Welcome to the Weintraub Resources section. Here, you can find our Blogs, Videos, and Podcasts, in which Weintraub attorneys regularly provide insights and updates on legal developments. You can also find upcoming Weintraub Events, as well as firm and client News.


The Attorney General’s Google Search Comes Up Empty – So Far…Is Your Online Privacy At Stake?

It was just a simple discovery tool, used by the Department of Justice in defense of a lawsuit brought by the American Civil Liberties Union. It hasn’t gotten much attention. In fact, for several months, it got no attention at all. But it’s starting to. So, what is “it?”

On August 25, 2005, Alberto Gonzales, U.S. Attorney General, issued a subpoena to Google, Inc., the online search engine used by millions every day to navigate the Internet. In this subpoena, the Attorney General demanded that Google, who was not a party in the case, produce “1. All URL’s that are available to be located through a query on your company’s search engine as of July 31, 2005,” and “2. All queries that have been entered on your company’s search engine between June 1, 2005, and July 31, 2005.” In essence, the Department of Justice was asking Google to produce the Internet, and a list of all searches on the Internet for two months.

The demand comes at a time when the issue of privacy and governmental intrusion is becoming a concern to more and more citizens. The U.S. Patriot Act, a controversial law granting the government significant investigative power, is up for renewal. This Act has many opponents in the government and in the private sector due to the intrusive nature of the powers it affords to federal law enforcement agencies. The government is also coming under considerable fire for the widely-reported wiretaps it used to fight terrorism.

This subpoena is not being used to fight terrorism. The purpose for this subpoena is to defend the constitutionality of the Child Online Protection Act-a law that requires commercial Web sites to shield minors from materials that may be harmful to them or face potential criminal penalties including prison. As stated in the declaration of government expert Dr. Philip Stark, Professor of Statistics at the University of California at Berkeley, “reviewing URL’s available through search engines will help [the government] understand what sites users can find using search engines, to estimate the prevalence of harmful-to-minors (HTM) materials among such sites, to characterize those sites, and to measure the effectiveness of content filters in screening HTM materials from those sites.” Further, “reviewing user queries to search engines will help [the government] understand the search behavior of current web users, to estimate how often web users encounter HTM materials through searches, and to measure the effectiveness of filters in screening those materials.” This information, the government says, would assist its “efforts to understand the behavior of current web users, to estimate how often web users encounter harmful-to-minors material in the course of their searches, and to measure the effectiveness of filtering software in screening that material.”

Not surprisingly, Google objected to the demand, claiming the demand was too broad, burdensome, and intrusive. The Department of Justice and Google worked toward a compromise regarding the subpoena. The Department agreed to limit its request to only one million random URL’s and a random sampling of one million search queries submitted to Google on any given day. However, Google still objected to the demand, and refused to comply with the subpoena. According to Google, complying with the demand would require it to divulge important trade secrets, and would require divulging information about the individuals that use its service, and even potentially revealing personal identifying information about its users.

This dispute went largely unnoticed by the public until January 18, 2006, when the Attorney General filed a motion to compel compliance with the subpoena in a federal court in San Jose. The motion to compel states that “after lengthy negotiations, the Government has narrowed this request to seek the production of an electronic file containing ‘the text of each search string entered onto Google’s search engine over a one week period (absent any information identifying the person who entered such query.)'”

Filing this public motion got some attention. The story was reported in the major newspapers and on online news sites when the motion was filed. Privacy groups, such as the World Privacy Forum and the Electronic Privacy Information Center are rallying behind Google’s stance resisting the subpoena. Many of these organizations are filing amicus briefs with the court. Not to be left out, Congress is also becoming involved. Sen. Patrick Leahy sent the Attorney General a request for information regarding the subpoena, including the potential for production of personal identifying information and any safeguards to prevent such production. Representative Ed Markey said he intends to introduce legislation to curb records retained by Web sites.

It will be interesting to watch this dispute play out. Google’s response to the motion is due on February 17, 2006, and the government’s reply is due on February 24th. Amicus briefs are also due February 24th, and the hearing on this motion has been moved to March 13th.

Lost in this dispute is the fact that the subpoena to Google was only one of the subpoenas issued by the Attorney General. America Online, Microsoft Network, and Yahoo apparently did not challenge the subpoenas. Have you used any of these search engines lately? Do you remember what search strings you used?

Intend To Infringe = Go To Jail

Intend to infringe – go to jail. That’s what the United States Attorney General proposed at a recent anti-piracy summit hosted by the U.S. Chamber of Commerce. United States attorney general Alberto Gonzales said the Department of Justice recently submitted to Congress the Intellectual Property Protection Act of 2005 aimed at toughening up intellectual-property enforcement.

Under current law, criminal copyright liability is applicable where a person infringes a copyright willfully, either for purposes of commercial advantage or private financial gain, or where that person reproduces or distributes by any means, one or more works with a total retail value of over $1,000 during any 180-day period. Willfulness has been held to mean that the defendant’s act was a voluntary, intentional violation of a known legal duty. As such, where the defendant raises bona fide issues concerning fair use or a lack of substantial similarity, while infringement may be found, the defendant may lack the required scienter for criminal liability.

The new bill would increase the scope of criminal copyright liability to include conduct that comprises an “intent to infringe” a copyright. The way in which the proposed language reads, the willful element would also apply to intent to infringe liability.

In Gonzales’ speech at the U.S. Chamber of Commerce’s Anti-counterfeiting Summit, he praised the proposed bill as toughening penalties for repeat criminal copyright offenders and overall strengthening copyright protection. “We also propose to strengthen restitution provisions for victim companies and rights holders, in order to provide maximum protection for those who suffer most from these crimes. And we propose to make clear that exporting infringing goods is the same as importing them…and should be punished accordingly” Gonzales said. Every member of the global economy has a responsibility to keep counterfeit goods out of the global market.”

The proposed legislation also expands the scope and breadth of property that is subject to forfeiture and destruction. Under the current law, the court has the discretion of ordering the forfeiture and destruction of certain infringing works. The proposed legislation appears to take away the court’s discretion in ordering forfeiture and now mandates forfeiture of those same infringing works. In addition, the new law appears to require the forfeiture of “any property constituting or derived from any proceeds obtained directly or indirectly” for the criminal copyright infringement, as well as “any property used, or intended to be used, in any manner or part, to commit or facilitate the commission of a violation” including “electronic, mechanical, or other devices for manufacturing, reproducing, or assembling such copies”. In addition, the proposed law would require convicted criminal infringers to pay restitution to the copyright owner as well as “any other victim of the offense.”

The bill would also modify the requirement that a copyright holder file a copyright application prior to the institution of criminal action for infringement. Under current law, section 411 of the Copyright Act requires a copyright registration as a prerequisite for any type of infringement action, be it civil or criminal. The new law would allow the DOJ to prosecute criminal infringers without the copyright owner first having to register the work.

In his speech, Attorney General Gonzales argued that the DOJ has a “responsibility to vigorously enforce IP laws – and develop a culture of respect for IP rights – in order to harness America’s creative energy and ingenuity for the future of our economy.” “While these crimes may appear harmless to some,” Gonzales continued, “they actually have a measurable impact on our entire economy – and they undermine the values of competition and creativity that are important to our way of life.”

The Grokster Decision- What Does It Really Mean?

On June 27, 2005, the United States Supreme Court handed down its decision in MGM v. Grokster.#160 That case involved an appeal from the Ninth Circuit by MGM, various record labels and other content owners of an adverse decision in their attempt to hold Grokster and other peer-to-peer network companies liable for copyright infringement.#160 MGM and the other content owners had initially filed a lawsuit against Grokster and other peer-to-peer network technology companies to hold them liable for damages resulting from their supplying the technology that enabled users to trade online copyrighted works.#160 The Ninth Circuit, upholding the District Court’s finding, held that the technology companies could not be held either vicariously liable or liable for contributory copyright infringement.#160 In coming to its conclusion, the Ninth Circuit interpreted the Sony v. Betamax case in holding that the distribution of a commercial product capable of substantial noninfringing uses could not give rise to contributory liability for infringement unless the distributor had actual knowledge of specific instances of infringement and failed to act on that knowledge.#160 Because the Ninth Circuit found the technology company’s software to be capable of substantial noninfringing uses and because respondents had no actual knowledge of infringement resulting from the software’s decentralized architecture, the court held that they were not liable.#160 (The architecture of the defendant’s file trading network is an open network.#160 That is, it does not have a central server like the old Napster network but rather uses nodes and supernodes; computer systems that are owned by users of the software and have no relationship to the defendants.)#160 The Ninth Circuit also held that the defendants did not materially contribute to their user’s infringement because the users themselves searched for, retrieved and stored the infringing files, with no involvement by respondents beyond providing the software in the first place.#160 Finally, the court held that the defendants could not be held liable under a vicarious infringement theory because the defendants did not monitor or control the software use and had no agreed upon right or current ability to supervise its use and had no independent duty to police infringement

The Supreme Court stated that the Ninth Circuit read the Sony case too broadly.#160 Instead, the Supreme Court stated that the test for contributory or vicarious liability revolves around the intent of the defendant, namely did the defendant distribute its device with the object of promoting the devices used to infringe the copyrighted works of third parties, as shown by clear expression on other affirmative steps taken to foster infringement.#160 If the defendant goes beyond mere distribution with the knowledge of third party action, the distributor is liable for the resulting acts of an infringement by third parties using the devices, regardless of the devices lawful uses.

What will this decision really do in the way of advancing the entertainment industry’s fight against illegal file trading, and how does this affect the growth of new technology?#160 Numerous pundits claim to have the answer.#160 However, human nature being what it is, I fail to see how anyone can predict the long term ratifications of this decision.#160 As a practical matter I believe that if a company creates a product with the primary intent that it be used for an illegal purpose, the company should be held liable.#160 If Grokster and the other defendants built a business model that depended on and encouraged users to engage in illegal file trading, then they should be held liable.#160

Representing record labels, television production companies, and other content owners, I understand how piracy affects their bottom line.#160 However, if illegal activity is an incidental byproduct to an otherwise productive and beneficial technology that is a cost of societal advancement that content owners have to bear.#160

The problem with the Grokster decision is how does one establish a company’s principal intent?#160 Unfortunately, unless the Company makes an express statement the only way is through litigation.#160 While I don’t think that the Grokster decision is death knell for new technology as some pundits declare, I do see how, as a result of this decision litigation can be used to slow or quash the growth of new technology.#160 This is a real possibility; especially when we are dealing with the entertainment industry.#160 I have found that some entertainment industry companies are reluctant to venture outside of their known safety zone.#160 They’re reticent to try new things that challenge or disrupt their existing business model.#160 From a business perspective, I can understand this.#160 Nobody likes to have their bottom line affected.#160 However, technological growth depends on innovative people pushing boundaries.#160 I would hate to see the Grokster decision slow technological advances that can, in the long run, be beneficial to all of us.

New Laws Attempt To Regulate The Internet

Download: New Laws Attempt to Regulate the Internet.pdf

Article first appeared in the March / April 2004 issue of Sacramento Lawyer, the bi-monthly publication of the Sacramento County Bar Association.

Last year the Internet was front and center in a number of controversies and new legislation. Aside from the music and movie industries continuing struggle and court battles over content piracy, 2003 saw significant legislative activity in areas dealing with the Internet. California’s legislators spent a significant amount of time on Internet related legislation, including crafting extremely strong anti-spam laws (SB 186) only to have it preempted by a weaker federal act. What follows below is a wrap up of the more relevant Internet legislation, federal and state, passed last year.

The Federal CANSPAM Act
In the early days of December, 2003, the United States Congress enacted the Controlling the Assault of Non Solicited Pornography and Marketing Act of 2003, also known as the CANSPAM Act of 2003. Supporters of this act call it tough; it has substantial criminal penalties and fines for spammers. The chief co-sponsor of the Act, Senator Charles Schumer (D-New York), is quoted as saying: “With this bill, Congress is saying that if you are a spammer you can wind up in the slammer.” However, critics of the Act, which went into effect on January 1, 2004, complain that it does not go far enough and is not as tough as its supporters would like the general public to believe.

CANSPAM prohibits specific conduct related to electronic mail. Specifically, the Act prohibits the use of false headers, using false information to register five or more email accounts, and intentionally initiating multiple commercial email messages from any combination of these accounts; engaging in email address harvesting and “dictionary attacks”; using scripts or automated programs to register multiple electronic mail accounts for the purpose of transmitting commercial electronic mail messages; and relaying or retransmitting commercial electronic mail messages through a computer network which the person does not have access rights, as well as other tricks of the spam trade. The Act provides for substantial monetary fines and penalties as well as jail time up to five years. In addition, the Act provides for forfeiture of all property traceable to the gross proceeds obtained from the offenses, and any equipment or other technology used in committing the offenses.

The Act also requires the senders of sexually oriented material to place a warning label on commercial electronic mail that contains sexually oriented material. However, if the recipient of these messages has already provided his or her affirmative consent to continue to receive these messages, no warning label is required.

While the imposition of civil fines, forfeiture and jail time make the Act sound rather ominous, critics still complain it will not stem the flow of spam. Critics say the problem is that the new law lacks an opt-in mechanism. This, critics say, will allow spammers to continue to send unwanted spam, despite the Act’s harsh criminal and civil penalties, as long as the message contains an opt-out mechanism and a functioning return email address. Because the new federal law preempts state law that specifically regulates commercial email messages, provisions like California’s law, which requires express consent or a prior commercial relationship, will not apply.

The new federal law places enforcement with the Federal Trade Commission and allows civil actions by the various state Attorney General Offices. The Act also allows a limited private cause of action by internet access service providers. However, unlike California’s law, the new federal law does not provide a private cause of action by consumers. Still, most commentators believe that California consumers will be able to pursue a remedy under California’s unfair competition laws. (Bus. & Prof. Code, 17200.)

The preemption provision does leave some exceptions. The Act only supersedes state law that “expressly regulates the use of electronic mail to send commercial messages except to the extent that any such statute, regulation, or rule prohibits falsity or deception in any portion of a commercial electronic mail message or information attached thereto.” In addition it appears that states may still have the right to pursue claims that may arise in spamming situations, such as state trespass laws, breach of terms of service or use contracts, and actions under the Computer Fraud and Abuse Act.

On an international level, the new federal act places the United States at odds with Europe and its spamming legislation. In Europe, for the most part, spam is per se illegal. Ninety percent of Europe’s spam originates in the United States where spamming, after January 1, 2004, will be allowed. This is bound to cause tension between the United States and Europe as the two nations continue to attempt to harmonize intellectual property laws.

Outspoken critics of spam lament that the new federal law will do absolutely nothing to stem the growing tide of unwanted commercial email. Some critics note that spammers are deceptive by nature and, despite the new law, would not hesitate to use false or misleading email headers. In addition, the Act will do nothing to prevent serious spammers from opening up accounts in Bermuda or South Africa and continue to bombard the United States with spam from off shore.

Companies Now Required To Disclose Breaches Of Database Security
On July 1, 2003, a new law began requiring businesses to disclose to California residents any breach in the security of their databases when that breach results in or could reasonably result in the disclosure or acquisition by an unauthorized third party of personal information about California residents. This also applies to companies that maintain computerized data for others.

California Civil Code section 1798.82 applies to companies located both within and outside of California. While the new law was implemented as a measure to combat the increasing incidents of identity theft, it will also have sweeping implications for a wide range of businesses. While companies that encrypt all personal data will be exempt from the new law’s disclosure requirements, those that do not must begin to comply with the law or face penalties prescribed in the statute.

The new Civil Code section 1798.82 revolves around the unintended disclosure or acquisition of “personal information” due to a breach in the security of a computer database. The statute provides: “Any person or business that conducts business in California, and that owns or licenses computerized data that includes personal information, shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.” The section also provides that “Any person or business that maintains computerized data that includes personal information that the person or business does not own shall notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person.”

A breach of the security of the system occurs when there is an unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the person or business. The good faith acquisition of personal information by an employee or agent of the owner of the system for business purposes is not a breach of the security of the system, provided that the personal information is not used or subject to further unauthorized disclosure.

The type of personal information which triggers the disclosure requirement includes an individual’s first name or first initial and last name in combination with any one or more of the following:

(1) Social security number.

(2) Driver’s license number or California Identification Card number.

(3) Account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

Not included in the definition of “personal information” is publicly available information that is lawfully made available to the general public from federal, state, or local government records.

Upon discovery of a breach in the security of a business database, the business must notify California residents of the breach in “the most expedient time possible and without unreasonable delay.” Business may make these notifications through written notice. A business may also make these notices electronically, as long as the notice provided is consistent with the provisions regarding electronic records and signatures as provided in the Electronic Signatures in Global and National Commerce Act.

If the business required to provide notice to Californians regarding the breach of security can demonstrate that the cost of providing notice would exceed $250,000, or that the business must send out more than 500,000 notices, or that the business does not have sufficient contact information the business may provide substitute notice through e-mail notice, posting the notice on the businesses web site, and notification to major statewide media.

The new law applies to companies that conduct business in California, regardless of whether they are located physically within the state. The statute gives no guidance on the circumstances when a company is conducting business in California, and therefore subject to the provisions of the statute. This lack of guidance makes it extremely difficult for companies not domiciled in California to determine whether they must comply.

If an out of state company is subject to the provisions of the statute and does not know it, that company could be in for a rude awakening. The statute authorizes any customer injured by a violation of the statute to recover damages.

If they haven’t already done so, companies should take steps to comply with the new law. Companies should establish internal policies and protocols that would be implemented when a breach which would require notice under the statute is discovered. In doing so, the company should implement a means to retain all records dealing with the discovery of the security breach and subsequent notification if it is later challenged in a civil suit.

California Adopts An Online Privacy Policy
The California Online Privacy Protection Act of 2003, which goes into effect on July 1, 2004, requires the operator of a commercial website to maintain a privacy policy that meets certain requirements. The privacy policy must specifically provide the following information: 1) it must clearly identify the categories of personal user information (i.e., first and last name, street address, e-mail address, telephone number, Social Security number and any other information that would enable the user to be contacted either online or offline) collected through the website; 2) it must provide a description of the process by which a user can review and request changes to any personal user information; 3) it must explain how the operator will notify consumers of changes to the privacy policy; and 4) and it must provide the effective date of the privacy policy. The Act requires the commercial operator to “conspicuously post” such a privacy policy.

To be conspicuously posted, the privacy policy must either be posted on the home page or there must be an iconic or text hyperlink on homepage or the first significant page that links to privacy policy. The icon or text hyperlink must contain the word “privacy” and must be in a color an/or size which contrasts with the background and surrounding text.

The reach of the Act is longer than most might think. The new privacy policy requirements apply to operators of commercial websites or online services that collect personally identifiable information through a website from individual consumers who live in California, regardless where the website operator resides.

Scott Hervey is a shareholder with Weintraub Genshlea Chediak.

This article is the copyrighted property of the Sacramento County Bar Association and Sacramento Lawyer has given Weintraub Genshlea Chediak permission to publish this article in its entirety.