mobile space as they are on TV (voice, SMS, MMS, WAP, Applications, browsing). Mobile advertising (used as ‘m-advertising’ hereafter) is branded as a win-win proposition for all the stakeholders including consumers, brands and telecom operators. Customers can avail a variety of services and products, including ringtones, games, chat services, mobile discount coupons, customer promotions, and location-based services. So where is the catch?

Many mobile advertisers are eager to exploit what they correctly perceive as a unique opportunity to target consumers with advertising by taking advantage of our highly personal relationships with mobile devices in order to generate more consumer response. While mobile marketers and operators may claim they have respect for privacy and user control, they are well aware of the tremendous advantage they enjoy with consumers’ private information.

m-advertising practices including behavior targeting, location based targeting, mobile analytics, data-mining which enable the advertising firms to capture highly personal and private information, consumer behavior and characteristics. These include spending patterns, location, availability, interests (through browsing habits), social status as well as demographic data. This information is available across a range of different systems, but is being consolidated by effective mobile advertising platforms to generate ‘user footprints’ or ‘user journey’. It further creates a risk, as consumers’ personal data will increasingly be the focus of data aggregators. Advertisers, mobile carriers and other third parties are now able to combine consumers’ personal data, the digital content of their electronic communications, their geographic location information with other miscellaneous data available in databases, thus creating larger consumer profiles with large associated privacy implications. Many a times, mobile user is not aware that such profiling is occurring. In addition, the perceived benefits of m-advertising are enticing people to abandon privacy to a certain degree by sharing their personal information. Hence consumers are subject to a growing number of unfair mobile advertising technology practices resulting in killing of privacy; consumers are also getting deceptively motivated to give up their privacy.

Applicable – http://www.ftc.gov/privacy/privacyinitiatives/promises.html

Good Read if you are interested in mobile and piracy — http://www.democraticmedia.org/current_projects/privacy/analysis/mobile_marketing

Nick Carr vs Jorge Luis Borges. Is that still Fair Use?

I’m a regular reader of Nicholas Carr’s blog (who, by the way, is not as stupid as he claims Google has made him). One of his blog posts last year is marginally devoted to the steady decline of Second Life. Nick Carr argues somewhat strangely that Second Life has failed because the internet as a whole has apparently become a virtual reality; one that we replaced our actual reality for.

You might ask yourself what that has got to do with Information Law and Policy. The interesting part with that blog post is that only about 150 words of the 1,500 word text are written by Nick Carr himself. The rest is an excerpt from “Tlön, Uqbar, Orbis Tertius”, a story by Jorge Luis Borges, our good friend from the very first 202 lecture.

While Borge’s story is entertaining (and as usual a little weird), the use of such a large excerpt raises questions how far bloggers can reuse content under “Fair Use”, as one commenter points out:

[Nick, …] Perhaps, charitably, you left out the “Reproduced with Permission” tag?
Or do you believe your reader base would consider this “quotation of excerpts in a review or criticism for purposes of illustration or comment” or “quotation of short passages in a scholarly or technical work, for illustration or clarification of the author’s observations” under Fair Use?

Nick Carrs answer:

I am hoping this would qualify as fair use, as my intent is not just to quote part of Borges’s story but to encourage readers to see its relevance to our own time. […] To me, that’s the essence of the fair use protection. […] I tried to shorten it at one point, but it lost the imaginative richness of the original.

That answer, as much as I like Nick Carr’s Blog, rather describes Fair Use as a general idea than as it is defined in the legal context. This is, as we’ve learned, a common misconception.

Let’s try to recall the factors that determine whether the reuse of a copyrighted work falls under Fair Use or not, as listed in 17 USC, §107

  1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
  2. the nature of the copyrighted work;
  3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
  4. the effect of the use upon the potential market for or value of the copyrighted work.

Nick Carr’s blog is free to the public. However, let’s face it, he also tries to sell his books, the newest of which will be released in June this year. That pretty much renders the nonprofit argument useless. Furthermore, Carr used a substantial share of Borge’s story for his blog post, approximately 20% according to one commenter.

Although I’m not implying that Carr deliberately infringed on Borge’s copyright, it’s not clear whether Fair Use applies to that type of reuse of another person’s work. Nick Carr, as most people, have no clear definition of what Fair Use actually is, yet many people claim that their work falls under Fair use.

Jorge Luis Borge’s story has been published in 1940, and copyright for this work might have already expired. In which case Nick Carr might be off the hook.

Cyberlaws in Malaysia

Coming into this class, I didn’t really have a clear grasp on the complexity and issues faced when dealing with “cyber” laws and policy. As a student from Malaysia, I think the USA has done a lot to try to make sure that the internet is not a free for all, do as you please venue. The class has also made me think about cyber laws back home in Malaysia and how they differ.

The main part of Malaysian cyber laws seem to be centered around the Communications and Multimedia Act of 1998 (http://www.msc.com.my/cyberlaws/act_communications.asp).

So what’s different? It seems that the Malaysian laws are much more draconian. There is no difference between “offensive” and “false” material, and if you post content online that is true but “offensive” because it defames that person, then you’re in trouble.Surprisingly, this law has only been invoked a few times since its conception. The first time was in March of 2009 when 6 bloggers were charged with insulting the king of a state in Malaysia (http://thestar.com.my/news/story.asp?sec=nation&file=/2009/3/12/nation/20090312194041#). Free speech isn’t held as highly in Malaysia as it is here in the USA.

More recently, a student was charged under this law for posting hateful comments about a certain race on his Facebook account (http://www.theborneopost.com/?p=4936).

Before these cases, myself (and most probably many other Malaysians) had no idea that the country even had such laws. The internet is such a different arena for the people, with content generally uncensored by the government.

Marketing, Internet and Privacy

WSJ Article

The article linked to above discusses new privacy legislation, specifically addressed at advertisers and Internet companies. The legislation, proposed by Rep. Rick Boucher (D., Va.) and Rep. Cliff Stearns (R., Fla.), will be made public tomorrow and will sit for two months before being introduced to allow time for feedback and tweaking.

In its current form, it seems the bill addresses the need for websites to clearly disclose to users how their information is collected, used and shared. Further, the bill suggests users should have an opportunity to opt out if they do not want their information to be collected or used in certain ways. And not surprisingly, the bill would grant authority to the FTC to enforce its provisions.

So, please read and enjoy yet another example of how our discussions in class readily apply to the world around us.

Apple, the CIA & Shield Law

There has been further progress on the iPhone/ Gizmodo debacle that Jess wrote about last week, and the implications it could have for more serious journalistic concerns. On the Media reported April 30th that in order to halt the further investigation into the property of Jason Chen, the Gizmodo blogger who had much of his computing equipment seized, Shield Law was claimed so that he would not need to reveal his sources and how he came about receiving the next generation iPhone prototype. I thought this would be especially relevant to talk about because today is of course World Press Freedom Day, a UN supported day of awareness for governments to uphold the rights of the press.

In the segment On the Media features Johnathan Turley, a law professor from George Washington University, who addresses whether or not Jason Chen should be eligible for Shield Law and how this could effect journalists pursuing more serious matters such as James Risen. Last week New York Times reporter and novelist James Risen was give a Grand Jury Subpoena to reveal his sources for part of what he wrote on a book concerning the CIA. Professor Turley argues that whether or not Jason Chen is able to use Shield Law in his case, he could effect journalists like James Risen, who are actually reporting on subjects important to American freedoms, and that should potentially be protected.

Turley argues that Shield Law should probably not apply to a blogger like Jason Chen. He supposedly paid five thousand dollars for the phone and under California Penal Code Section 485 if an item is found and the owner is known and there is not a proper effort to return the item it is considered stolen. Turley believes that journalists such as Jason Chen could potentially weaken the power of Shield Law, which would be detrimental to our freedom of speech and freedom of press. I’m inclined to agree, and don’t believe what Jason Chen and Gizmodo did should necessarily be protected. I’m a frequent reader of Appleinsider, Macrumours, Gizmodo and Wired, but still believe that what Jason Chen was doing could potentially have been crossing the line. I don’t believe there was enough effort put into returning the phone on the part of the original finder of the phone and it is known that he shopped it around instead of trying to return it to the bar where it was found or Apple.

Similar to Turley’s argument I also believe that if Jason Chen is able to use the fact that he is a blogger halt investigation into how he found this “stolen” good, then why can’t anyone or more importantly any criminal do the same thing. The real question is who is actually a journalist? Twitter is a microblogging service and I definitely have followers I don’t know, does that make me a journalist? I use Facebook all the time and update the status, am I technically reporting then? Even this blog post I’m writing now can be viewed by anyone on the web, and does that make me a writer? I’d say that I am not, and I hope that Shield Law is used for those important cases like Risen’s rather than Chen’s.

Ethics, Policy, and the Information “Professional”

In James Moor’s “What Is Computer Ethics?,” he notes that computers are “special technology” raising equally “special” ethical issues.  New technology continues to confer new capabilities on humans, but it does so within a policy vacuum regarding how we should use these new capabilities, whose effects may be merely on the individual or they may reverberate society-wide.  Computer ethics, then, must consider both personal and social policies on the ethical use of the technology (Moor includes software, hardware, and networks under the “computer” rubric.)

What’s so “special,” then, about computers?  Many new technologies are considered on some scale to be revolutionary–are such claims, when made about computers, hyperbole or is there some basis to these claims?  Moor argues that a few features present themselves prominently.  First, they are affordable and abundant (within our society, certainly, and most other developed societies).  Additionally, they are increasingly integrated into many other devices which are not directly or intuitively tied to computer technology.  But abundance and cheapness, in themselves, are not sufficient characteristics for a revolutionary technology, or pencils, Moor points out, would hold a higher place in history.  What makes computers revolutionary is what he calls “logical malleability”–the capacity to be used modularly as components within many other technologies.  Analogous to the way steam engines were used in a “plug-and-play” (relatively speaking, of course) way to power the machines of the Industrial Age, computers are used modularly to bring intelligence to those machines in the Information Age.  This is what revolution looks like.  Importantly, though, although computers bring great logical power to a variety of media, it is important that we not view its operations in purely logical/numerical terms.  As computing power and utilization increases, so will the importance of our conceptualization of computing “work.”  To use a crude example: a packet sniffer at one level is simply copying bit patterns, but at another level, the nature and impact of its work is completely different and perhaps more relevant in human terms.

Such reconceptualizations will take on increased necessity, Moor asserts, not just because of its impact on human/social activity but also in light of its ability to transform those activities themselves.  Not much imagination is required to describe how computers have changed work, school, and social life.  But computers are transforming activities of broader scope and import as well.  Moor shows that computers’ roles in finance, education, and voting transform the essence of the activities, raising questions about the very nature of money, education, and even the concept of a fair election in a world where votes are counted and winners projected before significant amounts of voters have cast their ballots.  Logical malleability ensures that technology will inexorably expand its reach, creating situations to which existing policy cannot map.

Moor admits that his argument rests on a vision of the Information Revolution that some may not share, so he suggests a more ominous example, which he calls the invisibility factor.  Privacy abuses become all the more prevalent in the networked world, but at the same time, more difficult for the average person to detect.  He also warns of biases within code itself that benefit one party over another, citing the “SABRE” airline reservation system that made suggestions beneficial to American Airlines by default.  Lastly, Moor highlights invisible complex calculation as perhaps the greatest possible cause for concern.  As we rely increasingly on computers to do our calculations for us, we make judgments and choices about fallibility and traceability.  Without policies, we leave such interactions up to fate; without computer ethics, we have no framework for policy making.

Morris and Davidson’s “Policy Impact Assessments” describes the importance of addressing the public policy impacts of standards.  There aren’t enough resources for public policy people to assess and address the public policy impacts of every standards body due to a lack of resources — specifically, the large time commitment required by individuals, a lack of people with both the technical and public policy experience required, long “time horizons” for standards development, and the sheer number of technical standards bodies.  Due to this lack of resources, as well as the need for streamlined, “systematic approaches” to the consideration of public policy impacts that incorporate public policy concerns early in the design phase, the article suggests that it may be helpful in some circumstances for public policy people to create tools that can be implemented within standards bodies to identify areas where there may be public policy impacts.   One example tool is the draft of the Public Policy Considerations for Internet Design Decisions created for the IETF, which suggests that technologists consider questions related to the control of information (such as the creation of chokepoints that are easily amenable to surveillance and censorship), privacy (such as the use of persistent identifiers), and accessibility (such as for disabled individuals).  Tools created for technologists should be designed to “look[] at technical design issues from the perspective of the technology designer, not the public policy advocate,” because they will be executed internally.

In addition to suggesting the creation of policy impact assessment tools customized to the needs of individual standards bodies, the article recommends more generally that standards bodies solicit the input of public policy advocates early in the design process.  In addition, the authors observe that there is a need to raise awareness among technologists about “the social context and implications of their work” perhaps through education initiatives (the I-School!)

Although both “Tussle in Cyberspace” and the Morris and Davidson article address the tussle between technology and policy, Morris and Davidson place a greater emphasis on identifying design issues and turning them over to public consideration early in the design phase, rather than designing around the tussle — perhaps emphasizing issues that can’t be effectively designed around.  Even if the IETF claims that “we don’t do public policy,” the article suggests that public policy is inevitably impacted by IETF standards.  We see the “Tussle” continuing to play out in issues such as network neutrality, privacy, and more.

Morris and Davidson mention IPv6 as an example of “the ways that technical design decisions can directly impact public policy concerns,” in which people outside the organization pointed out the privacy implications of gnerating a unique identifier tied to the user’s Ethernet network card. By contrast, P3P is mentioned as example where “public interest participation has been a part of a technical design effort from its inception.”

However, even with initial public interest participation in P3P, and attempts to remedy the public interest issues in IPv6, both seem to have flaws from a usability/social point of view. On some platforms, IPv6 continues to require onerous interventions by users to circumvent the use of potentially non-anonymous identifiers, and P3P doesn’t seem to be widely used as people initially expected it to be. According to EPIC, P3P may not have been successful because it is too complicated, and the defaults don’t provide adequate privacy protections. If “user choice is a fundamental public policy concern,” as described in the “Tussle in Cyberspace” article, then attempts to address public policy impacts will need to incorporate usability concerns. Perhaps issues related to usability and the social world are yet another kind of expertise that public policy advocates need to bring to the table. However, as Morris and Davidson point out, there is no perfect way to address public policy impacts, because there is no way to know what all the potential impacts will be…

So how is an information professional to deal with ethical dilemmas in his/her daily work? In “Paramedic Ethics for the Information Professional,” Collins and Miller propose a “paramedic” method of ethics by which computer professionals can quickly and systematically assess all the relevant factors of an ethical problem that arises in their work. The authors call their approach “paramedic ethics” because it functions much like what paramedics do when they respond to an emergency. Paramedics are not doctors, but they are trained to quickly assess an emergency and make good decisions, stabilizing the problem until they can deliver a patient to better-trained personnel. Similarly, the paramedic approach to ethics is not meatn to replace a more formal or rigorous study of ethics, but rather serves as a toolkit that computer professionals can use to organize the relevant facts and actors in an ethical problem in order to come up with the best possible solution for all parties involved.

The method looks like an algorithm so that computer professionals can approach novel ethical dilemmas with a language and form they are familiar with. The method makes use of the concepts of vulnerability and opportunity. Simply speaking, a vulnerability is anything that results in a loss for one of the parties if a particular solution to an ethical dilemma were carried out, while an opportunity represents a gain. So higher pay, a sense of well-being or integrity, having a good reputation, etc. are all opportunities, while the loss of control over one’s own work is a vulnerability. The paramedic approach to ethics also centers around the different obligations that the constituents in an ethical dilemma have towards one another. According to the authors (who draw from theories of deontological and utilitarian ethics), the best solution to that dilemma is one where the most number of those obligations can be fulfilled.

In a nutshell, the paramedic method takes a user sequentially through a series of phases. Phase 1 involves gathering data. The individual faced with an ethical problem starts by listing all the possible alternatives for a decision or set of decisions he must make. The article presented the example of George, an electrical engineer working for an aerospace company. George headed the development of a computerized control system for a military aircraft. He became convinced that there was a fundamental flaw in the system’s design that could potentially lead to a crash if not addressed. However, George’s superiors were convinced that the system was safe because it had passed required tests. George was thus faced with the pressure of signing off on the system; to not do so would cause delays that might cause the company to miss the contracted delivery date. In addition, a non-compliant George could lose his duties to someone else.

Using the example of George, Phase 1 of the paramedic process would involve him listing out all the alternatives available to him. He could either sign off on the project or delay it, and in either case he could either publicly object to the company or publicly comply with it. Phase 1 also asks George to determine all the obligations and rights between all possible parties in this situation (and create a diagram if that helps). For example, George has an obligation to himself to keep his integrity and an obligation to support his family. His company has a right to his loyalty.

Phase 2 of the process asks users to assess how each alternative affects each of the parties involved. The article presented a series of matrices that helped to clearly organize all the data in this phase of the process. The matrices enabled the reader to quickly see, for example, that if George signed off on his project, he would not keep his integrity nor would he be fulfilling his obligation to the pilot testing his system, but he would be fulfilling his obligation to support his family (by keeping his job).

Phase 3 of the paramedic process asks the user to negotiate an agreement. By applying social contract ethics whereby all parties com to a consensus, the user must step into the shoes of all the other parties and ask whether or not he could live with a particular solution to the ethical problem at hand. In this way, the user might discover new alternative solutions during this step of the paramedic process. In our example case, social contract analysis might yield an additional possible solution in which George’s company, in return for him signing off on this place, agreed to inform the test pilots about possible airplane malfunctioning.

Finally, in Phase 4, the user applies deontological and utilitarian ethics in order to come to a conclusive decision. Deontological ethics focuses on the decision by assessing whether it violates or meets the obligations of the parties involved. Or, even if a decision affects multiple parties in the same positive or negative direction, it might not do so to the same degree. On the other hand, utilitarian ethics seeks to find the overall best solution for the most people–the one that maximizes opportunities and minimizes vulnerabilities for the most people. The result of Phase 4 should be a ranking of all the possible alternatives from best to worst in order to judge the best possible solution. The author notes that in the best case scenario, one alternative stands out as the best one, but otherwise the user must choose one according to his judgment.

The article goes on to apply the four phases of the paramedic method to another example case. Simply put, the entire paramedic method could be thought of as iteratively asking questions about who is involved in a decision, what the possible solutions are, what everyone can agree on, and what is the best possible solution given all that information. In conclusion, the authors express their hopes that professionals would utilize the paramedic method to make thorough inquiries about the impact of their ethical decisions. However, the authors are also careful to qualify that their method is not meant to be some sort of quick fix to difficult problems. They also note that “ethical problems are [not] amenable to unequivocal algebraic solutions.” Their main goal is just to help people see and consider all the relevant issues in an ethical dilemma such that the process they use is systematic and logical.

Having a unifying ethical approach can be especially helpful to information professionals, especially as the concept of an information professional grows and changes. Existing professional bodies have compiled codes of ethics, listed below:

  • ACM Code of Ethics
  • IEEE Code of Ethics
  • Association of IT Professionals Code of Ethics
  • Librarian’s Code of Ethics
  • USENIX SAGE (System Administrator’s Guild) Code of Ethics

Because of the gaps (and tussles) between technology and policy, a code of ethics can provide a valuable guide for professionals navigating ethical quandaries in the workplace. However, this is by no means a panacea. Tension between ethical approaches, professional ethics and the law, or even professional ethics and organizational policy, can still exist. The Paramedic Approach can help alleviate this by striving toward a “social contract” in which no parties end up satisfied (just kidding!). The aim is to arrive at a detente in which all competing factors have been taken into account and judged as objectively and fairly as possible.

The proliferation of codes implies a more diffuse standard for information professionals than that of doctors or attorneys. What exactly is an information professional’s duty of care? And how does the definition of an information professional change, when the abilities of a “Superuser” (to paraphrase Paul Ohm’s definition, a user who, via additional time, capabilities, or access, gains abilities to do things that the average user cannot) become extended to non-professionals everywhere? The recent case of the disgruntled former auto dealership worker who used a web-based administrative panel to disable more than 100 cars remotely exemplifies this issue’s complexity. What will it mean when we are all “Superusers” in some way?

-Rachelle, Prateek, Daniel, and Tony

Is Google Really Reasonable? Are Any of Us?

Is there privacy in public spaces? This is legal question has been around the block a time or two but has recently resurfaced in a media article in the NYTimes article titled “New Questions Over Google’s Street View in Germany.”  The article brings up an ongoing dispute between German officials and Google over what information can and cannot be collected and displayed from Google Street View.  If it sounds familiar to our “Oh Canada” neighbor that’s correct, German privacy laws are much stricter than the United States, which has no privacy issues with Street View.  In response to official and judicial outcry, Google’s German site agreed to blur out identifying information like faces, license plates, house numbers and even entire properties based on owners’ request.  Why not just put fig leaves over all of this offensive data sitting around?

While it might be easy to smile in the United States about the demure Germans (certainly the French took no issue), this debate brings up important considerations regarding the reasonableness of American privacy laws.  In the Nissenbaum article, the author points to the challenge of delineating a “reasonable expectation of privacy in public” (12).  Exactly what does “reasonable” mean anyway?  If I’m walking down the street and taking pictures of my dog and happen to capture a view inside my neighbor’s window is this reasonable? According to the California Civil Code Section 1708.8 this would all depend on whether the neighbor might find said picture “offensive to a reasonable person.”  So apparently whether I’m reasonable and whether my neighbor is reasonable legally matters!

The U.S. court cases that provide a precedence for this legal gray area offer little help in qualifying “reasonable.” In Nessenbaum we are given the example of Florida v. Riley in which the police discovered marijuana growing the defendants yard.  The court ruled that the police department did not violate an expectation “that society is prepared to recognize as ‘reasonable'” by flying over someone’s yard at 400 feet in a helicopter (14). Sure I take out my helicopter out all the time, I just don’t do it while walking the dog, and that my friends seems reasonable.

Senators appeal to Facebook

I found this article interesting, as it demonstrates a very active role taken by national politicians related to something as (seemingly) trivial as Facebook:

http://voices.washingtonpost.com/posttech/2010/04/senators_pressure_facebook_to.html

My immediate reaction to this article was “why are our Senators spending time writing letters to Facebook when they should be dealing with more important stuff, like healthcare and immigration rights, and you know, other life-or-death types of things…?”. But after thinking about it, I realized that this action was more than just a publicity stunt directed towards their constituents of the Internet generation: it gives emphasis to the fact that Facebook, while it may have started as a place to post pictures of last night’s parties and stalk your ex-high school crushes, now represents the frontier in collection and storage of (non-financial) personal information–so its policies are likely to be referenced as standards in the “Sears Holdings Management/FTC” issue or “Quon v Arch” case of the future. And after our class assignments, we all know how beneficial (or dangerous) it would be for advertisers and other third parties to be able to store personal data indefinitely. Yes, this really does “fundamentally alter the relationship between the user and social networking site,” and I am glad that it was officially recognized.

[I wonder if those four senators would have been elected to office if information they had posted on Facebook in their youth was available to be stored indefinitely by media outlets…]

Copyrights and Patents and Trade Secrets and Non-Competes

These readings came at an apt time, just as iSchoolers are no doubt poring over arcane clauses in summer job or internship contracts. Well, wonder and worry no longer about what your brief employments will mean for your moving on to bigger and better positions in 2011.

Two of the three cases on this slate dealt with what kinds of limitations can and cannot be assumed to be in effect, or explicitly imposed, by an employer in the case of an employee who later moves on to a potential or current competitor. The balance of interests were moved towards the employee, while it was made clear that employers must make explicit covenants in their employment contracts, from the outset of hiring, that set expected limits on future competitive work.

The third case dealt was the few judicial rulings to date on Free and Open Source Software (FOSS) – an area that, if the Noise list is anything to go by, is of great interest to iSchoolers.

In Wexler v. Greenberg, the Pennsylvania Supreme Court determined that, basically, an employer cannot restrict retroactively where a former employee can work and in what capacity, at least on the foundation of trade secrets.

For something (a process, a product, research, the formula for your red-and-white-logo cola) to be in legal terms a trade secret, it must meet two conditions. First, it must be private information that is financially beneficial information and that benefit depends that others do not know it also. Second, it must be demonstrable that the owner of a trade secret has made reasonable efforts to keep this information secret. (Trade secret laws can vary slightly from state to state, but they follow this general structure.)

In this case, the issue is whether Greenberg, a former employee of Wexler’s company Buckingham Wax Co. (BWC), illegally disclosed BWC’s trade secrets when he moved to a new employer, Brite Products Co. (BPC).

Greenberg served as BWC’s chief chemist starting in 1949; his duties were split between reverse engineering competitors’ products in order to develop BWC’s versions of them, and working with chemical sourcers. It’s interesting to note that from 1952 to 1956, BPC and its predecessor company bought mostly, and sometimes exclusively, from BWC, to repackage and resell BWC’s cleaning products to industrial customers, under the Brite label.

In 1957, BPC hired Greenberg away, in order to do exactly what he’d done at BWC. As a result, BPC stopped buying from BWC, but began manufacturing their own products. These were, ironically, reverse engineered versions of BWC’s products.

The initial decision by a lower court found that the formulas for BWC products were trade secrets and that Greenberg had appropriated them, in the sense that he took to BPC the knowledge he had gained in working at BWC. The court also said that this appropriation was in violation of “the duty” the Greenberg owed to that company “by virtue of his employment.”

Greenberg appealed to the PA Supreme Court. The case law it examined included Fralich v. Despar (1894), which stated that an ex-employer was protected “provided… enforceable covenant so restricting his use” of a trade secret and Pittsbugh Cut Wire Co. v. Sufrin (1944), which found similar if the ex-employee had been “bound to secrecy” by a “confidential relationship”.

However, the court stated that all aptitude, skill, ability, and the like, were “subjective knowledge”. And that an employee, or ex-employee, can use and grow these capabilities “unless curtailed through some restrictive covenant”.

As a result, the ex-employer has the burden to show first that there is a legally protectable trade secret, and that there is a “legal basis” (such as a specific covenant, or a confidentiality agreement) “upon which to predicate itself”.

But in the case of Greenberg, there was no such thing: “At no time during Greenberg’s employment with BWC did there exist between them a written or oral contract of employment or any restrictive agreement.”

The court also took up the issue of whether the fact of an employment relationship can be enough to serve as such a restrcition.

In doing so, the court had to balance protecting companies from unfair competition (when an employee absconds to another company, secrets in hand) versus the individual pursuit of meaningful work.

The PA Supreme Court decided that past law weighs toward the individual – even when a covenant exists, courts can scrutinize it for reasonableness (see Morgan’s Home Equipment v. Martucci (1957)).

The court found that there was no violation of trust or a confidential relationship, since BWC had never included any explicit restrictions in Greenberg’s contract, and that Greenberg’s work was not guided specifically by the company, nor technically “experimentation or research” but “fruit’s of Greenberg’s own skill as a chemist”. This meant that his work was not a trade secret, but his own expertise.

In the more general case, the court stated that “ownership of a trade secret… does not give the owner a monopoly on its use” but instead “merely a proprietary right” against unfair means. And the trade secret must be pre-existing.

The relevance today is, seen cynically, all the non-compete and non-disclosure clauses in the employment contracts you’re sure to see soon, if not already. More ideally, this means that it is difficult for a former employer to come after you if you take to your new job all your skills, even if you learned some of them under their employ.

Recent high-profile trade secret laws include Apple v. Does (http://www.eweek.com/c/a/Apple/Court-Hears-Final-Arguments-in-Apple-Trade-Secret-Suit/ ) and Apple v. DePlume (http://www.eweek.com/c/a/Apple/Rumor-Site-Gains-Lawyer-in-Defense-Against-Apple/). Both involved the publication of what Apple claimed were trade secrets – unreleased product info – and both illustrated features of the CA Uniform Trade Secrets Act (CA UTSA).

The case of Whyte v. Schlage was all about the concept of “inevitable disclosure” – that is, whether you will “inevitably” rely on trade secret knowledge should you take a similar position at a new employer. That is, will your new bosses at Gimbel’s learn all about the trade secrets you absorbed when at Macy’s?

The answer is no – this was the first published case in California that dealt with this issue, and the court rejected it.

Whyte was Schlage’s vice president of sales when he was presented with a “what would it take?” offer from Kwikset, another manufacturer of locks. He accepted this dream deal on 3 June… but didn’t resign his old position until 11 days later, after a big and confidential meeting with a client both companies coveted on 5 June.

Schlage felt that Whyte was taking with his certain trade secrets, such as product line information, customer and wholesale pricing, promotions, and other things such as technical information about product manufacture (which the appeals court later termed a “quintessential trade secret”). Whyte had signed a confidentiality agreement with Schlage, but he maintained that the above were “broad” categories of business information. The trial court in the initial case of Schlage suing Whyte (what we’re talking about here is the appeal) agreed that none of these were trade secrets. The Appeals Court said “some” were, but left that finding up to the later trial.

The larger issue of inevitable disclosure has its history in the Seventh Circuit Court of Appeals case PepsiCo v. Redmond (1995). There, the court said the Illinois Trade Secrets Act (based on the general UTSA) supported a district court’s injunction of William Redmond – ex-general sales manager for Pepsi – against taking a comparable position with Quaker Oats (both companies were hotly fighting over sports drinks at the time, an area Redmond worked in).

There was no doubt Redmond has knowledge of some or many of Pepsi’s trade secrets in this area – formulation, marketing strategies, and so on. The court had to manage the tussle (to coin a term) between the employee’s ability to move jobs against protection of a company’s trade secrets. In this case, both the IL court and the Circuit Court fell on the side of the inevitable disclosure doctrine: “unless Redmond possessed an uncanny ability to compartmentalize information, he would necessarily be making decisions about [Quaker’s products] by relying on his knowledge of [Pepsi’s] trade secrets”.

The Whyte V. Schlage court noticed state and federal decisions that seemed to support this, as well as noting Whyte’s “lack of forthrightness”. But in its decision, the court wrote that “decisions rejecting the inevitable disclosure doctrine correctly balance competing public policies of employee mobility and protection of trade secrets. The inevitable disclosure doctrine permits an employer to enjoin the former employee without proof of the employee’s actual or threatened use of trade secrets based upon an inference (based in turn upon circumstantial evidence) that the employee will use his or her knowledge of those trade secrets in the new employment.”

The court also noted that this “injunction restricting employment” was effectively a retroactive non-compete clause, and said that the CA Business and Professions Code Section 16600 generally prohibits non-competes.

California law also protects trade secrets, though – tussle! But the court said that Section 16600 doesn’t invalidate employers including a “don’t solicit former customers” clause in the initial employment contract; this would satisfy Section 16600 as well as protect employers who worry about unfair competition from former employees. Without this clause in a contract, inevitable disclosure doctrines rewrite the employment contract without the employee’s consent.

It’s important to keep in mind that there can be a slim distinction between “inevitable” and “threatened” disclosure; companies can worry about employees going off to competitors, and seek relief under the U.S. USTA.

When facing contracts, be sure to know that employers must identify and protect trade secrets from the outset when you face them. And they must, if worried, have hard evidence of misappropriation of a trade secret. They cannot act upon assumptions that you will behave badly.

An interesting take on the whole thing is at http://venturebeat.com/2006/11/16/how-to-leave-a-company-and-not-get-sued/

The Jacobsen v. Katzer case (which was settled just two months ago PDF here: http://www.trainpriority.com/court_docs/404_dismissal.pdf) addressed the issue of whether a FOSS license such as the GPL or, in this case, the Artistic License, can be enforced. That’s presenting it a bit strongly, but previous to this decision by the Appeals Court, the issue had never been pressed, and the District Court ruling, which this decision vacated and remanded, had relegated the question of the Artistic License to contract law, not copyright law. If this had stood, those putting out products under any FOSS license would have as their only tool a breach of contract claim – which would be problematic with free products.

Jacobsen was a model train enthusiast, when he wasn’t a high-energy physicist at the Lawrence Berkeley Lab. He and some collaborators concocted an open-source set of Java tools (the Java Model Railroad Interface, or JMRI) for controlling their trains. They posted the tools, and their subsequent open-source Decoder Pro application, to the Sourceforge.net web site, labeling it free under the terms of the amusingly named Artistic License (AL).

This license, like the better-known GPL and BSD licenses, allow anyone to download, copy, and use the relevant applications and code. (According to gnu.org, the AL 2.0 is compatible with GPL through its licensing options.) Downloaders can even modify the code and reuse it for their own purposes and/or products. What the AL states is that this use of the copyrighted material is allowed as long as the user is sure to “duplicate all of the original copyright notices and associated disclaimers” (Section 1).

In addition, Section 3 makes specific requirements, and is worth quoting in full:

“3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when you changed that file, and provided that you do at least ONE of the following:
a) place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an equivalent medium, or placing the modifications on a major archive site such as uunet.uu.net, or by allowing the Copyright Holder to include your modifications in the Standard Version of the Package.
b) use the modified Package only within your corporation or organization.
c) rename any non-standard executables so the names do not conflict with standard executables, which must also be provided, and provide a separate manual page for each non-standard executable that clearly documents how it differs from the Standard Version.
d) make other distribution arrangements with the Copyright Holder.”

In 2005, Jacobsen received a set of notices and bills for licensing fees from Katzer (who owns KAMIND Associates, doing business as KAM Industries). Katzer claimed that code in JMRI infringed on a patent owned by KAM, which produced and marketed a commercial model train product called Decoder Commander. The bill was for $203,000.

Jacobsen originally filed the first suit in this saga, claiming in response that the patent was fraudulently obtained – and therefore, invalid. The source of the fraud was that Katzer’s product copied some JMRI and Decoder Pro files and used them without complying with the terms of the AL. He requested a preliminary injunction against KAM.

His claims were not that Decoder Commander contained the files. This was allowed under the AL. The problem was the violation of explicit terms of the AL; the Decoder Commander software did not include the original authors’ names; the JMRI copyright notices; and references to a COPYING file, as required by the JMRI copyright notices; the identification of Sourceforge or JMRI as the original source of the code; and a description of the changes made to the original files.

Katzer, in turn, stated that the files in question did not show sufficient originality (a topic we discussed earlier this semester) for copyright protection, since they consisted of variables JMRI members transcribed from model train reference materials. But JMRI team members demonstrated to the court that the process of selecting, arranging, and so on, of these variables met the “low threshold” required for originality.

However, though the question of copyright and ownership was settled, the District Court decided that the AL was “intentionally broad” and non-exclusive. In general, a copyright owner waives the right to sue for infringement if using a non-exclusive licence; a license needs to be “limited in scope”. As a result, the court said, the AL didn’t create liability for copyright infringement. Therefore, the court denied Jacobsen’s request for a preliminary injunction, stating that the question was one of breach of contract, not copyright infringement.

(A note on these injunctions: They are very strong once in place, and are reversible only if shown that they have a probability of success on their merits and that there is a possibility of irreparable harm, OR there is a serious question of merit where hardships are more on the moving party.)

However, the Appeals Court saw it differently. It called the “heart of the argument” whether the terms of the AL are conditions of the copyright license agreement, or “merely covenants to” it, at the District Court said. I admit to some confusion over the precise legal definition of “covenant” in this context, but the upshot is that if the AL consisted of those only, it would be relegated to contract law; if the terms can be called “conditions” instead, these are the bases for copyright claims.

The Appeals Court noticed that the AL actually used the terms “condition” a number of times when defining its terms. In addition to this textual analysis, the court said that these “conditions are vital to enable the copyright holder to retain the ability to benefit from the work of downstream users” – that is, for Jacobsen to see how people have “joined in” and built upon, fixed bugs in, or otherwise contributed to his original work.

A phrase from the decision that should be noted by all potential FOSS developers: “These restrictions [in the AL] were both clear and necessary to accomplish the objectives of the open source licensing collaboration, including economic benefit.” That is, both free (as in beer) and free (for-profit but open) projects can enforce terms of a non-exclusive contract like the AL or GPL or BSD, and under copyright law – including seeking preliminary injunctions against those who violate these terms.

Next Page »