Professional Documents
Culture Documents
Jon M. Garon*
Abstract:
Social media has become a dominant force in the landscape of modern communications.
From political uprisings in the Middle East1 to labor disputes in Washington State,2 social media
has fundamentally disrupted the way in which communications take place. As noted
constitutional scholar Erwin Chemerinsky explained, “technology has changed and so has First
Amendment doctrine and American culture. It now is much more clearly established that there is
a strong presumption against government regulation of speech based on its content.”3 Just as the
government must tolerate more speech, the same thing is true about employers. Chemerinsky
further notes that “for better or worse, profanities are more a part of everyday discourse.”4
Abrasive speech may be coarse from the word choice or may more readily upbraid the objects of
the speech. Whether foul or abusive, such speech now pervades commercial and social media.
Social media fundamentally upends the notion of the traditional commercial media
environment and with that, it reverses the established legal doctrine from constitutional
assumptions to everyday rules involving copyright, defamation, and unfair labor practice. For
employers, these rules are particularly important to navigate because they effect the manner in
which the companies communicate with the public, how employees communicate with each
other, and how laws are restructuring the employee-employer relationship. The transformation is
taking place with changing policies affecting trade secrets, confidential information, copyrighted
material, aggregated data, trademarks, publicity rights, and endorsements.
This article highlights the nature of the changes as they present the new paradigm shift and
provides some guidance on how to prepare policies for the transitional model. The article tracks
the rise of the many-to-many model of social media, its effect on commercial speech, intellectual
property, and labor law. The article concludes with suggestions on employment policies geared
* Director, NKU Chase Law + Informatics Institute and Professor of Law, Northern Kentucky University
Salmon P. Chase College of Law; B.A. University of Minnesota; J.D. Columbia University School of Law 1988.
Portions of this article was originally developed for presentation at the 2013 Florida Bar Association Intellectual
Property Annual Meeting and the meeting of the Dayton Intellectual Property Law Association.
1
See John D. Sutter, YouTube restricts video access over Libyan violence, CNN (Sept. 13, 2012, 5:38 AM),
http://www.cnn.com/2012/09/12/tech/web/youtube-violence-libya.
2
Rain City Contractors, Inc., 19-CA-031580 (June 4, 2009), http://www.nlrb.gov/rights-we-protect/protected-
concerted-activity/Lakewood-washington (employees discharged for showing unsafe practices at hazardous waste
cleanup location on YouTube).
3
Erwin Chemerinsky, Bad words?; In 'fleeting expletives' case, Court should recognize changed doctrine,
culture, NAT’L L. J. (Dec. 19, 2011) http://www.nlj-digital.com/nlj/20111219?pg=46.
4
Id.
Electroniccopy
Electronic copy available
available at:
at:https://ssrn.com/abstract=2348779
http://ssrn.com/abstract=2348779
SOCIAL MEDIA AT THE WORKPLACE NKU CHASE LAW + INFORMATICS INSTITUTE
JON M. GARON PAGE 2
5
Miami Herald Pub. Co., Div. of Knight Newspapers, Inc. v. Tornillo, 418 U.S. 241, 248-49 (1974) (citing
Commission on Freedom of the Press, A Free and Responsible Press 14-15 (1947); Background Paper by Alfred
Balk in Twentieth Century Fund Task Force Report for a National News Council, A Free and Responsive Press 18
Electroniccopy
Electronic copy available
available at:
at:https://ssrn.com/abstract=2348779
http://ssrn.com/abstract=2348779
SOCIAL MEDIA AT THE WORKPLACE NKU CHASE LAW + INFORMATICS INSTITUTE
JON M. GARON PAGE 3
broadcast radio and television were deemed scarce.6 Although the print publications were open
to new entrants, the theoretical open market for print had practical economic limits. This resulted
in consolidation and market power.
Newspapers have become big business and there are far fewer of them to
serve a larger literate population. Chains of newspapers, national newspapers,
national wire and news services, and one-newspaper towns, are the dominant
features of a press that has become noncompetitive and enormously powerful and
influential in its capacity to manipulate popular opinion and change the course of
events.7
Nonetheless, newspapers had been treated differently. Efforts to limit the harm by
newspapers often met judicial resistance. In Near v. Minnesota,8 a publisher found to be a public
nuisance9 could not be barred from publishing future editions of the paper. While the legislature
believed that a day in court was sufficient, the Supreme Court forced the state to rely on
defamation law.10
Whether through scarcity of broadcast bandwidth or economic market power, the oligopoly
comprising mass media had unfettered control of the public agenda, so Congress imposed a
concomitant obligation to ensure balance, accuracy and protection of the public trust. 11 In
addition, the FCC required the Fairness Doctrine until 1987.12 The conceptual underpinning
remained that the individual was largely powerless against the media’s power to advocate a
position or meaningfully respond to the press. Under regimes such as the fairness doctrine, rights
of reply statutes, and similar efforts, the government sought to legislate some balance. In the
context of print media, those efforts were rejected,13 while in broadcast limited regulation
remains, for the moment.14
(1973); Report of the Task Force in Twentieth Century Fund Task Force Report for a National News Council, A
Free and Responsive Press 4 (1973)).
6
Red Lion Broadcasting Co. v. FCC, 395 U.S. 367, 390 (1969) (“Because of the scarcity of radio frequencies,
the Government is permitted to put restraints on licensees in favor of others whose views should be expressed on
this unique medium.”).
7
Id.
8
Near v. Minn., 283 U.S. 697 (U.S. 1931).
9
Id. at 706.
10
Id. at 737, (Butler, J., dissenting. “It is well known, as found by the state supreme court, that existing libel
laws are inadequate effectively to suppress evils resulting from the kind of business and publications that are shown
in this case.”).
11
See, e.g., 47 U.S.C. § 307 (requiring that a broadcast license be issued only when the license serves the public
interest).
12
Kathleen Ann Ruane, Fairness Doctrine: History and Constitutional Issues, CONG. RESEARCH SCVS 7-5700,
July 13, 2011, available at http://www.fas.org/sgp/crs/misc/R40009.pdf. See also Donald D. Moss, The Public
Domain and a Right of Access: Affect upon the Broadcast Media, 3 Loy. L.A. L. REV. 451 (1970), available at
http://digitalcommons.lmu.edu/llr/vol3/iss2/16.
13
Miami Herald Pub. Co., Div. of Knight Newspapers, Inc. v. Tornillo, supra note 5 at 248-49.
14
Red Lion, supra note 6 at 390.
B. Social Media
The communications model changed with the advent of social media.15 To contrast from
commercial media, social media analysis tends to focus on user generated content. The user
generated content can range from entire fan-fiction novels to a single click of a “like” or
“dislike” button. Social media includes each unique piece of content as well as the aggregate
pattern of the content comment on commercial media.16 In sum, “[s]ocial media is the media we
use to be social. That’s it.”17
Any person with access to a networked computer, tablet, or smartphone has the ability to
communicate with potentially billions of people. For example, the social video distribution site
YouTube reports that 1 billion unique visitors view six billion hours of video monthly.18 The
content is socially generated and actively shared; YouTube is the most followed brand on Twitter
with 19 million followers.19 Facebook boasts the largest social media network with 1.01 billion
users.20 Wikipedia, the largest collectively edited wiki site is ranked as the third largest social
media host.21 Twitter, the micro-blogging site, Pinterest, the photo-sharing site, Google+, the
social networking site tied to other Google products, and LinkedIn, the business social media
network, all regularly place among the top ten social media networks domestically and
globally.22
When coupled with almost ubiquitous access to technology, the many-to-many model of
media distribution flips the earlier assumptions about media dominance on their head.23 Scarcity
is eliminated from broadcast.24 Newspapers and print magazines are struggling to maintain
audience, relevance, and market-share.25 Print advertising revenue has been disintermediated by
15
See Debora Halbert, Mass Culture and the Culture of the Masses: A Manifesto for User-Generated Rights, 11
VAND. J. ENT. & TECH. L. 921, 924 (2009) (“User-generated content can be found on wikis, blogs, Twitter feeds,
YouTube, Facebook, and pirate websites, as well as in virtual worlds, reactions to news stories, reactions to others’
reproductions of news stories, and ratings for products. . . .”).
16
See, e.g., Marcy Wheeler, How Noninstitutionalized Media Change the Relationship Between the Public and
Media Coverage of Trials, 71 LAW & CONTEMP. PROBS. 135 (2008).
17
LON SAFKO, THE SOCIAL MEDIA BIBLE: TACTICS, TOOLS, AND STRATEGIES FOR BUSINESS SUCCESS 3 (2d Ed.
2010).
18
Statistics, YOUTUBE, http://www.youtube.com/t/press_statistics (last visited Oct. 30, 2013).
19
Brian Honigman, 100 Fascinating Social Media Statistics and Figures From 2012, Huff. Post. Tech, Nov. 29,
2012 at http://www.huffingtonpost.com/brian-honigman/100-fascinating-social-me_b_2185281.html.
20
Drew Olanoff, Facebook Announces Monthly Active Users Were At 1.01 Billion As Of September 30th, An
Increase Of 26% Year-Over-Year, TECHCRUNCH (Oct. 23, 2012), http://techcrunch.com/2012/10/23/facebook-
announces-monthly-active-users-were-at-1-01-billion-as-of-september-30th/.
21
Mathias Buerk, Top 20 global Social Media Sites – Networks and Videos dominate, ETHORITY (Mar. 21,
2012), http://www.ethority.net/blog/2012/03/21/top-20-global-social-media-sites-2012/ (last visited Oct. 30, 2012).
22
Top 15 Most Popular Social Networking Sites, EBIZMBA (Oct. 2013),
http://www.ebizmba.com/articles/social-networking-websites (last visited Oct. 30, 2013).
23
Erwin Chemerinsky, Keynote Luncheon Presentation, American Bar Association Section of Business Law
Cyberspace Committee Winter Working Meeting (Jan. 25, 2013.).
24
John W. Berresford, The Scarcity Rationale for Regulating Traditional Broadcasting: An Idea Whose Time
Has Passed, FCC MEDIA BUREAU STAFF RESEARCH PAPER NO. 2005-2, 12 (Mar. 2005), available at
http://www.fcc/gov/working-papers/scarcity-rationale-regulating-traditional-broadcasting-idea-whose-time-has-
passed.
25
Derek Thompson, The Scariest Thing About the Newspaper Business Isn't Print's Decline, It's Digital's
Growth, THE ATLANTIC (Dec. 19 2012, 3:15 PM), http://www.theatlantic.com/business/archive/2012/12/the-
online search ads, which reduces the funding for newspapers but does not render them scarce in
any economic sense.26
The Supreme Court has not entirely abandoned the scarcity doctrine, though it may be
getting ever closer. Justice Thomas and Justice Ginsburg have come closest. Justice Thomas has
provided a brief but quite explicit repudiation of the doctrine.27
[T]he logical weakness of Red Lion and Pacifica has been apparent for some
time: “It is certainly true that broadcast frequencies are scarce but it is unclear
why that fact justifies content regulation of broadcasting in a way that would be
intolerable if applied to the editorial process of the print media.”28 … Second,
even if this Court's disfavored treatment of broadcasters under the First
Amendment could have been justified at the time of Red Lion and Pacifica,
dramatic technological advances have eviscerated the factual assumptions
underlying those decisions. … Moreover, traditional broadcast television and
radio are no longer the "uniquely pervasive" media forms they once were. …
These dramatic changes in factual circumstances might well support a departure
from precedent under the prevailing approach to stare decisis.29
Justice Ginsburg echoed the distrust in the scarcity doctrine. “In my view, the Court's
decision in [Pacifica] was wrong when it issued. Time, technological advances, and the
Commission's untenable rulings in the cases now before the Court show why Pacifica bears
reconsideration.”30 While other First Amendment cases have not directly implicated scarcity, the
broad protections afforded to social media and the public leave little room for claiming unique
obligations of the government to regulate broadcasters in a manner discrete from Internet sites
and publishers.
C. Constitutional Changes Brought by the Many-to-Many Paradigm
At the constitutional level, the changes affecting social media come slowly, often without
express statements of the changed factual assumptions. In three First Amendment cases decided
over the past five years, the Supreme Court has reinforced an almost absolutist approach to
protecting free speech, disavowing other public considerations as secondary.
In United States v. Stevens,31 the Supreme Court addressed an abhorrent social media
phenomenon in which individuals would film and post “crush videos.”32 Quoting from
legislative hearings, the Court explains that “[c]rush videos often depict women slowly crushing
animals to death ‘with their bare feet or while wearing high heeled shoes,’ sometimes while
‘talking to the animals in a kind of dominatrix patter’ over ‘[t]he cries and squeals of the animals,
obviously in great pain.’”33 Laws prohibiting cruelty to animals make the acts illegal, so the
federal legislation was designed to prohibit the distribution of the videos rather than the
underlying acts of cruelty.
Unsurprisingly, the Court invalidated the law.34 The statute was struck down on vagueness
and overbreadth grounds because depictions of this animal cruelty could not be categorically
different from scenes depicting hunting, documentaries on food processing, or other generally
accepted media practices which the law was not intended to ban. The law was targeted at a
specific specie of content that fell well outside the historically established, narrow categories of
speech subject to prohibition.35 As such, the speech is protected by the First Amendment.36
Although the case represents the first Supreme Court review of content created specifically for
social media Internet distribution, that landmark aspect of the litigation went by without notice
by the Court.
In Brown v. Entm't Merchs. Ass'n,37 the Supreme Court provided a sweeping rejection to
attempts to regulate the video game industry as somehow different than print, film, or
broadcast.38 The Court declined to follow the constitutional tradition of protecting minors from
indecent speech to indecent violence.39 It limited the ability to protect minors from speech
characterized as “obscenity-for-minors” to only sexually explicit obscenity.40 Other categories of
speech harmful to minors will not be recognized.
Rejecting the expansion of obscenity to any kind of violence, the Court applied full strict
scrutiny to video game regulation. “Because the Act imposes a restriction on the content of
protected speech, it is invalid unless California can demonstrate that it passes strict scrutiny–that
is, unless it is justified by a compelling government interest and is narrowly drawn to serve that
interest.”41
Although the Court does not say anything about social media or the norms of the online
33
Id. (quoting House Committee Report H. R. Rep. No. 106-397, at 2-3 (1999)).
34
Id. at 1584.
35
Jennifer E. Rothman, 25 HARV. J.L. & PUB. POL'Y 283, 287-88 (2001) (“Speech such as obscenity, fighting
words, child pornography, incitement, and ‘true threats’ is considered outside the protections of the First
Amendment.”). See R.A.V. v. St. Paul, 505 U.S. 377, 382-90 (1992).
36
Stevens, supra note 31 at 1583-84.
37
Brown v. Entm't Merchs. Ass'n, __ U.S. __, 131 S. Ct. 2729 (2011).
38
Id. at 2737 n.4. (“Well of course [playing a video game] is different in kind [from reading], but not in a way
that causes the provision and viewing of violent video games, unlike the provision and reading of books, not to be
expressive activity and hence not to enjoy First Amendment protection.”).
39
Id. at 2735.
40
Id. Because speech about violence is not obscene, it is of no consequence that California's statute mimics the
New York statute regulating obscenity-for-minors that we upheld in Ginsberg v. New York, 390 U.S. 629, 88 S. Ct.
1274, 20 L. Ed. 2d 195 (1968). That case approved a prohibition on the sale to minors of sexual material that would
be obscene from the perspective of a child. … [B]ecause “obscenity is not protected expression,” the New York
statute could be sustained so long as the legislature's judgment that the proscribed materials were harmful to children
“was not irrational.”
41
Id. at 2738.
environment, it categorically rejected any differentiation between media based on type, audience,
or impact. The Court refuses to equate violence with pornography or consider that some violent
speech may be so extreme as to be obscene. The categories of speech are immutable and the
media are largely irrelevant.
Third, in Snyder v. Phelps,42 the Court provided some guidance on the scope of the First
Amendment as it limits traditional common law doctrine. The case arose after Fred Phelps and
six parishioners of the Westboro Baptist Church picketed the funeral of Marine Lance Corporal
Matthew Snyder, a soldier killed in the line of duty in Iraq.43 Phelps often used the public
attention of soldier funerals to capture some public attention regarding his protests. “A jury
found for Snyder on … intentional infliction of emotional distress, intrusion upon seclusion, and
civil conspiracy claims, and held Westboro liable for $2.9 million in compensatory damages and
$8 million in punitive damages.”44 The award was remitted to $2.1 million.45
The Court felt the civil liability could not be sustained if it violated the First Amendment.
Matters of private concern may constitutionally be adjudicated to a negligence standard while
matters of public concern require an actual malice standard of knowledge or reckless disregard
for the truth to establish liability.46 “Whether the First Amendment prohibits holding Westboro
liable for its speech in this case turns largely on whether that speech is of public or private
concern, as determined by all the circumstances of the case.”47 The Court summarized the
evolving standard of public concern:
Not all speech is of equal First Amendment importance, however, and where
matters of purely private significance are at issue, First Amendment protections
are often less rigorous. That is because restricting speech on purely private
matters does not implicate the same constitutional concerns as limiting speech on
matters of public interest…. Speech deals with matters of public concern when it
can be fairly considered as relating to any matter of political, social, or other
concern to the community, or when it is a subject of legitimate news interest; that
is, a subject of general interest and of value and concern to the public. The
arguably inappropriate or controversial character of a statement is irrelevant to the
question whether it deals with a matter of public concern.48
The decision is very important in distinguishing from the myriad of claims for harmful
speech involving those that are private in nature and those that have a public face. As such, the
facts of Snyder establish a rather low threshold to gain an inference that a matter is of public
concern. Phelps’ banners and slogans were attacks on homosexuality and the U.S. military
42
Snyder v. Phelps, __ U.S. __, 131 S. Ct. 1207, 1216 (2011).
43
Id. at 1213.
44
Id. at 1214.
45
Id.
46
See New York Times v. Sullivan, 376 U.S. 254, 279 (1964) (scienter standard required for public officials);
Gertz v. Welch, Inc., 418 U.S. 323, 349-350 (1974) (only something more than strict liability required when not a
matter of public concern and no “presumed or punitive damages, at least when liability is not based on a showing of
knowledge of falsity or reckless disregard for the truth.”).
47
Snyder, supra note 42 at 1215.
48
Id. at 1215-16 (omitting internal quotations and citations).
(among others) rather than on Lance Corporal Snyder or his family. As individuals they were not
public officials or public figures.
The Court also listed previous cases, such as the publication of a credit report and the
distribution of employees’ sexually explicit videos as examples of non-public speech that
involves no First Amendment considerations. The Court claimed its holding was narrow,49 but in
fact it provides an important statement on the parameters regarding matters of public concern and
affirms Hustler v. Falwell50 in invalidating intentional infliction of emotional distress as an
independent tort in matters of public concern.51
D. Impact on Commercial Speech: Publicity Rights and Advertising
The constitutional expansionist approach to the First Amendment has a significant
implication on commercial speech, state law, and common law doctrine.52 The Supreme Court
has recently invalidated a law which prohibited the sale of pharmaceutical data for marketing. 53
The decision did not broadly dismiss the government’s right to regulate commercial speech, but
treated the regulation as discriminatory regarding speaker and content. 54 Since the Court found
the law was not content neutral, the statute was unable to withstand the test of heightened
judicial scrutiny.55
1. FTC: In contrast, Section 5 of the Federal Trade Commission Act,56 empowers the
Federal Trade Commission (“FTC”) to prevent businesses “from using unfair methods of
competition in or affecting commerce and unfair or deceptive acts or practices in or affecting
commerce.”57 Deceptive commercial speech has little First Amendment protection, so reaching it
remains within the police power of a state, subject to intermediate scrutiny for its effect on
speech.58
For social media, the FTC’s role has been particularly influential because the FTC has
amended advertising and endorsement guidelines specifically to address the potential for unfair
trade practices.59 Applying broadly across the Internet, the regulations require “the honest
opinions, findings, beliefs, or experience of the endorser.”60 They prohibit false commercial
49
Id. at 1220.
50
Hustler Magazine, Inc. v. Falwell, 485 U.S. 46 (1988).
51
Id. at 53. See also Time, Inc. v. Hill, 385 U. S. 374, 390 (1967).
52
See Jon M. Garon, Beyond the First Amendment: Shaping the Contours of Commercial Speech in Video
Games, Virtual Worlds and Social Media, 2012 UTAH L. REV. 607, 615 (2012) (“From recent Supreme Court
jurisprudence, it follows that the commercial regulation of video games, virtual worlds, and social media must be
conducted with a deft and gentle hand if regulators hope to have the regulation survive constitutional scrutiny.”).
53
Sorrell v. IMS Health Inc., 131 S. Ct. 2653, 2663 (2011) (declaring unconstitutional a law prohibiting sale of
patient data for marketing purposes but no other purposes as content and speaker specific).
54
Id.
55
Id. at 2663-64. See Ward v. Rock Against Racism, 491 U.S. 781, 791 (1989) (heightened scrutiny required
for “a regulation of speech [enacted] because of disagreement with the message it conveys.”).
56
15 U.S.C. § 45 (2006).
57
Id. at §45 (a)(2).
58
See Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n, 447 U.S. 557, 562 (1980).
59
FTC Endorsement Guidelines, 74 Fed. Reg. 53,124, 53,125 (Oct. 15, 2009) (Guides Concerning the Use of
Endorsements and Testimonials in Advertising).
60
16 C.F.R. §255.1(a) (2011).
speech, declaring that “an endorsement may not convey any express or implied representation
that would be deceptive if made directly by the advertiser.”61
Under the FTC endorsement guidelines,
an endorsement means any advertising message (including verbal
statements, demonstrations, or depictions of the name, signature, likeness or other
identifying personal characteristics of an individual or the name or seal of an
organization) that consumers are likely to believe reflects the opinions, beliefs,
findings, or experiences of a party other than the sponsoring advertiser, even if the
views expressed by that party are identical to those of the sponsoring advertiser.
The party whose opinions, beliefs, findings, or experience the message appears to
reflect will be called the endorser and may be an individual, group, or
institution.62
When a person blogs, tweets, or otherwise promotes a product, the statement may constitute
an endorsement. If the communication is made upon receipt of consideration, that consideration
must be disclosed.63 “Advertisers are subject to liability for false or unsubstantiated statements
made through endorsements, or for failing to disclose material connections between themselves
and their endorsers. Endorsers also may be liable for statements made in the course of their
endorsements.”64 Under these rules, if an employer was to ask its employees to pose as members
of the general public and make positive statements about the employer’s goods or services, both
the employer and the employees would be liable.65 If this was done on behalf of a third-party
advertiser, the advertiser would also be liable even without actual knowledge of the particular
conduct.66
2. Publicity Rights: State law protection of publicity rights is also impacted by these same
constitutional and endorsement considerations.67 Publicity rights are protected as a common law
extension of privacy,68 but like other common law doctrine affecting speech, many aspects have
61
Id. at §255.1(b).
62
Id. at §255.0.
63
Id. at §255.5.
64
Id. at §255.1 (citing §255.5).
65
See, e.g., David Streitfeld, Give Yourself 5 Stars? Online, It Might Cost You, N.Y TIMES, Sept. 23, 2013, at
page A1 (“the investigation uncovered a wide range of services buying fake reviews that could do more permanent
damage: dentists, lawyers, even an ultrasound clinic. “What we’ve found is even worse than old-fashioned false
advertising,” said Eric T. Schneiderman, the New York attorney general.”); Hugo Martin, Can you trust online hotel
reviews? The debate heats up, L.A. TIMES (Nov. 18, 2012 8:00 AM), http://www.latimes.com/business/money/la-fi-
mo-online-hotel-reviews--20121116,0,4791105.story. See also Tim Kickinson, The NRA vs. America, ROLLING
STONE (Jan. 31, 2013 10:00 AM), http://www.rollingstone.com/politics/news/the-nra-vs-america-20130131
(discussing political “astroturfing” of the NRA and Tea Party to create a false impression of broad public support for
narrow, commercial interests).
66
16 C.F.R. §255.1(a).
67
See, e.g., Donahue v. Warner Bros. Pictures Distributing Corp., 272 P.2d 177 (Utah 1954) (publicity rights
statute limited to the use of name or likeness in advertising, or the sale of “some collateral commodity.”); CAL. CIV.
CODE § 3344(a) (West 1997) (limiting protection to use “on or in products, merchandise, or goods, or for purposes
of advertising or selling, or soliciting purchases of, products, merchandise, goods or services, without such person’s
prior consent.”).
68
See Samuel Warren & Louis Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 (1890). See also William
L. Prosser, Privacy, 48 CAL. L. REV. 383, 383–85 (1960).
69
Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562, 577 (1977) (In distinguishing between
defamation, false light and publicity cases, the Court explained that the “Constitution does not prevent Ohio from …
deciding to protect the entertainer's incentive” to perform.)
70
See Sorrell, 131 S. Ct. 2653, supra note 53 at 2663; Cent. Hudson Gas & Elec. Corp. v. Pub. Serv. Comm’n,
447 U.S. 557, 562 (1980); Ohralik v. Ohio State Bar Assn., 436 U.S. 447 (1978) (upholding state lawyer advertising
regulation); Virginia State Bd. of Pharmacy v. Virginia Citizens Consumer Council, Inc., 425 U.S. 748, 771-772
(1976) (establishing First Amendment protection for commercial speech and recognizing right of recipients of
commercial speech to have access to the content).
71
See, e.g., Comedy III Productions, Inc. v. Gary Saderup, Inc., 21 P.3d 797, 802 (Cal. 2001).
72
Id. at 802 (although the speech was not an “advertisement, endorsement, or sponsorship of any product,”
defendant nonetheless “used the likeness of The Three Stooges on . . . products, merchandise, or goods within the
meaning of the statute.”).
73
Moore v. Weinstein Co. LLC, 12-5715, (6th Cir. Oct. 31, 2013) (unreported) quoting Restatement (Third) of
Unfair Competition.
74
Restatement (Third) Unfair Competition §47 (1995).
75
Id. at cmt. c. (“the use of a person's name or likeness in news reporting, whether in newspapers, magazines,
or broadcast news, does not infringe the right of publicity. The interest in freedom of expression also extends to use
in entertainment and other creative works, including both fiction and nonfiction.”).
76
Id. at cmt. d.
77
Hart v. Elec. Arts, Inc., 717 F.3d 141, 155 (3d Cir. 2013).
78
Rogers v. Grimaldi, 875 F.2d 994 (2d Cir.1989).
79
Id. at 1004.
80
Doe v. TCI Cablevision, 110 S.W.3d 363 (Mo.2003) (en banc).
If a product is being sold that predominantly exploits the commercial value of an individual's
identity, that product should be held to violate the right of publicity and not be protected by the
First Amendment, even if there is some “expressive” content in it that might qualify as “speech” in
other circumstances. If, on the other hand, the predominant purpose of the product is to make an
expressive comment on or about a celebrity, the expressive values could be given greater weight.
Id. at 374.
81
See New York Times v. Sullivan, 376 U.S. 254, 265 (1964). See also Valentine v. Chrestensen, 316 U.S. 52,
55 (1942) (commercial speech cannot evade regulation by appending protected first amendment content).
82
See Hart, supra note 73 at 154 (“By our reading, the Predominant Use Test is subjective at best, arbitrary at
worst, and in either case calls upon judges to act as both impartial jurists and discerning art critics.”).
83
Comedy III Prods., Inc. v. Gary Saderup, Inc., 25 Cal.4th 387, 404 (2001) (quoting Campbell v. Acuff–Rose
Music, Inc., 510 U.S. 569, 579 (1994) (citations omitted).
84
Id. at 407.
Furthermore, in determining whether a work is sufficiently transformative, courts may find
useful a subsidiary inquiry, particularly in close cases: does the marketability and economic value
of the challenged work derive primarily from the fame of the celebrity depicted? If this question is
answered in the negative, then there would generally be no actionable right of publicity. When the
value of the work comes principally from some source other than the fame of the celebrity—from
the creativity, skill, and reputation of the artist—it may be presumed that sufficient transformative
elements are present to warrant First Amendment protection. If the question is answered in the
affirmative, however, it does not necessarily follow that the work is without First Amendment
protection—it may still be a transformative work.
85
See Hart, supra note 73 at 152-53; O'Bannon v. NCAA, 2010 U.S. Dist. LEXIS 19170 (N.D. Cal. Feb. 8,
2010) (dismissing Keller v. Elec. Arts, Inc., 2010 WL 530108 (N.D. Cal. 2010) to substitute anti-trust claims for
publicity rights claims); In re NCAA Student-Athlete Name & Likeness Licensing Litig., 2011-2 Trade Cas. (CCH)
¶ 77, 549 (N.D. Cal. 2011) (ongoing litigation emphasizing anti-trust implication of refusing to negotiate rights with
former NCAA players).
86
Brown v. Entm't Merchs. Ass'n, supra note 37 at 2737 n.4.
87
See Hart, supra note 71 at 148-49 (“Appellee [EA Sports] concedes, for purposes of the motion and appeal,
that it violated Appellant's right of publicity; in essence, misappropriating his identity for commercial exploitation.”)
88
Cf. Comedy III, supra note 71 at 802; Hart, supra note 75 at 149.
89
Garon, supra note 52 at 615, 624.
90
See Facenda v. N.F.L. Films, Inc., 542 F.3d 1007, 1017 (3d Cir. 2008) (quoting U.S. Healthcare, Inc. v. Blue
Cross of Greater Phila., 898 F.2d 914, 933 (3d Cir. 1990)).
The Estate contends that the program is commercial speech, and we agree. Our Court has
"three factors to consider in deciding whether speech is commercial: (1) is the speech an
advertisement; (2) does the speech refer to a specific product or service; and (3) does the speaker
have an economic motivation for the speech."
transactions, serve as advertisements, or sell merchandise, then permission is required from the
endorser and the endorser must be providing factual, honest information.
91
17 U.S.C. §§ 101-2 (2013) (By definition, a work is "fixed when its embodiment in a copy ... is sufficiently
permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than a
transitory duration.").
92
But cf. Cable News Network, Inc. v. CSC Holdings, Inc., 536 F.3d 121 (2d Cir. 2008) (where the court found
that a buffer holding small portions of a work on a 1.2 second loop did not meet the fixation requirement). Whether
the text message buffer is sufficient does not matter since the entire thread is hosted remotely by the service
provider.
93
37 C.F.R. § 202.1(a).
94
17 U.S.C. § 411(a) (2013).
95
Ticketmaster Corp. v. Tickets.Com, Inc., 2003 WL 21406289 (BNA) 1344, 2000 U.S. Dist. LEXIS 4553
(C.D. Cal. 2000) (“[H]yperlinking does not itself involve a violation of the Copyright Act (whatever it may do for
other claims) since no copying is involved, the customer is automatically transferred to the particular genuine web
page of the original author.”).
raise any copyright liability.96 In contrast, reposting content is an unauthorized copying of the
work that may result in liability, assuming the work has been registered with the copyright office
so that the plaintiff has standing.97 Unwanted commentary may be actionable, but complex fair
use rules make such claims unlikely to succeed unless there is some commercial advantage being
taken by the defendant which tends to make the second work compete with the company’s
copyrighted work in the marketplace.98 Given the costs and uncertainty of copyright litigation in
this regard, the best advice is to develop a thick corporate skin, and just move on. News reports
about a large company’s efforts to close down a parody website typically does far more
reputational harm than anything the parody or satire could have accomplished.99
B. Copyright Takedowns
Although social media has become a powerful influence on constitutional and employment
law, these changes hit intellectual property policies much earlier and, as a result, the law is more
settled in this area than in the others. Copyright law was amended in 1998 to balance the interests
of service providers, copyright holders, and consumers. The amendments applied to both Internet
services providers (“ISPs”)100 and to hosting sites, known as online service providers
(“OSPs”).101 The emphasis was on immunity for service providers which passively hosted or
transmitted content. Sites like AOL and CompuServe ultimately gave way to YouTube,
MySpace, Facebook, and Twitter, built in part on the legal protections afforded by the statute.
The immunity provided to the service providers obligates those companies to expeditiously
remove materials posted without consent of the copyright holder after the copyright holder has
given appropriate notice.102 If the recipient of the notice believes she has the right to post the
96
Shaw v. Lindheim, 919 F.2d 1353, 1356 (9th Cir. 1990) ("Copyright law protects an author's expression; facts
and ideas within a work are not protected.").
97
See Reed Elsevier, Inc. v. Muchnick, 559 U.S. 154 (2010) (Section 411(a) registration requirement represents
a claim-processing, non-jurisdictional, prerequisite to suit).
98
17 U.S.C. §107 (2013). See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 581 (1994) (discussing fair
use factors and distinguishing between parody and satire); Faegre & Benson, LLP v. Purdy, 367 F. Supp. 2d 1238,
1244 (D.Minn. 2004) (applying parody analysis to a website critical of plaintiff’s website).
99
See, e.g., Dan D'Ambrosio, 'Eat More Kale' trademark flap more complex than simple slogan, BURLINGTON
FREE PRESS (Nov. 24, 2011) http://www.burlingtonfreepress.com/article/20111124/BUSINESS08/111240307; Joe
Harris, North Face Wants South Butt Sanctioned, Courthouse New Service (Aug. 9, 2012, 11:05 AM)),
http://www.courthousenews.com/2012/08/09/49143.htm (trademark parody settlement allegedly violated within two
days. The new but dissimilar mark continues to remind the public of the bad press earned by the plaintiff).
100
Digital Millennium Copyright Act of 1998, Pub. L. No. 105-304, 112 Stat. 2860 (1998) codified 17 U.S.C. §
512(d) (2012).
101
Id. at § 512(c). See Jonathan Zittrain, A History Of Online Gatekeeping, 19 HARV. J. LAW & TECH. 253, 265-
266 (2006) (Ҥ512(a) exempted the most passive intermediaries -- ISPs -- from any responsibility for copyright
infringement for the data they carried …. Section 512(c) was directed at OSPs: those who actually stored
information for consumers for mass distribution to others….”).
102
See, e.g., 17 U.S.C. § 512 (c).
(c) Information Residing on Systems or Networks at Direction of Users.—
(1) In general. — A service provider shall not be liable for monetary relief, or, except as
provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by
reason of the storage at the direction of a user of material that resides on a system or network
controlled or operated by or for the service provider, if the service provider -
(A)(i) does not have actual knowledge that the material or an activity using the material on the
system or network is infringing;
information, she can issue a counter-notice.103 Failure by the service provider to reinstate the
removed material will terminate the safe harbor protection.104
In the past two years, takedown notice requests have exploded from 112,584 in the week of
October 17, 2011 to a height of 6,498,012 on October 7, 2013, before receding slightly.105 In the
month of October 2013 alone, Google reported the total number of infringing URL requests to
be 27,150,592.106 These requests were made by only 3,665 copyright owners.107 The data can be
exploited to make many public policy arguments, but the massive numbers of infringing websites
suggest the problem of unauthorized copyright infringement is not focused on heavily trafficked
websites such as Facebook, Twitter, and YouTube, but is instead focused on commercial piracy
conducted through millions of anonymously hosted websites. Moreover, since the number of
takedown requests has grown exponentially with the release of the Google transparency data, it
suggests that the data is being used by copyright holders as a blueprint to wage a more
aggressive anti-piracy campaign against the commercial pirates.
The data highlights a growing trend to seek takedowns of URLs linking to infringing content
in addition to the host of the content itself. Takedown notices given to owners of infringing
websites often serve no practical purpose. Pirate web host companies are typically located in
non-U.S. territories, which do not respect takedown requests; the identifications provided by the
web operators are fictitious; and these service providers are often operating in concert with the
website owner. Reducing access to these sites by eliminating them from Google, Bing, and
Yahoo searches is thought to be the only remaining remedy. The unauthorized content remains
publicly available, but the amount of illegal traffic may be reduced somewhat.
C. Trademark
Social media has created new and vexing challenges for trademark managers. The
consequence of a many-to-many publisher paradigm is that trademarks are bandied about in an
informal manner, online marketplaces and auction sites lawfully sell authentic trademarked
(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from
which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable
access to, the material;
(B) does not receive a financial benefit directly attributable to the infringing activity, in a case
in which the service provider has the right and ability to control such activity; and
(C) upon notification of claimed infringement as described in paragraph (3), responds
expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be
the subject of infringing activity.
103
17 U.S.C. §512(g).
104
Id. at §512(g)(2)(C) (potentially infringing copyrighted material must be reinstated “not less than 10, nor
more than 14, business days following receipt of the counter notice” unless the service provider is notified that a
legal action has been filed so as to permit time for a legal proceeding to commence).
105
Google Transparency Report, http://www.google.com/transparencyreport/removals/copyright/ (last visited
Oct. 30, 2013).
106
Id.
107
Id.
goods without control by the trademark holders,108 and fraudulent goods are pouring into the
country. For example, “[i]n Fiscal Year 2012, there were 22,848 intellectual property rights
seizures with a manufacturer’s suggested retail value of $1.26 billion. Goods from China
accounted for 72% of the total manufacturer’s suggested retail value for all IPR seizures.”109
The large number of seizures may not predict or correlate to the totality of counterfeit
merchandise making its way through U.S. commercial channels, but undoubtedly the number is
large. As noted in Tiffany v. eBay,110 for example, “during the last six weeks of 2004, 125
consumers complained to eBay about purchasing 'Tiffany' items through the eBay website that
they believed to be counterfeit.”111 Of course, there are many sites beyond eBay. Formal and
informal steps to monitor the use of company trademarks should be adopted, whether the process
includes a professional monitoring service, or merely Google alerts. In many ways, the internal
policing utilized by eBay provides a model for an effective consumer protection and trademark
management protocol.112
Keywords are another important indicator for online trademark concerns. Google’s AdWords
program is illustrative: “AdWords is Google's program "through which advertisers purchase
terms (or keywords). When entered as a search term, the keyword triggers the appearance of the
advertiser's ad and link.”113 By purchasing a competitor’s brand as the keyword, the purchaser
places its paid ad above and adjacent to the native search results.114 While the search companies
have become more sensitive to the propriety of such sales, the history of litigation on this issue
makes it very difficult to win an action against the search firms.115 At the same time, however, an
action may be successful against a company which aggressively purchases the trademarks of its
competitors to misdirect customers.116 When employees regularly see a competitor’s
advertisements appearing next to the employer’s Internet search results, the employer should
investigate.
In the context of the workplace, these trends suggest two important steps that can be taken.
1. Training on Trademark and Brand Management. Whether the employer likes it or
not, every potential, current and former employee is a brand manager, communicating about or
utilizing the brand on a daily basis. Trademarks are often incorporated into URLs and email
addresses so that every comment made by every employee is subtly tagged with the corporate
initials. Posts made on behalf of the employer, as well as those made despite the best efforts of
the employer, all end up in the online information marketplace. Employee misconduct may be
108
See Tiffany, Inc. v. eBay, Inc., 600 F.3d 93, 97 (2d Cir. 2010) (“[Tiffany] does not -- nor can it, for that
matter -- control the ‘legitimate secondary market in authentic Tiffany silver jewelry,’ i.e., the market for second-
hand Tiffany wares.”).
109
Intellectual Property Rights, U.S. Customs and Border Patrol Fact Sheet 2012,
http://www.cbp.gov/linkhandler/cgov/newsroom/fact_sheets/trade/ipr_fact_sheet.ctt/ipr_fact_sheet.pdf (last visited
Oct. 30, 2013).
110
Tiffany, supra note 95 at 98.
111
Id. at 98-99.
112
Id.
113
Rescuecom Corp. v. Google, Inc., 562 F.3d 123, 125 (2d Cir. 2009).
114
Id.
115
See, e.g., Network Automation, Inc. v. Advanced Sys. Concepts, 638 F.3d 1137, 1144 (9th Cir. 2011).
116
See Binder v. Disability Group, Inc., 772 F. Supp. 2d 1172, 1176-77 (C.D. Cal. 2011).
posted as a YouTube video,117 or customers may pull out cell phone cameras if they do not like
the service being received. Every employee needs to understand how to respond to these
situations.
Communications training should provide clear guidance on how to use the
correct trademarks, names, style sheets and abbreviations for the employer so
the trademarks do no become diluted or genericized.118
Brand management training should include both customer service training to
keep one’s professional demeanor, and training on when to call for help rather
than letting a situation escalate.
Training should demonstrate how to use social media wisely rather than
provide a list of prohibitions and services to avoid.
2. Enlist Brand Police. A company’s employees know the products and services better than
any other group. As both brand counterfeiting grows and the outlet for counterfeit goods
increases, employees should be trained on how to report potential counterfeiting and incentivized
to do so.119 Forty percent of trademark piracy enforcement actions are in the handbag and wallet
sector, with an additional fifteen percent in watches and jewelry.120 By value, clothing industries
lose as much as industries in these two accessories categories.121 But the data reflect only public
seizures. Many other forms of trademark counterfeiting may occur in formats that do not readily
lend themselves to enforcement by customs and border patrol. Diligence on the part of
employees will encourage support in their efforts to protect a company brand and better
understand the economic costs of piracy.
D. Trade Secret
Trade secret law may be the most expansive area of intellectual property protection. Both law
and litigation have exploded. “No legislation prohibiting trade secret misappropriation existed
before 1980. Today, forty-seven states have a civil statute, and over half of those states also have
specific criminal statutes. In 1996, Congress passed a federal statute criminalizing trade secret
misappropriation….”122 Trade secrets protect a narrow sub-category of confidential information.
Although state laws vary, the Uniform Trade Secrets Act (UTSA) provides a useful summary for
117
E.g., Dirty Dirty Dominos Pizza, YOUTUBE (Apr. 15, 2009),
http://www.youtube.com/watch?v=OhBmWxQpedI.
118
See Ryan Strom, Step Away From The Trademark: Avoid “Genericide,” HENNEPIN LAWYER (Nov. 20,
2009), http://hennepin.timberlakepublishing.com/article.asp?article=1378&paper=1&cat=147.
119
See generally, Tiffany, supra note 95 at 96-98 (discussing efforts to protect auction site from falsely
identified trademarked goods).
120
Intellectual Property Rights Fiscal Year 2012 Seizure Statistics 6, U.S. CUSTOMS AND BORDER PROTECTION
OFFICE OF INTERNATIONAL TRADE (2012), available at
http://www.cbp.gov/linkhandler/cgov/trade/priority_trade/ipr/ seizure/fy2012_final_stats.ctt/fy2012_final_stats.pdf.
121
Id.
122
David S. Almeling, Seven Reasons Why Trade Secrets Are Increasingly Important, 27 BERKELEY TECH. L.J.
1091, 1092-1093 (2012) (citing David S. Almeling et al., A Statistical Analysis of Trade Secret Litigation in State
Courts, 46 GONZ. L. REV. 57, 67-68 (2011) (“Over the past three decades, trade secret litigation in federal courts has
grown exponentially, doubling roughly every decade, while federal litigation has decreased overall”)); Foreign and
Economic Espionage Penalty Enhancement Act of 2012, 18 U.S.C.A. §§1831-39 (2013).
123
Unif. Trade Secrets Act §1 (amended 1985), 14 U.L.A. 538 (2005). See Elizabeth A. Rowe, Saving Trade
Secret Disclosures on the Internet Through Sequential Preservation, 42 WAKE FOREST L. REV. 1, 2 (2007)
(identifying need for adaptations of trade secret law for Internet disclosure).
124
Unif. Trade Secrets Act, supra note 110 at §1.
125
See Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months, N.Y. TIMES, Jan. 31, 2013, at
A1 (“While computer security experts say China is most active and persistent, it is not alone in using computer
attacks for a variety of national purposes, including corporate espionage. The United States, Israel, Russia and Iran,
among others, are suspected of developing and deploying cyberweapons.”).
126
Id.
127
See Dale G Peterson, Air Gaps Dead, Network Isolation Making a Comeback, DIGITAL BOND (July 19,
2011), http://www.digitalbond.com/blog/2011/07/19/air-gaps-dead-network-isolation-making-a-comeback/.
128
Allegedly the Stuxnet virus which disabled Iranian nuclear centrifuges was inserted with a USB stick – as
was a virus which recently shut down a major power turbine control system at a U.S. water facility. Jim Finkle,
UPDATE 1-Malicious virus shuttered U.S. power plant –DHS, REUTERS (Jan. 16, 2013, 5:53 PM),
http://www.reuters.com/article/2013/01/16/cybersecurity-powerplants-idUSL1E9CGFPY20130116.
potential employees.129 The practice makes a certain amount of common sense. If material
information is readily available on the Internet that was missed, then embarrassment or
potentially even liability could arise.130 At the same time, such searches could create more
liability than they resolve and should be conducted carefully.
1. Avoid screening for impermissible information: Employers are prohibited from
discriminating in their hiring on the basis of protected categories such as age, race, gender,
veteran status, and disability status.131 A public Facebook page may include pictures of the
potential employee which may disclose gender and race characteristics; the profile may provide
age and religious affiliation; and content on the site may disclose disabilities. Further searches
will reveal even more. At the same time, employers will generally avoid hiring candidates who
have publicly available content with “inappropriate photographs,” “drinking or drug use,” “bad-
mouth[ing] their previous employer,” “poor communication skills,” “discriminatory comments,”
“[false] qualifications,” or “confidential information from [a] previous employer.”132
To address the tension between the benefits of online screening and the risks of engaging in a
discriminatory practice, employers can shield themselves from the online search. Some very
helpful suggestions are provided by World Compliance:
Have a third party, someone not involved in the decision making process,
perform the search. This person would be responsible for filtering out
discriminatory or irrelevant information, and focusing on relevant matter.
Maintain a record of the searches and results which can be used at a later date
to refute any accusations of malfeasance.
Ensure that the information gathered online can be corroborated or
supplemented via other channels as this could be incomplete or inaccurate.
Request the candidate to sign a waiver both authorizing and acknowledging
use of the information gathered online to be used in the application.
The employer should condition an employment offer based upon the
successful completion of a search.133
The critical aspect of this process is to limit access to information gathered online from the
remainder of the decision making process. For each candidate rejected, the non-discriminatory
reason for the rejection should be noted. For each candidate that continues to be vetted, none of
the information that could lead to a discriminatory decision should be connected to the personnel
129
Rosemary Haefner, More Employers Screening Candidates via Social Networking Sites,
CAREERBUILDER.COM (June 10, 2009, 4:20 PM), www.careerbuilder.com/Article/CB-1337-Getting-Hired-More-
Employers-Screening-Candidates-via-Social-Networking-Sites/.
130
E.g., claims of negligent hiring from failing to conduct an appropriate search. See Michael Jones, Adam
Schuckman & Kelly Watson, The Ethics of Pre-Employment Screening Through the Use of the Internet, in THE
ETHICAL IMPERATIVE IN THE CONTEXT OF EVOLVING TECHNOLOGIES 3 (Dirk S. Hovorka ed.., 2007).
131
See, e.g., Federal Laws Prohibiting Job Discrimination Questions and Answers,
http://www.eeoc.gov/facts/qanda.html (last visited Oct. 30, 2013).
132
Haefner, supra note 116.
133
Employee Screening, WORLD COMPLIANCE,
http://www.worldcompliance.com%2FLibraries%2FWhitePapers%2FEmployee_Screening.sflb.ashx&ei=N9oOUf2
aHMGbygGZmYDoAg&usg=AFQjCNH4d8_0MFQbbwTH5ELLcNmFDGCd9g&sig2=tTqvhl1R2JSy25p6mNG0
xg&bvm=bv.41867550,d.aWc&cad=rja (last visited Oct. 30, 2013).
file. Instead, that information should be kept separately. The participants of the hiring process
should not go online in search of information. The instructions to avoid trolling the web for
information should be explicit and enforced. In this way, the information used by the people
making the hiring decisions will not be based on information that could lead to discrimination or
claims of discrimination.
2. Do not directly access employee’s social media accounts: After a teacher’s aide in
Michigan was suspended for refusing to provide a password to her Facebook account,134 and a
Maryland Department of Public Safety employee was asked to provide his log-in and password
to check for gang affiliations,135 state and federal lawmakers have responded. Ten states have
enacted legislation prohibiting the requirement to provide employers passwords while dozens
more have considered such legislation.136
Although the laws vary among jurisdictions, California and Michigan exempt employers
from seeking the log-in information of existing employees as part of an otherwise appropriate
ongoing investigation.137
Other employers seek to skirt the law by asking the employee to log-in and then let the
employer shoulder surf or peek over the shoulder to gain access to the content without
demanding the password itself.138 This process is highly suspect and likely to invite litigation as
well.
Although no cases have been reported, shoulder surfing opens the employer to precisely the
same allegations of discrimination as the Internet surfing – only conducted in a more demeaning
and direct manner that begs for a legal response. A Facebook page showing friends,
relationships, and photos kept private, could well expose religious affiliations, national origin
status, sexual preference, age, medical conditions, and other information related to protected
classifications. As a screening matter, the practice should be avoided in all but the most sensitive
of positions, and then, only in jurisdictions where it is not illegal.
134
Lance Whitney, Democrats to employers: Stop asking for Facebook passwords, CNET (May 10, 2012, 8:04
AM), http://news.cnet.com/8301-1009_3-57431724-83/democrats-to-employers-stop-asking-for-facebook-
passwords. See also, Bob Sullivan, Govt. Agencies, Colleges Demand Applicants’ Facebook Passwords,
MSNBC.COM (Mar. 6, 2012, 6:13 AM), http:// www.nbcnews.com/technology/govt-agencies-colleges-demand-
applicants-facebook-passwords-328791.
135
Charles Cooper, Fork over your Facebook log-on or you don't get hired. What?, CNET, (Mar. 24, 2012, 4:00
A.M.), http://news.cnet.com/8301-1023_3-57403315-93/fork-over-your-facebook-log-on-or-you-dont-get-hired-
what.
136
See Employer Access to Social Media Usernames and Passwords 2013, National Conf. of State Leg., (Oct.
23, 3013) http://www.ncsl.org/research/telecommunications-and-information-technology/employer-access-to-social-
media-passwords-2013.aspx (The ten states are Arkansas, Colorado, Illinois, Nevada, New Jersey, New Mexico,
Oregon, Utah, Vermont and Washington.).
137
Erika C. Collins, Implementing U.S. and International Social Networking Regulations, N.Y. L. J. (Oct. 22,
2012), http://www.newyorklawjournal.com/PubArticleFriendlyNY.jsp?id=1202575483064.
138
Disclosing the password is typically a violation of the Terms of Use for the service; suborning such violation
to gain unauthorized access of a computer could create liability under the federal Computer Fraud and Abuse Act,
though such excessive use of the statute has yet to be explored.
139
29 U.S.C. §§ 151-169 (2011).
140
Id. at §§157-58.
141
Hispanics United of Buffalo, Inc. and Ortiz., 359 NLRB No. 37 (Dec. 14, 2012) (slip op.); Karl Knauz
Motors, Inc. d/b/a Knauz BMW and Becker, 358 NLRB No. 164 (Sept. 28, 2012) (slip op.); Costco Wholesale Corp.
and United Food and Commercial Workers Union, Local 371., 358 NLRB No. 106 (Sept. 7, 2012)(slip op.).
142
Noel Canning v. NLRB, 705 F. 3d 490 (D.C. Cir. 2013) (cert. granted June 2013) (“the appointments were
constitutionally invalid and the Board therefore lacked a quorum, we grant the petition for review and vacate the
Board's order.”). The invalid recess appointments have since been confirmed by Congress.
143
Hispanics United of Buffalo, Inc., supra note 130 at 1.
144
29 U.S.C. §157.
145
Id.
146
Hispanics United, supra note 130 at 2.
employee was “concerted” within the meaning of Section 7 of the Act; (2) the
employer knew of the concerted nature of the employee’s activity; (3) the
concerted activity was protected by the Act; and (4) the discipline or discharge
was motivated by the employee’s protected, concerted activity.147
The NLRB found that Cruz-Moore’s “‘mutual aid’ object of preparing her co-workers for
group action was implicitly manifest from the surrounding circumstances.”148
Despite the general protections of Section 8, under Atlantic Steel Co.,149 an employee can
lose protection of the NLRA if the actions are sufficiently inappropriate.150 In the modern
Facebook parlance, rants are not protected. But the posts in Hispanics United were not rants. The
Facebook posts were not made at work, the criticisms were related to job performance, and there
were no outbursts. As such, even though the Facebook posts singled out an employee for
criticism, they were with the “mutual aid or protection” clause of Section 7. 151 Importantly, since
the Facebook criticism was directed to fellow employees, the access to posts by non-employees
is not relevant to the analysis.152
2. Rants Compared: While Hispanics United has become the most significant NLRB
concerted activity decision, there have been numerous additional actions. Acting General
Counsel Lafe Solomon has issued two reports summarizing decisions that addressed this
question of protected concerted activity, or activity involving mutual aid and support.153 He has
also authored a third report focusing on social media policies.154
The reports compare those cases involving concerted employee activity or mutual aid and
support with those situations where the employee turned to Twitter or Facebook to complain
about a supervisor or co-worker.155 Where the worker of a home improvement store complained
on Facebook about being reprimanded “in front of the Regional Manager,” she posted to
Facebook on her cell phone.156 One co-worker “liked” the post, two others commented.
Additional posts by the employee followed. What did not follow was a discussion involving
other employees and the working conditions of the employer. Sympathy by other employees is
not enough to turn complaints or rants into protected speech.157
147
Meyers Industries, 268 NLRB 493, 497 (1983) (Meyers I), remanded sub nom. Prill v. NLRB, 755 F.2d 941
(D.C. Cir. 1985), supplemented 281 NLRB 882 (1986) (Meyers II), affd. sub nom. Prill v. NLRB, 835 F.2d 1481
(D.C. Cir. 1987).
148
Hispanics United, supra note 130 at 37-3.
149
245 NLRB 814 (1979).
150
Id. (“The Atlantic Steel factors are: (1) the place of the discussion; (2) the subject matter of the discussion;
(3) the nature of the employee's outburst; and (4) whether the outburst was, in any way, provoked by an employer's
unfair labor practice.”).
151
Hispanics United, supra note 130 at 37-3.
152
Id.
153
Lafe Solomon, Report of The General Counsel, Memorandum OM 12-31 (Jan. 24, 2012); Lafe Solomon,
Report of The General Counsel, Memorandum OM 11-74 (Aug. 18, 2011) (summarizing Facebook-based
employment disputes).
154
Lafe Solomon, Report of The General Counsel, Memorandum OM 12-59 (May 30, 2012) (addressing the
overbreadth in social media policies).
155
Solomon, OM 12-31, supra note 142 at 6-9.
156
Id. at 6.
157
Id.
158
Knauz BMW, supra note 130 at 1.
159
Id. (citing Lutheran Heritage Village-Livonia, 343 NLRB 646, 646 (2004).
160
Id.
161
Costco, supra note 130 at 1. The Costco rule permitted by the administrative law judge but found to violate
Section 7:
Any communication transmitted, stored or displayed electronically must comply with the
policies outlined in the Costco Employee Agreement. Employees should be aware that statements
posted electronically (such as [to]online message boards or discussion groups) that damage the
Company, defame any individual or damage any person’s reputation, or violate the policies
outlined in the Costco Employee Agreement, may be subject to discipline, up to and including
termination of employment.
162
Id.
In contrast to the ambiguity at the NLRB, the advice provided by General Counsel Solomon
has been extremely consistent, finding most social media policies are too broad or vague, in
derogation of Section 7. In all three of his memoranda, he has focused on the appropriateness of
the written employment policies involving social media. Even in many of the decisions allowing
the discharge for rants and gripes on social media sites, the NLRB General Counsel163 has
nonetheless found that published social media policy is overbroad. This explanation is a good
illustration of his analysis:
The Employer’s social media policy prohibits employees from using social
media to engage in unprofessional communication that could negatively impact
the Employer’s reputation or interfere with the Employer’s mission or
unprofessional/inappropriate communication regarding members of the
Employer’s community. …
These prohibitions would reasonably be read to include protected
statements that criticize the Employer’s employment practices, such as employee
pay or treatment. Further, the rule contained no limiting language excluding
Section 7 activity from its restriction. We noted that although the rule did contain
examples of clearly unprotected conduct, such as displaying sexually oriented
material or revealing trade secrets, it also contained examples that would
reasonably be read to include protected conduct, such as inappropriately sharing
confidential information related to the Employer’s business, including personnel
actions.164
As illustrated by the excerpt above, policies will be deemed overbroad and invalid if they
include any prohibition of misconduct that could be construed to suggest protected Section 7
activity is prohibited along with content appropriately banned.165
Given this very narrow approach, the third Solomon report reproduced the Walmart social
media policy in full because it was the only report to pass review. 166 Policies “prohibiting
employees from ‘disparaging’ the Employer in any media” will invariably violate Section 7.167
Rules prohibiting soliciting (presumably donations, Girl Scout cookie sales, etc.) could include
soliciting for union activities and are similarly overbroad.168 As discussed below, limitations on
communicating confidential information – rather than protecting trade secrets – were overbroad
as well.169
The Walmart policy survives, in part, because it is simply written and uses examples to
illustrate what the rules are trying to encompass. It also is short and limited. The sections on
163
Solomon, OM 12-31, supra note 142 at 2 (“Cases concerning the protected and/or concerted nature of
employees’ social media postings and the lawfulness of employers’ social media policies and rules continue to be
presented to the Regional Offices and are then submitted to the Division of Advice in Washington for my
consideration.”).
164
Id. at 12.
165
See Solomon, OM 12-59 supra note 143 at 3.
166
Id. at 22-24.
167
Solomon, OM 12-31, supra note 142 at 3.
168
Id. at 6.
169
Solomon, OM 12-59, supra note 143 at 3.
170
Id. at 23.
171
Id. (“Respect financial disclosure laws. It is illegal to communicate or give a “‘tip’ on inside information to
others so that they may buy or sell stocks or securities. Such online conduct may also violate the Insider Trading
Policy.”).
172
The exception to this general rule applies to trade secrets and information protected by privacy or
confidentiality laws, where some post-employment obligations remain.
2. Policies Should Prohibit Violations of Other Laws and Regulations: If the CEO or
other senior officials wish to have a chatty or friendly social media platform to communicate
their philosophical views, that feed should be separate from the marketing feeds of the company.
Mere separation may be insufficient, however, as Federal securities laws, including Regulation
FD, specify the manner in which market information can be disclosed.173 Facebook is not yet an
approved alternative. The issue came to the forefront when Netflix’s own Reed Hastings posted
that “Netflix's streaming hours ‘exceeded 1 billion hours for the first time,’” arguably
distributing material market information not communicated in a press release or other approved
method under the regulation.174
The SEC ultimately determined not to take any action against Hastings, instead issuing a
report to provide guidance to issuers regarding disclosures involving social media.175 Instead
it updated its 2008 Reg. FD guidance to specifically incorporate new “push” technologies
such as Facebook and Twitter to the list of RSS feeds and email alerts.176
The report does not embrace social media however. Instead, it cautions that “issuers to
examine rigorously the factors indicating whether a particular channel is a “recognized channel
of distribution” for communicating with their investors.”177 The occasional, off-hand comment
that moves the market will come under increasing scrutiny and likely be met with fines. For
those companies who embrace Twitter feeds, Facebook or LinkedIn pages or other specific
social media platforms as their primary notice mechanism, the report and guidance merely
remind the issuers that these new media must be treated like other media and the public must be
able to rely on these sources for timely and complete information. Once a company elects to use
such a platform, it must do so in an ongoing and comprehensive manner so that the market
remains fully informed.
173
Regulation FD (Fair Disclosure), 17 C.F.R. § 243.100(b)(1) (2012); 65 Fed. Reg. 51,716, 51,720 (Aug. 24,
2000) (codified at 17 C.F.R. pt. 243) (Reg. FD applies where “it is reasonably foreseeable that the security holder
will trade on the basis of the information.”).
174
See Gina Hall, Hastings disagrees with SEC on Facebook disclosure, L.A. BIZ, (Feb. 4, 2013, 11:45 AM),
http://www.bizjournals.com/losangeles/news/2013/02/04/hastings-disagrees-with-sec-on.html (SEC considering a
lawsuit against Netflix CEO Reed Hastings for Facebook post regarding Netflix user milestones).
175
Report of Investigation Pursuant to Section 21(a) of the Sec. Ex. Act of 1934: Netflix, Inc., and Reed
Hastings, Release No. 69279, Apr. 2, 2013, www.sec.gov/litigation/investreport/34-69279.pdf.
176
Id. at 6.
177
Id. at 7.
178
See, e.g., Computer Fraud and Abuse Act, 18 U.S.C. 1030(a)(4) (2012); United States v. Rodriguez, 628
F.3d 1258 (11th Cir. 2010) (liability for exceeding authorized access under the employment policies); United States
v. John, 597 F.3d 263 (5th Cir. 2010); Int'l Airport Ctrs., LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006). Cf United
States v. Nosal, 676 F.3d 854, 785 (9th Cir. 2011) (“the phrase ‘exceeds authorized access’ in the CFAA does not
extend to violations of use restrictions.”).
179
See 17 U.S.C. § 101 (2012); Community for Creative Non-Violence v. Reid, 490 U.S. 730 (1989).
information must be kept confidential. Given the critical risk of losing trade
secrets, policies should be well crafted to protect the most important
information , rather than being vague and unenforceable.
5. Advertising Policies must take Endorsement Guidelines and Publicity Rights into
Account: For employees posting on behalf of the employer, it is important that the employer’s
policies reinforce the obligations under the FTC endorsement guidelines to prohibit false
promotion of the employer, false disparagement of the competitors, or false suggestions of
endorsements by third parties.185 It is extremely easy for a well-intended employee to start
salting the online commentary about goods or services, so the FTC guidelines should be
incorporated into employee handbooks to avoid liability. In this way, the employer can better
manage the conduct of the employees and take action if the guidelines are violated.
IV. CONCLUSION
Social media exploits copyrights, trademarks, and publicity rights to enable the public to
communicate with the public. The paradigm shift to the many-to-many model of social media
has irrevocably transformed the law involving commercial speech, intellectual property, and, of
course, employment law. Employers represent just one community of speakers within the new
many-to-many environment, but that group shapes public policy. Sometimes operating as
advertisers, other times as broadcasters, and often just as additional voices among the throngs,
employers must navigate the unmapped shoals of social media by carefully understanding their
role in crafting policies for their general employees, more targeted policies for those employees
and independent contractors who speak on behalf of the enterprise, and policies for the
protection and exploitation of intellectual property assets – particularly trade secrets.
An employer will be most successful by addressing each aspect of the social media
communication separately, with particular rules for trade secrets, internal confidential
information, copyrighted material, aggregated data, trademarks, publicity rights, and
endorsements. Neither sweeping prohibition nor overbroad endorsement will achieve an
employer’s goals and obligations. In social media, as in all things, moderation guides the course.
Perhaps the best advice is some of the oldest, “[g]ive thy thoughts no tongue, [n]or any
unproportioned thought his act.”186 This sage advice remains as true for conduct in social media
as it has been throughout the ages.
business-related communications) for employees to understand that it does not reach protected
communications about working conditions. [Walmart, Case 11-CA-067171]
185
See 16 C.F.R. §255.1(a).
186
THE TRAGEDY OF HAMLET, PRINCE OF DENMARK, WILLIAM SHAKESPEARE, ACT I, SCENE 3 (Spring Books,
London) (Polonius’ advice to Laertes).
See thou character. Give thy thoughts no tongue,
Nor any unproportioned thought his act.
Be thou familiar, but by no means vulgar. …
Give every man thy ear, but few thy voice;
Take each man's censure, but reserve thy judgment. …
Neither a borrower nor a lender be; …
This above all: to thine ownself be true,
And it must follow, as the night the day,
Thou canst not then be false to any man.