Currents Vol. XXIV, No. 1 | 2020

Page 1

2020

pre-sort first class u.s. postage paid houston, tx permit no.8451

urrent C S J o u r n a l o f I n t e r n at i o n a l E c o n o m i c L aw

2020

South Texas College of Law Houston

Vol. XXIV, No.1

Free Trade Areas for China’s Belt and Road Gonzalo Villalta Puig

Cross Border Trade Compliance Courtney V. Flores, Tim Brown, Mel Chavez, David Mortlock, Ellen C. Smith

Vol. XXIV No. 1

south texas college of law houston currents: journal of international economic law 1303 San Jacinto Street Houston, Texas 77002-7006

Currents

Journal of International Economic Law

Symposium: Compliance in International Corporate Legal Practices:

Managing Cross Border Internal Investigations Thuy P. Tran, Eleanor Benmenashe, Ashley Coselli, Michael Miner, Marla Moore Chief Compliance Officer Roundtable Natalia Shehadah, Steven Gyeszly, Jay Martin, Ryan Rabalais, John Sardar

Changing Landscape of International Anti-Bribery and Corruption Compliance Margaret Mousoudakis, Joy Dowdle, Sergio Leal, David Searle

Present and Future Data Privacy Outlook Wendell J. Bartnick, Shenna Bradshaw, Alexandra ChughtaiHarvey, Mary Isensee


Where can you get back Volumes and Issues of

urrent C S J o u r n a l o f I n t e r n at i o n a l E c o n o m i c L aw

You can order them through Hein! We have obtained the entire back stock, reprint and microform rights to currents. Complete sets to date are now available. We can also Furnish single volumes and issues.

William S. Hein & Co., Inc. 1285 Main Street Buffalo, New York 14209 800-828-7471 or 716-882-2600


Contents

3 Free Trade Areas for China's Belt and Road Gonzalo Villalta Puig 14 Cross Border Trade Compliance: Background Madison Hastings 21 Cross Border Trade Compliance Courtney V. Flores, Tim Brown, Mel Chavez, David Mortlock, Ellen C. Smith 34 Anti-Bribery Laws and Investigation: Background Jordan Sloane

Changing Landscape of International Anti- Bribery and Corruption Compliance 42

Margaret Mousoudakis, Joy Dowdle, Sergio Leal, David Searle

Journal of International Economic Law

52 Managing Cross Border Internal Investigations Thuy P. Tran, Eleanor Benmenashe, Ashley Coselli, Michael Miner, Marla Moore

General Data Protection Regulation and California Consumer Privacy Act: Background 62

Jonathan Mckinney, Esther-Sarah Wilmot, Greta Carlson, Elizabeth Slezak

70 Present and Future Data Privacy Outlook Wendell J. Bartnick, Shenna Bradshaw, Alexandra Chughtai-Harvey, Mary Isensee 79 Chief Compliance Officer Roundtable Natalia Shehadah, Steven Gyeszly, Jay Martin, Ryan Rabalais, John Sardar

Are Changes to the U.S. Patent System Objectively Killing Innovation? 87

Nick Cornor

Negotiating Under the New EU Copyright Directive 2019/790 and GDPR 106

Adam Freeland

Career Paths in International Corporate Legal Practice 123

Currents 24.1 2020


Letter From The Editor

Currents

Dear Readers: The Editorial Board of CURRENTS: Journal of International Economic Law (CURRENTS: JIEL) is proud to present an issue constituting the collective insights of the international compliance community of Houston. Specifically, this issue embodies the 2019 Symposium on Compliance in International Corporate Legal Practices—Legal Developments and the Talent Needs of the Future Agenda. Our authors come from compliance departments of some of Houston’s leading domestic and multinational corporations. Volume 24.1 illustrates the key role that compliance holds in international economic law. The live panels at the conference produced five articles in this issue highlighting how international trade and business is altered by U.S. government and international regulations and corporate attempts to comply with such regulations. As the articles make clear, the compliance attorney ensures that business moves forward properly against the backdrop of regulatory laws. In addition to covering the Compliance Symposium articles, Volume 24.1 contains an article written by Gonzalo Villalta Puig, Professor of Law at The University of Hull, UK, titled Free Trade Areas for China’s Belt and Road Initiative. Additionally, Volume 24.1 contains two student notes: “Are Changes to Patent Law Objectively Killing Innovation?” and “Negotiating Under the New EU Copyright Directive and GDPR.” Finally, our CURRENT Events report is a new feature in CURRENTS: JIEL. As the name suggests, CURRENT Events is a comment researched and written by staff members. We are delighted to provide a platform for students to engage collectively on a journal beyond editing. This CURRENT Events focuses on the changes to data privacy law as a result of the GDPR and the CCPA . I also wish to express thanks to Natalia Shehadeh (’99), Senior Vice President and Chief Compliance Officer at TechnipFMC, and Skyler Obregon (2011), Regional Compliance Counsel at TechnipFMC, both for their vision in leading this symposium and for their continued dedication to the pursuit of excellence in legal education as South Texas alumni. We are also grateful to the outstanding professionals who joined us and provided key insights into the ethical dilemmas facing corporations and businesses wishing to stay up to speed with the ever-changing business climate. Finally, we would like to thank Professor Cherie O. Taylor, our faculty advisor, for her continued commitment to students who seek to develop transactional skills in international economic law. I would like to thank the entire staff and Editorial Board. Everyone worked tirelessly to get this issue ready and faced unique challenges that were both embraced and overcome. Further, on behalf of the 2019-2020 Editorial Board, I would like to thank Dean Barry for his unwavering support of the IILP & NS and CURRENTS: JIEL as well as former Dean Donald Guter for his inspiration and leadership. The Editorial Board always welcomes article submissions on any topic in the field of International Economic Law. Please visit our website at https://www. stcl.edu/academics/law-reviews-journals/currents/ for additional information about how to submit and our publication schedule. We hope you enjoy our special issue on corporate compliance.

CURRENTS is published by South Texas College of Law Houston. Please cite CURRENTS as CURRENTS: JIEL 24.1, 2020. Please direct inquiries and correspondence to: Editorial Board

CURRENTS South Texas College of Law Houston 1303 San Jacinto Street, Suite 219 Houston, Texas 77002-7006 E-mail: currents@stcl.edu

Copyright 2020. CURRENTS: JIEL All rights reserved. Volume XXIV, Number 1

Editorial Board 2019-2020 Editor-in-Chief Adam Freeland Managing Editor Elizabeth Slezak Articles/Notes Editors Greta Carlson Kendra Watson Project Editor Esther-Sarah Wilmot Members Marielle Brisbois Elliott Deese Madison Hastings Lucian Hill Carla Lassabe Ashley Maskus Jonathan McKinney Margaret Marrow Elizabeth Nevle Sarah Reese Jordan Sloane Alexis Summers Jared Vann Kyle Vento Faculty Advisors Assistant Dean Elizabeth A. Dennis Professor C. O’Neal Taylor

Publications Coordinator Jacob Hubble

Credits

Adam Freeland Editor-in-Chief CURRENTS: Journal of International Economic Law Currents 24.1 2020

Publication Services Jacob Hubble


Free Trade Areas for China's Belt and Road G O N Z A L O

This article studies China’s Belt and Road Initiative and its call to open free trade areas with the customs territories along the routes that it covers. It argues that, as a solution to the problems of the World Trade Organization to liberalise trade at the multilateral level, China should indeed attempt to enter into plurilateral and bilateral agreements with its largest trading partners. It further argues that China should work for those agreements to be comprehensive and contemporary. —————————————————

I. Introduction ————————————————— The Belt and Road Initiative of the Government of the People’s Republic of China (China) proposes to develop a land and

V I L L A LTA

P U I G

Gonzalo Villalta Puig is Professor of Law at The University of Hull. He is the inaugural holder of The University of Hull established Chair in the Law of Economic Integration for his research into the constitutionalisation of free trade in non-unitary market jurisdictions. Professor Villalta Puig was formerly a Professor of Law and Outstanding Fellow of the Faculty of Law at The Chinese University of Hong Kong. He is an Overseas Fellow of the Australian Academy of Law, a Fellow of the European Law Institute, and an Associate Member of the International Academy of Comparative Law. Professor Villalta Puig chairs the International Association of Constitutional Law’s Research Group for Constitutional Studies of Free Trade and Political Economy and is a member of the Committee on the Procedure of International Courts and Tribunals of the International Law Association. He is the Associate Editor of the Global Journal of Comparative Law (Brill Nijhoff).

sea transportation and telecommunications

—————————————————

II. Belt and Road Initiative’s Call to Open Free Trade Areas ————————————————— In September 2013, the President of China, Xi Jinping, announced the Silk Road Economic Belt in a speech at Nazarbayev University in Astana (now Nur-Sultan), the capital of the Republic of Kazakhstan (Kazakhstan).3 A month later, he announced the 21st Century Maritime Silk Road in a speech to the People’s Consultative Assembly of the Republic of Indonesia (Indonesia) in Jakarta.4 China’s State Council and the Central Committee of the Communist Party of China5 refer to the Silk Road Economic Belt and 21st Century Maritime Silk Road

network that infrastructurally connects

China should indeed attempt to enter into

collectively as the Belt and Road Initiative

China with the European Union (EU) and

bilateral and plurilateral FTAs with its largest

(Yi Dai Yi Lu一带一路),6 a multi-purpose

much of the rest of the world.1 The Belt and

trading partners along the trade routes

initiative which, for China’s National

Road Initiative also proposes to open free

that the Belt and Road Initiative covers,

Development and Reform Com[mission

trade areas (FTAs) by agreement2 with the

namely, the Cooperation Council for the

(NDRC), “aims to promote the connectivity

customs territories along the routes that it

Arab States of the Gulf (Gulf Cooperation

of Asian, European and African continents

covers. It is this element of the Belt and Road

Council (GCC)), the Eurasian Economic

and their adjacent seas … [into] a community

Initiative that is the subject of this article

Union (EAEU), the Economic Community

of shared interests, destiny and responsibility

The rationale for the Belt and Road

of West African States (ECOWAS), and the

featuring mutual political trust, economic

Initiative is to facilitate access to markets

EU. It further argues that China should

integration and cultural inclusiveness.”7

for China’s ever-larger goods and services

work for those FTAs to be comprehensive

As an initiative, as a project, as a plan, as

exports. On that premise, this article

and contemporary deals that closely replicate

a program, as a process, as a strategy, indeed

argues that, as a solution to the problems

the China-Australia Free Trade Agreement

as a vision,8 this statement of purpose(s),

of the World Trade Organization (WTO)

(ChAFTA), which is China’s most ambitious

however abstract in expression, evidences

to liberalise trade at the multilateral level,

FTA to date.

an undeniable commitment on the part of 3

Currents 24.1 2020


the Chinese government to trans-regional

and telecommunications network counts, for

Ministry of Commerce with State Council

development. In that respect, the Belt and

its construction, with USD 200 billion (and,

Authorisation in March 2015—calls on

Road Initiative finds certainty in elements of

into the future, USD 6 trillion) in financial

countries along the Belt and Road to promote

ancient Chinese thought. Notably, through

support for (high rate) loans21 from the Asia

“unimpeded trade.”35 Inasmuch as the Joint

the virtues of ren-li-yi, Confucianism calls

Infrastructure Investment Bank (AIIB),22

Communiqué of the Leaders’ Roundtable of

for a moderate approach to ensure that

New Development Bank (NDB) and the Silk

the Belt and Road Forum for International

the obligations of government are towards

Road Fund (SRF) (with a separate treasury

Cooperation (Joint Communiqué) of

10

addressing poverty and underdevelopment.

of USD 40 billion) as well as the financial

May 2017 can double as an organisational

Thus, the Silk Road Spirit—“peace and

support of the China Development Bank,

charter, 36 the Belt and Road Initiative

cooperation, openness and inclusiveness,

The Export-Import Bank of China and

represents a “shared commitment to build

mutual learning and mutual benefit”11—

China’s largest state-owned banks.23

[an] open economy, ensure free and inclusive

9

20

further enhances that otherwise free and fluid

The Belt and Road Initiative is, however,

trade, oppose all forms of protectionism

commitment of the Belt and Road Initiative

so much more than a trade route. It is a

[and] endeavor to promote a universal,

to respectful socio-political and economic

“mega strategic initiative,” a “going-global

rules-based, open, non-discriminatory and

development.12# Devoid of any legal form

strategy,”26 a “geo-economic vision”27 from

equitable multilateral trading system with

in the absence of a definitional treaty or

the world’s second largest economy, largest

WTO at its core.”37 Two years later, for the

foundational charter,13 the Belt and Road

goods exporter, and third largest investor28

second Belt and Road Forum of April 2019,

Initiative can only be a public good for it

for seventy of the world’s countries and two-

the Joint Communiqué ever diplomatically

aims to promote infrastructural (physical and

thirds of its population. With a projection

reaffirmed the determination “to pursue

digital) connectivity and economic (trade

to cover more than 30% of world trade

trade and investment liberalization and

and investment) cooperation15 between Asia

by 2050, 30 the Belt and Road Initiative

facilitation” and the aspiration “to further

and Europe as it rebuilds the Silk Road of

will, most probably, redefine the terms of

open our markets, reject protectionism,

old through land corridors and maritime

globalisation, reset the world’s economic

unilateralism and other measures that are

routes.

balance, and reregulate the multilateral

incompatible with WTO rules.”38

14

16

17

Ultimately, the Belt and Road

24

25

29

trading system.31 And it will do so as an

The diplomatic, non-binding

Initiative18 is a trade route between China

instrument of free trade.

approach here is deliberate. It is precisely

and its largest trading partner, the EU,

—————————————————

because of such “maximised flexibility

The Belt and Road Initiative is, however, so much more than a trade route.

the value of economic cooperation between

albeit one that passes through other trading partners in Europe, Asia, and Africa19 with economies of considerable size, including – within the EAEU – Central Asia’s largest economy (Kazakhstan) and the eleventh largest economy in the world (the Russian Federation (Russia)), the largest oil producer in the world (the GCC), the most dynamic economic region in the world (ASEAN), the largest economy in the Pacific (the Commonwealth of Australia (Australia)), and – within ECOWAS – the largest economy in Africa (the Federal Republic of Nigeria (Nigeria)). This land and sea transportation

————————————————— Even though the Belt and Road Initiative cannot qualify as an international organisation or even as an international agreement,32 its soft law33 regime promotes the freedom of trade to an almost constitutional status. The foundational normative blueprint 34 document of the Belt and Road Initiative— the Vision and Actions statement put out by China’s National Development and Reform Commission, Ministry of Foreign Affairs, and 4

Currents 24.1 2020

regarding institutions and norms”39 that governments in “a partnership-based, relational approach”40 promotes free trade. This freedom is not through the surrender of sovereignty 41 in the Bretton Woods rule-based international economic system but through the spontaneous process of economic integration that inevitably comes with infrastructural connectivity 42 and investment for development in a “hub-andspoke … trial-and-error”43 network where China leads but only to share power and responsibility44 with its partner countries in


dialogue and for mutual benefit.

Iran and Iraq as notable exceptions.54

evolve into a kind of extra-regional, counter-

Yet, however participatory, China leads

While China should work with Belt

model60 free trade area between the customs

the initiative with authoritative confidence.

and Road Initiative participant customs

territories that lie across China and Europe,61

Despite the selfless rhetoric, it leads with a

territories in an attempt to advance

the Belt and Road Initiative is certainly not

set of fairly pragmatic objectives all around

multilateral trade negotiations through

as such and cannot be as such, by nature.

the ideal of wider and deeper economic

the WTO, China should and does indeed

By its nature, the Belt and Road

integration for diversification.

The first

accept that the WTO no longer functions

Initiative maximises flexibility in an extralegal

objective is to open up new export markets

as a trade liberalisation forum but as a trade

policy space devoid even of a constituting

beyond the ever protectionist United States

dispute settlement body. Indeed, since the

instrument, it is also, by nature, different

and the still stagnant EU and simultaneously

introduction of the Doha Development

from an FTA. Unlike an FTA, which

secure access to resources in Africa and the

Agenda, international trade law and policy

prescribes a system of non-discrimination

Persian Gulf. The second objective is to

have experienced a kind of paradigm

norms and dispute settlement in exchange

reform the economy; that is, to rely less

shift from non-discriminatory multilateral

for mutually exclusive market access and

on the increasingly vulnerable mercantile

trade liberalisation to discriminatory non-

other trade preferences, the Belt and Road

labour-intensive manufacturing model of

multilateral trade liberalisation.55

Initiative groups together seemingly random

old through the promotion of domestic

—————————————————

but decidedly inclusive connectivity for trade,

45

46

47

consumption in a knowledge economy that develops China’s western provinces and reduces excess production capacities in steel, cement, aluminium and other essentials of construction.48 The third objective is to effectively use the country’s vast foreign currency reserves and, at the same time, internationalise the renminbi (yuan).49 The Belt and Road Initiative, however, presents itself more nobly as a WTOaligned framework for multilateral, non-discriminatory integration through cooperation. In that tone, the Vision and 50

Actions statement pledges that the Chinese government will work “to build a community of shared interests, destiny and responsibility featuring mutual political trust, economic integration and cultural inclusiveness.”

51

China has certainly benefitted from its membership of the WTO’s multilateral trading system, 52 without which its mercantilist–all-exports–economic model would not be sustainable. Indeed, “fifty-two of the sixty-five countries along the Belt and Road route” are WTO Members with only 53

If, however, the Belt and Road Initiative is to promote predictability, consistency, and coherence,65 it will, sooner rather than later, need to give itself a code—a book of rules of conduct. ————————————————— The ultimate objective of the Belt and Road Initiative, therefore, is not so much to overtake the WTO

56

but to bypass it

with the establishment of a global, Belt and Road FTA—the opening, in other words, of a common market for all countries along the route. 57 The basic idea is “to consolidate and upgrade a dense network of bilateral Free Trade Agreements (FTA) into a multilateral arrangement, anchored by China’s gravitational pull and vast open market.”58 China’s State Council in fact acknowledges that “the long-term goal is to forge a global FTA network that further covers countries along the route of the Belt and Road Initiative and other important countries.”59 While the ultimate objective of the Belt and Road Initiative may well be to

cooperation for coprosperity, and public, rather than private projects,62 without much if any regulatory specification.63 Development ahead of rules is the approach.64 If, however, the Belt and Road Initiative is to promote predictability, consistency, and coherence,65 it will, sooner rather than later, need to give itself a code—a book of rules of conduct.66 Those rules will inevitably and invariably have to come from the most effective instrument of international trade law known to date, the FTA, either bilateral or plurilateral in form.67 True enough, the Belt and Road Initiative68 already shows particular concern for the simplification and harmonisation of international trade procedures (such as customs clearance procedures), the removal of regulatory divergences and other non-tariff barriers to trade, the liberalisation of trade in services especially through electronic commerce, and the protection of foreign investment.69 The Vision and Actions statement proposes to address these concerns by “opening free trade areas.”70 The Joint Communiqué of May

5

Currents 24.1 2020


2017 indeed follows up this proposal with a

South Korea, India, Australia and New

areas, including electronic commerce,

welcome to “the development of free trade

Zealand. China is also progressing joint

government procurement, intellectual

areas and signing of free trade agreements by

feasibility studies with Colombia, Canada,

property rights and competition.

interested countries.”71

Fiji, Papua New Guinea, Nepal, Bangladesh,

—————————————————

A single FTA that unites the Belt and Road

Mongolia, and Switzerland. Admittedly,

Initiative participant customs territories is a

several of these agreements and prospective

most unlikely prospect and not only because

agreements do have an obvious geopolitical

of its loose constitutional configuration.

relationship with the Belt and Road Initiative

Despite the (imperfect) model of the

but others do, most notably, the Australia-

Comprehensive and Progressive Agreement

China FTA (ChAFTA).75 Indeed, the model

for Trans-Pacific Partnership (TPP-11), too

for Belt and Road Initiative FTAs should be

many are the political, economic, cultural,

ChAFTA, even if China may be reluctant

and even security considerations for such a

to adopt a template approach to trade

plurilateral agreement to ever form. Among

negotiations.76

these considerations, perhaps the most

Signed on 17 June 2015, ChAFTA

important is the difference in economic

is not only China’s most recent large-type

development. The differences are greater than

trade agreement but also its most ambitious.

the similarities.

ChAFTA is a model because, the South Korea

Instead, China, together with its Special

FTA aside, it is with the most developed

Administrative Regions of Hong Kong72 and

economy that China has dealt with to date

Macau, should negotiate the establishment

– Australia is the 13th largest economy in the

of FTAs with its largest trading partners in

world – and also because of its profile as a

each of the regions that the Belt and Road

‘comprehensive, high-quality and balanced

Initiative covers: the EU in Europe, the

interest’77 deal. It is ambitious as it is strategic

EAEU in Eurasia and Central Asia, the GCC

because ChAFTA 78 is China’s first trade

in Western Asia and ECOWAS in Africa,

agreement to deliberately implement the Belt

apart from ASEAN in Southeast Asia and

and Road Initiative.79

Australia in the Pacific. Already, as of 15

On trade in goods, more than 85

July 2019, China has signed FTAs with 15

per cent of exports now enter duty free or

trading partners, including Australia and

at preferential rates and this percentage

New Zealand in the Pacific, South Korea,

will rise to 98 per cent by the end of the

Singapore and ASEAN in Asia, Switzerland73

implementation period. On trade in services,

and Iceland in Europe, Chile, Peru and Costa

Australia has opened its services sector to

Rica in South America, as well as Pakistan,

China on a negative list mode, being the first

Georgia and The Maldives.74 China is in

country to do so, while China offers Australia

negotiations with Sri Lanka, Mauritius,

its best-ever services commitments in a trade

Israel, Palestine, Norway, Moldova, Panama,

agreement. In the investment area, the two

as well as Japan and South Korea as part of

sides give each other most-favoured-nation

a trilateral deal and, at a regional level, the

treatment. In addition, ChAFTA enhances

GCC and ASEAN’s Regional Comprehensive

bilateral communication and cooperation

Economic Partnership (RCEP) with Japan,

in more than ten contemporary trade topic 6

Currents 24.1 2020

Indeed, the model for Belt and Road Initiative FTAs should be ChAFTA, even if China may be reluctant to adopt a template approach to trade negotiations. ————————————————— ChAFTA, then, is a model FTA with provisions that substantially liberalise and facilitate trade over and beyond the WTO normative framework. It should be the template for all other FTAs under the Belt and Road Initiative. ChAFTA is not, however, the only template. —————————————————

III. Belt and Road Initiative’s Trading Partners ————————————————— The Protocol to Amend the Framework Agreement on Comprehensive Economic Co-operation between the Association of Southeast Asian Nations (ASEAN) and China (Protocol)80 presents another valuable precedent, not altogether dissimilar to ChAFTA. The Protocol comprises a new-generation FTA that regulates most future-focused issues in trade, including cross-border electronic commerce, customs clearance procedures, trade in finance and telecommunications services, and even economic and technical cooperation. It establishes a Future Work Programme, which serves as a basis for further bilateral economic integration. The Protocol also serves as a basis for the advancement of negotiations for the Regional Comprehensive Economic


Partnership (RCEP) 81 between ASEAN

in the Middle East,”86 China considers that

and those countries with which ASEAN

Saudi Arabia still does not allow adequate

Prospective FTA negotiations between

has trade arrangements, China as well as

market access to third-country service

China and the EAEU would have the

Australia, New Zealand, Japan, South Korea,

suppliers and investors.87 The concerns are

support of the framework available through

and, importantly for the Belt and Road

mainly to do with participation in major

their Trade and Economic Cooperation

Initiative, India. Negotiations for RCEP are

government projects and the regulation of

Agreement, now in force. Even then, they

likely to close by the middle of 2020 (the

safety standards, including the transparency

would have to address the specific issues

twenty-sixth round of negotiations was held

88

of the Halal certification approval process.

that the bilateral trade relationship raises.

in July 2019). Seven of 20 chapters of the

Conversely, these concerns are much the

These issues are evident from the trade policy

trade pact are now closed, such as sanitary

same concerns that Saudi Arabia has with

review exercise that China and Russia—as

measures and rules on industrial standards.

China, which translate into a call for the

the largest EAEU Member State economy

However, sensitive chapters, including

further simplification of customs clearance

among WTO Members—regularly undergo

foreign investment, electronic commerce

procedures (rules of origin requirements)

within the WTO.

rules and tariff reductions (in particular,

and the removal of foreign direct investment

For Russia, which has in China its

zero-tariff lists) are still up for negotiation.

restrictions,90 including a relaxation of anti-

largest trading partner,92 the concerns are

dumping measures.91

to do with the transparency, accountability

—————————————————

and competitiveness of China’s trade

ACFTA is already in force, so is ChAFTA. Apart from these trade agreements, China is still to establish FTAs along most of the other customs territories that the Belt and Road Initiative covers, including the GCC and the EUEA as halfway points and ECOWAS and the EU as final destinations of the east-west trade route. A.

Gulf Cooperation Council Negotiations between China and the

GCC for a ‘comprehensive and high-quality agreement’ 82 begun in 2004 but were suspended in 2009. They resumed in 2016— the third round was held in December of 2016—but the parties have made no further progress since then.83 The prospective establishment of an FTA between China and the GCC should aim to remove the various barriers that currently impede bilateral trade. The trade relationship between China and the GCC’s largest Member State, Saudi Arabia, is a relevant case study.84 Even though “the economic cooperation between China and Saudi Arabia has developed by leaps and bounds” and “Saudi Arabia has 85

89

For China, the concerns are with the need to further open up the Russian market under the principle of fair competition and improve its level of trade facilitation. ————————————————— The recent political fracture of the GCC into two opposite sides each respectively led by Saudi Arabia and Qatar has put a halt on FTA negotiations. If and when negotiations resume, they would have to simplify safety standards requirements and overall improve customs clearance procedures, liberalize trade in professional services through mutual recognition as well as protect, promote, and facilitate pre-establishment and postestablishment party-to-party investment. Possibly in reaction to the current state of paralysis of the GCC and in order to further promote free and open trade in the wider region, China is in the midst of FTA negotiations with Palestine and Israel.

become the largest trading partner of China

B.

Eurasian Economic Union

policies and practices,93 especially in the area of innovation technologies, intellectual property, and trade facilitation with the need to simplify procedures and bring greater clarity to China’s Compulsory Certificate and other safety standards.94 For China, the concerns are with the need to further open up the Russian market under the principle of fair competition and improve its level of trade facilitation.95 Accordingly, an FTA between China and the EAEU would have to address the regulation of safety standards as part of a wider effort to improve customs procedures as well as facilitate the further liberalisation of trade in services and ensure the liberalisation, protection, promotion, and facilitation of party-to-party investment. It does not seem an unlikely prospect, especially in the light of the political affinity that these regions recently share.96 In support of the implementation of the Belt and Road Initiative in the Eurasian region, China has signed an FTA with

7

Currents 24.1 2020


Georgia, which entered into force in January

relative poor quality of Chinese goods

European Commission’s Investment Plan for

2018. In terms of trade in goods, Georgia

imports: "substandard, pirated/counterfeited

Europe.108 To facilitate two-way investment,

now imposes zero tariffs on almost 100 per

products."100 The other ECOWAS Member

China and the EU are in negotiations for a

cent of its total imports from China; China

States would likely share this concern

bilateral investment agreement, which is now

will progressively impose zero tariffs on 94

and, accordingly, would call on China to

in its twenty-second round of negotiations

per cent of its total imports from Georgia.

improve its protection and enforcement of

(July 2019). And to facilitate the prospect

In terms of trade in services, both sides will

Intellectual Property Rights (IPRs).

of an FTA, the EU-China Trade Project

further open their markets to each other

other concerns are with China’s unethical

on the basis of their WTO commitments.

technology transfer practices, government

The WTO’s Trade Policy Review exercise

In addition, both sides have reached broad

subsidies through State-Owned-Enterprises

for both the EU and China reveals the

consensus in many areas such as environment

(SOEs) and the full performance of Trade

need for a bilateral FTA precisely because

and trade, competition, intellectual property,

Facilitation Agreement obligations.

the barriers to trade between them are too

101

The

102

Despite the cooperative spirit of the

investment and electronic commerce.

provides trade related technical assistance.

problematic for the WTO alone to solve.

Importantly, this deal is China’s first FTA

Belt and Road Initiative,

an FTA between

China’s concerns with the EU are largely to

since it formally launched the Belt and Road

China and ECOWAS does then seem an

do with “[the] EU’s extensive use of anti-

Initiative.

unlikely prospect. The unlikelihood is even

dumping measures, high level of subsiding

greater in the light of the different stages

for agriculture, strict export control on high-

negotiations with Moldova for an FTA.

of economic development between China

tech products to China and particularly the

C.

and ECOWAS:

TRQ [tariff-rate quota] on poultry products

In parallel, China is presently in Economic Community of West

103

104

building trade capacity

would be paramount. In the meantime

from China.”109

An FTA between China and ECOWAS

and in support of the implementation of the maritime element of the Belt and Road

—————————————————

would have to address the type of barriers that bar the trade relationship between China

initiative for Africa, China signed an FTA

and Nigeria, which are logically extensive

with the Maldives in December 2017. In

to the wider interregional relationship. The

September 2018, China concluded FTA

WTO’s trade policy review would suggest

negotiations with Mauritius and is presently

that bilateral concerns are primarily to do

in negotiations with Sri Lanka.

with trade in goods.

D.

African States

European Union

China considers that the ECOWAS

The EU is the final destination of the

common external tariff structure is

trade route that the Belt and Road Initiative

unpredictable with a large gap between

proposes to open for China, with the

applied tariff rates and bound tariff rates.97

Netherlands and the Republic of Germany

China, moreover, has concerns with the

as the distribution hubs.105 After all, “[the]

complexity and relative backwardness

EU is the biggest trading partner and

of customs procedures, the high cost of

largest import source of China, and China

doing business in the region, the lack of

is the largest import source, second biggest

transparency in many trade policies and

trading partner and export market of the

the persistence of foreign direct investment

EU.”106 Importantly, as the Memorandum

barriers.98

of Understanding on the EU – China

With China as its third largest trading

Connectivity Platform denotes, 107 the

partner,99 Nigeria has concerns with the

Belt and Road Initiative complements the 8

Currents 24.1 2020

The EU is the final destination of the trade route that the Belt and Road Initiative proposes to open for China, with the Netherlands and the Republic of Germany as the distribution hubs. ————————————————— Among China’s concerns, the most important is with EU anti-dumping measures 110 and their analogue country methodology as a non-market economy country.111 China is not only upset at the extent of the EU’s anti-dumping measures and countervailing investigations on many of its goods (especially, iron and steel products),112 but is also upset at the duration of some of these measures, in some cases, almost 20 years.113 Another important concern is with trade in agricultural goods. The EU average


applied most-favored nation (MFN) rate

It translates into a concern with foreign

Belt and Road Initiative covers. The article

for agricultural goods was 14.1 per cent in

operator access to and the independence

has further argued that China should work

2017.

of China’s judicial system

for those FTAs to be comprehensive and

114

Tariff-rate quotas make access for

125

and a concern

China’s agricultural goods to the EU market

with competition enforcement in order to

even more difficult. Other concerns include

“achieve a level playing field among the

restrictions on EU high-tech exports to

private and state-owned entities.”

There are

a transportation and telecommunications

China,

greater investment cooperation

additional concerns, though less important,

network to move through. The Belt and Road

and fairer treatment to Chinese enterprises,

including inadequate protection of foreign

Initiative proposes to build that network

and greater ease of business visa application

investment;

insufficient enforcement of

for China. China, however, will need the

procedures.116

trade secrets and other IPRs;128 different

agreement of its trading partners if it is to

behind-the-border measures, especially in

free the movement through that network into

bilateral and more multilateral in nature. They

relation to the attribution of licenses;

preferential market access for its products.

are largely to do with China’s performance as

the need for cybersecurity measures to be

a WTO Member. The first concern is with

proportionate and technology-neutral.130

115

The EU’s concerns with China are less

126

127

129

and,

policy transparency. The EU considers that

In summary, the EU “count[s] on China

concerns over the distortion that comes with

to concretely demonstrate its commitment to

public intervention in economic activities

transparency and non-discrimination, actively

are due to a lack of transparency. The EU,

participate in current and future WTO

therefore, calls on China to “truly honour

negotiating activities, help find multilateral

its transparency obligations in the WTO”

solutions to current trade problems and fill

and, specifically, to publish and translate all

the gaps in the trade rulebook, in particular

its trade-related laws and measures.

The

in relation to subsidies.”131 Specifically, in

EU, in particular, objects to China’s deficient

relation to China’s Belt and Road Initiative,

notification of subsidies and China’s rather

the EU cautiously considers that “[d]

unclear

system of provision of incentives

one in the right way, more investment

for SOEs. “Openness has to go hand in

in cross-border infrastructure links can

hand with fairness”, the EU claims.119 In

unleash growth potential with benefits for

sum, the EU’s first concern is with China’s

all. But such initiatives must be based on a

mercantilism (Made-in-China 2025 local

level-playing field for trade and investment

content requirements), use of subsidies and

with full adherence to market rules and

overcapacity in steel and other sectors and

international norms.”132

forced technology transfers.120 Competition

—————————————————

117

118

has to be fair.

In conclusion, goods and services do need

IV. Conclusion

121

The second concern is with China’s business environment.

contemporary deals much like ChAFTA.

—————————————————

The EU considers

This article has assessed the significance

that doing business in China is difficult.123

of FTAs to the Belt and Road Initiative.

The concern is, fundamentally, with state

It has argued that, as a solution to the

intervention in what ought to be a market

problems of the WTO to liberalise trade at

economy; in other words, for the EU,

the multilateral level, China should attempt

China’s government should be an economic

to enter into FTAs with its largest trading

regulator not an economic operator.

partners along the trade routes that the

122

124

9

Currents 24.1 2020


End Notes 1.

See generally Gonzalo Villalta Puig, Unimpeded Trade? The Significance of Free Trade Areas to the Belt and Road Initiative of the People’s Republic of China, in Legal Dimensions of China’s Belt and Road Initiative 103, 104 (Lutz-Christian Wolff and Chao Xi eds., Wolters Kluwer Law & Business 2016). 2. Nat’l Dev. & Reform Comm’n, Ministry of Foreign Affairs & Ministry of Commerce of China, with State Council Authorization, Vision and Actions on Jointly Building Silk Road Economic Belt and 21-st Century Maritime Silk Road (2015) [hereinafter Vision & Actions]. 3. Xi Jinping, President of the People’s Republic of China, Promote People-to-People Friendship and Create a Better Future (Sept. 7, 2013). 4. Xi Jinping, President of the People’s Republic of China, Speech at People’s Representative Council of Indonesia (Oct. 2, 2013), reprinted in Wu Jiao, President Xi gives speech to Indonesia’s parliament, ChinaDaily.com.cn (Oct. 2, 2013), http://www.chinadaily.com.cn/ china/2013xiapec/2013-10/02/ content_17007915.htm. 5. Press Release, Fifth Plenary Session of the 18th CPC Cent. Comm., Suggestions of the CPC Central Committee on the Thirteenth Five-year Plan for National Economic and Social Development (Oct. 29, 2015). 6. M. Bart Kasteleijn, Legal and Economic Aspects of Chinese ‘Belt & Road Initiative’ Investments into Europe via the Netherlands, 14 Global Trade & Cust. J. 238, 238 (2019) (explaining that the Belt and Road Initiative was originally named “New Silk Roads” and later renamed “One Belt One Road”). 7. Vision & Actions, supra note 2; see also David M. Ong, The Asian Infrastructure Investment Bank: Bringing ‘Asian Values’ to Global Economic Governance?, 20 J. of Int’l Econ. L. 535, 548 (2017). 8. Kasteleijn, supra note 6, at 239. 9. Kasteleijn, supra note 6, at 238. 10. Tao Li & Zuoli Jiang, Human Rights, Justice, and Courts in IEL: A Critical Examination of Petersmann’s Constitutionalization Theory, 21 J. of Int’l Econ. L. 193, 210 (2018). 11. Vision & Actions, supra note 2; see also Li & Jiang, supra note 10,

at 204. 12. Liao Li, The Legal Challenges and Legal Safeguards for the Belt and Road Initiative, 14 Global Trade & Customs J. 211, 211 (2019). 13. Kasteleijn, supra note 6, at 238; Heng Wang, China’s Approach to the Belt and Road Initiative: Scope, Character and Sustainability, 22 J. Int’l Econ. L. 29, 43 (2019) [hereinafter H. Wang]; Lingliang Zeng, Conceptual Analysis of China’s Belt and Road Initiative: A Road towards a Regional Community of Common Destiny, 15 Chinese J. Int’l L. 517, 539 (2016). See generally Yun Zhao, International Governance and the Rule of Law in China under the Belt and Road Initiative (Cambridge: Cambridge University Press, 2018); Michael M Du, China’s “One Belt, One Road” Initiative: Context, Focus, Institutions, and Implications, 2 Chinese J. Global Governance 30 (2016); Guiguo Wang, Legal Challenges to the Belt and Road Initiative, 4 J. Int’l & Comp. L. 309 (2017); 14. Li & Jiang, supra note 10, at 204. 15. Li, supra note 12, at 211. 16. Julien Chaisse & Mitsuo Matsushita, China’s “Belt and Road” Initiative: Mapping the World’s Normative and Strategic Implications, 52 J. World Trade 163, 163 (2018). 17. Kasteleijn, supra note 6, at 238. 18. Vision & Actions, supra note 2. 19. Jiangyu Wang, China’s Governance Approach to the Belt and Road Initiative (BRI): Relations, Partnership, and Law, 14 Global Trade & Customs J. 222, 222 (2019) [hereinafter J. Wang]. 20. Fan Zhai, China’s Belt and Road Initiative: A Preliminary Quantitative Assessment, 55 J. Asian Econ. 84, 85 (2018); Cem Nalbantoglu, One Belt One Road Initiative: New Route on China’s Change of Course to Growth, 5 Open J. Soc. Sci. 87 (2017). 21. Kasteleijn, supra note 6, at 239 (“The lending rate . . . averaged 6%, which is way above the World Bank’s average lending rate of 1.5% above London Inter bank Offered Rate (LIBOR) lending rate.”). 22. Hong Yu, Motivation Behind China’s ‘One Belt, One Road’ Initiatives and Establishment of the Asian Infrastructure Investment Bank, 26 J. Contemp. China 353, 354 (2017).

23. The AIIB functions independently of the Belt and Road Initiative. However, the AIIB Articles of Agreement states: “The purpose of the Bank shall be to … improve infrastructure connectivity in Asia by investing in infrastructure and other productive sectors.” Asian Infrastructure Inv. Bank, Articles of Agreement (2015); see also Kasteleijn, supra note 6, at 239. 24. Peter Ferdinand, Westward Ho— the China Dream and “One Belt, One Road”: Chinese Foreign Policy under Xi Jinping, 92 Int’l Aff. 941 (2016); see also Yiping Huang, Understanding China’s Belt & Road Initiative: Motivation, Framework and Assessment 40 China Econ. Rev. 314 (2016). 25. J. Wang, supra note 19, at 222. 26. Li, supra note 12, at 214. 27. H. Wang, supra note 13, at 30. 28. Li, supra note 12, at 214. 29. H. Wang, supra note 13, at 30. 30. Kasteleijn, supra note 6, at 239. 31. Kasteleijn, supra note 6, at 239. 32. J. Wang, supra note 19, at 224. 33. J. Wang, supra note 19, at 224. 34. J. Wang, supra note 19, at 224. 35. Vision & Actions, supra note 2; see also Press Release, Joint Communiqué of the Leaders’ Roundtable of the 2nd Belt and Road Forum for International Cooperation, Ministry of Foreign of Affairs of China ¶ 6 (Apr. 27, 2019) [hereinafter Joint Communiqué]; Cary Huang, Game On: How the US and China are Vying for Dominance in the Battle of the Asia-Pacific Trade Facts, S. China Morning Post, Nov. 17, 2015, at A4; see generally Justin Yifu Lin, “One Belt and One Road” and Free Trade Zones – China’s New Opening-up Initiatives 10 Frontiers of Econ. In China 585 (2015). 36. See H. Wang, supra note 13, at 32; J. Wang, supra note 19, at 224. 37. Joint Communiqué of the Leaders’ Roundtable of the 2nd Belt and Road Forum for International Cooperation, Ministry of Foreign of Affairs of China ¶ 7 (May 15, 2017). A different Belt and Road Initiative paper also calls “to uphold the multilateral trading system and avoid and oppose any form of unilateralism and trade protectionism,” Statement of the Co-Chairs of the Forum on the Belt and Road Legal Cooperation, Ministry of Foreign Affairs of China (July 3, 2018); Li, supra note 12, at 219. 10

Currents 24.1 2020

38. Joint Communiqué, supra note 35, ¶ 10. Even the Security Council of the United Nations “[w]elcomes and urges further efforts to strengthen the process of regional economic cooperation, including measures to facilitate regional connectivity, trade and transit, including through regional development initiatives such as the Silk Road Economic Belt and the 21stCentury Maritime Silk Road (the Belt and Road) Initiative.” S.C. Res. 2344, ¶ 34 (Mar. 17, 2017). 39. H. Wang, supra note 13, at 29. 40. J. Wang, supra note 19, at 223. 41. J. Wang, supra note 19, at 228. 42. Joint Communiqué, supra note 35, ¶ 7 (stating that “connectivity contributes to . . . trade”). 43. H. Wang, supra note 13, at 29. 44. J. Wang, supra note 19, at 223, 228. 45. Chaisse & Matsushita, supra note 16, at 169. 46. Chaisse & Matsushita, supra note 16, at 165. 47. Chaisse & Matsushita, supra note 16, at 184. 48. Chaisse & Matsushita, supra note 16, at 169. 49. Chaisse & Matsushita, supra note 16, at 169. 50. Jiaxiang Hu and Jie (Jeanne) Huang, Dispute Resolution Mechanisms and Organizations in the Implementation of ‘One Belt, One Road’ Initiative: Whence and Whither, 52 J. World Trade 815, 817 (2018); H. Wang, supra note 13, at 33. 51. Vision & Actions, supra note 2. 52. H. Wang, supra note 13, at 43. 53. Li, supra note 12, at 216. 54. Li, supra note 12, at 216. 55. See World Trade Report 2011: The WTO and Preferential Trade Agreements: From Co-existence to Coherence, (World Trade Organization (WTO), 2011), https://www. wto.org/english/res_e/booksp_e/ anrep_e/world_trade_report11_e. pdf. 56. Chaisse & Matsushita, supra note 16, at 167. 57. Chaisse & Matsushita, supra note 16, at 167. 58. Ilan Alon, Wenxian Zhang, & Christoph Lattemann, China’s Belt and Road Initiative: Changing the Rules of Globalization 2, (Wenxian Zhang, Ilan Alon & Christoph Lattemann eds., 2018). 59. State Council of the People’s Republic of China, Opinions on Speeding up the Implemen-


tation of Free Trade Zone Strategy (2015). 60. H. Wang, supra note 13, at 55. 61. Chaisse & Matsushita, supra note 16, at 168. 62. Chaisse & Matsushita, supra note 16, at 185. 63. Chaisse & Matsushita, supra note 16, at 168. 64. Chaisse & Matsushita, supra note 16, at 184. 65. H. Wang, supra note 13, at 55. 66. Chaisse & Matsushita, supra note 16, at 185. 67. Li, supra note 12, at 219 (“The strength of . . . bilateral or multilateral trade and investment cooperation agreements is an effective means of avoiding legal obstacles to the BRI.”); see Li, supra note 12, at 217. 68. Vision & Actions, supra note 2. 69. Vision & Actions, supra note 2. 70. Vision & Actions, supra note 2. 71. Joint Communiqué of the Leaders’ Roundtable of the Belt and Road Forum for Int’l Cooperation ¶ 15(g) (May 16, 2017). 72. Trade and Industry Department, The Government of the Hong Kong Special Administrative Region, [https://perma. cc/R2H6-7U2V] (providing that Hong Kong is an alienable part of the Belt and Road Initiative and is right to support it. Its most recent FTAs with Macau, ASEAN and Georgia are in close alignment with the Belt and Road Initiative as are its FTA negotiations with the Maldives and Australia, now happily concluded). 73. Tomas Casas i Klett & Omar Ramon Serrano Oswald, Free Trade Agreements as BRI’s Stepping-Stone to Multilateralism: Is the Sino– Swiss FTA the Gold Standard? in China’s Belt and Road Initiative: Changing the Rules of Globalization 75, 75–93 (Zhang et al. eds., 2018). 74. Liao Li, The Legal Challenges and Legal Safeguards for the Belt and Road Initiative, 14(5) Global Trade & Customs J. 211, 217 (2019); see generally, Ministry of Commerce, China FTA Network, http://fta.mofcom.gov.cn/english/ index.shtml. (last visited Jan. 22, 2020). 75. See Free Trade Agreement between the Gov’t of Austl. and the Gov’t of the People’s Republic of China, (entered into force on Dec. 20, 2015) https://dfat.gov.au/ trade/agreements/in-force/chafta/ official-documents/Documents/ chafta-agreement-text.pdf. 76. John Whalley & Chunding Li, China’s regional and bilateral trade agreements, VOX (Mar. 5, 2014),

77.

78.

79.

80.

81.

82.

83.

https://voxeu.org/article/chinas-regional-and-bilateral-tradeagreements. China-Australia FTA Officially Signed, China FTA Network (June 23, 2015), http://fta.mofcom.gov.cn/enarticle/enaustralia/ naustralianews/201506/22255_1. html. See China-Australia Free Trade Agreement (ChAFTA), ChinaAustl. Free Trade Agreement (Aug. 26, 2015), https://dfat.gov. au/trade/agreements/in-force/ chafta/fact-sheets/Documents/ chafta-summary-of-chaptersand-annexes.pdf; Outcomes at a Glance, China-Austl. Free Trade Agreement (Aug. 2018), https://dfat.gov.au/trade/agreements/in-force/chafta/fact-sheets/ Documents/chafta-outcomes-at-aglance.pdf; see generally, Collin B. Picker, Heng Wang & Weihuan Zhou, The China–Australia Free Trade Agreement: A 21st-Century Model, (Colin B. Picker et al. eds., 2018); see also Arnoud Willems & Nikolaos Theodorakis, The China-Australia Free Trade Agreement: FTAs as the New Way to Liberalise Trade, 21(3) Int’l Trade L. & Reg. 70, 70–73 (2015). Ministers of Commerce of China and Australia Officially Sign the Free Trade Agreement, China FTA Network (June 25, 2015), http://fta.mofcom.gov. cn/enarticle/enaustralia/enaustralianews/201506/22317_1.html. Protocol to Amend the Framework Agreement on Comprehensive Economic Co-operation and Certain Agreements thereunder between the Association of Southeast Asian Nations (ASEAN) and the People’s Republic of China, opened for signature on Nov. 21, 2015. Centre for International Law, 2012 Guiding Principles and Objectives for Negotiating the Regional Comprehensive Economic Partnership (adopted Nov. 20, 2012), https://cil.nus.edu.sg/wp-content/ uploads/2019/07/2012-GuidingPrinciples-and-Objectives-forNegotiating-the-RCEP-1.pdf. World Trade Organization Minutes, Trade Policy Review Body, Kingdom of Saudi Arabia Minutes of the Meeting, 16 (May 31, 2016), https://docs.wto.org/dol2fe/Pages/ SS/directdoc.aspx?filename=q:/ WT/TPR/M333.pdf [https:// perma.cc/F8Q8-NPK2]. China, GCC vow to reach comprehensive FTA within 2016, China FTA Network ( Jan. 28, 2016), http://fta.mof-

84.

85. 86.

87. 88.

89. 90.

91.

com.gov.cn/enarticle/engcc/ engccnews/201601/30498_1. html. See generally CHEN Mo, Exploring Economic Relations between China and the GCC States, 5(4) J. of Middle E. & Islamic Stud. (in Asia) 88 (2011) http:// mideast.shisu.edu.cn/_upload/ article/03/7f/c9570407495db f10c417dba3a23e/755852545154-437e-aa7d-f782b884cdd4. pdf; Matteo Legrenzi & Fred H. Lawson, China’s Gulf Policy: Existing Theories, New Perspectives, 22(2) Middle E. Pol’y 58 (2015); Sike WU, Constructing “One Belt and One Road” and Enhancing the China-GCC Cooperation, 9(2) J. of Middle E. & Islamic Stud. (In Asia) 1 (2015). World Trade Organization Minutes, supra note 82, ¶ 4.65. World Trade Organization Record, Trade Policy Review Body, The Kingdom of Saudi Arabia Record of the Meeting, ¶ 87 (Mar. 6, 2012), https://docs.wto.org/dol2fe/Pages/ FE_Search/FE_S_S009-DP.aspx?l anguage=E&CatalogueIdList=50 591,78559&CurrentCatalogueId Index=0&FullTextHash=371857 150&HasEnglishRecord=True& HasFrenchRecord=True&HasSpa nishRecord=True [https://perma. cc/9QRC-XRXU]. See id. ¶ 89. See World Trade Organization Minutes, Trade Policy Review Body, Kingdom of Saudi Arabia Record of the Meeting Addendum, 58 (Mar. 6, 2012) https://docs. wto.org/dol2fe/Pages/FE_Search/ FE_S_S009-DP.aspx?language= E&CatalogueIdList=50591,78 559&CurrentCatalogueIdIndex =1&FullTextHash=371857150 &HasEnglishRecord=True&H asFrenchRecord=True&HasSpa nishRecord=True; World Trade Organization Minutes, supra note 82, ¶ 4.67. See World Trade Organization Minutes, supra note 82, ¶ 4.67. World Trade Organization Minutes, Trade Policy Review Body, China Minutes of the Meeting, ¶ 4.479 (Nov. 21, 2018), https:// docs.wto.org/dol2fe/Pages/FE_ Search/FE_S_S009-DP.aspx?lang uage=E&CatalogueIdList=25124 8,249780,248437,248051,24677 8,246762,246761,246711,24671 5,246693&CurrentCatalogueIdIn dex=1&FullTextHash=&HasEngli shRecord=True&HasFrenchRecor d=True&HasSpanishRecord=True [https://perma.cc/7MS6-CVLE]. World Trade Organization Minutes, Trade Policy Review Body, China Minutes of the Meeting,

¶ 4.29–4.97 (Aug. 26, 2014), https://docs.wto.org/dol2fe/Pages/ FE_Search/FE_S_S009-DP.aspx ?language=E&CatalogueIdList=1 27544,126930,126734,126072, 125646,125642,125643,125644 ,125645,125623&CurrentCatal ogueIdIndex=2&FullTextHash= &HasEnglishRecord=True&Has FrenchRecord=True&HasSpanis hRecord=True [https://perma.cc/ V4XJ-QZJB]. 92. World Trade Organization Minutes, Trade Policy Review Body, Russian Federation Minutes of the Meeting, ¶ 4.70 (Nov. 25, 2016), https://docs.wto.org/dol2fe/Pages/ FE_Search/FE_S_S009-DP.aspx ?language=E&CatalogueIdList=2 34228,234222,233936,233937, 233659,233429,233208,233209 ,232952,232702&CurrentCatal ogueIdIndex=8&FullTextHash= &HasEnglishRecord=True&Has FrenchRecord=False&HasSpanis hRecord=False [https://perma.cc/ WVS7-4SDQ]. 93. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.298. 94. See World Trade Organization Minutes, supra note 91, ¶ 5.49. 95. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 92, ¶ 4.69. 96. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 92, ¶ 4.70. 97. World Trade Organization Record, Trade Policy Review Body, Nigeria Record of the Meeting, ¶ 92 (July 27, 2011), https://docs. wto.org/dol2fe/Pages/FE_Search/ FE_S_S009-SSD.aspx?language =EF&CatalogueIdList=37129,7 6018&CurrentCatalogueIdInde x=1&FullTextHash=37185715 0&HasEnglishRecord=True&H asFrenchRecord=True&HasSpa nishRecord=True [https://perma. cc/BAJ3-WBJK]. 98. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, Trade Policy Review Body, Nigeria Minutes of the Meeting, ¶ 4.44, (Oct. 13, 2017), https://www.tralac.org/images/ docs/12276/nigeria-wto-tradepolicy-review-minutes-of-themeeting-13-october-2017.pdf [https://perma.cc/2GJ6-BTP5]. 99. Id. ¶ 4.42. 100. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, Trade Policy Review Body, China Minutes of the Meeting, ¶ 4.288 (Aug. 26, 2014), https://www.google.com/ url?sa=t&rct=j&q=&esrc=s&so urce=web&cd=1&ved=2ahUK Ewi8tpOa6YPlAhUOQ60KHc VKCuEQFjAAegQIABAC&ur l=https%3A%2F%2Fdocs.wto. org%2Fdol2fe%2FPages%2FFE_ Search%2FExportFile.aspx%3Fi d%3D126734%26filename%3D

11

Currents 24.1 2020


q%2FWT%2FTPR%2FM300. pdf&usg=AOvVaw3fykbfofxwPg PMSeFzEDfI [https://perma.cc/ JS9S-DWEZ]. 101. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.49. 102. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ ¶ 4.50, 4.55. 103. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.55. 104. See Abiodun S Bankole and Adeolu O Adewuyi, Have BITs driven FDI between ECOWAS countries and EU? 12 J. Int’l Trade L. and Pol’y 130 (2013)(showing that a bilateral investment treaty may be a more likely prospect) 105. D a v i d M O n g , T h e A s i a n Infrastructure Investment Bank: Bringing ‘Asian Values’ to Global Economic Governance?, 20(3) J. Int’l Econ. L. 535, 548 (2017). 106. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, Trade Policy Review Body, European Union Minutes of the Meeting, ¶ 4.119 (Oct. 12, 2015), https://docs.wto.org/ dol2fe/Pages/FE_Search/FE_S_ S009-DP.aspx?language=E&Cata logueIdList=135061&CurrentCa talogueIdIndex=0&FullTextHash =371857150&HasEnglishRecord =True&HasFrenchRecord=True& HasSpanishRecord=True [https:// perma.cc/4TD2-3TMD]. 107. European Commission Press Release IP/15/5723, Investment Plan for Europe goes global: China announces its contribution to #investEU (Sept. 28, 2015); see also Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Trade for All: Towards a more responsible trade and investment policy, at 23, COM (2015) 497 final (Oct. 14, 2015). 108. C o m m u n i c a t i o n f r o m t h e Commission to the European Parliament, the Council, the European Central Bank, the European Economic and Social Committee, the Committee of the Regions and the European Investment Bank, An Investment Plan for Europe, at 4–5, COM (2014) 903 final (Nov. 26, 2014); See generally Communication from the Commission to the European Parliament and the Council, Working together for jobs and growth: The role of National Promotional Banks (NPBs) in supporting the Investment Plan for Europe, COM (2015) 361 final (July 22, 2015); European Parliament, ‘Political Guidelines of Jean-Claude Juncker, President

of the European Commission’ (July 15, 2014); Regulation (EU) No. 2015/1017 of the European Parliament and of the Council of 25 June 2015 on the European Fund for Strategic Investments, the European Investment Advisory Hub and the European Investment Project Portal and amending Regulations (EU) No 1291/2013 and (EU) No 1316/2013—the European Fund for Strategic Investments O.J. L 169/1. 109. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 106, ¶ 4.121. 110. WTO Secretariat, Trade Policy Review, The European Union, WTO. Doc. WT/TPR/S/317/ Rev.1, ¶ 3.72 (Oct. 21, 2015). 111. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, Trade Policy Review Body, European Union Minutes of the Meeting, ¶ 4.49-.50 (Oct. 13, 2017), https://www.google. com/url?sa=t&rct=j&q=&esrc= s&source=web&cd=1&ved=2ah UKEwjnpJW81ojlAhVQmK0K HYbjAbIQFjAAegQIABAB&u rl=https%3A%2F%2Fdocs.wto. org%2Fdol2fe%2FPages%2FFE_ Search%2FExportFile.aspx%3Fid %3D239408%26filename%3Dq %2FWT%2FTPR%2FM357.pd f&usg=AOvVaw1SHTdUEDoS VFBQEBwV0fNr [https://perma. cc/98EZ-RN9P]. 112. Id. ¶ 4.51. 113. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, Trade Policy Review Body, European Union Minutes of the Meeting, at 161 (Oct. 14, 2015), https://www.google.com/url?sa=t &rct=j&q=&esrc=s&source=web &cd=2&cad=rja&uact=8&ved= 2ahUKEwjv9d3V2IjlAhUIXKw KHSvgBLYQFjABegQIABAB& url=https%3A%2F%2Fdocs.wto. org%2Fdol2fe%2FPages%2FFE_ Search%2FFE_S_S009-DP.aspx% 3Flanguage%3DS%26CatalogueI dList%3D243210%2C239969% 2C239408%2C238327%2C2366 07%2C135148%2C135061%2C 133883%2C132369%2C121068 %26CurrentCatalog%5%26FullT extHash%3D%26HasEnglishRec ord%3DTrue%26HasFrenchReco rd%3DTrue%26HasSpanishReco rd%3DTrue&usg=AOvVaw1iiUU HyUpniRSEcMICbO1g [https:// perma.cc/KXM9-58B2]. 114. WTO Secretariat, Trade Policy Review, The European Union, WTO. Doc. WT/TPR/S/357, ¶ 6 (May 17, 2017). 115. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 111, ¶ 4.52. 116. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 111, ¶ 4.53. 117. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.182.

118. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.101. 119. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.181. 120. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ ¶ 4.18485. 121. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.179. 122. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.102. 123. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.80. 124. See Cecilia Malmström, European Commissioner for Trade, ChinaEU Trade: Mutual Support for Growth & Jobs, Presentation of the EUCCC Position Paper 1, 5 (Jan. 27, 2015), http://trade. ec.europa.eu/doclib/docs/2015/ january/tradoc_153066.pdf. 125. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.102. 126. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.102. 127. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.103. 128. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 91, ¶ 4.104; Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.183. 129. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.183. 130. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.186. 131. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.188. 132. Wo r l d Tr a d e Or g a n i z a t i o n Minutes, supra note 90, ¶ 4.187.

12

Currents 24.1 2020


The following articles are from the Symposium on Compliance in International Corporate Legal Practices held at South Texas College of Law Houston on April 5, 2019. In several instances, these articles are preceded by background pieces written by our editorial team to assist the readership in understanding the context of each article.

Currents 24.1 2020


Cross Border Trade Compliance: Background M A D I S O N

—————————————————

I. United States Tr a d e Statutes —————————————————

H A S T I N G S

https://crsreports.congress.gov/product/pdf/

product/pdf/IN/IN10943 and Section

IF/IF10156.

232 Auto Investigation, https://crsreports.

A. Section 232 of the Trade Expansion

congress.gov/product/pdf/IF/IF10971. B. Section 301 of the Trade Act of 1974

Act of 1962

Congress contributes to the formation of

This statute allows the President to

This statute allows the USTR to suspend

U.S. trade policy pursuant to its constitutional

adjust imports through tariffs or quantitative

trade agreement concessions or impose

authority over tariffs and foreign commerce.

restrictions (quotas) if the Department of

import restrictions if it determines a U.S.

Through the Trade Act of 1974 and the Trade

Commerce finds products are imported

trading partner is “violating trade agreement

Expansion Act of 1962, Congress delegated

in such quantities or circumstances as to

commitments or engaging in discriminatory

some aspects of its constitutional authority to

“threaten to impair U.S. national security.”

or unreasonable practices that burden

regulate foreign commerce to the President.

The Section 232 investigation on aluminum

or restrict U.S. commerce.” Section 301

Pursuant to these acts, the President, based

and steel products provided for 10% tariffs

investigations were launched against China.

on agency investigations, may impose import

on a specified list of aluminum imports,

On July 6, 2018, the United States imposed

restrictions to address specific concerns. See

effective indefinitely. The tariffs imposed

a Stage 1, 25% tariff on 818 Chinese

U.S. Trade Policy: Background and Current

on aluminum imports affect all countries

imports. On August 23, 2018, the United

Issues, https://crsreports.congress.gov/

except Australia, Canada, and Mexico. For

States imposed a Stage 2, 25% tariff on an

product/pdf/IF/IF10156 and Escalating U.S.

Argentina, quantitative import restrictions

additional 279 imports. On September 24,

Tariffs: Timeline, https://crsreports.congress.

were imposed in place of tariffs. Tariffs on

2018, in response to Chinese retaliatory

gov/product/pdf/IN/IN10943.

aluminum imports became effective March

tariffs, the United States imposed a Stage

The Trump administration differs from

23, 2018. This section provides for 25%

3, 10% tariff that was increased to 25% on

prior administrations on trade policy. One

tariffs on a specified list of steel imports.

5,733 more imports. On August 14, 2019,

way it proceeds differently is by placing

The tariffs imposed on steel imports affect

the USTR released a two-part plan to impose

emphasis on the trade deficit as an indicator

all countries except Australia, Canada, and

10% tariffs on approximately $300 billion of

of “unfair” foreign trade practices that

Mexico. For Argentina, Brazil, and South

imports. The first part of this plan, stage 4A,

impact U.S. industries. To address this

Korea, quantitative import restrictions are

will take effect on September 1, 2019. The

issue, the Trump administration proposed

imposed in place of tariffs. Tariffs on steel

second part of the plan, stage 4B, will take

and imposed tariffs and restrictions based

imports became effective March 23, 2018.

effect on December 15, 2019. See Economic

on investigations under U.S. trade laws,

The Trump administration also initiated

and Trade Agreement Between the United

including one—Section 232—that has been

a Section 232 examination on autos and

States of America and the People’s Republic

used infrequently by prior administrations.

auto parts but missed its 2019 deadline for

of China, https://ustr.gov/sites/default/

The trade laws used for most of the Trump

imposing such tariffs. Currently, no tariffs

files/files/agreements/phase%20one%20

administration trade actions are Sections

are in effect on autos and parts, pending

agreement/US_China_Agreement_Fact_

301, Section 201, and Section 232 of the

negotiations.

Sheet.pdf.

Trade Expansion Act of 1962. See U.S. Trade

Timeline, https://crsreports.congress.gov/

See Escalating U.S. Tariffs:

Policy: Background and Current Issues, 14

Currents 24.1 2020


—————————————————

more assertive behavior under President

to the national security, foreign policy or

II. United States R e l at i o n s w i t h C h i n a

Xi Jinping. On August 5, 2019, the U.S.

economy of the United States. There are at

Treasury Department labeled China a

least eleven countries covered by ongoing

currency manipulator for the first time in a

OFAC Sanctions programs as of February

quarter century. To pressure China to change

2020. See https://www.treasury.gov/resource-

its economic practices, the United States

center/sanctions/Programs/Pages/Programs.

also imposed tariffs on U.S. imports from

aspx. However, the list of countries and other

China under Section 301. Almost all imports

targets can and does change rapidly. This is

from China were scheduled to be subject to

because OFAC also has targeted sanctions

additional tariffs by the end of 2019. See

aimed at individuals and companies owned

U.S.-China Relations, https://crsreports.

or controlled by, or acting for or on behalf

congress.gov/product/pdf/R/R45898.

of, targeted countries, as well as individuals,

————————————————— The background to the Section 301 actions against China started with the March 2018 Section 301 report by USTR on China’s Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property and Innovation. In 2017, the National Security Strategy described China and Russia as seeking to “challenge American power, influence, and interests, attempting to erode American security and prosperity.” This evaluation started the Trump administration Section 301 investigation and the now prolonged trade war. See https://ustr.gov/ sites/default/files/Section%20301%20 FINAL.PDF. This trade battle with China has large implications for both countries. In 2018, in terms of goods, China was the United States’ largest trading partner, third-largest export market and largest source of imports. China

U.S. tariff increases and China’s

groups, and entities engaged in the national

retaliatory tariffs have reordered global

security threats See https://www.treasury.

supply chains. These tariffs have heavily

gov/about/organizational-structure/offices/

impacted farmers and manufacturers. The

pages/office-of-foreign-assets-control.aspx.

trade war remains unresolved as of February

Collectively, these individuals and companies

2020, although there has been a Phase One

are called Specially Designated Nationals

Settlement with China as of January 15,

(SDNs). The assets of such companies and

2020. See https://ustr.gov/sites/default/

individuals are blocked and U.S. persons

files/files/agreements/phase%20one%20

are generally prohibited from dealing with

agreement/Phase_One_Agreement-Ag_

them. See https://www.treasury.gov/resource-

Summary_Long_Fact_Sheet.pdf. As a result

center/sanctions/SDN-List/Pages/default.

of the trade war, Mexico and Canada by the

aspx.

end of 2019 had passed China to become the

All U.S. persons must comply with

largest trade partners of the United States.

OFAC regulations. OFAC further encourages

See https://www.census.gov/foreign-trade/

all exporters to maintain a rigorous risk-based

crsreports.congress.gov/product/pdf/IF/

statistics/highlights/top/top1912yr.html.

compliance program. See https://www.

IF11284. U.S. exports of goods and services

—————————————————

treasury.gov/resource-center/sanctions/

to China totaled $178.0 billion (7.1% of

III. United States Sanctions

total exports) in 2018, while imports from

—————————————————

China amounted to $558.8 billion (17.9% of

The Office of Foreign Assets Control

total imports). As a result, the overall bilateral

(OFAC) of the U.S. Department of the

deficit was $380.8 billion, up $43.6 billion

Treasury administers and enforces economic

(12.9%) from 2017.

and trade sanctions based on U.S. foreign

is also the largest foreign holder of U.S. Treasury securities. See U.S.-China Trade and Economic Relations: Overview, https://

The recent trade relationship between

policy and national security goals against

the U.S. and China reveals an increase in

targeted foreign countries, regimes, end

competition and decrease in cooperation.

users, terrorists, international narcotics

The rising friction is attributed not only to

traffickers, those engaged in the proliferation

the more confrontational inclinations of the

of weapons of mass destruction, human

Trump administration, but also to China’s

rights abuses, corruption, and other threats

Documents/framework_ofac_cc.pdf. A. Selected Country Sanctions: the Venezuela Sanctions On December 18, 2014, President Obama signed the Venezuela Defense of Human Rights and Civil Society Act of 2014 into law. This Act required the Executive to impose targeted sanctions on certain persons determined to be responsible for significant acts of violence or serious human rights abuses against antigovernment protesters in Venezuela. On March 8, 2015, President

15

Currents 24.1 2020


Obama issued Executive Order 13692,

regardless of whether the entity itself is listed.

in maritime area claimed by the Russian

invoking the authority of the International

Sectoral sanctions are imposed on specified

Federation and extending from its territory,

Emergency Economic Powers Act and the

persons operating in the Russian economy

and that involve any person subject to

National Emergencies Act (IEEPA) and the

identified by the Secretary of the Treasury

Directive 4, its property, or its interests in

National Emergencies Act. OFAC issued the

through Directives. Directive 1, as amended,

property.

Venezuela Sanctions Regulations, 31 CFR

prohibits the following transactions by U.S.

OFAC may authorize categories

part 591, to implement the Act and Executive

persons and within the United States: (1) all

of activities and transactions otherwise

Order 13692 pursuant to authorities

transactions in, provisions of financing for,

prohibited by issuing a general license.

delegated to the Secretary of the Treasury.

and other dealings in new debt of longer than

On a case-by-case basis, OFAC considers

See https://www.treasury.gov/resource-

30 days maturity or new equity of persons

applications for specific licenses to authorize

center/sanctions/Programs/Documents/

determined to be subject to Directive 1,

transactions that are neither exempt nor

fr80_39676.pdf. Executive Order 13692

their property, or their interests in property;

covered by a general license. A request for a

prohibits dealings in “[a]ll property and

and (2) all activities related to debt or equity

specific license must be submitted to OFAC’s

interests in property that are in the United

issued before September 12, 2014, that

Licensing Division. See https://www.treasury.

States, that hereafter come within the United

would have been prohibited by the prior

gov/resource-center/sanctions/Programs/

States, or that are or hereafter come within

version of Directive 1 (which extended to

Documents/ukraine.pdf; see https://www.

the possession or control of any United

activities involving debt of longer than 90

treasury.gov/resource-center/sanctions/

States person” with any delineated persons.

days maturity or equity if that debt or equity

Programs/Pages/ukraine.aspx.

See https://www.treasury.gov/resource-

was issued on or after the date a person was

center/sanctions/Programs/Documents/

determined to be subject to Directive 1).

—————————————————

fr80_39676.pdf. Any violation that involves

Directive 2, as amended, prohibits

any property or interest in blocked property

transactions by U.S. persons and within the

is “null and void and shall not be the basis

United States involving the financing, or

for the assertion or recognition of any interest

otherwise dealing in new debt of longer than

in or right, remedy, power or privilege with

90 days maturity of the persons subject to

respect to such property or property interest.”

Directive 2, their property, or their interests

See https://www.treasury.gov/resource-

in property. Directive 3 prohibits transactions

center/sanctions/Programs/Documents/

by U.S. persons and within the United

fr80_39676.pdf.

States involving financing, or otherwise

B. Russia Sanctions.

dealing in new debt of longer than 30 days

Unless otherwise authorized or exempt,

maturity of the persons subject to Directive

transactions in the United States or by

3, their property, or their interests in

U.S. persons are prohibited if they deal in

property. Directive 4 prohibits the following

property or interests in property of an entity

transactions by U.S. persons and within

or individual listed on OFAC’s SDN List.

the United States: providing, exporting, or

An entity will also be blocked if it is fifty

re-exporting, directly or indirectly, goods,

percent (50%) or more owned, whether

services (except for financial services), or

individually or in the aggregate, directly or

technology in support of exploration or

indirectly, by one or more persons whose

production for deep-water, Arctic offshore,

property and interests in property are blocked

or shale projects that have the potential to

pursuant to any part of 31 C.F.R. Chapter V,

produce oil in the Russian Federation, or 16

Currents 24.1 2020

I V. E x p o r t C o n t r o l s ————————————————— A. Export Administration Regulations The Department of Commerce – Bureau of Industry and Security as well as the State Department oversee the Export Administration Regulations (EARs) program. The scope of the EARs is dual use products and export of goods that could compromise national security. To comply with the EARs, an exporter must check denied parties lists, determine ECCN if needed, and apply for a license, if required. See https://www.export. gov/article?id=Export-Control-Regulations; http://www.bis.doc.gov. B. International Traffic in Arms Regulation The Directorate of Defense Trade Controls of the State Department oversees the International Traffic in Arms Regulations (ITARs) program. ITARs control the sales of items used for military purposes. To comply with the ITARs, an exporter must check


whether its products for export are on the

Second, FIRRMA provides for an

is implemented pursuant to the Export

U.S. Munitions List, determine if a license

abbreviated filing process for the voluntary

Administration Act of 1979 (EAA), enforced

is required, and contact its local Export

disclosures through a new “declarations”

by the Bureau of Industry and Security

Assistance Center. See https://www.export.

procedure. This procedure could result in

of the U.S. Department of Commerce.

gov/article?id=Export-Control-Regulations;

shorter review timelines by CFIUS and allow

U.S. persons may not take certain actions

see www.pmddtc.state.gov; www.buyuse.gov.

some discretion to require parties to file

“with the intent to comply with, further,

—————————————————

before closing a transaction. Third, FIRRMA

or support an unsolicited foreign boycott.”

expands the CFIUS review period from thirty

Prohibitions include: refusing to do business

to forty-five days and allows an investigation

with a boycotted or blacklisted entity;

to be extended for an additional fifteen-day

discriminating against, or agreeing to

period under extraordinary circumstances.

discriminate against, any U.S. person on the

Fourth, FIRRMA strengthens requirements

basis of race, religion, sex, or national origin;

on the use of mitigation agreements,

and furnishing information about business

including the addition of compliance plans

relationships with a boycotted country or

to inform the use of such agreements. Fifth,

blacklisted entity. Any “U.S. person”, as

FIRRMA grants special hiring authority for

defined under the regulations, must notify

CFIUS and establishes a fund for collection

the U.S. Department of Commerce upon

of new CFIUS filing fees.

receipt of a request to comply with an

V. InvestmentRel ated Controls ————————————————— Oversight of investment into the U.S. takes place through the Committee on Foreign Investment in the United States (CFIUS). The Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA) expanded jurisdiction of CFIUS to address certain growing national security concerns. FIRRMA also modernized CFIUS review processes to enable more timely and effective review of covered transactions in seven ways. First, FIRRMA broadens the purview of CFIUS by adding to the review of mergers and acquisitions of U.S. firms four new types of covered transactions. These include: (1) a purchase, lease, or concession by or to a foreign person of real estate located in proximity to sensitive government facilities; (2) “other investments” in certain U.S. businesses that afford a foreign person access to material nonpublic technical information in the possession of the U.S. business,

Sixth, FIRRMA delays “the applicability

unsanctioned foreign boycotted country or

of some of the bill’s most significant

blacklisted entity. See https://www.export.

provisions until [eighteen] months following

gov/article?id=Antiboycott-Regulations.

enactment of FIRRMA or [thirty] days after

—————————————————

the Secretary of the Treasury publishes in the Federal Register a determination that the necessary regulations, organizational structure, personnel, and other resources are in place to administer those provisions, whichever is sooner.” Finally, FIRRMA authorizes CFIUS to conduct pilot programs to implement any authority provided under the bill. See https://www.treasury.gov/ resource-center/international/Documents/

VII. Import Relief L aw s : A n t i - Du m pi n g & Countervailing Duty Laws ————————————————— Title VII of the Tariff Act of 1930 contains the U.S. version of Antidumping and Countervailing Duty laws. Antidumping (AD) and Countervailing Duties (CVD) address what is regarded as unfair trade practices. The laws provide relief to U.S.

membership on the board of directors, or

Summary-of-FIRRMA.pdf.

other decision-making rights, other than

—————————————————

injured” or threatened with injury due to the

through voting of shares; (3) any change

dumping of imports of like products sold in

in a foreign investor’s rights resulting in

VI. Anti-Boycott R e g u l a t i o n s

foreign control of a U.S. business or an

—————————————————

the cost of production or home market

“other investment” in certain U.S. businesses;

The United States opposes restrictive

prices) or subsidized by a foreign government

and (4) any other transaction, transfer,

trade practices and boycotts by foreign

and thus lower in price due to such subsidies.

agreement, or arrangement designed to

countries against what it considers to be

The AD and CVD laws are administered by

circumvent CFIUS jurisdiction.

friendly countries. This anti-boycott position

two agencies. The U.S. International Trade

industries and workers that are “materially

the U.S. market at less than fair value (below

17

Currents 24.1 2020


Commission, an independent, quasi-judicial

determines whether dumping or subsidies

the United States is authorized to designate

agency, determines whether U.S. industry

would likely continue or resume if the order

a country listed in section 107 of AGOA as

suffered material injury due to dumping or

is revoked. Review is also conducted to

a “beneficiary sub-Saharan African country

subsidies.

determine whether injury to the domestic

“if the President determines the country

The International Trade Administration

industry would likely continue or resume.

meets certain eligibility requirements.” See

of the Department of Commerce evaluates

See Trade Remedies: Antidumping and

https://obamawhitehouse.archives.gov/

the AD or CVD petition, decides whether to

Countervailing Duties, https://crsreports.

the-press-office/2011/10/25/presidential-

initiate an investigation, determines whether

congress.gov/product/pdf/IF/IF10018.

proclamation-african-growth-and-

dumping or subsidies exists, and calculates the

—————————————————

opportunity-act. The beneficiary sub-

amount of dumping or subsidy and the duty to be imposed in response. If an investigation results in affirmative determinations, an order is issued directing U.S. Customs and Border Protection to collect the duties imposed on imported merchandise that has been dumped and /or subsidized. In AD cases, the remedy for injury is an additional duty placed on imported merchandise to offset the difference between prices in foreign and U.S. markets. In CVD cases, a duty equivalent to the amount of subsidy is placed on imports. Supporters of these laws argue their necessity in shielding U.S. industry and workers from unfair competition. Supporters also argue that the laws increase public support for additional trade liberalization measures. Opponents suggest these laws create inefficiencies in the world trading system by “artificially” raising prices on imported merchandise. AD and CVD duty order—which are granted for five years—are subject to review. This review, including judicial review, can result in upward or downward adjustment of the dumping or subsidy margin. Review can also result in continuation or revocation of an order. During the anniversary month of the publication of an order each year, an interested party may request a review. At the end of the five years, AD and CVD orders must undergo a “sunset” review. This review

VIII. Preferential Trade Laws ————————————————— A. Generalized System of Preferences U.S. trade preference programs, including the Generalized System of Preferences (GSP), provide an opportunity for the world’s poorest countries to escape poverty by gaining duty free access to the U.S. market. Established by the Trade Act of 1974, the GSP promotes economic development by eliminating duties on thousands of products imported from one of 120 designated beneficiary countries and territories. See https://ustr.gov/issue-areas/ trade-development/preference-programs/ generalized-system-preference-gsp. Eligibility

Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cabo Verde, Central African Republic, Chad, Comoros, Congo, Democratic Republic of Congo, Côte d’Ivoire, Djibouti, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mozambique, Namibia, Niger, Nigeria, Rwanda, São Tomé and Príncipe, Senegal, Seychelles, Sierra Leone, Somalia, South Africa, South Sudan, Sudan, Swaziland, Tanzania, Togo, Uganda, Zambia, and Zimbabwe. See https://www. trade.gov/agoa/pdf/2018%20US-SSA%20

for GSP access –at the country level and

Trade%20Summary.pdf.

the product level—is subject to review

—————————————————

annually by the Office of the United States Trade Representative. See https://ustr.

IX. United States Free Tr a d e A g r e e m e n t s

gov/sites/default/files/GSP-Guidebook-

—————————————————

September-16-2016.pdf#page=16.

The United States has fourteen free

B. The African Growth and Opportunity

trade agreements in force with twenty

Act

countries as of February 2020. See U.S. Trade

On May 18, 2000, the African Growth

Policy: Background and Current Issues,

and Opportunity Act (AGOA) was signed into

https://crsreports.congress.gov/product/

law in Title 1 of the Trade and Development

pdf/IF/IF10156. There are bilateral free

Act of 2000. https://www.trade.gov/agoa/

trade agreements with Australia, Bahrain,

index.asp. AGOA offers tangible incentive

Chile, Columbia, Israel, Jordan, South

for African countries to open their economies

Korea, Morocco, Oman, Panama, Peru,

and build free markets. See https://www.

and Singapore. See https://ustr.gov/trade-

trade.gov/agoa/index.asp. The President of

agreements/free-trade-agreements. There

18

Currents 24.1 2020

Saharan African countries presently include:


are two regional free trade agreements with countries in the central American

agreement/agreement-between.

establishes committees on goods, agriculture, sanitary and phytosanitary matters, and

A. NAFTA.

region (CAFTA-DR) (including Costa

The 1994 North American Free Trade

financial services. It also establishes

Rica, Dominican Republic, El Salvador,

Agreement initiated a new generation of

subcommittees on labor and environment.

Guatemala, Honduras, Nicaragua, and in

U.S. free trade agreements and provided the

See https://ustr.gov/trade-agreements/free-

North America (USMCA) with Canada

model for later U.S. FTAs and played a role

trade-agreements/australian-fta. Australia

and Mexico). See https://ustr.gov/trade-

in shaping multilateral trade negotiations.

was part of the TPP negotiations.

agreements/free-trade-agreements/united-

Under NAFTA, tariffs were completely

states-mexico-canada-agreement/agreement-

eliminated progressively. All duties and

This Agreement generates export

between.

quantitative restrictions, with the exception

opportunities for the United States and

Candidate and then President Trump

of those on a limited number of agricultural

creates jobs for U.S. farmers. The Agreement

expressed hostility towards U.S. free trade

products traded with Canada, were

supports Bahrain’s economic and political

agreements negotiated by other presidents.

eliminated by 2008. See https://ustr.gov/

reform and enhances commercial relations.

He argued that they contribute to U.S. trade

trade-agreements/free-trade-agreements/

See https://ustr.gov/trade-agreements/free-

deficits and hurt U.S. workers. For these

north-american-free-trade-agreement-nafta.

trade-agreements/bahrain-fta.

reasons, President Trump quickly took steps

B. USMCA

D. U.S.-Bahrain Free Trade Agreement

E. U.S.-Chile Free Trade Agreement.

with regard to U.S. free trade agreement

The USMCA—the renegotiated

This Agreement eliminates tariffs and

policy that completely altered the approach

NAFTA—kept large portions of NAFTA

open markets, reduces barriers for trade in

taken by the previous administration. First

in place while changing rules regarding

services, provides protection for intellectual

he withdrew the U.S. from the Trans-

intellectual property, the rules of origin,

property, ensures regulatory transparency,

Pacific Partnership (TPP) in January 2017.

investment dispute settlement, state to

guarantees nondiscrimination in the trade

The TPP would have put the U.S. at the

state dispute settlement, and labor rights

of digital products, commits the Parties to

center of a twelve-country megaregional

and dispute settlement connected to them.

maintain competition laws that prohibit

free trade agreement. The U.S. led the TPP

See https://ustr.gov/trade-agreements/free-

anticompetitive business conduct, and

negotiations for the five years it took to reach

trade-agreements/united-states-mexico-

requires effective labor and environmental

the agreement signed by President Obama in

canada-agreement/agreement-between. The

enforcement. See https://ustr.gov/trade-

2016. The eleven other TPP countries went

USMCA addresses digital trade and state-

agreements/free-trade-agreements/chile-fta.

on to ratify and put into force the renamed

owned enterprises. The agreement increases

Chile was part of the TPP negotiations.

Comprehensive and Progressive (CPTPP)

North American content requirements

F. U.S.-Colombia Trade Promotion

Agreement for Trans-Pacific Partnership in

for vehicles. It expands market access in

Agreement

2018.

agriculture. At the same time, the USMCA

This Agreement is a comprehensive free

Second, President Trump also negotiated

reduces U.S. obligations in areas such as

trade agreement that provides elimination

select modifications to KORUS, the free

investment and government procurement.

of tariffs and removes barriers to U.S.

trade agreement with South Korea. Finally,

See U.S. Trade Policy: Background and

services, including financial services. It

President Trump insisted on a renegotiation

Current Issues, https://crsreports.congress.

also includes important disciplines relating

of the 1994 North American Free Trade

gov/product/pdf/IF/IF10156.

to customs administration and trade

Agreement (NAFTA). The USMCA replaced

C. U.S.-Australia Free Trade Agreement

facilitation, technical barriers to trade,

NAFTA when it was passed by the House in

The Joint Committee under this free

government procurement, investment,

late 2019 and the Senate in early 2020. See

trade Agreement supervises implementation

telecommunications, electronics commerce,

https://ustr.gov/trade-agreements/free-trade-

of the Agreement and review of overall trade

intellectual property rights, and labor and

agreements/united-states-mexico-canada-

and investment relationship. The Agreement

environmental protection. See https://ustr.

19

Currents 24.1 2020


gov/trade-agreements/free-trade-agreements/

recently renegotiated in 2018. See https://fas.

colombia-tpa.

org/sgp/crs/row/IF10733.pdf.

G. CAFTA-DR (Dominican RepublicCentral America Free Trade Agreement)

K. Morocco Free Trade Agreement This Agreement supports significant

This Agreement is the first free trade

economic and political reform in Morocco

agreement between the Untied States

and provides for improved commercial

and Costa Rica, El Salvador, Guatemala,

opportunities for U.S. exports by reducing

Honduras, Nicaragua and the Dominican

and eliminating trade barriers. See https://

Republic. CAFTA-DR promotes stronger

ustr.gov/trade-agreements/free-trade-

trade, investment ties, prosperity, and

agreements/morocco-fta.

stability throughout Central America and

L. Oman Free Trade Agreement

the southern border of the United States. See

This Agreement promotes economic

https://ustr.gov/trade-agreements/free-trade-

reform, generates export opportunities for

agreements/cafta-dr-dominican-republic-

U.S. goods and service providers, solidifies

central-america-fta.

Oman’s trade liberalization and strengthens

H. Israel Free Trade Agreement

intellectual property rights protection and

This first U.S. free trade agreement

enforcement. See https://ustr.gov/trade-

provided the foundation for expanding

agreements/free-trade-agreements/oman-fta.

trade and investment between the U.S. and

M. U.S.-Panama Trade Promotion

Israel due to its reduction of barriers and

Agreement

promotion of regulatory transparency. See

This Agreement will support American

https://ustr.gov/trade-agreements/free-trade-

jobs, expand markets and enhance U.S.

agreements/israel-fta.

competitiveness. See https://ustr.gov/

I. Jordan Free Trade Agreement This first U.S. free trade agreement

uspanamatpa/facts. N. Peru Trade Promotion Agreement

with a Middle East country, other than

This Agreement eliminates tariffs and

Israel, continues to facilitate an extensive

removes barriers to U.S. services, provides

economic partnership between the United

a secure, predictable legal framework for

States and Jordan. See https://ustr.gov/

investors, and strengthens protection for

trade-agreements/free-trade-agreements/

intellectual property, workers and the

jordan-fta.

environment. See https://ustr.gov/trade-

J. KORUS, Korea-U.S. Free Trade

agreements/free-trade-agreements/peru-tpa.

Agreement

Peru was part of the TPP negotiations.

This Agreement reduces and, in most

O. Singapore Free Trade Agreement

cases, eliminates tariff and non-tariff barriers

This Agreement provides for a Joint

between South Korea and the U.S. on

Committee that reviews the overall trade and

manufactured goods, agricultural products,

investment relationship between the United

and services. It provides rules for investment

States and Singapore. See https://ustr.gov/

and intellectual property rights and commits

trade-agreements/free-trade-agreements/

both countries to maintaining certain worker

singapore-fta. Singapore was part of the TPP

and environmental standards. KORUS was

negotiations. 20

Currents 24.1 2020


Hypothetical The following hypothetical illustrates how trade compliance issues can arise for a firm: Woodlands International Inc. (Woodlands), a U.S.-based publicly traded multinational oilfield services company, manufactures tools and runs operations for National Oil Companies (NOCs) and Independent Oil Companies (IOCs) in eighty countries around the world. Customer XN, an IOC is starting a joint venture in Nigeria with RussiGas, a Russian NOC, and a Nigerian NOC. The name of the joint venture is Nigerian Offshore Development (NOD). NOD issues a tender for oilfield operations support. The work will take place on an offshore rig that operates under an Iranian flag in waters at least 1200 feet deep. Woodlands prepares its response for the bid. In order to make sure it won the bid, one of the Woodlands salesmen worked with one of the NOC executives. This included flying the official and his family to the U.S., covering a trip to Disney World, giving the official an office job and making a small payment for consulting services. The job requires Woodlands to make and buy tools to bring to Nigeria. One of the contractual requirements in the tender states that Woodlands cannot use any Israeli-produced goods or equipment on the job. Woodlands has a factory in Israel which makes Woodlands tools needed for the job. Woodlands decides to make and manufacture the tools in Israel, ship the tools to a distribution center in the Netherlands where they will remove or grind off the “Made in Israel” marking, and replace it with a country of origin of the Netherlands. Then, Woodlands will ship the tools to the jobsite in Nigeria. One of their U.S. competitors has a unique patented tool–designed for the military–that works well but is expensive. Woodlands buys the tool from its competitor and sends it to India to be reverse engineered. The Indian subcontractor gives the designs for the tool to Woodlands and the company in turn send the designs to non-related Factory Z in China that will manufacture the tool. Factory Z employs a skilled workforce in its manufacturing process, and twelve to fourteen year-olds in its packaging department. Factory Z will manufacture the tool and sell it to a Woodlands affiliate in Nigeria. Before shipping, Woodlands asks Factory Z to prepare a commercial invoice with a value of 50% less than the billing invoice, because Nigerian import duties and taxes are high. By reducing the value on its commercial invoice, Woodlands reduces the duties it must pay and protects its profit margin. Factory Z complies. Woodlands successfully completes the job and generates a profit of $200 million dollars. Five weeks later, the Department of Justice (DOJ) knocks on the door of Woodlands’ U.S-based office and Nigerian Customs knocks on the door of Woodlands’ Nigerian office. At the same time, a U.S. competitor serves Woodlands with a lawsuit. The Wall Street Journal publishes an article about child labor in Factory Z, which depicts tools with Woodlands’ logo.

21

Currents 24.1 2020


Cross Border Trade Compliance M O D E R AT O R / PA N E L I S T: PA N E L I S T S : D AV I D —————————————————

T I M

C O U R T N E Y

B R O W N ,

M O R T L O C K ,

M E L

E L L E N

C .

V.

F L O R E S

C H AV E Z , S M I T H

Compliance teams should consider that every

Companies that have established

export corresponds with an import—each

trusting relations with trading partners are

—————————————————

is a two sided transaction. Fourth, who is

often inclined to certify that the product’s

[The Cross Border Trade Compliance

receiving the item? Companies must be sure

end use is in compliance. In commercial

panel began its descussion with the

to utilize screening processes to avoid dealings

dealings, corporate partners can safely assume

hypothetical on the previous page].

with those on sanctions lists. Fifth, to what

each partner will have prepared the relevant

According to the hypothetical, how will

use is the item being put? Discerning the

documentation. Prudent companies should

Woodlands determine if it is complying

item’s end use is of critical importance before

work closely with main customers and their

with all appropriate trade control and anti-

certifying it will not be used in violation of

quality assurance control programs. For

corruption laws? In any given transaction, it

sanctions.

example, it is sensible when working with

I.

Introduction

is crucial to understand what is being sold

A final question is whether the firm

a buyer that has “textiles” in its name, to

and what is being shipped. The sale does not

is participating in any sort of non-U.S.

inquire further as to why they are interested

have to be of a particular thing, it can be for

sanctioned boycott? This issue is crucial for

in purchasing oil field tools. Such a purchase

design plans, drawings, products, or services–

companies dealing with Middle Eastern

should sound odd. It is, in fact, based on

all of which are subject to trade control

countries. Answers to the aforementioned

a real scenario. The corporate partner was

laws. After shipping the item or taking it

questions lead to the identification of risk

unwilling to sell the customer the tools

elsewhere, how can the transactional attorney

areas and, ultimately, to the assembly of a

without both information about where

ensure compliance with trade control laws?

well-structured trade compliance program.

the tools were going and provision of the

In the context of a given transaction, there are

—————————————————

requisite documentation.

four broad categories of questions: 1) what is

I I . Tr a d e C o m p l i a n c e and Red Flags

1

being shipped; 2) where it is being shipped; 3) who will receive the item; and 4) how will the item be used? Within those broader categories, there are a lot of detailed questions. Some of the more important sub-issues to highlight are as follows. First, what will the item being transferred through the supply chain ultimately become? Second, is the item subject to any applicable export control restrictions? Third, is a license necessary in order to transport the item? Conversely, wherever the item is being imported, is a license required? What needs to be done to comply with other import procedures?

————————————————— There is an obligation to know about these laws and to comply with them. If suspicious circumstances surround the transaction, a company cannot hide its head in the sand. That is true with trade compliance and anti-corruption compliance. Any transaction wherein a party appears to be in non-compliance with trade control laws raises a red flag. All red flags are significant, but the most striking is a buyer’s reluctance to offer information about the end use of the product or its ultimate destination. 22

Currents 24.1 2020

Alarm bells should ring when a product being bought does not appear to fit within the buyer’s line of business. If all is resolved and explanations received, perhaps the firm can become comfortable. However, many times this problem causes transactions to fall apart. Other examples of red flags include fake delivery dates, remote destinations, or circuitous shipping routes. All of these red flags may cause a firm to dive in further to avoid non-compliance. Many corporate programs have implemented screening processes called Know Your Customer (KYC) programs. The screening process entails running a company or individual’s name through a software tool


that cross-references them against sanctions

that allows further exploration of remote,

the joint venture between RussiGas and the

and politically exposed persons lists. This type

deepwater areas in the energy sector–ITAR

Nigerian NOC, seeks to use Woodlands’

of screening serves to address the concerns

compliance is a prerequisite.

tools for deepwater operations under an

one may have about a certain company.

The final government agency is the

Iranian flag. Nothing in the Woodlands

Notably, however, a screening process

Commerce Department, and through

hypothetical suggests that the project has

cannot capture everything. Although

the Bureau of Industry and Security

anything to do with the reason for the U.S.

screening is indeed a requirement, a firm

(BIS), which enforces, implements, and

sanctions—Russia’s attempted annexation

should consider asking common sense

promulgates regulations related to the export

of Crimea and its interference in eastern

questions. Sometimes, a deal simply does

of commercial items having a dual use.

7

Ukraine.13 In order to fully assess what drives

not make sense and evades capture by the

BIS looks at items that are not deserving

the relevant restrictions, background analysis

screening process. Thus, typical screening is

of ITAR restrictions, but do have some

of the relevant sanctions is required. U.S.

not a sensible replacement for undertaking

potential military components, such as

sanactions are often the key leverage utilized

a complete red flag analysis.

information technology (IT) and encryption.

in national security crises and must be strictly

—————————————————

The Department of Commerce implements

followed.

III. Administrative Oversight

and enforces regulations called the Export

General embargoes14 are in place to

—————————————————

Administration Regulations (EARs).8 EARs

block the export of goods and services from

Three main U.S. governmental agencies

are the regulations for classifying products

the U.S. or from U.S. persons to Cuba, Iran,

have a hand in overseeing cross border

and determining whether they are subject to

North Korea, Syria, and the Crimean region

trade compliance issues such as export

export limitations. Products that fall within

of Ukraine. Essentially, there is a general

and import controls, sanctions, and anti-

an EARs classification require a license to

prohibition on exports by U.S. persons of

boycott laws. The Office of Foreign Assets

export from the U.S.10

goods and services directly or indirectly to

6

9

Control (OFAC) is the entity within

There are anti-boycott rules separate from

these places, unless the transaction is subject

the Treasury Department that deals with

the Treasury regulations. The Department

to an exception or a license. Historically,

economic sanctions, for example, those

12

of Commerce also has similar regulations.

embargoes have operated with the subtlety

against Venezuela, North Korea, and Iran.3

These regulations are designed to ensure that

of a sledgehammer. Such embargoes mean

There is a great deal of government oversight

U.S. companies are not participating in non-

a company can conduct no business. Over

going on in that space.

U.S. sanctioned boycotts.

time, U.S. sanctions have become smarter

2

11

The Directorate of the Defense Trade

Evident in the alphabet soup here is

and more nuanced. In fact, in the wake

Controls (DDTC) of the U.S. State

that government agency oversight is fairly

of 9/11, a new policy tool emerged—

Department4 works in a focused area of

complicated. The U.S. is not doing this

targeted sanctions. Rather than fixating on

export controls. The DDTC is responsible

deliberately. All of the regulations are driven

jurisdictions or state actors, the U.S. focused

for implementing trade controls involving

by different types of governmental concerns

on individuals and entities with involvement

militarized goods under the International

and policies, particularly with respect to

in bad acts, for example, terrorists and their

Traffic in Arms Regulations (ITARs).5 ITARs

sanctions. Sanctions are a tool used to restrict

financial supporters, nuclear proliferators,

control military-type grade equipment

U.S. persons, goods, or services exports

and organized crime figures.15 Further, there

exported out of the U.S. The government’s

from the U.S. to the sanction’s target. The

are some sanctions16 that aim restrictions

concern in restricting those exports is for

government leverages sanctions in situations

not on the country itself but rather on

national security and defense reasons. If

implicating foreign policy and national

the individual entities undermining U.S.

companies wish to use and trade military-

security.

interests in that country. Examples of such

type technology converted for commercial use, for example–underwater equipment

A. The Backdrop of Policy According to the hypothetical, NOD,

programs are those against South Sudan, Yemen, Burundi, and North Korea, until

23

Currents 24.1 2020


2016.17

do business with them” or “it is off the list,

Even if there is not a U.S. nexus,

so no problem.” The situation is dicier than

companies must still worry about U.S.

If targeted sanctions are in place where

that. Who do these sanctions really affect?

sanctions. Beginning in the 1990s, the U.S.

a U.S. company does business, there is the

The bottom line is that sanctions programs

government began threatening sanctions

potential for that company’s engagement in

affect everyone. Any person who exports

against foreign companies dealing with Iran,

a transaction involving a specially designated

goods or services from the U.S., whether a

leading up to the sanctions on Iran prior to

national (SDN). There are possibly 15,000

U.S. company, a U.S. citizen, a green card

the nuclear deal.28 That is what has been re-

individuals on OFAC’s SDN list in locations

holder, or someone employed overseas,

imposed with the withdrawal of the nuclear

spread across the globe. The U.S. also has

qualifies as a “U.S. person” and is generally

deal, the threat of sanctions against foreign

a set of restrictions that apply to any entity

restricted by such sanctions.23

companies for doing on-site commercial

B. Sanctions

18

owned 50% or more by an SDN.19 Entities

There are special sanction rules for Cuba

owned 50% or more by an SDN, or multiple

and Iran. The Cuba rules apply to anyone

Now, there are sanctions with regard to

SDNs in the aggregate, are subject to the

or any entity owned or controlled by a U.S.

Russian SDNs and Hezbollah. There have

same restrictions regardless of whether the

person. That is also true for Iran, although

even been reports of the State Department

entity’s name appears on the SDN List. Thus,

the scope in those regulations has flip-

wandering around Europe threatening

looking at the SDN list is not enough.

flopped several times over the last few years.

companies with sanctions if they buy oil

In 2012, the Iran sanctions were extended

from Venezuela. Whether applying sanctions

to cover foreign subsidiaries.

However,

in this context is a legitimate application of

Russia was in some sense a “Catch-22” for

through the Joint Comprehensive Plan of

law is another question. The bottom line is

the U.S. The concern was that listing major

Action (JCPOA)–commonly known as the

that everybody needs to worry about OFAC

Russian financial institutions and energy

Iran nuclear deal–restrictions on foreign

sanctions.

companies as SDNs could cause cataclysmic

subsidiaries were effectively lifted with a

Further, indirect business transactions

events in the global oil market and financial

license. Now restrictions are back in place

are subject to sanctions. A company may say

sector because of the close integration of

because of President Trump’s decision to

“our business is not selling to Iran; we do not

those institutions with the European and

withdraw from the JPCOA.

have to worry.” However, OFAC administers

The most recent sanctions involve Russia

20

and Venezuela.

21

Sanctioning

24

25

26

27

activity with Iran.

U.S. systems. Thus, the U.S. government

Finally, even a non-U.S. person visiting

civil penalties with strict liability, which

crafted limited sanctions measures barring

the U.S working for non-U.S. companies

means it does not matter what the company

U.S. companies from engaging in certain

cannot ignore these rules. The largest

knows, or should have known, or the intent.29

transactions, such as dealing in the financial

sanctions enforcement action targets—BNP

What matters is where the product ends

sector or providing assistance to listed

Paribas and ZTE—all share something in

up and whether it was intended for that

Russian oil companies for non-conventional

common; they are non-U.S. companies. In

destination at the time it was exported from

oil projects.22 Targeted sanctions are much

addition to having less robust compliance

the United States. There could be many

more nuanced and beneficial because they

departments than their U.S. counterparts,

occasions where a company might think it

lend the government more flexibility in the

the way these non-U.S. firms often get in

is clean because the sales go to its distributor.

imposition of restrictions. These sanctions

to trouble is by exporting from the U.S. to

However, that would not actually shield the

aid U.S. business with their less cumbersome

sanctioned jurisdictions or targets. In the case

company.

nature.

of ZTE, the illegal conduct was exporting

C. Licensing

On the other hand, such sanctions

U.S. technology indirectly to North Korea

How sanctions are imposed by the

complicate the work of compliance

and Iran. Even foreign companies have to

government is getting more complicated.

professionals. A company cannot simply say

comply with sanctions when there is a U.S.

For example, the aggressive use of licensing

“well this entity is on the list, so we cannot

nexus.

makes sanctions more complex. In 2014, the 24

Currents 24.1 2020


U.S. government could not put Sberbank

then it will also be subject to sanctions. U.S.

venture partner, or facilitating the joint

and Rosneft on the SDN list without causing

companies are only able to extend credit

venture’s support in those areas to the Russian

a global meltdown. The U.S. government

to the joint venture over the allowable

parent? If so, the U.S. company could be

also thought there could be similar problems

maturity.34 All of these issues need to be built

engaged in a prohibited facilitation of an

in 2011 when it sanctioned PDVSA (the

in on the front end (screening) when a firm

activity covered by Directive 4.

Venezuelan state-owned oil company) but

puts such investment arrangements together.

did not put it on the SDN list. In early 30

D. Issues with Joint Operation

Another issue connected to the hypothetical is that the joint venture–

2019, however, OFAC placed PDVSA on the

Harking back to the above hypothetical:

NOD–is conducting its work on an offshore

SDN list.31 At the same time, OFAC issued

assume that NOD, the new entity, is a 60/40

rig under an Iranian flag. Everyone should

nine general licenses, several of which were

joint venture with a Russian company in

understand the blatant issue–the rig is flying

updated over the last few months.32 These

deepwater greater than 500 feet (the U.S.

an Iranian flag. U.S. companies will have a

sanctions prevent companies from doing

government definition of deepwater). The

problem working on that rig.

business with PDVSA, absent a license,

Russian company is subject to OFAC

There are two problems. First, if the

which allows doing business with PDVSA

Directives 235 and 4.36 The joint venture itself

rig was in Iranian commerce or the good

in certain ways. Essentially, what that means

is not subject to sanctions if it has less than

originates from Iran, U.S. persons are

is a firm exercising an abundance of caution

50% SSI ownership. Depending on whether

prohibited from engaging in the transaction.

may decide to do no business with Venezuela

or not the joint venture is subject to OFAC,

Depending on the arrangement with the rig,

at all. However, is it worth it to tell business

the transaction may be further complicated

there could be an export of services by a U.S.

teams to shut down a rig and pull out of

by: what the company can own as a “U.S.

person to Iran. If the joint venture is held

Venezuelan waters thus suffering losses of

person”; whether it can extend credit to the

fifty-fifty by Woodlands, a U.S. person, these

hundreds of millions? Or is it worth the

Russian parent; and if, as a U.S. person, the

restrictions on Iran extend to the subsidiary as

extra time and attention to the get the lawyers

company can facilitate the joint venture’s

well. With the joint venture, the restrictions

involved to drill down (pun intended) on

extension of credit to that Russian company.

on dealing with goods of Iranian origin do

what the company may be able to do?

What degree of oversight is a U.S. parent

not actually extend to foreign subsidiaries–

Sectoral sanctions are limited sanctions,

company charged with if engaging in a joint

because the regulations were not written

such as restrictions relating to debt equity.

venture entity? Are U.S. persons charged with

correctly.

The use of such sanctions simply means

approving transactions by that entity? Would

One might wonder, “the rig is not in Iran

U.S. companies must be very careful. Take

OFAC consider its role as merely supporting

anymore, how can the company be exporting

for example, the joint venture, NOD, in

operations with back-end office functions?

services to Iran?” This line of thinking fails

the hypothetical. In reality, the first thing

The key would be to determine at what point

to recognize that such transactions are an

a company would do is screen that joint

OFAC considers a U.S. parent company to

indirect export of services to Iran. Essentially,

venture. Is it on the Sectoral Sanctions

be “supporting” specific transactions with a

if one is engaging in a transaction outside

Identifications (SSI) list? Is it owned by any

Russian parent.

of Iran and the benefit—not necessarily the

33

entity on that list? Ownership by someone

With respect to the hypothetical,

primary benefit, but any at all—is received

on the SSI list presents a problem, and an

Directive 4

restricts U.S. persons from

in Iran, OFAC considers that an export of

even bigger one if that person is on the

providing support to deepwater projects at

services to Iran.38 Even more removed, the

SDN list. How will the debt and credit of

depths greater than 500 feet or those with

“facilitation” by a U.S. person of the export

the joint venture be structured? Is it going to

the potential to produce oil involving a

of services to Iran is also prohibited by the

be consistent with the restrictions on a U.S.

listed Russian entity or one of its 50% or

regulations.39

person providing credit to someone on the

more owned subsidiaries. Again, is the U.S.

To give some examples from a practical

SSI list? If the joint venture is divided 50/50,

company providing support to the joint

standpoint, it is not uncommon to have

37

25

Currents 24.1 2020


global virtual teams working together on

work was considered to no longer be covered

is when in-house counsel gets a call in the

projects. When acting as in-house counsel,

by licenses. The company had to take a close

middle of night asking, “Hey lawyers, what

part of the education process is telling the

look to assure certain licenses only covered

is the answer?”

project and commercial people to be mindful

certain activities for a certain amount of time

—————————————————

that the bulk of the team may be outside the

and that other licenses covered something

U.S., but they are pulling in people to the

else for different periods of time. The targeted

I V. E x p o r t C o n t r o l s

U.S. to provide support. That proposition

nature of these sanctions necessitates careful

must serve as a constant reminder to these

attention to exactly what each authorization

teams: be clear that there must be no U.S.

allows.

nexus. The employee cannot go back to the

No transaction is simple—a company

U.S. now. The company cannot pull them

is not just going to enter haphazardly into

in on certain aspects of the transaction.

a transaction with a company like PDVSA.

The lawyer must make clear to the team

While some larger corporations may be

the sensitivity of the issue and severity of

fortunate enough to be named on the general

potential consequences.

licenses, they will have to exercise caution or

Even worse, there have been numerous

altogether avoid assisting partners, who may

enforcement actions involving approval from

not be named, to prevent violating the law.

the U.S. for a foreign entity, whether or not

Lawyers viewing these issues from the

it is a subsidiary of another company for a

inside fly blind. OFAC writes the licenses.

transaction that would be prohibited for U.S.

There is no notice-and-comment period on

persons. OFAC also takes the position that a

these regulations, because they are intended

referral is prohibited facilitation.40 If a request

to, and many times do, surprise the target

comes into your company on the business

and are meant to be deployed swiftly. So,

side, involving a sanctioned Russian entity

OFAC writes these general licenses on the

or incorrect export to Iran or Cuba, you

assumption that they will mesh with the real

cannot say “I’m sitting here in my Houston

world. OFAC is hoping it has identified all

office, I cannot approve it, but I can help

the unintended consequences. OFAC takes

Fred in the Paris office, who can deal with

that goal seriously, particularly with regard to

these issues, because he’s not a U.S. person.”

the Russia sectoral sanctions. Those were only

In that situation, the U.S. lawyer has engaged

put in place following complex economic

in a prohibited facilitation as a U.S. person.

modeling on the possible impacts. At the

This highlights the importance of the U.S.

end of the day, however, a lot of guesswork

nexus in such questions.

went into how a set of sanctions may affect

Take PDVSA as an example of just how

the real world. Licenses for Venezuela,41 for

narrowly tapered targeted sanctions can be.

example, have been frequently updated after

The same day that OFAC placed PDVSA on

being issued. There is constant adjustment

the SDN list, internal licenses were issued.

and tinkering by the U.S. government to

Confusingly, the licenses authorized certain

try and get it right. In real time, companies

activities and certain entities, but with

deal with the consequences–such as when

different deadlines. There were questions

financial transactions are halted while

about at what date and time the company’s

employees sit stagnant on remote rigs. That 26

Currents 24.1 2020

————————————————— Referring back to the above hypothetical– Woodlands bought its tool from a competitor. The tool was highly technical, patented, and designed for military use. The company sent it to India to be reverse engineered, and then had the tool manufactured in China. What issues arise? Essentially, sanctions are restrictive on individuals and entities, usually, U.S. persons. Export controls are restrictions on the item, regardless of who is exporting. Where is the item going? Where is it being transported? What borders will it cross? The answers to these questions are controlled by ITARs (International Traffic and Arms Regulations)—administered by the State Department—which covers munitions list and military use items. Additionally, the EARs (Export Administration Regulations) cover everything else and generally restrict U.S. origin items exported or re-exported42 from the United States. The untrained eye may think an item in Europe that happens to be of U.S. origin being sent to a third country does not involve any U.S. person. But a U.S. company must still exercise caution as these regulations control items termed to originate in the U.S. If the item started in the U.S., export controls are going to be an issue regardless. There are certain percentages43 of U.S. origin equipment that, if sent to another country to be incorporated into a new product and then on to another country, may fall within the regulations. The question


becomes: does the item remain of U.S.

The Commerce Department and the

go to national security concerns and satisfy

origin? Generally, it comes down to whether

State Department are not alone. Other

or the item is made of 25% or more U.S.

departments within the government are

As a practical example of the debate

origin equipment. That is true for most

getting involved, such as the Department

within the agencies over control, consider

countries, except when the item is going to

of Defense. A vast number of regulations

the sanctions on Sudan. These sanctions

Iran or another sanctioned jurisdiction. In

are driven by turf wars and personalities

were recently lifted and from a sanctions

that case, the U.S. origin percentage decreases

within the U.S. government. In the context

perspective are no longer comprehensive.

to 10%, but the government often plays that

of export controls, there is an ongoing tug of

However, there is still state-sponsored

number up or down. A similar discussion

war between agencies as to who controls on a

terrorism. Particularly with equipment and

about categorization took place with respect

particular issue. The Department of Defense

services suppliers, there are many export

to sanctions on Russia.

is involved in the Committee on Foreign

controls to manage. When Sudan opened

Encryption is a pertinent issue when

Investment in the United States (CFIUS)

up, so too did the opportunities. However,

examining export controls. Encryption, it

process, which reviews incoming investments

the Department of Commerce requires

is worth noting, falls under the umbrella

in the United States. The Foreign Investment

submission of a written request to obtain

of “items” as that is defined, encompassing

Risk Review Modernization Act of 2018

a license, a process that can take some

both goods and technology. The technology

(FIRRMA)45 expands the jurisdiction of the

time. Most often, requests bounce around

could be almost any proprietary technology

Department of Defense to export controls,

several different agencies. A Department

developed here in the U.S. Software is

inasmuch as it concerns foreign investment

of Commerce license may be approved.

becoming an export control issue. Of course,

in U.S. companies manufacturing and

However, additional circumstances may

the reason software may fall within that

designing controlled technology.

necessitate another agency’s approval.

other policy objectives.

export control category—in which exports

A company planning to export needs

Delays may happen because everyone in

may be conditioned on procurement of a

to know the nature of its technology, not

the government wants to have a look at the

license—is the encryption component.

44

just to determine whether it can export it

license before it gets issued. A typical situation

The Commerce Department tends to follow

but also to determine who can invest in the

may involve several agencies inquiring about

behind the real-world in these areas, but has

company, whose money it can take, and

a written request—a document which may

been catching up with guidance.

whether that requires approval from the

begin as two or three pages that evolves into

When dealing with software, one

U.S. government. The type of product and

fourteen—before a license is actually issued.

question to ask is whether or not it operates

its export classification affects these issues

—————————————————

on a cloud or is downloadable? For a long

as well. On classification of the product for

time, the Commerce Department operated

export, a company could determine there is

V. U.S. Antiboycott Rules

on the assumption that all software would

no need to worry since the item is just going

move from Country A to Country B in the

down the road to Houston.

form of a hard floppy disk. The reality is

Companies planning to share

technology was developing far beyond that

information must also consider the concept

model. Now software may be shared either by

of “deemed exports.”46 If a company discloses

remote download or operation of the cloud.

or otherwise exposes an export controlled

In the latter case, no export occurs if the user

item to a foreign national, essentially a non-

has no access the underlying technology.

U.S. entity, the U.S. government treats that

Regulators need to understand how that

sharing of information as an export, even if

distribution of the technology works and

it occurs in the United States. This shows the

moves around the world.

different layers in this regulatory space that

————————————————— What is a boycott? A boycott, in essence, is a law or policy enacted by Country A prohibiting the import to or export of goods or services to Country B or the entry or employment of their nationals. The U.S. antiboycott regulations 47 are administered by two departments, the U.S. Department of Commerce and the U.S. Department of Treasury.48 The rules are designed to prevent the participation and the cooperation with international

27

Currents 24.1 2020


boycotts that the U.S. government does not

commercial team reviews the documents for

American Civil Liberties Union (ACLU) has

enforce. The antiboycott regulations apply

any potential boycott-related language. If

filed suit on behalf of government contractors

to U.S. companies, their foreign subsidiaries,

there is potential boycott-related language,

that have been affected by this legislation. In

branches, U.S. citizens, taxpayers, and

such as “Contractor shall comply with

two cases, in Kansas and Arizona, the federal

residents. This set of regulations is of great

all applicable laws of [insert Treasury List

courts have ruled in favor of the ACLU and

import to the trade compliances programs in

country],” then that language must be

their clients.53 However, there are twenty-six

multinational corporations and firms with

revised because it is too broad and arguably

states that currently have anti-BDS laws,

global reach.

would include the Treasury List country’s

including Texas. It will be interesting to see

There are different reporting requirements

boycott of Israel laws. Such language would

how this pans out and what cases will arise.

for each department. Companies are required

be submitted to the compliance team for

In the hypothetical, one of the

to report boycott-related requests on a

review and advice on how to negotiate

contractual requirements in the tender stated

quarterly basis to the U.S. Department of

with the customer. Compliance teams pay

that the contractor–Woodlands–could not

Commerce and on an annual basis to the

special attention to key words and red flags

use any Israeli goods or equipment on the

U.S. Department of Treasury.

including, but not limited to: mentions of

Nigerian joint venture job. While drafters

Boycott requests can be oral or written

Israel or Israeli companies; language targeting

may always provide origin information, in

and appear in a variety of commercial

other boycotted countries; port eligibility;

terms of the actual country of origin, they

documents such as an invitation to bid or

and requests for employee data, such as

should never certify that any particular

tender, contract, purchase order, request for

national origin, race, religion, ethnicity,

country or supplier was not involved.

quote, letter of credit, shipping instructions,

gender, or place of birth or the equivalent.

Certain boycotting countries, however, do

and so on. What is reportable is the request

Then, the compliance department can either

have laws that prohibit the importation of

itself, not simply whether “we agree” to the

advise on how to revise such language or

goods originating from boycotted countries.

request or not. The U.S. anti-boycott rules

strike a clause entirely because it is prohibited

The Department of Commerce excepts

and regulations are principally concerned

and penalized under U.S. antiboycott rules

primary boycotts from its prohibitions. Thus,

with the Department of Treasury’s list of

and regulations.

compliance with the import requirements

49

boycotting countries in the Arab League,

A boycott-related current event in

of a boycotting country is not prohibited.

which are as follows: Iraq, Kuwait, Lebanon,

trade compliance involves the Senate’s

However, such requests must be reported

Libya, Saudi Arabia, Syria, Qatar, United

recent passage of a bill on February 5, 2019,

to the Department of Commerce. Where

Arab Emirates, and Yemen. These countries

the Strengthening America’s Security in

the business would otherwise have done so

maintain boycott laws on their books,

the Middle East Act, which includes the

based on business merits, the business should

requiring careful attention when reviewing

Combating B.D.S. Act of 2019 (BDS).

51

continue to use Israeli goods and components

any commercial documents received from

The law—combatting boycott, divestment,

for items sent to countries that do not boycott

customers in these countries or authorizes

and sanctions activities—allows U.S. states to

Israeli goods. Merely removing the marks

services to be performed in these countries.

implement anti-BDS laws and further allows

from the tool is a potential compliance issue.

Note that boycott requests can come from a

them to divest from government contractors

—————————————————

variety of sources and are not limited to those

participating in the boycott of Israel.

in Treasury List countries, such as Pakistan,

Supporters say that the act is meant to oppose

VI.

India, Bangladesh, Malaysia, China, and

the global BDS movement and show U.S.

Taiwan.

support for Israel. However, opponents of

50

52

With respect to oversight, what are

the legislation say this is more of a restriction

some red flags to look for? When a company

on the First Amendment right to free

receives an opportunity for the business, its

speech, specifically the right to boycott. The 28

Currents 24.1 2020

Customs

Issues

————————————————— On the import side, there are three important questions an attorney must ask himself or herself. First, what is the item and how is it classified? Second, what is the value of the item? This is critical from an import


perspective, much more than it is on the

the country of origin. In the hypothetical,

Only time will tell if that is in fact the case.

export side. Third, where is the item coming

Israel is the tool’s true country of origin.

In the meantime, the administration has

from–what is the country of origin?

Woodlands later transshipped the tool to a

added additional tariffs on goods on top of

The term classification carries an entirely

different country, by getting another firm to

preexisting tariffs. Importers feel the brunt

different meaning depending on whether

hide the true country of origin. Woodlands’

of the impact, especially with respect to the

imports or exports are at issue. With respect

course of action had more to do with

Section 232 tariffs on aluminum and steel.59

to exports, classification refers to the Export

concealing Israel as the country of origin

The Trump administration found when

Control Classification Number (ECCN),

because of a boycott. However, this practice

initiating those tariffs that, as a matter of

which is determinative as to which controls

is not uncommon for those merely trying to

national security, domestic steel imports are

apply to a particular item. The number

give off the appearance that an item moved

very sensitive. Sensitivity of both the steel

changes depending on what the item is.

from a different country in order to take

and aluminum industries prompted the

However, import “classification” involves the

advantage of that country’s lower duty rate.

Trump administration’s determination that

harmonized tariff number, commodity code,

Different countries pay different duty rates.

both needed protection. Tariffs on raw steel

or import number. The U.S. tariff number

Customs issues are impacted by special

and aluminum, as well as products derived

is a ten-digit number and anything imported

programs, including bilateral and trilateral

from those materials, are subject to increases

into the U.S. is classified according to the ten-

free trade agreements, such as NAFTA or

of 25% or 10% additional duties, as the case

digit code in the tariff. Locating the relevant

now, the USMCA. Free trade agreements

may be.60 Additional duties as a general rule

number is critical to understanding which

may involve two or more countries

are applied across the board, with limited

import duties apply.

negotiating and looking for reciprocal export

exclusions.61 Those products excluded from

Secondly, what is the items valuation

benefits. Under these agreements all of the

additional duties however are subject to

according to its classification? The vast

participating countries benefit mutually from

quotas that cap the quantity of total imports

majority of duties for items subject to the

each others’ exports.

each year.62

54

tariff are imposed on an ad valorem basis–in

Unilateral preferential programs are

As a practical example, take Brazil–

proportion to the item’s value. As illustrated

another sort of specialty program, designed

where the steel pipe quotas operate to “open”

by the hypothetical, a company can try to

to encourage development between certain

up each quarter, closing within mere hours.

play around with the value, tweaking it to

countries and the U.S.56 The Generalized

As a result, importers and their brokers

get a lower duty payment.

System of Preferences (GSP) and the African

must be prepared to submit their import

One exception is found in Chapter 27

Growth and Opportunity Act (AGOA) are

documentation at the moment it opens–as

55

the most commonly known. The U.S. exports

complicated by the fact that the government

which primarily affects petroleum and

to GSP and AGOA member countries

does not advertise exactly when it will open–

petroleum products. Typically, duties are paid

that satisfy specified conditions, receiving

and cross their fingers. Evidently, such quotas

on a specific rate of duty based on the value or

no benefit in return.5758 Benefits are not

complicate trade compliance.

the weight of the cargo. However, application

necessarily provided duty-free, but often

of this exception involves basing the rate

do receive a lower duty rate than had the

Section 301 tariffs63 target China and

of duty on the specific quantity of barrels

products come from countries not within

are retaliatory in nature. The U.S. currently

imported. The tariff may not make sense for

these programs.

has four different retaliation lists. 64 The

the widget world—one that involves pieces

A. 232 Tariffs

U.S. has lists of Chinese practices they are

of the U.S. Harmonized Tariff Schedule,

B. 301 Tariffs

of equipment and parts. For companies that

Trade compliance programs are on the

seeking to see some improvement on. For

are importing hydrocarbons in bulk tankers,

front lines of the “trade war”. The Trump

example, companies seeking to do business

a barrel-based valuation is more sensible.

administration has initiated several trade

in China must form a joint venture with a

wars, viewing tariffs as the great equalizer.

Chinese partner. Upon formation, Chinese

Finally, the third question deals with

29

Currents 24.1 2020


law requires the non-China partner to

the import sector of trade compliance, but

captured by either a countervailing duty or

turn over its technology to its Chinese

in order to understand the way free trade

an anti-dumping duty order.

counterpart, which as a general matter are

agreements operate more generally.

at least nominally affiliated with the Chinese

—————————————————

the current political climate. Each year,

government itself. The U.S. fundamentally

VII. Anti-Dumping and Countervailing Duties

U.S. Customs Border Protection (CBP)

opposes forced technology transfers. List three includes 5,733 items, valued at a whopping 200 billion dollars’ worth of merchandise and went into effect May 10, 2019.65 Then, a fourth list went into effect on September 1, 2019, covering 3,796 items valued at 300 billion dollars. Later that 66

month, President Trump tweeted that the first three lists, scheduled to increase from 25% to 30% effective early October, were subject to a hold based on the outcome of the “Phase 1” interim U.S.-China Agreement reached in their recent negotiations.67 Another issue in the “trade war” is the trade imbalance–unsurprisingly, the U.S. imports far more than it exports to China. These are just two of the many issues the U.S. government is concerned with resolving in the ongoing U.S.-China negotiations. The eyes of the global business community are upon them as this takes place, and the outcome still remains to be seen. In the meantime–is it workable for multinational companies to simply just take Chinese goods, ship them to say–Singapore, and then import them from Singapore to get around the tariff increases? No, because the country of origin, not the country of export, is determinative. The import–however routed—goes back to the country of import. This may be confusing to those unfamiliar with this nuanced system, thus companies and their respective compliance programs must ensure that the supply chain is made aware. Classification, valuation, and country of origin are integral, not only for those in

————————————————— When a foreign manufacturer sells goods in the U.S. for less than fair value, causing injury to U.S. industry, antidumping occurs. 68 Both anti-dumping and countervailing duties69 are considered unfair trade practices.70 Foreign companies “dumping” are selling into the U.S. market, hoping to drive out U.S. competition, at which point the dumpers can drive prices back up. Affected U.S. industries can initiate an investigation, either through the International Trade Commission (ITC)71 and the International Trade Administration (ITA)72 within the Commerce Department. Both agencies investigate and ultimately determine whether: 1. dumping is taking place; and 2. if material injury has occurred as a result. Satisfaction of both elements will result in the U.S. government issuing “the delta”—the difference between the price the item is actually sold for in the U.S. and fair market value—as a duty.73 This is a trap for the unwary, capable of blindsiding importers ignorant of these processes with anti-dumping duties commonly in the 200%-300% range, on top of the actual price the importer paid for the good. Countervailing duty law works similarly. The usual case involves a foreign government assisting a foreign manufacturer by providing subsidies or tax incentives, giving the manufacturer a leg up on U.S. industry. Therefore, companies would be wise to exercise caution if a deal seems too good to be true and ensure the import is not 30

Currents 24.1 2020

The above holds particularly true in

announces its priority areas. In both 2018 and 2019, CBP’s announced priorities included anti-dumping, countervailing duties, and the “trade war.” Since his candidacy as well as throughout his presidency, President Trump made NAFTA a big target. Aside from the Iran Deal, he proclaimed NAFTA the “worst trade deal ever made.”74 He similarly targeted the Trans-Pacific Partnership (TPP), a multilateral free trade agreement. One of his first actions coming in the office was to withdraw from the TPP.75 Un i t e d St a t e s - Me x i c o - C a n a d a Agreement (USMCA)76 has gotten lot of attention, and many argue it to be a brandnew free trade agreement, while others insist it is merely NAFTA 2.0.77 There are tweaks on the edges, but for all practical purposes, not a lot has changed from under NAFTA. The Trump administration is stepping back in many ways from the U.S.’s traditional role as the global leader. Looking ahead, there are several other bilateral trade agreements potentially on the horizon, such as the U.S.-E.U. agreement. The Trump administration has indicated a preference for dealing bilaterally. For example negotiations are underway for a U.S.-U.K. free trade agreement in anticipation of Brexit.78 Further, similar one-to-one style negotiations took place between the U.S. and Japan–signing a new agreement this September,79 as well as the 2018 revisions to the U.S.-Korea (KORUS)80 deal.81 Similar to NAFTA, as opposed to USMCA, the revisions to KORUS resembled a tweaking


of the issues rather than a major overhaul of

are accurately represented, and not hidden

the agreement as a whole.

or purportedly coming from a different

Understanding classification, valuation,

country to take advantage of lower duty

and country of origin is important, not

rates or avoid boycott rules. Tariffs majorly

only for those in the import sector of trade

impact importers, and those dealing in

compliance but also for understanding the

Chinese markets must stay apprised of

way free trade agreements work.

the latest developments with ongoing

—————————————————

negotiations. Trade wars between the U.S.

VIII.

and other countries can lead to dumping in

Conclusion

————————————————— Firms must address issues on several fronts when conducting business or seeking out transactions at the multinational level. Compliance implications can arise in structuring the deal itself, seeking out business partners, establishing operations abroad, and transshipping goods. Federal administrative oversight is driven by both foreign policy and national security concerns, rather than industry regulation or worker safety, often yielding puzzling outcomes.

the American market in an attempt to drive American businesses out by undercutting the prices of goods. This leads to anti-dumping and countervailing duties being applied to both individual companies and specific countries. In efforts to control trade issues, the Trump administration is attempting to deal with other nations less on a multilateral bases and more on bilateral basis. In sum, lawyers should look at the big picture and, a point that cannot be overstated, exercise an abundance of caution when advising clients.

Export controls restrict an item from shipment without regard to the identity of the exporter, generally targeting certain sanctioned jurisdictions such as bad actors like Iran or Russia. Sanctions are often specific to certain types of items and sectors or limited in quantity, rather than operating as a blanket bar. Exporters, particularly those in the technology sector, will often encounter issues posed by cross-cultural differences— such as SOEs in China. Thus, professionals may be required to request and obtain licenses to fully comply with U.S. law. An inquiry as to a particular item’s classification, valuation, and country of origin is essential to properly complying with taxes levied on imports by customs, generally assessed on an ad valorem basis. Compliance professionals must be prudent in ensuring that countries of origin 31

Currents 24.1 2020


End Notes 1. 2.

See generally 15 C.F.R. § 30 (2019). U.S. Dep’t of the Treasury, Office of Foreign Assets Control (Apr. 5, 2019, 5:53 PM), https:// www.treasury.gov/about/organizational-structure/offices/pages/ office-of-foreign-assets-control. aspx [hereinafter OFAC] [https:// perma.cc/638V-RFV4]. 3. U.S. Dep’t of the Treasury, Venezuela-Related Sanctions, h t t p s : / / w w w. t r e a s u r y. g o v / resource-center/sanctions/ programs/pages/venezuela.aspx [https://perma.cc/3E2Q-SXGZ] [hereinafter Venezuela-Related Sanctions]; U.S. Department o f t h e Tr e a s u r y , I r a n Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/Pages/iran.aspx [https:// perma.cc/4TKJ-DNEF]; U.S. Dep’t of the Treasury, North Korea Sanctions, https://www. treasury.gov/resource-center/ sanctions/Programs/pages/nkorea. aspx [https://perma.cc/NY2WQ3U8] [hereinafter North Korea Sanctions]. 4. U.S. Dep’t of State, Directorate of Defense Trade Controls, https://www.pmddtc.state.gov/ ddtc_public?id=ddtc_public_ portal_about_us_landing [https:// perma.cc/UVK6-H6TV]. 5. See 22 C.F.R. §§ 120–130 (2019) (implementing the Arms Export Control Act, 22 U.S.C. § 2778 (2019)). 6. U.S. Dep’t of Commerce, Bureau of Industry and Security, https://www.bis.doc.gov/ (last visited Jan. 22, 2020). 7. 15 C.F.R. § 730.3 (2019). 8. 15 C.F.R. §§ 730–774 (2019) ( i m p l e m e n t i n g t h e Ex p o r t Administration Act of 1979, 50 U.S.C. App. 2401–2420 (2012)). 9. Id. 10. Id. 11. Id. § 760. 12. Id. 13. See Statement by the President on Ukraine, The White House President Barack Obama ( Ma r. 1 7 , 2 0 1 4 ) , h t t p s : / / obamawhitehouse.archives.gov/ the-press-office/2014/03/17/ statement-president-ukraine [https://perma.cc/2QE4-8ME3]. 14. See U.S. Dep’t of the Treasury, Sanctions Programs and Country Information, https:// www.treasur y.gov/resourcecenter/sanctions/Programs/Pages/ Programs.aspx [https://perma.cc/ X875-QDLV].

15. U.S. Dep’t of the Treasury, Specially Designated Nationals and Blocked Persons List, https://www.treasury.gov/ resource-center/sanctions/SDNList/Pages/default.aspx [https:// perma.cc/QZW6-CQ4B]. 16. U.S. Dep’t of the Treasury, Balkans-related Sanctions, h t t p s : / / w w w. t r e a s u r y. g o v / resource-center/sanctions/ Programs/pages/balkans.aspx [https://perma.cc/C99T-MJT4]; U.S. Dep’t of the Treasury, Iraq-Related Sanctions, https:// www.treasury.gov/resource-center/ sanctions/Programs/pages/iraq. aspx [https://perma.cc/A4KC66AR]; U.S. Dep’t of the Treasury, Lebanon-Related Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/pages/leb.aspx [https:// perma.cc/5QMR-PB2F]; U.S. Dep’t of the Treasury, Malirelated Sanctions, https:// www.treasury.gov/resource-center/ sanctions/Programs/pages/mali. aspx [https://perma.cc/76PA58H7]; U.S. Dep’t of the Treasury, Nicaragua-related Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/pages/nicaragua.aspx [https://perma.cc/3SVD-EG9J]; U.S. Dep’t of the Treasury, S o u t h S u d a n - r e l at e d Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/pages/south_sudan. aspx [https://perma.cc/562S5V59] [hereinafter South Sudanrelated Sanctions]; U.S. Dep’t of the Treasury, Syria-Related Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/Pages/northeast_syria. aspx [https://perma.cc/PJ4ZSBNG]; U.S. Dep’t of the Treasury, Ukraine-/Russiarelated Sanctions, https:// www.treasur y.gov/resourcecenter/sanctions/Programs/Pages/ ukraine.aspx [https://perma. cc/FD7J-MDW7] [hereinafter U k r a i n e - / R u s s i a - r e l at e d Sanctions]; Venezuela-Related Sanctions, supra note 3. 17. S o u t h S u d a n - r e l a t e d Sanctions, supra note 16; U.S. Dep’t of the Treasury, YemenRelated Sanctions, https:// www.treasur y.gov/resourcecenter/sanctions/Programs/pages/ yemen.aspx [https://perma.cc/ X9AP-8YX7]; U.S. Dep’t of

t h e Tr e a s u r y , B u r u n d i Sanctions, https://www.treasury. gov/resource-center/sanctions/ Programs/pages/burundi.aspx [https://perma.cc/4PZC-66FC]; North Korea Sanctions, supra note 3. 18. U.S. Dep’t of the Treasury, OFAC Specially Designated N at i o n a l s a n d B l o c k e d Persons List (Oct. 23, 2019), https://www.treasury.gov/ofac/ downloads/sdnlist.pdf [https:// perma.cc/PJV2-42L6]. 19. Dep’t of the Treasury, Revised Guidance on Entities Owned by Persons Whose Property and Interests in Property are Blocked (Aug. 13, 2014), https:// www.treasury.gov/resource-center/ sanctions/Documents/licensing_ guidance.pdf [https://perma. cc/RC2T-QQHM] [hereinafter Revised Guidance]. 20. U k r a i n e - / R u s s i a - r e l at e d Sanctions, supra note 16. 21. Venezuela-Related Sanctions, supra note 3. 22. S e e U . S . D e p ’t o f t h e Treasury, Sectoral Sanctions Identifications (SSI) List, h t t p s : / / w w w. t r e a s u r y. g o v / resource-center/sanctions/ SDN-List/Pages/ssi_list.aspx [https://perma.cc/VCQ8EPWW] [hereinafter Sectoral Sanctions Identifications (SSI) List]; see also Exec. Order No. 13,662, 79 Fed. Reg. 56 (Mar. 24, 1994), https://www.treasury. gov/resource-center/sanctions/ Programs/Documents/ukraine_ eo3.pdf [https://perma.cc/4CQJ7ZA9]. 23. See, e.g., 31 C.F.R. § 560.314 (2018). 24. See 31 C.F.R. § 515.329 (2018). 25. 31 C.F.R. § 560.215 (2018). 26. 31 C.F.R. §560 (2018); See e.g., Dep’t of the Treasury, Iranian Transactions and Sanctions Regulations 31 C.F.R. Part 560 (2018), https://www.treasury. gov/resource-center/sanctions/ Programs/Documents/iran_glh. pdf [https://perma.cc/BPA4AC7Q]. 27. See U.S. Dep’t of the Treasury, Revocation of JCPOA-Related General Licenses; Amendment of the Iranian Transactions and Sanctions Regulations; P u b l i c at i o n o f U p d at e d FAQs, https://www.treasury.gov/ resource-center/sanctions/OFACEnforcement/Pages/20180627. 32

Currents 24.1 2020

aspx [https://perma.cc/WGF9XZDB]. 28. Se e A s h i s h Ku m a r Se n , A Brief History of Sanctions on Iran, Atlantic Council (May 8 , 2 0 1 8 ) , h t t p s : / / w w w. atlanticcouncil.org/blogs/newatlanticist/a-brief-history-ofsanctions-on-iran/ [https://perma. cc/J4K2-SQVW]. 29. See Dep’t of the Treasury, A Fr a m ewo r k f o r O FAC Compliance Commitments 11, https://www.treasury.gov/ resource-center/sanctions/ Documents/framework_ofac_ cc.pdf [https://perma.cc/5QCNP3UR]. 30. Seven Companies Sanctioned Under the Amended Iran Sanctions Act, U.S. Dep’t of the Treasury, https://2009-2017.state.gov/r/ pa/prs/ps/2011/05/164132. htm [https://perma.cc/C7UGUWRZ]. 31. See U.S. Dep’t of the Treasury, Treasury Sanctions Venezuela’s State-Owned Oil Company Petroleos de Venezuela, S.A., https://home.treasury.gov/news/ press-releases/sm594 [https:// perma.cc/342U-7E4A]. 32. Venezuela-Related Sanctions, supra note 3. 33. See generally Sectoral Sanctions Identifications (SSI) List, supra note 22 (listing for determining sanctions); see generally U.S. D e p’t o f t h e Tr e a s u r y , Office of Foreign Assets Control Sectoral Sanctions Identification List (2018), https://www.treasury.gov/ofac/ downloads/ssi/ssilist.pdf [https:// perma.cc/UK8V-UDM9]. 34. See Revised Guidance, supra note 19. 35. See U.S. Dep’t of the Treasury, Directive 2 (As Amended on Sept. 29, 2017) under Exec. Order 13662 (2017), https:// www.treasury.gov/resource-center/ sanctions/Programs/Documents/ eo13662_directive2_20170929. pdf [https://perma.cc/QY88D5YE]. 36. See U.S. Dep’t of the Treasury, Directive 4 (As Amended on Oct. 31, 2017) under Executive Order 13662 (2017), https:// www.treasury.gov/resource-center/ sanctions/Programs/Documents/ eo13662_directive4_20171031. pdf [https://perma.cc/3WXWCY4C]. 37. Id.


38. 39. 40. 41.

31 C.F.R. § 560.204 (2018). 31 C.F.R. § 560.208 (2018). 31 C.F.R. § 560.417 (2018). Venezuela-Related Sanctions, supra note 3. 42. U.S. Dep’t of Commerce, Bu re au o f I n d u s t ry a n d Securit y, https://www.bis. doc.gov/index.php/documents/ regulation-docs/410-part-730general-information/file [https:// perma.cc/KA32-G42H]. 43. See Bureau of Industry and Security, De Minimis Rules and Guidelines, https://www.bis. doc.gov/index.php/documents/ pdfs/1382-de-minimis-guidance/ file [https://perma.cc/43F4NA82]. 44. Bureau of Industry and Security, Encryption and Export Administration Reglations (EARs), https://www.bis.doc.gov/ index.php/policy-guidance/encryption [https://perma.cc/9T7E3MGF]. 45. Title XVII—Review of Foreign Investment and Export Controls, H.R. 5515—538, 115th Cong. § 1701 (2018), https:// home.treasury.gov/sites/default/ files/2018-08/The-ForeignInvestment-Risk-ReviewModernization-Act-of-2018FIRRMA_0.pdf [https://perma. cc/3PXA-M4G4]. 46. 15 C.F.R. § 734.13 (2016). 47. 15 C.F.R. § 760 (2019); see also 50 U.S.C. §1701 (2012). 48. Bureau of Industry & Security, Office of Antiboycot t Compliance (OAC), https:// www.bis.doc.gov/index.php/ enforcement/oac [https://perma. cc/XQN9-CPN2]. 49. Id. 50. Daniel B. Pickard, Lori Scheetz & Tessa Capeloto, Treasury Publishes List of Boycotting Countries, Wiley Rein LLP (Jan. 28, 2016), https:// www.wileyrein.com/newsroomarticles-Treasury-Publishes-Listof-Boycotting-Countries.html [https://perma.cc/YNC2-LCAN]. 51. S. 1, 116th Cong. § 402 (2019). 52. Id. 53. Brian Haus & Kate Ruane, In Congress, a Threat to Americans’ First Amendment Right to Boycott, ACLU Blog (Jan. 28, 2019, 3:00 PM), https://www.aclu.org/ blog/free-speech/congress-threatamericans-first-amendment-rightboycott. 54. About Harmonized Tariff Schedule, USITC, https://www. usitc.gov/harmonized_tariff_ information [https://perma. cc/FBE9-6P2W]; see also U.S. Customs & Border Protection, Tips for New Importers and

Trade Representative, $300 Billion Trade Action (List 4), https://ustr.gov/issue-areas/ enforcement/section-301investigations/section-301china/300-billion-trade-action (last visited Oct. 18, 2019); see also Int’l Trade Admin., Current Foreign Retaliatory Actions, https://www.trade.gov/mas/ ian/tradedisputes-enforcement/ retaliations/tg_ian_002094.asp (last visited Oct. 18, 2019). 65. Brock R. Williams & Keigh E. Hammond, Cong. Research Serv., IF1110943, Escalating U.S. Tariffs: Timeline (2019). 66. Id. 67. Ana Swanson, Trump Reaches ‘Phase 1’ Deal With China and Delays Planned Tariffs, N.Y. Times (Oct. 11, 2019), https://www.nytimes.com/2019/10/11/business/ economy/us-china-trade-deal. html. 68. 19 U.S.C. § 1673 (2012). 69. Id. § 1671. 70. 15 U.S.C. § 45 (2012). 71. 19 C.F.R. § 207.10 (2019). 72. Id. § 354.6. 73. Id. § 351.211. 74. President Donald Trump, Remarks by President Trump on the United States – Mexico – Canada Agreement (Oct. 1, 2018) [https:// perma.cc/3KUP-F268]. 75. See Office of the U.S. Trade R e p. , Th e U n i t e d S tat e s Officially Withdraws from the Trans-Pacific Partnership (2017), https://ustr.gov/aboutus/policy-offices/press-office/ press-releases/2017/january/USWithdraws-From-TPP [https:// perma.cc/C2XU-X5YU]. 76. Office of the U.S. Trade Rep., Agreement between the United States of America, the United Mexican States, and Canada 05/30/10 Text (2019), https://ustr.gov/trade-agreements/ free-trade-agreements/unitedstates-mexico-canada-agreement/ agreement-between [https:// perma.cc/J7VF-F3BR]. 77. John S. Baker & Lindsey Keiser, N A F TA / U S M C A D i s p u t e Settlement Mechanisms and the Constitution, 50 U. Miami InterAm L. Rev. 1, 7 (2019) (“The language of NAFTA’s Chapter 19 was carried over almost verbatim to the USMCA Chapter 10 with a few new additions for digitizing filing and decisions.”); see also Cherie O. Taylor, Twenty-First Century Trade Policy: What the U.S. has Done & What It Might Do, 23 Currents: J. Int’l Econ. L. 49, 56 (2019) (“The proposed USMCA contains chapters covering all of the original

Exporters (Feb. 27, 2019), https://www.cbp.gov/trade/basicimport-export/importer-exportertips [https://perma.cc/K2RS6C5B]. 55. Mineral Fuels, Mineral Oils, and Products of Their Distillation; Bituminous Substances; Mineral Waxes, 2019 Harmonized Tariff Schedule of the United States 27-5 (2019). 56. Office of the U.S. Trade Representative, Generalized System Preferences (GSP), https://ustr.gov/issue-areas/ trade-development/preferenceprograms/generalized-systempreference-gsp [https://perma. cc/5ZB3-G5JL]. 57. Office of the U.S. Trade Representative, Preference Programs, https://ustr.gov/ issue-areas/preference-programs [https://perma.cc/EA8N-KQLC]. 58. S e e , e . g . , U . S . T r a d e R e p re s e n tat i v e , U . S . Generalized System of Preferences: GUIDEBOOK 6 (2017), https://ustr.gov/ sites/default/files/gsp/GSP%20 Guidebook%20March%202017. pdf. 59. Rachel F. Fefer Et Al., Cong. R e s e a rc h S e rv. , R 4 5 2 4 9 , Section 232 Investigations: O verview and Issues for Congress 7 (2019) [https:// perma.cc/8WMQ-HFB2]. 60. Id. 61. Id. at 9-10. 62. Id. at 8. 63. Office of the U.S. Trade R e p r e s e n tat i v e , C h i n a Section 301–Tariff Actions and Exclusion Process, https:// ustr.gov/issue-areas/enforcement/ section-301-investigations/tariffactions [https://perma.cc/B2GHW4XD]. 64. Office of the U.S. Trade Representative, $34 Billion Trade Action (List 1), https:// ustr.gov/issue-areas/enforcement/ section-301-investigations/ section-301-china/34-billiontrade-action (last visited Oct. 18, 2019); Office of the U.S. Trade Representative, $16 Billion Trade Action (List 2), https:// ustr.gov/issue-areas/enforcement/ section-301-investigations/ section-301-china/16-billiontrade-action (last visited Oct. 18, 2019); Office of the U.S. Trade Representative, $200 Billion Trade Action (List 3), https:// ustr.gov/issue-areas/enforcement/ section-301-investigations/ section-301-china/200-billiontrade-action (last visited Oct. 18, 2019); Office of the U.S.

78.

79.

80.

81.

NAFTA topics as well as most of the newer topics.”). Office of the U.S. Trade Rep., U. S.-UK Trade Agreement Negotiations, https://ustr. gov/countries-regions/ europe-middle-east/europe/ united-kingdom/us-uk-tradea g r e e m e n t - n e g o t i at i o n s [https://perma.cc/8LTK-LR8Y]. Cathleen D. Cimino-Isaacs & Brock R. Williams, Cong. Research Serv., IF11120, U.S.-Japan Trade Agreement Negotiations (2019) [https:// perma.cc/8JH3-AQR2]. Office of the U.S. Trade Rep., Fact Sheet on U.S.-Korea Free Trade Agreement Outcomes (2018), https://ustr.gov/about-us/ policy-offices/press-office/factsheets/2018/september/fact-sheetus-korea-free-trade [https://perma. cc/N7ET-7R9Y]. Office of the U.S. Trade Representative, U.S.-Japan Trade Agreement Text (2019), https:// ustr.gov/countries-regions/japankorea-apec/japan/us-japan-tradeagreement-negotiations/us-japantrade-agreement-text.

33

Currents 24.1 2020


Anti-Bribery Laws and Investigation: Background J O R D A N

S L O A N E

—————————————————

have grown. There is the U.N. Convention

office; or to any other person knowing that

I. Impact of Corruption

Against Corruption (UNCAC) created in

something of value will be offered, given or

2003. UNCAC provides for mutual legal

promised directly or indirectly, to a foreign

assistance and cooperation on the recovery

government official for the purposes of

of assets. The Organisation for Economic Co-

influencing official action, inaction of the

Operation and Development (OECD) also

foreign government official; or inducing the

developed the Anti-Bribery Convention in

foreign government official to do or omit

1997 to establish “legally binding standards to

an action in violation of his lawful duty; or

criminalise bribery of foreign public officials

inducing the foreign government official to

in international business transactions” and

use his influence to affect an act or decision

to provide for a host of related measures

of the foreign government; or to secure an

that make this effective. The Anti-Bribery

improper advantage.

————————————————— Corruption affects governments, economics, and institutions. Corruption corrodes government and pushes out honest officials. Corruption also distorts economies. The empirical studies suggest there is a negative correlation between perceived levels of corruption and foreign direct investment. The main concern is how corruption impacts growth. Finally, corruption undermines support for democratic institutions. The impact of corruption has led to the U.S. Foreign Corrupt Practices Act (FCPA) and many other anti-corruption acts around the world that interact to help fight corruption. See https://www.sec.gov/spotlight/fcpa/ fcpa-resource-guide.pdf and https://www. justice.gov/criminal-fraud/foreign-corruptpractices-act. —————————————————

II. Multilateral Response ————————————————— The U.S. led the push for a multilateral response to anti-corruption. Previously, the U.S. was the only country with a statute forbidding the payment of bribes to foreign public officials. Since 1977, when the FCPA was passed, multilateral efforts

Convention is the first and only international

There are two affirmative defenses. The

anti-corruption instrument focused on the

FCPA does not apply to: (1) if the payment

supply side of the bribery transaction. In

was lawful under the written laws of the

response to OECD efforts, the U.K. created

country concerned; or (2) if the payment

its Bribery Act in 2010, regarded as stricter

or gift was a reasonable and bona fide

than the U.S. legislation. See https://www.

expenditure directly related to promotion/

oecd.org/corruption/ and https://www.sec.

demonstration of products or services or to

gov/spotlight/fcpa/fcpa-resource-guide.pdf.

the execution or performance of the contract.

—————————————————

Such payments need to be recorded under the

III. FCPA

books/records requirements discussed below.

————————————————— The FCPA applies to any unlawful act by any issuer, domestic concern or person acting within the U.S. corruptly, which requires intent to make any offer, payment, promise to pay or to authorize payment of anything of value to a foreign official, international organization official, political party, party official, or candidate for public 34

Currents 24.1 2020

See https://www.sec.gov/spotlight/fcpa/fcparesource-guide.pdf and https://www.sec.gov/ spotlight/fcpa/fcpa-anti-bribery.pdf. A. FCPA’s Two Main Sections and Two Main Enforcement Agencies The FCPA continues to be the most important anti-bribery act in the U.S. The FCPA continues to be enforced by two agencies. The Securities and Exchange


Commission (SEC), handles civil matters

structures are being used to reward self-

an issuer? “A company is an issuer under

in relation to FCPA. The Criminal Division

policing, self-reporting, remediation and

the FCPA if it has a class of securities

of the Department of Justice (DOJ)

cooperation. See https://www.sec.gov/

registered under Section 12 of the Exchange

implements the FCPA by providing guidance

spotlight/fcpa/fcpa-resource-guide.pdf.

Act or is required to file periodic and other

to companies that ask questions about the applicability of the FCPA to its dealings called the FCPA Opinion Procedure and coordinates prosecution with other countries. The DOJ announced that its top enforcement priority was the FCPA. See https://www.sec. gov/spotlight/fcpa/fcpa-resource-guide.pdf and https://www.justice.gov/criminal-fraud/ fcpa-guidance. The FCPA has two main sections: one is the disclosure rules (“books and records”), which is dealt with by the SEC, and second is the anti-bribery provisions prohibiting the payment of bribes, which is dealt with

As the introduction is a brief background of anti-bribery laws and investigation: the FCPA will be discussed in further detail below, starting with Part IV which will discuss and breakdown the elements of the FCPA. Part V will discuss the enforcement agencies of the FCPA. Lastly, Part VI will discuss the sanctions and penalties against violators of the FCPA. —————————————————

IV. Breakdown of the AntiBribery Elements of the FCPA —————————————————

by the Criminal Division of the DOJ. See

A. Any Issuer Acting Within the United

https://www.sec.gov/spotlight/fcpa/fcpa-

States

resource-guide.pdf and https://www.justice. gov/criminal-fraud/fcpa-guidance. B. Violation of the FPCA As to violators of the FPCA, they can receive criminal penalties, which can be imposed against companies, and officers, directors, stockholders, and employees

reports with SEC under Section 15(d) of the Exchange Act.” The National Securities Exchange can help as they provide a list on the website below. Another way to tell if your company is an issuer is if the company’s stock trades in the over-the-counter market in the U.S. and the company is required to file SEC reports. To see if your company has filed SEC reports go to this website listed. See http:// www.sec.gov/edgar/searchedgar/webuser. htm, https://www.sec.gov/spotlight/fcpa/ fcpa-anti-bribery.pdf, and https://www. justice.gov/sites/default/files/criminal-fraud/ legacy/2012/11/14/fcpa-english.pdf. What is a domestic concern? “A domestic concern is any individual who

The first element of the FCPA states

is a citizen, national, or resident of the

that it is unlawful for any issuer, domestic

U.S., or any corporation, partnership,

concern or person acting within the U.S.

association, joint-stock company, business

to make use of the mails or any means or

trust, unincorporated organization, or sole

instrumentality of interstate commerce

proprietorship that is organized under the

corruptly. See https://www.sec.gov/spotlight/

laws of the U.S.” An individual’s assignees

fcpa/fcpa-anti-bribery.pdf.

also are covered. See https://www.sec.gov/ spotlight/fcpa/fcpa-anti-bribery.pdf.

as well as imprisonment for individuals.

Who is covered by the anti-bribery

The SEC can also bring civil suits for

provisions? The FCPA provisions apply to

What are certain persons and entities

damages. In addition, there are many other

a broad spectrum of persons and entities,

acting while in the territory of the United

possible sanctions such as $250,000 and/

including: (1) issuers and their assignees, such

States? The FCPA applies to certain foreign

or 5 years imprisonment for individuals,

as, their officers, directors, employees, agents,

nationals or entities “that either directly

$200,000,000 for corporations, and $10,000

and shareholders; (2) domestic concerns and

or through an agent, engage in any act in

civil penalty (corporations and individuals).

their officers, directors, employees, agents,

furtherance of a corrupt payment while in the

In the alternative, there is an act called the

and shareholders; and (3) certain persons

territory of the U.S.” The FCPA also applies

Alternative Fine Act, which the fine could

and entities acting while in the territory of

to foreign nationals or entities’ assignees as

be up to twice the gross gain sought by the

the U.S., other than issuers and domestic

well. See https://www.sec.gov/spotlight/fcpa/

illicit payment. The SEC is increasingly using

concerns. See https://www.sec.gov/spotlight/

fcpa-anti-bribery.pdf.

the option of seeking disgorgement of all the

fcpa/fcpa-anti-bribery.pdf.

profits from the violations. The sentencing

How can you tell if your company is

B. Corruptly “[A]n offer, promise, or authorization

35

Currents 24.1 2020


of payment, or a payment, to a government

Gifts with an improper purpose entails

agency or, or instrumentality thereof, or

official must be made corruptly.” Congress

a larger or more extravagant gift. The “DOJ

of a public international organization, or

added that corruptly means an intent or

and SEC enforcement cases have involved

any person acting in an official capacity for

desire to wrongfully influence. Corruption

single instances of large, extravagant gift-

or on behalf of any such government or

first starts with “payments intended to induce

giving, such as a sports car, fur coats, and

department, agency, or instrumentality, or for

or influence a foreign official to use his or her

other luxury items, as well as, widespread

or on behalf of any such public international

position in order to assist…in obtaining or

gifts or smaller items as part of a pattern of

organization.” See https://www.sec.gov/

retaining business for or with, or directing

bribes.” See https://www.sec.gov/spotlight/

spotlight/fcpa/fcpa-anti-bribery.pdf.

business to, any person.” This is known as

fcpa/fcpa-anti-bribery.pdf.

the “business purpose test.” Examples of actions taken to obtain or retain business include, winning a contract, influencing the procurement process, circumventing the rules of importation of products, gaining access to non-public bid tender information, evading taxes or penalties, influencing the adjudication of lawsuits or enforcement actions, obtaining exceptions to regulations, and avoiding contract termination. See https://www.sec.gov/spotlight/fcpa/fcpaanti-bribery.pdf.

Department, agency or instrumentality

Payment of travel and entertainment

of a foreign government is also included

expenses with an improper purpose entails

in the definition of foreign official. The

“the conjunction with other conduct

DOJ and SEC continues to bring FCPA

reflecting systemic bribery or other clear

cases involving bribes paid to employees of

indicia of corrupt intent.” A DOJ and

agencies and instrumentalities of foreign

SEC case involving a California based

governments. See https://www.sec.gov/

telecommunications company is an

spotlight/fcpa/fcpa-anti-bribery.pdf.

example of improper payment of travel and entertainment expenses because the company spent nearly $7 million on approximately 225 trips for its customers in order to obtain systems contracts in China. See https://www.

Public international organizations are also included as an expansion of foreign official to include employees and representation of public international organizations. A public international organization includes any

C. To make any offer, payment, promise to

sec.gov/spotlight/fcpa/fcpa-anti-bribery.pdf.

pay or to authorize payment of anything

Other things of value include charitable

under the International Organizations

contributions. The FCPA does not prohibit

Immunities Act or any other organization

Anything of value includes large amount

charitable contributions unless used to funnel

that the President so designates. Examples

of cash, gifts, travel, entertainment, and

bribes to government officials. Charitable

of public international organizations are the

other things of value. Giving anything of

contributions cannot be used to conceal

World Bank, the International Monetary

value is not prohibited unless anything of

payment made to corruptly influence foreign

Fund, the World Intellectual Property

value is disguised as payments of bribes. See

officials. See https://www.sec.gov/spotlight/

Organization, the World Trade Organization,

https://www.sec.gov/spotlight/fcpa/fcpa-

fcpa/fcpa-anti-bribery.pdf.

and the OECD. See https://www.sec.gov/

of value.

anti-bribery.pdf. Cash with an improper purpose entails companies maintaining cash funds specifically for the use as bribes. An example includes, “one U.S. issuer headquartered in Germany disbursed corrupt payments from a corporate cash desk and used offshore bank accounts to bribe government officials to win contracts.” See https://www.sec.gov/ spotlight/fcpa/fcpa-anti-bribery.pdf.

D. Foreign Official “Foreign official” means any foreign

spotlight/fcpa/fcpa-anti-bribery.pdf. E. Payments to Third Parties/Knowing

political party, any candidate for foreign

The FCPA “prohibits corrupt payments

political office, or any person. Even though

made through third parties or intermediaries,”

they are split into categories, the term

which covers “any other person knowing that

“foreign official generally refers to an

something of value will be offered, given or

individual falling within any of these three

promised directly or indirectly, to a foreign

categories.” Therefore, the FCPA defines

government official.” According to the SEC,

foreign official as “any officer or employee

a bribe that is paid by a third party does

of a foreign government or any department,

not preclude potential liability for criminal

36

Currents 24.1 2020

organization designated by executive order


or civil under the FCPA. For example, a

take to fight corruption. See https://www.

remarks-34th-international-conference-

company used agents, a British lawyer, and a

sec.gov/spotlight/fcpa/fcpa-anti-bribery.pdf.

foreign.

Japanese trading company to bribe Nigerian

—————————————————

government officials in order to win a series of liquified natural gas construction projects. See https://www.sec.gov/spotlight/fcpa/fcpaanti-bribery.pdf.

V.

Enforcement

—————————————————

In addition to the Attorney General’s remarks, the FCPA Corporate Enforcement Policy was revised. “The new policy enables the Department of Justice to efficiently

A. Domestic

identify and punish criminal conduct, and

Knowing entails awareness by the person

i. Criminal Division of the Department

it provides guidance and greater certainty

that he or she is engaging in such conduct and

of Justice & Enforcment Division of

for companies struggling with the question

such conduct is substantially certain to occur

the SEC

of whether to make voluntary disclosures of

or has a firm belief that such circumstances

In November 2012, A Resource Guide

wrongdoing.” Since 2016, the Fraud Section’s

will occur. Congress includes not only those

to the United States Foreign Corrupt Practices

FCPA Unit has secured criminal resolutions

individuals who have actual knowledge of

Act was released. This guide reflects the

in 17 FCPA-related corporate cases, resulting

wrongdoing but also who purposefully avoid

DOJ and SEC's detailed compilation of

in penalties and forfeiture to the Department

actual knowledge; deliberately ignoring

information about the FCPA, its provisions,

in excess of $1.6 billion. See https://www.

or consciously disregarding information

and enforcement. See https://www.justice.

justice.gov/opa/speech/deputy-attorney-

that should have alerted the company to

gov/criminal-fraud/fcpa-guidance .

general-rosenstein-delivers-remarks-34th-

a high probability of illicit payments. See https://www.sec.gov/spotlight/fcpa/fcpaanti-bribery.pdf . F. All for the Purpose

The DOJ has “both criminal and civil enforcement responsibility for the FCPA’s anti-bribery provisions over

international-conference-foreign and https:// www.justice.gov/criminal-fraud/file/838416/ download.

domestic concerns.” The Fraud Section

The DOJ also provides a Foreign

Conduct in violation of the FCPA

within the DOJ has primary responsibility

Corrupt Practice Act Opinion, which

must be “all for the purpose” of influencing

for all FCPA matters, regularly working

enables issuers and domestic concerns to

official action or inaction, inducing foreign

with U.S Attorney’s Offices around the

obtain an opinion of the Attorney General

government officials to act or omit to act in

country. The DOJ also works with the

as to whether certain specified conduct

violation of some lawful duty, inducing the

Federal Bureau of Investigation (FBI) to

conforms with the Department’s present

foreign government official to use influence

investigate FCPA violations. FBI Unit is

enforcement policy regarding the anti-

to affect an act or decision of the foreign

dedicated to international corruption and

bribery provisions of the FCPA. See https://

government, or securing an improper

fraud investigation. In 2017, the Attorney

www.justice.gov/sites/default/files/criminal-

advantage. Therefore, to help protect

General said that “the Criminal Division’s

fraud/legacy/2012/11/14/frgncrpt.pdf .

the economy and nation against foreign

Fraud Section within the DOJ, together

In 2 0 1 8 , t h e D O J a n n o u n c e d

corruption, the U.S. decided to enforce the

with Assistant U.S. Attorneys and law

many changes to policies and procedures

FCPA to combat corruption around the

enforcement partners, continue to secure

regarding enforcement of the anti-bribery

globe. To help with combating corruption

convictions in important FCPA-related

and corruption laws. First, in May 2018,

and enforcing the FCPA, two enforcement

cases” and “working together with the

the Deputy Attorney General at that

agencies were created to make enforcing the

international partners headway is being made

time announced the DOJ’s Policy on

FCPA their main priority. Discussed below

in combatting corruption.” See https://www.

Coordination of Corporate Resolution

in detail will be the extensive efforts by the

sec.gov/spotlight/fcpa/fcpa-anti-bribery.pdf

Penalties. Its purpose is aimed at avoiding

members of the DOJ and SEC to enforce the

and https://www.justice.gov/opa/speech/

the imposition of duplicative and punitive

FCPA and the approaches and priorities they

deputy-attorney-general-rosenstein-delivers-

penalties by multiple enforcement agencies

37

Currents 24.1 2020


and regulators in corporate enforcement

In addition to the anti-bribery provisions,

actions. “This policy has been incorporated

the FCPA contains accounting provisions

into the Justice Manual to encourage

applicable to public companies. The FCPA’s

prosecutors to coordinate with and consider

account provisions operate with the anti-

the amount of fines, and penalties in order

bribery provisions and do not allow off-the-

to avoid piling on penalties that could be

books accounting. “Companies and investors

cumulatively excessive. Second, in October

rely on financial statements and internal

2018, the Assistant Attorney General for the

accounting controls to ensure transparency

DOJ’s Criminal Divisions at that time issued

in the financial health of the business, the

a memorandum providing new guidance to

risks undertaken, and the transactions

Criminal Division staff on the standards,

between the company and its customers and

policy, and procedures for the selection

business partners.” Therefore, the accounting

and imposition of monitors in negotiated

provisions were created to “strengthen the

corporate settlements, including non-

accuracy of the corporate books and records

prosecution agreements, deferred prosecution

and the reliability of the audit process which

agreements, and plea agreements. Third,

constitute the foundations of our system of

the DOJ’s new China Initiative announced

corporate disclosure.”

Accounting Provisions Books and records of a company are a place where bribery can spark. Books and records are often mischaracterized in companies. There is a list of bribery mischaracterization as commissions or royalties, consulting fees, sales and marketing expenses, scientific incentives or studies, travel and entertainment expenses, rebates or discounts, after sales services fees, miscellaneous expenses, petty cash withdrawals, free goods, intercompany accounts, supplier/vendor payments, writeoffs, and customs intervention payments. See https://www.sec.gov/spotlight/fcpa/fcparesource-guide.pdf . e. Dealing with the Disclosure of “Books

by then-Attorney General Jeff Sessions,

c. Dealing with the Disclosure of “Books

in November 2018, includes as one of its

and Records”: Who is Covered by the

and Records”: Two Primary Components

ten priorities the identification of FCPA

Accounting Provisions

of the Accounting Provisions

cases that involve Chinese companies that compete with American business. See https://www.arnoldporter.com/en/ perspectives/publications/2019/01/globalanticorruption-insights. ii. Securities and Exchange Commission (SEC)

First is the books and records provision, which entail that issuers must make and keep books, records and accounts that, in reasonable detail, accurately and fairly resembles an issuer’s transactions and dispositions of an issuer’s assets. Second is the “internal controls provisions, which

a. Dealing with the Disclosure or “Books

entail that issuers must devise and maintain

and Records”: SEC Enforcement Actions

a system of internal accounting controls

“In 2010, the SEC’s Enforcement

sufficient to assure management’s control,

Division created a specialized unit to further enhance its enforcement of the FCPA, which prohibits companies issuing stock in the U.S. from bribing foreign officials for government contacts and other business.” See https:// www.sec.gov/spotlight/fcpa/fcpa-cases.shtml (includes SEC Enforcement Actions: FCPA Cases up to 2019).

authority, [and] responsibility over the firm’s assets.” The accounting provisions led the way in preventing bribery; in the past, “corporate bribery has been concealed by the falsification of corporate books and records and the accounting provisions removed this avenue of coverup.” See https://www.sec.gov/spotlight/ fcpa/fcpa-resource-guide.pdf.

b. Dealing with the Disclosure of “Books

d. Dealing with the Disclosure of “Books

and Records: Accounting Provisions

and Records”: What is Covered by the 38

Currents 24.1 2020

“The FCPA’s accounting provisions apply to every issuer that has a class of securities registered pursuant to Section 12 of the Exchange Act or that is required to file annual or other periodic reports pursuant to Section 15(d) of the Exchange Act.” Therefore “the provisions apply to any issuer whose securities trade on a national securities exchange in the U.S., including foreign issuers with exchange-traded American Depository Receipts” as well as “companies whose stock trades in the over-the-counter market in the U.S.” See https://www.sec. gov/spotlight/fcpa/fcpa-resource-guide.pdf and https://www.justice.gov/sites/default/ files/criminal-fraud/legacy/2012/11/14/ fcpa-english.pdf. f. Dealing with the disclosure of “books and records”: United States laws The U.S. laws, including the SEC rules, require issuers to partake in an annual


external audit of their financial statements,

to monitor other countries to ensure they are

individuals decide what needs to be done

which also must be available to the public

abiding by their international obligations

differently to comply with the bribery acts.

by filing them with the SEC. There is also

and vice versa. See https://www.sec.gov/

See https://www.justice.gov.uk/downloads/

the Public Company Accounting Oversight

spotlight/fcpa/fcpa-anti-bribery.pdf, http://

legislation/bribery-act-2010-quick-start-

Board (PCAOB) overseen by the SEC

www.oecd.org/corruption/anti-bribery/,

guide.pdf and https://www.sec.gov/spotlight/

regarding the accounting provisions. https://

and https://www.justice.gov/criminal-fraud/

fcpa/fcpa-resource-guide.pdf.

www.sec.gov/spotlight/fcpa/fcpa-resource-

international-agreements.

—————————————————

guide.pdf. B. International i. The OECD The OECD was created in 1961. Accordingly, the OECD is an organization that brings together anti-corruption experts and practitioners from all over the world to share experiences, learn the ins and outs from each other, and build stronger networks. http://www.oecd.org/corruption/ international-co-operation-in-combatingforeign-bribery.htm. In 1988 Congress “requested that the President negotiate an international treaty with members of the OECD to prohibit bribery in international business transactions by many of the U.S.’ major trading partners.” The OECD became a member of the AntiBribery Convention as of November 1, 2012, as well as the U.S., and the OECD also created the OECD Working Group on Bribery. This “Group is responsible for monitoring the implementation of the Anti-Bribery Convention.” It has been stated in recent years that there has been a growth in international corruption that must be combated. Therefore, the U.S. and other countries are members to different international anti-corruption conventions. These conventions have a main purpose to prevent and take measures on combatting corruption. Many of the conventions maintain a review process that allows the U.S.

ii. International Response: UK Bribery Act 2010 vs. United States’ FCPA

V I . Vi o l at i o n s o f t h e F C PA a n d S a n c t i o n s

The UK implemented its bribery act

—————————————————

in 2010 dealing with bribery just like the

The FCPA requires different criminal and

FCPA; however, the UK’s act does not cover and is not concerned with fraud, theft, and specifically books and record offences. This is different from the FCPA as this act does cover and is concerned with books and

civil sanctions and penalties for companies and individuals. See https://www.sec.gov/ spotlight/fcpa/fcpa-resource-guide.pdf. A. Criminal Penalties

record offences. On the other hand, the UK

For a violation of the anti-bribery

does provide a similar process as the U.S.

provisions, the FCPA requires that

of complying with the anti-bribery rules.

corporations and other entities are subject

The FCPA includes a Compliance Program

to a fine of up to $2 million. Also, individuals

which requires any U.S. firm that is a publicly

are subject to a fine up to $250,000 and

traded firm must have adequate internal

imprisonment for up to five years. For a

controls to meet the books and records

violation of the accounting provisions, the

requirement of the FCPA. The elements

FCPA provides that corporations and other

of the U.S.’ Compliance Program are: (1)

business entities are subject to a fine up to

commitment from the top; (2) policies

$25 million. Also, individuals are subject to

and proportionate procedures; (3) record-

a fine up to $5 million and imprisonment

keeping; (4) risk assessment; (5) compliance

for up to twenty years. Under the Alternative

function (responsibility for oversight); (6)

Fine Act, courts have discretion to provide

implementing policies and procedure; (7)

a higher fine than the FCPA provides. See

training; (8) seeking guidance and advice;

https://www.sec.gov/spotlight/fcpa/fcpa-

(9) monitory; (10) how to deal with third

resource-guide.pdf.

parties; and (11) merger and acquisitions (see the FCPA Resource Guide for further explanation of each of the elements, which the link is provided below). The UK Bribery Act provides a similar process (see the link below for a comparison to the U.S.). The Compliance Programs implemented by the U.S. and the UK help companies and

B. United States Sentencing Guidelines The United States Sentencing Guidelines are used by the DOJ to help with calculating penalties for violations of the FCPA. The Guidelines provide a detailed structure for calculating penalties for FCPA violators and federal crimes. The first step in calculating penalties is calculating the “offense level” by

39

Currents 24.1 2020


examining the severity of the crime and the

civil action for anti-bribery violations by

of criminal and civil resolutions of FCPA

facts of the crime. Reductions are allowed

domestic concerns, foreign nationals, and

matters. For example, in criminal and

if there is cooperation and acceptance of

companies for violations while in the U.S.

civil cases a company may be required to

responsibility, and for business entities

The SEC has authority to obtain civil actions

appoint an independent corporate monitor

there are additional factors for reduction

against issuers and their officers, directors,

who assesses and monitors a company’s

such as voluntary disclosure, cooperation,

employees, agents, or stockholders for

compliance with the requirements. The

pre-existing compliance programs, and

violations of the anti-bribery and accounting

factors the DOJ and SEC consider when

remediation. The Guidelines provide

provisions. Violations of the anti-bribery

determining if a compliance monitor is

different penalties for the initial offense level

provisions by corporations and business

appropriate include, seriousness of the

for violations of the anti-bribery provisions

entities as well as individuals are subject

offense, duration of the misconduct, and

and initial offense level for violations of

to a civil penalty of up to $16,000 per

pervasiveness of the misconduct, including

the accounting provision. The violation

violation. For violations of the accounting

whether the conduct cuts across geographic

procedures of the accounting provision are

provisions, the SEC has authority to obtain

and/or product lines, nature and size of

generally the same as the violation procedures

a “civil penalty not to exceed the greater of

the company, quality of the company’s

of the anti-bribery provisions, expect that

(a) the gross amount of the pecuniary gain

compliance program at the time of the

the specific offense characteristics differ.

to the defendant as a result of the violations

misconduct, and subsequent remediation

For example, for violations of the FCPA’s

or (b) a specified dollar limitation.” The

efforts. See https://www.sec.gov/spotlight/

accounting provisions, the offense level may

specified dollar limitation is based on the

fcpa/fcpa-resource-guide.pdf.

be increased if a substantial part of the scheme

“egregiousness of the violation, ranging from

occurred outside the U.S. “The United States

$7,500 to $150,000 for an individual and

—————————————————

Guidelines are promulgated by the United

$75,000 to $725,000 for a company.” See

States Sentencing Commission, which is an

https://www.sec.gov/spotlight/fcpa/fcpa-

independent agency in the judicial branch.

resource-guide.pdf.

Its principal purpose is to establish sentencing policies and practices for the federal criminal justice system that will assure the ends of justice by promulgating detailed guidelines prescribing the appropriate sentences for offenders convicted of federal crimes.” See https://www.sec.gov/spotlight/fcpa/ fcpa-resource-guide.pdf and https://www. ussc.gov/guidelines. See also https://www. ussc.gov/sites/default/files/pdf/guidelinesmanual/2018/GLMFull.pdf. C. Civil Penalties Even though the DOJ has authority to obtain criminal actions and the SEC does not, both the DOJ and the SEC have authority to obtain civil enforcement authority under the FCPA. The DOJ has authority to obtain

Conclusion

————————————————— According to many articles and experts

D. Collateral Consequences FCPA violators can also face collateral consequences, such as “suspension or debarment from contracting with the federal government, cross-debarment by multilateral development banks, and the suspension or revocation of certain export privileges.” See https://www.sec.gov/spotlight/fcpa/fcparesource-guide.pdf.

the best course of action for a U.S. company is to include an FCPA provision in all of its agreements regarding distribution, licensing, and joint-ventures. The company needs to do this in order to enable the company to act as expected given the breadth of the statute. When a U.S. party comes across any type of suspicion, an investigation needs to be conducted to avoid imputation of knowledge or authorization. If the investigation supports

E. Compliance Monitor or Independent

the suspicions of the U.S.’ company, it may

Consultant

be necessary to terminate the relationship.

A main goal of both the criminal prosecution and civil enforcement against

See https://www.sec.gov/spotlight/fcpa/fcparesource-guide.pdf.

companies that violate the FCPA is to make

The FCPA disincentivizes corrupt

sure that the conduct does not happen

practices, protects investors, and provides

again. Therefore, enhanced compliance

a fair playing field for companies seeking

and reporting requirements can be a part

business based on quality and price rather

40

Currents 24.1 2020

VII.


than bribes. “Following Congress’ leadership in enacting the FCPA [forty-three] years ago, and through determined international diplomatic and law enforcement efforts in the time since, laws like the FCPA prohibiting foreign bribery have been enacted by most of the U.S.’ major trading partners.” With its enactment of the FCPA, the U.S. has proceeded as a torch and the world follows.

41

Currents 24.1 2020


Changing Landscape of International Anti-Bribery and Corruption Compliance M O D E R AT O R / PA N E L I S T: PA N E L I S T S :

J O Y

D O W D L E ,

M A R G A R E T S E R G I O

M O U S O U D A K I S

L E A L ,

D AV I D

S E A R L E

—————————————————

for foreign state-owned companies here in

have seen a huge wave of other countries

I.

the U.S.,9 such as Braskem or SinoPac. The

and jurisdictions implementing their own

law even extends to family members, and

enforcement laws.

there have been recent enforcement actions,

—————————————————

Introduction

————————————————— There are many ways to bribe, and corruption is prevalent everywhere. The World Bank estimates that 5% of the world economy–over one trillion dollars—is paid in bribes.1 Corruption issues arise in all areas of business. The history of global corruption law actually originated as a result of Watergate.2 When the Watergate investigation was ongoing, Congress was looking into the sources of the money going to the Nixon administration. The hearings revealed that a lot of American corporations had cash flush funds;3 of course, a company needed cash to bribe people. In response, Congress passed the Foreign Corrupt Practices Act (FCPA), which has two sections: the antibribery provisions and the books and records provisions.4 For a long time, the United States was the only nation with this law.

5

Scholars of corruption and corporate action find that the books and records provision often gets companies into the most trouble.6 The FCPA anti-bribery provisions prohibit directly or indirectly paying anything of value to a foreign government official7 and additionally require corrupt intent.8 What is difficult to navigate is the definition of “foreign official,” as it is broadly defined under U.S. law. “Foreign officials” may include individuals who work

specifically those against J.P. Morgan Chase, for employing the children of government officials.10 Further, FCPA’s “anything of value” language is not limited to cash and may include gifts or travel and expenses.11 Years ago, a rash of cases arose involving companies that paid the travel expenses of government officials, cloaked as “training trips.”12 Other examples include the provision of official consulting contracts, employment or business opportunities, household appliances, and cars.13 Bribes come in every form or fashion. The books and records provisions require that books and records be accurate with reasonable detail.14 The provisions also require good internal controls.15 Compliance programs are consistently working with control audits and other internal controls in the compliance group. There are of course possible penalties. Companies can be fined up to two million dollars for each violation.16 Individuals may also be sentenced and sent to prison in relation to corporate enforcement actions.17 The U.S. was alone for a long time in this area, and about twenty years later, the rest of the world started to promulgate their own anti-corruption laws.18 The last ten years 42

Currents 24.1 2020

I I . Th e R i s e o f Global Enforcement ————————————————— The FCPA was originally passed in 1977, but for twenty-plus years, there was very little enforcement.19 That is not to say that there were no enforcement actions brought but surely far fewer by today’s standards. The rest of the world has acquiesced in terms of enforcing anti-bribery laws. Even in countries that do not have robust anti-corruption enforcement, now far less refusal takes place with regard to recognizing the extraterritorial applications of anticorruption laws from countries like the U.S. and United Kingdom. The international landscape has changed, and there is more international participation and cooperation with enforcement. Enforcement efforts have increased. In 2007, a large Houston oil field services company, Baker Hughes, paid $44 million in fines and penalties to the U.S. Department of Justice (DOJ) and Securities and Exchange Commission (SEC), which at the time was the largest penalty ever paid for violations of the FCPA.20 Within one year, in 2008, Siemens AG paid twenty times that amount—$800 million just to DOJ. 21 Now, in 2019,


there have been several billion dollar plus

countries where they are required to conduct

bribery provisions to grant it jurisdiction

settlements. The fines paid by Siemens are

business with state-owned oil companies.

over an individual and the parent company,

no longer in the top three, although they

With all of the enforcement activity in

even if it involved a foreign executive in a

remain the fourth largest sum ever paid.

the energy sector, anti-bribery compliance

foreign country bribing a foreign national.28

Despite international conventions and

programs in this space have generally

That proposition was recently challenged in

organizations, such as the Organisation for

matured. There are less enforcement actions

court in line with DOJ’s enforcement trend

Economic Cooperation and Development

against such companies today.

toward bringing more and more cases against

(OECD), working against bribery, many

A further look at the type of companies

individuals.29 A case in the Second Circuit

Westernized countries have only just enacted

remaining on the top ten list is instructive.

last year placed limits on DOJ’s assertion of

anti-corruption laws within the last decade.

As mentioned, nine of the ten companies

jurisdiction against an individual, a foreign

are foreign. The jurisdictional nexus or

executive, who never entered the U.S. but,

For the last several years, DOJ and the

interest that the U.S. may have in bringing

as part of the bribery scheme, sent some

SEC have brought in combined penalties in

some of these actions is questionable. For

emails routed through U.S.-based servers.30

the billions of dollars. The U.S. is still the

example, in 2019 an enforcement action

The Second Circuit found that DOJ lacked

largest enforcer by far. At last count, the U.S.

was brought against the Russian telecom

jurisdiction to bring FCPA charges against

has brought over 75% of all foreign bribery

company Mobile TeleSystems (MTS),

that individual.31

cases. Cynics have said that this statute has

which paid about $850 million dollars in

become essentially a budget line item for

bribes to Uzbek government officials in an

Ten years ago the corruption case to

DOJ, thus motivating its enforcement.

attempt to make entry into the Uzbekistan

discuss was Panalpina, the now infamous

DOJ has dedicated more and more resources

telecommunications market. 23 Likewise,

customs broker that made improper payments

to these cases and grown the number of

VEON (formerly VimpelCom)–another

in order to assist clients with clearing oilfield

federal prosecutors solely dedicated to FCPA

company in the top ten list, number five–

equipment through West African nations.32

enforcement. With respect to investigations

paid hundreds of millions of dollars for the

The case against Panalpina spawned a series

against individuals, DOJ has been known

exact same type of misconduct.

of enforcement actions against its clients for

A. Trends in FCPA Enforcement

24

B. Targeted Industry Focus

to use a wide variety of prosecutorial tools,

Many of these foreign companies are

their role in authorizing or failing to stop the

namely subpoenas, search warrants, up to

publicly traded, which under the SEC books

and including wire taps or sting operations.

and records provision allows the agency to

Most of the enforcement actions in the

In terms of the trend towards larger

bring enforcement action against a parent

top ten list then were brought jointly by DOJ

fines and penalties, a brief glimpse at the top

company issuer, even if it was the foreign

and SEC. However, of late, there have been

ten cases reveals resolutions predominantly

subsidiary predominantly engaged in the

more settlements with just the SEC.34 The

occurring with foreign companies, KBR

relevant unlawful activities.25

SEC is limited to civil enforcement power.

improper payments.33

being the only U.S. company remaining on

Another factor is the lack of case law

Generally, it only brings charges under the

that list. Five years ago, that top ten list was

in this area. Consequently, DOJ has a

FCPA’s books and records provisions for

comprised of mostly U.S. companies. In fact,

reputation for taking aggressive positions

accounting or internal controls failures by

many Houston-based companies were on

when it comes to asserting jurisdiction under

companies. These cases, if brought by DOJ

that list. When FCPA enforcement picked

the FCPA.26 On the books and records side,

criminally against an individual or even

up during the 2007 to 2010 timeframe,

as long as the parent company is an issuer, it

a company, are generally hard to prove.

starting with the case against Baker Hughes,

is easy for either the SEC or DOJ to bring

DOJ must prove knowledge and intent.

a lot of energy companies in Houston were

the charges, regardless of any additional

Conversely, the SEC’s burden in bringing

faced with enforcement actions. Many energy

jurisdictional nexus with the U.S. In the

a civil action under books and records

companies operate in corruption-prone

past, DOJ has interpreted the FCPA’s anti-

provisions is less onerous, as they need

22

27

43

Currents 24.1 2020


not prove up subjective intent elements.

debarred. The company’s share price will

years began when Deputy Attorney General

Rather, the SEC may rely upon almost any

undoubtedly be negatively impacted. On the

Sally Yates issued a memo in 2015,45 in the

accounting discrepancy in an issuer’s books

other hand, individual wrongdoers may go

aftermath of the financial crisis that affirmed

and records and focuses on what it believes

unpunished. The Filip factors thus help guide

DOJ policy for seeking to hold individual

constitutes an internal controls violation.35

prosecutors in deciding not only whether

bad actors accountable. 46 Following the

Even if actual bribery did not take place, the

to bring criminal charges against a business

financial crisis, there was an abundance of

SEC can theoretically prove internal controls

entity but also where to begin settlement

public outcry focused on the fact that while

violations by alleging a failure to properly

discussions with these same entities. Almost

several large financial institutions settled

approve expense reports or a failure to follow

all of these cases are settled out-of-court and

for millions, or even billions, of dollars for

a process for approving payments to agents.36

utilize different tools to punish, in lieu of

their role in the crisis, few individuals were

In 2016, another trend in enforcement

non-prosecution, which may carry collateral

prosecuted. .There existed a similar trend with

began involving DOJ’s institution of a pilot

consequences. Many companies strongly

respect to FCPA enforcement. Companies

program, now a permanent part of FCPA

prefer to settle and avoid the consequences

were paying hundreds of millions of dollars

corporate charging policy. Essentially, the

of a trial, including the public airing of

in bribes and generally no individuals were

program allows a company to come forward

misconduct, the sting of a felony conviction,

criminally charged.

to DOJ and self-disclose misconduct, along

and severe fines.

37

43

Questions were raised as to whether

with a representation that it has or will fully

Filip factors numbers four, five, six,

DOJ should place a higher priority on the

remediate, cooperate, and disgorge any ill-

and seven, allow a company to significantly

prosecution of individuals, recognizing that

38

gotten gains as a result of its misconduct.

mitigate the possibility of a criminal

while companies can be prosecuted, they

If there are no other aggravating factors, then

charge, despite the severity of underlying

cannot serve time behind bars. On the other

a presumption of what is called a declination

misconduct. 44 A company cannot really

hand, a renewed focus on the prosecution

remains, such that the company itself will not

control the outcome once an offense has

of individuals presented challenges in that

be charged. The pilot program applies only

occurred. In other words, once the bribery

the required elements of scienter and intent

to business entities.

Individuals may still

offense is investigated, considerations of the

can be hard to prove, especially against

be prosecuted to the full extent of the law

seriousness of the violation, the pervasiveness

senior corporate executives who are often

consistent with DOJ policy, which seeks to

of the wrongdoing, and the history of

insulated from front-line decisions. As

hold individual wrongdoers accountable.41

the company’s conduct are factors out of

anyone who has worked on white collar

Under the pilot program, DOJ started to

its control. However, as reflected in the

cases knows, often within corporations that

publicly announce declinations for the first

other factors, what the company can do is

commit wrongdoing there is an unethical

time.

cooperate with the government, disclose the

environment created, not necessarily overtly

C. DOJ: The Decision to Bring a

offense, put in place an effective compliance

but perhaps by the leadership at the top,

Prosecution

program, and promptly remediate the effects

leading lower-level employees to engage

The Filip factors—named after former

of the alleged offense, such as terminating the

in the offending behavior. When the dust

U.S. Deputy Attorney General Mark Filip—

offending employee and implementing more

settles, those in the C-suite do not find

in the Justice Manual, guide DOJ prosecutors

effective standards and controls. If there is

themselves charged because prosecutors

in arriving at the prosecutorial determination

one takeaway from the Filip factor analysis,

realize they will have difficulty providing

to bring criminal charges against a business

it is that corporate wrongdoers have several

scienter and intent.

entity. The Filip factors recognize that when

options in order to avoid formal criminal

companies are criminally charged there may

charges.

39

40

42

be collateral effects to innocent shareholders and employees, such as when a company is

memo that decidedly emphasized the need

D. Focus on the Individual Another major trend over the last couple 44

Currents 24.1 2020

Deputy Attorney General Yates issued a to pursue charges against individuals when supported by the evidence. Now, in order


to obtain credit for cooperation under the

self-disclosing.

politically, it has broad appeal, especially

Filip factors, companies must identify all

DOJ may also, under a process called

to conservatives. On the campaign trail,

relevant facts regarding individuals who

“deconfliction”, require companies that self-

President Trump talked about how the FCPA

perpetrated the wrongdoing.47 Previously,

disclose and seek cooperation credit to delay

was the worst thing Congress could ever do

there was a lack of clarity concerning the

interviewing potential witnesses.50 In other

to American companies.51 Nevertheless, the

amount of disclosure required with respect

words, DOJ can dictate to the company how

Trump administration has turned up its

to individuals. Under the Yates Memo, when

to conduct its internal investigation, even to

efforts to prosecute foreign companies.52

resolving an enforcement action against the

the extent of prohibiting in-house lawyers

From a conservative perspective, the U.S. can

company, there cannot be any agreement

from conducting interviews of company

use this statute for various reasons: to protect

between the government and business entity

employees so that government agents can

its markets or bring violators, such as Nigeria,

that involves the government declining to

have the first opportunity. Needless to say, the

to heel, especially with respect to Houston

pursue charges against individuals.

possibility of a deconfliction order from DOJ

companies; to leverage U.S. steel demand in

Recently, the Yates Memo approach was

may deter many companies from considering

Vietnam’s construction industry and curb its

scaled back a bit under Deputy Attorney

self-disclosure. The recent guidance relaxing

producers’ bad behavior; or to leverage U.S.

General Rosenstein. Late in 2018, DOJ

the Yates Memo’s requirements now specifies

pharmaceuticals demand in Latin America so

announced that business entities seeking

that deconfliction is no longer a condition of

that they will start regulating their doctors.

to cooperate with the government must

obtaining cooperation credit.

now only disclose all relevant facts about

—————————————————

48

those individuals who are significantly involved in misconduct.49 In other words, the Yates Memo’s “all or nothing” approach appears to have softened. As a practical matter, a company can still obtain credit for cooperation if it provides the relevant facts about the significant wrongdoers, but it does not necessarily need to provide every investigation report and relevant fact about lower level players. The last point regarding the focus on individuals concerns the pilot program and how it became permanent. The verdict is still somewhat out on whether the availability of the pilot program incentivized companies to self-disclose in cases where they otherwise would not have. The government, by some accounts, is spending significantly more time processing self-disclosures, rather than pursuing original cases. Some argue that the increased number of self-disclosures are “easy pickings” for DOJ, and, by that logic, companies should think long and hard before

III. International Antibribery and Corruption P r o s e c u t i o n Tr e n d s ————————————————— Ever since DOJ began prosecuting under the FCPA in the late 1990s and early 2000s, enforcement actions have effectively printed money for the U.S. Treasury. Additionally, there is a growing need of both FBI agents and prosecutors at the SEC and DOJ. Professionals on this path usually serve in one of these government units and then are recruited by big law firms; this revolving door presents a challenge for attorneys dealing with these units. One consequence for compliance attorneys is the need to reeducate prosecutors with each new matter as it comes up. Be that as it may, this area of the practice is continuing to grow. It is interesting to think about the FCPA as one of the most politically neutral acts in the United States—neutral inasmuch as,

For pharmacies, or any other health field in jurisdictions where health care is highly regulated or involves a state-funded entity, doctors count as foreign government officials.53 Thus, an eighteen-year-old sales rep in China giving a doctor a ten-dollar Big Mac in violation of the pharma code and regulations in Shanghai can be found to violate FCPA. Many conservatives love the FCPA, taking the view that it levels the playing field. The more liberal community tends to treat it as an opportunity to eliminate global corruption and hold U.S. capitalism to a higher ethical standard. The FCPA has not aligned with the political bend and continues to be an area that grows and generates tremendous revenue. In the 1990s, there was no foreign component to compliance or prosecution practices. Practitioners were always dealing with the U.S. government. At the most, when working with foreign governments, DOJ would provide thanks to foreign governments for any contributions their

45

Currents 24.1 2020


officials had provided when negotiating

The amount of independent actions has

that regulators and enforcement authorities

increased, with some jurisdictions providing

can work hand-in-glove as one unit. DOJ

This practice has changed, and a lot of it

snide comments along the lines of giving

openly works with the MinistĂŠrio PĂşblico

came about with the Siemens AG case. The

thanks to the U.S. for its helpful information.

Federal (MPF), its criminal counterpart in

Munich prosecutor did some of the initial

There has definitely been a shift as more and

Brazil, on a daily basis. A dedicated DOJ-

raids, and the U.S. government adamantly

more global enforcement efforts transform

MPF task force works together to attack

insisted Siemens have an independent

from cooperation towards independent

corruption.58

monitor for many years after the resolution

stand-alone action.

settlement papers.

A breakdown of the corporate structures

of that case. Siemens is a traditional German

Korea took a stance on corruption

of the companies involved in courruption

company, so they would not engage a

in the pharmaceutical industry, arresting

cases is instructive. The Brazilian government

monitor. They were incensed already over

several physicians and barring Novartis

was the majority shareholder, by direct and

the jurisdiction and unwilling to submit to

from engaging in sales and marketing in

indirect ownership, of Petrobas. Together,

ongoing U.S. involvement. After some back

Korea, which has led to an industry sweep

Odebregt and Petrobas effectively controlled

and forth, the resolution was ultimately

in life sciences.

Novartis had allegedly

Braskrem.59 These companies were involved

structured with German native Theo Waigel,

paid doctors, who would count as foreign

in a rampant bribery scheme to obtain

former Finance Minister of Germany and the

officials in that country, to essentially talk

construction contracts around the world,

self-proclaimed father of the Euro. Siemens

to one another as physicians. The idea was

resulting in one of the largest resolutions

agreed to engage a U.S. practitioner, F. Joseph

that doctors promote to one another in

ever seen at $3.5 billion.60 Unsurprisingly,

Warin, who provided independent counsel to

violation of local health care code and receive

adequate ongoing monitoring continues to

Waigel as monitor.54

something of value for nothing other than the

pose challenges. Kinks on the back end of the

hope that Novartis would get more doctors

resolutions themselves present an additional

to prescribe its products.

problem. For instance, with Braskem,

Early on in the 2000s, U.S. prosecution resolutions saw a shift from language

56

providing for thanks to foreign governments

Brazil has continued to be a tremendous

the global resolution entailed separate

to language commemorating joint efforts

hotspot. From construction to pharma

resolution papers from the U.S., Brazil, and

in each resolution. Then, there were

to oil and gas, Brazil continues to be an

Switzerland, each containing different legal

resolutions, or stand-alone actions, brought

economically enticing market for a variety

requirements.61

by governments against foreign companies.

of industries. Its consolidated population,

For example, both the U.S. and Brazil

GlaxoSmithKline (GSK) is one of the most

ready availability of natural resources, and

resolutions each have their own monitors.

noted, and certainly one of the biggest

vast opportunities for economic investment

However, their respective mandates define

fines, ever solicited independently by the

present the perfect storm for potential

privilege quite differently; some of the work

U.S. against a foreign company.55 In China,

corruption. Petrobras has consistently

of the monitors are not privileged, but the

there were several British citizens who were

been at the heart of publicized corruption

companies do not have to waive privilege.

arrested. That case put the fear of the statute,

scandals, for example the Lava Jato scandal–

The problem is that there is not a common

not just our FCPA, but the fear of global

or Operation Car Wash. Petrobras, a giant

definition of privilege between Brazil and

enforcement in the heart of many multi-

in the construction as well as the oil and gas

the United States.62 There is interesting

nationals. There was a huge concern after

industries, is a state-owned entity (SOE),

development to come as the SEC handles

GSK about whether to send non-Chinese

that has been involved in a web of corruption

these global resolutions and determines how

executives to China, whether to send

schemes.

regulators will cooperate to reach agreement

57

employees with a separate laptop, how to

Continued globalization of industries,

or harmonize some of those discrepancies of

protect employees sent to jail, and how to

companies, economic forums, financial

international standards across the core areas.

get them out.

platforms, and technology is making it such

Many of these corruption issues can arise

46

Currents 24.1 2020


through third parties. This occurs particularly

and statements.

—————————————————

in the oil and gas industry as that industry

For example, Rolls-Royce had a similar

involves an enormous amount of risk. As

issue with commission payments going

compliance programs have developed, there

to individuals not authorized in the agent

has been a tremendous amount of change

transaction. The company did not know who

in the way that third-party relationships

the individuals were or what their role was.

are structured with their management and

It turned out that the company had bribed

the way third parties are paid. For instance,

a bunch of Kazakhstan officials.63

twenty years ago, an oil and gas company

The stakes in these corruption cases are

could easily enter and develop a field in

high, especially in oil and gas where there

Nigeria with a local agent. The agent would

is a rig sitting in a foreign jurisdiction, or

ensure that the six-hundred thousand dollar-

a warehouse that refuses to release the mud

a-day rate rig did not have any trouble in

and tubulars that a company owns, or there

customs, and the agent would also ensure

are crews sitting off the coast of Angola

that the rig would get set up, along with the

and the customs brokerage there will not

warehouse for the tubulars. The agent would

issue any visas for those workers.64 It is high

help facilitate transport of the supplies for

stakes. Companies have huge sums tied up,

the warehouse to avoid downtime during

having employees on a day rate, or another

development. For these services, the agent

service company may have contracts with

would be paid X thousands of dollars a

service penalties for late delivery. Meanwhile,

month and have a success fee based on the

there is a foreign official on the other side

ability to deliver on time without delays.

that only makes $3,000 a year. The risk is

Rates were inflated, as the law developed and

tremendous and the transactional cost of the

investigations began to happen.

bribe is extraordinarily small in most cases.

Since then, companies have improved

The challenge for pharmaceutical companies

and obtained services from these foreign

like Pfizer, Merck, or Johnson & Johnson,

agents with due diligence. Companies should

is that of facing five to fifteen thousand

ask the right questions about third parties:

opportunities to bribe in a day.

who are they, what are their qualifications,

For oil and gas, the company has so

who are they connected to, and does that

much at stake and it costs so little to get some

qualify them as a former government official?

job done. How do companies combat or stop

This approach provides more transparency to

employees from handing over a twenty dollar

contractual obligations, more detail in the

bill in order to get, for example, the necessary

contracts concerning duties and prohibited

visas? The law does not have any de minimis

conduct, and more requirements around

exception. Looking at most of the security

invoicing. Instead of just getting a for-

statutes, that is the case. A bribe is a bribe,

services-rendered invoice from a consultant,

whether it is 50 cents or five million dollars.

now there is a detailed breakdown of

IV. Consequences of AntiBribery Prosecutions ————————————————— The repercussions of corruption cases are not limited to fines and penalties. What happens next can be a monitorship, an extrajudicial program carrying reporting obligations, similar to a probation officer. The monitor is neither a friend nor a foe. The company negotiates a list of people to DOJ. DOJ may or may not select someone off the list, reserving the option to name an outsider, despite such list. Being under a monitorship is not a desirable position, particularly in consideration of the charges and associated costs, and in addition, the reputational damage. The company faces damage not just on developing business ventures but also in terms of recruiting and maintaining employees. Bilfinger SE represents a special case presently involving an extended, deferred prosecution agreement.65 Monitorships are scary–usually, the compliance professional’s role is to alleviate fear and educate the business leaders on what is important. Significant concerns include determination of a jurisdictional nexus test, which may be tenuous depending on the context of the business venture. For example, the Bilfinger-Willbros Group joint venture in Nigeria attempted to build a natural gas facility.66 Willbros was involved in a bribery scheme with Nigerian government officials. At the time the bribes were taking place in Nigeria, Bilfinger was in Germany with no real connection to the U.S. A Bilfinger

performance, time spent, meetings attended,

representative took a flight from Frankfurt

and expenses incurred. It is no longer just

to Houston and spent the day there for a

bills and expenses but actually all receipts

meeting with executives from Willbros. 47

Currents 24.1 2020


During the meeting, a conversation arose,

and including the highest levels in the C-suite

of the narrative. The process ended up more

not necessarily describing bribery but instead

and board of directors in order to effectuate

favorably to Layne Christensen than it would

describing the situation in Nigeria. The fact

needed cultural change.

have had that original SEC lawyer stayed on,

that the Bilfinger official was in the U.S. for

Compliance professionals work with and

which is representative of the consequences of

that reason, for one day, was sufficient for

educate company employees, teaching them

DOJ to claim a jurisdictional nexus.

right from wrong in terms of compliance

When dealing with a monitor at a

At first, a fair amount of conflict

norms. Often, they have challenging roles,

company undergoing a monitorship, there

accompanied DOJ’s Bilfinger monitorship

playing the diplomat tasked with convincing

will be cynicism from employees of the

as the Germans were incredulous. Much like

others to get on board with the organization’s

company because of how highly paid these

David Hasselhoff, Bilfinger was a prominent

renewed objectives. These are the stakes with

monitors are. Monitors charge legal fees, and

German fixture and relatively unknown in

respect to Bilfinger specifically and more

have their own teams of people. Traditionally,

the U.S. Perhaps a result of this stature,

generally for companies dealing with these

the monitorship team is run by a major

the company was the third ever certified in

consequences. Thus, the role of compliance

lawyer—Uber has Eric Holder, for example.73

Germany under a monitorship.

in organizations is, at its root, a leadership

Monitorships are in the mainstream

Siemens took its monitorship obligations

role for attorneys. To succeed, compliance

and the spotlight. But they are facing

seriously. Siemens represents the gold

counsel must possess an understanding of

pushback, finally, from DOJ which is

standard, for lack of a better term, for

both the business and, more importantly,

limiting monitorships because of complaints

corporate rehabilitation. The company was

the people.

from other lawyers working with the

shifting personalities in enforcement.

in a great deal of trouble. However, Siemens

Once a monitor has access, the process

monitors. These monitors have a lot of power

has since helped others through developing

involves pulling executives out from

without accountability. There is an issue

and selling their own third-party diligence

different business units or divisions and

with scope creep—monitors going outside

tools. Bilfinger, on the other hand, did not

conducting two hour, in some cases, seven

of their designated roles. The original focus

take its monitorship obligations seriously.

hour interviews. Bilfinger’s monitor was

by the monitor is supposed to be the bribery

The monitorship process does impact the

unique in this sense, understandably upset

issue in Nigeria, and all of a sudden, they

entire organization; any time the monitor

about the poor treatment he endured for

are going to find other things. The process

needs access, the board of directors, and

the initial three year period despite new

is arduous. Companies have to hold on and

everyone in between, must get involved to

approaches instituted by each successive

brace themselves during monitorships as a

further due diligence requirements. Bilfinger

board. Companies may find it useful to

lot can come up. Compliance lawyers like

brushed these obligations off and failed

understand a monitor’s philosophy early

to ask questions that they already know the

to grant access requested by the monitors.

on as this is who they will be required to

answer to but, with these sorts of reviews,

Consequently, the company appointed a

answer to.

that is not the case. When the Bilfinger

67

68

71

new board to take action against the previous

Another example—Layne Christensen’s

monitorship began, the focus was Nigeria,

board for one hundred and fifty million

investigation for bribes in Central Africa—is

but the process began to expand to address

euros, alleging failure to meet fiduciary

instructive. During those investigations,

findings in Vietnam and Brazil. This is a

obligations. Based on Bilfinger’s inability to

an aggressive SEC lawyer disagreed with the

reality for large companies doing business

certify compliance with the obligations in its

compliance team about the narrative. That

in challenging areas of the globe.

2013 agreement, DOJ decided the company

SEC lawyer was later recruited by a large

Companies must meet their reporting

warranted a two-year extension of the

firm, became a partner, and was succeeded

obligations;74 failure to satisfactorily report

monitorship.70 This sort of upheaval creates

in the investigation. The new SEC lawyer

constitutes the majority of enforcement

turbulence in organizations and results in an

had a completely different philosophy, more

actions. Essentially, compliance professionals

abundance of management turnover, up to

aligned with the compliance team’s version

must go to the SEC in Washington, D.C.,

69

72

48

Currents 24.1 2020


pitch the compliance program, and provide

little confidence that the company has dealt

—————————————————

support through lawyers and accountants for

with all of its obligations.

I V.

all claims. Additionally, company executives are recommended or compelled to attend.

For a while there were not as many selfmonitorships with self-reporting obligations,

Most entities that end up with a monitor

such as Pfizer or Johnson & Johnson,

have either a deferred prosecution agreement

but it was on the companies to go back

or a plea. With that document there are a

and report.76 More recently with global

number of attachments. Attachment A is

resolutions, companies such as Odebrecht,

usually facts, and Attachment B is usually

Panasonic, Embraer, and Braskem all have

a breakdown or calculation of the fines

independent monitors. There is more

and penalties levied against the company.

variation in the compliance and monitor

Attachment C includes the infamous

undertakings. This is credited to good defense

compliance undertakings. Before DOJ

lawyers who are happy to engage a monitor

guidance came out,75 Attachment C listed

but not allow them to run amok over a global

the obligations the company would have

organization. They have found a way to limit

to undertake. Before the greater guidance,

the scope of what the monitor is doing at the

Attachment C would go element by element

organization.

through corporate compliance obligations,

Stryker, for example, had a resolution

specific to the company. Each citation would

related to the books and records violations and

be granular and provide whether the company

instead of getting the standard Attachment

would have a hotline, an investigations

C - Attachment D three year monitorship,

process, expense reimbursement, etc.

it got an eighteen month monitorship

Finally, there is Attachment D, which

targeted to the particular controls that were

is the monitor’s undertaking, reciting the

at issue in the resolution.77 The wording

monitor’s obligations during the course of

in the negotiations is important. The

the monitorship. Attachment D is always

deferred prosecution or plea agreement

informed by the company’s circumstances

usually requires that the company create

with respect to the violation and any ensuing

a compliance program that “reasonably

conduct that may or may not run against the

detects” corruption.78 “Reasonably detects”

company. The monitor is theoretically there

is important as compared to other phrases,

because the government does not trust the

such as “ensures”, which creates a higher

company’s ability to make the attachment

standard. Wording of the resolution affects

state happen. Usually the monitor is

how a company goes about implementing a

mandated oversight of the company’s

compliance program.

rehabilitation, developing and maintaining

How monitorships play out depends

the core attachment elements, and reporting

on the negotiation process leading up to

back to the government. Usually, where there

the monitorship. A lot is at stake, and the

are extensions of monitorships or repeat

professional compliance counsel must

monitorships, the monitor refuses to certify,

facilitate a stronger position for the client in

gives limited certification, or states in the

these difficult situations.

Conclusion

————————————————— In sum, anti-bribery and corruption law continues to trend toward cooperative enforcement. FCPA, the first law of its kind, continues to be a useful and apolitical tool for U.S. law enforcement to curb nefarious influence and exhibits cognizance of the borderless nature of bribery and corruption. For bad actors subject to its provisions, the question is not “if ” but “when” and also perhaps, “where”. Prosecutors, domestic and abroad, are more inclined to compromise with corporations that boast compliance regimes with adequate internal controls. Counsel should advise corporate clients to institute such programs in advance. Clients resistant to implementing these initiatives could otherwise find themselves culpable and consequently forced to undertake this process, instead on terms stipulated by the U.S. government.

deferred prosecution agreement that there is 49

Currents 24.1 2020


End Notes 1.

OECD, CleanGovBiz: Integrity in Practice, 1 (2014). 2. See Lowell Bergman & Oriana Zill de Granados, Black Money, Frontline, (Apr. 7, 2009), https:// www.pbs.org/wgbh/pages/frontline/ blackmoney/etc/script.html. 3. Id. 4. 15 U.S.C. § 78dd-1, § 78m (2000). 5. Bergman & Zill de Granados, supra note 2. 6. See Press Release, Dow Jones, Dow Jones Survey: Confusion About Anti-Corruption Laws Leads Companies to Abandon Expansion Initiatives (Dec. 9, 2009), http://fis. dowjones.com/risk/09survey.html. 7. 15 U.S.C. § 78dd-1. 8. Id. 9. Id. 10. See Press Release, U.S. Sec. & Exchange Comm’n, JPMorgan Chase Paying $264 Million to Settle FCPA Charges (Nov. 17, 2016), https://www.sec.gov/news/ pressrelease/2016-241.html. 11. Id. 12. Press Release, Dept. Just., Lucent Technologies Inc. Agrees to Pay $1 Million Fine to Resolve FCPA Allegations (Dec. 21, 2007), https://www.justice.gov/archive/ opa/pr/2007/December/07_ crm_1028.html; Press Release, U.S. Sec. & Exchange Comm’n, IBM to Pay $10 Million in Settled FCPA Enforcement Action (Mar. 18, 2011), https://www.sec.gov/ litigation/litreleases/2011/lr21889. htm. 13. Plea Agreement, U.S. v. Avon Products (China) Co. Ltd., Cr. No. 00828 (GBD) (S.D.N.Y Dec. 14, 2014); Press Release, Dept. Just., Daimler AG and Three Subsidiaries Resolve Foreign Corrupt Practices Act Investigation and Agree to Pay $93.6 Million in Criminal Penalties (Apr. 1, 2010); Press Release, Dept. Just., JPMorgan’s Investment Bank in Hong Kong Agrees to Pay $72 Million Penalty for Corrupt Hiring Scheme in China (Nov. 17, 2016); Press Release, Dept. Just., Tyson Foods Inc. Agrees to Pay $4 Million Criminal Penalty to Resolve Foreign Bribery Allegations (Feb. 10, 2011). 14. 15 U.S.C. § 78m. 15. Id. 16. 15 U.S.C. § 78dd-2(g)(1)(A). 17. 15 U.S.C. § 78dd-2(g)(2)(A), 78dd3(e)(2)(A), 78ff(c)(2)(A); 18 U.S.C. § 3571(b)(3), (e) (fine provision that supersedes FCPA-specific fine provisions). 18. Bergman & Zill de Granados, supra note 2.

19. Rachel Brewster, Enforcing the FCPA: International Resonance and Domestic Strategy, 103 Va. L. Rev. 1611, 1611 (2017) (noting how the United States “only weakly enforced the FCPA” during the 1980s and 1990s). 20. Press Release, U.S. Sec. & Exchange Comm’n, SEC Charges Baker Hughes with Foreign Bribery and with Violating 2001 Comm’n Cease-and-Desist Order (Apr. 26, 2007), https://www.sec.gov/news/ press/2007/2007-77.htm. 21. Press Release, U.S. Dep’t. of Just., Former Siemens Executive Pleas Guilty to Role in $100 Million Foreign Bribery Scheme, (Mar. 15, 2018), https://www.justice.gov/opa/ pr/former-siemens-executive-pleadsguilty-role-100-million-foreignbribery-scheme. [hereinafter Siemens Bribery Press Release]. 22. Richard L. Cassin, Counsel to the FCPA Top Ten, The FCPA Blog (March 12, 2019 at 9:18 AM), http://www.fcpablog.com/ blog/2019/3/12/counsel-to-thefcpa-top-ten-march-2019.html [https://perma.cc/CER4-RLL6]. 23. Press Release, U.S. Dep’t. Just., Mobile Telesystems PSJC and Its Uzbek Subsidiary Enter into Resolutions of $850 Million with the Dep’t of Just. for Paying Bribes in Uzbekistan, (Mar. 7, 2019), https://www.justice.gov/opa/pr/ mobile-telesystems-pjsc-and-itsuzbek-subsidiary-enter-resolutions850-million-department. 24. OECD, Resolving Foreign Bribery Cases with Non-Trial Resolutions: Settlements and Non-Trial Agreements by Parties to the Anti-Bribery Convention, 219 (2019). 25. See § 13(b)(6) of the Exchange Act, 15 U.S.C. § 78m(b) (6) (providing that where an issuer “holds 50 per centum or less of the voting power with respect to a domestic or foreign firm,” the issuer must “proceed in good faith to use its influence, to the extent reasonable under the issuer’s circumstances, to cause such domestic or foreign firm to devise and maintain a system of internal accounting controls consistent with [Section 13(b)(2)] . . . . ”). 26. Amy Deen Westbrook, Enthusiastic Enforcement, Informal Legislation: The Unruly Expansion of the Foreign Corrupt Practices Act, 45 Ga. L. Rev. 489, 550–53 (2011). 27. See, e.g., P. Can Co. v. Hewes, 95 F.2d 42, 45–46 (9th Cir. 1938); United States v. Nynex Corp., 788 F. Supp. 16, 18 n.3 (D.D.C. 1992); 50

Currents 24.1 2020

see also U.S Dep’t. Just. & U.S. Sec. & Exchange Comm’n, A Resource Guide to the U.S. Foreign Corrupt Practices Act 20 (2012), https://www.sec.gov/spotlight/fcpa/ fcpa-resource-guide.pdf (“DOJ and SEC evaluate the parent’s control— including the parent’s knowledge and direction of the subsidiary’s actions, both generally and in the context of the specific transaction—when evaluating whether a subsidiary is an agent of the parent.”) [hereinafter Resource Guide]. 28. See United States v. Hoskins, 902 F.3d 69, 72 (2d Cir. 2018) (“The government alleges that several parts of the [bribery] scheme occurred within the United States . . . [a] consultant kept a bank account in Maryland . . . several executives held meetings within the United States regarding the bribery scheme and discussed the projects by phone and email while present on American soil.”); see also Chevron Corp. v. Donzinger, 974 F. Supp. 2d 362 (S.D.N.Y. 2014). 29. See United States v. Hoskins, 902 F.3d 69 (2d Cir. 2018). 30. Id. at 72. 31. Id. at 98. 32. Complaint, SEC v. Panalpina, Inc., Civ. Action No. 4:10-cv-4334 (S.D. Tex. Nov. 4, 2010), https://www. sec.gov/litigation/complaints/2010/ comp21727.pdf [https://perma. cc/6DFK-6E26]. 33. Press Release, U.S. Sec. & Exchange Comm’n, SEC Charges Seven Oil Services and Freight Forwarding Companies for Widespread Bribery of Customs Officials (Nov. 4, 2010), https://www.sec.gov/news/ press/2010/2010-214.htm. 34. Cassin, supra note 22. 35. See 17 C.F.R. § 240.13a–15; Auer v. Robbins, 519 U.S. 452 (1997) (holding that agencies are granted great deference in interpreting their own regulation). 36. See SEC v. Jackson, 908 F. Supp. 2d 834, 839–40 (S.D. Tex. 2012); SEC v. Goldstone, 952 F. Supp. 2d 1060, 1136, 1258 (D.N.M. 2013). 37. M e m o r a n d u m f r o m A n d r e w Weissman, Chief, Fraud Sec. Crim. Div., U.S Dep’t Just., Fraud Sec.’s Foreign Corrupt Practices Act Enforcement Plan & Guidance (Apr. 5, 2016), https://www.justice.gov/ archives/opa/blog-entry/file/838386/ download [https://perma.cc/VF95AZZS]. 38. Id. at 2. 39. See id. at 9. 40. See id. at 3. 41. M e m o r a n d u m f r o m S a l l y

Quillian Yates, Deputy Att’y G e n e r a l t o D e p’t o f Ju s t . Staff, Individual Accountability for Corporate Wrongdoing (Sept. 9, 2015), www.justice.gov/dag/ file/769036/download. 42. S e e U . S . D e p’t Ju s t . , J M 9-28.000, Principles of Federal P r o s e c u t i o n o f Bu s i n e s s Organizations, https://www. j u s t i c e . g ov / j m / j m - 9 - 2 8 0 0 0 principles-federal-prosecutionbusiness-organizations. 43. U.S. Dep’t Just., JM 9-28.1100, Collateral Consequences, h t t p s : / / w w w. j u s t i c e . g ov / j m / jm-9-28000-principles-federalprosecution-business-organizations. 44. See Principles of Federal P r o s e c u t i o n o f Bu s i n e s s Organizations, supra note 42. 45. See Memorandum from Sally Quillian Yates, supra note 41. 46. Testimony from Lanny A. Breuer, Assistant Attorney Gen., Crim. Div. at the U.S. Dep’t of Just. to the Financial Crisis Inquiry Division (Jan. 14, 2010), https:// www.justice.gov/sites/default/ files/testimonies/witnesses/ attachments/2010/01/14/201001-14-crm-breuer-financial-crisis. pdf. 47. U.S. Dep’t Just., JM 9-28.700, The Value of Cooperation (Nov. 2018), https://www.justice. gov/jm/jm-9-28000-principlesfederal-prosecution-businessorganizations#9-28.700. 48. Memorandum from Sally Quillian Yates, supra note 41. 49. Carlos R. Rainer, DOJ Policy Changes Regarding Cooperation of Business Entities and Pursuit of Individual Defendants, Norton Rose Fulbright (Feb. 2019), https://www.nortonrosefulbright. com/en-us/knowledge/ publications/6c8b3f6a/importantchanges-announced-to-doj-policyregarding-cooperation-of-businessentities [https://perma.cc/P79X98NX]. 50. Lanny A. Breuer & Mark T. Finucane, DOJ ‘Deconfliction’ Requests: Considerations and Concerns, Law360 (Mar. 1, 2017, 1:52 PM), https://www.cov.com/-/media/files/ corporate/publications/2017/03/ d o j _ d e c o n f l i c t i o n _ re q u e s t s _ considerations_and_concerns.pdf [https://perma.cc/ZC7X-KKWY]. 51. Shawn M. Wright, FCPA Enforcement under the Trump Administration: No “Piling On,” But Otherwise Business as Usual, Blank Rome (Sept. 2018), https://www.blankrome.com/


publications/fcpa-enforcementunder-trump-administration-nopiling-otherwise-business-usual [https://perma.cc/S2B4-MYRD]. 52. Id. 53. David W. Simon, FCPA FAQs, Foley (OCT. 4, 2019), https:// www.foley.com/files/uploads/ FCPA_FAQs-English.pdf [https:// perma.cc/B4PA-4MST]. 54. Letter from Steven A. Tyrrell et al., U.S. Dep’t Just., to Scott W. Muller & Angela T. Burgess, Davis Polk & Wardwell 10 (Dec. 15, 2008), https://www. justice.gov/sites/default/files/ opa/legacy/2008/12/15/siemens. pdf; see F. Joseph Warin et al., Somebody’s Watching me: FCPA Monitorships and How They Can Work Better, 13 U. Pa. J. Bus. L. 321 n.* (2011). 55. Press Release, Off. Pub. Aff., GlaxoSmithKline to Plead Guilty and Pay $3 Billion to Resolve Fraud Allegations and Failure to Report Safety Data (July 2, 2012) (on file with the United States Department of Justice). 56. News Alert, Ropes & Gray South Korea Fines Prominent Pharmaceutical Manufacturer in Latest Anti-Corruption Enforcement Efforts, (May 1, 2017) [https://perma.cc/VS3PF54U]. 57. Paulo Sotero, The Petrobras Scandal, Encyclopedia Britannica, https://www.britannica.com/ event/Petrobras-scandal (last visisted Jan. 22, 2020). 58. Press Release, E.D. of N.Y., U.S. Att’y’s Off., TechnipFMC PLC and U.S.-Based Subsidiary Agree to Pay Over $296 Million in Global Criminal Fines to Resolve Foreign Bribery Case (June 25, 2019) (on file with the United States Department of Justice). 59. See Plea Agreement, U.S. v. Odebrecht s.a., Cr. No. 16-643 (RJD) (E.D.N.Y. Dec. 21, 2016) [https://perma.cc/6PZL-MNJG] (“Odebrecht S.A. owned 50.11% of the voting shares and 38.1% of the total share capital of Braskem and effectively controlled the company . . . Petrobras . . . owned 36.1% of the shares of Braskem . . . [t]he Brazilian government directly owned approximately 50.3% of Petrobras’s common shares with voting rights, while an additional 10% of the corporation’s shares were controlled by the Brazilian Development Bank and Brazil’s Sovereign Wealth Fund.”). 60. Press Release, Off. of Pub. Aff., Odebrecht and Braskem Plead Guilty and Agree to Pay at Least $3.5 Billion in Global Penalties to

Resolve Largest Foreign Bribery Case in History (Dec. 21, 2016) (on file with the United States Department of Justice). 61. Id.; see also Plea Agreement, U.S. v. Braskem S.A., Cr. No. 16644 (RJD) (E.D.N.Y. Dec. 21, 2016) [https://perma.cc/KV6HLCKF]; see also Plea Agreement Odebrecht, supra note 59, at 19; see also Press Release, Off. Att’y Gen. of Switz., Petrobras – Odebrecht Affair: The Office of the Attorney General of Switzerland Convicts Brazilian Companies and Demands Payment of Over CHF 200 Million (Dec. 21, 2016) [https://perma.cc/Y8XYUBGT] (detailing the “summary penalty order” provided for by the Office of the Attorney General of Switzerland, assessing CHF 200 million); Press Release, Ministerio Publico Federal, Brazilian Federal Prosecution Service (MPF) Enters into Leniency Agreements with ODEBRECHT and BRASKEM (Dec. 1, 2016) [https://perma.cc/ E5VZ-8GXQ] (detailing the MPF leniency agreement and assessing BRL 8,512,000,000.00). 62. Compare USAM § 9-28.710 (2008), https://www.justice. gov/jm/jm-9-28000-principlesfederal-prosecution-businessorganizations#9-28.710, with WIPO, Confidentiality of Communications between Clients and their Patent Advisors (Date Unknown). See also Plea Agreement at 8-9, U.S. v. WMT Brasilia S.a.r.l. No. 1:19-cr00192-LO (E.D. Va. June 6, 2019) [https://perma.cc/97EZ-E9JM]. 63. See Press Release, Off. Pub. Aff., Rolls-Royce plc Agrees to Pay $170 Million Criminal Penalty to Resolve Foreign Corrupt Practices Act Case (Jan. 17, 2017) (on file with the United States Department of Justice). 64. See, e.g., Complaint, SEC v. Baker Hughes Inc., Civ. Action No. H-07-1408 (S.D. Tex. Apr. 26, 2007) [https://perma.cc/EEH6Z3P7]. 65. Deferred Prosecution Agreement, U.S. v. Bilfinger SE, No. 4:13-cr00745 (S.D. Tex. Dec 9, 2013) [https://perma.cc/TA8M-X38U] (original DPA). 66. Pleadings at 3, U.S. v. Bilfinger SE, No. 4:13-CR-745 (S.D. Tex. Dec 9, 2013) [https://perma.cc/83FA9EAD] (citing DOJ pleadings). 67. See Siemens Bribery Press Release, supra note 21. 68. See Compliance – Collective Action, Siemens, https://new. siemens.com/global/en/company/ sustainability/compliance/

collective-actionhtml#Siemen sIntegrityInitiative (last visited Oct. 17, 2019) [https://perma.cc/ E9FZ-QY7K]. 69. See Bilfinger SE, Annual Report 2018 at 20-21 (2019). 70. Extended Deferred Prosecution Agreement at 3-4, U.S. v. Bilfinger SE, No. 4:13-cr-745 (S.D. Tex. Sept. 23, 2016) [https://perma. cc/6NES-CUNE] (extended DPA). 71. See Five Years Later, Bilfinger Emerges from DPA – Transparency Nil, FCPA Professor (Dec. 12, 2018), http://fcpaprofessor.com/ five-years-later-bilfinger-emergesdpa-transparency-nil/ [https:// perma.cc/7SWC-SND9]. 72. Layne Christensen Co., Exchange Act Release No. 73437, 2014 WL 5423780, at *9 (Oct. 27, 2014) [https://perma.cc/M66C-44UK]. 73. Covington Recommendations Re: Uber, Stanford, https:// conferences.law.stanford.edu/ vcs2019/wp-content/uploads/ sites/63/2018/10/001-CovingtonRecommendations-re-Uber.pdf [https://perma.cc/Q7CY-RH2S]. 74. Resource Guide, supra note 27, at 41–2. 75. Resource Guide, supra note 27, at 52, 63, 71. 76. See generally Press Release, Dept. Just., Re: Walmart Inc. C-1 (June 20, 2019) (on file with the United States Department of Justice), https://www.justice.gov/opa/pressrelease/file/1175791/download [https://perma.cc/E5YK-DCYC]; see also Resource Guide, supra note 27, at 54–5. 77. Stryker Corp., Exchange Act Release No. 84308, 2018 WL 4678504, at *9 (Sept. 28, 2018) [https://perma.cc/XWV2-62ZA]. 78. See Resource Guide, supra note 27, at 56, 74.

51

Currents 24.1 2020


Managing Cross Border Internal Investigations M O D E R AT O R / PA N E L I S T: PA N E L I S T S :

E L E A N O R M I C H A E L

T H U Y

B E N M E N A S H E , M I N E R , M A R L A

P.

T R A N

A S H L E Y

C O S E L L I ,

M O O R E

—————————————————

trained to do full-scale investigations.

conducts an exit interview. Someone leaving

I.

Sometimes these departments count on us

the organization brings forward an allegation,

to help them, whether in training them to

which plays into ethics.

Introduction

—————————————————

conduct investigations or actually coming

Ethics is who are we, and maybe it is a

together hand-in-hand with them to handle

little bit more than what we do. Compliance

investigations. Consequently, there is not

and ethics drives the inner workings of an

just the core set of compliance lawyers or

organization. A company may receive the

investigators. Companies get a lot of work

traditional HR type of complaint at first

that burns up many resources and so the

by employees who are a little bit more

more resources, the better. Companies

willing to speak up. Then, it may require a

are fortunate if they have a pretty big

dedicated investigator to go and investigate

team and collaborative group to devote to

the traditional HR matter. When this

investigations.

occurs, it leads to the perception by those

since 2010. The number of substantiated

—————————————————

in the organization that the company does

cases by percentage have also gone up from

II. Investigations as a Practice

care—someone has spoken up, and other

Internal investigations have increased in frequency. Securities and Exchange Commission (SEC) whistleblower claims are up 76% since 2012.1 Equal Employment Oppor tunity Commission (EEOC) harassment cases just last year are up 50%, likely an unsurprising phenomenon given the #Metoo era.2 The NAVEX 2018 Annual Report,3 states there has been a 56% increase in the reporting rate for internal complaints

36% to 44% since 2012.4 What companies are asking is: 1)

————————————————— A. Docket Managment

do they need internal lawyers who know

When managing the help line or

investigations; 2) do they need external

compliance line, it is key to have partnerships

lawyers who know investigations; and

with other stakeholder groups within

3) do they need non-lawyers who know

the organization, such as the Labor and

investigations? The answers to these questions

Employment Counsel, HR group, or Internal

are: yes, yes, and yes. This trend is not going

Audit. From a traditional compliance

to slow down.

perspective, whether a Foreign Corrupt

The need for internal investigations

Practices Act (FCPA) investigation or fraud

extends beyond the legal field. In compliance

investigation, information from trusted

departments, the lawyers (and staff ) are

sources and background on personnel and

expected to do a little bit of everything,

personalities is critical; sometimes where there

including picking up purely Human

is smoke there is fire. Sometimes a request for

Resources (HR) matters, quality issues, or

an investigation will come in through the

health, safety, and environmental matters.

HR group, even when the original complaint

This is because the people working in

looks like it was a traditional HR matter. For

those particular disciplines are not always

example, an allegation may arise when HR 52

Currents 24.1 2020

individuals now feel empowered to speak up. Further, the organization now has people who are picking up the rocks in an effort to look into potential violations and scrutinize the compliance culture. Unless people are speaking up, compliance departments do not know the problems or where to start looking to fix those problems within an organization. A company should worry if it is not getting calls through a helpline, and someone needs to go to management and bring up the company’s branding issue. There should be complaints. A company with operations all over the world and tens of thousands of employees and contractors in numerous countries that is not getting complaints (at least through a helpline) either does not know what is going on in the organization


or its people do not know about its helpline.

are so important. Communication skills

interviews, the interviewee will shut down

Companies need to have a better hotline call

and relationship building is an art that is

and not participate. When it comes to

volume to build a “speak up culture” and

being lost; what matters is being adaptable

interviewing people who speak another

prevent future compliance issues.

and flexible. Investigators need soft skills,

language where a translator is required,

Any company knows that the lack

relationship building skills, and the ability to

something gets lost in translation. A question

of helpline calls is indicative of a culture

network. In some practices and investigations,

gets asked, such as “did he touch you

problem. The number one reason employees

it is crucial to be able to rely on IT, internal

inappropriately”, and the translator will

do not complain is that they are worried

audit, and other groups in the company,

ask the question. The following exchange

about retaliation. They do not trust the

as no lawyer handles everything or knows

between them will get complicated, with a

system. They do not trust their company. In

everything.

lot of back and forth. Finally, the translator

this era, social media fits into this picture.

Lawyers must practice humility when

will turn to say, “she said yes.” Valuable

Often, someone will call in and file a

travelling abroad. To build cultural awareness,

information gets lost in this way. Therefore,

complaint on the helpline, and if they fail

partner with HR and ask what one needs

if the lawyer speaks another language,

to receive an immediate response, they are

to know when going to other countries.

companies and law firms value that skill in

likely to take it to social media. That is what

Know who is who, in what group, who is

investigations.

firms are seeing, and it can be problematic

connected to whom, before putting boots

Recognize the cultural boundaries in

because something that might have been

on the ground or attempting to conduct

a particular country. Companies should

handled internally, without many public eyes

an interview. Lawyers need to understand

have internal protocols for each country. In

on it, all of a sudden is posted on Facebook,

what is going on all around them. Learning

places where it does not, the company should

Instagram, or Twitter.

the client, accompanying the client on risk

identify new protocols after a thorough

Lawyers who are just coming out of law

assessments, meeting the local office, going

examination of such countries cultural

school and are familiar with technology and

to trainings, partnering with HR, meeting

norms. Starting the interview off on the

social media have an advantage in the internal

with the internal audit team, going on an

wrong foot will make it more difficult to

investigations practice. Companies run into

audit beforehand, and learning the lay of

build rapport. Things that are very common

online issues all the time with employees.

the land all go to understanding who the

here in the U.S. may easily be restricted or

Employees are doing less via company email,

people are. Lawyers cannot be afraid to

offensive in other countries. For example, in

where there is visibility, and frequently turn

play to a perceived weakness. For example,

Saudi Arabia, a man and woman cannot be

to alternative communication mediums,

acting clueless to get an alleged violator to

alone in the same room. Also, showing the

for example, Whatsapp or other private

“teach” about his or her work or how the

sole of one’s shoe is considered offensive; so,

messaging applications. This is challenging

procedure works in the real world can be

crossing one’s legs becomes risky behavior,

for firms, who need to better understand

a valuable tactic. Such techniques allow

if not done correctly. Not only do these

how its employees are using this technology,

the investigator to obtain information in

cultural sensitivities impact the rapport with

how they are sending data from one person

a disarming way. Investigations are about

the interviewee, they may also amount to a

to another, where it is going, and how, if at

fact-finding. Examples of probative phrases

procedural flaw in the local labor court. This

all, it can be tracked. A lawyer working in

could be, “help me understand,” or “can

is meaningful when it increases the cost or

compliance having some insight into these

you help me understand?” People will pour

impacts the success of the local labor claim.

issues, a person who understands technology

out information which may result in a “got

When building rapport, it is best to

better, is a definite plus for a company.

you” moment.

approach the interviewee calmly, adopting

Avoid the hardcore, hard-hitting

an unassuming disposition—“talk to me and

Colloquially, the soft skills—being able to

litigator style. The investigative process is

let me help you with this situation and let us

relate with people and have a conversation—

not like taking depositions. In investigation

make it better”—rather than approaching the

B. Culture and Gender Sensitivity

53

Currents 24.1 2020


interviewee with presumptions or making

located in the area out of which the violation

in. They even take pictures of visitors.

him or her feel small. Showing respect and

occurred to make sure the information is

Consequently, interviewers can actually see

being calm is key. If the investigator goes in

correct and that the suspected individuals

what the interviewee looks like and stop them

with the wrong approach, it breaks down

are not accidentally tipped off prematurely.

around the office.

the communication. If the person walks

One reliable source when dealing with

out or shuts down, consider the probative

local team members are the administrative

value of attempting another interview later

assistants. When working on an investigation,

or disciplinary action, if company policy

get the names of the administrative assistants,

supports it.

even at remote locations. Later on, when in

At the end of the day, an investigator

the investigation, relationships previously

gets one good shot at the interview. Aim to

developed with the administrative assistants

do it properly the first time. The small details

will be of value in learning about the

really count, and success is based on the way

interpersonal relationships that go on in that

the interviewer positions himself or herself

office. Obtaining that information might stop

to talk to witnesses. Understand who the

the investigation right there, depending on

interviewee is and how that individual fits

whether it will substantiate or unsubstantiate

into the big picture of the organization and

the allegation. Administrative assistants

the investigation. For example, is this a good

provide a wealth of information and should

friend of the alleged perpetrator? Setting up

not be discounted. There is immense value in

the witness list and choosing who to speak to

speaking with the administrative assistants,

first is crucial. Talk to the local team, whether

sometimes as a starting point, and this may

that is the legal team, Health, Safety, Security

prove to be a better approach in planning

and Environmental (HSSE), or the HR team,

an interview schedule than going down the

because these teams are the primary resource

chain of command. Additionally, it may be

for knowledge about company individuals,

beneficial to discreetly inquire as to what has

other people involved, and the cultural

been happening in the coffee room. As with

norms. Local team members will have the

all previously developed relationships with

insights to inform the investigator of the

people in the office, often there is valuable

interpersonal relations of employees and the

background and interpersonal information

relational aspects of those individuals closely

available to those who allow themselves to

associated with employees.

be approachable; often these “water cooler”

Complaints can involve very salacious

conversations have all sorts of information

allegations mixed in with very problematic

that an investigator probably should know

company issues. The lawyer may need to

beforehand. The “gossip fix” of the day

break the issues apart. Sometimes there are

doubles as information necessary to attempt

different investigators for specific subject

to figure out what is going on.

matters, which creates parallel investigations

Receptionists are the other useful

within the organization. In such instances,

sources because they see everyone who

the lawyers need to coordinate internally

comes and goes. It is all about fact-finding.

between the different groups involved

Investigators need times, dates, and

and coordinate with company individuals

information. Receptionists log everything 54

Currents 24.1 2020

—————————————————

III.

Th e

Interview

————————————————— A. Building Rapport in Culturally Sensitive Areas or Areas with Cultural Barriers Investigators want to have as much information and education as they can going in. Some companies have luxuries by the way they are structured. For example, at large firms, there are a lot of ethics and investigations professionals from around the globe to reach out to, to help educate interviewers, to be involved in those interviews (if necessary, male and female) depending on the subject matter of the investigation. Sexual harassment is one thing that is frequently investigated. There are certain interview techniques utilized where gender comes into play that can help interviewers build rapport with the witness to extract the truth. If it is a sexual harassment claim raised by a female, interviewers would certainly want a female investigator present. Alternatively, if it is a male raising the claim, the preference is to have a male investigator present, probably one of each. Again, skill sets matter. Relationship building is one of the key elements of investigations that involves talking to people throughout the organization, in the business, and in different disciplines. Much of what investigators do is convey difficult messages to people, such as telling people what they are allowed to do. At the same time, it requires a lot of hard work to ensure that what they


are trying to do does not look bad. Being

answer, and building off that. Lawyers need

up in emails; it is always interesting when

firm but fair in communications, being able

to be careful of the uncomfortable silence,

interviewees talk about their investigators—

to say no without being a jerk, and having

when the interviewer is actually waiting for

the lawyer—in their emails. The investigator

a savviness in communications—all of these

the interviewee to say the next thing. That

can later ask “help me understand what you

characteristics are necessary in investigations

is one of the techniques – to just shut up

mean” by certain emails.

and compliance overall.

and listen. So much of what the interviewer

Partnering with HR and providing

Other top investigator skills are analytical

will get is the key stuff that comes after the

the recommended interview list allows the

thinking and planning. A lawyer has a lot of

uncomfortable silence, when the interviewee

investigator to inquire into where these

preparatory work to do before any site visit.

just feels like they have got to get it out.

people are located and their citizenship.

The investigator must be an organized person

Interviewees cannot handle the silence.

With data privacy concerns in Europe or

and good with data. Anyone with a specialty

Lawyers call it “showing them your part.”

other areas with changing privacy laws, this

in data analytics is prepared to handle the

Again, if there is a difficult witness who is not

is important information to know ahead

information load. Those from a litigation

giving up anything, the lawyer should start

of time. Data privacy rules combined with

background are probably good at analyzing

writing without saying a word. This creates

local labor laws are quite complex. There

data. However, a great deal of information

an uncomfortable silence. It is amazing what

may be times where the lawyers need to

can be pulled from the hotline. It is great to

witnesses will give up to fill in that space.

get consent from the interviewee to review

have a data specialist collate such data and

Do not be afraid of silence. Notice the body

their emails beforehand. In some countries,

produce patterns and information for the

language of the witness, if he or she begins to

where the server sits determines whether

investigation, which becomes much more

twitch or something. As the investigator, just

review of emails must be conducted within

efficient.

hang in there as this witness will soon crack.

the country. From an internal investigation

B. Interview Techniques

C. Issues with Data Privacy

standpoint, these requirements can balloon

Before walking into an interview, the

Professor Wheeler, who taught at South

the costs of the investigation, requiring the

lawyer must figure out the flavor of the case,

Texas College of Law Houston, used to say,

lawyer to go to Europe to review thousands

the elements of the claim, and know what

“the person who is more prepared will beat

and thousands of emails, as review in the

is going on with the interviewee. Success

the person who is more intelligent, all day

United States would be disallowed. Instead

in these efforts comes back to preparation.

long.” Being prepared and going through

the investigator could conduct a review in

Sometimes, preparing an outline before

emails and other background documents

a hotel room somewhere across the world

talking to any witness does the trick. If the

in cross-border investigations is necessary.

or hire local counsel to do the review. The

witness does not have a lot of information,

The investigator should also know where

planning part of an investigation is, therefore,

the interview is short. For extended duration

the firm’s IT systems are located, where

immense.

interviews, the lawyer should prepare a list

the servers are located, and which servers

Some internal cross-border investigations

covering all of the elements of the legal and

go to which location. These are important

may not implicate data privacy, but do not

factual issues in the situation. At the same

considerations to navigate evolving data

underestimate a disgruntled employee.

time, it is important to not be too wedded to

privacy regulations.

For example, after some kind of remedial

one’s outline. A lawyer should be willing to go

Lawyers need to know where data goes,

action, the interviewee or target is now

off on those rabbit trails, if that is where the

where it is housed, and which jurisdictions

attempting to take the company or lawyer

witness leads. The outline allows the lawyer

are going to be implicated. After partnering

to court in the local jurisdiction, alleging

to get back on track.

with IT, the lawyer partners with HR, who

that the company and investigators acted

Just to that point, another key element

provides the recommended interview list

improperly, implicating potential criminal

to the interviewing technique is the ability to

and the emails of the people who are on

statutes. Crossing the “t”s and dotting the “i”s

listen. It is asking a question, listening to the

that list. An investigator’s name will come

early in any investigation becomes extremely

55

Currents 24.1 2020


important. Preparation before the interview

employment side of things, it is important to

If the investigation has started, the lawyer

is critical; there is only one bite at the apple.

understand that companies use investigations

might have to go to India for example, where

Data is crucial—if there is going to be a

as a defense against labor claims brought

internal counsel has no privilege. In such

smoking gun in the investigation, it will be

against the company. With that in mind,

cases, the lawyer has to turn the investigation

in the data. A lawyer will likely not break a

consider if it is necessary to separate allegations

over to external counsel. It is difficult to give

witness down and get him or her to confess

and issues into different investigations or

those reins up, but the client comes first.

to the ultimate crime. Interviews typically

reports. Ideally, the lawyer will not know

are more complicated. The smoking gun

what kind of surprises will be found during

may be found if the investigator is following

an investigation; he or she should aim to

the money trail or digging in emails, getting

maintain the privilege.

screenshots of text messages, or mapping the accounting trying to look at the reporting. Again, investigations have more than one step, and examining the data is the first step. Also, the lawyer is likely using the data to build his or her questions, so it is imperative to obtain what information is possible before the interviews. Sometimes the lawyer has a lot of information and can ask questions based on that data. Sometimes it is better to ask the question first, let the interviewee answer, and then present the data, asking them to explain the discrepancy in what they just said. During the interview, the investigator is assessing the interviewee and trying to get a sense of how honest and credible the interviewee is; asking the easy questions first is a probative start to the interview. It is likely that a misbehaving employee will be opportunistic unless they realize they are caught. Those interviewees may start negotiating, or be willing to share who else was involved, or they may regret their mistakes, making admissions on the record. —————————————————

I V . P r i v i l e g e ————————————————— A lawyer could be investigating and uncovering something scary that the firm does not want to get out. Considerations of privilege now come into play. On the

think about on the front end—for domestic or international investigations—because the lawyer cannot just proceed without privilege

When trying to implement disciplinary

and then later try to put that genie back

actions stemming from an investigation,

in the bottle. Make sure that before any

everyone at the company wants to see the

investigation, if the investigator is not the

investigation report, and it can be easily over-

privilege expert, then he or she is talking to

circulated, breaking the privilege. Hence, not

someone who is.

everyone will receive the actual investigation report. At the same time, the business still needs to be informed, and managers need to support such disciplinary action. So, the investigator should pick up the phone and have these conversations, providing the relevant details and answering questions so that the managers will be on board, rather than just willing to cooperate. Having a manager’s buy-in is important to the company culture and relationship building. Jurisdiction matters when considering privilege. In-house counsel need to be cognizant of the jurisdictions that do not extend privilege to in-house counsel and about whether the scope of the investigation mandate needs to be expanded, as new allegations arise. For example, in Saudi Arabia, privilege is not necessarily extended to in-house counsel. The lawyer who is conducting the investigation needs to consider whether it is necessary to obtain outside counsel to ensure there is privilege for the local claims. Everything goes back to preparation. 56

Currents 24.1 2020

Privilege is something lawyers have to

Sometimes witness interviews are conducted by an attorney, and sometimes it is by an investigator working at the attorney’s direction, such as HR or a compliance officer. When that is the case, the attorney must make sure his or her investigators utilize a proper Upjohn warning5 as part of their introduction and have a way to memorialize it, such as a letter essentially stating the nonattorney is working at the direction of legal counsel to gather facts so they may render legal advice to the company, etc. For in-house counsel, there is a rule that the in-house lawyer should not actually do the investigations as the attorney due to the concern about privilege. It is hard to know whether the in-house lawyer could give legal advice on the same matter that is the potential investigation. Avoid the risk by making sure the investigator is separate from the person giving legal advice. The in-house attorney will become very valuable again at that point in time. To keep privilege, make sure that the investigation proceeds under privilege.


Privilege has to be documented. It is useful

that the interviewees understand that he

company is making me do this”—the better.

to have a process whereby the lawyer gets

or she does not represent them. One way

If somebody is already terrified, producing a

instruction from the client—usually a Vice

to handle this is to have a written version

written warning in front of them with a blank

President—asking the lawyer for help in

of the warning and have each interviewee

signature block will go over poorly.

an investigation requesting legal counsel

sign an acknowledgement. Where there is

on the issues and adding that the lawyer

a non-lawyer investigator and the company

should feel free to use any resources at their

objective is that the investigation itself

disposal. Next, a letter is sent from the in-

remain privileged, have the investigator

house attorney to the internal investigator or

acknowledge the warning as well. The

an external investigator, if hiring somebody

more documentation, the better. The more

outside at the time. A letter to the investigator

established the process, the better. As an

requesting help and giving notice that the

external investigator and as a lawyer, do not

investigation is under privilege is sufficient

give advice or represent the lawyers in-house.

documentation of privilege. Of course, if the

It is critical, after the mapped-out reading

investigation is heading overseas, the lawyer must make sure that this whole process works in the destination jurisdiction. It also helps to bring counsel from overseas to do the reports there.

of the warning, to have the interviewee’s acknowledgement. It is generally unfavorable to have the interviewee sign a formal acknowledgment. The interview is a formal process. However, if the circumstances

Assume that the investigation itself

warrant it, good investigators are able to

is not privileged. The investigation would

make it as informal as possible so to avoid

never get ordained privilege in an HR case.

the perception of an aggressive investigator

Take this view with a grain of salt and talk

persona. At the start of the interview, the

to FCPA (Foreign Corrupt Practices Act)

person experiences the terror of sharing a

or SEC (Securities Exchange Commission)

room with someone he or she perceives as

lawyers before going down this route. In

the “interrogator.” After the warning, make

employment cases, typically the company can

clear to the interviewee that this seemingly

use the investigation as a defense. So, in some

formalistic warning was not drafted just for

practices, it is best to take the position that

him or her. Generally, try to convey to the

the investigation typically was not privileged.

interviewee that this is how the investigation

Any legal advice from the lawyer coming

will be conducted internally. It is better that

out of the investigation would be privileged, which explains why the investigator was separate. As an attorney doing the investigation—and again, domestically, it is important to give the Upjohn warning6—go

interviewees be comfortable with the process as opposed to having them sign something that may freak them out even more, cause them to go into a shell, or walk out of the room.

in with the warning on a printed piece of

It depends on what the company wants

paper and read it. Providing the warning

to do. The more relaxed the interviewer

ensures best practices, depending on how

can make the situation—“it is not a big

serious the lawyer is about making sure

deal, we are doing this with everyone, the 57

Another good practice is to have a second investigator (in addition to the main investigator) or somebody else to come along who can document everything, take notes, deliver the Upjohn warning, and serve as a witness. The roles of each person should be clear. In some cases, both parties may need to ask questions. There is an appropriate way to transition the other investigator into the questioner’s role. It is helpful to explain the investigation process, as it relates to the interviewee. For example, “After this interview, if we don’t follow-up with you in the next month or so, it is fair to assume we don’t have any additional questions. The investigation is likely to be completed in the next month, and then the findings will be presented to a committee. At that point, disciplinary actions will be implemented, as needed, and those actions are kept confidential.” It is helpful to stop and ask the interviewee if they have any questions. The investigator is aiming to make the interviewee relaxed, so it is helpful to start off with basic questions, like: “how long have you worked for the company, could you explain your role in more detail, what do you do in your free time, did you watch the game last night, etc.” Hopefully, this subtle chit chat will help develop rapport. It is good practice to set a baseline for how an interviewee responds by having an opening conversation. Start off with easy questions, such as, “how long you have been at the company; what do you do; give me Currents 24.1 2020


some background about you.” Usually, even

global turnover for the inappropriate export

the greatest pieces of information in an

if nervous, interviewees are okay talking

of data.8 Google faced proportional fines

investigation can come from hidden cameras.

about themselves. Additionally, sometimes

in Europe recently for moving data around

There are security cameras in all types of

instead of answering the opening questions,

inappropriately. Lawyers need to avoid

places. Occasionally when conducting an

the interviewee will just launch into what he

negative consequences to company data, such

investigation, the attorney might partner

or she knows or thinks the investigator wants

as a purge or wipe by a third-party hacker,

with the firm’s internal security group. If

to talk about.

where data was not properly handled and the

they start humming “Bad Boys, Bad Boys,”

firm improperly exported emails.

pay attention. They will want to plant GPS

Opening can be a tactic, as for example

9

devices on people’s cars and put hidden

in interviewing the accused, ask “Did you

It is most often the case that lawyers

touch her inappropriately, cause that is what I

conducting investigations are terrified

have heard.” Often times, the lawyer is going

about data privacy. Some will go on record

for the shock value, but it is rarely necessary.

to say they don’t fully understand the topic

—————————————————

and that it is complicated. Up and coming

V. Jurisdictional Issues

young professionals need to get to know the

—————————————————

GDPR, which has widespread implications.

In addition, in the U.S., a firm cannot

The technical aspects of data privacy

Understanding this area of the law is

require an employee to turn over a password

advantageous.

to a privately held email or social media

create issues. Because certain jurisdictions have robust data privacy laws and enforcement

Many countries are mimicking some

policies, preparation, again, is key. In order to

form of data privacy. Because of rapid

efficiently and expeditiously obtain the best

changes in this area of law, lawyers must

advice pertaining to data privacy in different

stay updated. Although changes emanate

regions, the investigative lawyer must

from international governmental bodies,

learn who to rely on and where resources

data privacy remains a big issue. Different

are located. When there is a fast-moving

U.S. states have different laws, and an

investigation that will reach three countries,

investigating attorney in California will

the last thing the lawyer wants to learn is that

be facing privacy laws similar to Europe's

company servers are in a particular European

GDPR.10

country that has restrictive data protection regulations.

If a lawyer does not have a data privacy group at his or her company, he or she should

cameras in places where they should not. Spying on someone in a way where they have an expectation of privacy, even in the US, is a violation of the law with the potential to land the firm and the lawyer in a lot of trouble.

account. This issue is going to come up during investigations. Firms in the U.S. cannot put a hidden camera in the bathroom. For example, a client may have a situation going down in the bathroom without knowing exactly who is involved or what is happening. Consequently, the firm may want to put cameras in the bathrooms. This is not allowed because employees have an expectation of privacy.11 With regard to GPS devices, if it is a company vehicle, the firm must notify people that the vehicle is being tracked by GPS. If

The lawyer needs to find out what they

check in with the groups that are handling

can as fast as they can. However, he or she

data as a starting point. For instance, HR

should not hold out as an expert if not one,

should be able to identify the actual location

even when trying to learn at an accelerated

of confidential files, where they should be

With regard to recording, some states

pace. A lawyer should reach out to colleagues

located, and whether there are secondary

have a requirement of two party consent

and his or her network and get advice. Know

files being created. Having this conversation

while others require only the consent of one

that if there is a misstep on data privacy, it

early enables the attorney to move data to

party.12 If the company or the client has a

puts the company in a world of hurt. Under

its proper location and secure it with the

rule with regard to recording, the investigator

the new General Data Privacy Regulation

right access.

must know how he or she can effectively

(GDPR) of the EU, damages for a breach 7

can be up to 20 million euros or 4% of annual Currents 24.1 2020

Data privacy concerns do not arise solely with regard to data files. One of 58

a firm tries to secretly add GPS, that could be an issue.

conduct the recording and make certain no one violates company policy. If someone in


an interview puts a cell phone on the table,

criminally illegal to record without consent,

there are a lot of different cost considerations

they may be recording the interview and the

employees may complain and cite a recording

in play.

investigator’s demeanor and professionalism.

that is in their possession. The lawyer

Even if there isn’t a phone on the table,

receiving that complaint needs to stop and

assume the interviewee may be recording

consider what the recording is about.

Some firms only retain a data privacy officer and minimal staff. Firms should take data privacy issues seriously, especially if

the interview. There are cases where people’s

With regard to investigation protocol,

they have a European presence. Adding this

phones have many blurry pictures from

there are at least two steps. First, it is

component will affect the entire compliance

inside their pockets from the interview room.

important to make sure from a criminal

program because resources are reallocated

One of the things to tell interviewees is “I

standpoint what laws might be implicated.

and moved around. Luckily the response so

am NOT recording this conversation. The

Sometimes there is an issue with U.S. law, but

far has trended towards an increase in cross-

only way I record this is taking handwritten

there could also be criminality in a foreign

border enforcement cooperation.

notes. I promise you I am not recording you

context. So, the lawyer needs to check with

—————————————————

and I would hope that you would pay me

local counsel about what laws are involved,

the same courtesy. If you are recording, you

how many jurisdictions’ laws are relevant

VI. Global Responses to U.S. Enforcement Practices

should let me know.” With this approach, the

to an investigation, and whether the laws

—————————————————

interviewee might still record, but at least the

are criminal or civil. Second, the lawyer

interviewer’s approach is on the recording.

has to then examine the data privacy issue.

The success enjoyed by the U.S. pursuing

Another approach is to delicately ask the interviewee if they are recording. It leaves

Checking with local counsel here is also important.

large scale frauds is likely one, if not the main, driving force behind increased cross-border cooperation. Further, there is an abundance

the interviewee two options, lie on their own

The question of expense often arises,

of money to be collected by governments

recording or stop recording the interview. If

in conjunction with conducting the

successful in pursuing such prosecutions. For

they stop the recording, make sure to extend

investigation and receiving outside advice.

many years, the DOJ independently enforced

appreciation and say, “thank you.”

Large, sophisticated organizations typically

violations of this nature, hoping to sway the

have a lot of internal resources in many

global community to follow suit. Indeed,

locations, often with local counsel and

recently many other jurisdictions have

sometime in-house counsel, sometimes

recognized the value in pursuing corruption

external counsel, or both. Also, GDPR, in

and the importance of its effect–promoting

particular, has increased investigation costs

social justice. What remains to be seen is

compared to three years ago.

whether these drivers are as important to

If the interviewee shows his or her phone as if it were shut down and says, “Look I am not recording”, that is not definitive. There is a downloadable app that makes it look like a device is actually shut down. The app was developed by Safe Workplace, LLC.13 Before

governments as the money collected as a

going into the interview, there is a button that

When beginning an investigation

the app user can push and the phone goes

now, general counsel has to understand the

blank, so that it looks like it is not recording

day-to-day data privacy issues that must

Enforcement authorities around the

and not on. This type of app allows recording

be addressed. Having data privacy counsel

world continue to recognize and effectuate

secret conversations too, such as a meeting

is ideal. However, it does not mean other

such laws, in turn reinforcing their

with the boss.

members of the legal team do not need to

cooperation with U.S. enforcement and

know the basics. If a lawyer investigator

regulators. They stand to benefit most by

cannot look at materials over the network,

working cooperatively towards enforcement

what must be done to examine those

and avoiding quarrels with U.S. enforcement

materials? Whether there is an internal

authorities.

As a side note about recordings, sometimes an employee may utilize a recording to support a complaint they have lodged, which is now the basis of the investigation. Even in countries where it is

resource or external resources in the country,

result.

Finally, the global response is a function

59

Currents 24.1 2020


of the market’s demand for enforcement

boast a more international network utilizing

and, by extension, global cooperation in

three investigators covering tri-spheres, for

this arena. Social media has heightened the

example, agents in the western hemisphere

VIII.

public’s awareness of ethical issues and raised

in addition to others focused on covering

—————————————————

consumer expectations for companies they

the eastern hemisphere. These groups are

Compliance teams are crucial because,

choose to purchase from. Regulators respond

dedicated to internal investigations and

properly run, they are capable of building

to these concerns. The Organization for

all incidental work. Some companies have

organizational confidence that investigations

Economic Cooperation and Development

internal legal counsel around the globe,

and employee concerns alike are taken

(OECD) 14 out of Paris, coordinates an

consisting of Regional Compliance Counsel

seriously. When there are consequences

annual anti-corruption summit attended

(RCCs) and Regional Compliance Managers

to actions, human nature dictates better

by law enforcement agencies from all over

(RCMs) who sit in targeted areas around

behavior is likely to ensure, or at least, better

the world, 15 described by a former US

the world and consult with the company

empowers the relevant authorities to take

prosecutor on a podcast as a gathering of

regularly. These advisors and managers also

action before significant impacts in the state

global regulators to learn from one another

have a hand assisting with investigations.

of affairs are felt.

and share information. By all appearances,

Investigators rely on them for cultural

these meetings create opportunities to

sensitivity data. In that way, the company

build relationships, work together on cross-

feels it has better coverage than it might if

border prosecutions, and ultimately foster

instead utilizing purely U.S. investigators

cooperation.

who parachute in only when crisis strikes. As

—————————————————

such, internationally based teams represent a

VII. Minimizing the I m pac t o f C h a n g e s i n Enforcement Practices

thoughtful and efficient way of positioning

—————————————————

While companies cannot control fines

mistakes and to reinforce the company

imposed after the fact, they are able to take

culture and policies. These practices can be

With increased collaboration between

a preventative approach from within the

used in conjunction with disciplinary actions.

countries come larger fines. Continued

organization. In addition to the relationships

This sort of collaborative approach hopefully

intragovernmental commitments to

between counsel and compliance, working

will assist the business side of companies

cooperate, to the extent such cooperation

closely with HR is invaluable. By ensuring

understand that compliance groups are here

occurs, incentivizes further efforts by more

the smaller issues are being addressed and

to help the business work through these

governments, making it unlikely such

checking in with them to see what is landing

issues.

cooperation will end. Given this reality, it

on their table, larger problems can be

is unclear how companies can minimize the

sidestepped or avoided altogether. Employees

impact of fines and penalties.

reach out to HR often, unsure about what to

16

Historically, the approach to handling growing multinationalism, with respect to enforcement, has been the formation of international legal and compliance teams. Some investigative teams are primarily composed of former FBI agents and DOJ professionals based out of the U.S. Others still

people so as to address needs as they arise.

do in certain circumstances. These “smaller” complaints need to be addressed properly before they become a more serious issue. Additionally, proper handling of minor issues builds employee confidence in organizational ethical standards and legitimizes internal compliance programs. 60

Currents 24.1 2020

—————————————————

Conclusion

When employees are allowed to practice poor behavior and exercise bad judgment without repercussions, the fact that behavior persists, gets worse, or is adopted by others should not surprise. Although disciplinary actions are not shared, companies can implement training and lessons learned to help create more awareness of common


End Notes 1.

2018 Annual Report to Congress: Whistleblower Program, U.S. Sec. & Exchange Comm'n 1, 20 (Nov. 15, 2018), https://www. sec.gov/sec-2018-annual-reportwhistleblower-program.pdf. 2. U n i t e d S t a t e s E q u a l Opportunity Com., Dept. of Labor, What You Should Know: EEOC Leads the Way in Preventing Workplace Harassment, https://www. eeoc.gov/eeoc/newsroom/wysk/ preventing-workplace-harassment. cfm (last visited Jan. 22, 2020). 3. Carrie Penman, 2018 Ethics & Compliance Hotline and Incident Management Benchmark Report, Navex Global 1, 10, https://trust.navexglobal.com/ rs/852-MYR-807/images/navexglobal-2018-hotline-incidentmanagement-benchmarkreport.Pdf?_ga=2.2485 35815.1297925282.1571022941153615598.1571022941 (last visited Jan. 22, 2020). 4. Id. at 22. 5. See generally Upjohn Co. v. United States, 449 U.S. 383 (1981) (providing flexible framework identifying when employee communication with corporate counsel entitled to attorney-client protection). 6. The American Bar Association has stated that a proper Upjohn warning must advise the employee that “counsel represents the corporation and not the employee; communications between the employee and counsel will be privileged; however, this privilege belongs to the corporation and the corporation alone can decide to exercise it or waive it.” Ashish S. Joshi, Corporate Miranda: Clarifying Lawyers’ Loyalty During an Internal Investigation, A.B.A. (Oct. 31, 2009), https://www. americanbar.org/groups/business_ law/publications/blt/2009/09/07_ joshi/. 7. Regulation 2016/679, of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC, 2016 O.J. (L 119). 8. Id. at 82–3. 9. Adam Satarino, Google is Fined $57 Million Under Europe’s Data Privacy Law, N. Y. Times, Jan. 21,

10.

11. 12.

13.

14.

15.

16.

2019, nytimes.com/2019/01/21/ technology/google-europe-gdprfine.html. See 2018 Cal. Stat. 1807 (20172018 Regular Session) (to be codified at Cal. Civ. Proc. § 1798.100–1798.198, eff. Jan. 1, 2020). 18 U.S.C. § 2511 (2)(a) (2012). 18 U.S.C. § 2511(2)(d) (2012); Tex. Penal Code §16.02 (2019); Tex. Code Crim. Proc. § 18.20 (2015); Recording Phone Calls and Conversations, Digital Media L. Project, www.dmlp.org/legalguide/recording-phone-calls-andconversations (last visited Jan. 22, 2020). Ap p St o re Pre v i e w , A p p l e , https://apps.apple.com/us/app/ stopharassmentapp-corporate/ id1344409073 (last visited Jan. 22, 2020). The OECD is an annual forum in which the governments of thirtyfour democracies with market economies and more than seventy non-member economies meet to work with each other to “promote economic growth, prosperity, and sustainable development.” What is the OECD?, U.S. Mission to Org. for Econ. Cooperation & Dev., https://usoecd.usmission. gov/our-relationship/about-theoecd/what-is-the-oecd/ (last visited Jan. 22, 2020). OECD Global Anti-Corruption & Integrity Forum, OECD, http://www.oecd.org/corruption/ integrity-forum/ (last visited Jan. 22, 2020). How Companies Get Caught: Chuck Duross, Trace (Mar. 7, 2018), https://www.traceinternational. org/bribe_swindle_or_steal.

61

Currents 24.1 2020


General Data Protection Regulation and California Consumer Privacy Act: Background C U R R E N T

—————————————————

I.

Introduction

————————————————— The Internet is certainly among the most

E V E N T S

This article was a collaborative effort of the following editorial members: Greta Carlson, Jonathan McKinney, Elizabeth Slezak, Esther-Sarah

significant technological advancements in

Wilmot.

modern times. Data and information can

https://edps.europa.eu/data-protection/

now be transferred almost instantly to anyone

data-protection/legislation/history-general-

across vast distances. The convenience and

data-protection-regulation_en. Part IV and

broad accessibility of the Internet has led

V, respectively, address impacts within the

to extensive economic development, new

EU and beyond it. Part VI breaks down

markets, and market entrants; its importance

California’s legislative response to GDPR.

cannot be understated. While the benefits of the Internet are readily apparent, beneath the surface lie legitimate concerns about individuals’ online data privacy. About a decade after the advent of the Internet, the Council of the European Union (EU) took an interest in the state of consumer protection in this sphere, adopting the European Data Protection Directive (Directive 95/46/EC) in 1995. Directive 95/46/EC’s stated purpose is to provide consumers with a sense of confidence that online data will be protected and kept private. On May 25, 2018, nearly 25 years later, the EU adopted the General Data Protection Regulation (GDPR) to further address such concerns. Part II provides a brief inquiry into the relevant legislative history, explaining the various proposals and compromises made amongst the EU, as well as the policy behind GDPR and the rights granted. Part III examines the elements of GDPR. See

opinions, and decisions.” One of the European Council’s final sweeping changes came April 27, 2016, when they officially repealed Directive 95/46/ EC—the first step in binding EU member countries to the GDPR. The purpose of repealing the early Directive 95/46/EC was to update data privacy protections. The GDPR notes how “rapid technological developments and globalization have brought new challenges for the protection of personal

—————————————————

data.” The GDPR went on to mention that

II. Legisl ative History

these new advancements “require strong and

————————————————— Directive 95/46/EC laid the groundwork for the GDPR, allowing the European Commission to “review the existing list of countries which offer an adequate level of protection of personal data.” At this time, Directive 95/46/EC was not a binding order; rather, simply a review of Member States. Data Protection Authorities granted “seals and marks to services–to reinforce consumer

more coherent data protection framework in the Union, backed by strong enforcement, given the importance of creating the trust that will allow the digital economy to develop across the internal market.” Finally, on May 25, 2018, the GDPR went into full force and effect, binding all EU member countries. See https://edps.europa.eu/data-protection/ data-protection/legislation/history-generaldata-protection-regulation_en. A. Intent and Purpose of the GDPR

confidence.” On March 12, 2014 the European

The purpose of the GDPR is threefold.

Parliament voted in favor of the GDPR

The policy purposes set forth throughout the

with an overwhelming number of votes

legislative history of the GDPR consists of

in favor. On June 15, 2015, the European

three separate but interrelated goals. First,

Council decided to replace the previous

the GDPR sought to provide a uniform

Article 29 Working Party with the European

series of regulations across all EU member

Data Protection Board (EDPB). From there

countries. One of the main concerns with

on out, EDPB’s role was “to ensure the

Directive 95/46/EC was that it appeared

consistency of the application of the GDPR

too disjointed and limited in its reach in

62

Currents 24.1 2020

throughout the Union, through guidelines,


order to achieve the goals of data protection

subject to its provisions to abide by certain

policy objectives by boosting consumer

and enforcement of law. Second, the GDPR

principles. Whereas citizens are explicitly

confidence in EU member countries and

seeks to instill confidence in citizens of EU

granted rights, principles are parameters set

growing the digital economy by allowing

member countries by ensuring their private

for organizations to follow that indirectly

for competition and the invention of new

data will be protected by those organizations

bolster the rights of citizens.

digital services. See https://edps.europa.eu/

that seek to use it. The GDPR explicitly grants new rights for EU citizens regarding their personal data. Third, the EU sought to boost Europe’s digital economy through these new protections—if people felt that their personal data was handled securely, they would be more willing to use digital services. The EU found these themes to be of particularly importance in recognition of the state of the modern world–that is, one pervaded by Internet integration in all economic aspects. Indeed, Recital 2 of the

i.

Right of Data Portability

The right to data portability (RtPD) is easily defined. It is the right to receive one’s

data-protection/data-protection/legislation/ history-general-data-protection-regulation_ en.

own personal data from an organization

ii. The Accountability Principle

in a commonly used and easily shareable

The accountability principle is integral

form. Surprisingly, this was one of the more

to fulfilling the GDPR’s goals and expands

contentious rights to be introduced by the

protections and rights for EU Member States’

GDPR. Indeed, there was much debate over

citizens, placing the burden on organizations

whether RtDP truly belonged in the GDPR

collecting and transferring data to prove they

or whether it was a concept better suited for

are acting in accordance with the GDPR.

other areas of law.

Recital 85 gives a specific example of how

While some Member States favored

the accountability principle works. If there a

RtDP’s inclusion in the GDPR, others were

data breach occurs, the controller of the data

concerned with “risks of data portability for

has seventy-two hours to notify the persons

the competitive positions of companies and

affected by the data breach. However, if they

. . . the relationship between commercial

are able to show, in accordance with the

confidentiality and the IP of data controllers.”

accountability principle, that the breach will

Some Member States argued RtDP had

not put the rights and freedoms of the citizens

nothing to do with the protection of data

affected at risk, they are not required by the

Within the text of the GDPR, the

transfer and instead had more to do with

GDPR to notify those affected. The burden

EU Parliament and Council stated their

consumer and competition law. Ultimately,

of proof ultimately lies on the organization

thoughts and beliefs regarding data privacy

after critical review by the Council, the

or entity that controls the data. The GDPR

in no uncertain terms. Recital 1 states,

RtDP became part of the GDPR, included

does not assume organizations have citizens’

“[t]he protection of natural persons in

as Article 20. The Council ultimately felt that

best interests in mind and the accountability

relation to the processing of personal data

while the concerns respecting the RtDP are

principle is about forcing these organizations

is a fundamental right.” In the age of digital

arguably better addressed by other areas of

to prove they are responsible enough to

data processing, such language, regarding

law, the policy objectives of the RtDP are very

operate in the EU and in accordance with

the rights of individuals, is undoubtably

much in line with the GDPR as a whole. The

GDPR standards.

necessitated. Recital 3 of the GDPR further

RtDP was meant to “ensure that individuals

puts forth that the “processing of personal

are in control of their personal data and

—————————————————

data should be designed to serve mankind.”

trust the digital environment . . . the RtDP

Such strong language evidences the EU’s

could foster competition between controllers

newfound hardline stance on data privacy.

as a side-effect and thereby encourage the

The GDPR is now recognized law across

In addition to explicitly declaring

development of new data-related services.”

the EU, allowing EU citizens more control

citizens’ rights, GDPR compels organizations

The RtDP achieves the second and third

over their own personal data, improving

GDPR, the EU Parliament and Council makes these goals–to contribute to an area of freedom, security, justice, economic union, social progress, stronger economies within the internal market, and to the well-being of natural persons–abundantly clear. B. Rights and Protectionary Principles

III. Mechanics of the GDPR —————————————————

their security both online and offline. 63

Currents 24.1 2020


The regulation protects natural persons

right to be informed, the right of access, the

must be “processed lawfully, fairly, and in a

with regard to the processing of “personal

right to rectification, the right to erasure,

transparent manner in relation to the data

data” and creates rules relating to the free

the right to restrict processing, the right to

subject; collected for specified, explicit and

movement of that data.

data portability, the right to object, and the

legitimate purposes and not further processed

i. Consent

right of automated decision making and

in a manner that is incompatible with

profiling.” Within these rights, individuals

those purposes.” Further, processing must

have the power and control over what data

be “adequate” to properly fulfill the stated

marketers can collect, store, and use. Further,

purpose for collection, having a relational

individuals can rely upon rights granted–

link or relevance to that purpose, and must

such as the right to deletion, which allows

be limited, or “not excessive in relation to the

for deletion of all data collected about the

purposes for [processing].”

Individual consent “is one of the few circumstances under which an organization may lawfully process data.” It is ostensibly the responsibility and burden of any organization processing data to prove they are acting within GDPR guidelines given the broad and farreaching implications of the accountability principle. Specifically, Article 4 requires service providers to obtain consent from consumers before processing personal data. Consent has several elements. It must be free, specific, informed, and unambiguous. Consent must be given to each processing activity by statement or by clear and affirmative action as to signify agreement to the processing of personal data relating to him or her. When processing has multiple purposes, consent should be obtained for each purpose. Once consent is obtained, data controllers and processors can process the consumer’s personal data, but the consumer has the right to withdraw that consent at any time. The withdrawal of that consent does not affect the lawfulness of the processing based on consent before its withdrawal. Additionally, Article 4 defines personal data as “any information relating to an identified or identifiable natural person, directly or indirectly,” including data such as an “address, license plate number, Social Security number, blood type, bank account information, and so on.” The GDPR not only gives data subjects more control over their own personal information, but it grants data subjects eight key rights. These rights are: “the

consumer. However, this right is not absolute

Article 6 provides for six legal lawful

and only applies in certain circumstances for

bases for processing. Processing shall be

the individual. For example, individuals have

lawful only if, and to the extent that, at

the right to have their personal data erased if:

least one of the following bases applies:

“the personal data is no longer necessary for

the data subject provides consent to the

the purpose which you originally collected

processing of his or her personal data for one

or processed it for.”

or more specific purposes; performance of a

Compliance with the GDPR regulations

contract to which the data subject is a party

extends to both data controllers and data

necessitates processing; compliance with a

processors, contrary to the former legal

legal obligation to which the controller is

regime conditioning liability upon identity

subject necessitates processing; protection

of the processor–that is, who controlled the

of the vital interests of the data subject

data. Data controllers and data processors

or of another natural person necessitates

both determine the purpose and means of

processing; performance of a task carried

processing data, but data processors process

out in the public interest or in the exercise

data for the data controllers, who in turn

of official authority vested in the controller

retain such data. Controllers are “the main

necessitates processing; or where processing

decision-makers, who exercise overall control

is necessary for the purposes of the legitimate

over the purposes and means of the processing

interests pursued by the controller or by a

of personal data.” If two or more controllers

third party, except where such interests are

jointly “determine the purposes and means

overridden by the interests or fundamental

of the processing of the same personal

rights and freedoms of the data subject which

data,” they are joint controllers. However,

require protection of personal data.

they are not termed joint controllers if they

Lawful processing is one piece in a

process the same data for different purposes.

global trend encouraging greater corporate

Processors act “on behalf of, and only on the

accountability, with regard to protecting

instructions of, the relevant controller.”

consumer data. This trend has influenced

Article 5 deals with the principles

other countries to implement changes and

relating to the processing of personal data.

take a protective posture towards consumer

The regulation provides that personal data

data privacy rights. Data controllers and

64

Currents 24.1 2020


processors face new obligations with respect

the EU according to the DTRI Trade

amount necessary to establish protection

to personal data and shall be responsible for

Restrictiveness Index (Index). France

varies among Member States. In Germany,

and able to demonstrate accountability with

elected to adopt privacy regulations more

an investment as low as €4,000 may suffice

such data.

restrictive than those required. The Loi

to establish a sui generis right.

—————————————————

pour une République Numérique creates a

—————————————————

IV. Impact Within the EU —————————————————

data retrieval obligation for providers of online public communications services in the French market. Recently, French data

V.

Beyond

the

EU

—————————————————

Data privacy regulations are set by the

protection authorities issued a €50 million

National privacy policies and regulations

EU, supplemented by individual Member

(approximately $57 million) fine against

vary across the world. The approach of each

Countries which then set their own rules

Google for violating the GDPR. The fine,

regime reflects the country’s culture and the

and policies at the national level. Existing

issued in January 2019, is the largest penalty

government’s priorities. The EU, for example,

data privacy regulations and intellectual

imposed for a data privacy breach under the

is primarily driven by privacy concerns. The

property laws at both levels of governance

GDPR. Experts contend that the Google

protection of personal data and the privacy

must be reviewed and, as necessary, revised to

fine set a benchmark for future data privacy

of communications are statutory human

align with the GDPR goals. To that end, the

penalties. France’s hardline approach may

rights under EU law. However, security is

European Commission proposed revisions

influence the direction of data privacy law

the driving concern for other countries.

to the ePrivacy directive, which regulates

in Europe.

Security-focused countries typically adopt

the confidentiality of communications and

GDPR’s impact is not limited to

restrictive data policies that limit cross-border

the use of cookies, and Regulation 45/2001,

data privacy regulations. Rules regarding

data flows and provide limited personal

which applies to EU institutions when

intellectual property rights must be reviewed

privacy protections. China, Russia, and

processing personal data.

in light of the right to data portability created

Turkey rank the highest for restrictive data

In fact, the GDPR specifically requires

in the GDPR to avoid a conflict between

policies. All three countries include some

individual Member Countries to establish

the two regimes. The GDPR grants data

form of localization, retention, and transfer

their own rules, policies, and enforcement

subjects the right to transmit their personal

requirements.

authority schemes in accordance with

data from one data controller to another.

China is the overall most restrictive

particular parameters. However, Member

This right can conflict with the right of

digital trade country in the Index, followed

States are permitted some discretion in

data controllers to protect trade secrets,

by Russia, India, Indonesia, and Vietnam.

the construction of these rules. States

sui generis databases, and copyrighted

China’s trade and Internet restrictions inhibit

may provide for exceptions or limitations

content. Facebook, headquartered in Ireland,

the free flow of information. For example,

t o G D P R r u l e s w h e re f re e d o m o f

previously fought a request for disclosure

all data must be stored domestically and any

expression, employment law, and scientific

of personal information by invoking the

incoming cross-border Internet traffic must

or historical research is concerned. The

privilege of trade secret protection under the

pass through a national firewall. China’s

national regulations established by each

Irish Data Protection Acts. Vague language

robust security policies limit personal rights

country reflect its individual priorities,

in the GDPR and inconsistent application

by permitting the government to demand

cultures, and legal structures. The details

of EU intellectual property rules cause

proprietary information from organizations

of country’s implementation plan may

uncertainty in the future of intellectual

and personal data from telecommunications

impact the direction of future legislature and

property rights in personal data in the EU.

operators and Internet service providers.

enforcement actions.

A sui generis database right exists when a

Further, China’s proposed social credit

France, for instance, is the most

database was created as a result of substantial

system, which would monitor citizens’

restrictive digital trade country within

investment. However, the investment

behavior and collect personal data, does not

65

Currents 24.1 2020


require an individual’s consent nor does it

The principles regarding collection

based in countries with a mutual adequacy

provide an avenue for an individual to access

processes, data protection, and individual

decision from the EU may freely transfer data

or correct their own person data. Following

rights established in the Guidelines have

in and out of the EU without any further

in China’s footsteps, Vietnam has adopted its

become a foundation upon which other

safeguards necessary. To receive a mutual

own restrictive cybersecurity policies.

international economic forums and

adequacy decision, the EU must determine

The United States’ approach to data

organizations have built their own privacy

that the country offers an adequate level of

regulation attempts to find the middle

standards and guidelines. The 2018 G-20

data protection. Most recently, the EU and

ground. Its policies aim to find a balance

and the Asia-Pacific Economic Cooperation

Japan agreed to recognize each other’s laws

between trade interests, privacy protection,

(APEC) have both published principles and

as equivalent. Japan further committed to

and national security. The growth of digital

best practice guides related to data privacy

implement additional security measures for

trade has increased the focus on personal

and cross-border data flows. The 2018 G-20

the handling of personal data from the EU.

privacy and efficient data flow. However, the

Digital Economy Ministerial Declaration

The APEC Cross-Border Privacy Rules

distinctions between opposing fundamental

identified principles for data sharing

(CBPR) present a similar methodology

approaches to data regulation prevent

standards for privacy and cross-border data

respecting cross-border data flows of personal

interoperability between different data

flows. The 2005 APEC Privacy Framework

data. The CBPR balances data privacy rights

privacy regimes. The EU, US, and China

established principles and implementation

with commercial interests and identifies best

all have unique approaches to data policy.

guidelines to assist countries with establishing

practices for protecting personal data during

As other countries mirror the policies and

national data privacy policies. This year will

cross-border transfers. CBPR members agree

rules of their closest trading partners, three

see the revision of many of these international

to recognize each other’s data privacy systems

distinct economic spheres emerge based

privacy frameworks. OECD and APEC

as equivalent. Current members include the

on each approach. Some experts warn that

are scheduled to update and publish their

United States, Japan, Mexico, Canada, South

a system for global interoperability must

guidelines in 2019, and the 2019 G20 host

Korea, Singapore, Taiwan, and Australia.

be adopted to avoid fragmentation of the

has indicated the summit would focus on

Internet between the European, Chinese,

data governance.

The recently enacted Comprehensive and Progressive Agreement for Trans‐Pacific

and American spheres. However, there are

Despite the necessity of cross-border data

Partnership (CPTPP) created the strongest

no globally accepted standards nor binding

flows in international trade and commerce

commitments for binding digital trade

multilateral rules specifically concerning the

and growing public concern over personal

globally. The partnership is comprised of

cross-border flow of personal data.

data protection, there are currently no

eleven Asia-Pacific countries, including

Several international organizations

binding multilateral rules regulating privacy

Australia, Canada, Japan, Mexico, and

have developed non-binding principles

or cross-border data flows. Enforceable

Vietnam. CPTPP allows for the cross-border

and guidelines to assist governments in

trade rules are, however, gradually being

transfer of information between signatories,

developing or reshaping national data

established by means of trade agreements.

subject to restrictions for legitimate public

privacy policies. The Organization for

The GDPR allows non-EU organizations to

policy purposes. Discriminatory trade barriers

Economic Co-operation and Development

import and export personal data in several

and localization requirements are prohibited.

(OECD) established the pivotal 1980 Privacy

circumstances. Under the US-EU Privacy

The agreement further requires all signatories

Guidelines, the first set of international

Shield, transatlantic transfers of personal

to develop their own legal framework for the

data privacy principles. The Guidelines,

data by certified, US-based organizations

protection of personal information and to

last updated in 2013, are based on a risk

are permitted. Certification requires an

adopt consumer protection laws for online

management approach and emphasize the

organization to enroll in a voluntary program

commercial activities, but did not provide

importance of data protection in the context

and comply with its commitments and

any specific guidance in this regard.

of cross-border flows of personal data.

obligations. Alternatively, organizations 66

Currents 24.1 2020

The proposed United States-Mexico-


Canada Agreement (USMCA) similarly

Consumer Privacy Act (CCPA). Widely

best to accomplish protection. Specifically,

establishes trade rules and policies on

perceived to be America’s reply to the GDPR,

both aim at protecting personal information

privacy, cross-border data flows, and

major discrepancies between the bills do exist

related or associated with an identifiable

security. The USMCA, like the CPTPP,

and are sure to cause headaches in compliance

natural person, consumers and data subjects

promotes interoperability, prohibits arbitrary

departments in global firms with presences

respectively.

restriction of cross-border data flows, and

in each market.

requires member countries to establish

One work around to undertaking such

A. Definitional Distinctions

compliance contemplates the disassociation

national rules for personal privacy and online

CCPA protects “consumers,” natural

of data collected from identifiable individuals,

transactions. However, the USMCA goes

persons residing in the state and those

such that without other information the data

further than CPTPP, referring countries

domiciled there, but living elsewhere with

is not traceable back to that individual.

to the APEC Privacy Framework and

the intention of returning. As defined,

The degree of disassociation creates the

the OECD Guidelines for guidance in

“consumer” is a term broad enough to

distinction between “pseudonymous” and

developing their own privacy framework and

encompass even employee and business-

“anonymous” data. Often times, this sort of

consumer protection laws.

to-business transactions, in addition to

largely undiscernible data, with respect to

Expanding upon these agreements is an

household goods and services consumers.

the specific persons providing it, is clumped

important step toward establishing consistent

Take for comparison the broader “data

together into a big heap or “aggregated.” In

international standards for data privacy and

subject,” defined simply as an identifiable

both regimes, anonymizing, pseudonymizing,

data flows. The CBPR will continue to grow

person to whom personal data relates,

and aggregating functions must be performed

in strength and influence as more countries

contemplated by the GDPR.

with stringent technical controls to meet

and organizations join. Furthermore, the

Largely, CCPA takes aim at Big Tech

qualification of the respective regulatory

best practices delineated by the CBPR can

by targeting for-profit California entities

definitional bar. Companies that follow these

serve as the basis for further binding trade

that either: have gross revenue exceeding

guidelines are able to qualify the consumer

agreements. Because the CBPR includes

twenty five million dollars; derive above 50%

information collected as “deidentified”

economies at different stages of development,

of annual revenue from selling consumer

or “aggregated,” neither of which are

its initiatives can be scaled up to larger

information; or buy, sell, or share more than

restricted by the CCPA. Similarly, the EU’s

global efforts. Similarly, the language of the

fifty thousand consumers’ personal data

framework does not regulate data qualifying

USMCA is sufficiently broad, enabling its

each year. Service providers, third parties,

as “anonymous.” However, “pseudonymous”

adaptation for use in future agreements.

entities that share common branding, as

data is defined to include personal data and

Recent developments in data policy, privacy

well as controllers of covered businesses

is thus fair game under the general regulatory

principles, and digital trade agreements serve

are all required to abide by the regulation;

scheme. California has yet to make any clear

as templates, or least a starting place, on

likely a legislative tactic to close anticipated

rule or distinction as to pseudonymous data.

which to base future domestic regulations

loopholes in advance of their exploitation.

and binding multilateral agreements.

Note GDPR’s broader scope in this area–

Differences in each regime’s respective

—————————————————

even entities established outside the EU

foundational principles manifest in a variety

may be subject to abiding its regulations,

of forms, significantly in the distinction

specifically if the behavior of EU data

between their respective approaches: opt-in

VI.

CCPA

v.

GDPR

—————————————————

B. Foundational Regime Differences

subjects is monitored or in connection

versus opt-out. Where European law finds

Close on the heels of the GDPR,

with some offer of goods or services. Both

an implicit right of personal dignity and a

progressive legislators in California similarly

schemes essentially approach the sort of

positive right to protection of personal data,

sought to enact data privacy protections

data—personal information, as respectively

an affirmative opt-in approach logically

for their constituents with the California

defined—similarly and contemplate how

follows. Conversely, American law, and

67

Currents 24.1 2020


by extension Californian law, traditionally

downstream recipients than is available to

balances competing principles and positive

California consumers.

The disturbing trend of increasingly common data breaches can, in the vast

and negative rights, predictably then,

Further, GDPR data subjects enjoy the

number of cases, be appropriately hedged

resulting in the opt-out approach taken by

right to rectify inaccurate and incomplete

with proper preemptive security measures.

the California legislature in enacting the

personal data, some right to restrict and

GDPR affirmatively requires particular

CCPA. In terms of practical effect, this

object to the processing of their data, as

security measures in accordance with

distinction has not presently resulted in any

well as the right to object to automated

respective risk levels. CCPA does not dictate

severe disparities, but instead simply lends

decision-making. The implications of the

particulars in this respect. However, it does

context to developmental differences. Positive

aforementioned, specifically with regard to

establish a cause of action for certain breaches

rights protected by GDPR include the right

the ability to object to algorithm and non-

where the party proves a failure to maintain

to a privacy notice, to information disclosure

human decision making, are sure to make a

reasonable security measures, with risk and

or access, to data portability, to deletion, to

significant impact on companies like Google,

reasonableness judged as they align with

rectification, to object in limited ways or even

no stranger to accusations respecting the

existing case law.

absolutely to data processing, and to object

lack of corporate transparency. CCPA, on

GDPR finds implicit in the law that

to automated decision making. Differences

the other hand, provides consumers with

discrimination for exercising rights granted

in the regimes largely relate to positive rights,

an affirmative opt-out right. Essentially,

is barred. CCPA on the other hand does not

many of which are not recognized in the

businesses subject to the law are required to

allow discrimination against a consumer

California bill.

include a clear and conspicuously located

that exercises their rights, but a consumer

Both regimes contemplate a right of

“Do Not Sell My Information” link on their

who exercises their rights can be charged

disclosure and access to the information

homepage. Businesses must also comply with

differently, to the extent the difference

collected and shared. CCPA consumers

consumer requests to opt-out of the sale

reasonably relates to the value their data

can opt for a written disclosure of this

of their personal information and cannot

provided. Businesses may offer financial

information. GDPR’s disclosure grant goes

request reauthorization for the same, for

incentives to consumers, but to do so must

further, granting access to some extent to

at least 12 months post-opt-out. While

disclose as much in their terms and policies

additional portable formats. Data portability

GDPR has some opt-out features, the law

plus obtain the consumer’s opt-in consent.

rights in both schemes largely mirror one

mainly relies on its opt-in approach to obtain

another, each requiring the provision of data

substantially similar results.

in a readily usable format. GDPR’s grant is,

Both bills require compliance with verifiable rights requests within substantially similar windows of time, generally no more

C. Similarities

again, broader, requiring data controllers to

Big distinctions between the CCPA

than three months. European data controllers

actually facilitate a requested transfer to a

and GDPR include potential disparities in

have the option to charge a fee for compliance

third party.

the gravity of effect on and scope of parties

with the law. In California, non-excessive

California consumers enjoy a fairly

regulated, severity of penalties imposed, in

requests must be free to consumers. Thus,

comprehensive right to require deletion of

addition to those relating to the application

the two regimes find effective similarity here

their personal information by a particular

of diverging approaches. However, both

except to the extent some consumers with

business, who must in turn instruct its

regimes find agreement in several areas.

strenuous requests are charged some fee to

service providers of the same, subject to

Both afford a similar privacy notice and

obtain the compliance sought.

certain refusal rights. In Europe the “right

information disclosure, as to the data

to be forgotten” only applies if one of

collected and the use intended for those

As cumbersome as compliance may

six conditions is present, however where

protected, with some procedural differences

be on companies subject to these rules,

available this right is coupled with a far

in terms of which information, how much,

violations of law in this respect correlate with

more stringent informing obligation to

and the method of its delivery.

even costlier fines and potential remedial

68

Currents 24.1 2020

D. Consequences


measures, as well as the manifestations of

around the bend, these issues are sure to

such action which can cost exponential sums

become less and less opaque in the public

to the individual whose data rights have

consciousness. The effect of compliance with

been violated. GDPR grants data subjects

both GDPR and CCPA may result in a high

a private right of action for both material

burden on smaller firms who cannot afford to

and non-material breaches to remedy rights

uphold two different systems. They may be

violated. CCPA conversely grants consumers

forced to adopt whatever is stricter or attempt

a narrow private right of action for breaches

duplicitous compliance. The pressure of dual

that implicate a sub-set of personal data.

systems may result in pressure for legislative

Consumers can seek the greater-of actual or

action from a federal level as well.

statutory damages, which range from $100

—————————————————

to $750 per consumer, per incident, as well as injunctive or declaratory relief, subject to 30 day cure period.

VII.

Conclusion

—————————————————

CCPA subjects violators to a fee schedule

How privacy online will be defined

beginning at $2,500 per violation or $7,500

on the Internet still remains to be seen.

per intentional violation, again subject to a

The Internet’s pioneering history has,

30 day cure period. GDPR employs a higher-

thus far, largely gone unpunctuated by

of rule with respect to either twenty million

regulation, a trend that analogizes its

Euros or four percent of annual global

nature–a modernized technological frontier.

revenue in addition to any fees imposed by

The GDPR represents a frontline of sorts in

individual member states.

the combat of such uncertainty, providing

E. Developing Trends

regulatory uniformity throughout the EU as

Trunomi founder, Stuart Lacey,

to instill consumer confidence, encourage the

encourages consumers to recognize the

use of the Internet, and boost Europe’s digital

reality: that is, your data is being sold. Why

economy. New rights protect individuals,

not willingly enter into the equation, profit

while new principles direct organizations to

on the sale of your own data, and take

act with the utmost care and responsibility in

some control back? As awareness grows this

handling the personal digital data of citizens.

approach may appeal to some. Others may

Recent developments, such as cross-border

push further for a more stringent system that

trade agreements and the enactment of

goes beyond CCPA, or even GDPR. At the

comparable legal protections, should serve

very least, this issue is top of mind for those

as a signal to nations and organizations alike,

informed purveyors of the common practices

that the time is now to take stock of and

corporate actors are currently undertaking

implement modern data privacy protections.

(or failing to undertake), particularly with respect to transparency practices. Still others accuse and suspect Big Tech and their algorithms of worse, ranging from rumors of shadow banning to more hysterical conspiracies. With artificial intelligence 69

Currents 24.1 2020


Present and Future Data Privacy Outlook M O D E R AT O R / PA N E L I S T: W E N D E L L

PA N E L I S T S :

S H E N N A

B R A D S H AW,

H A R V E Y,

M A RY

J .

B A R T N I C K ,

A L E X A N D R A

C H U G H TA I -

I S E N S E E

—————————————————

Insurance Portability and Accountability

inability of regulators and lawmakers to

I.

Act (HIPAA), Gramm-Leach-Bliley Act

articulate what compliance should look

(GLBA), and various state laws. One of the

like, all contribute to the difficulty in both

most burdensome challenges is resolving how

understanding and complying with privacy

to go about building a privacy compliance

law.

Introduction

————————————————— The General Data Protection Regulation (GDPR) is now in effect and could apply to companies around the world. U.S. companies are just starting to recognize the issue—data privacy is not something that can be ignored or relegated to a low priority compliance issue because the risks are simply too great.

4

5

6

program when various, sometimes conflicting, standards apply. Understandably, companies struggle to navigate this legal quagmire.7 Information technology outpaces the myriad of changing laws, data uses change (and expand), and frequently, data volume increases tremendously. These

The GDPR became enforceable on

changes are the root cause of the compliance

May 25, 20181 and concerns the processing

confusion for companies because it is

of personal data.2 The GDPR has had a

difficult to manage risk with all this change

dramatic effect on privacy law and has caused

occurring. Understanding that the privacy

many international companies to expend

field is a complex, ever-changing behemoth

significant resources in their compliance

is fundamental to any approach taken in

departments. Subsequent laws in other

developing a privacy compliance program.

countries are very similar to the GDPR, for example, in South America and California's California Consumer Privacy Act (CCPA).3 Clearly, privacy law is headed towards some sort of comprehensive body of law, whether federal or state in the United States and across the globe. The landscape is changing, and businesses are faced with higher risk, requiring firms to address how their data is handled internally and externally.

Additionally, the ambiguity of the laws further complicates privacy law compliance. The GDPR, for example, has ninety-nine articles and two hundred plus recitals that try to describe how a comprehensive privacy legal regime should look.8 The CCPA, effective January 1, 2020,9 contains far less verbiage while attempting to cover almost all the same subject matter that the GDPR covers. Clearly, there is tremendous ambiguity as

Current data privacy rules constitute

to what companies are supposed to do to

a patchwork of laws, due to the influence

comply with the law. The combination of a

of the European Union (EU) law and to

patchwork of law, the ever-changing nature

the new changes to California law, Health

of technology and data, and the seeming 70

Currents 24.1 2020

One key aspect of privacy is connected to an understanding of the information in scope, the use of that information, and where it is going. Any company that has offices, employees, clients in Europe, or clients that may not be in Europe but market to customers in Europe will be subject to the GDPR.10 Even businesses not subject to the GDPR are pressured to comply because of its enhanced protection measures and the possibility they will fail to retain clients if the business is not GDPR compliant. Becoming GDPR compliant may require a year’s worth of work, depending on the company’s resources. Such may be the case, for example, where only one attorney is coordinating among the entire company rather than a legal team where the work of building a compliance program can be distributed. With a single attorney coordinating the HR department, the marketing department, the product team, essentially the whole company must get involved. With a single attorney coordinating the checklist, and every department throughout the company having at least one person responsible, GDPR compliance may take a year to complete. Mainly, this is due


to the data mapping process: understanding

perform a data inventory in order to make

with respect to security. Vendor management

whose data is involved; data’s categorization;

later efforts to comply with the law an easier

is becoming more and more important as

data’s use; and where it goes. This process is

task. A fundamental piece of any privacy

many of the data breaches occur through

fundamental in becoming GDPR compliant.

program, which any company could begin

vendors or at vendors.21 This creates a huge

to develop on their own without hands-on

area of risk with respect to personal data.

legal support, is gaining an understanding

Companies should improve their diligence

that these processes do take a long time to

processes, increase vendor monitoring, and

implement and find the necessary internal

have stronger contracts. It is not just a legal

resources.

requirement under the GDPR, it is good

If that foundational work is not done, compliance is challenging because the law requires answering specific questions. For example, when a company interviews a candidate for a job, often the candidate

practice. This manner of compliance is a fairly

brings a résumé. If hired, that candidate’s

The GDPR added a second

résumé and ID are photocopied and stored

requirement—granting rights to

into a file. If the photocopier is networked,

individuals.15 In the United States, there are

however, where do the ID and résumé go, and

certain opt-out rights, such as opting out of

where does that server sit? These questions

email marketing or telemarketing.16 Beyond

must be addressed, and the business team

that, individuals in the U.S. generally do

A fourth item that is important is

must know that these kinds of internal data

not have the legal right to ask companies to

something called privacy by design, or privacy

transactions are taking place.

amend the data collected or created about the

by default,22 now required under the law.23

individuals, to delete the data, or to provide

A business runs into privacy issues anytime

more information on data that a company

that it develops new products, changes

might have.

business processes, or does something new

—————————————————

II. Features of the General Data Protection Regulation ————————————————— The GDPR has requirements for notice and consent, which are similar to privacy 11

policies in the U.S. However, there are five 12

major aspects to the GDPR that differ from existing privacy law in the United States. The first is performing a data inventory, or data mapping. The GDPR requires companies 13

to document how all personal data is used, managed, processed, and shared.

14

The

first thing that a regulator will request in the event of a massive data breach are the processing records following the inventory process in order to prove the company is doing what it is supposed to do. Compiling this inventory involves a significant amount of work and can take months to complete. Outside of the law and irrespective of the privacy regime, whether in Mexico, Canada, or the EU, companies have to know how to

By contrast, the GDPR gave every individual the right to learn more about what data a company possesses.17 Companies must provide individuals with all information, not limited to name, address, and telephone number, but rather all information actually possessed and relating to that individual.18 One such purpose for this includes the individual's right to amend that data if it is wrong19 and the right to delete that data if

significant undertaking for many companies who had to change every single customer contract or every single vendor contract in order to comply.

or different with personal data. Companies must determine whether there are ways to minimize the personal data that it is using, whether it has secured its personal data properly, or whether it has transferred data to legitimate vendors. Even after the GDPR, many companies are not yet to that point. Building a culture of privacy in a company is a difficult task and is a future goal at many companies.

the individual does not want the company

Finally, under the GDPR, a company

to have it. This is another internal process

must identify specific individuals to be

change that companies need to implement in

responsible for privacy at that company.

order to comply with the GDPR and, soon,

In some respects, an effort to raise privacy

with California law. Companies now have

should really begin with the C-suite.

to figure out ways to handle these requests

The law requires a data protection officer

from individuals, whether it is consumers,

(DPO),24 a role filled internally to take on

employees, or whomever.

an independent functional role. Europe has

20

A third item that is important is thirdparty or vendor management, particularly

laws that make it difficult to terminate a DPO, who is an employee protected under

71

Currents 24.1 2020


the GDPR, 25 much like whistleblowing

a passport, which is regulated personal data.30

broad definition of personal information,

immunity. Essentially, the company needs

Furthermore, where the company stores its

including more than internet browsing

to treat the DPO guidance as an important

information, what uses are made of that

history, demographic information, and

consideration, not to be dismissed lightly,

information, and how long the information

biometric information.33 Companies struggle

requiring a good reason for non-compliance

is stored, are all reasonable questions to ask.

to get a handle on this and how far to take

with what the DPO says that the company is

For companies not heavily involved in

compliance efforts in the face of anticipated

26

supposed to do. The DPO is expected to have a lot of clout within a company that needs to comply with the GDPR. This adds another layer of difficulty that companies will have in grappling with the new law. These are the five major aspects of the GDPR that are foreign to the United States; however, other minor aspects of the GDPR, like required employee training, may come as familiar.

27

Europe, compliance requires determining how far the company goes towards GDPR compliance. Now that the California law is

law that is still being invented. The California Attorney General is still working on issuing regulations intended to interpret the law.34

in effect, new privacy laws will sweep across

For now, the companies should focus

the nation. These changes are also coming

on the basics, such as updating policies,

to Texas.

training employees, and satisfying certain

31

There is another aspect of being in the oil and gas industry, and for those companies in the retail gas station business, choices are made about whether to own and operate

definite requirements. For example, the CCPA requires a dedicated 1-800-number where consumers can make consumer rights requests.35

—————————————————

those stations or whether to find partners

The CCPA is similar to the GDPR but

III. Changes to California Law

to operate those stations. There is a lot of

it is not exactly the same. There is a lot of

credit card information that is passed through

gray area and compliance programs struggle.

those stations every day. It is just one of the

There is not a 100% perfect requirement for

considerations that goes into how businesses

a compliance program.

————————————————— Many of these aspects of the GDPR are influencing other privacy law regimes around the world. There are at least twelve U.S. states with bills pending on privacy laws that look like the GDPR.28 California passed the California Consumer Privacy Act (CCPA), which took effect January 1, 2020. There 29

are many aspects to the CCPA that follow the GDPR, and companies doing business in the U.S. must prepare for this change. A.

Preparing for the GDPR in the U.S.

Companies with a very light touch in Europe may perhaps have assumed that the GDPR was inapplicable. However, companies must still perform due diligence with foreign companies. Companies that ask for personal information are still at risk, whether that information typically stays with the company or whether that information is of such a nature, for example,

choose to operate and whether to choose to take on that liability with data security. Service Corporation International (SCI), for example, takes a lot of credit card information, social security number information, and other information that is highly sensitive that belongs to purchasers and decedents.32 SCI did not necessarily face compliance issues with the GDPR, but it does business in California and now faces the pressure of this new law.

Enforcement under the CCPA

Under the CCPA, there is an aspect of the regulation contemplating data privacy, specifically a consumer private right of action, permitting statutory damages if a data breach36 occurs involving “nonencrypted or nonredacted personal information.”37 Any data breach that happens in California now or affects people in California could result in class action litigation where they can get between $100 to $750 per person, without

There is a major effort for companies in

proving up any damages.38 This is pretty

positions like SCI to try to map and inventory

atypical. In Illinois, a similar private right of

all of the collected personal information

action under its biometric law39 has actually

and the specific data elements, primarily,

created a cottage industry of private class

determining what the data elements are and

actions for this reason: any technical breach

with whom are those elements shared. The

of biometric data collection practices results

law is still in the process of being amended,

in statutory damages. 40 By comparison,

has ambiguous language, and features a

the CCPA goes further, contemplating the

72

Currents 24.1 2020

B.


breadth of personal information, not limited

Both houses of Congress, the House and

One of the key aspects to achieving

to biometric information, thus carrying

Senate, have had committee meetings to

CCPA compliance is determining the

potentially drastic consequences.

talk about a federal privacy law. If all states

character of data transmissions to others: who

have their own privacy laws on par with the

is the data going to and for what purpose?

GDPR and the CPPA, then the question is

Second, is this transaction a “sale” under

one of a conflict of laws. This may very well

California law, and if it is, how can the

be a field of law that is preempted by future

company present itself in such a way or notify

federal regulation by virtue of the Commerce

others that it takes privacy seriously? Future

Clause,

as is patent and copyright law.

practices will be informed by subsequent

However, supporters of the California law

clarifications by the California Attorney

want any federal privacy law implemented

General in addition to future amendments.

to be as strict as California law.

Finally, as with doing business in the

The California Attorney General pushed for an amendment to make the private right of action, plus the statutory damages, also apply to any sort of violation of the privacy aspect of the CCPA.41 The amendment allows consumers a cause of action to sue for $500 for any technical violations, including the failure to respond to a consumer’s access request within thirty or forty-five days, again without separately provable damages.42 C.

CCPA v. GDPR

At present, not much enforcement of the GDPR is taking place within the EU. Stricter enforcement is likely around the bend. The EU may intentionally be a little slow in their enforcement practices, knowing that companies are still trying to comply. Additionally, the EU does not grant a private right of action like the CCPA.43 So, there will be a different manner of enforcement of the law once the California changes are implemented. It is possible to raise this issue internally as to the resources a company needs for compliance when dealing with either the EU or California. These changes also mean encrypting personal information. The easiest way to prevent any damages from a big class action, is to just encrypt the personal information.

45

46

47

48

One unique aspect of the California law (different from the GDPR) is the concept known as “sale” of personal information. Prevailing thought might suggest that selling

EU, companies cannot meet compliance obligations without doing a data inventory, as previously described, a now-fundamental function to operating the business.

data only relates to marketing and advertising

Consumer rights requests54 are waxing

companies, those reputed for buying data.

a territory rife with phishing-esque attempts

However, the CCPA has defined “sale” to

to improperly acquire others’ data through

seemingly include almost any transmission

access requests.55 Additionally, consumers

of personal information to a third-party

may begin asking companies to delete their

other than to a service provider that will only

personal information.56 However, it is still

use the data for the purpose of providing

uncertain whether the law requires a hard

the service. This construction is slightly

delete versus a soft delete—a technical

convoluted, but essentially, if a business gives

question. One concept worth contemplating

out personal information to anyone except

is termed referential integrity 57 in which

a service provider, that transaction could be

companies take a certain database down

characterized as the sale of data.

while still allowing another company

49

50

Companies that “sell” data, as defined, should contemplate several actions they will be required to undertake to be in compliance. First, a company’s home page must have a clickable link for individuals to opt-out of any data sales. The company’s privacy policy 51

One potential issue the CCPA presents

needs to inform readers that the company

is its application to California residents who

sells personal information and provide

browse out of state companies' websites, if

instructions as to how individuals can stop

such state lacks similar data privacy laws.

their personal information from being sold.52

What do these companies do with their

The new law has several notice requirements

data? It is difficult to say and has sparked a

that must be met before data can be sold.53

national debate about federal privacy law.44

database reliant on residual data58 to continue running. Such illustrate the lack of clarity companies face in determining how far to go in deletion of data. D.

Vendor Contracts

Another key aspect of the CCPA involves vendors, vendor management, and data transfers that provide access to another party. Managing transfers of data boils down to the terms of the contract entered with the third-party, specifically those that concern personal information. The CCPA

73

Currents 24.1 2020


involves personal information in a broad

the vendor objects to any of the terms, then

vendor’s security policies are and how

sense of the word–data related to people–

a data privacy attorney may be brought into

data will be protected beforehand allows

not merely sensitive personally identifiable

the mix to further negotiate. It is imperative

companies to more smoothly come to an

information.59

to ensure that companies utilize effective

agreement. It is important to note that

screening procedures for vendor contracts

the risk will usually be shared; no one

and to determine if those vendors have access

party should assume all the risk. Thorough

to personally identifiable information, per

security addendums with lists of performance

the broader definition under California law.

expectations help in this regard.

Third-party due diligence is required when negotiating these types of contracts. Parties must consider the types of information to be shared and how the data will be handled, stored, and processed. Next, parties should consider what law governs such data. Transferring data to third parties involves a certain degree of risk and many greenlit decisions are based on the size of the deal threshold; certain contracts are reviewed based on the dollar threshold. However, a deal’s value does not necessarily correlate with the risk associated with the data involved. Unsurprisingly, companies struggle to operationalize attorney inclusion in every sort of contract. Companies either do not retain a sufficient number of attorneys or do not know with whom to talk before signing a particular deal. One solution is the incorporation of strict requirements into all contracts. Good practice entails putting the requirements and procurement departments on notice that, regardless of the dollar amount, the contract must get legal approval if it involves anything IT-related. Further, it is not uncommon for a corporation to reply by developing a set of screening questions that the business team or sponsor of the contract answer. The questions screen for personally identifiable information and systems or network access. If any of the answers indicate the third-party will have access to data or systems, the business team will understand to move further in the protocol, perhaps providing the vendor with a data privacy or cybersecurity addendum. If

Moreover, companies should ensure that vendors protect data according to the terms of any provided addendums. Such is a key piece of any privacy compliance program. It is company data at the end of the day. The company is ultimately responsible, regardless of the fact that perhaps an HR vendor houses all of the company’s employee information, and that information still belongs to the company. Therefore, while vendors will seek to limit risk in any negotiation, for this reason sharing risk is vital.

with the other party’s security policies are not possible if the business is built to be a global business and perform work for many customers. Customization detracts from such business model. Sometimes getting to “yes” in a negotiation just takes a conversation; it may be as simple as getting both parties’ security teams on the phone to review security policies and find common ground. Inevitably though, other contractual provisions, such as indemnification, limitation of liability, the

Similarly, vendors utilize checklists and

obligation to respond in case of a breach, and

train employees to carry them out. Vendor

the extent of measures taken in response to

contracts vary considerably, dependent

breach, may be more heavily negotiated over.

on who the customer is, where they are

Vendors frequently push back on the

located, and so on. Thus, it follows that a freight company may be less attuned to data protection and privacy than say, an airline company–typically handling massive volumes of personal data in its day-today operations—may be in handling that data responsibly. Handling data poses a serious risk and vendors cannot be expected to be poised as insurance providers or accept exposure to uncapped liability. Any company that accepts uncapped liability, an operationally unfeasible undertaking, is one soon going out of business. With that in mind, it follows that vendors generally are open to negotiating liability caps. Understanding what the 74

Currents 24.1 2020

However, requests to a vendor to comply

term “audit rights”—that is, the ability to go on-site to perform an audit on the vendor. Limitations on consequential damages are similarly negotiated heavily, as well as termination provisions, specifically those allowing one party to terminate a contract without a penalty. If there is a questionable report or there has been a security event and a vendor has given notice, it is difficult to make the case that another party’s resulting insecurity justifies a clean break absent any penalty. A party that anticipates such may desire to include insecurity as grounds for unilateral termination, but likely invites quarrel in doing so. Technology companies typically desire


to employ customer data in improving

requests and, to the extent such data was

with approximately fifteen of such laws

and developing new products and services.

previously shared with a service provider, to

updated in the past year alone.67 In order to

Increasingly, permitting companies to

instruct the service provider to also comply

appropriately respond in the event of a data

use this data in this way must be limited.

with the deletion request.62 Companies

breach, companies should be apprised of

Companies may decide to compromise,

to which this rule applies may consider

the patchwork of governing law in advance.

authorizing to the extent data is used

amending vendor agreements to contractually

Resources that summarize jurisdictional

internally, for the improvement of products

obligate vendors to comply with received

differences are a useful starting place.

and the like, but beyond that restricting usage

deletion requests.

as to limit risk. Additionally, the CCPA may

—————————————————

program includes signing up for listservs

I V. C o n f i d e n t i a l Data S e c u r i t y

and bulletins, as well as maintaining an

demand this approach if companies wish to avoid the transaction’s classification as a “sale” of personal information. Companies may undertake solutions such as the

Best practice for any compliance

—————————————————

anonymization of data60—that is, unlinking

Beyond personal data security concerns,

the data from the identity of any particular

other sorts of data—such as confidential or

individual— deemed a sufficient restriction

proprietary—command a level of significant

under the law. Technology companies

concern for many companies, often utilizing

utilizing anonymized data may desire to share

confidentiality agreements to achieve the

the same with sister companies in taking

security desired. Such companies should focus

products to market. Sharing in this manner

on the specific data security requirements set

is acceptable to consumers, but only to the

forth to protect confidential or non-personal

extent the best benefit from the product is

information. For example, the North

obtained or the best pricing for that product

American Electric Reliability Corporation

is allowed.

(NERC) Critical Infrastructure Protection

Owing to the private right of action61 granted by the CCPA—a new legal cure for harm caused by the occurrence of a data breach—vendor agreements concerning data exchanges are being reevaluated. Contracts are now reviewed to ensure adequate privacy protections are present in preparation for the event of a potential breach implicating

(CIP) standard 63 applies specifically to companies in the electrical sector. NERC CIP expects organizations in that industry to comply with a host of data security requirements64 and, further, to push such requirements down to their respective suppliers.65 Vendors must comply with this comprehensive scheme of obligations in

incident response team plan with a team in place. Further, teams may find it helpful to know: who receives the information in the event of an incident; whether or not the recipient is a certain department, such as IT, legal, or cyber; who will disseminate that initial information; how discreet the group of specified recipients are; and lastly, each individuals’ roles in the event of an incident. One document to develop at the outset is a template notice for consumers. Additionally, practical steps, such as pre-arranging for breach counsel, a credit monitoring vendor, or a mailing vendor and maintaining cyber insurance with preapproved vendors, are advantageous to take in advance. Quarterly table talks, a chance to run through a mock incident response scenario, are a helpful exercise for companies to undertake, particularly if well attended by all the key stakeholders.

order to safeguard data that otherwise would

Much like the first day back at the gym,

not have commanded such a robust level of

commencing a table talk may prove arduous,

security.

yet worthwhile; continuous practice improves

them or draft new versions consistent with

—————————————————

performance and serves to familiarize teams

current law.

V. Data Breach Response

a California resident’s data. Similarly, companies that utilize addendums to supplement contracts are obliged to update

of their respective roles. Instructive in this respect is the annual Pew Report which sets

Another discrete piece of protection

—————————————————

the CCPA contemplates requires companies

There are fifty data breach notice laws

to abide by California consumers’ deletion

year.68 Their research has shown that written

in the United States,66 updated regularly

incident response plans are the most potent

forth the costs of data breaches over the past

75

Currents 24.1 2020


method to reducing the cost of a given data breach. Further, incident response plans are required under the GDPR.69 Thus, for multiple reasons, it is a helpful tool to be equipped with and there are even companies that specialize in assisting with preparing such a plan.70 Diagnosing the problem in a particular scenario is the key: be prepared to know which phone number to call, whether to reach out to the FBI and forensic teams, and when to contact the cyber insurance professionals.

VI.

Conclusion

————————————————— Both the GDPR and the CCPA diagnose data privacy concerns as a serious problem, particularly for consumers. Each law seeks to address these concerns, utilizing alternative approaches. In the near future, new laws to further address such concerns will be introduced and given effect, as lawmakers strive to continuously update existing law. Although implementation of data privacy laws is currently less than exacting, prudent

In terms of policy coverage, cyber

companies should begin efforts to develop

insurance is all over the board. As a new

compliance regimes before, rather than after,

industry, insurers may utilize various coverage

the eventual uptick in enforcement is set

limits and exclusions. Consequently, it is

into motion. Such a regime should account

crucial to carefully understand insurance

for the ways in which different sorts of data

policies as often times the coverage actually

require different sorts of protection, a variety

provided is non-intuitive to conventional

of practical measures to appropriately protect

expectations. On one hand, policies typically

such data, and as ways to mitigate risk in the

include carve-outs for violations of law–

event of a breach.

notable since nearly all data breaches, for instance a HIPAA data breach, can be characterized as violations of law. Alternatively, policies are not apt to insure other sorts of losses, such as those where an existing contract already covers such losses, including subcontractor agreements. In sum, navigating these policies requires caution, an awareness of the risk inherent in the business, and an understanding of the particular concerns of the business, such as maintenance of a comprehensive cyber policy inclusive of subcontracting, a practicality for those businesses whose data is kept by subcontractors.

————————————————— 76

Currents 24.1 2020


End Notes 1.

Regulation 2016/679, of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC, 2016 O.J. (L 119) 87 [hereinafter Regulation 2016/679]. 2. Id. at 32. 3. 2018 Cal. Stat. 1807 (2017-2018 Regular Session) § 1798.120 (to be codified at Cal. Civ. Proc. § 1798.100–1798.198, eff. Jan. 1, 2020) [hereinafter CCPA]. 4. Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104–191, § 221, 110 Stat. 1936 (1996); see also Health Information Technology for Economic and Clinical Health Act (HITECH Act), Pub. L. No. 111-5, § 123 Stat. 226 (amending and expanding certain HIPAA privacy protections). 5. Gramm-Leach-Bliley Financial Modernization Act, Pub. L. No. 106-102, § 132, 113 Stat. 1338 (1999). 6. See Mitchell Noordyke, U.S. State Comprehensive Privacy Law Comparison, IAPP.org (last visited January 21, 2020), https://iapp.org/news/a/us-statecomprehensive-privacy-lawcomparison/ [https://perma.cc/ Z2LN-E45Q]. 7. See, e.g., FTC, Equifax to Pay $575 Million as Part of Settlement with FTC, CFPB, and States Related to 2017 Data Breach, https:// www.ftc.gov/news-events/pressreleases/2019/07/equifax-pay575-million-part-settlement-ftccfpb-states-related. 8. See generally Regulation 2016/679, supra note 1. 9. CCPA, supra note 3, § 1798.198(a). 10. Regulation 2016/679, supra note 1, at 32–33. 11. Regulation 2016/679, supra note 1, at 37–38, 52. 12. Compare Regulation 2016/679, supra note 1, at 50–52 (where notification of personal data breach must be made within seventy-two hours after learning of it), with Rachel Fefer, Cong. Research Serv., R45584, Data Flows, Online Privacy, and Trade Policy 18 (2019) (discussing the stakeholder perspectives where common themes of emphasis are present in privacy legislation for Congress such as data breach notifications which are similar to

13. 14. 15. 16. 17. 18. 19. 20. 21.

22.

23. 24. 25.

GDPR provisions), and Steven Chabinsky & F. Paul Pittman, USA: Data Protection 2019, ICLG (Mar. 7, 2019), https:// iclg.com/practice-areas/dataprotection-laws-and-regulations/ usa (explaining where breach notification requirements are required under HIPPA at the federal level, and at the state level, notifications are required for data breaches within thirty to sixty days after learning of it in accordance with the specific statute). Regulation 2016/679, supra note 1, at 50–1. Regulation 2016/679, supra note 1, at 50–1. Regulation 2016/679, supra note 1, at 39–46. 15 U.S.C. § 7704 (2018). Regulation 2016/679, supra note 1, at 50–1. Regulation 2016/679, supra note 1, at 50–1. Regulation 2016/679, supra note 1, at 43. Regulation 2016/679, supra note 1, at 43–4. See Adeola Adele et al., More Ve n d o r s , M o r e P r o b l e m s , Wi l l s To w e r s Wa t s o n (Winter 2016), at 6, https:// www.willis.com/documents/ publications/Industries/ Financial_istitutions/16527%20 BROCHURE_Cyber%20 Claims%20Winter%202016. pdf (“The reliance on thirdparty vendors, whether directly or indirectly, has increased dramatically . . . several studies have repor ted that loss or compromise of data in the hands of such third-party vendors accounts for a significant percentage of all data breaches or cyberattacks.”) [https://perma.cc/FPX9-GDHJ]. Privacy by Design Pertains to Protecting Data by Designing Technological Measures for Ensuring Privacy. European Data Protection Supervisor, P re l i m i n a ry O pi n i o n o n Privacy by Design 5 (2018), https://edps.europa.eu/sites/ edp/files/ublication/18-05-31_ preliminary_opinion_on_privacy_ by_design_en_0.pdf [https:// perma.cc/BVC4-6247]. Regulation 2016/679, supra note 1, at 48. Regulation 2016/679, supra note 1, at 55–56. Regulation 2016/679, supra note 1, at 55–56; See also Press Release, European Parliament,

Protecting whistle-blowers: new EU-Wide rules approved (Apr. 16, 2019), https://www. europarl.europa.eu/news/en/press20190410IPR37529/protectingwhistle-blowers-new-eu-widerules-approved [https://perma. cc/7QPV-C5LQ][herinafter Press Release]. 26. Compare Press Release, supra note 25 (providing for DPO immunity in this regard), with 5 U.S.C. § 2302(b)(8)-(9) (2019) (allowing identical protection for employees against retaliation and also provides safe reporting channels). 27. Regulation 2016/679, supra note 1, at 56–78. 28. Noordyke, supra note 6. 29. CCPA, supra note 3, § 1798.198(a). 30. GDPR, supra note 1. 31. Act of June 14, 2019, 86th Leg., R.S., ch. 1326 (to be codified at Tex. Bus. & Com. Code § 521.053, eff. Jan. 1, 2020). 32. About SCI, Service Corporation International, (Oct. 17, 2019, 5:50 PM), http://www.sci-corp. com/en-us/about-sci/index.page. 33. See CCPA, supra note 3, §§ 1798.105, 1798.140 (o)(1). 34. CCPA Regulations: Coming Soon from the California Attorney General, CLARIP, https://www. clarip.com/data-privacy/ccparegulations/ (last visited January 23, 2020); see also State of California Department of Justice, California Consumer Privacy Act (CCPA), https://www.oag. ca.gov/privacy/ccpa. 35. CCPA, supra note 3, § 1798.130. 36. CCPA, supra note 3, § 1798.150(b) (1). 37. CCPA, supra note 3, § 1798.150 (a)(1). 38. CCPA, supra note 3, § 1798.150(a) (1). 39. 740 Ill. Comp. Stat. 14/20 (2008). 40. Id. 41. CCPA, supra note 3, §1798.150. 42. CCPA, supra note 3, §1798.150. 43. Regulation 2016/679, supra note 1, at 37, 80–83. 44. Rachel Fefer, Cong. Research Serv., R45584, Data Flows, Online Privacy, and Trade Policy 18 (2019); see Jill Cowan, The Fight Over a Landmark Digital Privacy Law, N.Y. Times, May 22, 2019, https://www. nytimes.com/2019/05/22/us/ digital-privacy-hannah-bethjackson-ccpa.html; see Daisuke Wakabayashi, California Passes Sweeping Law to Protect Online

Privacy, N.Y. Times, June 28, 2019, https://www.nytimes. com/2018/06/28/technology/ california-online-privacy-law. html. 45. Rachel Fefer, supra note 4, at 18; see Stephen P. Mulligan, Wilson C. Freeman & Chris D. Linebaugh, Cong. Research Serv., R45631, Data Protection law: An Overview 7 (2019). 46. Erie R.R. v. Tompkins, 304 U.S. 64 (1938); Donald Earl Childress III, International Conflict of Laws and New Conflicts Restatement, 27 Duke L. J. 361 (2017); William L. Reynolds and William M. Richman, American Bar Association, Multi-Jurisdiction Practice and the Conflict of Laws (2000), https:// www.americanbar.org/groups/ professional_responsibility/committees_commissions/commission_on_multijurisditional_practice/mjp_wreynolds/. 47. U.S. Const. art. 1, § 8; see Paul M. Schwartz, Preemption and Privacy, 118 Yale L.J. 902, 928–29 (2009) (explaining that under a federal privacy law, several regulated entities would bear the cost of compliance as it applies to their activities; FTC privacy principles are not going to be enough to help regulate a future privacy law; federal privacy law might be difficult to amend; further, “[w]ithout strong preemptive language built around regulatory ceilings, an omnibus privacy bill would face considerable hurdles to enactment . . . . Legislation without preemption would make the current situation possibly worse, not better, by creating additional uncertainty and compliance burdens . . .”); but see Patricia L. Bellia, Federalization in Information Privacy Law, 118 Yale L.J. 868, 879–80 (2009) (providing that “the Commerce Clause permits Congress to reinforce a judicial decision that . . . adequately protects privacy or to overcome a decision that . . . does not . . . .” For example, Katz v. United States, rendered the government’s use of wiretapping and eavesdropping techniques illegal unless Fourth Amendment requirements were satisfied. Congress then set out a statute to help authorize these judicial hurdles. For possible future privacy statutes, there are going to be some judicial rulings to help set out permissible official conduct. It will be up to the federal government to impose those standards

77

Currents 24.1 2020


properly for American business. The need for federal leadership in information privacy problems with the adoption of the CCPA coming into play, creating an opportunity for state regulation. Because the Commerce Clause allows Congress to step into a rulemaking role with respect to interstate trade of personal data within states, state privacy regulation is going to need guidance. CCPA has some holes in its provisions, and it will be up to the federal government to intervene in state regulation for federal privacy regulation); see also Cynthia J. Cole and Neil Coulson, Patchwork of U.S. Data Privacy Laws: A Complicated and Preemptive Local Landscape, Baker Botts LLP (2018), https://www. bakerbotts.com/insights/publications/2018/09/patchwork-of-usdata-privacy-laws (explaining that leaving data privacy regulation up to state and local legislation is problematic; first, by “creating a patchwork of [rules] across the U.S. makes compliance both confusing and burdensome for U.S. companies.” If the U.S. continues to allow state laws to regulate personal data laws, many technology companies would have to tailor their interest presence differently for each state; second, “the risk of preemption: strict local laws may conflict with federal principles.” Under the Commerce Clause, there are limits on state action in order to prevent the states from interfering with interstate commerce. This principal is known as the Dormant Commerce Clause, and the CCPA is suspect depending on the extent to which it interferes with interstate trade and commerce); see Cameron F. Kerry, A Federal Privacy Law Could Do Better Than California’s, Brookings Institute (2019), https://www.brookings.edu/blog/ techtank/2019/04/29/a-federal-privacy-law-could-do-betterthan-californias/ (providing that the right federal law could just what is needed to provide broader and stronger protection than the CCPA regulation. “Central to the CCPA are a “right to know” what information businesses collect about you and whether it is shared or sold, and a “right to opt out” from the sale of personal information.” These elements do increase individual control over personal data; however, the exclusive right of control is focused mostly on legacy laws and regulations that rest on faith in the consumer to want to protect their individual

privacy interests. This is a good concept to focus on the individual, but many private experts are looking for a law to shift the burden away from individuals to a more business focus mindset. With a federal privacy law, it would do a much better job than the CCPA “by requiring that businesses collect, use, and share personal information in ways that protect the interests of the individuals affected.” Several amendments would help fill the gaps left out of the CCPA with its individual focused mindset, but federal law could improve on the CCPA. “Only Congress has the power to regulate interstate commerce and apply these protections, as well as those in the CCPA, to people and businesses across the country.” Ultimately, a federal privacy law could give “Americans a basis to trust all personal information will be handled in ways consistent with their interests . . .”). 48. Lauren Jehl and Alan Friel, CCPA and GDPR Comparison Chart, Bakerholstetler LLP (2018), https://www.bakerlaw.com/ webfiles/Privacy/2018/Articles/ CCPA-GDPR-Chart.pdf. 49. CCPA, supra, note 3, § 1798.140(t) (1). 50. C C PA , s u p r a , n o t e 3 , § 1798.120(b-d). 51. C C PA , s u p r a , n o t e 3 , § 1798.120(b). 52. C C PA , s u p r a , n o t e 3 , § 1798.120(b). 53. C C PA , s u p ra , n o t e 3 , § § 1798.100(b), 1798.115(d), 1798.120(b), 1798.130(a)(2), 1798.150(b). 54. Regulation 2016/679, of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC, 2016 O.J. (L 119) 43; see CCPA, supra, note 3, § 1798.145(g). 55. Ron Hurtibise, Citrix Hack Exposed Employees to ID Theft & Fraud, Sun Sentinel, (June 4, 2019), https://www.sun-sentinel. com/business/fl-bz-citrix-databreach-lawsuit-20190604-umb365n6ordchhpqbghejvvzyi-story. html; see Stephen Singer, Patient Sues UConn Health In Federal Court Over February Data Breach, Hartford Courant, (Mar. 26, 2019), https://www. courant.com/business/hc-bizuconn-health-data-breach-lawsuit20190326-mbab6zl755fe7f2mvkczsibcfu-story.html.

56. Regulation 2016/679, supra note 1, at 49; CCPA, supra note 3 §§ 1798.105(b), (d)(6), 1798.125(b) (1). 57. Jed Liu & Andrew C. Myers, Defining and Enforcing Referential Security, Cornell Univ., Jan. 17, 2014, at 1–2. 58. Zubulake v. UBS Warburg LLC, 217 F.R.D. 309, 324 n. 19 (2003). 59. See CCPA, supra note 3, §§ 1798.140(o)(1), 1798.100. 60. See Regulation 2016/679, supra note 1, at 33, 48. 61. See CCPA, supra note 3, § 1798.150(a)-(b). 62. CCPA, supra note 3, § 1798.105(c). 63. See generally Joseph Abrenio et al, Cyber Security and the Grid: We’ll Leave the Lights on for You (If We Can), 33 Syracuse J. Sci. & Tech. L. 3, 19–24 (2017) (discussing the general framework of the NERC CIP standards). 64. See id. at 20–22. 65. See id. at 15; Mauricio Paez, Kerianne Tobitsch, The Industrial Internet of Things: Risks, Liabilities, and Emerging Legal Issues, 62 N.Y.L. Sch. L. Rev. 217, 225–26 (2018). 66. See, e.g., Jennifer J. Hennessy et al, State Data Breach Notification Laws Chart, Foley & Lardner LLP (2019), https://www.foley.com/ en/insights/publications/2019/01/ state-data-breach-notificationlaws; State Data Breach Notification Statute Summaries, Davis Wright Tremaine LLP (last updated July 29, 2019) https://www.dwt.com/-/ media/files/dwt-data-breach-notice-summaries-20191007.pdf?la =en&hash=25142B1473042997 9365422D90D82938. 67. See Caleb Skeath & Brooke Kahn, State Data Breach Notification laws: 2018 in Review, Covington & Burling LLP (2018), https:// www.insideprivacy.com/datasecurity/data-breaches/state-databreach-notification-laws-2018-inreview/; New Data Breach Notification Laws Spring 2018: What You Need to Know, Perkins Coie (2018), https://www.perkinscoie. com/en/news-insights/new-databreach-notification-laws-spring2018-what-you-need-to.html. 68. Kenneth Olmstead & Aaron Smith, Pew Research Ctr., Americans and Cybersecurity (2017), https://www.pewinternet.org/wp-content/uploads/ sites/9/2017/01/Americans-andCyber-Security-final.pdf; Jacob Poushter & Janell Fetterolf, Pew Research Ctr., International Publics Brace for Cyberattacks on Elections, Infrastructure, National Se78

Currents 24.1 2020

curity (2019), https://www. pewresearch.org/global/wp-content/uploads/sites/2/2019/01/ Pew-Research-Center_Cybersecurity-Report_2019-01-09_Updated-2019.04.30.pdf. 69. See Regulation 2016/679, supra note 1, at 9, 51–52. 70. See, e.g., Kamil Janton, Incident Response and General Data Protection Regulation, Cisco: Cisco Blog (Apr. 26, 2018), https://blogs.cisco.com/security/ incident-response-and-generaldata-protection-regulation; IBM, https://www.ibm.com/us-en/ (follow “Marketplace: Security: Stop Threats” hyperlink; then follow “Orchestrate incident response” hyperlink).


Chief Compliance Officer Rountable M O D E R AT O R / PA N E L I S T: PA N E L I S T S :

S T E V E N

G Y E S Z LY, J O H N

—————————————————

MS. SHEHADEH ————————————————— In preparing for our chat today, I did a little bit of news review. In regard to ethics cases, allegations, and challenges, 2018 was a pretty stunning year. For example, recent cases include the university admissions scandal, Facebook Cambridge Analytica disclosures, very high profile individuals being ousted from jobs in the wake of the #MeToo movement, and Goldman Sachs getting wrapped up in the 1MDB massive scandal in Malaysia with respect to the former regime. Also, the allegations, with respect to Ghosn (Renault/Nissan) for alleged selfdealing and the Deutsche Bank anti-moneylaundering case—the list goes on and on. That is a survey of just the last twelve months. What do you think is the global state of corporate ethics from your perspective? —————————————————

MR. GYESZLY ————————————————— One thing that I find interesting is that it is somewhat easy to get involved with some of the glamourous topics, like anti-corruption or cybersecurity, but some of the cases you mentioned are a return to some of the basic components of our code of business conduct. These cases lead us to refresh and re-examine what our compliance risks may be. One focus

N ATA L I A

J AY

S H E H A D E H

M A R T I N ,

RYA N

R A B A L A I S ,

S A R D A R

Natalia Shehadeh - Senior Vice President and Chief Compliance Offlcer for TechnipFMC Steven Gyeszly - Chief Compliance Counsel for Marathon Oil

Certainly, if it does not sit well with Human Resources or through the legal group, or whomever, the executives will probably look to the compliance department, which needs

Jay Martin - Senior Counsel for Wilkie, Farr & Gallagher

to have some answer. Whether compliance

Ryan Rabalais - VP & Chief Compliance Officer of Rowan Companies

not, we are tasked to deal with all those issues

John Sardar - Chief Compliance Officer for Noble Energy, Inc.

professionals want to deal with the issue or and having to anticipate what those may be by staying up with the headlines. If for no other reason, some shareholders

this year is the “back to the basics,” focus

are demanding things of their companies that

within our code of business conduct.

they did not in the past or were silent on in

—————————————————

the past; you better believe that gets board

MR. RABALAIS

members attention. So, board members in

—————————————————

turn on their last day are asking about X

I think the state of corporate ethics is

or Y, and again, you have got to have some

better than it has ever been in one sense.

form of an answer. If for no other reason

However, there is still a ton of work to do—

than shareholders are raising these issues,

plenty of work to do for a career for anyone

they are going to come to light within the

entering the field. The issues that compliance

organization. God forbid you get an activist

departments and compliance officers face are

shareholder really targeting the company or

broader in comparison to issues that arose

put on your board in some instances. While

even a few years ago. For example, if company

these are things that might have happened in

executives are looking at the compliance

the past, they just did not happen in that way.

department and asking how the corporation

This puts a lot of demand on the compliance

is dealing with #MeToo, financial scandals,

department.

data privacy, things well beyond FCPA or

—————————————————

export regulations and the problem does not

MR. MARTIN

fit anywhere else, the executives will ask the

—————————————————

chief compliance officer about it. Honestly

There are a lot of companies across the

there is an ethical angle to just about any

world that now have compliance officers and

issue, if you look at it in a certain light.

compliance roots where they did not a few

79

Currents 24.1 2020


—————————————————

anymore because the risk is getting too big.

a positive impact and lead to less compliance

MR. SARDAR

The litany of cases from 2018 alone shows

issues, particularly the more serious ones. I

—————————————————

think there has been a positive impact, but

Licensed offering and social license

other factors have pushed everything in the

offering have given us the function to have

MR. MARTIN

other direction. Part of that is globalization.

a bit more say within our organizations.

—————————————————

Part of it is that competition is intense

Historically, compliance officers have been

I think there’s some truth there, but the

across the world. Our business community

the custodians of the company’s ethical

reason we are all in business and under more

colleagues are under unprecedented amounts

practices. The business leaders ask the

pressure than we have ever been is because we

of pressure. The business models have been

compliance department for advice when

live in the gray areas. If you talk to any general

changing at warp speed. Acquisitions are

they feel they are being challenged on their

counsel, the things that reach the general

frequent. There is a tremendous amount of

social license offering. For each one of us, our

counsel’s desk are usually the most difficult,

outsourcing functions and a tremendous use

mandates have changed. The way companies

the grayest area issue, because otherwise they

of third parties.

are looking at their risks has broadened,

would have been resolved before they ever

providing chief compliance lawyers with

got to the General Counsel or to the Chief

countries, so we used to think of American

opportunities.

Compliance Officer (CCO).

companies as an American company with

—————————————————

years ago. You would think that would have

We were in one-hundred and twenty

this. —————————————————

There are a lot of times where you are

some international operations. Now, there

MS. SHEHADEH

here in the twilight zone, this gray zone,

are a lot of American companies that are truly

—————————————————

where you cannot say to the business client

international if you examine the makeup of

Over the last five years, it has been

that there is zero risk. There is also a risk

their board and their senior management

a conversation associated with culture.

in losing the deal. Attorneys are always

group. Compliance for the U.S. firms is still

Suddenly, in the last few years, we started

trying to balance the mission of what is the

a challenge. I think how simple that would

to see a pivot towards culture and the

legal compliance role, which is to enable

be to not worry about one-hundred and

convergence of ethics and the impact that

operations to do their deals, but to do it in

twenty countries. Each of those countries

strong enterprise cultures can have as a

a legally compliant way. You have to know

has its own challenges, culture, day-to-day

deterrent to non-compliant behavior, or

when you say no. However, if every other

working environment, and business model.

as an encouragement or reinforcement, to

deal you kill because you cannot find a

If the business continues to change at warp

reduce risk. With that, comes some budding

compliance solution, as one CEO said, “we

speed, compliance must change to keep up

recognition that “gone is the day that you

can be the most compliant company in the

with business. That means if you are not

don’t need to teach right from wrong.”

world, and we also should be going out of

worried about compliance every minute of every day you are not doing your job.

Most of our compliance programs evolve with the focus on triaging a legal risk area, for

business because we can never do a deal in one of these countries.”

You cannot get to a steady state

example, whether an act violates the law as it

That is the challenge. Because of the fast

on compliance. If you are standing still,

is written in the anti-bribery and corruption

moving environment, the best protection

you are falling behind. There needs to be

(ABC) space. Now, the convergence of this

is creating a culture. CCOs cannot be

consistency in the processes, but you want

opportunity is not just teaching employees

everywhere, you cannot be your brother’s

to continuously evolve those to deal with the

about the law to mitigate legal risk, but it is

keeper or micromanage people. The pace

risks that are changing every day.

about getting away from the assumption that

of the business is so rapid and at a global

everyone grew up in the same household and

scale that you have to trust people. The vast

learned from the same lens what right from

majority, hopefully ninety-nine percent of

wrong is. We cannot make that assumption

the people want to do the right thing. If you

80

Currents 24.1 2020


are one of those people that want to do the

investigation. Some of those people deposed

them about whether to participate or not in

right thing but the issue is in an ambiguous

were West African operations-personnel

bribery on personal bases. Such employees

area, bring it up the ladder and get other sets

that do not usually put on a suit and go

will say “I understand working for this

of eyes to look at it. What we worry about is

to D.C. for any reason. At the other end,

company I cannot do that.” You must have

not the things we know about but the things

there would be a company that did not

an appreciation for the world they are living

that we do not know about. That is what

have as severe of an investigation experience

in day-to-day and what you are asking of

terrifies a CCO. Most companies have a lot

or that has never been investigated. The

them. Frankly, it is a lot simpler living in

of smart people and a lot of assets. If you

operations team wanted to do the right

Houston, Texas and saying that I am not

determine the issue you can get the right set

thing and they were good people, but they

bribing anyone at all in my life. It is not

of eyes on it and come up with a solution.

had not been through the ringer, and there

nearly as simple for some of the people with

—————————————————

is a big difference. Literally, at some of the

whom we do a lot of business.

MR. RABALAIS

companies with serious cases, people in

—————————————————

—————————————————

these high-risk jurisdictions would call me

MR. GYESZLY

Each company has a different culture.

to say, “when are you coming over to do

—————————————————

As you go to a new company, I think it is

the training? When are you coming over to

We have colleagues that have worked

very important, even in the interview stage,

do this year’s risk assessment?” The things

for Marathon for twenty or thirty years.

to get to know that company’s culture. It is a

that shape the culture are multifaceted. The

It is easy for them in a given situation to

big deal. Within that, there is the nationality

bigger the company, the more countries

distinguish what is the Marathon way. As

of people. A lot of the companies we are

the business operates in, the more lines of

the company has new colleagues coming in,

talking about employ people from many

business undertaken, the more varied it gets,

we do not know what these employees have

different countries. You encounter not just

the more comfortable the attorney is in acting

learned from other places, so we have to be

different nationalities but different cultures

in that type of world. If compliance personnel

clear about explaining Marathon’s values

of business; whether there is an aggressive

have any cultural background or experience,

and delineating what is acceptable for us

business mindset where they conduct

that helps, because the attorney is going to

and what is not.

business at a rapid pace or something more

deal with this working in compliance for a

moderate than that. What the business

multinational company.

However, it is not just, “what do we want the culture to be.” The other aspect of

puts its employees through and how they

The culture of the company matters. I

culture that I think is critical for a compliance

experience working at that company shapes

cannot understate it. Yes, the board has ideas

program is determining your company’s

a lot of that culture.

about it and do help shape it, but it goes

culture as it currently stands, because you

Every company that I worked for has

down to the people on the front line that are

have to sell your program within that

had an FCPA investigation or settlement,

working in these countries day to day. It is

context. When you are trying to persuade

except one, where I work right now, Rowan.

kind of a comment on the countries. People

someone to buy into a compliance initiative,

It is a stark difference to me, the companies

do want to do the right things. However,

for example, ensuring training completion,

that I worked for that had those experiences,

I have had it explained to me; some of

do you highlight to a manager that his or

those employees were put through the ringer,

the people that grow up in some of these

her equivalent in another asset currently

particularly if there was a monitor.

countries say they want to do the right thing,

has a better completion rate? If it is not

When I worked at Noble, some

but they have to deal with bribery, corruption

competition, is the driver of your message

individuals had been charged personally

in all of the facets of their lives, from trying

wanting to do the right thing, or that a board

in addition to the company being charged.

to get their children’s grades back

member has asked about the issue? You have

There were people who were deposed in

from the school to daily transportation

to figure out what resonates. You must figure

Washington, D.C. as part of the FCPA

needs within the country. It is a tough call for

out what is culturally relevant to them and

81

Currents 24.1 2020


how to build out and deploy a program to

stop listening. At the end of the day, I need

we receive reports through our reporting

make sure it fits within the culture even while

to be able to, pragmatically, make something

helpline along the lines of “your gas station

you are trying in some cases to change the

work. The way I tell my people—stuff which

prices are too high”. While the easiest

corporate culture.

is risk-free or risk that can be effectively

response would be to ignore the report, it’s

—————————————————

managed, that is the “low-hanging fruit.”

still important to respond quickly and be

MS. SHEHADEH

Knock it out as soon as possible. There, you

clear that we appreciate them reaching out to

—————————————————

show that you are being effective. At the end

us, but that their report needs to be directed

We are not here preaching. I do not

of the day, we are business facilitators. You

to a different company. Even in responding

say this from a position of judgment. But

look at risk perhaps through a different lens,

to reports that have nothing to do with our

I have been with organizations that have a

but don’t ever think that we sit outside the

company, maybe the reporter appreciates that

“company way” and companies that were

organization, that we are the prophets, that

someone responded quickly and will see value

still in a certain maturity infancy and trying

we just issue judgment without consequences

in raising a question or concern through the

to figure out their value proposition. In

for us.

right reporting helpline.

organizations such as this, the compliance

These are the skills for young lawyers—

In addition to the initial touchpoint, we

journey is difficult. It takes more time, but

particularly in the ethics space—that are so

are also focusing on refining our program to

it is still achievable. You are really winning

important. You can have the right personality.

distinguish between “must haves” and “nice

hearts and minds at a more local level, triaging

You are going to use your soft skills. Those

to haves.” I think this is where compliance

as it were. For example, say that I cannot get

who are good at debates will succeed in

programs bring a lot of value and frankly can

to the base for the company without paying

ethics. What are you doing selling your ideas,

build credibility. My experience is that when

three policemen along the roadway. Well,

selling yourself?

you build a track record of being pragmatic

now, there is going to be a company bus

The way I look at my function, to be

and streamlining compliance requirements

that is going to pick up everybody from the

effective, I need to operate at the speed of

where feasible, your non-negotiables carry

community to get everyone to the base. To

business. Not do everything that they ask us

more resonance because you have the

use the phrase, we started playing “whack-a-

to do, but to support them at their speed.

business people saying “you have shown on

mole” at solving the problem at a local level.

That is what is most effective.

ten other occasions that you could figure out

If we are excited about the convergence now

—————————————————

another way. Here, when you say no, that

and the recognition that culture plays and

MR. GYESZLY

culture pays for greater leverage, what are

—————————————————

things that are working for you? Or if not,

One small but effective step, in that we

your personal organizations? What are things

regularly receive positive feedback on this, is

—————————————————

that you think work?

focusing on how we are perceived at the first

There have been great writings over the

—————————————————

point of contact. When someone reaches out

years by a fellow named Ben Heineman, who

MR. SARDAR

to us, regardless of the matter, we work to

used to be the General Counsel at General

—————————————————

respond to them quickly and give them the

Electric (GE). The general theme of what

The reality is, that even as the Chief

information they need, even if that means

he writes is that companies nowadays are

Ethics Officer, we are looked upon as a

pointing them in the right direction or

extremely complex and intertwined. In

business facilitator. We become less effective

resource if it’s not within our remit.

order for anyone to get anything done, they

really means no.” —————————————————

MR. MARTIN

if we forget that. We are lawyers and bring

At an extreme example, we are Marathon

have to build coalitions and relationships.

that technical background to be able to

Oil, a company that explores for and

In the compliance area, we have a lot of

facilitate. If I lose my focus and I just become

produces oil. We are not the similarly named

dealings with internal audit, dealings with

a preacher, my function will lose. People will

gas station or the refining company. However,

HR, dealings with security, and dealings

82

Currents 24.1 2020


with health, safety, and environment. There

something, period. That is kind of the worst

people wanted to do something and I had

are a lot of sister organizations that are very

end of the spectrum. What would be better,

a slightly different view. They convened the

important to the compliance officer who

is somebody that can fit in. The social skill

meeting, scheduled for an hour, which lasted

can get support and can learn from those

of fitting in is something you are not taught

about five minutes, because the business guy

functions, as well as leverage off all those

in law school. It is an important social skill,

just looked at me, asked me, “what do you

resources to make maximum use of them.

fitting into the team, being part of the team,

think?” Before I finished my sentence, he

Particularly in the oil and gas industry,

and being able to tell the business people

look at his team and said, “God has spoken.”

we put an enormous emphasis on safety.

“no you cannot do this” because you have

I chased him down after the meeting and told

Firstly, at virtually every meeting at GE-Baker

built enough respect over time with them.

him that we could find a way to make the

Hughes, we have a safety moment. In order

They will understand if you really tell them,

deal work. He said, “I don’t think so, I am

to build a culture, you cannot just give once

“we, not just you, we cannot do this. But I

not going to waste your time.”

a year training for a thirty-five (35) minute

am going to help find an alternative way to

—————————————————

electronic module. Compliance should

do the job.” That approach is on the other

MS. SHEHADEH

be something that people think about in

end of the spectrum. At the same time, we

—————————————————

their daily lives as they go about their own

hopefully strive to get the same results with

If we do not act as partners, we will

business. One way to do that is to have it be

the company being compliant.

achieve nothing. That goes for anyone in any

a reoccurring event that is in their normal

How the business people view that,

discipline of law or business-credibility. For

activities, and where possible, down to the

perceive that, and ultimately work with you,

the value proposition, there is the growing

desk level, so they can see the relevance of

is what will make or break you. It goes for

recognition in some enterprises that it is

what you are trying to communicate to

almost anybody in the company, but for us,

not “business at all cost,” but a business

them. People can then see that this is critical

it is an acquired skill that you have to work

alignment between what is the culture value

and not just preaching. It is integral to the

on over time. The foundation is knowing

proposition of the organization so as not to

success of the business. Like anything else, if

the right legal answer. However, there are

end up in catastrophic ethical dilemmas.

you go out on a job in the field and the job

probably ten different ways to deliver that

—————————————————

fails technically, is the client, the customer,

message, which is very important to the

MR. MARTIN

willing to come back? The same thing

recipient of the message and the company.

—————————————————

goes in the compliance area. If you have a

That goes a long way in trying to do your

The tension point does not come in so

breach, the compliance department can lose

job. You can make your own job ten times

long as the business is not being interrupted.

the confidence of that customer and the

harder if you are not careful about how you

The tension comes when they say, “if we don’t

confidence of your own employees. It is this

do it. Building those relationships over time

do something in three hours, we are going to

idea of principle, reliable performance and

is just invaluable.

lose this deal, or we cannot submit this bid.”

compliance that is important. Once you help

—————————————————

That is where the wheels hit the road, and

the business people understand that, it makes

MR. SARDAR

CCOs get that more often than we probably

a huge difference. —————————————————

—————————————————

would like.

Steven said something about building

The challenge obviously in those

MR. RABALAIS

credibility with the business side, such as

situations is to give the best possible advice

—————————————————

in transactions where you can help the

within the time period that you have for

A comment for the law students. What

businesses see what they are doing. That

that situation. At the same time, do not lose

the business team does not want is some

credibility is so critical on the occasion when

sight. We do want to be business partners,

lawyer sitting in an office emailing in a legal

you have to deliver the bad news.

but we also want to protect shareholders. We

opinion, explaining why they cannot do

For example, some of my business

have fiduciary duties. I can assure you that

83

Currents 24.1 2020


the business person that is pressuring you,

there were not many lawyers in these roles.

most of this. On the one hand there is great

“I need to do this, I need to do this,” if you

Look at the profiles of companies now.

synergy. It makes a lot of sense, especially

sign off on it and the deal goes bad, it is on

They are requiring that these roles be filled

with the challenge through the economic

the compliance department. The business

with lawyers. Companies are recruiting

downturn. Coming out of the downturn,

people will come back and say, “I ran it by

from some of the best firms for these roles.

there are a panoply of things to manage

compliance and they said it was okay.” That is

They are relying more and more on the

today which far exceed just trade compliance,

the tension that you are always dealing with.

compliance function. That is a double-edged

antibribery, and anticorruption compliance.

It helps enormously if there is trust,

sword. Some companies want to the use AI-

—————————————————

credibility, and a relationship there. That is

facilitated compliance, creating a false sense

MR. MARTIN

as true for outside counsel as it is for in-house

of security, because the business folks do not

—————————————————

counsel. Some outside counsel have twenty-

feel the need to exercise any judgment. There

The workload is such that if anybody

or thirty-year relationships with companies.

you have to be careful.

comes in at any level, even if you are one

This is because the company has learned to

The challenge I would say, for my sector

week out of law school, and you don’t find

trust them over the years by providing reliable

that I am in, in the oil and gas space, is the

yourself very busy very quickly, you should

solutions. When the business gets into a

shrunken budget. Compliance continues to

be concerned. There is a tremendous amount

tough deal, it wants the best advice available

excel and to do so much. The business folks

of work out there. Good work. There is

and will go back to people that have produced

are continuously looking to compliance to

always something that can be done in trade

results in the past every time. Every time they

do more. Our responsibilities and what is

compliance, antibribery, and competition

produce, the credibility and the trust grows

being asked of us has not gone down one

law.

even more.

bit and continues to escalate. Every time a

When Courtney Flores came to GE-

—————————————————

peer company gets in trouble, the first thing

Baker Hughes, she had the right attitude.

MS. SHEHADEH

the executive wants to know is whether the

She would always raise her hand and within a

—————————————————

company is covered for a certain risk. “What

very short period of time as a rookie, she was

We would not all be here with interest

policies, processes, and controls do we have

totally immersed, probably more than she

and gainfully employed in this space without

to avoid running into this issue? Are we

wanted to be because the word got out, “call

working long hours. Let us dispel an idea

exposed, essentially?” That is certainly one

Courtney.” We started sending stuff to her

for the student community. If you thought

of the best ways to learn, from other people’s

and she showed she had interest, enthusiasm,

we had cushy, in-house jobs, where we were

mistakes. We are working with budgetary

and confidence. That feeds upon itself. People

punching the clock. No—it is quite a slog.

constraints.

start sending you stuff. I honestly cannot

Let us talk a little bit about the challenges.

—————————————————

remember a situation as a compliance officer

There is a lot to be grateful for, and there is a

MS. SHEHADEH

where someone working for me said, “you

lot of progress, but there are still challenges.

—————————————————

know, I am kind of slow right now.” Usually,

What are we still struggling to tackle in this

It is not just more, but more in multiple

they are hiding under their desk.

space?

ways. The initiation of our compliance

—————————————————

—————————————————

programs, a decade or more ago, could not

MR. SARDAR

MR. GYESZLY

have been precipitated by a technical issue.

—————————————————

—————————————————

However, then there was the advent of Dodd-

As much as you have to build

Companies are relying more and more

Frank, conflict minerals, and now human

relationships throughout the company, you

on the compliance function, which is a great

rights. Oftentimes, organizations are looking

can never forget what your role is. There

thing. It has created opportunities. Years

to the compliance function to navigate all

are times you have to say no and be willing

ago, when looking at compliance officers,

these spaces. There is an ethical nexus to

to accept the ramification. You may even

84

Currents 24.1 2020


face a situation where you have to back up

—————————————————

the behavior management space. It is what

your decision with a willingness to walk. In

MR. GYESZLY

they are doing every day. We are trying to

the compliance world, your inability to say

—————————————————

find innovative ways in which to touch an

“no” can have serious ramifications both for

There is a lot of great technology out

employee base in this value proposition in

yourself and the company.

there, but not necessarily within the budget.

minding ethics and culture.

That may be extreme and rare example,

However, there are innovations that we can

Is there a leverage opportunity for us?

but it is important to keep in mind that

build in to existing processes and technology.

What we find challenging is ultimately for

your duty is not to an individual business

For example, can we deploy automated

the employee, it is getting incredibly noisy.

partner but rather to the larger entity. If

approvals by utilizing logic from existing

One day it is this, the next day it is that.

you are working with that one manager all

requirements? For lower risk areas, do we

One day, you are telling me what I can do

of the time, you may have developed a great

still need approvals? Be mindful of whether

regarding the customers and competitors

working relationship, but there may come a

you are forcing folks to do things that they

from a competition perspective. The next

situation where you have to escalate things to

do not need to do. For example, if a manual

day you are telling me what personal data I

a higher level. You have to be prepared and go

process has twelve steps, but you manage to

cannot be sharing from a privacy perspective.

beyond that, and, again, be prepared to say

cut out four steps in the course of developing

“Do not forget, do not bribe and do not

no regardless of the impact to the individual

the corresponding online tool, the innovation

export anything without knowing what its

business relationship.

can be in process efficiency, not just the move

license treatment is,” etc. There is a lot of

—————————————————

to a new technology. We are really forcing

noise in the line.

MS. SHEHADEH

ourselves to think about why the process is

Are you all thinking there is value in

—————————————————

the way that it is. If there is no justification

exploring cross-enterprise, cross-functional

What are your creative thoughts on how

that makes sense for requiring X, Y, or Z, you

partnerships?

to innovate? Are there new technologies and

have to be willing to move on and shift those

—————————————————

new ways of thinking about how to bring the

resources to other risk areas, and accept the

MR. MARTIN

culture piece into our ever-expanding role to

risk of no longer requiring X, Y, or Z.

raise the bar, cover greater swaths of territory,

—————————————————

————————————————— There are new types of disciplines in

MS. SHEHADEH

the compliance group. For example, in

—————————————————

communications, there is a tremendous

Do you all see a leverage opportunity?

amount of communication that should go in

—————————————————

My organization has a strong core value and

a compliance group. Having communication

New technologies? No. I do not know

foundational belief proposition. We have

well-thought through, orchestrated, and in

any that are a silver bullet. They keep coming

multiple players in the culture and ethics

the proper form is crucial. I have found many

up with the “new” or “better” thing. Business

space. It is not limited to the compliance

times in my career, something I thought was

can consolidate five systems into three

function. Earlier this week, we unofficially

absolutely clear was not so clear to someone

systems, or something efficient like that, but

inaugurated a culture value working group

on the business team.

you are still more or less in the same area.

for health, safety, security, and environment.

You can never have enough IT support.

One thing that would be innovative and

They are advocating for behavior management

Some compliance groups are adding their

efficient is for the industry to lobby and get

and behavior change. We keep that goal

own IT person or professional trainers to the

together on certain things. Meanwhile, we are

zero—not physically affecting any lives—

compliance group. As the needs arise, you

doing things with due diligence forms in the

delivering our people that go home the same

need people with those skill sets.

most inefficient manner one can dream up.

way in which they arrive that morning. HR,

One last area is project management.

we call them the “people culture,” they are in

Somebody has to manage the initiative

and win more hearts and minds? —————————————————

MR. RABALAIS

85

Currents 24.1 2020


and quantity of communications. What

whether it is investigations or trade or

—————————————————

form is it? In person, is it worldwide, will

whatever subject matter is, but you also

MR. SARDAR

communications be sent out in the same

need the technical skills so that you do not

—————————————————

week? There are all of these decisions

need to rely on others to do part of your

As for external regulators, how good

that have to be made. Having somebody

job. Then, of course, there are the soft skills.

is a company at real time monitoring? Are

that understands project management is

Can someone go out into the field to provide

we using technologies? That is where the

important.

training and go out to dinner with the folks

technology piece is coming in as there is

One thing we did at Baker Hughes, the

after work, have breakfast, and build those

more access to the financial information

brainchild of the CEO, was that the company

relationships? If necessary, I can always go

for the risk in third party relationships.

would rotate high potential business people

to outside counsel for pure subject matter

Because of the demand of needing to know

through the compliance group for a year or

expertise. I look for someone who also has

the information now, versus what it used

two. It was invaluable. When these people

the soft skills to demonstrate what we are

to be, this relationship has evolved. Now,

went through compliance and then back

trying to achieve and convey the message we

it is all machine learning. That is where the

to the business, they became disciples of

are trying to convey.

technology is going to come in. Bringing in

compliance. These business group would

—————————————————

people who can look at our processes, not just

also bring a certain perspective. They could

MS. SHEHADEH

from a technical perspective, but to solve our

explain to the compliance group how insane,

—————————————————

legalistic, and incomprehensible things could

There is the criticality of supply chain

be. The business group would keep the

experience. Echo that one-hundred times

compliance group honest. It was great having

over. Also, the criticality of being more

that kind of input.

open-minded to cross-technical skills. For

—————————————————

example, somebody coming from supply

MS. SHEHADEH

chain and then coming into this field, or

—————————————————

somebody coming from forensics coming

Have any of your company’s hiring style

into this field. The next frontier for me

or hiring requirements changed to navigate

from a hiring perspective--and I never in a

the changing world of technocrat to culture

million years thought I would say this--is a

steward?

computer engineer. We really want to explore

—————————————————

with machine learning and AI. I know there

MR. RABALAIS

is a ton of noise in our circles right now.

—————————————————

I have seen the light on this issue with a

In one sense, I would say “no.” Attention

spectacular program that a beer company

to detail is still very important. Now, it is

has shown us. With lots of Budweiser going

being exposed to slightly different things.

around the room about two weeks ago,

However, being able to listen to someone

in a benchmarking session, my company

remains the same.

got socialized with sophisticated machine

—————————————————

learning. Believe it or not, this includes AI

MR. GYESZLY

tools on monitoring, system identification

—————————————————

of vendors with third parties, diligence,

Certainly, the need for technical skills

and transaction monitoring. We must work

has increased. You can be the go-to expert,

smarter. We cannot work any harder. 86

Currents 24.1 2020

technology issues.


Are Changes to the U.S. Patent System Objectively Killing Innovation? N I C K

C O R N O R

—————————————————

poses the question: does an objective analysis

countries seeking to become true knowledge-

I. Introduction

of the evidence show that the U.S. patent

based economies through an effective

system is killing innovation?

intellectual property (IP) architecture.”6

—————————————————

The Index benchmarks economies using

Mankind often uses significant events

This Comment will analyze global

in history to divide time. In the late sixth

economic and patent statistics to answer this

century, a monk named Dionysius Exiguus

question. Part I will present the justification

developed the concept of separating time

the Chamber used to downgrade the U.S.

before and after the birth of Jesus of

patent protection rankings, focusing on the

Nazareth which has been incorporated into

Chamber’s scoring methodology. Part II will

both the Julian and Gregorian calendars.1

look at the history of the U.S. patent system,

Additionally, scholars have divided eras by

its economic justification, and the step-by-

using great wars to show the significant

step process an inventor uses to apply and

economic and cultural shifts various societies

obtain a U.S. patent. Part III will present

experienced afterwards. 2 Most recently,

the criticisms of the post-2012 changes in

actress Reese Witherspoon called for dividing

the U.S. patent system, focusing on those

time before and after Oprah Winfrey’s 2018

specific changes that the Chamber highlights

speech at the Golden Globes.3 If one were to

as their justification for downgrading

use the same approach for U.S. patent law,

the U.S. patent protection rankings. Part

they would likely pick the year 2012, as it was

IV will analyze statistics from the World

the year that both the Leahy-Smith America

Intellectual Property Organization (WIPO)

Invents Act (AIA) went into effect and the

and the International Monetary Fund

U.S. Supreme Court began to severely restrict

(IMF) to determine whether the Chamber’s

the scope of patentable subject matter.4 As

downgrade can be justified objectively.

a result of these changes, the U.S. patent

—————————————————

system has seen a precipitous drop in the

does not take into account possible nuances

protection ranking.5 The Chamber suggests

II. U.S. Chamber of C o m m e r c e ’s G l o b a l Innovation Policy Center’s Index

that these changes to the U.S. patent system

—————————————————

Numerical scores measure terms of

are causing inventors to view the U.S. as a less

Each year, the Global Innovation

exclusivity or are based on a quantitative

U.S. Chamber of Commerce’s (Chamber) annual Intellectual Property Index’s patent

favorable forum to seek patent protection, but a closer look at the Index shows a largely subjective methodology was used which

Policy Center’s (GIPC) Index publishes an International Intellectual Property Index (Index) which it describes as “a blueprint for

forty indicators in eitght categories which include: (i) Patents, Related Rights, and Limitations; (ii) Copyrights, Related Rights, and Limitations; (iii) Trademarks, Related Rights, and Limitations; (iv) Trade Secrets and Related Rights; (v) Commercialization of Intellectual Property Assets; (vi) Enforcement; (vii) Systematic Efficiency; and (viii) Membership in and Ratification of International Treaties.7 Each category is then subdivided into anywhere from two to eight indicators.8 Each indicator is scored between "0" and "1" with cumulative scores ranging from a minimum of 0 to a maximum of "40."9 The indicators can be scored using one of three distinct methods: binary, numerical, or mixed.10 The binary measurement is very simple, either a particular IP component exists or it does not and will receive a corresponding 0 or 1 score.11 While this scoring method and complexities of the individual indicators, as it is applied uniformly, this scoring method is relatively objective.

score.12 For example, indicator 9, measures the term of protection for a copyright and has historically used the U.S. term of ninety-

87

Currents 24.1 2020


five years as its baseline.13 So, the numerical

inventive step, and industrial applicability.”22

opposition proceedings. An objective

formula for this indicator is “n years of basic

This definition is based on Article 27 of the

measurement would look at the number

copyright term/95.” Because the U.S. has

Agreement on Trade-Related Aspects of

of patent applications filed before and after

a 95 year term for copyright protection, it

Intellectual Property Rights (TRIPS).23 The

the implementation of fair and transparent

receives a value of 1 while countries with

Index further explains that this indicator

opposition proceedings, according tot he

copyright terms that are less than ninety-

is “[m]easured by (1) existing de jure

Index, and then determines any changes to

five years will receive a value of less than

patentability guidelines and regulations and

the number of applications.

1.

Countries with copyright protection

(2) de facto standards established through

exceeding ninety-five years will also receive

the application of these guidelines and

a 1 as the methodology only allows for scores

regulations through the examination process

ranging from 0 to 1 in each indicator.16 Aside

and judicial review.”24 While measuring a

from arguments about whether or not the

country’s patentability requirements against

ninety-five year term is the gold standard for

international guidelines, regulations, and

copyright protection, because of the historic

patentability standards can be a useful

uniformity, this scoring method is relatively

measurement in determining where a

objective.

country ranks amongst other countries and

14

15

Mixed indicators account for the majority of indicators used in the Index with thirty-one of the forty indicators being mixed.17 This method is used when there is no adequate baseline and the legislative or regulatory existence of an indicator is not sufficient to determine its actual use or application. Here, a final score will be 18

based on an even split between the following: (i) primary and/or secondary legislation (regulation) in place; and (ii) the actual application and enforcement of that primary and/or secondary legislation.19 Only five possible scores are available within a mixed indicator: 0, 0.25, 0.5, 0.75, and 1.20 The U.S. received a score of "1" in all indicators within category 1: Patents, Related Rights, and Limitations, with the exception of indicator 2, Patentability Requirements, where it scored 0.75, and indicator 8, Patent Opposition, where it received a score of 0.5.21 Indicator 2 is defined as “[t]he extent to which patentability requirements are in line with international standards of novelty,

how the country abides by these international norms. It cannot be said that this is a dispositive method for measuring whether or not the patentability requirements of a given country’s patent system either stifles or encourages innovation. In other words, this method is largely subjective because it presumes that patentability requirements in Article 27 of TRIPS is the ideal standard for patent protection. A more objective standard would be to see whether a deviation from this standard—, which the U.S. arguably has done since 2012—, has led to less inventors seeking patent protection in the U.S. For indicator 8, the Index explains that this indicator is “[m]easured by the availability of mechanisms for opposing patents in a manner that does not delay the granting of a patent (in contrast to a right of opposition before the patent is granted) and ensures fair and transparent opposition proceedings.”25 This is a subjective measurement, without a definition based on TRIPS or other international norms on what would be considered fair and transparent 88

Currents 24.1 2020

While many commentators have criticized decisions by the U.S. Supreme Court restricting patentable subject matter and the AIA’s patent opposition proceedings as stifling innovation in the U.S., as Part II of this Comment will show, the debate on the degree to which the patent system encourages or stifles innovation is far from dispositive. As such, these criticisms are subjective speculation. As will be explored in Part IV of this Comment, analysis of global patent statistics will show that while the U.S. has seen a decrease in patent filings post-2012, the Index’s ranking may not be entirely justified. —————————————————

III. Background of the U.S. Patent System ————————————————— A.

History of the U.S. Patent System

Patent law in the U.S. has a long history, going back to the period in which the States lived under the Articles of Confederation.26 Eventually, patent law was federalized with what is widely known as the Copyright and Patent Clause which states that “Congress shall have power . . . To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.”27 The terms in the clause are archaic and often cause confusion among modern readers.28 For example, “useful Arts”


refers to the work of artisans or people skilled

price and produce less of the product than

that ensure inventors will be able to profit

in a manufacturing craft, while “Sciences”

the firms in a competitive market, even

from their inventions, they believe that the

refers to all forms of knowledge not restricted

though the product charged in both market

current patent system creates many social

solely to the fields of modern science.29 As a

structures is the same.38 A classic example

costs that outweigh the benefits.42 Proponents

result, “useful Arts” actually applies to the

of monopoly pricing is a gas station. If you

of patents, however, argue that the purpose

patent powers of Congress, while “Sciences”

live in a big city, the next time you take a

of a patent is to encourage inventors to

actually applies to the copyright powers of

road trip, take note of the price difference

produce socially valuable goods that would

Congress.

for gas in the city as compared to the prices

not otherwise be produced.43 The argument

in more rural areas. The gas stations in rural

goes that if the cost of copying someone else’s

areas effectively act as monopolies because

invention is less than the cost of inventing,

there is not as much competition from other

inventors are not incentivized to invent,

gas stations as there is in a more heavily

because they are unable to recover the costs

populated city. As such, the rural gas stations

of inventing.44

30

A patent is an exclusive right, given either to the inventor or to an assignee,31 that allows the patent owner the “the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States . . . .”32 Allowing the patent owners to exclude others

will charge a higher price, and most likely will hold less gasoline in their tanks than the gas stations in the more densely populated areas.

from making, selling, or importing their

B.

Economic Justification of the U.S.

inventions effectively allows the patent owner

Patent System

In response to the debate, Congress commissioned economist Fritz Machlup to study the U.S. patent system and determine if the social costs associated with patents outweighed their benefits. 45 Machlup concluded that

to have a monopoly for their invention. A

This of course would seem to run afoul

basic underlying economic principle is that

of federal antitrust law, namely the Sherman

No economists, on the basis of

rational decision makers seek to maximize

Act, which expressly states that “[e]very

present knowledge, could possibly

utility.33 For those involved in a product for

person who shall monopolize, or attempt

state with certainty that the patent

profit (firms) enterprise, the firm’s utility will

to monopolize, or combine or conspire any

system, as it now operates, confers

be maximized by selling their products in a

other person or persons, to monopolize any

a net benefit or a net loss upon

way that will maximize their profits. This

part of the trade or commerce . . . shall be

society. The best he can do is to

is accomplished by charging a particular

deemed guilty of a felony . . . .” However,

state assumptions and make guesses

price for the product and producing a

§ 1 of the Sherman Act gives Congress the

about the extent to which reality

particular quantity of the good, along the

power to regulate anticompetitive behavior

corresponds to the assumptions.46

market demand curve, that corresponds to

that results in a “restraint of trade.”40 Courts

where the firm’s marginal cost and marginal

have long held that public policy determines

While Machlup argued that “[i]f we

revenue intersect.35 For competitive markets,

the common law usage of that term, and,

characterized as many firms producing the

because patents are created by federal

same product, the price will be close to or

statute, it follows that the exclusive property

equal to the firm’s marginal cost.36 However,

right given to patents is not diminished or

a monopolist, as the sole producer of the

restricted by the Sherman Act.41[

34

product, faces the entire market demand curve for the product.37 By also charging a price that maximizes profits at the price and output point where the monopolist’s marginal cost is equal to their marginal revenue, a monopolist will charge a higher

39

did not have a patent system, it would be irresponsible, on the basis of our present knowledge of its economic consequences, to recommend instituting one[,]” he also stated that “since we have had a patent system for a long time, it would be irresponsible,

The tension between protecting

on the basis of our present knowledge, to

inventors and protecting the public against

recommend abolishing it.”47 In other words,

high prices has a long history of debate

to borrow an old proverb, “if it ain’t broke,

among economists. While opponents of

don’t fix it.” Whether or not the justification

patents favor clearly defined property rights

of the U.S. patent system is warranted, it is

89

Currents 24.1 2020


unlikely that Congress will abolish it anytime

does not account for the patent attorney

scope of protection only so slightly as to

soon, if ever. As such, inventors must contend

fees associated with preparing the patent

obtain a patent with the broadest amount of

with this reality when determining whether

application which average $252.00 per

protection. If the examiner is satisfied with

or not to protect their inventions with a

hour nationwide.54 While it is possible to

the patent attorney’s amendments, the patent

patent.

obtain a patent pro se, the chances of a pro

will issue.63 However, if the examiner is not

se applicant obtaining a patent are incredibly

satisfied, they will typically issue a second,

low. These costs also do not include the

or final office action, usually finalizing the

likely possibility that the United States

examiner’s position and limiting any reply

Patent and Trademark Office (USPTO)

by the patent applicant to an appeal.64 The

will reject a patent application based on

process then repeats.65 While a third office

the invention not being patentable subject

action is possible, it is rare, and often, a

matter, for not being novel, for the patent

rejection from a second office action will

being obvious, or for the application being

result in a final rejection.66 However, this

improperly written.59 While some believe

term is somewhat of a misnomer as the

that the USPTO grants nearly 100% of

applicant still has six months to continue to

patent applications, a recent study showed

amend their application and try to convince

that the probability that a patent will issue

the examiner to grant the application.67

C.

Cost of Obtaining a U.S. Patent

55

When facing the question of whether or not to obtain a patent, an inventor must consider where they intend to sell their product. If a foreign inventor only intends to sell their product in their own country, then they will only have to consider obtaining patent protection in that country. However, if the foreign inventor intends or has aspirations to sell their product abroad, because patents are territorial, they must consider whether or not to obtain a U.S. patent.48

56

57

58

has actually declined from 70% in 1996 to

Once six months have expired, the

As previously discussed, a patent grants

40% in 2005.60 However, an initial rejection

the patent holder a monopoly for the sale

by the USPTO does not necessarily mean

and production of their invention. Again,

that the patent application is dead in the

assuming that rational decision makers seek

water. Once the patent examiner has rejected

to maximize their utility, it is unquestionable

the patent application, the examiner will issue

that an inventor who holds a patent for

what is commonly referred to as an office

their invention has the opportunity to

action. At this point, a patent applicant

maximize their profits over an inventor

has up to six months to argue that the

that does not.50 Still, with only 2 to 3%

examiner has erroneously rejected the claims,

of all patented products ever making it to

or more often, amend the patent claims to

market, the gamble that an inventor takes

the examiner’s satisfaction.62 It should be

when determining whether or not to obtain

noted that a first office action is expected

a patent should not be underscored.51 This

and actually desired. If the USPTO does

would not be true if obtaining a patent had

not issue an office action, that could either

no transaction costs associated with it, but

mean that the application was written in a

as will be explained, the transaction costs

way that conferred the maximum amount

and risks associated with obtaining a patent

of protection possible for the invention, or

can be high.

more likely, that the claims were written

Assuming the examiner eventually

too narrowly and that the inventors could

issues a patent, the inventor now has

have obtained greater protection for their

an opportunity to enforce their patent

invention. As such, inventors should hope

rights. Here, the inventors have a variety

for an office action so that they may work

of options, such as the assignment or sale

with their patent attorney to narrow the

of the patent rights. The inventor does not

49

1. Patent Prosecution Costs Patent prosecution refers to the process applying for a patent.52 While filing, search, and examination fees can be as low as $430.00 for a micro entity,53 that number

61

90

Currents 24.1 2020

inventor has few options available.68 First, the inventor may have his attorney file a Request for Continued Examination (RCE), which resets the examiner’s previous office actions and, essentially allows the applicant to start over.69 The downside is that an RCE is not free, costing anywhere from $325.00 for a micro-entity to $1300.00 for a regular filer.70 If the RCE is not successful, the inventor may request an appeal to the Patent Trial and Appeals Board (PTAB), which, incurs fees anywhere from $600.00 to $1200.00,71 including the cost of attorney's fees on appeal, unless the inventor has a flat fee arrangement with their attorney. 2. Post-Grant Review Proceedings


have the capital required for the production

method patents, the USPTO has created

more efficient and streamlined patent system

of their invention, or the inventor only

the transitional program for covered business

that [would] improve patent quality and

wants to create the invention and not handle

method patents (TPCBM) which employs

limit unnecessary and counterproductive

the business side. Oftentimes as well, an

the standards and procedures of the PGR,

litigation costs.”90

assignment of patent rights may be part of

with certain exceptions tailored to business

—————————————————

an inventor’s employment contract, especially

method patents.

IV. Criticisms of the U.S. Patent System Post-2012

80

with larger companies that frequently have

Like the PGR, the IPR is also a trial

their employees developing inventions.72

proceeding conducted by the PTAB to review

the inventor may also desire to license their

the patentability of one or more claims in a

A.

invention to those already engaged in selling

patent, but only on the grounds of novelty

Proceedings

similar products. Licenses may be exclusive

and nonobviousness. Also, third parties are

or non-exclusive and are accompanied by a

able to file IPRs and often are competitors

variety of legal implications.73 Engaging in

that have been sued or anticipate being sued

license negotiations can be very complicated

by the patent holder for infringement. 82

as it may expose the patent holder to

Unlike the PGR, an IPR may be filed nine

litigation.74

months after the patent has been issued,

81

Patent owners also must contend with

or in the case where a PGR has been

the possibility that their patent’s validity will

instituted, after the post-grant review has

be challenged at the USPTO via a variety

been terminated.83 “The IPR was designed

of post-grant proceedings. These risks are

as a more efficient and cost-effective way for

especially high with the AIA’s new post-grant

potential infringers to challenge a patent’s

proceedings: post-grant review (PGR) and

validity” as opposed to costly litigation in

inter partes review (IPR).

federal district courts. Upon a third party

75

PGR is a trial proceeding conducted by the USPTO’s PTAB, which reviews the patentability of one or more claims that could have been raised during the prosecution phase.76 The process begins with a third party filing a petition, on or within nine months after the grant of the patent.77 Often, these third-party filers are competitors in the market that have either been sued or anticipate being sued by the patent owner.78 The PGR proceeding offers these competitors a quick (lasting no longer than twelve to eighteen months) and cost-effective tool for invalidating a patent and thereby negating further litigation.79 Also, in response to the decisions by the U.S. Supreme Court on what is colloquially termed business

————————————————— The AIA’s Post-Grant Opposition

Despite the AIA’s best intentions, many have criticized IPR proceedings as having led to a high volume of trials with a disproportionate rate of rejections, due to patent owners having reduced opportunities to amend claims in the IPR and the lower burden of proof (preponderance of the evidence) for opposing parties than in district court proceedings (clear and convincing evidence).91 It is one of the main reasons that the Chamber decided to downgrade the U.S. patent ranking in indictor 8.92

84

filing an IPR85 and the patent owner filing a preliminary response, the Director of the

1. U.S. Supreme Court Cases on PostGrant Proceedings

USPTO, sitting on the PTAB, will make a

It was for these reasons that many

determination if the petitioner has shown a

commentators hoped that the U.S. Supreme

“reasonable likelihood [of prevailing] with

Court would take action to restrict the

respect to one of the claims challenged.”86

power of these post-grant proceedings in

If so, the Director, through the PTAB, then

2016 when it heard Cuozzo Speed Techs.,

institutes the IPR and proceeds to trial.87

LLC v. Lee. In Cuozzo, the Court addressed

Unless the parties settle in the interim, three

the disparate approach that the PTAB and

members of the PTAB, designated by the

federal district courts took in construing

Director, will issue a final determination

patent claim language. 93 In that case,

regarding patentability of the challenged

Garmin International, Inc. filed an IPR

claim within one year.88 Often times, an IPR

against Cuozzo Speed Technologies, LLC

is initiated once a defendant is sued for patent

for their patent that covered a speedometer

infringement in a federal district court.89 This

that would show a driver when he is driving

usually results in a stay in the district court,

above the speed limit, asserting that it was

pending the outcome of the IPR which

obvious in light of three prior patents.94

fulfills Congress’ purpose of establishing “a

After the PTAB invalidated the patent,

91

Currents 24.1 2020


concluding that the claims were obvious,

and cause added confusion” as a district court

heart of the issue was whether patent rights

Cuozzo appealed to the United States Federal

could find a claim valid while the IPR could

were the private property of the patentee

Circuit Court of Appeals (Federal Circuit),

102

later cancel that claim in its own review.

or a public right.109 The Court determined

the appeals court having exclusive appellate

The Court rejected this argument, stating

that a patent right was a public right and as

jurisdiction for appeals from decisions by the

that the different evidentiary burdens were

such, the IPR did not violate Article III.110

PTAB.95 Cuozzo argued that the PTAB had

“inherent to Congress’ regulatory design.”103

In dissent, Justice Gorsuch, joined by Chief

improperly used the “broadest reasonable

In short, the PTAB’s claim interpretation

Justice Roberts seemed to echo the concerns

construction” standard to interpret the

standard was a reasonable exercise of the

of many commentators:

patent claims as opposed to the “ordinary

USPTO’s rulemaking authority, which

meaning . . . as understood by a person of

Congress properly left to the particular

skill in the art” standard used by federal

expertise of the USPTO to make.104

district courts.96 After a divided panel of the Federal Circuit rejected Cuozzo’s argument, Cuozzo appealed to the U.S. Supreme Court.97 Cuozzo argued first that there was a “critical difference between the Patent Office’s initial examination of an application, to determine if a patent should issue, and [the IPR] proceeding . . . .”98 Because the USPTO had a broad construction system, with a chance to amend claims during the prosecution process, the public was protected from overly broad claims and the applicant had a fair chance to draft a precise claim that would qualify for patent protection.99 The Court rejected this argument stating that it was not unfair as Cuozzo could have made a motion during the IPR to amend or narrow the claim.100 While Cuozzo pointed out that only five out of eighty-six motions to amend had been granted by the PTAB since the AIA’s post-grant opposition proceedings had been created, the Court refused to address the issue; that question was not at issue, but, in dicta, the court said the “numbers may reflect the fact that no amendment could save the inventions at issue, i.e., that the patent should have never issued at all.”101 Second, Cuozzo argued that the disparate construction standards used by the IPR and federal district courts could “produce inconsistent results

investment you devise something you think truly novel. Then you

While patent practitioners were

endure the further cost and effort

disappointed with the Cuozzo decision,

of applying for a patent, devoting

there was hope that the Court would

maybe $30,000 and two years

reverse course in 2017 when it heard Oil

to that process alone. At the end

States Energy Services, LLC v. Greene’s Energy

of it all, the Patent Office agrees

Group, LLC.

In that case, Oil States

your invention is novel and issues

Energy Services, LLC had obtained a patent

a patent. The patent affords you

relating to an apparatus and method for

exclusive rights to the fruits of your

protecting wellhead equipment used in

labor for two decades. But what

hydraulic fracturing.106 In 2012, Oil States

happens if someone later emerges

sued Greene’s Energy in federal district court

from the woodwork, arguing that

for patent infringement which prompted

it was all a mistake and your patent

Greene’s Energy to petition the PTAB to

should be canceled? Can a political

institute an IPR, stating that Oil State’s

appointee and his administrative

patent was invalid because it was anticipated

agents, instead of an independent

by prior art (similar inventions existed at

judge, resolve the dispute? The

the time Oil States had applied for their

Court says yes. Respectfully, I

patent). As the petitioner in Cuozzo warned,

disagree.111

the district court and the IPR proceeded in

2. Post-Grant Review Proceeding Used

parallel, resulting in the district court issuing

as Leverage in Settlement Negotiations

105

a claim-construction order that “construed the challenged claims in a way that foreclosed Greene’s Energy’s arguments about the prior art,” while the PTAB, a few months later, issued a final written decision concluding that the claims were unpatentable.107 Oil States appealed to the Federal Circuit challenging the constitutionality of the IPR, arguing that “actions to revoke a patent must be tried in an Article III court before a jury.”108 At the 92

Currents 24.1 2020

After much hard work and no little

Aside from the fairness arguments, IPRs are often used by defendants to increase the chances of earlier and less costly settlements, as part of their overall litigation strategy.112 In 2015, for intellectual property litigation where the amount at risk was less than $1 million, the average litigation costs were $400,000.00 after discovery and $600,000.00 for all costs.113 For amounts at risk over $25


million, average litigation costs were $3

to the Federal Circuit which, sitting en

Narrowing Patentable Subject Matter

banc, affirmed the USPTO’s decision but

million at the end of discovery and $5 million

In addition to changes to the post-

for all costs.114 The median costs for IPRs

grant proceedings set forth in the AIA,

were dramatically lower: $80,000.00 through

since 2012, the U.S. Supreme Court has

filing a petition, $200,000.00 through end

decided a number of cases that have severely

of motion practice, $275,000.00 through

narrowed what is considered patentable

the PTAB hearing the IPR, and $350,000.00

subject matter.125 According to the Patent

through an appeal.

In addition to the pure

Act, an invention must consist of a “process,

dollar figures, time is also an important

machine, manufacture, or composition of

consideration.116 The average time it takes

matter” in order to be patented.126 Courts

for a patent infringement case to go to trial

have consistently held that laws of nature,

can be two and a half years.117 Even with a

natural phenomena, and abstract ideas

Bilski again appealed, this time to

twenty-year patent term, there have been

fall outside the area of patentable subject

the U.S. Supreme Court, which issued

cases that have taken almost twenty years to

matter127 and the AIA explicitly states that

three opinions, consisting of a plurality

adjudicate with multiple trips to multiple

“no patent may issue on a claim directed

opinion for the Court and two concurring

appellate courts.118 Conversely, the average

128

to or encompassing a human organism.”

opinions.136 While refusing to state that so-

time for an IPR is thirty-six months.

With

However, even with these restrictions,

called business methods patents were entirely

a relatively low bar to instituting an IPR120

the courts and the USPTO had generally

outside the scope of § 101, the Court did say

and the lower burden of proof required

interpreted § 101 of the Patent Act broadly,

that “business method patents raise special

to invalidate the patent than needed in

rarely using it to invalidate a patent.129 Since

problems in terms of vagueness and suspect

federal district courts,

it is no accident

2010, the U.S. Supreme Court began to do

validity.”137

that defendants are willing to fork over, on

just for (i) business methods, (ii) software,

average, $100,000.00, for a patent attorney,

and (iii) biomedical technology.

imposing any radical new requirements

1. Business Methods

on patentability under § 101, some

who wish to enforce their patent rights will

Broadly speaking, a business method

commentators criticized the decision for

enter into a contingency fee arrangement

is defined as “a method of operating any

with a patent attorney.123 Because the IPR

aspect of an economic enterprise.”130 In

has the possibility of lengthening litigation,

2010, the U.S. Supreme Court addressed the

as the district court will often stay litigation

question of whether or not business methods

pending the outcome of the IPR process,

could be patented in Bilski v Kappos.131

patent attorneys operating on a contingent

In that case, the USPTO had rejected

fee have an incentive to push harder on their

Bilski’s application, stating that Bilski was

clients to settle earlier and oftentimes for less

claiming subject matter that was ineligible

money than they otherwise would if they had

for patenting under 35 U.S.C. § 101, as it

remained in the litigation longer.124 As such,

was not “implemented on a specific apparatus

patent owners must consider this risk when

and merely manipulate[d] an abstract

calculating whether or not protecting their

idea and solved a purely mathematical

2. Software

inventions with a patent will be economically

problem without any limitation to a practical

In Alice, the Court was tasked with

advantageous.

application” and was therefore “not directed

115

119

121

expert witnesses, and the USPTO filing fee.122 Increasingly more common, patent owners

B.

U.S. Supreme Court Decisions

to the technological arts.”132 Bilski appealed

produced five different opinions on why.133 The majority held that “a claimed process is surely patent-eligible under § 101 if: (1) it is tied to a particular machine or apparatus, or (2) it transforms a particular article into a different state or thing.”134 Applying this standard, the Federal Circuit agreed that Bilski’s application did not claim patentable subject matter.135

While this decision was not seen as

its lack of clarity on the question of what constitutes an “abstract idea” and is therefore not patentable. 138 The real concern was that because many business methods were implemented via computer software, the court would find that an abstract idea was otherwise made patentable by being tied to a computer. This issue would be addressed three years later in the much more controversial decision of Alice Corp. Pty. Ltd. v. CLS Bank Int’l.139

determining whether a patent, designed to mitigate settlement risk by using a third-party

93

Currents 24.1 2020


intermediary, implemented by a computer,

per se unpatentable. 146 The Electronic

their own patent law. Some of

was patentable under 35 U.S.C. § 101.

140

Frontier Foundation argued that limits on

those countries may not be pre-

In that case, CLS Bank International sought

patentability of software innovations would

disposed to supporting patent

a declaratory judgment that claims in the

more likely help than harm the U.S. software

rights, especially patent rights

patent held by Alice were invalid, arguing that

industry.147 IBM argued that while “[t]here

held by foreign patentees. Those

pursuant to Bilski, the claims were directed

should be no serious question that computer-

countries might be quite willing

to the abstract idea of “employing a neutral

implemented inventions such as software

to embrace, vigorously, a judge-

intermediary to facilitate simultaneous

constitute patent-eligible subject matter

made exclusionary principle that

exchange of obligations in order to minimize

under § 101[,]” obviousness under § 103

has the acknowledged capability to

risk.”141 The Court determined that the

was the more appropriate way to find that

“swallow all of patent law” if judges

patents were invalid because the claims

the present patents were invalid.148

and other decision-makers do not

were drawn to an abstract idea and that implementing those ideas via a computer

While experts in the patent industry

“tread carefully” in applying it.153

agreed that the patents in Alice were

It seems that Professor Duffy’s concern

improvidently granted and needed to be

was warranted. Less than one year after

invalidated, many criticized the Court’s

Alice, the case had been cited 109 times by

decision as not giving much guidance on

lower courts in cases involving the validity of

what kinds of patent software should be

software patents.154 The district court found

patentable. 149 Many also criticized the

that twenty-eight of the software patents

decision for not providing clear guidance on

were invalid at the pleadings stage without

when a patent transforms an abstract idea

first holding a Markman hearing where the

into a patent-eligible invention.150 To this

claim language is construed. Twenty-two

question, the Court stated that “the mere

district courts had invalidated patents on

recitation of a generic computer cannot

summary judgment, and only eighteen

transform a patent-ineligible abstract idea

district courts had rejected Alice challenges

into a patent-eligible invention. Stating an

on the merits or for procedural reasons, such

abstract idea while adding the words ‘apply

as the prematurity of the Alice motion.155

The case prompted fifty-two amicus

it’ is not enough for patent eligibility.”151

Additionally, in that time period, the Federal

curiae briefs by leaders in the software

Professor John Duffy of the University of

Circuit only upheld one software-related

industry and patent professionals, generating

Virginia School of Law lamented having

patent.156

consensus that the patents in Alice should be

to teach the Alice decision to his students,

[

invalidated, but difered as to why.

The tech

stating that he was not convinced that “the

giants Google, Amazon, Facebook, and other

enough test [would] give much guidance

tech companies argued that patents which

to [his] students, or to the lawyers, judges,

merely recite “abstract ideas implemented

and Patent Office officials who will have to

on computers or over the Internet” should

apply it to numerous other situations.”

be held invalid as “the significant work comes

Professor Duffy also expressed concerns for

later, when others undertake the innovative

international prosecution, stating:

was not enough to transform the abstract ideas into patentable subject matter.142 Justice Sotomayor filed a concurring opinion, with whom Justices Ginsburg and Breyer joined, that simply stated, “I adhere to the view that any claim that merely describes a method of doing business does not qualify as a process under § 101 . . . . I further believe that the method claims at issue are drawn to an abstract idea . . . . I therefore join the opinion of the Court.”143 This seemed to suggest that these three Justices would favor a bright line rule against business methods altogether.

144

task of developing specific applications.”145 Microsoft and Hewlett-Packard agreed with the bright line rule held by Sotomayor’s concurrence that business methods are

a large drop off in the issuance of business method patents, issuing fewer than half the number that they had issued in the months prior to Alice.157 This is in line with Judge Newman’s concurrence in part and dissent in part when the Alice decision came before the Federal Circuit where she stated that “[t]

While these cases involve only

he uncertainty of administrative and judicial

U.S. law, other countries often

outcome and the high cost of resolution

look to U.S. doctrine in fashioning

are a disincentive to both innovators and

94

Currents 24.1 2020

152

Finally, statistics from the USPTO show


competitors.”158 Articles with titles such as

thus satisfied the Federal Circuit’s “machine

troublesome problems in pharmaceutical

“Business Methods (and Software) Are Still

or transformation test.”

The Supreme

and biopharmaceutical companies, Professor

Patentable!”159 do not encourage inventors to

Court reversed, holding that “Prometheus’

Richard H. Stern at George Washington

invest in patent protection for their business

patents set forth laws of nature—namely,

University Law School praised the decision

methods and software patents. The fear is

relationships between concentrations of

for “masterfully harmoniz[ing] difficult-to-

that their applications will be rejected by

certain metabolites in the blood and the

reconcile precedents.”173

the USPTO.

likelihood that a dosage of a thiopurine drug

3. Biomedical Technology Business methods and software are not the only technology areas that the U.S. Supreme Court has scrutinized under 35 U.S.C. § 101. In Mayo Collaborative Services v. Prometheus Laboratories, Inc., the Supreme Court invalidated patents for “[a] method of optimizing therapeutic efficacy for treatment of an immune-mediated gastrointestinal disorder . . . .”160 Because people metabolized the drug 6-thioguanine differently, the patents set out thresholds for administering the drug based on a patient’s red blood cell count.161 Prometheus, the patent owner, sold diagnostic tests that embodied the processes that the patents described.162 When Mayo, a buyer of the diagnostic tests, announced that they intended to begin using and selling their own test, Prometheus sued Mayo in a federal district court for patent infringement.163 While finding that Mayo’s test infringed Prometheus’ patent, the federal district court nevertheless granted a motion for summary judgement in Mayo’s favor reasoning that “the patents effectively claim natural laws or natural phenomena— namely the correlations between thiopurine metabolite levels and the toxicity and efficacy of thiopurine drug dosages—and so are not patentable.”164 On appeal, the Federal Circuit found that the steps in the patents “involve[d] the transformation of the human body or of blood taken from the body” and

165

will prove ineffective or cause harm.”166 The Court went on to say that if Prometheus’ patents claims did significantly more than simply describe these natural correlations, it might be enough for the patents to qualify as patent eligible.167 In explaining the test, the Court analogized Einstein patenting his General Theory of Relativity “by claiming a process consisting of simply telling linear accelerator operators to refer to the law to determine how much energy an amount of mass has produced (or vice versa).”

168

Based

on this analogy, the Court determined that the process simply told doctors interested in these correlations to perform a series of steps that, while not being natural laws themselves, were not “sufficient to transform the nature of the claim.”169

A year later, the Court again took up the issue of biotechnology patents in Association for Molecular Pathology v. Myriad Genetics, Inc.174 In that case, Myriad, a molecular diagnostic company, had discovered the precise location and sequence of gene mutations that dramatically increased the risk of breast and ovarian cancer.175 With this knowledge, Myriad developed medical tests that could detect these mutations in the genes in order to assess the patient’s risk for cancer.176 Years later, medical patients, advocacy groups, and other doctors filed a lawsuit seeking a declaration that Myriad’s patents were invalid under 35 U.S.C. § 101.177 The district court granted summary judgement against Myriad, which the Federal Circuit reversed, holding that the method was patent eligible under § 101. 178 The

Critics of the decision did not hold

Supreme Court then reversed the Federal

back, stating that “[t]hose in the biotech,

Circuit, stating that because Myriad had

medical diagnostics and pharmaceutical

sought to patent a naturally occurring

industries have . . . been taken behind the

DNA segment, as opposed to a method for

woodshed and summarily executed by the

manipulating genes, it had sought to patent

Supreme Court . . . .”170 The big concern was

a product of nature which was not patent

that the Court’s decision would invalidate

eligible merely because it had been isolated.179

thousands of diagnostic patents and would

However, the Court did find that where the

cause investors in personalized medicine to

patent concerned complementary DNA

reevaluate their current investments and

(cDNA), which is synthetic, the cDNA was

possibly redirect future investments to other

not a product of nature and therefore patent

projects, thereby resulting in less research

eligible under § 101.180

and development in the area of untreated diseases.171 Amidst the criticism, there were those who agreed with the decision.172 While conceding that the decision could create

Many commentators supported the Supreme Court’s decision stating that “for many people, it is impossible to understand

95

Currents 24.1 2020


how genes—the traits we inherit from our parents and pass along to our children—could become a company’s intellectual property.”

181

Still, many argued “that without the revenue streaming from their intellectual property protection, biotechnology companies will not be able to create the medical biotechnology products that have so much positive potential for public health.”182 The U.S. Supreme Court decisions discussed above, as well as the AIA’s

protection in the U.S. For this analysis, only the top thirteen countries from Figure 1 were analyzed. and patent data that would challenge their

correlation between a country’s GDP and the

rankings by the Index, the goal of this

number of patent applications, with the two

Comment is to test the accuracy of the

outliers being Japan and South Korea, which

GIPC’s ranking of the U.S. In addition,

is most likely attributable to the fact that

because WIPO only has patent statistics from

both countries have a large high-technology

2008 to 2017, all GDP data from the IMF

industry, with 25% of all manufactured

also is constrained to those years.

exports from those countries being classified

proceedings were used by the GIPC to justify

Gross Domestic Product

Part II of this Comment, the GIPC utilized a largely subjective methodology to make this determination. A better way to assess the effects of these changes to the U.S. patent system would be to develop an objective methodology, which looks at how inventors have responded to these changes in the patent system. —————————————————

V. Analysis ————————————————— The GIPC’s Index lists the U.S. as first in overall IP rankings, but a breakdown of the countries rankings in category 1: Patents, Related Rights, and Limitations, shows that the U.S. ranks 13th as shown in Figure 1 (page 99).

184

Economic Strength as Measured by

Gross Domestic Product (GDP) is defined as a monetary measurement of all final goods and services produced in a given period of time, usually annually.186 A country’s GDP is composed of all goods and services produced for sale in the market as well as nonmarket production such as defense and education spending provided by government.187 While other productive activity, such as unpaid work by volunteers and black-market activities, are not included in GDP measurements, economists routinely use GDP as a way to measure the health of a country’s economy.188 With regards to an inventor deciding where to sell their inventions and thereby seek patent protection, countries with higher GDPs usually have greater capital available to the inventor as opposed to countries with lower

As previously explained, these rankings

GDPs. If GDP was the sole measurement

are based primarily on the subjective mixed

that determined an inventor’s desirability

scoring method.185 The following analysis will

to seek patent protection, the U.S., which

seek to determine, using statistics from both

boasts the highest nominal GDP of any

the IMF and WIPO, whether the GIPC’s

other country in the world,189 would be far

Index ranking shows that the changes to the

and away the top choice of inventors. This

U.S. patent system have objectively caused

can be shown in Figure 2 (page 100) which

inventors to be less inclined to seek patent

compares each countries’ relative average 96

Currents 24.1 2020

to 2017.190 As Figure 2 shows, there is a strong

A.

rankings.183 However, as previously stated in

patent applications between the years 2008

While other countries might have economic

implementation of the post-grant opposition the U.S. downgrade in the patent protection

nominal GDP to the average number of all

as high-technology.191 While there may be a strong correlation between a country’s GDP and the number of patent applications, the correlation has more to do with an inventors desire to tap into a wealthy market than it does about the ease of navigating the country’s patent system due to increased costs in obtaining and defending a patent. In other words, as long as these countries continue to maintain higher GDPs (as all thirteen countries GDPs rank in the top quintile of all countries in the world), it is safe to say that they will also receive the largest number of patent applications.192 Another way to measure a country’s economic vitality is to measure its economic growth rate, 193 which is obtained by calculating the percentage change in GDP from one year to the next.194 While a country such as the U.S. may continually have the highest GDP, during a recession, GDP will decrease, and unemployment will increase. Increased unemployment equates to a smaller market for inventors to sell their inventions, which will cause inventors to be less likely to seek patent protection for their inventions. If this theory holds, countries experiencing negative GDP growth should also experience a corresponding decrease in the percentage


change of patent applications, and vice versa.

good is one where demand decreases when

grant rate actually increased from 42.54%

Figure 3 (page 100) shows the average growth

a consumer’s income rises.

Conversely,

to 51.40% after the year 2012. 203 This

rate as compared to the average percentage

when a consumer’s income decreases (as a

would seem to contradict the GIPC Index’s

change in patent applications in each country

collective country’s income decreases during

predictions. Furthermore, by ranking each

between the years of 2008 to 2017.195

a recession), demand increases.201 Therefore,

country based upon their average patent

inventors of products that can be classified

grant rate, the U.S. ranking actually increased

as inferior goods may seek countries with

from 10th, before the year 2012, to 8th after

lower GDPs or even seek out countries

the year 2012.204 However, all countries, with

experiencing recessions.

the exception of Italy, also saw an increase

Unlike Figure 3, there is much less correlation between a country’s growth rate and the change in patent applications, if any at all. In fact, while Japan experienced

200

in their average patent grant rate after the

a small average growth rate during this time

As these economic statistics show, their

period of 0.24%, it also saw a significant

effect on an inventor’s decision to choose one

decrease, 0.99%, in the percentage change of

country over another based upon the costs

A note of caution should be exercised

patent applications.196 Conversely, while Italy

associated with obtaining and enforcing a

when analyzing this measurement as it does

experienced a negative growth rate of 0.67%

patent will be negligible. As such, these

not take into account whether inventors, after

(one of the lowest growth rates in the entire

economic variables can be excluded from

seeing the changes to the U.S. patent system

world, ranking 186 out of 196 countries), it

the analysis in an attempt to isolate other

post-2012, may have been discouraged

saw an increase of 1.41% in the percentage

variables that may shed light on whether

entirely from applying for a U.S. patent.

change of patent applications.

Therefore,

inventors are swayed by the changes to the

In other words, the increased patent grant

it is reasonable to conclude that there is very

U.S. patent system when deciding which

rate may largely be attributed to less patent

little if any connection between a country’s

country to seek patent protection.

applications that contained patentable

197

growth rate and an inventor’s decision to seek

B.

patent protection.

Granted

Percent of Patent Applications

subject matter than was likely to be rejected by the USPTO in light of the Supreme

The likely reason is that the duration of

Another way to gauge how favorable

the patent term is twenty years in the U.S. and

inventors view a particular country’s patent

Europe.198 With the average business cycle’s

system is to look at the percentage of patent

contractionary period being eleven months

applications that eventually result in the grant

for the past seventy-five years, inventors can

of a patent (patent grant rate). In theory,

safely assume that any country experiencing

inventors should be less likely to seek patent

a recession will most likely reach recovery

protection in a country with a lower patent

within a year or two.199 Therefore, inventors

grant rate than a country with a higher grant

will most likely view a country experiencing

rate. Additionally, historic analysis of the

negative GDP growth as only temporary,

patent grant rate in the U.S. should show

which will not significantly discourage

a decrease after the year 2012 according to

them from seeking patent protection,

the GIPC Index as decisions by the U.S.

if other factors in that country show a

Supreme Court restricting patentability

possible market for selling their invention.

should mean that the USPTO rejects more

In addition, for those inventors seeking to

patent applications. Figure 4 (page 101)

invent products that might be classified as

shows the historic patent grant rate for all

inferior goods, negative GDP growth may

thirteen countries.

actually be a positive factor. An inferior

year 2012.205

202

Surprisingly, the average U.S. patent

Court’s decisions. Therefore, a large portion of the patents being granted were subject matter not likely to be rejected by the USPTO. In addition, these numbers do not take into account how many applications were pro se, which account for the bulk of rejections by the USPTO,206 and there is no readily available data to show how pro se applications are treated in other countries. Still, the ranking of the U.S. among these thirteen countries, with respect to patent grant rate, seems at odds with the GIPC Index’s ranking.207 C.

Pe r c e n t C h a n g e i n Pa t e n t

Applications Finally, the most dispositive statistic to look at is the percentage change in patent applications in each country. If the GIPC

97

Currents 24.1 2020


Index’s findings are correct, inventors

of 1.06%.214 The only other countries that

seeking patent protection in the U.S.

experienced a greater average decrease than

should be discouraged after the changes to

the U.S. were Switzerland, France, and

the U.S. patent system were implemented

Spain, with decreases of 26.85%, 4.01%,

in 2012 (and should look to countries that

and 3.96%, respectively.215 Therefore, it is

have a better patent system). As such, the

reasonable to conclude that the changes to

percentage change in patent applications in

the U.S. patent system in 2012 have resulted

the U.S. should decrease after 2012, while

in at least some inventors being discouraged

the percentage change in patent applications

from seeking patent protection in the U.S.

in other countries should increase. WIPO

—————————————————

classifies patent applications as being filed

VI. Conclusion

either by a resident, non-resident, or abroad

—————————————————

filer.

208

A resident filing is one made by

applicants at their home office, which may be a national or regional office.209 The terms “non-resident” and “abroad” are used for filings in a foreign office, but a non-resident filing occurs when an office receives an application by a foreigner, while an abroad filing occurs when an applicant files an application from a foreign office.

210

While WIPO has reasons for differentiating between the two terms, for this analysis, the terms can be used interchangeably. Figures 5 (page 101) and 6 (page 102) show the average rate of change of patent applications across all thirteen countries.211 From the outset, it should be noted that Switzerland, Sweden, and Ireland seem

The analysis presented supports the GIPC Index’s conclusion that changes made to the U.S. patent system since 2012 have led some inventors to be discouraged from seeking patent protection in the U.S., but it is unclear whether the analysis supports the Index’s ranking of the U.S. or any of the other top fourteen countries. In order to more definitively determine the answer to these questions, further econometric analysis will need to be done. In addition, the dataset from the years 2008 to 2017 is probably too small. As time goes on, an expanded dataset should be able to yield better results and paint a more adequate picture of the damage that the changes to the U.S. patent system since 2012 has had on U.S. innovation.

to have outliers that may be attributable to factors specific to those countries which are unknown. Those three countries have been removed from Figure 6 for readability purposes.212 The U.S. experienced a decrease of 2.05% among resident filings and a decrease of 2.40% among non-resident filings but experienced a 1.26% increase among abroad filings.213 By averaging all three categories of filers, the U.S. saw an overall decrease 98

Currents 24.1 2020


Figure 1

99

Currents 24.1 2020


Figure 2

Figure 3

100

Currents 24.1 2020


Figure 4

Figure 5

101

Currents 24.1 2020


Figure 6

102

Currents 24.1 2020


End Notes 1.

2.

3.

4.

5.

6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.

See Dick Teresi, Zero, The Atlantic, July 1997, https:// www.theatlantic.com/magazine/ archive/1997/07/zero/376900. Robert A. Margo & Georgia C. Villaflor, The Growth of Wages in Antebellum America: New Evidence, 47 The Journal of Economic History 873, 888 (1987) (comparing growth pre and post-civil war); Magali Cornier Michael, Feminism and the Postmodern Impulse: Post-World War II Fiction (1996) (analyzing the intersections between feminist politics and postmodern aesthetics as demonstrated in recent AngloAmerican fiction). Reese Witherspoon (@ReeseW), Twitter (Jan. 7, 2018, 11:04 p.m.), https://twitter.com/reesew/ status/950262030409261056?lan g=en. United States Patent and Trademark Office, LeahySmith America Invents Ac t ( 2 0 1 1 ) , h t t p s : / / w w w. uspto.gov/sites/default/files/ aia_implementation/20110916pub-l112-29.pdf. Global Intellectual Policy Center (GIPC), U.S. Chamber International IP Index 6 (2018), https://www. t h e g l o b a l i p c e n t e r. c o m / w p content/uploads/2018/02/GIPC_ IP_Index_2018.pdf [hereinafter GIPC Index]; see Gene Quinn, U.S. Patent System Falls to 12th Place in Chamber Global IP Index for 2018, IPWatchdog (Feb. 8, 2018), https://www.ipwatchdog. com/2018/02/08/u-s-patentsystem-falls-12th-place-chamberglobal-ip-index-2018/id=93494/ (showing the U.S. has dropped from 10th in 2017 to being tied for 12th place with Italy in 2018). GIPC Index, note 5, at v. Id. at 163. Id. at 164–65. Id. at 165. Id. Id. Id. Id. Id. Id. Id. Id. at 166. Id. at 165. Id. at 165–66. Id. at 166. Id. at 156. Id. at 169. Id. at 177 n.xxi.

24. Id. at 169–70. 25. Id. at 171. 26. Jeanne C. Fromer, The Intellectual Pr o p e r t y C l a u s e’s E x t e r n a l Limitations, 61 Duke L.J. 1329, 1345 (2012). 27. U.S. Const. art. I, § 8, cl. 8. 28. 11 Donald S. Chisum, Chisum on Patents § 1111.30 (2018). 29. Id. 30. Id. 31. World Intellectual Property Organization [WIPO], Frequently Asked Questions: Patents, (2019), http://www.wipo.int/patents/en/ faq_patents.html (last visited Jan. 22, 2020). 32. 35 U.S.C. § 154 (2012). 33. See Anthony T. Kronman & R i c h a rd A . Po s n e r, Th e Economics of Contract Law 1–2 (1979). 34. Id. 35. See Richard G. Lipsey et. al., Microeconomics, 232–36 (12th ed., 1999). 36. Id. 37. Id. 38. Id. 39. 15 U.S.C. § 2 (2012). 40. Edwin H. Abbot, Jr., Patents and the Sherman Act, 12 Colum. L. Rev. 709, 710 (1912). 41. Id. 42. Michele Boldrin & David K. Levine, Property Rights and Intellectual Monopoly, David Levine’s Economic and Game Theory Page, http://www. dklevine.com/general/intellectual/ coffee.htm (last visited Jan. 22, 2020). 43. David S. Olson, Taking the Utilitarian Basis for Patent Law Seriously: The Case for Restricting Patentable Subject Matter, 82 Temp. L. Rev. 181, 192 (2009). 44. Id. 45. Fritz Machlup, Subcomm. on Patents, Trademarks, and Copyrights of the Comm. on the Judiciary, 85th Cong., An Economic Review of the Patent System 79 (Comm. Print 1958). 46. Id. at 79. 47. Id. at 80. 48. Protecting Intellectual Property Rights (IPR) Overseas, U.S. Pat. and Trademark Office, https:// www.uspto.gov/patents-gettingstarted/international-protection/ protecting-intellectual-propertyrights-ipr (last visited Jan. 22, 2020). 49. 35 U.S.C.§ 154 (2012). 50. Kronman, supra note 33.

51. Tamara Monosoff, To Patent or Not to Patent?, Entrepreneur (Sept. 26, 2005), https://www. entrepreneur.com/article/80088. 52. Gene Quinn, Patent Prosecution 1 0 1 : Un d e r s t a n d i n g Pa t e n t Examiner Rejections, IPWatchdog (Feb. 11, 2017), https://www. ipwatchdog.com/2017/02/11/ p a t e n t - p ro s e c u t i o n - p a t e n t examiner-rejections. 53. USPTO Fee Schedule, USPTO, https://www.uspto.gov/learningand-resources/fees-and-payment/ uspto-fee-schedule (last revised Sept. 1, 2019). 54. Patent Attorneys Fees Explained, IPWatchdog, http://www. ipwatchdog.com/patent/patentattorney-fees-explained (last visited Jan. 22, 2020). 55. Extended Year Set – All Technologies (Utility Patents) Report, USPTO, http://www.uspto.gov/web/ offices/ac/ido/oeip/taf/h_ at.htm#PartA1_1b (last visited Jan. 22, 2020) (showing that in 2015, out of 298,407 granted utility patents, only 6.3% were granted to individuals as opposed to U.S. and foreign corporations or governments). 56. 35 U.S.C. § 101 (2012) (“Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor . . . .”). 57. Id. § 102(a) (“A person shall be entitled to a patent unless . . . the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public . . . .”). 58. Id. § 103 (“A patent for a claimed invention may not be obtained . . . if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains.”). 59. Id. § 112(a) (“In general. The specification shall contain a written description of the invention, and the manner and process of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art . . . to make and use the same . . . .”). 60. Michael Carley et al., What is the

Probability of Receiving a U.S. Patent?, 17 Yale J.L. & Tech. 203, 215 (2015). 61. 37 C.F.R. § 1.134 (2019) (“An Office action will notify the applicant of any non-statutory or shortened statutory time period set for reply to an Office action.”). 62. Id; see also 37 C.F.R. § 1.111 (2019) (“If the Office actions after first examination . . . [are] adverse in any respect, the applicant or patent owner, if he or she persists in his or her application for a patent . . . must reply and request reconsideration or further examination, with or without amendment.”). 63. 37 C.F.R. § 1.314 (2019) (“If applicant timely pays the issue fee . . . .”). 64. 37 C.F.R. § 1.113 (2019). 65. Id. 66. Id. 67. Id. 68. Id. 69. Id. 70. USPTO, supra note 53. 71. USPTO, supra note 53. 72. See generally 8 Donald S. Chisum, Chisum on Patents § 22.03 (2019). 73. Id. 74. S e e S a n D i s k C o r p . v . STMicroelectronics, Inc., 480 F.3d 1372, 1381 (Fed. Cir. 2007) (“[W]here a patentee asserts rights under a patent based on certain identified ongoing or planned activity of another party, and where the party contends that it has the right to engage in the accused activity without license, an Article III case or controversy will arise and the party need not risk a suit for infringement by engaging in the identified activity before seeking a declaration of its legal rights.”). 75. 4 Donald S. Chisum, Chisum on Patents § 11.07(4)(b)(i) (2019). 76. 27 C.F.R. §§ 42.200–42.207 (2019). 77. Id. 78. Brian C. Kwok & Nicholas V. Martini, Post-Grant Review is Becoming Increasingly Popular, Law360 (June 1, 2016, 10:32 AM), http://www.haynesboone. com/-/media/files/attorneypublications/2016/postgrantreview-is-becoming-increasinglypopular.ashx?la=en&hash=3747 CF515B1F482CA9D4F535A51 912A2B5A58877. 79. Id. 80. Transitional Program for Covered

103

Currents 24.1 2020


B u s i n e s s M e t h o d Pa t e n t s , USPTO, https://www.uspto. gov/patents-application-process/ appealing-patent-decisions/trials/ transitional-program-coveredbusiness (last updated May 9, 2017). 81. Inter Partes Review, USPTO, https://www.uspto.gov/patentsapplication-process/appealingpatent-decisions/trials/interpartes-review (last updated May 9, 2017). 82. Kwok & Martini, supra note 77. 83. Kwok & Martini, supra note 77. 84. Nate Dilger & John Lord, Evaluating the Effectiveness of the Inter Partes Review Process, Los Angeles Lawyer 16 (July/ Aug. 2016), http://onellp.com/ wp-content/uploads/2016/07/714-16-LA-Lawyer.pdf. 85. 35 U.S.C. § 311 (2012) (detailing who may file and when petition should be filed). 86. 35 U.S.C. § 314 (2012); see also 35 U.S.C. §§ 6(c), 18 (2012). 87. 35 U.S.C. § 6 (2012). 88. Id.; 35 U.S.C. § 316 (2012). 89. Jason E. Stach & Benjamin A. Saidman, Maximizing the Likelihood of a Litigation Stay Pending Inter Partes Review, IP Litigator (Sept./Oct. 2016), https://www.finnegan.com/ en/insights/maximizing-thelikelihood-of-a-litigation-staypending-inter.html. 90. 77 Fed. Reg. 48680 (Aug. 14, 2012). 91. GIPC Index, supra note 5, at 8. 92. GIPC Index, supra note 5, at 8. 93. Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2137–39 (2016). 94. Id. at 2138. 95. Id. at 2138–39. 96. Id. at 2134. 97. Id. at 2139. 98. Id. at 2145. 99. Id. 100. Id. 101. Id. at 2145–46. 102. Id. at 2146. 103. Id. 104. Id. 105. 138 S. Ct. 1365 (2018). 106. Id. at 1372. 107. Id. 108. Id. 109. Id. 110. Id. at 1373. 111. Id. at 1380. 112. See William Hannah, Comment, Major Change, New Chapter: How Inter Partes Review and Post Grant Review Proceedings Created by the America Invents Act will Shape Litigation Strategies, 17 Intell. Prop. L. Bull. 27, 27 (2012). 113. Am. Intell. Prop. Law Ass’n, 2015 Report of the Economic

Survey 37 (2015). 114. Id. 115. Samson Vermont, AIPLA Survey of Costs of Patent Litigation and Inter Partes Review, PatentAttorney. com (Jan. 30, 2017), https://www. patentattorney.com/aipla-surveyof-costs-of-patent-litigation-andinter-partes-review/. 116. Hannah, supra note 110, at 29. 117. Hannah, supra note 110, at 29. 118. Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., 493 F.3d 1368, 1370–71 (Fed. Cir. 2007) (“The case has been pending for almost twenty years and has been before the Supreme Court twice and before us twice en banc.”). 119. Hannah, supra note 110, at 29–30. 120. Hannah, supra note 110, at 34. 121. GIPC Index, supra note 5, at 8. 122. Josh Landau, Inter Partes Review: Five Years, Over $2 Billion Saved, Pat. Progress (Sept. 14, 2017), http://www.patentprogress. org/2017/09/14/inter-partesreview-saves-over-2-billion/. 123. Lawrence K. Kolodney, Contingent Fee Litigation–A Low Risk Way to Enforce and Monetize Your Patents, Corp. Couns. (Oct. 23, 2017), https://www.fr.com/ wp-content/uploads/2017/10/ Kolodney_CorporateCounsel_ ContingentFeeLitigation_reprint. pdf. 124. See Lindsay V. Cutié, Inter Partes Review: An Avenue for Early Settlement of Co-Pending Patent Infringement Lawsuits, Baker Botts (Oct. 18, 2016), http:// www.bakerbotts.com/ideas/ publications/2016/10/interpartes-review-an-avenue-for-early. 125. J o h n R . Th o m a s , C o n g . R e s e a rc h S e rv. , R 4 4 9 4 3 , Patentable Subject Matter Reform 4 (1987). 126. 35 U.S.C. § 101 (2017). 127. Diamond v. Diehr, 450 U.S. 175, 185 (1981). 128. Leahy‑Smith America Invents Act (AIA), Pub. L. No. 112‑29, § 33, 125 Stat. 284 (2011). 129. See Timothy R. Holbrook & Mark D. Janis, Patent-Eligible Processes: An Audience Perspective, 17 Vand. J. Ent. & Tech. L. 349, 351 (2015). 130. Ausl. advisory council on intellectual Property, Report on a Review of the Patenting of Business Systems 1 (Sept. 2003), https:// www.ipaustralia.gov.au/sites/ default/files/final_report_review_ of_patenting_of_business_ systems.pdf. 131. See Bilski v. Kappos, 561 U.S. 593, 597–98 (2010). 132. Id. at 599–600.

133. Id. at 600. 134. Id. 135. Id. 136. Thomas, supra note 123, at 5. 137. Bilski, 562 U.S. at 608. 138. See Dennis Crouch, Bilski v. Kappos, Patentlyo (Jun. 28, 2010), https://patentlyo.com/ patent/2010/06/bilski-v-kapposbusiness-methods-out-softwarestill-patentable.html. 139. Id. 140. Alice Corp. Pty. v. CLS Bank Int’l, 573 U.S. 208, 212 (2014). 141. Id. at 214. 142. Id. at 221. 143. Id. at 227. 144. Paul J. Sutton, Patent Eligibility After Alice, World Intell. Prop. Rev. (Feb. 27, 2017), https://www. worldipreview.com/contributedarticle/patent-eligibility-afteralice. 145. Brief of Google, Inc. et al. as Amici Curiae Supporting Respondents at 8-9, Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208 (2014) (No. 13-298), 2014 U.S. S. Ct. Briefs LEXIS 786. 146. Brief of Microsoft Corp. et al. as Amici Curiae in Support of Affirmance at 10-11, Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208 (2014) (No. 13-298), 2014 U.S. S. Ct. Briefs LEXIS 780. 147. Brief of Amicus Curiae Elec. Frontier Found. in Support of Respondents at 12, Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208 (2014) (No. 13-298), 2014 U.S. S. Ct. Briefs LEXIS 783. 148. Brief of Amicus Curiae Int’l Bus. Mach. Corp. in Support of Neither Party at 8-14, Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208 (2014) (No. 13-298), 2014 U.S. S. Ct. Briefs LEXIS 404. 149. Brian Fung, The Supreme Court’s Decision on Software Patents Still Doesn’t Settle Bigger Question, Wash. Post (June 20, 2014), https:// www.washingtonpost.com/news/ the-switch/wp/2014/06/20/ the-supreme-courts-decisionon-software-patents-stilldoesnt-settle-the-biggerquestion/?noredirect=on&utm_ term=.86b7bf9ddeac. 150. John Duffy, Opinion Analysis: The Uncertain Expansion of JudgeMade Exceptions to Patentability, S C OT U S b lo g ( Ju n . 2 4 , 2014), http://www.scotusblog. com/2014/06/opinion-analysisthe-uncertain-expansion-of-judgemade-exceptions-to-patentability. 151. Alice Corp. Pty. v. CLS Bank Int’l, 573 U.S. 208, 223 (2014) (emphasis added). 104

Currents 24.1 2020

152. Duffy, supra note 148. 153. Duffy, supra note 148. 154. Steven Callahan, Alice: Death of Software-Related Patents? Northern District of Tex. Blog (May 1, 2015), http://www. ndtexblog.com/?p=3550. 155. Id. 156. Id. 157. James Bessen, What the Courts Did to Curb Patent Trolling—for Now, The Atlantic, Dec. 1, 2014, https://www.theatlantic.com/ business/archive/2014/12/whatthe-courts-did-to-curb-patenttrollingfor-now/383138/?single_ page=true. 158. CLS Bank Int’l v. Alice Corp. Pty, 717 F.3d 1269, 1321 (Fed. Cir. 2013) (Newman, J., concurring in part and dissenting in part). 159. Raymond Millien, Business Methods (and Software) Are Still Patentable!, IPWatchdog (Aug. 28, 2012), https://www. ipwatchdog.com/2012/08/28/ business-methods-and-softwareare-still-patentable/id=27658. 160. Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 74 (2012). 161. Id. at 75. 162. Id. 163. Id. 164. Id. at 75–76. 165. Id. at 76. 166. Id. at 77. 167. Id. 168. Id. at 77–78. 169. Id. at 78. 170. Gene Quinn, Killing Industry: The Supreme Court Blows Mayo v. Prometheus, IPWatchdog (Mar. 20, 2012), http://www. ipwatchdog.com/2012/03/20/ supreme-court-mayo-vprometheus/id=22920. 171. Glenn Hess, Patent Ruling Dismays Biotech, C&EN, (Apr. 2, 2012) https://cen.acs.org/articles/90/ i14/Patent-Ruling-DismaysBiotech.html?h=-1802238606; Hans Sauer, Mayo v. Prometheus: BIO Statement on Supreme Court Decision, BIOtechNOW (Mar. 20, 2012), https://www. biotech-now.org/public-policy/ patently-biotech/2012/03/mayov-prometheus-bio-statement-onsupreme-court-decision. 172. R i c h a r d H . S t e r n , M a y o v. Prometheus: No Patents on Conventional Implementations of Natural Principles and Fundamental Truths, 34 Eur. Intell. Prop. Rev. 502, 502 (2012). 173. Id. 174. Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 569 U.S. 576 (2013). 175. Id. at 576.


176. Id. 177. Id. at 586. 178. Id. 179. Id. at 576–82. 180. Id. at 576–7. 181. Jim Dwyer, In Patent Fight, Nature 1; Company, 0, N.Y. Times, Mar. 30, 2010, https:// www.nytimes.com/2010/03/31/ nyregion/31about. html?ref=myriadgeneticsinc&_ r=0. 182. L i b b y D e s h a i e s , R e c e n t Developments in Patenting Medical Biotechnology: Myriad Genetics and the Affordable Care Act as Steps Towards Greater Patient Access, 14 U. Ill. J. L. Tech. & Pol’y, 307, 311 (2014). 183. GIPC Index, supra note 5, at 8. 184. GIPC Index, supra note 5, at 35. 185. GIPC Index, supra note 5, at 165–66. 186. Tim Callen, Gross Domestic Product: An Economy’s All. Finance & Development, IMF (Dec. 18, 2018), https://www.imf.org/ external/pubs/ft/fandd/basics/ gdp.htm. 187. Id. 188. Id. 189. Wo r l d E c o n o m i c O u t l o o k Database, IMF [hereinafter WEO Data], https://www.imf.org/ external/pubs/ft/weo/2018/02/ weodata/index.aspx (last visited Jan. 22, 2020). 190. Id.; IP Statistics Data Center, WIPO [hereinafter WIPO Data], https://www3.wipo.int/ipstats/ index.htm?tab=patent (last updated Dec. 2018). 191. World Development Indicators Database, World Bank, https:// databank.worldbank.org/data/ views/reports/reportwidget. aspx?Report_Name=CountryPro file&Id=b450fd57&tbar=y&dd =y&inf=n&zm= (last visited Jan. 22, 2020). 192. WEO Data, supra note 189. 193. Callen, supra note 184. 194. Callen, supra note 184. 195. WEO Data, supra note 189; WIPO Data, supra note 190. 196. WIPO Data, supra note 190. 197. WIPO Data, supra note 190. 198. 35 U.S.C. § 154(a)(2); European Patent Convention, art. 63, Oct. 5, 1973, 1065 U.N.T.S. 199. https:// www.epo.org/law-practice/legaltexts/html/epc/2016/e/ar63.html (last visited Jan. 22, 2020). 199. US Business Cycle Expansion and Contractions, The Nat’l Bureau of Econ. Res. (April 23, 2012, 4:26 PM), https://www.nber.org/cycles/ US_Business_Cycle_Expansions_ and_Contractions_20120423.pdf. 200. Gregory N. Mankiw, Principles of Economics 70 (6th ed. 2012).

201. Id. 202. WIPO Data, supra note 190. 203. WIPO Data, supra note 190. 204. WIPO Data, supra note 190. 205. WIPO Data, supra note 190. 206. USPTO, supra note 55. 207. GIPC Index, supra note 5, at 35. 208. WIPO Data, supra note 188. 209. WIPO Data, supra note 190. 210. WIPO Data, supra note 190. 211. WIPO Data, supra note 190. 212. WIPO Data, supra note 190. 213. WIPO Data, supra note 190. 214. WIPO Data, supra note 190. 215. WIPO Data, supra note 190.

105

Currents 24.1 2020


Negotiating Under the New EU Copyright Directive 2019/790 and GDPR A D A M

F R E E L A N D

—————————————————

interest in promoting availability of content

Rightholders’ online content is derived from

I. Introduction

in digital form. To illustrate, Hollywood

a portion of Service Providers’ advertisement

—————————————————

Rightholders seek to expand protections,

2

revenue and from purchased or compulsory

Silicon Valley Service Providers seek to avoid

licenses. 6 Service Providers are keen on

the encroachment of copyright laws into

the evolution of technology, adapting

their business models,3 while academic and

business models to anticipate new uses of

scientific institutions advocate for Internet

the Internet as a delivery vehicle for content

freedom.

and improving content portability through

What value, contemplated by law, is owed to copyright owners (Rightholders) for the production of content in the digital age? One answer to that question is seemingly apparent. The European Parliament and

4

the Council of the European Union

What will happen to content creation

agreed to update protections for European

if either party gets their way? Online

Rightholders and journalists under new rules

accessibility of media and information is

to reinforce the interests of Internet users.1

a vital component of the Internet, and if

These changes impose affirmative obligations

the Service Provider wins out, there will

for online content-sharing service providers

be more content because of the continued

(Service Providers) having the net effect of

cost efficiency of their superior negotiating

transferring value from the Service Provider

position. If the Rightholder wins out, the

to the Rightholder, a clear indication that

Service Provider must license less content or

the European Union is expanding copyright

suffer a hit to the bottom line.

protections.

This Comment will examine the

The Service Provider invests heavily

European Union’s5 motives in addressing

into its online infrastructure, hiring skilled

the “value gap” between Service Providers

labor, acquiring the assets necessary to

and Rightholders in Part II; whether or not

create the digital market, and providing

the transparency solution to the “value gap”

the services and goods demanded by

is congruent with trade secret, copyright,

consumers—Service Providers deserve the

and data exchange regimes of law in Part III.

return produced by their efforts. On the

Finally, in Part IV, this Comment will assess

other hand, the Rightholder produced the

whether the new bargain mandated by the

work subject to copyright and introduced

Directive is palatable for global economies.

it to the proper channels for distribution,

—————————————————

with the expectation that only the approved

II. The “Value Gap”

channels distribute their work. Inevitably

—————————————————

what results is a competition between the

Most of the value generated by

interest in preventing infringement and the

106

Currents 24.1 2020

the creation of innovative devices to achieve sustainable growth in network size and value.7 Service Providers incentivize Rightholders to enter into licensing agreements by tailoring platforms to reproduce their content and providing essential infrastructure for user traffic, information accessibility, stability, and security. 8 Rightholders' uploaded works individually generate data that can be monetized from user traffic, but only the Service Providers posses or control such data as a result of website ownership. Therefore, Rightholders may only retrieve value from licenses and any secondary transaction arising out of monetized interactions with each website hosting its content. The EU has attributed the superior negotiating positions of Service Providers to the disparity in the respective values each party to each license receives.9 This bargaining disparity is what the EU seeks to rectify with its Directive on Copyright10 (Directive) by restraining Service Provider negotiating stature with affirmative and costly obligations. Under the Directive,


Rightholders will be able to claim additional

obligations arising out of the EU General

remuneration from Service Providers lawfully

Data Protection Regulations (GDPR),

exploiting Rightholders works when the

discussed below, must provide “adequate

remuneration originally agreed upon is

information” on how personal data is

“disproportionately low” compared to the

processed,

benefits derived by the Service Provider.

11

information on remuneration.18 The Directive

Exceptions to the “online content-sharing

qualifies the transparency requirement as “[s]

Service Provider” designation are entities

uch information . . . sufficiently specific

that are “not-for-profit online encyclopedias,

to provide enough transparency to [R]

not-for-profit educational and scientific

ightholders, without affecting business

repositories, open source software-developing

secrets,”19 but this is problematic for Service

and sharing platforms, providers of electronic

Providers that are unaware of their own

communication services,” such as Internet

business secrets, further discussed below.

access services, interpersonal communications

Member States are directed to several factors

services, and services which consist wholly of

to determine whether a Service Provider is

conveying signals for transmission “online

subject to transparency obligations, such as:

marketplaces, business-to-business cloud

the specificities of the content sectors; the

services[,] and cloud services that allow users

contribution of the authors or performers to

to upload content for their own use.”12

the overall work; and collective bargaining,

A.

Transparency Obligations

T h e p r o p o s a l f u r t h e r re q u i re s “transparency,” that Service Providers are to share with entitled Rightholders “information on the licensing and the distribution of

17

such as contact details and

to the extent it may be relevant in particular circumstances. Member States also have 20

discretion, “the option,” to provide for “further measures” to ensure transparency.21 B.

Monitoring Obligations

succeed, try, try again.” Under the Digital Millennium Copyright Act23 (DMCA) and its European counterpart, 24 Ser vice Providers are minimally incentivized, if at all, to sign fair licensing agreements with Rightholders. It follows then, that Service Providers further are uninterested in adherence to costly obligations to supply data—whether confidential in nature or perhaps even part of a larger trade secret information regime. DMCA and its equivalents only obligate Service Providers to remove infringing content when Rightholders ask them to do so.25 Therefore, the Directive should not be construed as granting any new rights to Rightholders, but as softening safe harbor immunities for Service Providers. 26 The problem presented by altering prevailing practice is that vast amounts of content originally generated through the current scheme now will be significantly restricted as the Service Providers must renegotiate all of their licenses with Rightholders.27 One potential consequence of restructuring?

remuneration” to other Rightholders.13

Further, Member States must consider

Under Article 19, such Rightholders also

several factors in determining whether the

have the right to receive such information

Service Provider generally prevented the

at least once a year14 and may insist on the

availability of unauthorized works (the

sufficiency of the information either directly

monitoring obligation), such as the size of

themselves or indirectly through Collective

the Internet company and the evolving state

Management Organizations or Member State

of the art as regards “suitable and effective

Union law.15 Sufficiency depends on the

means and their cost,” or similar technologies,

Rightholders’ ability to “assess the continued

including potential future technologies.22

economic value of [the] rights” in question,

Interestingly, the Directive does not seek to

and the information shared should be “recent

lead Member States to impose a “monitoring

data, relevant to the exploitation of the work

obligation” per se, as the negotiation of a

. . . and comprehensive in a way that it covers

license for all Service Provider hosted content

. . . all modes of exploitation and . . . all

is simply not economically feasible. Instead,

relevant revenues worldwide.”16

the approach the “monitoring obligation”

Due to these changes in the licensing

subscribes to seems to be “if at first you don’t

system, Service Providers, in an effort to

Service Providers with transparency

Service Providers—effectively in control of generally available content—may now change their default stance to restriction, unintentionally resulting in censorship of content that it would have otherwise made available had favorable licenses been negotiated.28 Service Providers may choose to start filtering all content to which “relevant and necessary”29 requests are directed without any effort directed at determining the scope of the rights and protections of the offensive material or the reach of the filtering processes implemented.30

107

Currents 24.1 2020


protect their business model, may opt to

This rule allows for the Rightholder to

specific measures utilized. Not all Service

make unlicensed content available, which

enjoin the Service Provider who “carries a

Providers are alike and will opt for measures

ordinarily would open them up to liability

third party’s infringement of a protected

proportionate to the resources allocable to

for unauthorized acts of communication to

work . . . in a network,” and block access of

its obligations.

the public.31 However, a Service Provider can

Service Provider’s customers to its website,

mitigate liability if it:

inasmuch as the site makes the unauthorized

1) makes best efforts to obtain an 32

authorization; 2) is in accordance with high industry standards of professional diligence, makes best efforts to ensure the unavailability of specific works for which the Rightholders have provided… relevant and necessary information; 3) acts expeditiously, upon receiving a sufficiently substantiated notice from the Rightholders to disable access to, or remove from their websites, the notified works; and

work available to the public.35 Thus, clearly the Directive’s goal is to maintain that the monitoring obligation is a creature of the judiciary.36

amount of value is now gushing out from the Service Provider and heading toward Rightholders. Add to this figure the costs

The inevitable result of monitoring

Rightholder-favored licenses, maintaining

high volume usage of a Service Provider’s

transparency obligations, and, potentially,

website–such that the unauthorized use of a

compliance with an injunction to implement

Rightholder’s content is both detected and

monitoring technology. In this light, Service

in fact taken down in every case—is the

Provider profit margins begin to shrink

implementation of filtering or surveillance

exponentially.

technology.

37

An affirmative monitoring

obligation would impose high development, maintenance, and reporting costs on Service

4) makes best efforts to prevent future

to large U.S.-based providers, strengthening

uploads.33

these firms’ market position and giving them

Privacy concerns abound with respect to

access to the behavior of EU users of Internet platforms.38

specifically, those unable to feasibly obtain

Critics of Article 17 posit that the Internet

authorizations for all uploaded content—

is subject to unprecedented transformation

now tasked with preventing access to and

from an open platform, for sharing and

future uploads of such content. The EU

innovation, into a tool for the automated

Court of Justice has addressed just this,

surveillance and control of its users, even

providing that Service Providers are to take

where no infringing material is uploaded.40

“all reasonable measures” and provided clear

Such filtering technologies have the potential

guidance for this standard: (i) the measures

to deprive users of First Amendment rights

should not unnecessarily deprive Internet

and enforcement exceptions to copyright

users “of the possibility of lawfully accessing

protection, such as the quotation right

the information available”; and (ii) the

and the right to parody.41 The monitoring

measures used “have the effect of preventing

obligation is not necessarily an affirmative

unauthorised access to the protected subject-

one, that is, courts must first make a case-

matter or, at least, of making it difficult to

by-case determination as to what a particular

achieve and of seriously discouraging Internet

Service Provider’s monitoring obligation is,

users who are using the services . . . from

without impermissibly intruding into the

39

accessing [unauthorized] subject-matter.”

34

108

Currents 24.1 2020

economics in this context. Seemingly, a vast

associated with higher remuneration through

Providers who will likely end up outsourcing

the efforts necessitated by Service Providers—

However, still looming is question of

C.

“Value Gap” in the U.S.

In the U.S., the “value gap” is directly addressed by DMCA, Congress’ response to the WIPO Copyright Treaty.42 As the WIPO Copyright Treaty is not self-executing, any additional obligations proposed by legislation enacted in Europe must be further promulgated by Congressional action.43 However, new legal regimes implemented by Congress could be characterized as a provocative signal directed at the EU.44 The Music Modernization Act45 (MMA), signed into law by President Trump on October 11, 2018, represents a win for Hollywoodrelated stakeholders. MMA seeks to benefit “songwriters, publishers, artists, record labels, digital services, libraries, and the public at large”46 by establishing “a new blanket license for digital music providers to engage in specific covered activities (namely, permanent downloads, limited downloads, and interactive streaming)” (or on-demand streaming).47 Significantly, MMA changed the manner for collecting and disbursing


mechanical royalties for musical works.

wide dissemination of their works.57 Thus,

ease with which data can be retrieved over

Specifically, the law contemplates use of the

in the “value gap” debate, the U.S. takes

the Internet, an unprecedented number

nonprofit “Music Licensing Collective”48 to

the view that the consequential value lost is

of individuals are appropriating data and

direct royalties from Service Providers to the

adequately compensated when exchanged

copyrighted works.61 Studies indicate that

proper owners, shifting the “reasonable costs”

for wide dissemination of the copyrighted

in the EU alone, there are over 460 million

of maintaining the collective to licensees.

49

work. On the contrary, the European view

Internet users, with nearly 4.075 billion

MMA changes rate-setting considerations

characterizes Rightholders as entitled to—

worldwide.62 Perhaps one explanation for

for the Copyright Royalty Board, requiring

in addition to the wide dissemination of

widespread usage of the Internet owes to

them to consider a “‘willing buyer, willing

the copyrighted works—higher royalties,

the nature of digital information technology

seller’ rate standard and is applicable to all

access to unique datasets, as well as Service

which allows for the easy replication and

licensees of musical works . . . .”50 The law

Providers’ affirmative obligation to monitor

transmittal of copyrighted works and other

51

also changes judicial oversight mechanisms.

and eliminate dissemination of unauthorized

information for multiple uses; provides for

These changes echo the Directive’s “value

works, to be undertaken as an expenditure of

the plasticity of digital media; yields both

gap” disparity concerns, offering in reply a

that particular Service Provider.

compactness and equivalence of works

number of creative solutions.

—————————————————

in digital form; and accommodates new

III. Obstacles Facing the Transparency Obligation

searching and linking functionality.63

—————————————————

streamlined both the reproduction

U.S. judicial rules of decision and § 512(a)

The “value gap” has proven to result

and distribution of copyrighted works.

would be eliminated as a form of safe harbor

in no more than a restructuring of the deal

Historically, copyrighted works were

protection, as discussed above.52 Importantly,

making process between Service Providers

mechanically reproduced and distributed,

a recent study of both the DMCA and

and Rightholders. The Service Provider

particularly after 1476 when, owing largely

developments in electronic commerce,

delivers infrastructure; collects, organizes, and

to William Caxton’s printing press, the

jointly conducted by the Copyright Office

evaluates dispersed information; facilitates

first large scale reproduction of written

and National Telecommunications &

social communication and information

materials was sent into motion.64 Subsequent

Information Administration, specifically

exchange; aggregates supply and demand

innovations streamlined the mechanical

contemplates whether the first sale

facilitates market processes; provides trust; and

printing process, such as Willis Carrier’s

doctrine retains applicability to the digital

accounts for the needs of both buyers or users

indoor cooling invention, reduced to practice

environment.53 The first sale doctrine urges

and sellers or advertisers. The Rightholder

on July 17, 1902.65 In essence, the Internet

consideration as to whether copyright

produces copyrightable expression, neither

has dramatically reduced reproduction and

holders have obtained the full value of their

insignificant nor inexpensive, otherwise

distribution costs, while simultaneously

works, as contemplated in the Copyright

presumably lawmakers would not create

enabling Service Providers to step into the

Clause of the Constitution. The Copyright

economic incentives.

role traditionally played by publishers.66

Clause memorializes the notion of a quid

Economic Theory dominates the modern

pro quo, or bargain, between society and

conception of the copyright regime in the

the creator, or writer.55 However, DMCA’s

digital information sphere, in that copyright

notice and takedown regime recognizes that

is a necessary system of incentives to prevent

Fair use presents the biggest challenge

copyright holders may decide to strike a

free riders from undermining the market

to Service Providers’ compliance with

deal with Service Providers,56 choosing to

in creative expression, notwithstanding

legislation seeking to address the “value gap”,

forego a portion of the value that they would

concerns for social costs. 60 Internet use

requiring the implementation of surveillance

normally be entitled to in exchange for the

is currently “ubiquitous” and, given the

technology. Fair use is a protection not

Clearly, DMCA is at odds with its newly minted European counterpart. In fact, the mere conduit ISP category articulated under

54

58

59

The Neoclassical

The Internet has simultaneously

A.

Copyright Law

i. Fair Use

109

Currents 24.1 2020


necessarily to the benefit of the Rightholder,

trusted to adjudicate human life, liberty,

or an equivalent international body,77 who,

extending to include third party usage of

and property interests? Service Providers

ideally, in turn charge the largest Service

copyrighted works, absent a license. The

are not in the position to administrate

Providers with the most market power with

protection operates to subject unlicensed

such outcomes without infringing on

the task of developing the standard-essential

use of copyrighted materials to a fair use

powers Article III specifically granted to the

patent (“SEP”) and the corresponding best

carve out, absolving such reuse for the

judiciary. A more appropriately designed

practices of such technology. For Service

purpose of parody, criticism, comment,

regime may entail company attorneys filing

Providers required to license an SEP to

educational purposes, scholarship, research,

A.I. determinations in court together with

comply with monitoring obligations or even

news reporting, or, depending on the subject

traditional pleadings; perhaps courts may

a court injunction, this ultimately presents

matter, adaptation.68

defer to such A.I. determination, provided

yet another added cost to be discussed in

the report is thorough and detailed in its

future negotiations.

67

Presently, upload filtering software is insufficiently sophisticated, in that it lacks the functionality to make fair use determinations. Moreover, the jury is still out as to whether non-human automation is capable of exercising human judgment.69 Invariably, a technological gap at this scale results

74

modus operandi. However, on appeal how will such deference be reviewed? By what means will parameters constraining the A.I. decision-making process be evaluated by judges at both the trial and appeals court level, particularly by those in possession of

in mass filtration of otherwise infringing

little or no understanding of A.I. processes?

content, deemed non-infringing by virtue

Clearly, the result—as Dick puts it—

of the application of fair use doctrine.70

may be the arbitrary retirement of an

“Implementation of that filtering system

essential carve out in copyright law, expressly

would require . . . active observation of files

provided for by both the Constitution

stored by users with the hosting [S]ervice

and Congress. Not only is A.I. technology

[P]rovider and would involve almost all of

not Voight-Kampff -ready, it is presently

the information thus stored . . . requiring

incapable of making fair use or status of

[the hosting Service Provider] to install the

work determinations (though the latter

contested filtering system would oblige it to

is a more feasible task with an automated

actively monitor almost all the data relating to

system). With large technological gaps

all of its service users in order to prevent any

come proportionately sizable price tags, a

future infringement of intellectual-property

pre-requisite in bridging the divide. While

rights.”

some companies are able to invest fully

71

Indeed, it is a frightening notion that, beyond constructs of Phillip K. Dick’s imagination, a real A.I. program could accurately mimic human judgment with a level of fidelity that does not deviate from human faculties.72 The Fourteenth Amendment73 requires that no state “deprive any person of life, liberty, or property without due process of law.” Can A.I. be

75

in such technology, others simply can or will not, consequently leading to increased disparities and differences between potential filtering technologies. Such non-uniformity in the determination of user rights under federal law is undesirable, if not outright intolerable. Therefore, any technological race to produce a viable A.I. filter inevitably falls under the purview of a standard determining organization76 (“SDO”), such as the FCC 110

Currents 24.1 2020

ii. Renegotiating Licenses Another obstacle to U.S. “value gap” legislation is the creation of a revocation right that goes beyond the rights contemplated in the Copyright Act. Section 203 of the 1976 Copyright Act78 provides authors the right to terminate copyright grants after a fixed number of years. If the author is deceased, the right extends to persons entitled to exercise more than 50% of the author’s termination interest, according to the order of priority set out in the statute.79 The termination right applies to grants executed by the author of the work after January 1, 1978.80 Termination may occur during a five-year window, beginning thirty-five years after execution of the grant, or, for publication, opening at the earlier of thirty-five years after publication or forty years after execution of the grant.81 The Directive entitles Rightholders to “revoke in whole or in part the license or the transfer of rights where there is a lack of exploitation of that work . . . .”82 The right of revocation by extension, grants a further right to renegotiate the preexisting license, in the sense that should negotiations fail the Rightholder is free to terminate.83 The Directive proposes a “mechanism for the revocation of rights that authors and


performers have transferred on an exclusive

author’s copyright is not surprising . . . and

in situations where the information does

basis.” Article 22 of the Directive provides

may seem unfair.”

not generally become known or readily

84

90

a guideline for Member States to craft

If the information is copyright protected,

specific provisions of revocation that take

it is unclear whether the Rightholder

into account “the specificities of the different

would have to pay a licensing fee to the

sectors and the different types of works and

Service Provider for use of the material for

performances . . . ,” and for joint works

economic exploitation, or whether outright

“the relative importance of the individual

sale of the information would suffice. This

contributions, and the legitimate interests

is a cost that would cut into Rightholders’

of all authors and performers affected by the

value proposition. One way around this is

application of the revocation mechanism by

for the Service Provider to limit the data

an individual author or performer.” Further,

in such a way that the data, as expressed

Article 22 provides that “revocation . . . can

to the Rightholder, does not amount to

only apply within a specific time frame,

a reproduction or derivative work of the

where such restriction is duly justified by the

protected data set. As discussed below, the

specificities of the sector or the type of work

Service Provider may insist on the transfer

or other subject matter concerned.”

of a data set that has been anonymized or

85

86

There has yet to be a threshold finding

altered in such a way as not to affect the

by any court clarifying which works are

Service Providers’ protected works and at the

deemed not adequately exploited, thus

same time comply with transfer obligations.

triggering the revocation right on preexisting licenses because the law does not go into effect until June 7, 2021, giving Members States two years to promulgate national law compliant with the Directive.87

B.

Trade Secret Law

ascertainable.93 Recital 68 of the Directive mandates that, when a company shares protected information with its Rightholders, the information be “sufficiently specific to provide enough transparency to [R] ightholders, without affecting business secrets.” 94 The Directive qualifies this statement about business secrets, asserting, “Service [P]roviders should, however, not be required to provide [R]ightholders with detailed and individualised information for each work or other subject matter identified.”95 By qualifying the statement about business secrets in this way, the Directive skirts the issue—Service Providers may inevitably disclose business secrets, merely replying “We told you not to.” Most businesses may not know what their business secrets are, and by the time they figure it out, the secrets will be in the hands of potential

Internet companies are successful in part

competitors, either as Rightholders or

because of the organization and specificity of

through Rightholders. Service Providers

data that their platforms produce. “Indeed,

must then have the capability beforehand to

rapid technological progress is likely to

iii. Data as an Original Work of

decide what expectation of confidentiality

permit economic use,” by allowing for

Authorship

to attaches to which sorts of information, a

monetization of both the data and creative

useful exercise, notwithstanding.

Under the Feist rule, a compilation of

content.91 EU Service Providers are entitled

data meets the requirements for an original

to trade secret protection for information

work of authorship and, thus, qualifies

that has commercial value because it is

for copyright protection if it features

secret, provided its owner takes reasonable

an original selection or arrangement of

steps to keep it secret.92 Such information

facts.88 However, the copyright is limited

has economic value, and may thus garner

to the particular selection or arrangement

trade secret protection, particularly where

of facts and not the facts themselves. 89

the information at issue is user preference

The facts can be copied at will. “Given

data, confidential information, or even

that copyright protection of a factual

copyrightable expression. When a Service

compilation is so thin, a competitor’s taking

Provider voluntarily shares such protected

the bulk of factual material from a preexisting

information, it risks waiving whatever trade

compilation without infringement of the

secrecy exists in such information, even

If Service Providers are to limit the data transferred to Rightholders under the protection of trade secrecy, Service Providers must perform a risk analysis, then address those risks with courts. Further, they must avoid ex post facto justifications and explanations for trade secret protections by showing affirmative measures generated from a conscious recognition and assessment of its data protection policies. They must be prepared to show what information specifically should be excludable from any transparency obligation.96 This reasonableness

111

Currents 24.1 2020


analysis should assess the costs and benefits of

and evaluate dispersed information; how

a pathway to avoid liability for infringement,

the security measures, from the perspective of

users are responding to the copyright and

to the extent they are equipped with robust

the Service Provider, as well as the nature of

other facilitations of social communication

data processing and transfer agreements.

the risks, such as the nature of the industry,

and information exchange; what market

The Directive provides that the “processing

the nature of the putative trade, the nature

processes the Service Provider is engaged

of personal data carried out within the

of the protective measures, and the known

in; and how the Rightholder can engage in

framework of this Directive shall be carried

risks associated with the chosen storage and

similar market processes with the exact same

out in compliance with Directive 2002/58/

protection methods.

data sets.

EC and Regulation (EU) 2016/679.” 104

97

Allocating such consumer information to Rightholders on the basis of compliance with transparency obligations is not only an errant attribution of the value sought by the Rightholder98 but may amount to a breach of confidence that each third party user has with the Service Provider absent any transfer agreement or consent requests that said consumer has with the Service Provider. Although end user agreements may be modified to contemplate this data exchange, the technology companies themselves face the problem of access that QSRSoft, Inc. faced with McDonald’s. McDonald’s attempted to eschew reliance on QSRSoft’s proprietary software by gaining access to QSRSoft’s system through a franchisee and used information obtained therein to develop its own similar service.99 By comparison, if the Rightholder develops its own service based on confidential information gleaned from the Service Provider, the proprietor of that information, then the Rightholder may ultimately supplant the Service Provider.100 While not all data will amount to a complete extrapolation of any given Service Provider’s business model, the data, as handed over, would lend tremendous value to Rightholders. The information would enable the Rightholder to capture details about the manipulation of its works on digital media; how other entities collect, organize,

101

C.

Data Privacy Law

As proposed, the Directive supports the notion that third-party personal data should be shared as a part of the value attributed to Rightholders and content producers, strengthening Rightholders’ negotiating position.102 Moreover, the General Data Protection Regulation is directly implicated in this query. In addressing the “value gap” problem, the extent to which Rightholders are entitled requested data sets in the Service Provider’s possession remains unclear. Any proposition of a law comparable to the Directive would be unsuccessful in the U.S., as such a grant to creators would be in excess of that which is contemplated by the Constitution—a power specifically delineated to Congress. Congressional deliberations reveal two questions relevant to ask in addressing that value:

data shall be processed “lawfully, fairly and in a transparent manner . . . collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes . . . ” sufficient or “adequate” to properly fulfill the stated purpose for collection, having a relational link or relevance to that purpose, and limited or not excessive “in relation to the purposes for which they are processed.”105 Further, Article 5 requires that personal data be accurate, up to date, and every reasonable step taken in furtherance of ensuring “erasure” of inaccurate data.106 Agreements for consumers’ personal data must reflect these requirements in the Service Provider’s performance provisions. Further, data transactions flowing out of the performance of transparency obligations owed to Rightholders must not be inconsistent with

First, how much will the legislation

contractual provisions concerning consumer

stimulate the producer and so

data subjects.

benefit the public; and, second, how much will the monopoly granted be detrimental to the public? The granting of such exclusive rights, under the proper terms and conditions, confers a benefit upon the public that outweighs the evils of the temporary monopoly.103

Where appropriate, GDPR instructs Service Providers to obtain consent from the consumer data subject before processing107 or collecting any personal data, instituting an “opt-in” regime.108 Recital 32 provides that consent is obtained by a “clear affirmative act establishing freely given, specific, informed and unambiguous indication of the data

Presently, contract law provides data

subject’s agreement to the processing of

controllers, processors, and Service Providers

personal data relating to him or her, such as

112

Currents 24.1 2020

Article 5 of the GDPR provides that personal


a written statement, including by electronic

hinder withdrawal of consent. More, consent

the Service Provider’s disclosure of such

means, or an oral statement.”

There are six

is not regarded as freely given if there is no

data subject’s information to a Rightholder,

legal bases that justify processing personal

“genuine or free choice” or the data subject

providing for, in turn, the Rightholder’s

data.110 Article 6 provides that processing

is “unable to refuse or withdraw consent

personal information.

shall be lawful only and to the extent at least

without detriment.”115 Consequently, this

one of the following applies:

paradox imposes a unique risk on Service

109

a) the data subject has given consent to the processing; b) p ro c e s s i n g i s n e c e s s a r y f o r performing a contract to which the data subject is a party . . . ;

Providers with business models reliant on consent alone as the legal basis for processing, as all downstream exchanges of the consumer data subject’s data will be at risk, subject to consumer whim, of losing the only basis that the exchange was predicated on. Further, a

c) p ro c e s s i n g i s n e c e s s a r y f o r

company cannot change the legal basis relied

compliance with a legal obligation to

upon once it represents to the consumer data

which the data controller is subject;

subject another such basis.116

The scope of the GDPR is limited to the processing of personal data; anonymous data is excluded, as data controllers are not required to “maintain, acquire, or process additional information in order to identify the data subject . . . .” 120 Heightened data exchanges as a result of statutory transparency obligations in turn contributes to the increased possibility that data from these transactions will be misallocated. Misallocation is one consequence, creating

d) processing is necessary in order to

Extrapolation of Service Providers’ use of

complications merely due to sheer volume.

protect vital interests of the data subject

consumer data for the purposes of fulfilling

Therefore, Service Providers may desire

or another natural person;

transparency obligations to Rightholders

a method of controlling data exchanges,

e) processing is necessary for the

or content producers multiplies the risk of

such as by reclassifying data according to its

performance of a task carried out in

potential misuse of sensitive personal data,

business needs.121

public interest or in the exercise of official

injects unpredictability into transactions, and

authority vested in the data controller;

disorients consumers’ privacy expectations

[or]

as well as any expectation of remedy.117 If

f ) processing is necessary for the purpose of the legitimate interest . . . .111 The six legal bases for processing personal data nearly mirror the legal bases for transfer of that data. 112 The Service Provider must determine its lawful basis before processing personal data and represent to the consumer data subject this reason in its notice. Furthermore, where processing is justified based on consent, the exchange of one’s personal information is further limited by specific requirements of notice and the manner of obtaining consent.113 Consent requests that do not conform to the Regulation are non-binding.114 Consent may also be withdrawn just as freely as it had been given and Service Providers may not

a Rightholder supplies copyrighted works with which the Service Provider then promulgates en masse, Service Providers are responsible to the Rightholder for the data relating to the subsequent access information by data subjects viewing the copyrighted work on Service Provider provided media. Regardless of the data’s form, Service Providers must give the data subject notice of the legal basis for collecting their personal information—an exercise of particular importance where the Service Provider’s website is free and accessible.118 Whether or not Service Providers are required by GDPR to reciprocate data accountability remains an open question. Specifically, this issue arises when providing a data subject, exercising the right of access,119 with information about

Moreover, Service Providers may find reclassification a desirable strategy in light of the fact that, for the purposes of liability, the distinction between data controller and data processor has been eliminated from the GDPR.122 As a result, Service Providers can no longer avoid liability by arguing that it was not the data controller. Because the risk a potential data breach carries is increased exponentially with the addition of every Rightholder entering the data queue under the Directive’s transparency obligations, Service Providers should contract for pseudonymized data sets as the data set contemplated in any transparency obligation with Rightholders.123 Furthermore, it is unclear what obligations attach to Rightholders receiving data in this capacity and how U.S. jurisdictions will interpret those obligations.124 Similarly,

113

Currents 24.1 2020


it remains unclear what obligations attach to

Rightholders. In that case, an opt-in, consent

data outright (as part of bridging the value

disclosees of Rightholders in connection with

dependent regime inevitably becomes a

gap) or perhaps grant data to the Service

the disposal—appropriately or otherwise—

thorny issue with respect to those data

Provider by nonexclusive license. There are

of such personal data. Both Rightholders

transfers explicitly provided for under the

many ways data can be chopped up and the

and Service Providers should enter into

Directive. Because of the EU’s opt-in,

contract controls. However, courts must be

negotiations with a heightened awareness of

consent-based regime, any data transfer

able to enforce the rights of the data subjects

the importance possessed by each data set

mandated by the Directive’s transparency

irrespective of how contracts handles such

involved in licensing obligations as well as

obligation creates opportunities for the

data. Data subjects who have previously given

voluntary transactions.

ownership of the data so transferred,

131

consent to Service Providers (who are in turn

in turn creating a dilemma in terms of

obligated by Article 19 to transfer over user

obligations owed to data subjects. That

data) that later revoke such consent must

is, what happens if a data subject revokes

have a pathway to prevent Service Providers

consent after a Rightholder, via a valid

and Rightholders from making productive

contract with the Service Provider, now

use of their data in the future. Withdrawn

owns the data? The Service Provider is

consent is, sensibly, then an issue that should

obligated to halt all productive use of the

be provided for in the agreement between

data based on their withdrawn consent.

the Service Provider and the Rightholder.

However, the Rightholder is under no

Further, counsel drafting such agreements

such obligation to halt productive use; the

may consider contemplating how disputes

Directive does not mention any obligations

over data that remains in use after consent

or duties owed to data subjects that would

is withdrawn on the front end. Counsel

attach to a Rightholder upon the transfer

should also try to clarify what the appropriate

of such data from a Service Provider.

indemnity obligations will be should GDPR

When a consumer data subject initially consents to their data’s usage, the result is the Service Provider is deemed to own that data, subject to the particular data subject’s control.125 A data subject then, ideally, will receive personal data given to a Service Provider in a “structured, commonly used, machine-readable and interoperable format,” and may dispose of his or her personal data however it pleases, perhaps to transmit the data to another controller.126 Where applicable, data subjects’ rights extend such that Service Providers should maintain their data in “interoperable formats that enable data portability.”127 Data portability, as the GDPR contemplates it, consists of the right to obtain a copy of a data subject’s data and the right to transmit data to another data controller.

128

However, some argue that

the “propertization” of data results in social harm.129 In this light, commodification of personal data may be viewed as akin with trading, exchanging, or even—depending on your viewpoint—as selling your soul to the

132

Data subjects further are entitled to the right to be forgotten, but the obligation to erase the data subject’s data is limited to Service Providers,133 as applied to data sets subject to control by the data subject, in an “interoperable format.” Subsequent control by the Rightholder thus does not amount to a personal data breach134 where the data set does not correspond to the data set within the control of a particular data subject.

noncompliance arise. One solution may be to employ protections for nonconsensual data processing which are capable of avoiding the consent issue altogether. A Service Provider may be protected where it needs to process data in accordance with its legal obligations.135 Thus, the Service Provider’s transparency obligation to the Rightholder licensing a particular protected work could operate as

proverbial devil, rather than propertization

Though the outcome depends on the

a work around to the intent of the consent-

as it is commonly understood, which grants

licensee-licensor character of the transaction

based regime.136 However, the data subject

rightful owners of personal data some flavor

between the Service Provider and the

remains free to object to the use of his or

of a property right, accompanied by the

Rightholder, nevertheless, such data is

her personal data and the Service Provider

characteristic power of exclusion.

in fact duplicated between two separate

will then need to establish a “legitimate

entities. The data could be licensed and,

interest [that] overrides the interests or the

perhaps, the license agreement may require

fundamental rights and freedoms of the data

that the Service Provider provide title to the

subject.”137 Seemingly then, so long as data

130

Service Providers may not always willingly provide pseudonymized data to

114

Currents 24.1 2020


has been put to productive use or made the

numbers beyond the allowable retention

directing a business engaging in the sale of

subject of a legal obligation, a data subject is

limit for such data.

Taxa also did not

information to third parties to halt such sale,

unprotected on the front end and forced to

properly anonymize its data, and, despite

with respect to personal information specific

seek remedy against use of his or her personal

deletion of customer names, information on

to that consumer.147 As defined, a “business”

data, with successful recovery hinging on

its systems could still be connected to data

subject to the regulation is a “legal entity that

their engagement in a quasi-philosophical

subjects through the undeleted telephone

is organized or operated for profit . . .”;- with

debate to determine whose interest is deemed

numbers. Thus, Taxa failed to prudently

annual gross revenues in excess of twenty-five

to be ordained.

operate within, and simultaneously breached,

million dollars; receives for its commercial

its performance provisions.

purposes, sells, or shares, for commercial

Where Service Providers’ practices do

145

146

not respect the rights of users, provisions

Clearly, Service Providers may use or sell

in Member States’ individual national laws

data outside the scope of the agreement with

must fill in the gaps and set forth judicial

the consumer data subject, notwithstanding

remedies and penalties.138 Otherwise, users

the applicable law in the Directive. Therefore,

may consent and revoke, or even give no

it is incumbent on Service Providers to

consent to the collection of their personal

establish the scope of the usage of the

information, much less read an online license

consumer’s data to include data transfers

agreement, privacy policy, or terms of use

in accordance with the Directive through

and still be bound to such terms.139 Website

conspicuous language in the terms and

proprietors, as well as Service Providers,

conditions of the agreement and narrowly

whose business traffics through their websites

tailor the grant of the Service Provider’s

utilize so-called browsewrap agreements to

rights to only the services performed. The

justify data collection of the user’s browsing

agreement should require an access control

activity on the website, with user consent

policy that restricts access to data on a

imputed merely by their use of the website.140

need-to-know basis and further provides

Several companies’ website data collection

that subsequent transfers of data, such as

practices are increasingly disputed, 141

to Rightsholders, will comply with such

with French courts willing to hold certain

access control. Further, consumer friendly

provisions of both Google and Twitter’s terms

agreements should include warranties

and conditions null and void.142 Additionally,

regarding GDPR compliance. Expedient

France imposed a 50 million euro fine on

fulfillment of transparency obligations also

Google for processing personal user data as to

necessitates contractual provisions which

use it to personalize advertisements based on

contemplate the location of company

a lack of transparency, inadequate provision

processors, data portability, subcontractors,

of information, and objections to the validity

and assignability.

of consent given.143

Beyond the European continent, GDPR

Service Provider performance failures

has also changed the landscape of privacy law

may similarly result in such hefty fines.144

in the U.S. Language utilized in the California

Denmark found that the company Taxa did

Consumer Privacy Act (CCPA) is similar to

not adhere to the GDPR’s data minimization

that in the GDPR, stating that California

principle, retaining personal telephone

residents may “opt out” of the status quo by

purposes, the personal information of 50,000 or more consumers, households, or devices; or- derives 50% or more in annual revenues from selling consumers’ personal information.148 The law grants residents certain rights against businesses that satisfy the statutory thresholds, similar to a “data processor” or “data controller,” as defined by GDPR, or “online content-sharing [S]ervice [P]rovider,” as defined by the Directive.149 Exploration or analysis of the operation of the opt-out regime, as it relates to the subject matter of this Comment, is not currently possible as the law does not go into effect until January 1, 2020. However, the inherent nature of an opt-out regime has resulted in Service Providers’ enjoyment of a head start in the processing of consumer data and, consequently, in converting such data sets into interoperable formats, anonymizing data, and otherwise producing unique datasets subject to copyright or trade secret protections, such that consumers will be unable to effectively claw much data back by the time individuals can effectively make opt-out declarations. The impact of GDPR is not limited to the confines of Californian borders. Aiming to prompt Congressional response, the U.S. Chamber of Commerce has published model privacy legislation.150 The proposal lays out several solutions emphasizing transparency

115

Currents 24.1 2020


in data collection and usage practices,

minted transparency, monitoring, and data

less than three years and which have an

data subject control achieved by an opt-

protection obligations that increase the cost

annual turnover below EUR 10 million .

out regime bearing similarity to CCPA, in

of doing business in the online-content

. . are limited to compliance with” making

addition to data security measures and FTC

market, may leverage such obligations and

best efforts to obtain authorization and to

enforcement.151 If adopted, the proposal

accompanying increased costs. This may be

“expeditiously” disable access to or remove

“will assist the privacy market by ensuring

sufficient to stop the wall of Rightholders

infringing websites “upon receiving a

that processes exist for the exchange of

advancing with open palms, as Service

sufficiently substantiated notice.”158 Service

data and for the detection of violations of

Providers may happily fill those palms with

Providers within the exceptions may have

privacy promises,”

utilizing a decentralized

“value gap” based solutions, while imposing

to demonstrate that they have made their

approach (or multiple smaller markets) that

certain contractual obligations of its own on

best efforts to prevent further uploads to the

enable individual enforcement by private

Rightholders.

notified works if unique viewers “exceed five

152

rights of action, as supplemented by the FTC’s ongoing role in policing privacy

The Service Provider is at an immediate

million.”159

disadvantage at the negotiating table as

A negotiating, for-profit Service Provider

both the transparency obligation and

should first determine if it falls within one

Under both the European and

Rightholder entitlement to additional,

of the exceptions of Article 3, 5, or 6. If it

Californian regimes, Service Providers cannot

appropriate, and fair remuneration may

does not, it should next take stock of its size

be liable to Rightholders for off-limits,

not be avoided by contract.

Article 23

and market share within certain sectors, as

uncollected personal data, such as where a

provides that “any contractual provision that

well as its user traffic data. A small Service

resident or data subject has respectively opted

prevents compliance with Articles 19, 20

Provider may be in a stronger negotiating

out of or failed to opt-in to the respective

and 21 shall be unenforceable.” Respectively,

position as against Rightholders, unable

regime of law by affirmative consent.

these Articles provide for the transparency

to browbeat such Service Providers with

The obligations of the GDPR and now

obligation, contract adjustment mechanisms

monitoring obligation concerns. A larger

promulgated CCPA should carry forward

for claiming additional remuneration from

Service Provider that wields fewer resources

when Rightholders receive transfers of data

Service Providers, and alternative dispute

than its competitors and cannot avoid

from Service Providers. Failure in this regard

resolution procedures. 155 There is only

monitoring obligations for unlicensed

must be regarded as a data breach. While

one other Article that restricts contractual

content will have to either adjust its bottom

the Directive provides all data processing is

exercises.

line or incur expenses in monitoring its

guarantees.153

to comply with GDPR, the extent to which this approach is useful in finding solutions to the “value gap” problem remains to be seen. —————————————————

IV. Summary and Remark —————————————————

154

156

Additionally, negotiation over the monitoring obligation favors the Rightholder, only because failure to come to a licensing agreement triggers the “monitoring obligation,” which amounts to a burden of proof that the Service Provider must

website for unauthorized content in order to meet the new safe-harbor standard. This may not provide leverage in a negotiation, as the Rightholder will insist that any monitoring obligation that the Member State has imposed which cannot be avoided due to its size is clearly a Service Provider obligation,

Importantly, observers should note that

satisfy should unauthorized content be

“value gap” legislation is less a mechanical

communicated to the public on its web

reconstruction of copyright law in Europe,

service. Depending on the Service Provider,

and more a rearrangement of the negotiation

however, the monitoring obligation may

stage as to content either party can prepare

not apply or may not apply for certain

to monetize upon. In one corner, the

elements.

New Service Providers with

of a bad deal for the Service Provider. The

Service Provider, armed with newly

services available to the Union public “for

Service Provider may require a warranty from

157

116

Currents 24.1 2020

and passing on the costs of the obligation in exchange for an increased royalty would defeat the spirit of the “value gap.” There are some points of egress out


the Rightholder that it will comply with

data. This kind of information falls within

the Service Provider imposes obligations on

GDPR by securing data, giving notification

the definition of trade secret,

and the

the Rightholder to create complementary

upon data breach, and maintaining an

Service Provider is well within its right to

software for surveillance of the web services

information security policy. Such security

either bind the Rightholder to confidentiality

in order to establish that the duty to police

policy may include a provision that binds

in the license. In exchange the Rightholder

infringement rests with the Rightholder,

the Rightholder to default rules about data-

would agree to a reduced value for its content

not the Service Provider. In exchange, the

processing practices that permit transfers

or limit the disclosure of this information

Rightholder may be permitted to compile

for an initial category of use of personal

so that its business model may not be

data that would otherwise be supplied by

data, but only if the data subject is granted

inadvertently misappropriated.

the Service Provider under the transparency

164

165

obligation or the Service Provider may

an opportunity to block the Rightholder’s

Recital 4 explains that “[i]nnovative

further transfer or use by unaffiliated

businesses are increasingly exposed to

entities.

The Service Provider should

dishonest practices aimed at misappropriating

negotiate a provision where the Rightholder

trade secrets, such as theft, unauthori[z]

agrees to indemnify it for all actionable injury

ed copying, economic espionage or the

relating to data breaches arising out of the

breach of confidentiality . . . globalization,

Rightholder sharing data received under a

increased outsourcing, longer supply chains,

transparency obligation to a bad actor. The

and the increased use of information and

parties should agree to liquidated damages

communication technology contribute to

because the higher damages implicated

increasing the risk of those practices.”166 It is

One potential positive is that Service

under this approach encourage companies

within the realm of possibility that a so-called

Providers will readdress their business models,

to keep their privacy promises and overcome

Rightholder would provide a Service Provider

leading to further innovation. Another

collective action problems from data subjects

with a content license, and the content

benefit is that many Service Providers will

whose individual costs for privacy violations

provided has the content smell to it, but

probe the niche content market for revenue

may be too low to follow through on any

when all is said and done, the Rightholder

streams169 and become specialists in this way,

claim. 161 The Service Provider may also

just wanted the Service Provider’s raw data

opening up opportunities for previously

impose limitations on the its right to alienate

for building out its own similar online

untapped content producers to enter the

such information by negotiating a combined

content service. This is similar to the case in

market. The downside is that only the biggest

use-transfer restriction that follows the

QSRSoft. Any unlawful acquisition in this

firms that can afford to license generally will

personal information through downstream

way “compromises legitimate trade secret

continue to dominate the market.

transfers.162

holders’ ability to obtain first-mover returns

—————————————————

160

Data exchanges under transparency

from their innovation-related efforts.”167

part with data it has compiled in this way. So long as the license does not allow the Service Provider to avoid the obligation of transparency,168 contract law allows for this kind of flexibility in performance. The EU legislation may provide for the conditions that put the two sides at the negotiating table with provisions to talk about.

V. Conclusion

The Directive does not mandate

—————————————————

particularly given the fact that

disclosure of a Service Provider’s trade secret

Several legal regimes must weigh in

Rightholders expect certain information

or confidential information to Rightholders.

as to comprehensively address the “value

from Service Providers, which amounts to

However, it seems that the purpose is to create

gap” proposal. Copyright protection for

an extrapolation of the Service Provider’s

a legal framework that incentivizes Service

compilations, trade secrets, and confidential

business model. Even just a peek at any

Providers to part with valuable consumer data

information will limit the data that a

of the accumulated data derived from the

by layering costs on Service Providers that are

Rightholder should expect to receive under

exploitation of the Rightholder’s content

only alleviated at the negotiating table with

transparency obligations. In addition,

provides greater context as to how Service

Rightholders. It may be under a contract that

copyright law carve outs, such as fair use, will

obligations will surely be challenging to negotiate,

163

Providers collect, process, and reorganize 117

Currents 24.1 2020


necessarily restrict the measures that Service Providers may pursue when complying with monitoring obligations. Data protection laws will necessarily limit the availability of consumer data that the Service Provider may legally transfer to the Rightholder, and at the same time, limit what consumers can claw back. Further, considerable cost-shifting onto Service Providers will take place in light of the fact that license renegotiations will come at a tremendous price. Transparency and monitoring obligations will surely cut into the Service Provider business models and limit what content they are able to provide. How Service Providers will mitigate against these costs and compel other parties to share in them still remains to be seen. It is incumbent on all parties involved– whether the Service Provider, the Rightholder, or the data subject–to clearly delineate their proposed obligations, specify to which data sets those obligations attach, and firmly establish at the outset of negotiations what each parties’ purpose is. No party should fear setting the agenda. As with all negotiations, preparation is key. Thus, each party should enter into the bargain with a clear understanding both of their own objectives as well as their opponent’s, as to avoid negotiating from the other side’s agenda.

118

Currents 24.1 2020


End Notes 1. P r e s s R e l e a s e , E u r o p e a n Commission, Digital Single Mark: EU Negotiators Reach a Breakthrough to Mondernise Copyright Rules (Feb. 13, 2019), http://europa.eu/rapid/ press-release_IP-19-528_ en.htm [hereinafter European Commission Press Release]. 2. Bill D. Herman, The Fight over Digital Rights: The Politics of Copyright and Technology, 7–10 (2013) (“[The] debate boils down to . . . how best to balance the interests of a diverse set of constituencies. . . . By the late 1990s, policymakers and media industry advocates were expressing particular concern about the possibility that the Internet would enable infringement. Yet the laws they passed in response to this concern failed to stop widespread online infringement . . . .”). 3. Id. at 211–2 (emphasizing the “bottom line” motivations behind all business decisions). 4. Id. at 8. 5. Se e R a i n e r Ba u b ö c k , W h y European Citizenship? Normative Approaches to Supranational Union, 8 Theoretical Inquiries in Law 453, 455–7 (2007) (explaining that the European Union is known as a “supranational organization,” a decisional body not entirely dependent on the cooperation of its Member States, and has the power to make decisions binding on Member States and its members, with the power to enforce such decisions). 6. Comcast Corp., Economic Analysis of the Effect of the Comcast-TWC Transaction on Broadband: Reply to Commenters (Form S-4), at 8–10, 19 (Sept. 22, 2014) (citing companies with a fundamental part of their business in multibillion dollar ad revenue as well as citing licensing expenses); see also OECD, Copyright in the Digital Era: Country Studies, in Enquiries Into Intellectual Property’s Economic Impact 209 (2015) [hereinafter OECD, Copyright in the Digital Era]. 7. OECD, Copyright in the Digital Era, supra note 6, at 212; see also OECD, The Economic and Social Role of Internet Intermediaries 18 (2010), https://www.oecd.org/internet/ ieconomy/44949023.pdf [hereinafter OECD Internet Intermediaries]. 8. O E C D I n t e r n e t

Intermediaries, supra note 7, at 5. 9. See European Parliament Press Release, Agreement Reached on Digital Copyright Rules (Feb. 13, 2019), http://www. europarl.europa.eu/news/en/ press-room/20190212IPR26152/ agreement-reached-on-digitalcopyright-rules [hereinafter European Parliament Press Release] (“[I]nternet companies have little incentive to sign fair licensing agreements with rights holders, because they are not considered liable for the content that their users upload. They are only obliged to remove infringing content when a rights holder asks them to do so. However, this is cumbersome for rights holders and does not guarantee them a fair revenue.”). 10. Directive 2019/790, of the European Parliament and of the Council of 17 April 2019 on Copyright and Related Rights in the Digital Single Market and Amending Directives 96/9/ EC and 2001/29/EC, 2019 O.J. (L 130) 92, 99, 107, 125 (published in the Official Journal of the European Union on May 17, 2019)[hereinafter Directive 2019/790] (Article 31 provides the “Directive shall enter into force on the twentieth day following that of its publication in the Official Journal,” which means the Directive will enter into force June 7, 2019. Article 29 provides that Member States have two years from June 7, 2019 to “bring into force the laws . . . necessary to comply with [the] Directive.”). 11. Id. at 122. 12. Id. at 113. 13. Id. at 102. 14. Id. at 121. 15. Id. at 105, 121–2. 16. Id. at 109-110. 17. Id. at 108 (“[S]ervice Providers should be transparent with rightholders with regard to the steps taken in the context of cooperation.”). 18. Id. at 110. 19. Id. at 108. 20. Id. at 110. 21. Id. 22. Id. at 107; see also id. at 120 (providing a metric for whether or not the Service Provider has complied with its monitoring obligations). 23. See 17 U.S.C. § 512 (2018) (naming one of the sections that

the Act added or amended). 24. See Directive 2000/31/EC, of the European Parliament and of the Council of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular Electronic Commerce, in the Internal Market, 2000 O.J. (L 178) 1 [hereinafter Directive 2000/31]. 25. 17 U.S.C. § 512(b)(2)(E). 26. European Parliament Press Release, supra note 9. 27. Dirk Visser, Trying to Understand Article 13, at 10 (SSRN, Working Paper, 2019), https://papers.ssrn. com/sol3/papers.cfm?abstract_ id=3354494. 28. EU Copyright Reform/Expansion - Article 13 Upload Filters, Julia Reda (Feb. 6, 2019), https:// juliareda.eu/eu-copyright-reform/ censorship-machines/ [hereinafter Julia Reda]; Article 13 is now Article 17. Sophie Goossens, Article 13 (now Article 17) of the new EU Copyright Directive: what you need to know, Reed Smith (Apr. 5, 2019) https://www.reedsmith. com/en/perspectives/2019/04/ article-13-now-article-17-of-thenew-eu-copyright-directive. 29. Directive 2019/790, supra note 10, at 120 (demonstrating that it has “made . . . best efforts to ensure the unavailability of specific works... for which the rightholders have provided the service providers with the relevant and necessary information . . .”). 30. Visser, supra note 27, at 10. 31. See Directive 2019/790, supra note 10, at 106. 32. See Eleonora Rosati, DSM Directive Series #5: Does the DSM Directive Mean the Same Thing in All Language Versions? The Case of ‘Best Efforts’ in Article 17(4)(a), The IPKat (May 22, 2019), http:// ipkitten.blogspot.com/2019/05/ dsm-directive-series-5-does-dsm. html (detailing how the “best efforts” obligation is mistranslated into different language versions that will result in challenges for judiciary and the application of resulting national provisions). 33. Directive 2019/790, supra note 10, at 120 (emphasis added). 34. Case C-314/12, UPC Telekabel Wien GmbH v. Constantin Film Verleih GmbH, 2014 E.C.L.I. 192 (holding that an injunction may impose an obligation to measures that come at significant expense, have considerable impact on the organization of activities,

or require difficult and complex technical solutions, so long as the injunction leaves the Service Provider free to determine the specific measures, provided those measures are reasonable). 35. Directive 2001/29/EC, of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, 2001 O.J. (L 167) 10, 15 [hereinafter Directive 2001/29]. 36. See Directive 2019/790, supra note 10, at 107, 120 (Article 17 and Recital 66 provides that there is not a general monitoring obligation, leaving the determination up to Member States). 37. LibertiesEU, Article 13 Open Letter – Monitoring and Filtering of Internet Content is Unacceptable, Liberties (Oct. 16, 2017), https://www.liberties.eu/en/ news/delete-article-thirteen-openletter/13194; see also Julia Reda, supra note 28. 38. Julia Reda, supra note 28. 39. Julia Reda, supra note 28. 40. Martin Senftleben, Christina Angelopoulos, Giancarlo Frosio, Valentina Moscon, Miquel Peguera & Ole-Andreas Rognstad, The Recommendation on Measures to Safeguard Fundamental Rights and the Open Internet in the Framework of the EU Copyright Reform, 40 Eur. Intell. Prop. Rev. 149, 149 (2017), https://papers.ssrn. com/sol3/papers.cfm?abstract_ id=3054967. 41. Id.; see also Directive 2001/29, supra note 35, at 17 (Article 5(3) (d) & (k)). 42. For the U.S., see U.S. Copyright Office, DMCA Section 104 Report: A Report on the Register of Copyrights Pursuant to § 104 of the Digital Millennium Copyright Act 8–9 (2001) https://www. copyright.gov/reports/studies/ dmca/sec-104-report-vol-1.pdf [hereinafter DMCA Section 104 Report]; for EU, see Directive 2001/29, supra note 35 at 10–11. 43. Berne Convention Implementation Act of 1988, Pub. L. 100-568, 102 Stat. 2853 (1988). 44. S. Rep. No. 115-339, at 2 (2018) (“Music copyright and licensing laws are too difficult to comply with and do not adequately reward the artists and professionals . . . .”). The use of this language mirrors the language used to justify Directive

119

Currents 24.1 2020


45.

46.

47.

48.

49.

50. 51.

52.

53.

2019/790. Compare Directive 2019/790, supra note 10, at 122 (“Member states shall ensure that . . . authors and performers or their representatives are entitled to claim additional, appropriate and fair remuneration from the party with whom they entered into a contract for the exploitation of their rights . . . when the remuneration originally agreed turns out to be disproportionately low compared to all the subsequent relevant revenues derived from the exploitation of the works or performances.”). Orrin G. Hatch—Bob Goodlatte Music Modernization Act, Pub. L. No. 115-264, § 132 Stat. 3676 (2018) (replacing 17 U.S.C. § 301(c) and codifying law at 17 U.S.C. § 1401(e)). U.S. Copyright Office, The Orrin G. Hatch—Bob Goodlatte Music Modernization Act, https:// w w w. c o p y r i g h t . g ov / m u s i c modernization/mma-pamphlet. pdf (last visited Oct. 24, 2019). Marsha Ajhar, Music to Our Ears: The Music Modernization Act of 2018 Smith, Gambrell, & Russel, LLP, https://www.sgrlaw. com/music-to-our-ears-the-musicmodernization-act-of-2018/ (last visited Oct. 24, 2019) [hereinafter Music to Our Ears]. Allen Bargfrede, The MMA and EU Copyright Reform Are Charging Ahead. What Will Be Their Impact? Medium (Oct. 5, 2018), https:// medium.com/verifimedia/themma-and-eu-copyright-reformare-charging-ahead-what-will-betheir-impact-407e79f70da4. S. Rep. No. 115-339, at 6 (2018) (reasoning “licensees benefit most from the reduction in transaction costs” and thus should bear the “reasonable costs”). Music to Our Ears, supra note, 47. Music to Our Ears, supra note, 47. (“The legislation also modifies the process for selecting federal district court judges to adjudicate rate-setting disputes regarding performance rights organizations that are subject to consent decrees with the Department of Justice.”). Directive 2019/790, supra note 10, at 95 (explaining Rightholders are entitled to “proportionate” measures “necessary to pursue the objective of ensuring the security and integrity of the system” based on information provided by Rightholders). U.S. Copyright Office, Joint Study of Section 1201(g) of the Digital Millennium Copyright Act, https://www.copyright.gov/ reports/studies/dmca_report.html

(last visited Dec. 8, 2019). 54. Kirtsaeng v. John Wiley & Sons, Inc., 568 U.S. 519, 535 (1984). 55. Kewanee v. Bicron, 416 U.S. 470, 484–87 (1974). 56. Dep’t Com. Internet Pol’y Task Force, Department of Commerce: Copyright Policy, Creativity, and Innovation in the Digital Economy, 29 (2013), https://www.uspto. gov/sites/default/files/news/ publications/copyrightgreenpaper. pdf (“[L]icensing mechanisms have been developed as a less risky alternative to relying on fair use.”). 57. See OECD, Copyright in the Digital Era, supra note 6, at 214 (“[D] igital technology greatly reduces the cost of copying, distributing, and transforming content, which has led to the availability of more copyrighted content and much wider usage of it than ever before . . . .”). 58. O E C D , Internet Intermediaries, supra note 7, at 6. 59. Craig Joyce et al., Copyright Law 49 (10th ed. 2016); see also Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156 (1975) (“The immediate effect of our copyright law is to secure a fair return for an author’s creative labor. But the ultimate aim is, by this incentive, to stimulate artistic creativity for the general public good.”). 60. Trotter Hardy, Property (and Copyright) in Cyberspace, 1996 U. Chi. Leg. F. 217, 217 (1996), https://chicagounbound. uchicago.edu/cgi/viewcontent. cgi?article=1205&context=uclf (“If a new idea is freely appropriable by all, if there exist communal rights to new ideas, incentives for developing such ideas will be lacking.”). 61. Joyce et al., supra note 59, at 40. 62. Internet Usage in the European Union, Internet World Stats, https://www.internetworldstats. com/stats9.htm (last visited Nov. 8, 2019). 63. Pamela Samuelson, Digital Media and the Changing Face of Intellectual Property Law, 16 Rutgers Computer & Tech. L. J. 323 (1990). 64. Joyce et al., supra note 59, at 15. 65. The Invention that Changed the World, Carrier, http://www. williscarrier.com/1876-1902.php (last visited Nov. 20, 2019). 66. Amazon (company), Wikipedia, https://en.wikipedia.org/wiki/ Amazon_(company) (last updated Nov. 18, 2019). 67. Sony Corp. of Am. v. Universal

City Studios, Inc., 464 U.S. 417, 443 (1984) (“[A]nyone who . . . makes a fair use of the work is not an infringer of the copyright with respect to such use.”); Lenz v. Universal Music Corp., 801 F.3d 1126, 1133 (9th Cir. 2015) (stating that fair use is not merely a defense to infringement, but is an expressly authorized right, and an exception to the exclusive rights granted to the author of a creative work.). 68. 17 U.S.C. § 107 (2018). 69. Giancarlo Frosio, To Filter or Not to Filter? That is the Question in the EU Copyright Reform, 36 Cardozo Arts & Entm’t L. J. 331, 357 (2018), https://papers.ssrn. com/sol3/papers.cfm?abstract_ id=3058680 (“Automated systems cannot replace human judgment that should flag a certain use as fair or falling within the scope of an exception or limitation.”). See also, Updates to our manual Content ID claiming policies, Yo u Tu b e h t t p s : / / y o u t u b e creators.googleblog.com/2019/08/ updates-to-manual-claimingpolicies.html [https://perma.cc/ W2DN-S5KM] (last visited Oct. 18, 2019) (describing YouTube’s change to their manual claiming policies “to improve fairness in the creator ecosystem, while still respecting copyright owners’ rights to prevent unlicensed use of their content . . .”). 70. Frosio, supra note 69, at 348. 71. C a s e C - 3 6 0 / 1 0 , B e l g i s c h e Ve r e n i g i n g v a n A u t e u r s , Componisten en Uitgevers CVBA (SABAM) v. Netlog NV, 2012 E.C.R. 85, at §§ 36–38 (emphasis added). 72. Indeed, it is axiomatic to say that initial determinations could be made by A.I., but the ultimate fair use question must be decided by a human. See generally Jonathan P. Osha, et al., 2019 – Study Question – Copyright/Data Copyright in Artificially Generated Works, AIPPI (2019), https://aippi.org/ wp-content/uploads/2019/08/ SummaryReport_COPYRIGHTD ATA _ L o n d o n 2 0 1 9 _ final_160719.pdf (discussing how human intervention is still necessary for A.I.-generated works to be eligible for copyright protection). 73. U.S. Const. amend. XIV, § 1. 74. The most appropriate regime is through Congress, which must delegate “intelligible principles” of administration of these claims to the Copyright Office, creating a new agency department within that Office that may adjudicate 120

Currents 24.1 2020

75.

76.

77.

78. 79. 80.

81. 82. 83. 84. 85. 86. 87. 88.

such claims. See U.S. Const. art. I, § 1 (providing the Constitutional basis for non-delegation); see also 35 U.S.C. § 134(a) (2012) (providing the procedure for adjudicating claims to rights in patents); see also 35 U.S.C. § 144 (2012) (providing the appropriate procedural safeguards such that delegation of adjudication of patent rights to the USPTO does not violate the non-delegation doctrine). The Voight-Kampff test, in Phillip K. Dick’s novel Do Androids Dream of Electric Sheep, was used by LAPD’s “Blade Runners” to test whether an individual was an android “replicant” or human. Victor Gomes, The Science Behind “Blade Runner”’s Voight-Kampff Test, Nautilus (Oct. 6, 2017), http://nautil.us/blog/the-sciencebehind-blade-runners-voight_ kampff-test [https://perma.cc/ J62R-3J43]. Broadcom Corp. v. Qualcomm Inc., 501 F.3d 297, 303 (3rd Cir. 2007) (discussing what role a standard determining organization plays in the development of industry standard technology), Ericsson, Inc. v. D-Link Sys. Inc., 773 F.3d 1201, 1209 (Fed. Cir. 2014) (discussing standard essential patents are patents used by the general public because the collaborative efforts to create standards requires devices utilize specific technology). Se e Br o a d c o m C o r p. , 5 0 1 F.3d at 304 (“[T]he European Telecommunications Standards Institute . . . and its SDO counterparts in the United States . . . requires a commitment from vendors whose technologies are included in standards to license their technologies on fair, reasonable, and nondiscriminator y (“FRAND”) terms.”). 17 U.S.C. § 203(a)(3) (2018). Id. at § 203(a)(1)-(2). 17 U.S.C. § 304(c) (2018) (providing for termination rights for author grants made before January 1, 1978). 17 U.S.C. § 203(a)(3) (2018). Directive 2019/790, supra note 10, at 122. See 17. U.S.C. § 203 (2012). Directive 2019/790, supra note 10, at 93. Directive 2019/790, supra note 10, at 122. Directive 2019/790, supra note 10, at 122. Directive 2019/790, supra note 10, at 125. Feist Publ’ns, Inc. v. Rural Tel.


89. 90. 91.

92.

93.

94. 95. 96.

97. 98.

Serv. Co., 499 U.S. 340, 349–50 (1991). Id. BellSouth Adver. & Publ. Corp. v. Donnelley Info. Publ., Inc., 999 F.2d 1436, 1445 (11th Cir. 1993). OECD, Copyright in the Digital Era, supra note 6, at 213-14 (“[S]ome analysed economies (the European Union, and consequently the United Kingdom, Italy, and Poland) have also introduced additional legislation to cover noncreative databases that is intended to strengthen the rights of database creators.”). Directive 2016/943, of the European Parliament and of the Council of 8 June 2016 on the Protection of Undisclosed Knowhow and Business Information (Trade Secrets) Against Their Unlawful Acquisition, Use and Disclosure, 2016 O.J. (L 157) 1, 9 [hereinafter Directive 2016/943]. See Daniels Health Scis., LLC v. Vascular Health Scis., LLC, 710 F.3d 579, 583–84 (5th Cir. 2013) (determining compilation of research data used to produce drug met the standard for trade secret protection); see generally Rohm & Haas Co. v. ADCO Chem. Co., 689 F.2d 424, 433 (3rd Cir. 1982); see also Brocade Commc’ns. Sys. v. A10 Networks, Inc., 873 F. Supp. 2d 1192, 1215 (N.D. Cal. 2012) (determining combination of customer names together with information such as the customer’s buying patterns and product needs met standard for trade secret protection); see Edgenet, Inc. v. GS1, AISBL, 742 F. Supp. 2d 997, 1026–27 (E.D. Wis. 2010) (determining compilation of publicly available product data protectable as trade secret where categories used to organize the data were not publicly available and could not be recreated without extensive effort and investment). Directive 2019/790, supra note 10, at 108. Directive 2019/790, supra note 10, at 108. Elizabeth A. Rowe, Contributory Negligence, Technology and Trade Secrets, 17 Geo. Mason L. Rev. 1, 12–13, 27–29 (2009). Id. at 29. See Amazon.com LLC v. Lay, 758 F. Supp. 2d 1154, 1170–72 (W.D. Wash. 2010) (agreeing that complying with the North Carolina Department of Revenue’s request to disclose one data set containing names, addresses, and detailed descriptions of the products ordered by each Amazon

customer, in addition to disclosure of another data set containing product code numbers, order ID numbers, seller, ship-to-city, county, postal code, non-taxable amount of purchase, and tax audit record ID info, would violate the VPPA, legislation aimed to protect intellectual privacy); id. at 1163 (concluding that the disclosure of the “reading, watching, and listening habits poses an imminent threat of harm and chill to the exercise of First Amendment rights.”). 99. QSRSoft, Inc. v. Rest. Tech., Inc., No. 06 C 2734, 2006 U.S. Dist. LEXIS 76120, at *4–5 (N.D. Ill. Oct. 19, 2006). 100. See Amazon (company), supra note 66 (explaining how publishing companies could recapture market share). 101. O E C D I n t e r n e t Intermediaries, supra note 7, at 6 (discussing how Service Providers capitalize on hosted content). 102. See European Parliament Press Release, supra note 9. 103. H.R. Rep. No. 60-2222, at 7 (1909). 104. Directive 2019/790, supra note 10, at 124. 105. Regulation 2016/679, of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/ EC, 2016 O.J. (L 119) 1, 35 [hereinafter Regulation 2016/679] (GDPR went into effect on May 25, 2018). 106. Id. 107. Id. at 31–33 (providing for Article 4(2) which defines “processing” as “any operation or set of operations which is performed on personal data or on sets of personal data whether or not by automated means such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or other wise making available, alignment, or combination, restriction, erasure or destruction . . . .”). 108. Sarah Hospelhorn, California Consumer Privacy Act (CCPA) vs. GDPR, Varonis (Nov. 5, 2018), https://www.varonis.com/ blog/ccpa-vs-gdpr/#; see also Regulation 2016/679, supra note 104, at 6 (Recital 32 provides that consent is obtained by a “clear affirmative act establishing freely given, specific, informed

and unambiguous indication of the data subject’s agreement to processing of personal data relating to him or her, such as a written statement . . . by electronic means, or an oral statement.”). 109. Regulation 2016/679, supra note 104, at 6. 110. Regulation 2016/679, supra note 104, at 36. 111. Regulation 2016/679, supra note 104, at 36; see Regulation 2016/679, supra note 104, at 9 (Recitals 47 and 48 explain the “overriding legitimate interest.”). 112. Regulation 2016/679, supra note 104, at 64 (providing for Article 49 which addresses specific situations in which a data transfer is legally justified where conditions giving rise to an adequacy decision pursuant to Article 45(3) or appropriate safeguards pursuant to Article 46 are not met). 113. Regulation 2016/679, supra note 104, at 8 (providing for Recital 42 which conditions data control on consent requests in an “intelligible and easily accessible form, using clear and plain language,” containing no “unfair terms.”). 114. Regulation 2016/679, supra note 104, at 37. 115. Regulation 2016/679, supra note 104, at 8 (Recital 42 explains where consent is a condition of using the service the court should be wary of finding that consent was “freely given.”). 116. ICO, Guide to the General Data Protection Regulation 55 (GDPR) (Aug. 2, 2018), https://ico.org.uk/media/ for-organisations/guide-tothe-general-data-protectionregulation-gdpr-1-0.pdf [hereinafter ICO Guide to GDPR]. 117. See Chiara Giorgetti, Rethinking the Individual in International Law, 22 Lewis & Clark L. Rev. 1085, 1111–16 (2019) (discussing the international approach to standing and enforcement of individual rights internationally). 118. E.g. YouTube, https://www. youtube.com/about/press/ (last visited Nov. 15, 2019) (providing that users watch one billion hours of copyright subject matter daily and, thus, YouTube collects massive amounts of personal information daily). 119. ICO Guide to GDPR, supra note 115, at 100, 105 (providing individuals can make a request verbally or in writing and the Service Provider has one month to comply; this one-month period may be extended by a further two months).

120. Regulation 2016/679, supra note 104, at 39; see also, Regulation 2016/679, supra note 104, at 32 (“This Regulation . . . [applies] . . . to the processing of personal data . . . .”); see also, Regulation 2016/679, supra note 104, at 33 (“[A]ny information relating to an identified or identifiable natural person.”). 121. Regulation 2016/679, supra note 104, at 5 (“The application of pseudonymisation to personal data can reduce the risks to the data subjects concerned and help controllers and processors to meet their data-protection obligations.”). 122. Regulation 2016/679, supra note 104, at 3 (providing for Recital 13 which sets out the policy of ensuring a “consistent level of protection for natural persons . . . [and] provid[ing] legal certainty and transparency for economic operators . . . and to provide natural persons . . . with the same level of legally enforceable rights and obligation and responsibilities for controllers and processors . . . ”). 123. Inge Graef, Martin Husovec & Nadezhda Purtova, Data Portability and Data Control: Lessons for an Emerging Concept in EU Law, 19 German L.J. 1359, 1371-72 (2018) [hereinafter Data Portability] (“[C]ontrollers [may] opt for processing pseudonymized datasets to avoid the obligations of data portability when they are unwilling to share—for instance to preserve their unique datasets.”). 124. 16 C.F.R. § 682.3(a) (2018) (“Any person who maintains or otherwise possesses consumer information for a business purpose must properly dispose of such information by taking reasonable measures to protect against unauthorized . . . use of the information in connection with its disposal.”); see also 16 C.F.R. §§ 682.3(b), 312.1, 312.8, 312.10 (2018). 125. Regulation 2016/679, supra note 104, at 2 (“Natural persons should have control of their own personal data.”). 126. Regulation 2016/679, supra note 104, at 13. 127. Regulation 2016/679, supra note 104, at 13. 128. Data Portability, supra note 122, at 1369. 129. Paul M. Schwartz, Property, Privacy, and Personal Data, 117 Harv. L. Rev. 2055, 2081-82, 2084 (2004) (“Propertization . . . will neglect important social values that information privacy should

121

Currents 24.1 2020


advance.”). 130. See 17 U.S.C. § 106 (2018); see also 35 U.S.C. § 154 (2012). 131. Ownership of data may always be contracted for, and the data subject enters into a contract with the Service Provider upon consent to processing, whereby the Service Provider obtains title to the data subject. Nothing in the GDRP prohibits this. See Regulation 2016/679, supra note 104, at 13 (providing that the data subject’s rights are overshadowed where processing is necessary for the performance of a legal obligation). 132. Regulation 2016/679, supra note 104, at 12 (“Where personal data can be legitimately disclosed to another recipient, the data subject should be informed when the personal data are first disclosed to the recipient.”); this only applies to the disclosure of the data set to which the data subject has control. 133. Regulation 2016/679, supra note 104, at 12 (providing the “data subject . . . [has] the right to have personal data . . . rectified and a ‘right to be forgotten’ where the retention of [the] data infringes this Regulation . . . to which the controller is subject.”); Regulation 2016/679, supra note 104, at 33 (“ ‘[C]ontroller’ means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data . . . .”). 134. Regulation 2016/679, supra note 104, at 34 (“ ‘[P]ersonal data breach’ means breach of security leading to the accidental or unlawful destr uction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.”). 135. Regulation 2016/679, supra note 104, at 36 (providing six legal bases for processing data without consent at Article 6). 136. The transparency obligation is a contractual performance obligation for those who seek to license copyright protected works. See Directive 2019/790, supra note 10, at 122. 137. Regulation 2016/679, supra note 104, at 13. 138. Directive 2002/58/EC, of the European Parliament and of the Council of 12 July 202 concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector, 2002/58/EC, 2002 O.J. (L 201) 37, 42 [hereinafter Directive 2002/58/EC]. 139. Catherine Schmierer, Better Late

than Never: How the Online Advert. Industry’s Response to Proposed Privacy Legis. Eliminates the Need for Reg., 17 Rich. J.L. & Tech. 1, 13 (2011); see also Pamela Jones Harbour, Remarks Before FTC Exploring Privacy Roundtable Washington D.C, Federal Trade Commission 1, 2 (2009), http://www.ftc.gov/ speeches/ arbour/091207privacyroundtable. pdf; see also M. Angela Buenaventura, Teaching a Man to Fish: Why Nat’l Legis. Anchored in Notice and Consent Provisions Is the Most Effective Solution to the Spyware Problem, 13 Rich. J.L. & Tech. 1, *14-*15 (2006) (noting that courts often construe clickwrap agreements as binding “whether or not meaningful consent was actually present, and whether or not the user even saw the terms [of the contract] to begin with.”). 140. Schmierer, supra note 138, at 14–15. 141. See In re Sears Holdings Mgmt. Corp., No. 082-3099, 2009 WL 2979770 (F.T.C.), at *1 (Aug. 31, 2009); id. at *6–7 (Sears Privacy Statement and User License Agreement contained deceptive language in its websites where the language stated that consumer would retain control over the collection of their information w h e n i n f a c t t h e s o f t w a re downloaded upon acceptance of the agreement terms ran in the background of consumer’s computers, and consumers who installed the application often had no knowledge that their personal information was collected; this resulted in settlement between Sears and the FTC, whereby Sears agreed to destroy all data collected and to clearly identify all future attempts to track consumers’ online activities.). 142. Tribunal de Grande Instance [ordinar y court of original jurisdiction] Paris, civ., Aug. 7, 2018, 14/07300; see also Tribunal de Grande Instance [ordinary court of original jurisdiction] Paris, civ., Feb. 12, 2019, 14/07224 (“Ses finalités générales concourent donc parfaitement avec celles du droit de la consommation visant notamment à sanctionner tout déséquilibre contractuel significatif entre les professionnels et les simples particuliers dans leurs différentes activités de consommation.”) (providing that the GDPR is aimed at “penalizing any significant contractual imbalance between professionals and private individuals in their

various consumer activities . . . .”). 143. C o m m i s s i o n Na t i o n a l e d e l’Informatique et des Libertés [ Na t i o n a l Da t a Pro t e c t i o n Commission] Paris, civ. Jan. 21, 2019 SAN-2019-001. 144. Regulation 2016/679, supra note 104, at 82 (providing for a “lower” level, $10 million or 2% of worldwide revenue, and “upper” level $20 million or 4% of worldwide revenue). 145. Cynthia O’Donoghue & Karen Lee Lust, Danish DPA Issues its First GDPR Fine for Late Deletion of Customer Telephone Numbers, Lexology, Apr. 18, 2019, https:// www.lexology.com/library/detail. aspx?g=13e6d9c1-1c7d-410ca583-7776062d41d9 [https:// perma.cc/V6SB-VW9V]. 146. Id.; Regulation 2016/679, supra note 104, at 35–36 (recalling Article 5 obligations and responsibilities imposed on all controllers and processors). 147. 2018 Cal. Stat. 1807 (2017-2018 Regular Session) § 1798.120 (to be codified at Cal. Civ. Proc. §§ 1798.100–1798.198, eff. Jan. 1, 2020) [hereinafter CCPA]. 148. Id. § 1798.140(c)(1). 149. Regulation 2016/679, supra note 104, at 33 (providing for Article 4(7) & (8); both are defined as people or entities that determine how data will be processed, with “processors” being third parties that process data on behalf of “controllers”); see Directive 2019/790 at note 10, at 113 (providing for Article 2 which states that an online contentsharing Service Provider means a “provider of an information society service of which the main or one of the main purposes is to store and give public access to a large amount of copyright-protected works or other protected subject matter uploaded by its users, which is organises and promotes for profit-making purposes.”). 150. Press Release, U.S. Chamber Releases Model Privacy Legislation, Urges Congress to Pass a Fed. Privacy Law (Feb. 13, 2019, 9:15 AM), https://www. uschamber.com/press-release/uschamber-releases-model-privacylegislation-urges-congress-passfederal-privacy-law [https:// perma.cc/T6WV-EGAL]. 151. R a c h e l F. F e f e r, C o n g . Research Serv., R45584, Data Flows, Online Privacy, and Trade Policy 18 (2019). 152. Schwartz, supra note 128, at 2110. 153. Schwartz, supra note 128, at 2111. 154. See Directive 2019/790, supra note 10, at 122-23. 122

Currents 24.1 2020

155. Directive 2019/790, supra note 10, at 122-23. 156. Directive 2019/790, supra note 10, at 113-14 (providing for Article 7 prohibitions on contract: “[a] ny contractual provision contrary to the exceptions provided for in Articles 3, 5 and 6 shall be unenforceable,” where these Articles, respectively, provide for use of online content for text and data mining for the purposes of scientific research, use of content for cross-border teaching activities, and use of content for preservation of cultural heritage). 157. See Directive 2019/790, supra note 10, at 107, 120. 158. Directive 2019/790, supra note 10, at 120. 159. Directive 2019/790, supra note 10, at 120. 160. Schwartz, supra note 128, at 2098. 161. Schwartz, supra note 128, at 2109. 162. Schwartz, supra note 128, at 2098. 163. Recall that the transparency obligation cannot be negotiated out of the license, the Service Provider can negotiate what data it hands over so long as the information adequately passes Directive muster. See Directive 2019/790, supra note 10, at 123. 164. See Directive 2016/943, supra note 91, at 1 (“Businesses, irrespective of their size, value trade secrets . . . [and] use confidentiality as a business competitiveness and research innovation management tool . . . that extends beyond technological knowledge to commercial data such as information on customers and suppliers, business plans, and market research and strategies.”). 165. See Directive 2016/943, supra note 91, at 2. 166. Directive 2016/943, supra note 91, at 2. 167. Directive 2016/943, supra note 91, at 2. 168. See Directive 2019/790, supra note 10, at 124. 169. See Dust, https://watchdust. com (last visited Nov. 16, 2019) (example of a niche online-content sharing Service Provider).


Career Paths in Internal Corporate Legal Practice

When asked what qualities they most value

His professional certifications include

for four years in the U.S. Marine Corps, Mr.

in attorneys interested in pursuing similar

Certified Fraud Examiner (CFE), Certified

Rabalais earned a bachelor’s degree from

career paths, compliance professionals and

Information Privacy Manager (CIPM),

Texas A&M University, and a law degree

Symposium authors recounted their own

Certified Information Privacy Professional

from the University of Houston.

career paths. The following ten tips represent

(CIPP/US), and Certified Compliance and

a portion of frequent answers gleaned from

Ethics Professional.

that discussion.

“Any volunteering we can do to get training, to

“Some of the skills that I think are important

help review somebody else’s policy, or, frankly,

for a privacy attorney? I think you have to be

“The real key is you have to hustle. There are so

to do something else that somebody else doesn’t

willing to constantly learn and adjust to the

many great opportunities out there. Grab a cup

want to do—that goes a long way in the eyes of

changing laws, which may happen every day,

of coffee, try for that scholarship, or even look

someone who has to delegate a compliance task”

the changes in technology, the change in data

into a policy that no one wants to touch. That

(Ryan Rabalais).

uses, etc. You have to be willing to kind of step

will really pay off” (Steven Gyeszly).

Ryan Rabalais is the Ethics & Compliance

Steven Gyeszly is Chief Compliance

at Bechtel Oil, Gas, & Chemicals and is

Counsel for Marathon Oil, an independent

the former the Vice President and Chief

exploration and production company

Compliance Officer of Rowan Companies.

operating on four continents. In this

In this capacity, he is responsible for

role, he oversees the company’s corporate

the company’s Compliance Program—

compliance and ethics organization.

principally dealing with anti-corruption

His office partners with operations and

efforts, internal investigations, and ensuring

other corporate functions to lead the

sound international business practices. Mr.

development, implementation, maintenance,

Rabalais has spent his career working as a

Wendell Bartnick is an associate in Reed

and enhancement of a pragmatic corporate

lawyer in the oil field for publicly traded

Smith’s IP, Tech & Data Group. He has a

compliance program. Prior to joining

companies with international operations,

computer science background and extensive

Marathon Oil, Mr. Gyeszly was the Director

primarily in legal compliance and operation

experience advising on privacy, data

of the Office of Global Compliance for a

support roles. Before coming to Rowan

protection, technology, and e-commerce

multi-national energy services company

Companies, he served as Chief Compliance

matters. Mr. Bartnick provides advice to

and an Associate in the International

Officer of Paragon Offshore, prior to which

public and private clients in various industries

Litigation and Arbitration section at a

he worked for Noble Drilling, BHP Billiton,

on regulatory compliance, technology-related

global law firm. He also serves on the Board

and Baker Hughes. As a lawyer, Mr. Rabalais

transactions, and data breach response efforts.

of Directors at Birkman International. Mr.

has primarily worked in Houston, Texas, in

Mr. Bartnick earned his J.D. at George

Gyeszly holds a bachelor’s degree in business

addition to holding positions in Caracas,

Mason University in 2008, graduating magna

administration from Texas A&M University.

Venezuela, and Perth, Australia. After serving

cum laude.

1.

Hustle.

2.

Be willing to constantly evolve, learn, and adjust.

out of your comfort zone to do this kind of work. You’re not going to see much of the same kinds of things, so having some basic knowledge about technology is helpful. If not, don’t be afraid to just sort of step in and learn. Virtually every question having to do with privacy really comes down to what you are doing with data. I think those two big things can help you have a leg up, or at least to do a good job” (Wendell Bartnick).

123

Currents 24.1 2020


“I don’t have a background in data privacy.

with the IT department, government affairs,

global, fully-integrated professional services

I got a call from a recruiter and it sounded

and corporate communications. It takes a team

and project management company, and

really interesting to work for an international

player, as you have to build trust with the folks.

major player in infrastructure ownership

technology company, to learn different things,

Also, having some sort of technological expertise

with 50,000 employees worldwide. In

learn the business, which I think being at a law

or background is helpful. I don’t have that

her former role, she supported the senior

firm you see a lot of snippets. However, you don’t

background, but I ask a lot of questions and

leadership team across the company’s five

really see what happens after that. It’s a little

that goes a long way in building trust with the

sectors, identifying risks and executing the

different from the work done at SCI, as we’re

technology folks at the company. I also stay up

company’s world class Integrity Program. Ms.

not so concerned about state data privacy laws

to date on new technologies. That’s important”

Tran gained her anti-bribery and corruption

in terms of our contract negotiations. We have

(Alexandra Chughtai-Harvey).

experience in the oil industry in Houston, the

a lot of focus on international laws because we

Alexandra Chughtai-Harvey is Corporate

Netherlands, and Hungary, including serving

have customers in South America, Europe, and

Counsel at Service Corporation International

Asia, and so it keeps you constantly thinking

(SCI), the largest provider of funeral and

and that’s what I really enjoyed about it. It’s a

cremation products and services in North

learning process. It’s constant learning and you

America. Ms. Chughtai-Harvey handles

cannot have an ego. There’s a lot of things that

data privacy and mergers and acquisitions

you’re not going to know, both of the technical

for SCI and advises on all aspects of the

side and the legal side, and so you learn when to

company’s data privacy program. She also

ask questions and how not to fear asking those

serves as a legal advisor to SCI’s Cybersecurity

Counsel.

questions” (Mary Isensee).

Executive Steering Committee and the

“Two pieces of advice—one, always be on the

Mary Isensee is Technology Counsel at

Cybersecurity Incident Response Team. Ms.

lookout for new opportunities. They pop up in

PROS, Inc., a cloud provider of AI-powered

Chughtai-Harvey graduated cum laude from

totally unexpected places. You will get all of

software solutions that optimize selling in the

the University of Miami School of Law and

your jobs through having a cup of coffee with

digital economy by enabling companies to

holds a bachelor’s degree in English from

someone. I’ve got all of my jobs through having

price, configure, and sell their products and

SUNY Buffalo. Prior to law practice, Ms.

coffee with someone. Two—never hesitate to

services in an omnichannel environment.

Chughtai-Harvey worked as a journalist and

reach out and ask someone to pick their brain,

There she provides support to the corporate

earned a master’s degree in Journalism from

or to say hey, this is what I am thinking, do you

and commercial teams. Prior to PROS, Ms.

New York University.

have any ideas? Everybody I’ve ever asked has

Isensee was a transactional associate at several Am Law 100 firms. She is a graduate of the University of Houston Law Center and the University of Texas at Austin.

3.

Be collaborative.

“If I am building a future team of investigative lawyers, I want someone who is tech savvy, who can collaborate, and who has relationship

“Be comfortable with uncertainty and

building skills for dealing with accountants or

ambiguity in the law—that you are not going

certified fraud examiners, or someone who is a

to know all of the answers. Having a sense of

Human Resources person, who can break down

exercising legal judgment. Be able to collaborate

the psychology and the emotional intelligence

well. That’s very helpful. I work very closely

aspect of employees. That is my all-star team”

with many departments across the company

(Thuy Tran).

where any sort of data is either taken in or shared with a third party. I work particularly

Thuy Tran previously worked as the Regional Integrity Officer-USA for SNC-Lavalin, a 124

Currents 24.1 2020

as a subject matter expert on a pro bono basis for Transparency International in Budapest. Upon her return to the United States, she worked in Washington, D.C., where she managed global programs and partnerships for Trace International. Ms. Tran now works at Weatherford Int'l as Ethics Compliance

said yes, including people I thought were way too important to talk to me. That’s what I would suggest” (David Mortlock). David Mortlock is chair of the Willkie Farr & Gallagher Global Trade and Investment Practice group in Washington, D.C. He advises clients on international trade and government regulation of cross-border transactions, particularly the intersection of economic regulation and national security. Mr. Mortlock formerly served as Director for International Economic Affairs at the White


House National Security Council, in which

1996, graduating cum laude. She earned

worked as Deputy Compliance Officer

capacity he advised President Obama and

her law degree from South Texas College of

and Council-Litigation with St. Louis-

his National Security Advisor on sanctions,

Law Houston in 1999, where she served as

based Charter Communications Inc. His

corruption, and other international finance

assistant Managing Editor of the South Texas

governmental experience includes service as a

and trade issues. Mr. Mortlock also worked

Law Review.

Special Assistant United States Attorney from

at the U.S. Department of State as Deputy Coordinator for Sanctions Policy; Special Assistant to the Under Secretary for Economic Growth, Energy, and the Environment; and Attorney-Advisor of Sanctions and Terror Finance. Mr. Mortlock received his J.D. from Georgetown University Law Center, magna cum laude, in 2014 and his undergraduate degree from Cornell University in 2001.

4.

Relationships will propel your career–foster them.

“How I got into compliance, one of my jobs in the past—I was a special assistant U.S. attorney who helped investigate for the FBI. At one point, they were assembling a team to work on a very significant investigation. They pulled me in because I had worked on the federal investigation. I ended up working on a white

1999 to 2000 with the office of the Special Counsel John C. Danforth. Mr. Sardar earned a bachelor’s degree in Economics from California State University at Long Beach, and a law degree from St. Louis University, and is a member of the Missouri Bar. “I would have never necessarily predicted that I would get a call from the general counsel that was a good friend who said, “let’s go to dinner” and asked me to come to Baker-Hughes and

“With litigation, you’re used to talking on your

collar crime investigation, and that steered my

feet. You have a lot of training, and you’re used

path to compliance. The first in-house role I

to interacting with a lot of people. Compliance

had was with a company in St. Louis where

definitely allows you to connect with people,

I managed litigation and compliance. The

provides the foundation for building people

next real full-time compliance role I had was

skills, and positions you to speak as a leader”

working for Jay. I remember when I interviewed

(Margaret Mousoudakis).

with Jay, I was about to get on my flight back

Margaret Mousoudakis is Assistant

to St. Louis, and I had the guts to turn to Jay

Compliance Officer for LyondellBasell, one

and tell him ‘I am not an FCPA expert.’ I

of the world’s largest olefins, polyolefins,

still remember that conversation. He was only

chemicals, and refining companies. She

looking for a smart, intelligent, hard-working

served in Brazil in April 2010 assisting the

guy, and the rest, he would teach me.” (John

Jay Martin has retired from Baker Hughes

company and establishing a compliance

Sardar).

as its Chief Compliance Officer and is now

department which included implementing

John Sardar is the Chief Compliance Officer

a new code of conduct, new companywide

for Noble Energy, Inc., a publicly traded

policies and procedures including an anti-

company and independent energy leader,

corruption policy, gifts, entertainment, and

engaged in worldwide oil and gas exploration

travel policy, and due diligence procedures for

and production. In his current role, Mr.

third parties. Previously, Ms. Mousoudakis

Sardar oversees all aspects of Noble Energy’s

was a Senior Attorney for Marathon Oil

ethics and compliance program globally,

Company, where her practice included

and is responsible for implementation

providing Foreign Corrupt Practices Act-

and management of the company’s ethics

related legal support to all Marathon

and compliance policies, procedures, and

subsidiaries. Ms. Mousoudakis received her

guidelines. Prior to joining Noble Energy, he

bachelor’s degree in History and Spanish

was Director, Ethics and Legal Compliance

from Washington and Lee University in

for Baker Hughes Inc. Mr. Sardar also

play a role. I had a lot of confidence in him and the senior management team and the board. I would tell anybody going into that type of opportunity to only do it if you have a feeling of comfort. You can’t succeed if you don’t have the support around you. I felt that support. Every time you make a move like that, it has a risk in it, it has as a reward. You never know until you do it whether it’s going to pan out. But it turned out to be a great thing” (Jay Martin).

Senior Counsel with the law firm Wilkie, Farr & Gallagher in Washington, D.C. Prior to these roles, Mr. Martin was a shareholder at Winstead Sechrest & Minick P.C., a partner at Phelps Dunbar and Andrews & Kurth, and the Assistant General Counsel of Mobile Oil Corporation’s Worldwide Exploration and Production Division in Fairfax, Virginia. Mr. Martin has also served as General Counsel of Mobil Natural Gas, Inc. in Houston, Texas. Mr. Martin holds J.D., M.P.A., and B.B.A. degrees from Southern Methodist University in Dallas, Texas.

125

Currents 24.1 2020


“You have to be selfish. No one is going to

Hughes, a GE company (BHGE). At BGHE

Motiva, Ms. Bradshaw worked at Andeavor

navigate your career for you—eighteen months

she advises the business on anti-boycott

(formerly Tesoro Corporation) supporting

at a law firm wanting bigger cases with bigger

compliance and implements the annual

the supply chain management function

deals only to go to another law firm wanting

compliance questionnaire. Prior to joining

and managing commercial, marketing, and

even bigger cases and even bigger deals, and then

BHGE’s International Trade Compliance

refining litigation. Ms. Bradshaw received a

to a multinational law firm where you start to

group, Ms. Flores served as Legal Compliance

B.A. from Saint Mary’s College and J.D. from

get the phone calls from the headhunters. Take

Training Coordinator, managing BHGE’s

the University of Missouri-Kansas City in

those calls okay. It does not matter who they are

annual legal compliance training. Ms. Flores

2004. After law school, Ms. Bradshaw served

calling on behalf of, that is a relationship in the

earned her undergraduate degree from Texas

as a Captain in the U.S. Army Reserves, 8th

making” (Natalia Shehadeh).

Christian University in Fort Worth, Texas,

Legal Support Organization. Ms. Bradshaw

and earned her J.D. from South Texas

worked in private practice at Greensfelder,

College of Law in Houston, Texas.

Hemker & Gale, where she practiced in the

TechnipFMC PLC, a London-based global

“The job is never done, and is ever changing.

construction group, focusing on contracting

leader in subsea, onshore/offshore, and

You’re watching out for what laws are coming

surface projects in the oil and natural gas

next. You have to be a proactive business partner,

industries. Prior to joining TechnipFMC in

and that is true in many areas of the law. You

2018, Ms. Shehadeh was the Chief Assurance

also have to build a relationship with the

Officer and, formerly, Chief Compliance

business so that they are proactive and coming

Officer, interim General Counsel and chair

to you before they’re entering into a new region

of Diversity and Inclusion at Weatherford

or new territories, understanding that you’re not

International PLC, a global oil field services

going to slow them down but work with them

company. As Chief Compliance Officer for

in parallel—that you’re going to put the right

Technip FMC, Ms. Shehadeh leads a global

protections in place for the company. Come to an

team of compliance professionals responsible

understanding of the business objectives, build

for a broad array of ethics and compliance

the partnerships, either with your information

topics including trade, anti-corruption,

security officer, with the different parts of the

and anti-trust compliance. Previously, Ms.

business, or with the different compliance leads

Shehadeh served as Senior Trade Compliance

in the business. Don’t be afraid to admit when

Counsel at Shell Oil Company and was

you don’t have the subject-matter expertise in a

Of Counsel with the law firm Greenberg

new area where the law is changing, but letting

Traurig, LLP. Ms. Shehadeh earned degrees

the business know that you’re going to learn it,

at the University of Houston and South

that you’re going to get up to speed at the rate of

Texas College of Law Houston in 1999. Ms.

business, and that you are going to get the right

Shehadeh is originally from Madrid, Spain

partners, to put the right connections in place”

and is presently based in Houston, Texas.

(Shenna Bradshaw).

Natalia Shehadeh is Senior Vice President and Chief Compliance Officer for

5.

Understand the business.

“At the end of the day, a lawyer must be a business facilitator” (Courtney V. Flores). Courtney V. Flores is Legal Counsel for International Trade Compliance at Baker

house to Aegion Corporation for nine years, serving her final role at Aegion as General Counsel and Vice President of Human Resources over the energy services platform. 6.

Backbone.

“This may apply more to compliance professionals in general—many of the conversations are going to be difficult conversations. Setting special investigators aside, generally speaking compliance professionals are trying to help somebody get to ‘yes’ in a way that is ethical and does not cross any lines. Lawyers do not want to be pushovers. They want to help, but they do not want to be steamrolled. Lawyers must have the backbone to stand up for their convictions when they know something is not right and to say that. KPMG1 has a pamphlet on revamping investigations that lists some of the key skills, one of which is the ability to investigate root causes. Those are things that professionals are looking at now— setting up their systems to track root

Shenna Bradshaw currently serves as

causes, to understand what is happening in a

Senior Legal Counsel at Motiva Enterprises

given case, hoping to get to the bottom of it, and,

LLC, supporting compliance, information technology, supply chain management, and refining capital projects. Prior to 126

Currents 24.1 2020

and litigation. Ms. Bradshaw then moved in

1. https://advisory.kpmg.us/content/dam/ advisory/en/pdfs/revamping-investigations. pdf.


ultimately, to fix the issue” (Michael Miner).

Foreign Corrupt Practices Act (FCPA), trade

program was certified by its appointed

Michael Miner currently serves as Associate

compliance, economic sanctions, data privacy

Monitor, marking a major milestone in the

and protection, and anti-trust compliance.

company’s compliance efforts with respect

She has extensive experience conducting

to its Extended Deferred Prosecution

due diligence of third-party representatives

Agreement with the Department of Justice.

including the identification of anti-bribery,

Prior to Bilfinger, Mr. Leal served as Chief

trade, sanctions, human rights, and ethical

Compliance Officer of Layne Christensen

risks, in addition to conducting anti-

Company. Mr. Leal began his career as a

corruption audits and internal investigations.

litigator with Baker Botts LLP. Mr. Leal

Ms. Coselli's expertise includes the

graduated with Honors from The University

development and implementation of ethics

of Texas at Austin and received his law

and compliance programs and processes,

degree from Columbia Law School. Mr. Leal

along with partnering with dedicated trade

commits his time to serving on the Board

compliance teams. She earned her law degree

of Family Houston, a non-profit providing

from South Texas College of Law in addition

mental health services, family counseling,

to her B.B.A. in finance from Texas Tech

and financial coaching on a reduced or free

University. Prior to attending law school,

basis to area residents.

General Counsel for Investigations at Weatherford Int'l, where he leads the global investigations team, reporting to the General Counsel and Chief Compliance Officer. Mr. Miner has previously held a number of roles at Weatherford, including Regional Compliance Counseling and Managing Counsel for Investigations. Prior to joining Weatherford, Mr. Miner was in private practice for over fifteen years, most recently as Partner at Drinker Biddle & Reath, LLP in Washington, D.C. At Drinker Biddle & Reath, his practice focused primarily on white collar criminal defense, corporate and governmental investigations, and commercial litigation. Mr. Miner received

she worked as a tax consultant, specializing

his undergraduate degree from the University

in state and local taxes.

of Michigan and his law degree from The

“Serendipity led me to this career. We were

George Washington University Law School.

coming up in the game, and it was probably

“Having a backbone is important. For example,

happenstance. I was a litigator at Baker Botts

roadside stops in certain countries are risky situations. Having boots on the ground and being in the same situations that the business guys are in, some of which are dangerous—these are the things that give the lawyer or investigator some ‘street cred.’ It is easy as a compliance professional to sit here in Houston in an ivory tower and say, ‘don’t give this bribe’ or ‘don’t give this facilitating payment’ or ‘you can’t do that.’ But when you are living and working in certain countries, when you are faced with a roadside stop where the officer is drunk and pointing a gun into the car—then you gain a

here in the Houston office. Like many defense lawyers, I had an itch I wanted to scratch on the plaintiff side, to see what that was like. For about three years, I worked with the national plaintiff firm, Merlin Law Group, and that was an amazing experience for compliance. When litigating these cases, you are taking depositions of powerful people, which is a big part of compliance and internal investigations. Not everyone has that comfort level of being so bold with a CEO or billionaire. If you have that opportunity to experience that early on, it’s a one less hurdle that you have to deal with”

different perspective.” (Ashley Coselli).

(Sergio Leal).

Ashley Coselli works as Senior Ethics &

Sergio Leal is the Head of Compliance

Compliance Counsel with Total American Services. Her practice specializes in corporate compliance including with respect to the

at Ericsson and is the former Compliance Officer for Bilfinger North America. This past December, Bilfinger’s compliance

7.

Sound legal judgment.

“Qualities that make good lawyers in any field, but which are particularly helpful in this space: the ability to exercise good judgment and to think about issues in a deep way; analyze them and be able to give advice that’s not just giving legal jargon, but applied in the situation you’re giving advice on; giving options but also potentially a recommendation to your client; and then knowing the situation where you just have to tell your client no. There are a lot of solutions you can bring to the table, but there are some situations where you have to be willing to say no. As you’re looking at entering into this field, I think those are things to start thinking about as you’re taking law school courses” (Tim Brown). Tim Brown is an accomplished legal counselor in the energy industry, with unique and diverse experience in litigation, international transactions, and both trade and anti-corruption compliance. Mr. Brown has held a variety of significant roles at Anadarko

127

Currents 24.1 2020


Petroleum Corporation (Anadarko) for

seasoned investigator, having conducted

counsel for companies in the upstream and

fourteen years. His current role at Anadarko

numerous and often complicated internal

midstream markets. Notably, in this role

is Managing Senior Counsel-International, in

investigations for her clients over the years.

she developed, implemented, and advised

which he leads a team of lawyers responsible

Ms. Moore graduated magna cum laude

on a compliance framework for the Dodd-

for all legal work with respect to exploration,

from Southwestern University and received

Frank Wall Street Reform and Consumer

development, and production activity, as well

her J.D. from the University of Texas. She is

Protections Act of 2010.

as all new international ventures in business

a member of the Employment Law Section of both the Texas State Bar and the Houston

“I took time between my undergrad and law

development work. Mr. Brown earned his J.D. from Texas Tech University, cum laude,

Bar Association and a past-President and

and his Bachelor of Arts, with honors, from

Treasurer of the American Petroleum Labor

Baylor University. Mr. Brown is a licensed

Lawyers Association.

school and worked as a logistics provider. The intent there was they had international in their name and I thought that I would get to travel. I decided to go to law school at night

customs broker and serves as an adjunct law

9.

“Good” experience includes

and worked full time. Then I got married,

professor teaching International Petroleum

non-traditional experience.

had a kid, and bought a house. I don’t know

Transactions at South Texas College of Law–Houston. 8.

Social self-awareness and

cultural competency.

“Practitioners should be ready to be bold but practical. Don’t be scared to take risks with nontraditional roles that are quasi-legal in nature. This enables a starting attorney to learn the

how I did it. Looking back, it makes me tired. I did a short detour as a medical malpractice lawyer before deciding that I wanted to get back in the international space and use what I learned for seven years working as a logistics

“The young lawyer should be aware enough to

business side of things while getting started in

check in and make sure that, culturally, he or

their legal career. These quasi-legal positions or

she is not going to be stepping on someone’s toes.

non-traditional positions may be good stepping

Language ability is another big skill to have as

stones for new lawyers. However, landing and

well. Having emotional intelligence, be able to

succeeding in these roles may take a little bit of

read a situation, to read a person, to know what

humble pie. After graduating from law school,

needs to be done in order to get the information,

I did not realize how much non-legal work is

have cultural sensitivity, and know that not

roped into working in-house. Lend a hand and

everything works abroad like it does here in the

make relationships outside of the legal team.

U.S., in fact nothing works like it does here in

After working within the business, you have

the U.S., ever” (Marla Moore).

an opportunity to see why things go wrong and

Marla Moore has over twenty-four years

how to give business-minded legal support.

look for” (Ellen C. Smith).

of employment law experience, with

Hopefully, taking on these non-traditional roles

Ellen C. Smith serves as Executive

nearly seventeen years spent as an in-

will enable you to become a partner with the

Counsel-International Trade Compliance,

house labor and employment lawyer

business and help you recognize the legal risks

at Baker Hughes, a GE Company, where

managing a host of issues for a major

for that business” (Elanor Benmenashe).

she leads a global team of trade compliance

multi-national oil and gas company. By

Elanor Benmenashe is a Senior Human

professionals responsible for daily import,

leveraging her significant experience in the

Resources and Business Partner with SNC-

corporate world, she now runs her own

Lavlin in the Oil & Gas Sector, with about

successful practice focusing primarily on

20,000 employees. Her work focuses on

workplace training and investigations. Her

managing global labor and employment

clients include companies, nonprofits, and

investigations. Prior to joining SNC-Lavalin,

quasi-governmental institutions. She is a

Ms. Benmenashe served as in-house legal 128

Currents 24.1 2020

provider. My recommendation to you is to get law firm experience, because, if you’re going to be in-house, it’s important to understand how outside council works. It’s a great training ground. If you’re not able to do that, you still have to understand your supply chain. I think that’s critical. Really understand that if you have the opportunity to work in house, meet your supply chain folks, and understand how the business works. These are keys that I really

export, trade sanctions, and boycott compliance; providing advice and training; and program development, implementation and administration. Ms. Smith has held various trade compliance roles in the oil and gas industry for almost ten years.


“I did not go straight from my undergrad to

career working in the customs broker and

global enforcement authorities. She also

law school. I had a gap of six years working

freight forwarder community managing

provides counsel in the design, enhancement,

out of two different trade quarters. The reason

day-to-day supply chain on behalf of

and implementation of compliance programs,

why I got in that space, was actually because of

various clients. After passing the Customs

as well as the execution of anti-corruption

an undergraduate marketing class. I was trying

Broker exam in 2000, he transitioned into

transactional due diligence and integration.

to figure out what I was going to do after I

a compliance role and acted as a customs

Ms. Dowdle has conducted investigations

realized that accounting was not in my future.

broker for a boutique law firm specializing

as well as corporate independent and self-

We had a guest speaker, another professor, who

in international trade and customs matters.

monitorships in Europe, Asia, Africa, and

came in to talk about logistics, and I thought,

Upon finishing law school in 2005, Mr.

the Americas. Additionally, Ms. Dowdle

well I am not good at math, so it is not going

Chavez moved to an in-house role and

represents clients in complex commercial and

to work out for me. But the professor was a

eventually joined Shell Company in 2007.

securities litigation arising from governmental

dynamic speaker and talked about all the

In addition to a J.D., Mr. Chavez also holds

investigations.

things that need to happen behind-the-scenes.

a Tax L.L.M.

“Like a lot of people in compliance, I wanted to

It’s a part of marketing, but you’re not out there promoting. It’s not advertising, it’s not sales, but everything that we’ve talked about that have to go perfectly. To go from point A, whether that’s in China or elsewhere, to point B, here in the United States, to that item being on the shelf. That appealed to me. I started, six years

10.

The Value of Judicial Clerkships.

be a general litigator. After law school, I had the

“When I was in law school, I had no idea that

opportunity to clerk for a federal judge on the

the FCPA existed. I clerked on the Fifth Circuit, and I’m going to date myself, but my tenure on the court was when the Enron appeals were coming through. I worked on a lot on both

Fifth Circuit. I would encourage all students to consider clerking. There are some judges who are excellent mentors, and either way, you have an inside view of how the judicial system really

the individual and the Enron criminal work,

works” (David Searle).

and I found it absolutely fascinating. We were

David Searle is Vice President, Chief

doing the sentencing calculations and looking

Ethics and Compliance Officer at Walmart

at things like credibility and used the same

Inc. He is the former Chief Compliance

factors we would be using if it was someone

Officer, Associate General Counsel, and

who committed a rape or murder. I appreciated

Assistant Corporate Secretary of Bristow

how—from the political perspective—the courts

Group. He is responsible for overseeing

had come to deal with white collar crime. If you

legal compliance in all the jurisdictions

have the opportunity to clerk, take it. It will be

in which Bristow Group operates, dealing

the best job you ever have, so take it. You will

with issues related to export controls, anti-

learn more and have more doors open to you

corruption, sanctions, and fair competition.

particularly if you have a good judge. I still go

He previously served as an Assistant United

by my judge’s house for a glass of wine and let

States Attorney in the U.S. Attorney’s Office

him tell me everything that I need to do in the

in Houston, where he prosecuted corporate

next year” (Joy Dowdle).

international money laundering cases. He

experience that may be relevant, then that is

Joy Dowdle is a partner in the litigation

began his career in commercial litigation as

an advantage” (Mel Chavez).

department at Paul Hastings LLP, based out

later got my broker’s license, and at that point transitioned to a boutique law firm specializing in international trade, before going to law school at nights. Then I got a position in-house in Wisconsin, and finally came down to Shell in 2007. I’ve bounced back and forth between the import side and export side, but having that supply chain background and knowing how to roll up your sleeves, actually moving freight, importing and exporting are things that I still rely upon today. It’s been very helpful for me. What I look for is good experience. If you came straight from undergrad into law school, great. But in case you haven’t, don’t feel that you are at a disadvantage. If you have comparable

Mel Chavez serves as Trade Compliance Officer at Shell Oil Company. Mr. Chavez has twenty-five years of various international trade compliance experience. He started his

of the firm’s Houston office. Specifically, Ms. Dowdle has experience with global anti-corruption compliance and regularly represents clients across industries before 129

an appellate lawyer with Baker Botts LLP, after serving as a law clerk to the Honorable Jerry E. Smith of the U.S. Court of Appeals for the Fifth Circuit. Mr. Searle received his law degree from Duke University and holds an undergraduate degree in economics from Stanford University.

Currents 24.1 2020


Currents 24.1 2020


Interested in supporting CURRENTS ? Students who serve on the Currents editorial board receive no compensation or scholarship assistance. The editorial board oversees the entire editorial process for each of the bi-annual issues published. In addition, they must complete written notes of publishable length and quality, while juggling the competing demands of classes, part-time jobs, and families. Without scholarship assistance, many talented students simply cannot make such a sacrifice. We believe that a scholarship fund would enable Currents to attract talented students who could focus more exclusively on improving and expanding the journal in the coming years. Please consider supporting this new fund, which will help Currents continue to provide a unique forum for the exploration of the prevalent international trade law and business issues of the next decade. To contact Currents: Journal of International Economic Law with any questions, to give to the Editorial Board Scholarship Program or for subscription information, please visit our website :

www.stcl.edu/academics/law-reviews-journals/currents/

Currents 24.1 2020


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.