- Posts by Brian WheelerPartner
Brian Wheeler leads the firm’s Intellectual Property and Data Security & Privacy team. His practice focuses on intellectual property, data security and privacy, and high-stakes complex commercial litigation, water ...
A federal magistrate judge in the Northern District of California recently rejected a Chinese company’s attempt to invoke China’s recent Personal Information Protection Law (“PIPL”) to limit discovery obligations in the United States. In Cadence Design Sys., Inc. v. Syntronic AB, No. 21-cv-03610-SI, United States Chief Magistrate Judge Joseph C. Spero refused to limit the PIPL’s legal obligations exception to Chinese laws and China-recognized orders. On June 24, 2022, the Court denied defendants’ motion for reconsideration of the Court’s earlier order compelling Defendant Syntronic (Beijing) Technology R&D Center Co., Ltd. (“Syntronic Beijing”) to produce computers in the possession and custody of defendants in China, for inspection in the United States. While on its face China’s PIPL would seemingly prohibit production of these China-stored computers into the United States without the consent of current and former individual employees (who have refused to consent), the Court ruled that its order in the case created a legal obligation sufficient to invoke the legal obligation exception under PIPL Article 13.
Consumer privacy continues to be an ever evolving and active area of law, and one that continues to prove important to consumers and therefore consequential for businesses. A recent study published by Cisco reports that 86% of consumers “care about data privacy” and want more control over their data. Even technology company leaders have recognized the importance of consumer privacy. Apple CEO Tim Cook recently characterized privacy as a fundamental human right, and increased unease over unregulated data collection seems to be a bipartisan concern. As privacy and data security has gained space in the national consciousness, federal authorities have sought to increase their oversight, which could have wide-ranging implications for businesses.
Facebook may provide the impetus for a federal privacy law
Facebook regulation has been in the news most often in discussions relating to Section 230 protections of technology companies, but the recent testimony from Facebook whistleblower Frances Haugen may also provide a needed spur for a federal privacy law. During the October 5, 2021 U.S. Senate Committee on Commerce, Science, and Transportation's Subcommittee on Consumer Protection, Product Safety, and Data Security hearing, Haugen testified, and committee members commented, on the need for Congress to act on federal privacy legislation. Senator Amy Klobuchar, D-Minn., even explicitly called for the drafting of a comprehensive federal privacy law. Ms. Haugen added that simply updating existing U.S. privacy laws would be insufficient to address privacy concerns.
Haugen’s testimony only added to the momentum in the Committee on Commerce, Science, and Transportation. The Committee held a hearing on September 29, 2021 on “Protecting Consumer Privacy,” which examined the need for a comprehensive privacy law, better safeguards of consumer privacy rights and creating a privacy bureau of the Federal Trade Commission (FTC). There was bipartisan recognition of the importance of a federal privacy framework. Senator Roger Wicker, R-Miss., called on the Biden administration to appoint a senior staffer to lead the charge on a federal privacy law and make a comprehensive federal data privacy law a reality, while Committee Chair Senator Maria Cantwell, D-Wash., stressed the threat to consumer privacy from the unbridled collection of personal data and the troubling impact on consumers when companies have failed to do enough to safeguard the information they collect. Additionally, remarks during the hearing also suggested the Committee members generally were open to the possibility of a private right of action in any federal privacy law.
A number of former FTC officials and privacy experts testified at the hearing, including the newly appointed head of the California Privacy Protection Agency, Ashkan Soltani, also a former FTC official and former senior White House advisor on privacy matters. The former FTC officials stressed the need for comprehensive federal privacy legislation with strong consumer rights protections and urged lawmakers to include enhanced enforcement authority and resources for the FTC. Although the FTC enforcement of privacy issues has steadily trended upward, the former FTC officials testified that the federal consumer watchdog agency is insufficiently staffed and does not have time for forceful enforcement with its current resources. The former FTC officials stressed the necessity of staffing increases at the FTC in parity with the growing tech industry, and the creation of a bureau dedicated to privacy and security issues at the FTC, arguing that without a comprehensive federal privacy law, the behavior of companies is unlikely to change. The witnesses also pushed back on some members of the Senate requesting the FTC take up rulemaking relating to data privacy, emphasizing that congressional action is needed to pass new federal privacy law.
Federal enforcement and oversight of cybersecurity matters
Earlier this month, the United States Department of Justice (DOJ) announced a new initiative for pursuing enforcement relating to cyber measures that seeks to hold accountable entities or individuals that put U.S. information or systems at risk. The Civil Cyber-Fraud Initiative will utilize the False Claims Act to pursue cybersecurity related fraud by government contractors and grant recipients. The False Claims Act is the government’s primary civil tool to redress false claims for federal funds and property involving government programs and operations. Under the Initiative, the DOJ will utilize the FCA to pursue civil enforcement actions against government contractors that knowingly fail to follow required cybersecurity standards and reporting requirements—the latest indication of the heightened risks of noncompliance with cybersecurity-related obligations for contractors. The Initiative, which will be led by the Civil Division’s Commercial Litigation Branch, Fraud Section, will combine the department’s expertise in civil fraud enforcement, government procurement and cybersecurity to combat new and emerging cyber threats to the security of sensitive information and critical systems. In announcing the Initiative, Deputy Attorney General Lisa Monaco stated, “For too long, companies have chosen silence under the mistaken belief that it is less risky to hide a breach than to bring it forward and to report it . . . that changes today.”
The DOJ’s announcement comes amid a flurry of regulatory and legislative activity related to cybersecurity. Agencies are in the process of implementing President Biden’s broad May 12, 2021, Executive Order on Improving the Nation’s Cybersecurity (EO 14028), which calls for new requirements for information technology contractors to share information about potential cyber threats, among other things. President Biden also signed into law the “K-12 Cybersecurity Act of 2021,” which requires the Cybersecurity and Infrastructure Security Agency (CISA) to study the cybersecurity risks facing elementary and secondary schools and develop recommendations that include voluntary guidelines designed to assist schools in facing those risks. Last month the Senate Homeland Security Committee also advanced a bill that would require hospitals and oil and natural-gas pipeline companies, among other critical infrastructure operators, to report cyberattacks and ransom payments within 72 hours. The Department of Homeland Security has also said it would require "high-risk" rail and transit systems to report cyber incidents and implement plans to address cyberattacks.
The importance of a robust cybersecurity program
The number of data breaches and ransomware attacks has exponentially increased in 2021. Data breaches continue to occur with alarming frequency and success. Linkedin, Volkswagen, Facebook, T-Mobile, Bonobos, and Experian have all suffered data breaches this year. In Southern California, U.C. San Diego Health was reportedly the victim of a phishing scheme that a recent class action complaint alleges may have resulted in a data breach of approximately half a million patients over the period of four months. The multi-count class action complaint, including a claim under the California Consumer Privacy Act (CCPA), was filed in federal district court in San Diego in September. However, breaches are not limited to just customer data. Public relations firm 5W reportedly suffered a data breach in August 2021 that impacted its employees’ data, including allegations that some of its current and former employees’ names and Social Security numbers may have been exposed.
Similarly, the volume of suspected ransomware payments flagged by U.S. banks has nearly doubled from last year. Ransomware payments reportedly reached more than $400 million globally in 2020 and topped $81 million in the first quarter of 2021 alone, with North America becoming the biggest ransomware target. Recent target examples include Sinclair Broadcast Group, a nationwide operator of TV stations, announced that it had suffered a cybersecurity incident which encrypted some of its servers and work stations with ransomware and stole data from the company's network. Another media conglomerate, Cox Media Group, was also reportedly the target of a ransomware attack earlier this year. But ransomware strikes are not limited to particular industries. Hospitals and health care organizations are persistent targets impacting patient health and safety. Educational institutions are also not immune. In another recent incident, Howard University in Washington, D.C., had to cancel classes last month after being hit by ransomware.
Cybersecurity incidents expose businesses to regulatory enforcement actions as well as costly private class action litigation. As always, the best strategy for businesses is to proactively take action to prevent or minimize the risk of cybersecurity incidents before they happen by implementing a robust cybersecurity program. This can include minimizing data retention, implementing sufficient technological protections such as virus and malware programs, encrypting data when possible, keeping software updated, implementing secure data backup practices, conducting regular audits, reviewing contracts with vendors and other entities that have access to information, and, particularly important, training employees in implementing security practices and identifying potential phishing scams or other suspicious activity. If you do suffer a cybersecurity incident, make sure to immediately contact reliable counsel to oversee your response, guide you through any applicable legal requirements, and ensure the best course of action to address and mitigate any harm.
If you have any data security or privacy related questions, contact the authors and the other attorneys in the Data Security and Privacy Team at Atkinson Andelson Loya Ruud & Romo to help you navigate any potential actions and preventative security measures you can take. If your business is faced with a lawsuit or regulatory enforcement action, AALRR has a team of data privacy litigators well-versed in the law ready to step in and defend you.
This AALRR post is intended for informational purposes only and should not be relied upon in reaching a conclusion in a particular area of law. Applicability of the legal principles discussed may differ substantially in individual situations. Receipt of this or any other AALRR publication does not create an attorney-client relationship. The firm is not responsible for inadvertent errors that may occur in the publishing process.
© 2021 Atkinson, Andelson, Loya, Ruud & Romo
Consumer privacy continues to be an ever evolving and active area of law and California is still leading the way. In today’s update, we discuss the latest developments in enforcement and litigation for California consumer privacy law.
The CPRA and the Privacy Protection Agency Inches Closer
The California Privacy Rights Act (CPRA), approved by voters as a ballot proposition in November 2020, supplements and expands the current California Consumer Privacy Act (CCPA), and established the California Privacy Protection Agency (CPPA or the “Agency”), which is vested with full power and authority to enforce the CCPA (including the additional requirements added by the CPRA). The Agency had already appointed a Board of Directors and been holding regular meetings, but has recently taken additional important steps in its formation.
Consumer privacy continues to be an ever evolving and active area of law and California is still leading the way.
New Amendments to the CCPA and the CPRA
Earlier this month Governor Gavin Newsom signed bills into law that amend the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA).
Following the Supreme Court’s recent ruling narrowing the patent assignor estoppel doctrine, employers may have more difficulty shielding their patents from challenges by former employee-inventors and their new employer-competitors.
On April 5, 2021, the Supreme Court put an end to the decade-long copyright dispute between tech giants Google and Oracle America. In a 6-2 decision authored by Justice Breyer, the Supreme Court held in Google LLC v. Oracle America, Inc., 593 U.S. ___ (2021), that Google’s copying of approximately 11,500 lines of code from Oracle’s Java SE Application Programming Interface (“API”) was “fair use” and, therefore, did not constitute copyright infringement. The Court’s decision will undoubtedly have ramifications for decades to come on the “fair use” doctrine in commercial works, and in particular in the use of computer code in commercial software.
The two questions before the Court were: (1) whether the Java SE code that Google copied was entitled to copyright protection in light of the Copyright Act’s inclusion of computer programs as copyrightable material and its prohibition on protection for “processes” and “methods of operation,” and (2) assuming the code was copyrightable, whether Google’s use qualified as “fair use.” Recognizing that “a holding for Google on either question presented would dispense with Oracle’s copyright claims,” the Court only answered the fair use inquiry. In view of “the rapidly changing technological, economic, and business-related circumstances,” the Court exercised judicial restraint by stating it would “not answer more than is necessary to resolve the parties’ dispute.” Although Google could have prevailed had the Court found that the API was not copyrightable, the Court saved that question for another day and assumed for the sake of argument that it was.
Justice Breyer, joined by Chief Justice Roberts and Justices Sotomayor, Kagan, Gorsuch, and Kavanaugh, focused on the fair use defense by analyzing each of the four statutory factors enumerated in 17 U.S.C. § 107: (1) the purpose and character of the use; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. The Court found that each factor weighed in Google’s favor, thereby reversing the Federal Circuit’s decision to the contrary.
Justice Thomas, joined by Justice Alito, dissented, stating that the majority erred by not answering the question of copyrightability and that the fair use factors actually favored Oracle. The dissent criticized the majority’s approach of sidestepping the question of whether the API was copyrightable, arguing that the majority’s failure to address the issue distorted its fair use analysis and ultimately rendered the code as “less worthy of protection.”
The Court’s decision sets an important precedent as it has the potential to significantly expand the fair use doctrine, even in non-computer software contexts. If you are an author, musician, programmer, or other content creator, or have been accused of copyright infringement, it is important to consult with experienced intellectual property counsel to determine how the decision impacts you.
AALRR has a dedicated group of attorneys on its Intellectual Property Team with the experience and expertise to vigorously enforce your copyrights and defend you against claims of copyright infringement. Attorneys on the Firm’s Intellectual Property Team can also assist you with registration of your copyrights with the United States Copyright Office. Contact the authors for assistance with your copyright and other intellectual property needs.
This AALRR post is intended for informational purposes only and should not be relied upon in reaching a conclusion in a particular area of law. Applicability of the legal principles discussed may differ substantially in individual situations. Receipt of this or any other AALRR publication does not create an attorney-client relationship. The Firm is not responsible for inadvertent errors that may occur in the publishing process.
© 2021 Atkinson, Andelson, Loya, Ruud & Romo
In a recent letter to members of the U.S. Senate Finance Committee, dated February 18, 2021, the United States Treasury Inspector General for Tax Administration (the “Inspector General”) outlined a potential disagreement with the Criminal Investigations Division of the Internal Revenue Service (“Criminal Investigations”) regarding the need for a search warrant to utilize databases containing cell phone users’ GPS data. On one hand, the Inspector General indicated that courts may use “similar logic” to expand a 2018 Supreme Court decision requiring a search warrant to access cell-site location information to likewise apply to GPS data provided to applications operated by third parties. On the other hand, the letter provides the stated position of Criminal Investigations, which asserts that “Cell Site Location Information  is distinct from  opt-in app data,” in apparent reference to the division’s prior claim that GPS data collected by cell phone applications does not require a search warrant because it has been “voluntarily” provided to a third-party.
In order to resolve a COVID-era class action lawsuit concerning its retail stores, Nike has agreed to provide all retail store employees with transparent, see-through face coverings to accommodate its customers who are deaf or hard of hearing and rely on lip reading. Nike’s new policy is part of a proposed settlement following a class action suit against the shoe company’s retail operations.
Three months since our last update on the impact of COVID-19 on commercial lease payment obligations (here), COVID-19 continues its onslaught throughout the United States with now more than 717,000 confirmed cases in California alone. The State of Emergency in California continues, and the Executive Order that previously granted local jurisdictions the authority to impose moratoriums on residential and commercial evictions has likewise been extended. This alert will address the continuing moratoriums on commercial evictions throughout various jurisdictions at the local level, and their impact on commercial lease payment obligations.
On Friday, May 29, 2020, the California Department of Public Health approved Los Angeles County’s variance request to move further into Stage Two of the California Resiliency Roadmap, allowing Los Angeles County restaurants to provide in-person dining service and hair salons and barbershops to reopen.
Other AALRR Blogs
- California Court of Appeal Rules That The Americans With Disabilities Act Does Not Apply To A Website That Does Not Provide Goods Or Services Connected With A Physical Location
- China’s Personal Information Protection Law Does Not Excuse China-Related Party From Discovery Obligations in the United States, Northern District Says
- Reliance on Third-Party Agents Can Expose You to Substantial Liability
- California Labor Codes’ Policy Against Forum Selection Clauses Overrides Compulsory Cross-Complaint Laws
- Privacy and Data Security National Update: Increasing Federal Involvement in Data Security and Enforcement
- California Privacy Law Update: The California Privacy Protection Agency Takes Shape and CCPA Litigation Update
- California Privacy Law Update: The CCPA and CPRA Amended (Yet Again) and New Protection for Genetic Information
- California Court of Appeal Issues Potentially Far Reaching Decision Regarding California’s “Bounty Hunter” Labor Code Private Attorneys General Statute
- Supreme Court Ruling Narrowing Patent Assignor Estoppel Doctrine Favors Employee Mobility In Post-Employment Disputes Involving Invention Assignments
- Supreme Court Ruling in Google v. Oracle Marks Significant Victory for Copyright “Fair Use” in Commercial Works
- Christopher S. Andre
- Cindy Strom Arellano
- Eduardo A. Carvajal
- Michele L. Collender
- Scott K. Dauscher
- Lauren D. Fierro
- Runmin (Ivy) Gao
- Evan J. Gautier
- Carol A. Gefis
- Amber S. Healy
- Edward C. Ho
- John E. James
- Jonathan Judge
- David Kang
- Neil M. Katsuyama
- Joseph K. Lee
- Damian J. Martinez
- Shawn M. Ogle
- David B. Sarfati
- Jon M. Setoguchi
- Adam P. Snyder
- Brian M. Wheeler
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- June 2019
- May 2019
- April 2019
- March 2019