* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download THE NEW RACIAL JUSTICE: MOVING BEYOND THE EQUAL
Criminalization wikipedia , lookup
Constitutional Council (France) wikipedia , lookup
Purposive approach wikipedia , lookup
Scepticism in law wikipedia , lookup
Judicial system in the United Arab Emirates wikipedia , lookup
United Arab Emirates Legal Process wikipedia , lookup
Strategic lawsuit against public participation wikipedia , lookup
THE NEW RACIAL JUSTICE: MOVING BEYOND THE EQUAL PROTECTION CLAUSE TO ACHIEVE EQUAL PROTECTION EMILY CHIANG† ABSTRACT Since handing down Washington v. Davis and Arlington Heights v. Metropolitan Housing Development, the United States Supreme Court has significantly curtailed the ability of plaintiffs to bring disparate impact claims under the Equal Protection Clause. Many academics continue to talk about the standards governing intent and disparate impact. Some recent scholarship recognizes that reformers on the ground have shifted away from equalitybased claims altogether. This Article contends that civil rights advocates replaced the old equal protection framework some time ago and that they did so deliberately and with great success. It expands upon and refines the strategy shift some scholars have identified, with a particular focus on racial inequality, the foundation on which equal protection rests. It does so by focusing on three particularly timely reform movements: indigent defense reform, the fight to end the school-to-prison pipeline, and challenges to immigration-related laws. The Article uses these various reform movements to identify and analyze the true breadth of the new racial justice reformers have wrought. I. INTRODUCTION .................................................................................................. II. THE DEATH OF THE EQUAL PROTECTION CLAUSE FOR CLAIMS PREMISED ON RACIAL DISPARITY ....................................................................................... A. Disparate Impact After Davis ..................................................................... B. Moving Beyond the Equal Protection Clause ............................................. 1. The Interplay of Liberty and Equality-Based Claims ......................... 2. Moving Beyond Liberty/Equality to Achieve Equal Protection ........... III. THE NEW RACIAL JUSTICE ................................................................................ A. Indigent Defense Reform, Other Constitutional Rights, and Purely Disproportionate Impact ............................................................................. 1. The Disparate Impact .......................................................................... 2. The Reform Response ........................................................................... 3. Beyond Public Defense Reform—Lessons for Other Claims ................ B. School-to-Prison Pipeline, Statutory Claims, and Unconscious Bias ........ 1. The Disparate Impact .......................................................................... 2. The Reform Response ........................................................................... (a) Claims Under the Equal Protection Clause ................................. (b) Other Constitutional Claims ........................................................ (c) The Statutory Alternative ............................................................. 3. Beyond the School-to-Prison Pipeline—Lessons for Other Claims ...... C. Immigration, Structural Arguments, and Racial Animus ......................... 1. The Disparate Impact .......................................................................... 2. The Reform Response ........................................................................... (a) Facial Classification Based on Alienage ...................................... (b) Federal Preemption ...................................................................... (c) What Remains: Disparate Impact and a Return to the Bill of Rights ............................................................................................ 3. Beyond Immigration—Lessons for Other Claims ................................ 836 838 839 841 844 847 850 851 852 853 857 860 861 864 864 866 867 871 872 874 875 875 876 877 879 † Associate Professor of Law, University of Utah S.J. Quinney College of Law. Many thanks to Alan Chen, Cliff Rosky, Carolina Núñez, Jim Oleske, Justin Pidot, Rebecca Scharf, and the Rocky Mountain Junior Scholars Forum. Thanks also to Stephen Dent and Adrienne McKelvey for their invaluable research assistance. 836 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 IV. CONCLUSION ..................................................................................................... 881 I. INTRODUCTION Racial inequality endures in America. Whether the disparities—in education,1 employment,2 incarceration,3 or any number of other areas4—constitute inequity may be a matter of debate, but the fact of continued inequality is not.5 And yet, the Equal Protection Clause of the Fourteenth Amendment is increasingly ill suited to address this state of affairs. In the wake of decisions such as Washington v. Davis6 and Arlington Heights v. Metropolitan Housing Development Corp.,7 litigation seeking racial justice on the basis of disparate impact theories of discrimination under the Constitution has been all but foreclosed.8 A number of commentators have noted that those seeking to address inequality have had to accommodate a Court and culture in1. See, e.g., infra Part III.B.1. 2. According to data provided by the Bureau of Labor Statistics, the unemployment rate for African Americans in 2011 and 2012 was roughly double than what it was for whites. Labor Force Statistics from the Current Population Survey, U.S. BUREAU OF LAB. STAT., http://www.bls.gov/cps/cpsaat05.htm (last modified Feb. 5, 2013). As others have noted, these statistics grossly underestimate the true African American unemployment rate, because they do not include prisoners. BECKY PETTIT, INVISIBLE MEN: MASS INCARCERATION AND THE MYTH OF BLACK PROGRESS 52-53 (2012); BRUCE WESTERN, PUNISHMENT AND INEQUALITY IN AMERICA 97 (2006); see also MICHELLE ALEXANDER, THE NEW JIM CROW: MASS INCARCERATION IN THE AGE OF COLORBLINDNESS 229 (The New Press rev. ed. 2012) (noting that the true jobless rate among noncollege black men during the 1990s was 42%, and 65% among black male dropouts). At the highest level, only thirteen African Americans have ever been chairperson or CEO of a Fortune 500 company. See African American Chairmen & CEO’s of Fortune 500 Companies, BLACK PROFILES, http://www.blackentrepreneurprofile.com/fortune-500-ceos/ (last updated Feb. 5, 2014). 3. In 2005, 2290 per 100,000 black people were incarcerated, compared to 412 white people, a ratio of approximately 5.6. See George Coppolo & Kevin McCarthy, Crime Rate and Conviction Rates Broken Down by Race, OLR RES. REP. (Jan. 18, 2008), available at http://www.cga.ct.gov/2008/rpt/2008-R-0008.htm. African Americans make up 13% of the general U.S. population and constitute: 28% of all arrests; 40% of all inmates held in prisons and jails; and 42% of the population on death row. See James E. Johnson et al., BRENNAN CTR. FOR JUST., N.Y. UNIV. SCH. OF L., RACIAL DISPARITIES IN FEDERAL PROSECUTIONS 20 n.1 (2010), available at http://www.brennancenter.org/sites/default/files/ legacy/Justice/ProsecutorialDiscretion_report.pdf. 4. The U.S. Census Bureau reports that the 2011 median household income was $55,412 for whites, $32,229 for blacks, and $38,624 for Hispanics. CARMEN DENAVAS-WALT ET AL., U.S. CENSUS BUREAU, INCOME, POVERTY, AND HEALTH INSURANCE COVERAGE IN THE UNITED STATES: 2011 8-9 (2012). The percentages of those below the poverty line were 9.8% for non-Hispanic whites, 27.6% for blacks, and 25.3% for Hispanics. Id. at 14. 5. See, e.g., Mario L. Barnes et al., A Post-race Equal Protection?, 98 GEO. L.J. 967, 982-89 (2010) (providing statistical evidence of racial disparity in poverty, income and wealth, homeownership, employment, education, and the criminal justice system). 6. 426 U.S. 229 (1976). 7. 429 U.S. 252 (1977). 8. See infra Part II.A. 2014] THE NEW RACIAL JUSTICE 837 creasingly discomfited by claims of group-based discrimination. This unease has variously been described as “pluralism anxiety,”9 an “antibalkanization” perspective,10 and “the strain of difference.”11 Some of these scholars have in turn noted a shift in the Court’s jurisprudence; in Kenji Yoshino’s words, a shift from “group-based equality claims under the guarantees of the Fifth and Fourteenth Amendments to individual liberty claims under the due process guarantees of the Fifth and Fourteenth Amendments.”12 The conversation about the future of equal protection and the meaning of equality has never been more important. This Article contends that the dialogue cannot be fully realized until we re-engage with the paradigmatic application of equal protection principles to race.13 It argues that racial justice advocates have engaged in a wholesale replacement of the equal protection framework over the last several decades, and that they have done so deliberately and with great success. An understanding of the tools they used and the new racial justice they have built is to the benefit of all who seek equality. This Article identifies and explores three frontiers in the new racial justice: public defense, the school-to-prison pipeline, and immigration. Civil rights litigators have adapted to the Court’s restrictive equal protection jurisprudence without ceding the battle for racial equality in each of these areas, a fact made all the more remarkable for the endemic disparate racial impact at the heart of these problems. Their approach to these issues serves to highlight the variety of strategies at their disposal, many of which will be useful in other contexts. To procure public defense reform, they have relied upon other individual liberties protected by the Bill of Rights, the Sixth Amendment in particular. To fight the school-to-prison pipeline, they have used a rich federal statutory landscape to their advantage. And to challenge restrictive immigration bills, they have mustered structural arguments, such as federal preemption. These claims have played a critical role in reducing the disparate racial impact of poor public defense systems, the school-to-prison pipeline, and punitive immigration laws—and they have done so by providing a true alternative to the Equal Protection Clause in the 9. Kenji Yoshino, The New Equal Protection, 124 HARV. L. REV. 747, 755 (2011). 10. Reva B. Siegel, From Colorblindness to Antibalkanization: An Emerging Ground of Decision in Race Equality Cases, 120 YALE L.J. 1278, 1357 (2011). 11. Rebecca L. Brown, Liberty, the New Equality, 77 N.Y.U. L. REV. 1491, 1531 (2002). 12. Yoshino, supra note 9, at 748. 13. Cf. Kenji Yoshino, Covering, 111 YALE L.J. 769, 781 (2002) (noting that “racial minorities and women have much to gain from a theory of discrimination that focuses on the harms of coerced assimilation” for lesbians and gay men). 838 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 form of remedies that are structural, prospective, and class-based in nature, not just individual and retrospective. Not only have these claims proven more successful than traditional, explicitly race-based claims, but they have not even been predicated upon racial inequality, much less inequity.14 Some scholars have questioned whether a race-neutral approach to race-based problems is appropriate, criticizing it as a misguided embrace of a “post-racial” society.15 This Article offers a response grounded in realpolitik: litigators have not given up the fight for racial justice, but their pleadings now work around the doctrinal dead end of explicitly race-based claims. Far from conceding the fight for racial justice, these advocates have embraced a strategy that rewrites the rules in their favor, resulting in real, measurable gains for equality. Part II of this Article describes the death of the Equal Protection Clause as a useful means of vindicating racial justice claims. It unpacks the commentary surrounding the cultural and doctrinal shifts in the Court’s jurisprudence that have made equal protection claims less appealing both to advocates and judges. It concludes that a return to the conversation about racial equality would enrich our understanding of equal protection for all groups and that this discussion should begin with what advocates on the ground have been doing. Part III of the Article identifies the primary ways in which civil rights litigators have continued to make strides in combating racial inequality without resorting to equal protection claims. It pairs areas in which disproportionate racial impact is rampant with the most meaningful alternatives to the Equal Protection Clause identified by reformers thus far. In each area, it outlines the scope of the disparate impact, the reform response, and the lessons each strategy has to offer for others. This narrative provides the contours of the new racial justice, which has evolved to combat the racial inequalities of the modern age. II. THE DEATH OF THE EQUAL PROTECTION CLAUSE FOR CLAIMS PREMISED ON RACIAL DISPARITY The aftermath of Washington v. Davis, which all but foreclosed claims of racial discrimination based upon a disparate impact theory, has been amply documented.16 This Part will provide a brief overview 14. See infra Part II.B. 15. See, e.g., ALEXANDER, supra note 2, at 239; Kimberlé Williams Crenshaw, Twenty Years of Critical Race Theory: Looking Back to Move Forward, 43 CONN. L. REV. 1253, 1327-40 (2011). 16. See infra Part II.A. 2014] THE NEW RACIAL JUSTICE 839 of the doctrine as it stands today and summarize the academic commentary thus far as to the resultant state of civil rights work. A. Disparate Impact After Davis Any narrative of disparate impact claims must begin with Washington v. Davis17 and Arlington Heights v. Metropolitan Housing Development Corp.18 In Davis, the Court held that administration of a test for authorities such as police officers did not violate equal protection despite the resultant exclusion of a disproportionate number of African American applicants: [W]e have not held that a law, neutral on its face and serving ends otherwise within the power of government to pursue, is invalid under the Equal Protection Clause simply because it may affect a greater proportion of one race than of another. Disproportionate impact is not irrelevant, but it is not the sole touchstone of an invidious racial discrimination forbidden by the Constitution. Standing alone, it does not trigger the rule that racial classifications are to be subjected to the strictest scrutiny . . . .19 The Court concluded that absent a showing of discriminatory intent—that the state action was taken because of its disproportionate racial impact rather than in spite of it—disparate impact is insufficient as grounds for relief.20 It noted that there is no requirement that “the necessary discriminatory racial purpose must be express or appear on the face of the statute” and that such purpose could “often be inferred from the totality of the relevant facts, including the fact, if it is true, that the law bears more heavily on one race than another.”21 One term later in Arlington Heights, the Court explained that plaintiffs must be able to offer “proof that a discriminatory purpose has been a motivating factor in the decision” being challenged and that absent a “stark” pattern of disparate impact, courts would have to delve into factors such as the historical background of the decision, the sequence of events leading to the decision, substantive and procedural departures from the normal operating procedure, and the legislative and administrative history.22 Davis and Arlington Heights both dealt with state action in which the state could plausibly contend the disparate impact was unfore17. 18. 19. 20. 21. 22. 426 U.S. 229 (1976). 429 U.S. 252 (1977). Davis, 426 U.S. at 242 (internal citation omitted). Id. at 239. Id. at 241-42. Arlington Heights, 429 U.S. at 265-67. 840 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 seeable, and thus in which evidence of discriminatory intent would prove elusive. In Personnel Administrator of Massachusetts v. Feeney,23 the Court confronted state action that would inevitably and invariably lead to disparate impact, in the form of a veterans’ preference statute that “operates overwhelmingly to the advantage of males.”24 The Court upheld the preference, noting that, “ ‘Discriminatory purpose’ . . . implies more than intent as volition or intent as awareness of consequences.”25 Thus, although “it cannot seriously be argued that the Legislature of Massachusetts could have been unaware that most veterans are men,” there was no equal protection violation because there was no evidence of legislative intent to discriminate against women.26 The Court has evidenced somewhat more flexibility in its approach under two circumstances. First, the Court is more likely to grant relief when the state action in question is more akin to state inaction that perpetuates a pre-existing system of inequality. Thus, where school districts pursue policies that result in continued school segregation (as distinct from desegregation), the Court has indicated, “actions having foreseeable and anticipated disparate impact are relevant evidence to prove the ultimate fact, forbidden purpose.”27 Similarly, where a county seeks to maintain an at-large electoral system in a district that dilutes the black vote, the Court has found that “discriminatory intent need not be proved by direct evidence.”28 Second, the Court may grant relief when “the statistical disparities . . . warrant and require a conclusion that [is] irresistible, tantamount for all practical purposes to a mathematical demonstration that the State acted with a discriminatory purpose.”29 To date, the Court has only found statistical disparities that rose to this level twice. In Yick Wo v. Hopkins, every single white applicant for a permit to operate a laundry in a wooden building was granted one, and 23. 442 U.S. 256 (1979). 24. Id. at 259. 25. Id. at 279. 26. Id. at 278. 27. Columbus Bd. of Educ. v. Penick, 443 U.S. 449, 464 (1979). 28. Rogers v. Lodge, 458 U.S. 613, 618 (1982); see also id. at 624 (noting district court findings of past discrimination against African Americans, historical exclusion of African Americans from the political process, and depressed socio-economic status of African Americans in the county). 29. McCleskey v. Kemp, 481 U.S. 279, 293-94 n.12 (1987) (internal citations and quotation marks omitted); see also id. at 293 (noting that an exception to the general rule that statistical evidence of disparate impact is insufficient may also exist in the “selection of the jury venire in a particular district,” where a “stark pattern” of disparity may suffice “as the sole proof of discriminatory intent” (quotation marks omitted)). 2014] THE NEW RACIAL JUSTICE 841 not one of over two hundred Chinese applicants was granted one.30 In Gomillion v. Lightfoot, the state had altered the boundaries of a city from a square to “an uncouth twenty-eight-sided figure” that excluded 395 of 400 black voters and not a single white voter.31 Both of these cases pre-date Washington v. Davis; Yick Wo is more than a century old. The Court’s limited flexibility is thus of small comfort to plaintiffs who wish to challenge new state action or those who cannot show the stark statistical disparity the Court envisions. In the wake of the Court’s jurisprudence, legislators have reacted predictably: they “do not make a practice of justifying legislation on the grounds that it will adversely affect groups that have historically been subject to discrimination.”32 The Court has in turn acknowledged the difficulty it has created, noting that “[p]roving the motivation behind official action is often a problematic undertaking.”33 This combination of the Court’s jurisprudence and increased savviness on the part of state actors has proven nearly fatal for plaintiffs seeking relief on the basis of racially disparate impact. The Court has been unwilling to find discriminatory intent in claims as wideranging as those involving disparate application of the death penalty,34 juror selection,35 and a road closure that disproportionately affected African-American members of a community.36 B. Moving Beyond the Equal Protection Clause This Article will not rehash the already familiar criticisms of the Court’s various holdings in the area of disparate impact. Suffice it to say that the shortcomings of a doctrine requiring proof of discriminatory intent are nearly self-evident.37 Nor will it delve into the myriad 30. 118 U.S. 356, 359 (1886). 31. 364 U.S. 339, 340-41 (1960). 32. Reva Siegel, Why Equal Protection No Longer Protects: The Evolving Forms of Status-Enforcing State Action, 49 STAN. L. REV. 1111, 1135-36 (1997) (“[D]octrines of heightened scrutiny have created incentives for legislators to explain their policy choices in terms that cannot be so impugned.”). 33. Hunter v. Underwood, 471 U.S. 222, 228 (1985). 34. McCleskey, 481 U.S. at 292 (rejecting equal protection claim based on racially disparate application of the death penalty). 35. See, e.g., Hernandez v. New York, 500 U.S. 352, 361 (1991) (deciding to remove Spanish-speaking jurors on the grounds that they would not consider only the court interpreter’s version of testimony did not violate equal protection). 36. City of Memphis v. Greene, 451 U.S. 100, 119 (1981). 37. See, e.g., Siegel, supra note 32, at 1136 (“[T]he discriminatory purpose requirement now insulates many, if not most, forms of facially neutral state action from equal protection challenge.”); see also Michelle Alexander, The New Jim Crow, 9 OHIO ST. J. 842 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 criticisms of the Court’s equal protection jurisprudence or suggestions for reform of the doctrine governing disparate impact.38 The dismay created by Davis and its progeny stems largely from three observations about race in America, each of which is empirically verifiable: first, that African Americans are disproportionately affected by laws that burden the poor or the socially disadvantaged, because they are disproportionately poor and socially disadvantaged;39 second, that most of the racism that remains in America is of the subconscious variety, as opposed to the explicit state-driven Jim Crow variety;40 and third, that racial inequalities (in a purely numerCRIM. L. 7, 19 (2011) (“The Court has, as a practical matter, closed the door to claims of racial bias in the criminal justice system. It has immunized the new caste system from judicial scrutiny for racial bias, much as it once rallied to legitimate and protect slavery and Jim Crow.”); Mario L. Barnes & Erwin Chemerinsky, The Once and Future Equal Protection Doctrine?, 43 CONN. L. REV. 1059, 1066 (2011) (“[T]he Court has largely ignored the history of the moment that produced the Reconstruction Amendments and created a framework for equal protection analysis that all but ensures only a narrow group of discrimination claims will be actionable or succeed.”); Kenneth L. Karst, The Supreme Court, 1976 Term–Foreword: Equal Citizenship Under the Fourteenth Amendment, 91 HARV. L. REV. 1, 51 (1977) (“A legislature oblivious to [the] existing stigma of caste will nonetheless reinforce the stigma when it produces racially discriminatory effects through ostensibly ‘neutral’ legislation.”); Charles R. Lawrence III, The Id, the Ego, and Equal Protection: Reckoning with Unconscious Racism, 39 STAN. L. REV. 317, 319 (1987) (describing criticisms of Davis as falling into two categories, those who object to the motive requirement and those who argue that racial inequality exists regardless of motive). 38. See, e.g., Lawrence, supra note 37, at 324 (proposing new “test to trigger judicial recognition of race-based behavior”); see also Barbara J. Flagg, “Was Blind, But Now I See”: White Race Consciousness and the Requirement of Discriminatory Intent, 91 MICH. L. REV. 953, 960 (1993) (proposing requirement that government justify all facially neutral decision making criteria that have disparate effects); Suzanne B. Goldberg, Equality Without Tiers, 77 S. CAL. L. REV. 481, 491 (2004) (proposing single standard of review for Equal Protection claims); Karst, supra note 37, at 52 n.287 (proposing that government take into account principle of equal citizenship and justify racially disproportionate results); Larry G. Simon, Racially Prejudiced Governmental Actions: A Motivation Theory of the Constitutional Ban Against Racial Discrimination, 15 SAN DIEGO L. REV. 1041, 1111 (1978) (arguing government should have to produce credible explanations when confronted with disparate impact); David A. Strauss, Discriminatory Intent and the Taming of Brown, 56 U. CHI. L. REV. 935, 956 (1989) (proposing rigorous application of intent requirement, as requiring government to act as if it does not know the race of those affected by the decision). 39. See, e.g., Michael J. Perry, The Disproportionate Impact Theory of Racial Discrimination, 125 U. PA. L. REV. 540, 557 (1977). 40. There is a whole body of literature, both in legal commentary and in scientific studies, that identifies and explores the phenomenon of unconscious racism. See, e.g., Lawrence, supra note 37, at 336-44 (discussing unconscious racism and citing studies); see also IAN AYRES, PERVASIVE PREJUDICE? UNCONVENTIONAL EVIDENCE OF RACE AND GENDER DISCRIMINATION 19-44, 165-314 (2001) (gathering evidence of disparate treatment in the retail sales of new cars, disparate impact in access to kidney transplantation, and the setting of bail rates); Flagg, supra note 38, at 983-85 (gathering studies indicating unconscious racial bias in employment, mortgage lending, retail bargaining, psychiatric diagnoses, and other settings); Linda Hamilton Krieger, The Content of Our Categories: A Cognitive Bias Approach to Discrimination and Equal Employment Opportunity, 47 STAN. L. REV. 1161, 1161 (1995) (discussing unconscious bias in the context of Title VII). A number of scholars have concluded that the Court’s disregard for this research has resulted in a 2014] THE NEW RACIAL JUSTICE 843 ical sense of the word “inequality”) persist in America regardless of why anyone thinks this may be the case.41 Much has been written about whether these inequalities constitute inequity, that is, whether they reflect structural or institutional racism, but that conversation is beyond the scope of this Article.42 Neither does this Article engage with the question of what should replace the current antidiscrimination framework.43 Some have answered this question in a purely normative way, with various proposals for the Court to modify or discard pieces of its equal protection jurisprudence.44 Others have answered this question more descriptively, advocating a particular approach (such as a move to libertydoctrine “that does not reflect prevailing understandings of the ways in which racial or gender bias operates.” Siegel, supra note 32, at 1138; cf. Richard Delgado, Centennial Reflections on the California Law Review’s Scholarship on Race: The Structure of Civil Rights Thought, 100 CAL. L. REV. 431, 440-41 (2012) (noting the difference between the paradigm of racial liberalism, which believes that racism is not dead and that discrimination can take many forms, and that of racial conservatism). Much has also been made of the Implicit Association Test, which purports to identify and quantify implicit bias, or unconscious racism. See PROJECT IMPLICIT, https://implicit.harvard.edu/implicit/iatdetails.html (last visited June 29, 2014). See, e.g., Anna Roberts, (Re)forming the Jury: Detection and Disinfection of Implicit Juror Bias, 44 CONN. L. REV. 827, 827 (2012) (discussing unconscious racism in context of jury selection); see also Alexander R. Green et al., Implicit Bias Among Physicians and Its Prediction of Thrombolysis Decisions for Black and White Patients, 22 J. GEN. INTERNAL MED. 1231, 1235 (2007) (concluding that implicit bias in physicians influences treatment decisions); Anthony G. Greenwald & Linda Hamilton Krieger, Implicit Bias: Scientific Foundations, 94 CAL. L. REV. 945, 966 (2006) (concluding that “implicit race bias is pervasive and is associated with discrimination against African Americans” that results in disparate impact); Jerry Kang et al., Implicit Bias in the Courtroom, 59 UCLA L. Rev. 1124, 1126-27 (2012) (applying science of implicit bias to the courtroom). The premise of this Article does not depend upon the existence or extent of unconscious racism; it merely depends upon the existence and extent of racial inequality. 41. See infra Parts III.A.1, III.B.1 & III.C.1. 42. See William M. Wiecek, Structural Racism and the Law in America Today: An Introduction, 100 KY. L.J. 1, 13 (2012) (“Because of its invisibility, structural racism does its work in the Potemkin village of ‘race-neutral’ policies.”); cf. KWAME TURE & CHARLES V. HAMILTON, BLACK POWER: THE POLITICS OF LIBERATION IN AMERICA 4 (Vintage Books 1992) (1967) (“Racism is both overt and covert.”); Ian F. Haney López, Institutional Racism: Judicial Conduct and a New Theory of Racial Discrimination, 109 YALE L.J. 1717, 1723 (2000) (building “a theory of racism that explains organizational activity that systematically harms minority groups even though the decision-making individuals lack any conscious discriminatory intent”). 43. See Barnes & Chemerinsky, supra note 37, at 1084-85 (arguing Washington v. Davis should be overturned). 44. See id. at 1075; see also John Hasnas, Equal Opportunity, Affirmative Action, and the Anti-Discrimination Principle: The Philosophical Basis for the Legal Prohibition of Discrimination, 71 FORDHAM L. REV. 423, 427 (2002) (examining the Equal Protection Clause and Civil Rights Act of 1964 through the lens of morality); Charles R. Lawrence III, Forbidden Conversations: On Race, Privacy, and Community (A Continuing Conversation with John Ely on Racism and Democracy), 114 YALE L.J. 1353, 1382 (2005) (arguing that the Equal Protection Clause reflects a commitment to a “new substantive value of ‘nonslavery’ and antisubordination to replace the old values of slavery and white supremacy”). 844 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 based claims) and supporting that position with the legal strategies adopted in some cases.45 This Article’s contention is that reformers on the ground have already replaced the current antidiscrimination framework. They have done so deliberately and steadily over the last several decades, and they have done so with great success. It contends, moreover, that this success is attributable to the fact that reformers no longer overtly identify or describe their work as being explicitly concerned with antidiscrimination, or at least not in their legal pleadings. Reformers have absorbed both the Court’s and the culture’s discomfort with explicitly race-based claims and have turned instead to combating racial inequality using a different framework and vocabulary altogether.46 1. The Interplay of Liberty and Equality-Based Claims The complementary nature of liberty and equality-based claims has long been noted.47 Using Lawrence v. Texas as a focal point, Lawrence Tribe described the relationship between these two families of claims with customary aplomb: he speaks of “a narrative in which due process and equal protection, far from having separate missions and entailing different inquiries, are profoundly interlocked in a legal double helix. It is a single, unfolding tale of equal liberty and increasingly universal dignity.”48 Lawrence, in Tribe’s view, is a case that “presupposed and advanced an explicitly equality-based and relationally situated theory of substantive liberty.”49 This Part identifies three overlapping strands in the recent scholarship on liberty- and equality-based claims. The first focuses on a 45. See infra Part II.B.1. 46. In one of the few empirical studies conducted on disparate impact racial discrimination claims, Theodore Eisenberg and Sheri Lynn Johnson express surprise at how few such claims are filed. They state: “The Supreme Court’s standard takes its toll not through an unusually high loss rate for those plaintiffs reaching trial or appeal, but by deterring victims from even filing claims.” Theodore Eisenberg & Sheri Lynn Johnson, The Effects of Intent: Do We Know How Legal Standards Work?, 76 CORNELL L. REV. 1151, 1153 (1991). Although this Article focuses largely upon systemic reform cases rather than individual claims, its contention is that rather than being deterred from filing claims at all, victims of this type of racial discrimination have simply found alternatives to the Equal Protection Clause. 47. See, e.g., William N. Eskridge, Jr., Destabilizing Due Process and Evolutive Equal Protection, 47 UCLA L. REV. 1183, 1183 (2000) (“The Due Process Clause secures libertarian protections at the retail (individual) level that are important when the group is socially despised, while the Equal Protection Clause potentially offers minorities wholesale (group) level protection when (or if) the Court recognizes their legitimacy as partners in American pluralist democracy.”). 48. Laurence H. Tribe, Lawrence v. Texas: The “Fundamental Right” That Dare Not Speak Its Name, 117 HARV. L. REV. 1893, 1898 (2004). 49. Id. 2014] THE NEW RACIAL JUSTICE 845 perceived shift in the Court’s jurisprudence driven by a desire to avoid inter-group conflict in an increasingly diverse society. The second describes and advocates in favor of one type of claim as opposed to the other. And the third, “realist” position, takes the position that courts and reformers should simply use whichever claim fits best. In the first group are Reva Siegel, Kenji Yoshino, and Rebecca Brown. Each of these scholars provides a psychological profile of sorts on the Court. Siegel identifies an antibalkanization perspective on the Court, which is concerned about threats to social cohesion.50 She contends that moderates on the Court who hold this perspective are willing to: allow government to engage in race-conscious efforts to integrate, providing that government proceeds in ways that lower the salience of race in its interactions with the public. Antibalkanization . . . is distinctively concerned about the appearance of raceconscious interventions – the risk that race-conscious civil rights interventions will heighten conflict or resentment.51 Where Siegel refers to an antibalkanization perspective, primarily in the context of race-based decision making, Yoshino identifies “pluralism anxiety” as being responsible for a larger shift in the Court’s jurisprudence “away from traditional group-based identity politics in its equal protection and free exercise jurisprudence.”52 He explores a more general narrative in which equality-based claims writ large (as opposed to liberty-based claims) make the Court nervous, because they force the Court to pick favorites among groups; “[l]iberty claims, in contrast, emphasize what all Americans . . . have in common.”53 Brown also alludes to the problem of “representation of an increasingly heterogeneous population for which there can be no serious contention that the interest of some is necessarily the interest of all.”54 Instead of an antibalkanization perspective or pluralism anxiety, Brown discusses “the strain of difference:” [T]he shared sense of values does not exist for everything that all people value. Nor does it exist for the increasing, yet still small, number who may wish to enjoy common freedoms, but in ways 50. 51. 52. 53. 54. Siegel, supra note 10, at 1278. Id. at 1357. Yoshino, supra note 9, at 755. Id. at 796. Brown, supra note 11, at 1528. 846 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 that can be understood as distinguishable from the manner in which the many enjoy them.55 Yoshino and Brown both also participate in the second strand of the conversation, describing and advocating a shift towards libertybased claims. Yoshino observes that the Court has restricted equality-based claims but opened another avenue for relief, using “liberty analysis to mitigate its curtailment of group-based equality analysis.”56 Brown also urges a new look at liberty claims, but her analysis is grounded in an understanding of equality as having already been largely attained: “As equality was to the last century, so should liberty be to the next. Equality jurisprudence, after all, has achieved the stunning accomplishment of reconciling a robust judicial enforcement with the demands of democratic constitutional theory.”57 As Brown and others58 tell the story, equality claims have largely succeeded while liberty claims have foundered.59 Others, such as William Eskridge, would respond that equalitybased claims fill a role that liberty-based claims cannot, because they can provide relief for an entire group at a time: [R]egular equal protection and due process scrutiny might be either interchangeable or interdependent at the retail level, that is, in challenges to particular discriminations, especially penaltybased ones. But the Equal Protection Clause alone offers a minority group a potential constitutional jackpot at the wholesale level, that is, in challenges to an array of interconnected discriminations in state benefits as well as burdens. 60 Finally, some scholars take the approach closest to the hearts of litigation-minded reformers: the best type of claim is that which fits your agenda. Richard Delgado, for example, states: [A]ttention to human needs, problems, deprivation, and flourishing may proceed under one of two banners, individual rights or equal 55. Id. at 1531; see also Mary D. Fan, Post-Racial Proxies: Resurgent State and Local Anti-“Alien” Laws and Unity-Rebuilding Frames for Antidiscrimination Values, 32 CARDOZO L. REV. 905, 908-09 (2011) (“Equality norms can be framed and vindicated in a more palatable, legally tenable form, and tied to other interests to appeal more widely and ameliorate estrangement in a polarized polity.”). 56. Yoshino, supra note 9, at 776. 57. Brown, supra note 11, at 1492. 58. See, e.g., Carlos A. Ball, Why Liberty Judicial Review Is as Legitimate as Equality Review: The Case of Gay Rights Jurisprudence, 14 U. PA. J. CONST. L. 1, 3-4 (2011) (identifying the roots of the liberty/equality binary as a “legitimacy disparity” between the two, wherein judicial review founded on equality principles is lauded, as in the case of Brown v. Board of Education, 347 U.S. 483 (1954), but review founded on liberty principles is suspect, as in the case of Roe v. Wade, 410 U.S. 113 (1973)). 59. Brown, supra note 11, at 1494. 60. Eskridge, supra note 47, at 1216. 2014] THE NEW RACIAL JUSTICE 847 protection. Both approaches aim at the same goal, both result in heightened judicial scrutiny, and the choice to proceed under one banner or the other is largely a matter of tactics, ideological commitment, or perceived public sentiment.61 Each of these scholars has contributed invaluable and groundbreaking insight on the dynamic interplay between liberty and equality claims, and each offers a unique and valuable perspective on recent developments in that dynamic. Siegel provides a pinpoint identification of the problem that reformers concerned with racial equality confront, not just before the Supreme Court, but also in lower courts and in the court of public opinion: race continues to matter, but state actors (like school administrators) must pretend it does not. Yoshino and Brown provide a compelling description of the shift in the Court’s jurisprudence away from equality-based claims. Delgado’s work resonates with reformers on the ground who will gladly adopt any claim that serves their purposes. And Eskridge offers us a powerful reminder that structural problems demand structural solutions— solutions that are wholesale, not retail. To this important body of literature, this Article offers several insights. First, critical work remains to be done, even when it comes to the most basic of equalities. Second, there is a rich world beyond the binary of liberty- and equality-based claims to help tackle that work. And third, reformers on the ground are already making use of a multitude of strategies to address racial disparity. 2. Moving Beyond Liberty/Equality to Achieve Equal Protection This Article urges a return to the conversation about claims for racial equality, which remain salient in the national discourse but often are no longer identified as such by their proponents. The inclination to move beyond race is visible on several fronts: in society, in the Court’s decisions, and within the academy. Thus, the debate over affirmative action is at once avoidant of race and yet indelibly stamped by it, taking place against the backdrop of a Court and society that increasingly seems to believe—rightly or wrongly—that “[t]he way to stop discrimination on the basis of race is to stop discriminating on the basis of race.”62 Most contemporary academic 61. Delgado, supra note 40, at 450. 62. Parents Involved in Cmty. Schs. v. Seattle Sch. Dist. No. 1, 551 U.S. 701, 748 (2007); c.f. Barnes & Chemerinsky, supra note 37, at 1064 (“Substantive racial equality clearly mattered to the Court once.”). 848 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 commentary on equal protection has, in turn, moved away from race and towards gay rights and same-sex marriage in particular.63 This Article contends that the discussion about equal protection is a richer one when informed by the traditional, racial underpinnings of the Equal Protection Clause. We must be careful, both as a society and an academy, not to be too quick to leave race behind. From a purely empirical perspective, race indisputably still matters.64 But even more importantly, the scope of protection afforded under the Equal Protection Clause should matter not just to the old groups already under its ambit, but also to new groups seeking to join. Membership in the club might be less valuable if the benefits are not as extensive as one had assumed. A return to the academic and social conversation about racial equality is not the same as a return to explicitly race-based claims in litigation; indeed, the primary descriptive insight this Article contributes is that such claims are largely doomed to fail.65 But this refusal to revisit a doctrinal dead-end from a litigation standpoint is not an endorsement of a “post-racial” society.66 Kimberlé Williams 63. See, e.g., Katie R. Eyer, Marriage This Term: On Liberty and the “New Equal Protection”, 60 UCLA L. REV. DISCOURSE 2, 6 (2012) (arguing the LGB movement should continue to root its claims in equality, as opposed to liberty); Yoshino, supra note 9, at 778 (centering his claim that equality-based claims are giving way to liberty-based claims by citing Lawrence v. Texas, 539 U.S. 558, 574 (2003)). Not coincidentally, gay marriage is on the Court’s mind as well. See United States v. Windsor, 133 S. Ct. 2675 (2013) (striking down the Defense of Marriage Act); see also Hollingsworth v. Perry, 133 S. Ct. 2652 (2013) (holding proponents of California’s Proposition 8 did not have standing to appeal district court’s order finding the proposition unconstitutional). 64. See supra notes 39-42 and accompanying text. Racial inequality is unlikely to disappear anytime soon, and the sordid history of race in America will likely continue to manifest itself in differentiation between legislation with racial impact and legislation with impact on minorities of other types. See Robert M. Cover, The Origins of Judicial Activism in the Protection of Minorities, 91 YALE L.J. 1287, 1303 (1982) (“In contrast to the deep societal roots of governmental action against Blacks—the close fit between private terror, public discrimination, and political exclusion, directed against Blacks for a century—action against other minorities has usually been sporadic, transitory, and local.”); see also id. at 1308 (“[T]he apparently neutral structural characteristics of the Constitution had never been neutral concerning race.”). Further, although the Court’s holdings have adversely affected the ability of other groups to bring disparate impact claims, such as those based upon gender inequalities, nowhere has the effect been greater than on claims involving racial disparity. 65. Cf. Barnes et al., supra note 5, at 1000 (urging a change in “the way in which equality advocates frame the discussion” to “shift the underlying premise of equality arguments from a compensatory to a distributive justice rationale”); Fan, supra note 55, at 909 (arguing that “alternate approaches [to equality-based claims] must enfold antidiscrimination concerns and norms into the analysis rather than altogether elide address of the concerns”). This Article contends that successful reformers have avoided this strategy because it would defeat the purpose. They have, in other words, already reframed the discussion, and the new frame has nothing whatsoever to do with racial equality. 66. Cf. Crenshaw, supra note 15, at 1313-46 (describing and critiquing the phenomenon of post-racialism). 2014] THE NEW RACIAL JUSTICE 849 Crenshaw offers a powerful critique of the strategies described herein in a variation of the adage: “The master’s tools will never dismantle the master’s house.”67 Crenshaw criticizes not just the concept of post-racialism, the idea that race no longer matters in our society, but also the “post-racial pragmatism . . . that urges scaling racial obstacles while declining to name them.”68 She argues that such pragmatism entraps racial justice advocates and constituencies; silences racial justice advocacy; threatens to make the racial disparities described in this Article “unremarkable features of the postracial world;” and renders civil rights advocates “yesterday’s news— irrelevant, delusional and unsophisticated.”69 In a similar vein, Michelle Alexander thoroughly documents the racial disparity in America’s mass incarceration, which she describes as “the New Jim Crow.”70 Alexander criticizes the reform response to this phenomenon on several fronts: for being insufficient in scale and scope; focusing overly on litigation instead of grassroots reform; and considering race-neutral grounds for reform.71 Specifically, Alexander argues, “The prevailing caste system cannot be successfully dismantled with a purely race-neutral approach.”72 She notes that “opportunities for challenging mass incarceration on purely race-neutral grounds have never been greater,” but urges racial justice advocates not to take the “tempting bait.”73 This Article’s response to these powerful and persuasive criticisms is grounded more in realpolitik than ideology. While Alexander is undoubtedly correct that racial inequality will not be eradicated with any single lawsuit or legal strategy, litigation will continue to play an important role and litigators must take notice of doctrinal reality. Rather than cede the notion of the “reigned in” and narrowed “field of contestation” that Crenshaw depicts, reformers have broadened the legal grounds on which to fight.74 They would surely agree that “there 67. AUDRE LORDE, SISTER OUTSIDER 112 (rev. ed. 2007). 68. Crenshaw, supra note 15, at 1332. 69. Id. at 1327-1340. Reformers may find themselves stuck between a rock and a hard place in the academic commentary. Richard Thompson Ford criticizes those who perhaps belong to an older school for which Crenshaw may feel nostalgia. See RICHARD THOMPSON FORD, RIGHTS GONE WRONG: HOW LAW CORRUPTS THE STRUGGLE FOR EQUALITY 24-25, 27 (2011) (“Civil rights have effectively ‘occupied the field’ of social justice, crowding out alternative ways of thinking and new solutions. . . . The civil rights tradition encourages us to look at disputes through a lens that is designed to focus on discrimination.”). 70. ALEXANDER, supra note 2. 71. Id. at 225-39. 72. Id. at 239. 73. Id. 74. Crenshaw, supra note 15, at 1343. 850 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 are limits to the degree that racial justice can be finessed,”75 but the fight for racial justice is not over, and the advocates who continue to wage the fight are far from irrelevant, delusional, or unsophisticated in their tactics. For example, they are engaged in active battles over the school-to-prison pipeline and the disproportionate impact of the mortgage foreclosure crisis—two of the areas of racial disparity Crenshaw worries will become “unremarkable features of the postracial world.”76 Civil rights advocates do not have the luxury of ignoring equal protection doctrine post-Washington v. Davis, which has essentially reified the concept of post-racialism in the courtroom; but neither have they walked away from the challenge.77 III. THE NEW RACIAL JUSTICE This Part begins the descriptive project of identifying and analyzing the ways in which reformers have begun to combat racial inequality without resort to the Equal Protection Clause.78 I have identified three main areas in which they have done so, each of which serves to illuminate two larger groups of claims, one having to do with the nature of the right being vindicated and the other having to do with the nature of the disproportionate impact. The claims range from those rooted in the specific enumerations of the Bill of Rights to those that stem from the federalist structure of our legal system. The nature of the disproportionate impact addressed by these claims is similarly wide-ranging, from that which is caused with no explicit racial ani75. Id. at 1346. 76. Id. at 1337-40. 77. 426 U.S. 229 (1976). The civil rights movement has a long history of pragmatism, dating back to Plessy v. Ferguson, which was brought as a test case by reformers who presented the Court with a plaintiff who was seven-eighths white. See Plessy v. Ferguson, 163 U.S. 537 (1896); see also, e.g., Miss. Univ. for Women v. Hogan, 458 U.S. 718 (1982) (bringing gender discrimination claim on behalf of men); Frontiero v. Richardson, 411 U.S. 677, 681-82 (1973) (same). 78. Others have written about circumventing the intent requirement to vindicate racial inequality, most notably in the area of environmental law. See, e.g., Julie H. Hurwitz & E. Quita Sullivan, Using Civil Rights Laws to Challenge Environmental Racism: From Bean to Guardians to Chester to Sandoval, 2 J.L. SOC’Y 5, 9-10 (2001); Suzanne Smith, Current Treatment of Environmental Justice Claims: Plaintiffs Face a Dead End in the Courtroom, 12 B.U. PUB. INT. L.J. 223, 249-50 (2002) (discussing administrative proceedings and private rights of action under section 602 of Title VI as possible alternatives to using the Equal Protection Clause to seek redress); Sandra L. Geiger, An Alternative Legal Tool for Pursuing Environmental Justice: The Takings Clause, 31 COLUM. J.L. & SOC. PROBS. 201, 204 (1998); see also, e.g., Andrea Brenneke, Civil Rights Remedies for Battered Women: Axiomatic & Ignored, 11 LAW & INEQ. 1, 4 (1992) (discussing statutory alternative to equal protection challenges on behalf of battered women); Angela J. Davis, Prosecution and Race: The Power and Privilege of Discretion, 67 FORDHAM L. REV. 13, 18 (1998) (discussing equal protection challenges to racially biased decisions to prosecute). 2014] THE NEW RACIAL JUSTICE 851 mus, to that which nears explicit racial bias, but falls short of the Supreme Court’s definition of discriminatory intent. The first group of claims in Part III.A, indigent defense reform, represents not only those claims that implicate other explicitly enumerated constitutional rights, such as ones involving the criminal justice system and criminal procedure, but also claims in which any other enumerated constitutional right (other than equal protection) is at stake. These cases also serve to inform a discussion of disproportionate impact that stems purely from the economics of poverty, with no evidence of explicit animus. The second constellation of claims in Part III.B, having to do with efforts to redress the school-to-prison pipeline, stand in for claims implicating statutory as opposed to constitutional rights, and claims in which the source of the disproportionate impact is perhaps less clear. These are claims for which the Equal Protection Clause might have held some promise in the absence of a discriminatory intent requirement, that is, where there is ample statistical evidence of racial disparity in treatment and perhaps some evidence of intent, but not enough to meet the requirements laid out in Arlington Heights. Finally, Part III.C turns to immigration-related claims, challenges to state and local regulations directed at undocumented workers, or so-called “illegal immigrants.” This group of claims represents structural interests beyond enumerated individual rights, such as the separation of powers. This group of claims also involves disproportionate impact in which racial animus likely plays a role but falls short of the explicit discriminatory intent the Court demands. A. Indigent Defense Reform, Other Constitutional Rights, and Purely Disproportionate Impact The problems that plague the state public-defense systems in this country are not new; much has been written to catalog them and this Article will take them as a given.79 This Part uses public defense reform as a lens through which to view a particular type of racial justice claim: those that implicate criminal procedure, or more broadly, 79. See, e.g., NORMAN LEFSTEIN, ABA STANDING COMM. ON LEGAL AID & INDIGENT DEFENDANTS, SECURING REASONABLE CASELOADS: ETHICS AND LAW IN PUBLIC DEFENSE 12-24 (2011), available at www.americanbar.org/content/dam/aba/publications/books/ls_scl aid_def_securing_reasonable_caseloads_supplement.pdf; NAT’L RIGHT TO COUNSEL COMM., JUSTICE DENIED: AMERICA’S CONTINUING NEGLECT OF OUR CONSTITUTIONAL RIGHT TO COUNSEL 49-101 (2009), available at http://www.constitutionproject.org/pdf/139.pdf; Emily Chiang, Indigent Defense Invigorated: A Uniform Standard for Adjudicating PreConviction Sixth Amendment Claims, 19 TEMP. POL. & CIV. RTS. L. REV. 443, 447-50 & nn.20-39 (2010). 852 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 those for which a constitutional guarantee other than equal protection applies. This analysis is also intended to shed light on the fight against other similar problems that attend our criminal justice system as a whole. 1. The Disparate Impact Although problems with state public defense systems do not solely affect people of color—and in some jurisdictions may not even primarily affect people of color—the effects of poorly functioning systems across the U.S. are disproportionately borne by people of color. First, problems with public defense systems are by definition borne by the poor, and greater percentages of African Americans and Hispanics live below the poverty line than do whites.80 Second, all aspects of the criminal justice system disproportionately affect people of color and African-American men in particular.81 Finally, statistical evidence indicates that a higher percentage of incarcerated African Americans and Hispanics had publicly appointed counsel than whites.82 This Part will assume that there is generally no evidence of racial animus in state and local government decisions to underfund or otherwise neglect their public defense systems, and certainly no evidence of discriminatory intent that rises to the level required by Arlington Heights. In other words, traditional equal protection 80. DENAVAS-WALT ET AL., supra note 4, at 8-9. In 2011, the percentages of those below the poverty line were 9.8% for non-Hispanic whites, 27.6% for blacks, and 25.3% for Hispanics. Id. at 14. 81. See Dorothy E. Roberts, The Social and Moral Cost of Mass Incarceration in African American Communities, 56 STAN. L. REV. 1271, 1272-73 (2004) (discussing the “community-level harms” that flow from “grossly disproportionate” rates of incarceration of African-American men); Michael Tonry & Matthew Melewski, The Malign Effects of Drug and Crime Control Policies on Black Americans, 37 CRIME & JUST. 1, 7 (2008) (surveying the empirical literature on the disproportionate burdens facing people of color in arrests, conviction, and sentencing, concluding that “political and ideological exigencies of the last quarter century have conduced to the adoption of crime control policies of unprecedented severity, the primary burdens of which have been borne by disadvantaged blacks (and, increasingly, Hispanics)”); Katherine J. Rosich, Race, Ethnicity, and the Criminal Justice System, AM. SOC. ASS’N 2-3 (Sept. 2007), http://www.asanet.org/images/press/docs/pdf/ ASARaceCrime.pdf (surveying social science research on race and crime and identifying numerous areas of racial disparity); see also Alexander, supra note 37, at 18-19 (“Law enforcement officials are largely free to discriminate on the basis of race today, so long as no one admits it. That’s the key.”). 82. “While 69% of white state prison inmates reported they had lawyers appointed by the court, 77% of blacks and 73% of Hispanics had publicly financed attorneys. In federal prison black inmates were more likely than whites and Hispanics to have public counsel: 65% for blacks, 57% for whites and 56% for Hispanics.” Indigent Defense Systems, BUREAU OF JUST. STAT., http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=28#defendants (last visited June 29, 2014); see also CAROLINE WOLF HARLOW, U.S. DEP’T OF JUST., DEFENSE COUNSEL IN CRIMINAL CASES 9 (2000), available at http://bjs.ojp.usdoj.gov/content/pub/pdf/dccc.pdf. 2014] THE NEW RACIAL JUSTICE 853 claims to challenge this particular type of state action (or inaction) are foreclosed. 2. The Reform Response Despite the lack of availability of traditional equal protection claims, indigent defense reform has been a veritable hotbed of litigation and other activity over the last decade, and a number of the lawsuits have been filed by organizations explicitly dedicated to racial justice.83 For many, the connection between the pursuit of indigent defense reform and racial justice is explicit: “[T]he dispropor83. See, e.g., Duncan v. State, 784 N.W.2d 51, 53 (Mich. 2010), vacated, 790 N.W.2d 695 (2010) (alleging indigent criminal defendants are being denied their right to counsel and “effective assistance of counsel,” filed by the ACLU’s Racial Justice Project); White v. Martz, No. CDV-2002-133, 2006 Mont. Dist. LEXIS 136, at *1 (Mont. Dist. Ct. Jan. 25, 2006) (alleging public defender programs in Montana counties lack the resources to provide statutorily and constitutionally adequate representation of indigent clients, filed by the ACLU’s Racial Justice Project); Hurrell-Harring v. State, 930 N.E.2d 217, 232 (N.Y. 2010) (alleging a claim for ineffective counsel of indigent criminal defendants, filed by the New York Civil Liberties Union); Brief for NAACP Legal Defense and Educational Fund, Inc. as Amici Curiae Supporting Appellants, Richmond v. Dist. Court of Md., No. 24-C-06-009911 CN, 2007 WL 5446238 (Cir. Crt. Md. Dec. 7, 2007); see also SARAH GERAGHTY & MIRIAM GOHARA, ASSEMBLY LINE JUSTICE: MISSISSIPPI’S INDIGENT DEFENSE CRISIS 6-8 (2003), available at http://www.americanbar.org/content/dam/aba/migrated/legalservices/download s/sclaid/indigentdefense/ms_assemblylinejustice.authcheckdam.pdf. The Brennan Center for Justice at NYU School of Law has also identified indigent defense reform as a focus within the area of “racial justice.” Racial Justice, BRENNAN CTR. FOR JUST., http://www.brennancenter.org/content/section/category/racial_justice/ (last visited June 29, 2014); see also Brief for Brennan Center et al. as Amici Curiae Supporting Appellees, DeWolfe v. Richmond, 76 A.3d 1019 (Md. 2013) (No. 24-C-06-009911 CN), 2011 WL 4585691; Brief for National Association of Criminal Defense Lawyers et al. as Amici Curiae Supporting Appellees, DeWolfe v. Richmond, 76 A.3d 1019 (Md. 2013) (No. 24-C-06-009911 CN), 2011 WL 4585691; Brief for Brennan Center et al. as Amici Curiae Supporting Appellees, Duncan v. State, 784 N.W.2d 51 (Mich. 2010) (No. 07-242-CZ), 2011 WL 4585691; Brief for National Association of Criminal Defense Lawyers et al. as Amici Curiae Supporting Appellees, Duncan v. State, 784 N.W.2d 51 (Mich. 2010) (No. 07-242-CZ), 2011 WL 4585691; Brief of Former Prosecutors Michael A. Battle et al. as Amici Curiae Supporting Appellants, Hurrell-Harring v. State, 930 N.E.2d 217 (N.Y. 2010) (No. 2010-0066), 2010 WL 1775135. In a 2008 report, the Brennan Center discussed guidelines to determine eligibility for publicly appointed counsel. DAVID UDELL ET AL., BRENNAN CTR. FOR JUST., ELIGIBLE FOR JUSTICE: GUIDELINES FOR APPOINTING DEFENSE COUNSEL 5-26 (2008), available at http://www.brennancenter.org/sites/default/files/legacy/publications/Eligibility.Report.pdf; see also THOMAS GIOVANNI & ROOPAL PATEL, BRENNAN CTR. FOR JUST., GIDEON AT 50: THREE REFORMS TO REVIVE THE RIGHT TO COUNSEL 8-9 (2013), available at http://www.brennancenter.org/sites/default/files/publications/Gideon_Report_040913.pdf. The Charles Hamilton Houston Institute for Race & Justice at Harvard Law School has a project entitled “MyGideon,” designed to provide resources to indigent and capital defense attorneys. MyGideon, THE CHARLES HAMILTON HOUS. INST. FOR RACE & JUST., HARV. L. SCH. (July 26, 2012), http://www.charleshamiltonhouston.org/portfolio/my-gideon/; see also Catherine V. Beane, Indigent Defense: Separate and Unequal, CHAMPION, May 2004, at 54, 55 (“NACDL’s Indigent Defense Committee welcomes your suggestions on ways that we can better address racial justice issues and the disproportionate impact that inadequate indigent defense has on communities of color.”). 854 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 tionate presence of racial minorities among the indigents relying on public defender services reinforces the need to ensure that all defendants receive competent representation, else the criminal justice system will create further disparities in treatment of persons of different races.”84 And yet no mention of racial justice is made in the reform work itself; the legal documents filed rely almost exclusively upon the guarantees of the Sixth Amendment. This Part will focus upon some of the most recent developments in this area and highlight the successes reformers have had in a variety of cases with different procedural postures.85 First, advocates have continued to file classic class action suits that seek wholesale reform at the state or county level. Litigation of this type builds upon successes like the statewide public defense system implemented by Montana in response to an ACLU lawsuit.86 These claims typically request injunctive and declaratory relief on behalf of a class of indigent criminal defendants, alleging that the public defense systems in question are inadequately resourced and supervised.87 Litigation seeking state-wide reform was most recently successful in Michigan, where a suit filed by the ACLU in 2006 resulted in passage of a bill that created a public defense commission tasked with collecting data and implementing standards.88 Similar litigation is 84. Charles J. Ogletree, Jr., An Essay on the New Public Defender for the 21st Century, 58 LAW & CONTEMP. PROBS. 81, 93 (1995). 85. The increase in litigation and other reform activity in this area has been so vast that this Article will not even attempt a comprehensive review. There have been a number of non-litigation successes as well, however, and they too have not resorted to explicit claims of racial injustice. See, e.g., Order, In the Matter of the Review of Issues Concerning Representation of Indigent Defendants in Criminal and Juvenile Delinquency Cases (Nev. 2008) (ADKT No. 411) (implementing comprehensive performance standards); H.R. 483, 51st Leg., 1st Sess. (N.M. 2013) (creating independent public defense commission in New Mexico); H.R. 147, 62d Leg., 1st Reg. Sess. (Idaho 2013) (establishing presumptive indigency guidelines in Idaho); H.R. 148, 62d Leg., 1st Reg. Sess. (Idaho 2013) (prohibiting attorneys from serving as both lawyer and guardian ad litem for children); H.R. 149, 62d Leg., 1st Reg. Sess. (Idaho 2013) (preventing juveniles from making uninformed waivers of counsel); Texas Fair Defense Act, S.B. 7, 77th Leg., Reg. Sess. (Tex. 2001), 2001 Tex. Gen. Laws 1800-01 (codified as amended at TEX. CODE. CRIM. PROC. ANN. art. 1.051 (West 2004)) (providing for state funding, requiring minimum standards in counties, guaranteeing access to necessary and sufficient support services for attorneys, and creating centralized data collection system in Texas). 86. White, 2006 Mont. Dist. LEXIS 136, at *5. 87. Amended Complaint at 5, White v. Martz, No. CDV-2002-133, 2006 Mont. Dist. LEXIS 136 (Mont. Dist. Ct. Apr. 1, 2002). 88. Michigan Indigent Defense Commission Act, Act No. 93, 2013 Mich. Pub. Acts 53. The author worked on this litigation while at the Brennan Center for Justice, and subsequently at the ACLU. 2014] THE NEW RACIAL JUSTICE 855 still pending in New York.89 Advocates filed suit in Georgia90 and entered into a consent decree that revised the procedures for responding to requests for conflict-free appellate counsel, provided for additional full-time staff attorneys and workload controls for the appellate division of the public defender office, monitoring of contract attorneys working for the appellate division, and data collection.91 County or municipality-based lawsuits are pending in Washington,92 Texas,93 Georgia,94 and Pennsylvania.95 Not one of these lawsuits includes a federal equal protection claim. Second, some public defenders have successfully brought suits themselves, seeking to limit their own caseloads. These cases have a more mixed record than the prototypical class actions described above and some have yet to play out fully, but they remain a type of claim tethered to the Sixth Amendment that reformers may consider.96 The Florida Supreme Court recently found in favor of the MiamiDade County Public Defender’s Office’s right to move to decline appointment in future cases due to excessive caseloads.97 Similarly, a suit filed by the Public Defender of Mojave County, Arizona, resulted in a ruling that permitted the office to withdraw from thirty-nine cases, and warned the county that future motions to withdraw would also be granted “until the court is convinced that the reasons for do- 89. Hurrell-Harring v. New York, 914 N.Y.S.2d 367, 372 (N.Y. App. Div. Jan. 6 2011) (reversing lower court’s denial of class certification and granting class certification). 90. Petition for Writ of Mandamus and Verified Complaint for Injunctive and Declaratory Relief, Flournoy v. Georgia, No. 2009CV178947 (Ga. Super. Ct. Dec. 15, 2009), 2009 WL 8728189 (seeking relief on behalf of class represented by state public defenders office’s appellate division). 91. Consent Decree, Flournoy v. Georgia, No. 2009CV178947 (Ga. Super. Ct. Mar. 12, 2012), 2012 WL 5885196. 92. Order Denying Defendants’ Motions for Summary Judgment and Plaintiffs’ Motion for Preliminary Injunction, Wilbur v. City of Mt. Vernon, No. C11-1100RSL (W.D. Wash. Dec. 4, 2013), 2012 WL 600727; see also Best v. Grant Cty., No. 04-2- 00189-0 (Super. Ct. Wash. Aug. 26, 2004) . 93. Heckman v. Williamson Cty., No. 10-0671, slip op. at 2-3 (Tex. June 8, 2012) (seeking relief on behalf of class facing misdemeanor charges). 94. Verified Complaint at 4, 14, Cantwell v. Crawford, No. 09EV275M (Ga. Super. Ct. Apr. 7, 2009), 2009 WL 1043789 (seeking relief on behalf of class charged with felony offenses in five counties in Georgia). 95. Class Action Complaint, Flora v. Luzerne Cty., No. 2072 CD 2013 (Pa. Commw. Ct. Apr. 10, 2012). 96. For a general discussion of this type of litigation and for specific information about these cases, see LEFSTEIN, supra note 79, at 161-90. 97. Pub. Defender, Eleventh Jud. Cir. of Fla. v. State, 115 So. 3d 261, 274 (Fla. 2013) (noting the court is “reaffirm[ing] that aggregate/systemic motions to withdraw are appropriate in circumstances where there is an office-wide or wide-spread problem as to effective representation”). 856 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 ing so no longer exist.”98 But relief was denied to defenders seeking relief in New Orleans99 and Knoxville.100 And although the Missouri Public Defender Commission fought successfully for the right to limit the caseloads of its attorneys,101 a bill introduced in the 2013 legislative session sought to resolve the caseload problem by privatizing services for all non-serious felony cases through low-bid contracts.102 Claims brought by public defenders based explicitly upon a disparate impact theory under the Equal Protection Clause have not met with success at all, however. In Idaho, for example, contract attorneys filed suit against a county for breach of contract when the county sought to terminate their contract. The attorneys included an equal protection claim, alleging that the county’s attempts to jettison its contract with them in favor of a low-bid contract would have a disproportionate impact on Idaho’s racial minorities because 20% of Idaho’s racial minorities and 25% of Idaho’s total Hispanic population reside in the county in question.103 Their claim was denied.104 Finally, advocates of improved public defense services have had notable success before the Supreme Court. The Court has continually expanded entitlement to counsel under the Sixth Amendment, requiring in recent years, for example, the appointment of counsel at pretrial interrogations105 and in misdemeanor cases where there is a substantial likelihood of incarceration.106 The Court has also recently held that failure to communicate a plea offer to a defendant constitutes deficient performance by counsel under the Sixth Amendment and that defendants may be prejudiced by counsel’s deficient performance in recommending that a plea offer be rejected.107 Although none of these cases are systemic reform cases (each is a claim for post-conviction relief on behalf of a particular defendant); the last two cases, Missouri v. Frye and Lafler v. Cooper, are not public defense cases at all. Each will have a salutary effect on racial justice, as 98. Arizona v. Lopez, No. CR-2007-1544, slip op. at 9-10 (Mohave Cnty. Sup. Ct. Dec. 17, 2007). 99. Loisiana v. Edwards, No. 2007-K-639 (La. Ct. App. Aug. 16, 2007). 100. Petition for Writ of Certiorari, In re Pet. of Knox Cnty. Pub. Defender, No. 174552-C (Tenn. Knox Cnty. Ch. Ct. Mar. 9, 2009). 101. State ex rel. Mo. Pub. Defender Comm’n v. Pratte, 298 S.W.3d 870, 887 (2009). 102. H.B. 215, 97th Gen. Assemb., 1st Reg. Sess. (Mo. 2013). 103. Complaint for Declaratory and Injunctive Relief at *4, Wiebe & Fouser, P.A. v. Idaho, No. CV09-4413-C, 2009 WL 3072841 (Dist. Ct. Apr. 24, 2009). 104. Wiebe & Fouser, P.A. v. Idaho, No. CV-2009-4413-C, 2009 WL 2980444, at *1 (Dist. Ct. July 31, 2009). 105. Kansas v. Ventris, 556 U.S. 586, 590 (2009). 106. Alabama v. Shelton, 535 U.S. 654, 658 (2002). 107. Lafler v. Cooper, 132 S. Ct. 1376, 1391 (2012); Missouri v. Frye, 132 S. Ct. 1399, 1408 (2012). 2014] THE NEW RACIAL JUSTICE 857 reflected by a number of the amicus briefs submitted by various public interest organizations.108 Again, however, nowhere is the Equal Protection Clause mentioned in the actual legal claims. 3. Beyond Public Defense Reform—Lessons for Other Claims Each of the success stories in public defense reform has made a real difference for the millions of people of color caught up in the criminal justice system, with nary a mention of racial justice or equal protection. Of the claims described in this Article, these are perhaps closest in temperament to the “liberty-based” claims Yoshino describes and prescribes, as they seek to vindicate a right (to counsel) functionally denied to some by relying on the universality of the right’s guarantee to all. The Bill of Rights has held great promise for other areas in which notable racial disparity exists. For example, capital defense reform, a close cousin of public defense reform, has also benefited enormously from the tactics described above.109 The disparate racial impact of the death penalty is clear. The current death row population is 41% black and 43% white.110 Of the defendants executed in the United States since 1976, 35% were black and 56% were white.111 And infamously, the racial disparity when it comes to victims of crimes for which the death penalty was inflicted is even starker: 15% of the victims were black, compared to 77% who were white.112 Despite the racial disparity, perhaps nowhere are claims based on disparate impact under the Equal Protection Clause more plainly foreclosed. The Supreme Court dealt explicitly with the issue in 108. See, e.g., Brief for the Constitution Project as Amicus Curiae in Support of Respondents at 19, Lafler v. Cooper, 132 S. Ct. 1376 (2012) (No. 10-209), Missouri v. Frye, 132 S. Ct. 1399 (2012) (No. 10-444) (arguing the following as its second ground on appeal: “Because Indigent Defendants Plead Guilty At An Even Higher Rate Than Others, Petitioners’ Proposed Standard For Prejudice Would Deprive Most Indigent Defendants Of Full Protection Under The Sixth Amendment”); Brief of the National Association of Criminal Defense Lawyers et al. as Amici Curiae in Support of Respondents, Lafler v. Cooper, 132 S. Ct. 1376 (2012) (No. 10-209), Missouri v. Frye, 132 S. Ct. 1399 (2012) (No. 10-444). 109. Capital defense reform is understood to encompass an array of projects, including the following: elimination of the death penalty, whether wholesale or piecemeal; improvements in legal representation for those facing the death penalty, including the implementation of standards governing who may represent those facing capital charges; and direct representation. 110. Race of Death Row Inmates Executed Since 1976, DEATH PENALTY INFO. CTR., http://www.deathpenaltyinfo.org/race-death-row-inmates-executed-1976#defend (last visited June 29, 2014). 111. Id. 112. See id. Similarly, 19 white defendants were executed for murdering one or more black victims, while 257 black defendants were executed for murdering one or more white victims. Id. 858 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 McCleskey v. Kemp, finding that statistical evidence that the death penalty was imposed far more frequently on black defendants who killed white victims than on white defendants who killed black victims, even after for controlling for a number of other factors, was insufficient to demonstrate a violation of the Equal Protection Clause.113 The Court held that in order for McCleskey to prevail on his claim, he “would have to prove that the Georgia Legislature enacted or maintained the death penalty statute because of an anticipated racially discriminatory effect.”114 Such evidence, of course, would be virtually impossible to come by.115 McCleskey also raised an Eighth Amendment issue. But in contrast to the use of rights other than those associated with equal protection that this Article advocates, his claim was doomed because it was premised on the same racial disparity he sought to address with the equal protection claim: he argued that the statistical evidence of racial disparity in the imposition of the death penalty made the death penalty “cruel and unusual” as applied to him.116 The successful strategies this Article explores are based instead on assertions of rights wholly independent of racial disparity challenges. Death penalty abolitionists and racial justice advocates have succeeded in continually chipping away at the death penalty—and its attendant racial disparities—through the Eighth Amendment. In Atkins v. Virginia,117 the Court agreed that imposing the death penalty upon the intellectually disabled constitutes “cruel and unusual punishment” for Eighth Amendment purposes.118 The Court premised its holding on “the relative culpability of mentally retarded offenders, and the relationship between mental retardation and the penological purposes served by the death penalty” and noted also that “some characteristics of mental retardation undermine the strength of the procedural protections that our capital jurisprudence steadfastly guards.”119 According to the Death Penalty Information Center, the United States executed forty-four defendants with intellectual disa- 113. 481 U.S. 279, 297-99 (1987). 114. Id. at 298. 115. Cf. United States v. Armstrong, 517 U.S. 456, 458 (1996) (denying request for discovery in selective prosecution claim based on disparate racial impact between prosecutions for crack cocaine and powder cocaine because respondents “failed to show that the Government declined to prosecute similarly situated suspects of other races”). 116. McCleskey, 481 U.S. 297. 117. 536 U.S. 304 (2002). 118. Id. at 321. 119. Id. at 317. 2014] THE NEW RACIAL JUSTICE 859 bilities between 1984 and 2002.120 Thirty-two percent of those were white, 62% were black.121 Similarly, in Roper v. Simmons,122 the Court held that the Eighth Amendment forbids “imposition of the death penalty on offenders who were under the age of 18 when their crimes were committed.”123 In so holding, the Court noted the diminished culpability of juveniles and stated “retribution is not proportional if the law’s most severe penalty is imposed on one whose culpability or blameworthiness is diminished, to a substantial degree, by reason of youth and immaturity.”124 According to the Death Penalty Information Center, as of the end of 2004 (when Simmons was decided) there were seventy-one people on death row for crimes committed as juveniles.125 Sixty-four percent were people of color;126 41% were black, and 34% were white.127 And, in a set of statistics that would be familiar to McCleskey, 71% of the victims whose race was known were white and 28% were black.128 Reformers seeking to address racial disparity in public defense— and the criminal justice system more generally—have found success pursuing claims under other provisions of the Bill of Rights, as long as those claims are founded in the “liberty” strand of doctrine described above, premised on rights held by all rather than the denial of a right to some.129 Those who have made the greatest strides in 120. List of Defendants with Mental Retardation Executed in the United States, DEATH PENALTY INFO. CTR., http://www.deathpenaltyinfo.org/list-defendants-mental-retardationexecuted-united-states (last visited June 29, 2012) (citing Denis Keyes et al., People with Mental Retardation Are Dying, Legally: At Least 44 Have Been Executed, 40 MENTAL RETARDATION 243, 243-44 (2002)). 121. Id. 122. 543 U.S. 551 (2005). 123. Id. at 578. 124. Id. at 571. 125. Juvenile Offenders Who Were on Death Row, DEATH PENALTY INFO. CTR., http://www.deathpenaltyinfo.org/juvenile-offenders-who-were-death-row#streiboverview (last visited June 29, 2012) (citing VICTOR L. STREIB, THE JUVENILE DEATH PENALTY TODAY: DEATH SENTENCES AND EXECUTIONS FOR JUVENILE CRIMES, JANUARY, 1, 1973 - APRIL 31, 2004 (2004), available at http://www.internationaljusticeproject.org/pdfs/JuvDeathApril2004.pdf). 126. Id. 127. Id. 128. Id. 129. This reform work does not even include the on-going effort on behalf of the wrongfully convicted to pursue exonerations largely on the basis of DNA evidence via state statutory claims and federal and state habeas petitions. Poor lawyering at the trial level is frequently implicated. The Innocence Project, perhaps the most well-known of the organizations pursuing exonerations on behalf of the wrongfully convicted, explicitly identifies “bad lawyering” as one of the six potential causes of wrongful convictions, The Causes of Wrongful Conviction, INNOCENCE PROJECT, http://www.innocenceproject.org/understand/ 860 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 ensuring the provision of adequate counsel to the people of color most gravely affected by shortcomings in our indigent defense system and who have succeeded in protecting the most vulnerable from a death penalty system riddled with disparate impact, have done so without reference to race. There is every reason to believe that the reformers tackling the next frontiers in this type of claim, such as the problem of mass incarceration in our society, can and will do the same.130 B. School-to-Prison Pipeline, Statutory Claims, and Unconscious Bias The “school-to-prison-pipeline”131 is a term used by advocates, scholars, and reformers to describe the phenomenon by which children are funneled out of the educational system and into the criminal (last visited June 29, 2014), and notes, “Improving resources for public defense and ensuring the proper training and oversight of all defense lawyers can prevent wrongful convictions.” William Fleener, Staff Att’y, Cooley Innocence Project, Testimony to the Indigent Defense Advisory Commission, MICH. CAMPAIGN FOR JUST. (Dec. 16, 2011), http://www.michigancampaignforjustice.org/docs/Fleener%20Testimony%20to%20the%20Indi gent%20Defense%20Advisory%20Commission%20final.doc; see also SAMUEL R. GROSS & MICHAEL SHAFFER, NAT’L REGISTRY OF EXONERATIONS, EXONERATIONS IN THE UNITED STATES, 1989–2012 42 (2012), available at http://www.law.umich.edu/special/exoneration/ Documents/exonerations_us_1989_2012_full_report.pdf (“For 104 exonerations, our information includes clear evidence of severely inadequate legal defense, but we believe that many more of the exonerated defendants – perhaps a clear majority – would not have been convicted in the first instance if their lawyers had done good work.”). And the racial disparity being addressed is undeniable. According to the National Registry of Exonerations, 1040 people had been exonerated as of the date of this Article. About the Registry, NAT’L REGISTRY OF EXONERATIONS, http://www.law.umich.edu/special/ exoneration/Pages/about.aspx (last visited June 29, 2014). Of 802 crimes for which the race of the defendant was known, 50% of the exonerees were black and 38% were white. See GROSS, supra note 129, at 31 (noting “[i]t’s no surprise that black defendants are heavily overrepresented among exonerees: they are heavily overrepresented among those arrested and imprisoned for violent crimes and drug crimes. But the disproportions we see are greater than what one would expect.”). The racial disparities were even greater for sexual assault (63% black versus 32% white), attempted murder (59% black versus 12% white), robbery (64% black versus 18% white), and drug crimes (60% black versus 10% white). See id. 130. This is not to say that claims based upon the Equal Protection Clause or disparate impact are dead altogether. The recent challenges to the New York City Police Department’s “stop and frisk” policies and practices, for example, combine classic liberty claims under the Fourth Amendment with equal protection (and an array of common law tort) claims. Complaint at 4, 48-49, Ligon v. City of N.Y., 925 F. Supp. 2d 478 (S.D.N.Y. 2013) (No. 12 Civ. 2274 (SAS)), 2012 WL 1031760; Complaint at 2, 40, 42, 50, Davis v. City of New York, 902 F. Supp. 2d 405 (S.D.N.Y. 2012) (No. 10 Civ. 0699 (SAS)), 2010 WL 9937605; Second Amended Class Action Complaint for Declaratory and Injunctive Relief and Individual Damages at 2, 34, 36, 42, Floyd v. City of New York, 283 F.R.D. 153 (S.D.N.Y. 2012) (No. 08 Civ. 01034 (SAS)); see also Opinion and Order at 6, Floyd v. City of New York, 283 F.R.D. 153 (S.D.N.Y. 2012) (No. 08 Civ. 01034 (SAS)) (noting that 2.8 million people were stopped between 2004 and 2009 and that over 52% of those stops were of blacks, 31% were of Latinos, and 10% were of whites). 131. This phenomenon is also sometimes referred to as “schoolhouse to the jailhouse.” 2014] THE NEW RACIAL JUSTICE 861 justice system.132 The funneling effect of the pipeline can take place at any number of junctures within the education system and via any number of different administrative and educational policies and practices.133 Examples of the pipeline at work include overuse of the school disciplinary system (sometimes through zero tolerance policies) that results in students being kept out of school,134 and referrals to the criminal justice system for infractions traditionally handled by schools.135 1. The Disparate Impact The statistical evidence of the disparate impact the phenomenon has on children of color is wide-ranging.136 In 2009-2010, the national graduation rate for black male students was 52% and for Latino males it was 58%; in contrast, white males graduated at a rate of 78%.137 A recent survey conducted by the Department of Education of 72,000 schools (covering 85% of students nationwide) found that black students constitute 18% of the student body population, but 35% of the students suspended at least once, 46% of those suspended more than once, and 39% of those expelled.138 In fact, black students 132. See, e.g., ADVANCEMENT TO JAILHOUSE TRACK 11 (2005). PROJECT, EDUCATION ON LOCKDOWN: THE SCHOOLHOUSE 133. See, e.g., Emily Chiang, No State Actor Left Behind: Rethinking Section 1983 Liability in the Context of Disciplinary Alternative Schools and Beyond, 60 BUFF. L. REV. 615, 621-22 & nn.23-29 (2012) (describing facets of the pipeline and providing citations); Dean Hill Rivkin, Legal Advocacy and Education Reform: Litigating School Exclusion, 75 TENN. L. REV. 265, 268 (2008) (discussing schools’ uses of the juvenile justice system as a disciplinary tool). 134. ADVANCEMENT PROJECT, supra note 132, at 7; THE C.R. PROJECT AT HARV. UNIV. & ADVANCEMENT PROJECT, OPPORTUNITIES SUSPENDED: THE DEVASTATING CONSEQUENCES OF ZERO TOLERANCE AND SCHOOL DISCIPLINE 1 (2000) [hereinafter HARV. UNIV. C.R. PROJECT]. 135. HARV. UNIV. C.R. PROJECT, supra note 134, at 15; CATHERINE Y. KIM ET AL., THE SCHOOL-TO-PRISON PIPELINE: STRUCTURING LEGAL REFORM 3, 113-14 (2010). 136. See DANIEL J. LOSEN & JONATHAN GILLESPIE, THE C.R. PROJECT, OPPORTUNITIES SUSPENDED: THE DISPARATE IMPACT OF DISCIPLINARY EXCLUSION FROM SCHOOL 6-7 (2012), available at http://civilrightsproject.ucla.edu/resources/projects/center-for-civil-rights-rem edies/school-to-prison-folder/federal-reports/upcoming-ccrr-research/losen-gillespie-opportu nity-suspended-2012.pdf. 137. THE SCHOTT FOUND. FOR PUB. EDUC., THE URGENCY OF NOW: THE SCHOTT 50 STATE REPORT ON PUBLIC EDUCATION AND BLACK MALES 7 (2012), available at http://blackboysreport.org/urgency-of-now.pdf. 138. ED Data Express: Data About Elementary & Secondary Schools in the U.S., DEP’T OF EDUC., http://eddataexpress.ed.gov/state-tables-main.cfm (last visited June 29, 2014) (select “All States” under section one; then select “Achievement Data” under section three; then select “Graduation Rate Data”; then select “Display Report” at the bottom of the page); Michael Harris, New National Data Shows Racial Disparities in School Discipline, NAT’L CTR. FOR YOUTH L., http://www.youthlaw.org/publications/yln/2012/apr_jun_2012/ new_national_data_shows_racial_disparities_in_school_discipline/#sdfootnote1sym (last visit- 862 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 were more than three and a half times as likely to be suspended or expelled as white students.139 More than 70% of students arrested in school or referred to law enforcement were Hispanic or black.140 Studies also confirm that these disparities cannot be explained by worse behavior or socioeconomic status.141 These disparities in school discipline rates have consequences beyond the disparity in graduation rates. In an analysis of the data released by the Department of Education, the Center for American Progress found: Students who were suspended or expelled for even one discretionary violation in Texas were 2.85 times more likely than their peers to be in contact with the juvenile justice system within the following year. Each subsequent violation exponentially increased [a] student’s chances of juvenile justice involvement—nearly half (46 percent) of students with at least 11 disciplinary actions came into contact with the juvenile justice system, compared to only 2.4 percent of students with no disciplinary violations.142 In 2009, the arrest rate for juveniles aged 10-17 per 100,000 people was 4,644.3 for whites but 10,096.3 for blacks.143 The Department of Justice Office of Juvenile Justice and Delinquency Prevention notes also that “between 1980 and 2010, the total juvenile arrest rate decreased 54% for Asians, 51% for American Indians, and 30% for whites, while the overall rate for black juveniles increased 8% during this period.”144 Black juveniles constituted 16% of this age group but 51% of arrests for violent crimes and 33% of arrests for property crimes.145 After they are arrested, black juveniles represent 31% of ed June 29, 2014). The New York Times analysis of the data noted that in districts with expulsions under zero tolerance policies, Hispanic and black students represented 45% of students but 56% of those expelled. Tamar Lewin, Black Students Punished More, Data Suggests, N.Y. TIMES, Mar. 6, 2012, at A11. 139. Harris, supra note 138. 140. Lewin, supra note 138. 141. See LOSEN & GILLESPIE, supra note 136, at 32. 142. Rachel Wilf, Disparities in School Discipline Move Students of Color Toward Prison, CTR. FOR AM. PROGRESS (Mar. 13, 2012), http://www.americanprogress.org/issues/race/ news/2012/03/13/11350/disparities-in-school-discipline-move-students-of-color-toward-prison/. 143. Juvenile Arrest Rate Trends, OFF. OF JUV. JUST. & DELINQ. PREVENTION, http://ojjdp.gov/ojstatbb/crime/JAR_Display.asp?ID=qa05260&text=yes (last visited June 29, 2014). 144. Id. 145. CHARLES PUZZANCHERA & BENJAMIN ADAMS, OFF. OF JUV. JUST. & DELINQ. PREVENTION, JUVENILE ARRESTS 2009 (2011), available at http://www.ojjdp.gov/pubs/ 236477.pdf. 2014] THE NEW RACIAL JUSTICE 863 referrals to juvenile court and 41% of waivers to adult court.146 In 2008, 37.2% of black men with less than a high school education were incarcerated.147 As with public defense systems, it is difficult, if not impossible, to demonstrate that educators and school administrators are intentionally discriminating against children of color.148 Some scholars have advocated for education reform via the few remaining traditional desegregation cases stemming from Brown and its progeny.149 While this strategy would indeed provide plaintiffs seeking to shut down some aspects of the school-to-prison pipeline with some measure of relief under the Equal Protection Clause, these cases are exceptions that prove the rule: few districts remain under desegregation orders and their issuance depended upon the very discriminatory intent so difficult to demonstrate today. As a result, reformers have evidenced little desire to return to the old racial justice paradigm of equal protection litigation to combat the pipeline. 146. THE SENT’G PROJECT, REDUCING RACIAL DISPARITY IN THE CRIMINAL JUSTICE SYSTEM 2 (2000), available at http://www.sentencingproject.org/doc/publications/rd_reduc ingracialdisparity.pdf. 147. PETTIT, supra note 2, at 15. 148. See, e.g., Chauncee D. Smith, Note, Deconstructing the Pipeline: Evaluating School-to-Prison Pipeline Equal Protection Cases Through a Structural Racism Framework, 36 FORDHAM URB. L.J. 1009, 1026-28 (2009). Smith notes: [H]istorical and present-day actions that contribute to the pipeline can be categorized into three dimensions—criminalization, sorting, and economic policy. Together, these dimensions form a structural racism framework that largely encompasses the dynamic nature of disparate minority student pushout and incarceration. Thus, in contrast to a motive-centered approach, evaluating the pipeline’s criminalization, sorting and economic dimensions reveals how fragmented inequities have a drastically unequal cumulative impact on students of color. Id. at 1026-27; see also Russell J. Skiba et al., African American Disproportionality in School Discipline: The Divide Between Best Evidence and Legal Remedy, 54 N.Y. L. SCH. L. REV. 1071, 1074 (2009/10) (“A similar analysis in the area of racial disparities in discipline shows a distinct gap between the scientific knowledge base regarding racial disparities in discipline and the absence of a legal strategy accepted by the courts to address such disparities. Analysis of case law reveals that this gap appears to be related to the court’s adherence to a colorblind interpretation of the Constitution.”). 149. See, e.g., Danielle Holley-Walker, A New Era for Desegregation, 28 GA. ST. U. L. REV. 423, 426-27 (2012). 864 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 2. The Reform Response150 (a) Claims Under the Equal Protection Clause There is surprisingly little difference in the outcomes of cases challenging racial disparities under the Equal Protection Clause in the imposition of school discipline before and after Washington v. Davis: claims that succeed involve either (1) a flat-out admission of racial discrimination or (2) evidence that white students were either not disciplined at all for the same infractions or disciplined less harshly. Neither of these elements is easy to come by and claims based purely upon disparate impact have never had great success. Both before and after Davis, courts have been satisfied by open admissions of racial discrimination. In Hawkins v. Coleman, a 1974 case, the Northern District of Texas upheld a claim based upon statistical evidence demonstrating black students were disciplined more frequently than white students.151 But the school district had been segregated until three years before the court’s opinion was issued,152 and the superintendent of the school district testified in the case that the high number of suspensions of black students was because “ ‘we are a White controlled institution, institutional racism, [and] racism among individuals.’ ”153 Similarly, in 1985, in Sherpell v. Humnoke School District No. 5 of Lonoke County, Arkansas,154 the Eastern District of Arkansas ruled in favor of plaintiffs where there was evidence teachers referred to black students as “niggers,” “blue-gums,” and “coon.”155 In Mayorga Santamaria v. Dallas Independent School District,156 the Northern District of Texas found in favor of plaintiffs’ 150. This Part provides only a brief overview of the reform response to the school-toprison pipeline problem to illustrate the direction reformers have taken away from claims under the Equal Protection Clause and towards other alternatives. It also omits discussion of claims for individual relief, e.g. claims brought on behalf of a single child to petition for services under a statute or to challenge an individual instance of school discipline. For a much more comprehensive discussion of the reform response, see generally KIM ET AL., supra note 135; Frances P. Solari & Julienne E.M. Balshaw, Outlawed and Exiled: Zero Tolerance and Second Generation Race Discrimination in Public Schools, 29 N.C. CENT. L.J. 147 (2007). 151. 376 F. Supp. 1330 (N.D. Tex. 1974). 152. Id. at 1331. 153. Id. at 1336. 154. 619 F. Supp. 670 (E.D. Ark. 1985). 155. Id. at 673. A teacher in Sherpell also testified she “personally witnessed the discipline of a black child by an administrative official which resulted in broken skin and blood; that during [her] nine-year tenure, she had not witnessed any white child subjected to such treatment.” Id. at 674; cf. Coleman v. Franklin Parish Sch. Bd., 702 F.2d 74, 77 (5th Cir. 1983) (permitting equal protection claim to proceed because “plaintiffs pleaded intent and purpose to discriminate on the part of the defendants”). 156. No. Civ.A.3:06CV692-L, 2006 WL 3550194 (N.D. Tex. Nov. 16, 2006). 2014] THE NEW RACIAL JUSTICE 865 equal protection claim where there was evidence that school administrators had intentionally and explicitly segregated students by race and national origin.157 Both before and after Davis, courts have required plaintiffs lacking evidence of intentional discrimination to demonstrate not just statistical disparity in the imposition of discipline, but evidence that white students were not similarly disciplined for similar infractions.158 And even where some evidence is offered that white students were not similarly disciplined, courts have been reluctant to grant relief unless the students are nearly identically situated.159 These claims are most likely to succeed when there is evidence that two students involved in a fight were treated differently. For example, in Payne v. Worthington Schools,160 the (black) plaintiff was given a oneday, in-school suspension and the school merely called the other (white) child’s parents.161 Similarly, in Antoine v. Winner School District,162 plaintiffs were able to secure a consent decree in part because they offered not only statistical evidence of disparate discipline but also evidence that Native American students were disci- 157. Id. at *32-39; see also People Who Care v. Rockford Bd. of Ed. Sch. Dist. #205, 851 F. Supp. 905, 933 (N.D. Ill. 1994) (upholding equal protection claim where school administrators intentionally segregated students). 158. See, e.g., Tasby v. Estes, 643 F.2d 1103, 1108 (5th Cir. 1981) (“[A]bsent a showing of arbitrary disciplinary practices, undeserved or unreasonable punishment of black students, or failure to discipline white students for similar misconduct, the plaintiffs have not satisfied their burden of proving that the disproportionate punishment of black students in the [school district] is the product of a racially discriminatory purpose.”); Sweet v. Childs, 507 F.2d 675, 681 (5th Cir. 1975) (“There was no showing of arbitrary suspensions or expulsions of black students nor of a failure to suspend or expel white students for similar conduct.”); Fuller v. Decatur Pub. Sch. Bd. of Ed. Sch. Dist. 61, 78 F. Supp. 2d 812, 815 (C.D. Ill. 2000) ([“Plaintiffs’] statistics failed to establish that any similarly situated Caucasian students were treated less harshly.”), aff’d on other grounds, 251 F.3d 662 (7th Cir. 2001); Collins v. Chichester Sch. Dist., No. CIV.A. 96-6039, 1998 WL 351718, at *6 (E.D. Penn. June 29, 1998); Parker v. Trinity High Sch., 823 F. Supp. 511, 520 (N.D. Ill. 1993) (“Plaintiffs must show that those who determined the punishment improperly considered plaintiffs’ race. Stray remarks by nondecisionmakers or remarks unrelated to the disciplinary decision process do not satisfy this burden.”). 159. See, e.g., Tasby, 643 F.2d at 1107 n.1 (noting that “the statistics offered are based upon a breakdown of offenses far too general to prove disproportionate severity in punishment . . . [and] do not reflect other relevant circumstances surrounding each individual case of punishment . . . [such as] prior offenses”); Parker, 823 F. Supp. at 520 (refusing to grant relief in part because evidence that white students were not disciplined for fighting did “not represent a similar, repeated disregard for the authority of the teachers”). 160. Payne v. Worthington Sch., No. C2-99-830, 2001 WL 506509 (S.D. Ohio Apr. 25, 2001). 161. Id. at *8. 162. Consent Decree, Antoine v. Winner Sch. Dist. 59-2, No. Civ. 06-3007 (D.S.D. Dec. 10, 2007). 866 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 plined more harshly than Caucasian students for participating in the same fights.163 (b) Other Constitutional Claims Absent the presence of these particularly egregious indicators of racial discrimination, reformers have had to rely upon other claims to combat the school-to-prison pipeline and its effects on children of color. This Part will focus primarily on the use of statutory claims as an alternative to the Equal Protection Clause, but as with indigent defense reform, claims under other constitutional guarantees are also effective. Thus, in Antoine v. Winner School District, plaintiffs sought relief under the Fifth Amendment and successfully obtained a settlement agreement where school administrators routinely obtained confessions from students that were then used to prosecute them in juvenile court.164 Plaintiffs have similarly invoked the Due Process Clause to challenge school discipline—most prominently in Goss v. Lopez,165 which resulted in a Supreme Court decision that students have due process rights at school disciplinary proceedings166—and the Fourth Amendment to challenge school searches.167 Plaintiffs have also attempted to seek relief under a variety of common law tort claim theories, including negligence and intentional infliction of emotional distress, but with only a handful of exceptions, these claims have largely failed.168 Setting aside the practical difficul163. Complaint at 15, 25, 30, Antoine, No. Civ. 06-3007. 164. Consent Decree at 2-3, Antoine, No. Civ. 06-3007. 165. 419 U.S. 565, 581 (1975). 166. Id. at 574; see also, e.g., Ruiz v. Pedota, 321 F. Supp. 2d 538, 540-41, 543 (E.D.N.Y. 2004) (approving settlement agreement in suit challenging exclusions of students from school in violation of Due Process Clause); D.C. v. Sch. Dist. of Phila., 879 A.2d 408, 419 (Pa. Commw. Ct. 2005) (holding students have right to opportunity to be heard prior to being transferred to an alternative school and, incidentally, declining to address state equal protection claim). 167. See, e.g., Safford Unified Sch. Dist. No. 1 v. Redding, 557 U.S. 364, 374-75 (2009) (invalidating strip search of student); New Jersey v. T.L.O., 469 U.S. 325, 341-42 (1985) (holding that the Fourth Amendment applies to students searched by school officials); Doe v. Little Rock Sch. Dist., 380 F.3d, 349, 356 (8th Cir. 2004) (invalidating mass search of entire student body); Atlanta Independent School System Officials Will Ensure Students’ Constitutional Rights Are Upheld After Settlement Of ACLU Lawsuit, AM. C.L. UNION (Dec. 16, 2009), http://www.aclu.org/racial-justice/atlanta-independent-school-system-officials-willensure-students-constitutional-right (describing settlement agreement that included end to searches without reasonable suspicion). 168. See, e.g., Rembert v. Monroe Twp. Bd. of Educ., No. Civ. 95-4818 (JEI), 1997 WL 189318, at *7 (D.N.J. Apr. 14, 1997) (dismissing tort claims as being time-barred); Jackson v. Katy Indep. Sch. Dist., 951 F. Supp. 1293, 1306 (S.D. Tex. 1996) (dismissing intentional infliction of emotional distress claim because conduct was not sufficiently extreme or outrageous and negligence claims because of official immunity of defendants). 2014] THE NEW RACIAL JUSTICE 867 ties in making out these claims, such as the need to overcome various immunity doctrines, the very nature of tort relief is simply ineffective at combating structural racial inequalities.169 (c) The Statutory Alternative Reformers have had greater success with claims for statutory relief, even (or particularly) where their statutory rights are not explicitly premised on racial equality. Title VI of the 1964 Civil Rights Act, for example, prohibits discrimination on the basis of race, color, or national origin in programs or activities receiving federal funding.170 But because plaintiffs must still show discriminatory intent to prevail on a Title VI disparate impact claim,171 such claims can be nearly as difficult to make out as those under the Equal Protection Clause.172 The Juvenile Justice and Delinquency Prevention Act of 2002, which requires states participating in a federal funding program to address disproportionate minority contact (DMC) within the juvenile justice system, has proven somewhat more helpful.173 For example, the Department of Justice and a Tennessee juvenile court (in a jurisdiction where black children made up 97.8% of all juveniles referred to court) recently entered into an agreement to gather DMC 169. See, e.g., OWEN M. FISS, THE CIVIL RIGHTS INJUNCTION 90-91 (1978); Richard L. Abel, A Critique of Torts, 37 UCLA L. REV. 785, 809 (1990); Chiang, supra note 133, at 680-82. 170. 42 U.S.C. § 2000d (2006); see also § 2000e-2(a) (prohibiting employment discrimination). Plaintiffs filing claims under Title VII are of course still free to allege disparate impact as a basis for relief, see § 2000e-2(k), and a fair amount has been written about the relationship between Title VII and the Equal Protection Clause. See, e.g., Mary C. Daly, Some Runs, Some Hits, Some Errors – Keeping Score in the Affirmative Action Ballpark from Weber to Johnson, 30 B.C. L. REV. 1, 6 (1988) (discussing relationship between Title VII and equal protection in the context of affirmative action); Richard Primus, The Future of Disparate Impact, 108 MICH. L. REV. 1341, 1342-43 (2010) (querying whether Title VII’s disparate impact standard conflicts with equal protection doctrine); see also Ricci v. DeStefano, 557 U.S. 557, 595-96 (2009) (Scalia, J., concurring) (“[T]he war between disparate impact and equal protection will be raised sooner or later, and it behooves us to begin thinking about how—and on what terms—to make peace between them.”). 171. See Alexander v. Sandoval, 532 U.S. 275, 280 (2001) (noting that Title VI prohibits only intentional discrimination). 172. See, e.g., Denney v. City of Albany, 247 F.3d 1172, 1186-87 (11th Cir. 2001) (dismissing plaintiff’s Title VII claim for failing to prove discriminatory intent in promotion practices); Barnett v. Johnson City Sch. Dist., No. 3:04-CV-0763, 2006 WL 3423872, at *12 (N.D.N.Y. Nov. 28, 2006) (dismissing claim for failure to show disparate treatment); Brown v. City of Grand Prairie, No. CIV.A. 3:01–CV–0139, 2002 WL 171728, at *5 (N.D. Tex. Jan. 29, 2002) (dismissing plaintiff’s equal protection claim for failure to prove discriminatory intent); Jackson, 951 F. Supp. at 1300 (dismissing Title VI claim for failure to prove discriminatory intent). 173. Juvenile Justice and Delinquency Prevention Act of 2002, 42 U.S.C. § 5633(a)(22) (2006). 868 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 data to seek alternatives to juvenile detention, to train juvenile court staff on racial bias recognition and reduction, and to form a plan to reduce DMC.174 The No Child Left Behind Act (NCLB) contains a number of raceconscious accountability requirements and is explicitly directed at “closing the achievement gap between high- and low-performing children, especially the achievement gaps between minority and nonminority students, and between disadvantaged children and their more advantaged peers.”175 Its efficacy as a tool for reform, however, has been largely limited to the data collection it enables.176 For the first time, advocates are able to access education statistics disaggregated by race; although the disparate impact those statistics indicate may be insufficient for an equal protection claim, knowledge of its existence helps reformers to know they are targeting the right school or schools.177 Other federal statutes that do not explicitly address race have proven even more fruitful for litigators. Although there is no one statute suitable for every school-to-prison pipeline claim, or even most such claims, and although some claims cannot be addressed by an existing statute, the statutory landscape is sufficiently rich to provide a meaningful alternative to the Equal Protection Clause, particularly when one considers the overlap between the groups targeted for statutory protection and children of color. The Equal Educational Opportunities Act (EEOA) provides protections for children who do not speak English as a native language.178 Many if not all of these children are children of color, and many suffer from the effects of the school-to-prison pipeline.179 The EEOA re174. U.S. DEP’T OF JUST., C.R. DIV., MEMORANDUM OF AGREEMENT REGARDING THE JUVENILE COURT OF MEMPHIS AND SHELBY COUNTY 21-23, 26 (2012), available at http://www.justice.gov/crt/about/spl/documents/shelbycountyjuv_agreement_12-17-12.pdf. According to the Department of Justice, twenty-three states have full-time, state-level, DMC coordinators; thirty-one states have part-time or other state-level staff designated as DMC coordinators; thirty-four states have invested in targeted local DMC-reduction sites; and twelve states have laws intended to reduce DMC. JEFF SLOWIKOWSKI, OFF. OF JUV. JUST. AND DELINQ. PREVENTION, DISPROPORTIONATE MINORITY CONTACT 3 (Oct. 2009), available at https://www.ncjrs.gov/pdffiles1/ojjdp/228306.pdf. 175. 20 U.S.C. § 6301(3) (2012). 176. Some have criticized NCLB for increasing school incentives to push lowperforming students of color out of schools. See, e.g., Daniel J. Losen, Challenging Racial Disparities: The Promise and Pitfalls of the No Child Left Behind Act’s Race-Conscious Accountability, 47 HOW. L.J. 243, 290-94 (2004). 177. See, e.g., No Child Left Behind Act of 2001, Pub. L. No. 107-110, § 1907, 115 Stat. 1425 (2002) (requiring states to collect school district data on annual school dropout rates disaggregated by race and ethnicity). 178. 20 U.S.C. § 1703(f) (2012). 179. KIM ET AL., supra note 135, at 44. 2014] THE NEW RACIAL JUSTICE 869 quires state and local educational agencies to help children with language barriers overcome those barriers and to provide them with an adequate education.180 In particular, it mandates that English Language Learner students be provided with an education equal to that provided to native English speakers and that they be instructed in English.181 Reformers have filed cases both directly under the EEOA and through the U.S. Department of Education, Civil Rights Division to enforce these provisions.182 The Individuals with Disabilities Education Act (IDEA),183 section 504 of the Rehabilitation Act,184 and Title II provide an array of protections for students with disabilities.185 Black students are often over-identified for certain types of disabilities and under-identified for others.186 Disabled students of color are segregated from mainstream education more often than disabled white students.187 Disa180. § 1703(b), (f). 181. Castaneda v. Pickard, 648 F.2d 989, 1011 (5th Cir. 1981). 182. See, e.g., Gomez v. Ill. St. Bd. of Educ., 811 F.2d 1030, 1044-45 (7th Cir. 1987) (dismissing equal protection claim for failure to allege intent to discriminate but permitting EEOA claim to proceed); Castaneda, 648 F.2d at 1015 (denying Title VI claim for lack of intent to discriminate but remanding for further proceedings on EEOA claim); Flores v. Arizona, 172 F. Supp. 2d 1225, 1239 (D. Ariz. 2000) (holding that state disbursement of 150 dollars per Limited English Proficient student violated the EEOA by providing insufficient English instruction for students not proficient in English); U.S. DEP’T OF JUST., AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE LEWISTON, ME SCHOOL DEPARTMENT 3-4 (2010), available at http://www.justice.gov/crt/about/edu/documents/Lew istonAgree.pdf); Letter from March Roosevelt, Superintendent of Pittsburgh Pub. Schools, to Michael Branigan, U.S. Dep’t of Educ. (May 15, 2006) (on file with author) (listing actions district will take to provide required services to Somali-speaking students); see also Morales v. Shannon, 516 F.2d 411, 415 (5th Cir. 1975) (holding that failure to take appropriate actions to overcome language barriers is unlawful); Martin Luther King Jr. Elementary Sch. Child. v. Ann Arbor Sch. Dist. Bd., 473 F. Supp. 1371, 1390-91 (E.D. Mich. 1979) (holding that school district is obligated to develop a program to assist teachers to take home language into account in addressing children’s reading problems). 183. 20 U.S.C. §§ 1400–1410 (2012). 184. Pub. L. 93-112, § 504, 87 Stat. 355, 394 (1973) (codified at 29 U.S.C. § 794 (2006)). 185. 42 U.S.C. §§ 12131–12165 (2006). 186. See, e.g., U.S. DEP’T OF EDUC., 29TH ANNUAL REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE INDIVIDUALS WITH DISABILITIES EDUCATION ACT, 2007 123, 129 (2010) (noting that on average, across all fifty states and the District of Columbia, 1.81% of black students ages six through twenty-one were labeled mentally retarded, and 1.37% were labeled emotionally disturbed, whereas white students in that age range were given those labels nearly three times less often). 187. See, e.g., KIM ET AL., supra note 135, at 54 (“Racial disparities are most pronounced among those students who are educated in regular schools but in settings that are separate from their nondisabled peers for more than 60 percent of the school day.”). Systematic segregation from mainstream education can also occur when students of color with disabilities are disproportionately punished with out-of-school suspension. LOSEN & GILLESPIE, supra note 136, at 12-21 (noting that students of color with special needs “face double the risk” for suspension compared with their non-disabled peers). 870 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 bled black students are disciplined more frequently and more severely than their white counterparts.188 And disabled black students receive supports and services that are inferior to those given to their white counterparts.189 The IDEA guarantees children with disabilities a free and appropriate public education in the least restrictive environment and in accordance with an individualized education plan;190 requires states to make affirmative efforts to identify children with disabilities;191 prohibits schools from disciplining disabled students without first establishing that the student’s conduct was not a manifestation of his or her disability;192 and requires schools to put together a behavior intervention plan when the misconduct at issue was in fact a manifestation of a disability.193 Section 504 of the Rehabilitation Act of 1973 prohibits recipients of federal funding from discriminating on the basis of disability, and Title II prohibits such discrimination by public schools and state departments of education regardless of the receipt of federal funding.194 Advocates have had success filing challenges under a number of these provisions.195 188. See, e.g., KIM ET AL., supra note 135, at 170 n.22 (noting black students represented nearly half of all of the reported suspensions longer than ten days in 2005 for students with disabilities); DANIEL J. LOSEN & TIA ELENA MARTINEZ, THE C.R. PROJECT, OUT OF SCHOOL & OFF TRACK: THE OVERUSE OF SUSPENSIONS IN AMERICAN MIDDLE AND HIGH SCHOOLS 11 (2013) (finding that 36% of all black male students with disabilities enrolled in middle and high schools were suspended at least once in 2009-2010, compared to 17% for white males with disabilities, and 6% for white females with disabilities). 189. David Osher et al., Schools Make a Difference: The Overrepresentation of African American Youth in Special Education and the Juvenile Justice System, in RACIAL INEQUITY IN SPECIAL EDUCATION 93, 93-116 (Daniel J. Losen & Gary Orfield eds., 2002). 190. 20 U.S.C. §1414 (2012). 191. § 1412(a)(3)(A). 192. 34 C.F.R. § 300.530(c), (e)(1)-(2) (2013). 193. Id. § 300.530(f)(1)(i)-(ii). 194. 42 U.S.C. §§ 12131–12165 (2006); Pub. L. 93-112, § 504, 87 Stat. 355, 394 (codified at 29 U.S.C. § 794 (2006)). 195. See, e.g., Schmelzer v. New York, 363 F. Supp. 2d 453, 461 (E.D.N.Y. 2003) (denying summary judgment under Rehabilitation Act because plaintiffs failed to prove discrimination against disabled children but granting injunctive relief under IDEA); Corey H. v. Bd. of Educ. of Chi., 995 F. Supp. 900, 918 (N.D. Ill. 1998) (granting injunctive relief under IDEA for class of disabled children in Chicago); Order Preliminary Approving Settlement, Directing Notice to the Class and Setting a Hearing on Proposed Settlement, Ray M. v. Bd. of Educ. of N.Y.C., 884 F. Supp. 696 (E.D.N.Y. 1995) (No. 94 Civ. 1103 (EHN)/(JLC)) (providing preliminary approval of settlement in case involving disabled preschool students who had not been evaluated for special education services in their native language); Settlement Agreement, Kina K. ex rel. Jamie S. v. Milwaukee Bd. of Sch. Dirs., No. 01-C-0928 (E.D. Wis. Feb. 27, 2008); Settlement Agreement at 1, P.J. v. Conn., Bd. of Educ., Civil Action No. 291CV00180 (RNC) (D. Conn. filed May 31, 2002) (settling IDEA case that covered all mentally retarded school-aged children in Connecticut). 2014] THE NEW RACIAL JUSTICE 871 The McKinney Vento Act provides education protections for students who are homeless or in foster care, requiring that: students who fall under its ambit be permitted to attend either their local school or school of origin (and be provided transportation if they wish to stay at their school of origin); such students be permitted to enroll at a new school even if unable to produce documents such as proof of residency or medical records; and such students receive services under Title I, Part A, of NCLB.196 Although statistics on the racial composition of homeless students are hard to come by, there is evidence that children under eighteen form a disproportionate percentage of the homeless population, which is in turn disproportionately of color.197 Reformers have had success filing claims under the McKinney Vento Act, particularly in the aftermath of natural disasters such as Hurricane Katrina.198 3. Beyond the School-to-Prison Pipeline—Lessons for Other Claims When statutory relief is available, it is a powerful resource for advocates seeking to address racial disparities. Reformers in the school-to-prison pipeline context have had the greatest success when they have based their claims not on disparate impact, but rather on statutory rights to which anyone would be entitled—a legislative equivalent to the “liberty-based claim” referred to by Yoshino and others. The statutory and regulatory regime is complex and wide-ranging. This Part covered only a handful of federal statutes relevant for pipeline purposes, but reformers seeking to address any sort of racial disparity look to state statutes as well. And even where there is no private right of action under a particular statute, the history of school-to-prison pipeline reform demonstrates that relief may nevertheless be available through work with government agencies or branches leveraging the statutory entitlements. 196. 42 U.S.C. § 11432(g)(1)(J)(iii)(I), (g)(3)(C)(i), (g)(4)(A)-(B) (2006). 197. See, e.g., Who Is Homeless?, NAT’L COAL. FOR THE HOMELESS (July 2009), http://nationalhomeless.org/factsheets/who.html (noting that in 2003, children under eighteen comprised 39% of the homeless population and that a survey of twenty-five cities in 2006 indicated that the sheltered homeless population was 42% African-American). 198. See, e.g., Order at 1-2, Boisseau v. Picard, Civil Action No. 07-00565 (E.D. La. Jan. 7, 2008) (dismissing case following settlement of claims on behalf of children made homeless by Hurricane Katrina); see also Permanent Injunction at 1, Bullock v. Bd. of Educ. of Montgomery Cnty., Civil Action No. DKC02CV798 (D. Md. Mar. 28, 2005) (enjoining school district to permit homeless children to attend any school in the feeder system for the school the student attended prior to homelessness, and to provide transportation services). 872 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 Where explicitly race-based statutory protections are available, reformers do and should make use of those protections. For example, the ACLU’s Racial Justice Project recently sued Morgan Stanley for the disparate impact its sub-prime lending practices had on people of color in Detroit, relying primarily on the federal Fair Housing Act and the Equal Credit Opportunity Act, which prohibit racial discrimination in residential real estate and credit transactions.199 But the availability of federal statutory relief for claims based on racial disparity in the absence of discriminatory intent appears to be on the wane. Indeed, lower court skepticism about the substantive merit of claims under section 5 of the Voting Rights Act (an Act grounded in the Fifteenth Amendment and containing protections explicitly designed to protect racial minorities),200 has recently given way to a Supreme Court decision that holds section 4 of the Act unconstitutional.201 This Part catalogs some of the ways one group of reformers has attempted to address this problem and urges those who have not previously considered racially neutral statutory claims to do so. C. Immigration, Structural Arguments, and Racial Animus Over the last decade, a number of states and localities have crafted legislation designed to discourage undocumented workers from entering their jurisdictions and to encourage those already present to leave. The bills passed typically contain some combination of the following provisions:202 prohibitions on transporting or concealing un199. Class Action Complaint at 1-3, Adkins v. Morgan Stanley, No. 12 CIV 7667(HB), 2013 WL 3835198 (S.D.N.Y. Oct. 15, 2012). The case survived a motion to dismiss. Adkins v. Morgan Stanley, No. 12 Civ. 7667(HB), 2013 WL 3835198 (S.D.N.Y. July 25, 2013). 200. See, e.g., South Carolina v. United States, 898 F. Supp. 2d 30, 39 (D.C. Cir. 2012) (upholding South Carolina Voter Identification Act under section 5 of the Voting Rights Act); Florida v. United States, 885 F. Supp. 2d 299, 321-22, 353 (D.D.C. 2012) (denying claim that change in voting procedures would have retrogressive effect on minority voters in violation of Voting Rights Act and finding procedures were not enacted with discriminatory purpose); Perez v. Texas, 891 F. Supp. 2d 808, 834-35 (W.D. Tex. 2012) (denying claim that congressional redistricting constituted impermissible racial gerrymander in violation of Voting Rights Act). But see Texas v. Holder, 888 F. Supp. 2d 113, 143-44 (D.C.C. 2012) (denying motion state request for declaratory judgment that voter identification law did not violate the Voting Rights Act), vacated and remanded, 133 S. Ct. 2886 (2013). 201. Shelby Cty. v. Holder, No. 12-96, slip op. at 24 (U.S. June 25, 2013). In so holding, the Court repeatedly emphasized its view that minority voters no longer suffer any disparate impact as a result of state and local voting laws. See id. at 4 (“Census Bureau data indicate that African-American voter turnout has come to exceed white voter turnout in five of the six States originally covered by §5, with a gap in the sixth State of less than one half of one percent.”). 202. This list is by no means comprehensive. According to the National Conference on State Legislatures, lawmakers in forty-six states and the District of Columbia introduced 948 bills and resolutions related to immigration, and enacted 114 of those bills and adopted 2014] THE NEW RACIAL JUSTICE 873 documented workers,203 inducing an undocumented worker to enter the state,204 and/or hiring an undocumented worker;205 requirements related to documentation immigrants must produce or can use to verify the lawfulness of their presence in the jurisdiction;206 providing for additional state penalties for violating federal law;207 and/or authorizing local law enforcement to determine whether a person is removable or detainable under federal law.208 This Part will explore 92 of those resolutions in the first half of 2012 alone. This flurry of activity actually marked a decline from 2011. 2012 Immigration-Related Laws and Resolutions in the States (January 1 – June 30, 2012), NAT’L CONF. ON ST. LEGS. (Aug. 6, 2012), http://www.ncsl.org/issuesresearch/immig/2012-immigration-related-laws-and-resolutions.aspx. 203. See, e.g., Fremont, Neb., Ordinance 5165 (June 21, 2010) (prohibiting the harboring of an illegal alien); H.R. 87, § 7, 151st Gen. Assemb., 2011 Reg. Sess. (Ga. 2011) (codified at GA. CODE ANN. § 16-11-200 (West 2014)) (prohibiting the transport or movement of an illegal alien “for the purpose of furthering the illegal presence of the alien in the United States” and the concealment or harboring of an illegal alien); H.R. 56, § 13, 2011 Reg. Sess. (Ala. 2011) (codified at ALA. CODE § 31-13-13(a)(1), (3) (2014)) (prohibiting the concealment, harboring or shielding from detection of any alien, as well as transporting an alien “in furtherance of the unlawful presence of the alien”); S. 20, § 4, 119th Gen. Assemb., Sess. (S.C. 2011) (codified at S.C. CODE ANN. § 16-9-460 (2014)) (making it a state crime for unlawfully present persons to shelter, harbor or transport themselves). 204. ALA. CODE § 31-13-13(a)(2) (2014); H.R. 87, § 7 (codified at GA. CODE ANN. § 16-11202(b) (West 2014)) (prohibiting people from inducing an illegal alien to enter into Georgia). 205. ALA. CODE § 31-13-11(a) (2014) (criminalizing an unauthorized alien’s application for, solicitation of, or performance of work); ARIZ. REV. STAT. ANN. § 13-2928(C) (2014) (making it a misdemeanor for an unauthorized alien to seek or engage in work in the state); Fremont, Neb., Ordinance 5165, § 5(C) (June 21, 2010) (requiring employers to execute an affidavit that they have not knowingly employed any unauthorized aliens); S. 20, § 2 (codified at S.C. CODE ANN. § 8-14-10(9) (2014)) (creating sanctions on employers who knowingly hire unauthorized aliens). 206. ARIZ. REV. STAT. ANN. § 11-1051(B) (2014) (requiring officers in some circumstances to verify immigration status when conducting a stop, detention, or arrest); H.R. 87, § 8 (codified at GA. CODE ANN. § 17-5-100(b) (West 2014)) (authorizing but not requiring state officials to conduct inquiry into immigration status); S. 590, § 18, 117th Gen. Assemb., First Reg. Sess. (Ind. 2011) (codified at IND. CODE § 34-28-8.2-2 (2013)) (making it an infraction to knowingly offer or accept a consular identification card as a valid form of identification). 207. ALA. CODE § 31-13-10(a) (2014) (also making failure to comply with federal alien registration requirements a state misdemeanor); ARIZ. REV. STAT. ANN. § 13-1509 (2014) (making failure to comply with federal alien registration requirements a state misdemeanor); S. 20, § 5 (codified at S.C. CODE ANN. § 16-17-740 (2014)) (also making failure to comply with federal alien registration requirements a state misdemeanor). 208. ALA. CODE § 31-13-12(a) (2014) (requiring officers to determine immigration status when officer has reasonable suspicion a lawfully seized individual is unlawfully present); ARIZ. REV. STAT. ANN. § 13-3883(A)(5) (2014) (authorizing local law enforcement to arrest without a warrant a person “the officer has probable cause to believe . . . has committed any public offense that makes the person removable from the United States”); GA. CODE ANN. § 17-5-100(e) (West 2014) (authorizing local law enforcement to detain unauthorized aliens, to transport them to a detention facility, and/or to notify the Department of Homeland Security); S. 590, § 19 (codified at IND. CODE § 35-33-1-1(a)(11), (12), (13) (2013)) (authorizing officials to make warrantless arrests of individuals when the officer has a removal order issued by an immigration court, a detainer or notice of action issued by the Department of Homeland Security, or the officer has probable cause to believe the person 874 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 the traditional equal protection claims available to combat any disparate racial impact these bills may have and identify the nontraditional legal challenges reformers have brought to bear in lieu of, or in addition to, equal protection claims. 1. The Disparate Impact Setting aside the facial classifications on the basis of citizenship or alienage presented by these bills, this type of legislation also presents the type of racial disparate impact problem in which this Article is primarily interested. The reform response to these bills is animated largely by a suspicion that their enforcement will disproportionately target undocumented people of color, and more broadly, all persons who look Latino, regardless of actual ethnic heritage or legal status.209 A number of these immigration bills contain provisions calculated to inoculate the laws from traditional equal protection challenges by specifically prohibiting consideration of race, color, or national origin except as authorized by state and federal constitutions, and by requiring that implementation be consistent with federal laws governing civil rights.210 They explicitly disavow discriminatory intent and thus seek to foreclose any cause of action via Washington v. Davis. Although there may be some atmospheric evidence of discriminatory intent, reformers seeking to combat the anticipated racial disparate impact have had to think beyond the Equal Protection Clause.211 has been indicted for or convicted of one or more aggravated felonies); Fremont, Neb. Ordinance 5165, § 4(D) (June 21, 2010) (requiring city police to verify immigration status of building occupants who have not declared themselves to be U.S. citizens and to revoke occupancy licenses for unauthorized aliens); S. 20, § 6 (codified at S.C. CODE ANN. § 17-13170(A) (2014)) (requiring officers to determine immigration status when there is reasonable suspicion a person being stopped or arrested is present unlawfully). 209. See, e.g., State Anti-Immigration Laws, AM. C.L. UNION, http://www.aclu.org/ immigrants-rights/state-anti-immigrant-laws (last visited June 29, 2014) (“Laws inspired by Arizona’s SB 1070 invite rampant racial profiling against Latinos, Asian-Americans and others presumed to be ‘foreign’ based on how they look or sound.”). 210. ARIZ. REV. STAT. ANN. § 11-1051(B), (L) (2014); H.R. 87, § 8 (codified at GA. CODE ANN. § 17-5-100(d) (West 2014)), 2011 Ga. Laws 794, 805. 211. See, e.g., Cent. Ala. Fair Hous. Ctr. v. Magee, 835 F. Supp. 2d 1165, 1192-93 (M.D. Ala. 2011) (stating that legislative history shows discriminatory intent behind Alabama immigration laws). 2014] THE NEW RACIAL JUSTICE 875 2. The Reform Response (a) Facial Classification Based on Alienage As a whole, immigration-related bills, like problems with state public defense systems and the school-to-prison pipeline, have not proven particularly amenable to equal protection challenges.212 The bills largely target undocumented immigrants, who do not qualify as a protected class and thus receive only rational basis review under traditional equal protection analysis.213 To the extent that advocates have attempted to make claims based upon disparate racial impact, they have been foreclosed by the problem at the heart of this Article: the requirement of discriminatory intent.214 The legislation has presented reformers seeking to combat racial disparity with some low-hanging fruit, however. First, unlike the previous two types of state action described, the immigration-related bills sometimes present a facial classification based upon alienage (citizenship), which is a protected class entitled to heightened scrutiny.215 Discrimination on the basis of citizenship or nationality is often inextricably linked with discrimination on the basis of race. Second, although state action involving the classification of undocumented adult aliens receives only rational basis review, it still must survive at least that minimal level of scrutiny.216 And finally, the undocumented children of undocumented aliens may qualify for some additional protections under the Fourteenth Amendment.217 At least some of the bills in question have proven vulnerable on each of these fronts. It is worth noting that although these successful claims rely on the Equal Protection Clause, they rely on a raceneutral aspect of the Clause. In Buquer v. Indianapolis,218 for example, the court found that a provision barring use of consular identification cards as valid identification did not satisfy rational basis review under equal protection analysis because it was “designed simply 212. See, e.g., Keller v. City of Fremont, 853 F. Supp. 2d 959, 975 (D. Neb. 2012) (rejecting equal protection challenge to various immigration related bills because city articulated a rational basis for the different treatment afforded adults who are lawfully present and those who are not). 213. Plyler v. Doe, 457 U.S. 202, 216 (1982). 214. See, e.g., Keller, 853 F. Supp. 2d at 982 (holding plaintiffs failed to state a claim based upon disparate impact, because they failed to show discriminatory intent). 215. Graham v. Richardson, 403 U.S. 365, 371-72 (1971). 216. See Plyler, 457 U.S. at 223-25. 217. Id. at 216-17. 218. 797 F. Supp. 2d 905 (S.D. Ind. 2011). 876 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 to target foreign nationals.”219 Similarly, in Hispanic Interest Coalition of Alabama v. Governor of Alabama,220 the Eleventh Circuit found that a state requirement that elementary and secondary schools determine the immigration status of students violated Equal Protection because the asserted state interest in collecting such information was insufficiently compelling and would impermissibly burden the right of such children to obtain an education.221 In Ruiz v. Robinson,222 the Southern District of Florida found unconstitutional a state law that denied in-state tuition benefits to U.S. citizen students who could not prove the federal immigration status of their parents.223 The court reasoned that the facial classification upon which the statute rested (between U.S.-citizen students who could provide immigration papers for their parents versus those who could not) required heightened scrutiny because it punished citizen children for the acts of their parents and that the classification failed to survive that level of scrutiny.224 (b) Federal Preemption The most successful across-the-board line of attack on these types of bills has been a structural argument that these provisions are preempted by federal law. The state legislation described follows a long history of anti-immigrant legislation in this country, at least two previous waves of which the Supreme Court has also dealt with on federal preemption grounds.225 This time around, the Court ruled in Arizona v. United States that three of the four key Arizona immigration law provisions were federally preempted.226 State and local laws may be preempted in one of three ways: express preemption, in which Congress explicitly withdraws specified powers from the states via statute; field preemption, in which Congress determines that an entire area of the law must be regulated by the federal government exclusively; and conflict preemption, in which compliance with both the 219. Id. at 924. 220. 691 F.3d 1236 (11th Cir. 2012). 221. Id. at 1246-49. 222. 892 F. Supp. 2d 1321 (S.D. Fla. 2012). 223. Id. at 1333. 224. Id. at 1331. 225. See, e.g., Hines v. Davidowitz, 312 U.S. 52, 69 (1941) (finding state-imposed alien registration requirements to be federally preempted and noting that “[o]ur Constitution and our Civil Rights Act have guaranteed to aliens the equal protection of the laws which is a pledge of the protection of equal laws” (quotation marks omitted)); Chy Lung v. Freeman, 92 U.S. 275, 280 (1875) (finding California statute that required bond payment by certain foreign passengers to be federally preempted). 226. 132 S. Ct. 2492, 2510 (2012). Arizona, of course, rests firmly on the shoulders of precedent like Hines. See generally Hines, 312 U.S. 52. 2014] THE NEW RACIAL JUSTICE 877 state law and the federal law is impossible.227 In the context of immigration, the Court has often emphasized the traditional federal power to determine immigration policy and the extensive way in which Congress had already done so, occupying the field.228 In Arizona, the Court held that the state could not make “willful failure to complete or carry an alien registration document” a state misdemeanor because Congress had occupied the entire field of alien registration.229 It found the state could not prohibit aliens from applying for or soliciting work because Congress had already enacted a “comprehensive framework for ‘combating the employment of illegal aliens.’ ”230 And it found that the state could not deputize state law enforcement officials to arrest anyone who they had probable cause to believe had committed an offense that would make them removable from the United States because “[f]ederal law specifies limited circumstances in which state officers may perform the functions of an immigration officer.”231 In the wake of the Court’s decision, lower courts have found a spate of laws patterned upon those struck down in Arizona to be preempted on similar grounds.232 (c) What Remains: Disparate Impact and a Return to the Bill of Rights The Court’s opinion in Arizona essentially deferred decision on the fourth provision of the Arizona bill, which requires state officials to make a reasonable attempt to determine the immigration status of anyone stopped, detained, or arrested if there is reasonable suspicion 227. See generally Arizona, 132 S. Ct. at 2500-01 (summarizing basic preemption principles). 228. Id. at 2498-99 (“It is fundamental that foreign countries concerned about the status, safety, and security of their nationals in the United States must be able to confer and communicate on this subject with one national sovereign, not the 50 separate States.”). 229. Id. at 2501-02 (“[E]ven complementary state regulation is impermissible. Field preemption reflects a congressional decision to foreclose any state regulation in the area, even if it is parallel to federal standards.”). 230. Id. at 2504. 231. Id. at 2506. For discussion of the fourth provision of the Arizona legislation, which the Court permitted to survive, see infra Part III.C.2.c. 232. See, e.g., Ga. Latino Alliance for Hum. Rts. v. Governor of Ga., 691 F.3d 1250, 1266-67 (11th Cir. 2012); United States v. Alabama, 691 F.3d 1269, 1292 (11th Cir. 2012); Keller v. City of Fremont, 853 F. Supp. 2d 959, 973 (D. Neb. 2012). Of course, some lower courts had already invalidated similar provisions as being preempted even before the Court’s decision was announced. See, e.g., Villas at Parkside Partners v. City of Farmers Branch, 675 F.3d 802, 817 (5th Cir. 2012); United States v. South Carolina, 840 F. Supp. 2d 898, 917-24 (D.S.C. 2011); Buquer v. City of Indianapolis, 797 F. Supp. 2d 905, 920 (S.D. Ind. 2011). 878 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 that the person is an unlawfully present alien.233 Lower courts confronted by similar provisions have likewise withheld judgment.234 The Court has also refused to find preempted state statutes that require use of the federal E-Verify program to ascertain the work authorization status of employees.235 Advocates seeking to challenge these two types of state action— immigration status checks conducted by state law enforcement officials and use of E-Verify to check work authorization status—must look beyond preemption. Both of these types of legislation are facially neutral but raise potential disparate impact concerns that workers of certain races will be disproportionately subject to immigration or work authorization checks. If the enforcement of these provisions is sufficiently egregious with regard to racial impact, there is some precedent for further challenge under equal protection, but such claims are very difficult to make out.236 What remains, instead, is a return to the use of constitutional protections other than the Equal Protection Clause to vindicate racial inequality claims.237 Justice Alito acknowledges this eventuality in Arizona: “If properly implemented, [the show-your-papers provision] should not lead to federal constitutional violations, but there is no denying that enforcement of [the provision] will multiply the occasions on which sensitive Fourth Amendment issues will crop up.”238 Some state provisions have in fact already been deemed unconstitutional on Fourth Amendment and due process grounds. For example, in Buquer v. City of Indianapolis,239 the Southern District of In233. Arizona v. United States, No. 11-182, slip op. at 23-24 (U.S. June 25, 2012). The Court, it seems, did not see fit to take the invitation of a previous Court’s decision in Hines to deem such provisions similarly preempted by an implicit Congressional desire “to leave [aliens] free from the possibility of inquisitorial practices and police surveillance that might not only affect our international relations but might also generate the very disloyalty which the law has intended guarding against.” Hines v. Davidowitz, 312 U.S. 52, 74 (1941). 234. See, e.g., Ga. Latino Alliance, 691 F.3d at 1268; Alabama, 691 F.3d at 1292. But see South Carolina, 840 F. Supp. 2d at 924 (finding state equivalent immigration status check requirement preempted). 235. Chamber of Com. v. Whiting, 131 S. Ct. 1968, 1973 (2011) (upholding the Legal Arizona Workers Act of 2007, which permits state courts to suspend or revoke business licenses if an employer knowingly or intentionally employs an unauthorized alien and requires use of the federal E-Verify program). 236. It appears the Court has not struck down a restriction purely on the grounds of discriminatory enforcement since Yick Wo v. Hopkins, 118 U.S. 356 (1886). 237. See supra Part III.A.2. 238. Arizona v. United States, 132 S. Ct. 2492, 2529 (2012) (Alito, J., concurring in part and dissenting in part); cf. Hines, 312 U.S. at 71 n.32 (“The requirement that cards be carried and exhibited has always been regarded as one of the most objectionable features of proposed registration systems, for it is thought to be a feature that best lends itself to tyranny and intimidation.”). 239. 797 F. Supp. 2d 905 (S.D. Ind. 2011). 2014] THE NEW RACIAL JUSTICE 879 diana granted a preliminary injunction that enjoined enforcement of a state law provision authorizing state and local officials to conduct warrantless arrests of individuals with outstanding federal removal orders. In addition to the usual preemption problems the provision presented,240 the court found that the provision violated the Fourth Amendment because it authorized arrest for non-criminal offenses and left a “deafening silence as to what happens to the arrestee post his arrest.”241 3. Beyond Immigration—Lessons for Other Claims The immigration cases demonstrate that even where the racial animus is all but explicit, reformers still gain the most traction from racially neutral claims. This observation holds true within the more limited family of equal protection claims as well: even when the raceneutral claim is based on a factor linked to race (like citizenship), race-neutral equal protection claims are more likely to succeed than race-based claims. These cases may indicate that the more racially inflammatory the underlying facts, the more important it is to rely upon racially neutral legal claims. They also show, however, that there is life yet in the Equal Protection Clause and that reformers need not shy away from equal protection claims where they do exist, as in facial classifications on the basis of alienage.242 And finally, these cases serve as a powerful reminder that disparate racial impact may sometimes productively be challenged on multiple fronts. Reformers have made use of federal preemption in other contexts as well. In a case related to the anti-immigration legislation, the Supreme Court recently struck down an Arizona proposition that required prospective voters to present documentary proof of citizenship in order to register to vote.243 So-called “voter ID” laws like this one have a disproportionate impact on people of color,244 who are less like240. Id. at 920. 241. Id. at 918; see also id. at 918-19 (“There is no mention of any requirement that the arrested person be brought forthwith before a judge for consideration of detention or release. There is in fact a complete void within the new statute regarding all other due process protections.”). 242. Cf. Karl Manheim, State Immigration Laws and Federal Supremacy, 22 HASTINGS CONST. L.Q. 939, 1012-17 (1995) (arguing that the Court’s equal protection alienage cases are actually driven by preemption concerns). 243. Arizona v. Inter Tribal Council of Ariz., Inc., 133 S. Ct. 2247, 2260 (2013) (finding proposition preempted under the National Voting Rights Act via the Elections Clause). 244. A number of laws seeking to restrict access to voting were passed or proposed in the months leading up to the 2012 presidential election. See, e.g., ADVANCEMENT PROJECT, VOTER PROTECTION PROGRAM, Segregating American Citizenship: Latino Voter Disenfranchisement in 2012 3-4 (2012), available at www.advancementproject.org/page/-/resources/ Latino%20Report%202012.pdf (summarizing laws). 880 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 ly than whites to have government issued identification.245 In a twist on the use of federal preemption principles, the Court relied not upon preemption under the Supremacy Clause, but rather under the Elections Clause, which gives Congress the power to make or alter state regulations governing the time, place, and manner of holding federal elections.246 The Court’s decision is all the more interesting in light of the claim that the Ninth Circuit denied, under Section 2 of the Voting Rights Act, which provides explicitly race-based relief.247 The Ninth Circuit noted the need for plaintiffs seeking such relief to demonstrate that the voting practice being challenged actually results in race discrimination, with a causal connection between the practice and the discriminatory result.248 It found that plaintiffs failed to provide evidence demonstrating even the disparate impact alleged.249 Here, racial justice was again better served by the race-neutral structural protections of federalism and federal preemption than by the explicitly race-based protections conferred by federal statute. Finally, courts across the country have dealt with a variety of cases involving disparate racial impact, immigration, and/or allegations of racial animus in the post-9/11 cases. As in the other areas of law examined by this Article, the disparate racial impact implicated by these cases is relatively clear; the U.S. Government has focused almost exclusively on Muslims and predominantly Muslim countries in an effort to prevent future terrorist attacks, and largely on Middle 245. See, e.g., NAT’L CONG. OF AM. INDIANS, VOTER ID LAWS & THE NATIVE VOTE: STATES OF CONCERN 4, available at http://www.ncai.org/attachments/PolicyPaper_LaOnRbIuKyazjpiz LTzOsFxvRiBpmwxxbGVFOeCNGMFwEuLZXwz_VoterIDs_NativeVote_States_of_Concern.pdf (discussing the disparate impact voter ID laws have on Native Americans, noting, for example, that many tribal communities do not have street addresses); JON C. ROGOWSKI & CATHY J. COHEN, BLACK YOUTH PROJECT, TURNING BACK THE CLOCK ON VOTING RIGHTS: THE IMPACT OF NEW PHOTO IDENTIFICATION REQUIREMENTS ON YOUNG PEOPLE OF COLOR 1 (2012), available at http://research.blackyouthproject.com/files/2012/09/Youth-of-Color-andPhoto-ID-Laws.pdf (focusing on effect of voter ID laws on young voters who are of color); WENDY R. WEISER & LAWRENCE NORDEN, BRENNAN CTR. FOR JUST., VOTING LAW CHANGES IN 2012 24 (2011), available at https://www.brennancenter.org/page/Democracy/VRE/ Brennan_Voting_Law_V10.pdf (noting that “as many as 25% of African-American voters do not possess a current and valid form of government issued photo ID, compared to 11% of voters of all races”). 246. Inter Tribal Council of Ariz., Inc., 133 S. Ct. at 2257. 247. 42 U.S.C. § 1973(a) (2006) (prohibiting states from imposing voting qualifications that “result[] in a denial or abridgement of the right of any citizen of the United States to vote on account of race or color”). 248. Gonzalez v. Arizona, 677 F.3d 383, 405 (9th Cir. 2012). 249. Id. at 407. 2014] THE NEW RACIAL JUSTICE 881 Eastern citizens and countries.250 Those seeking to challenge directly the racial justice implications of racial profiling or special registration requirements, however, have met with little success when relying on claims driven purely by equal protection.251 Race-neutral claims, brought under the writ of habeas corpus, due process, and/or federal statutes or treaties, have proven more fruitful.252 IV. CONCLUSION The scenarios of racial inequality discussed above were neither intentionally created by a racist government cabal nor the result of bad state actors engaged in intentional discrimination. They arose, instead, out of what some scholars have identified as structural racism: the development of social institutions over time, through myriad government choices and actions.253 The resulting structural inequality is impossible to eradicate via the elimination of a single government policy or targeted firings of racist employees. This new racial injustice is difficult, if not impossible, to combat under the Court’s reading of the Equal Protection Clause, which requires the ill intent of a bad government actor, that is, the racist government employee. It requires, moreover, a structural solution. While much of contemporary equal protection scholarship has focused on how to extend the protections of the Equal Protection Clause to new groups like lesbian women and gay men, this Article returns to the paradigmatic application of the clause to prohibit classifications based upon race.254 It offers an exploration of the many ways reform250. See, e.g., U.S. DEP’T OF ST., NATIONAL STRATEGY FOR COMBATING TERRORISM 2 (Sept. 2006), http://2001-2009.state.gov/s/ct/rls/wh/71803.htm (describing counter-terrorism strategy and focusing on threat from radical Islamists in the Middle East). 251. See, e.g., Ashcroft v. Iqbal, 556 U.S. 662, 682-83 (2009) (dismissing complaint for failing to allege facts showing petitioners “purposefully adopted a policy of classifying postSeptember-11 detainees as ‘of high interest’ because of their race, religion, or national origin”); Rajah v. Mukasey, 544 F.3d 427, 438-39 (2d Cir. 2008) (denying equal protection challenge to special registration requirements that applied only to adult male citizens of Muslim majority states and North Korea because there was a rational national-security basis for the program). 252. See, e.g., Boumediene v. Bush, 553 U.S. 723, 798 (2008) (holding that aliens held as enemy combatants were entitled to habeas corpus hearings to challenge their detentions); Hamdan v. Rumsfeld, 548 U.S. 557, 567 (2006) (finding proposed military commissions violated Uniform Code of Military Justice and did not satisfy Geneva Conventions); Hamdi v. Rumsfeld, 542 U.S. 507, 537-38 (2004) (requiring that citizen held as enemy combatant be given meaningful opportunity to contest his detention pursuant to the Due Process Clause). 253. See supra note 42. 254. This includes, of course, Yoshino’s article. Yoshino, supra note 9; see also Ball, supra note 58, at 9-12 (discussing liberty and equality based claims in context of gay rights); Tribe, supra note 48. 882 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:835 ers have found to fill the gaps wrought in the Equal Protection Clause by Davis and its progeny, and it demonstrates that reformers largely (and long ago) abandoned explicitly race-based claims, relying instead on other guarantees contained in the Bill of Rights, statutory claims, and federal structural arguments. This Article is largely a descriptive project. It takes as a given existing Court doctrine and recognizes—as reformers working on the ground already have—that different paths can be taken to achieve equality. But this description of today’s fight for racial equality helps to illuminate what equality more generally might resemble in the coming years, and whether and to what extent the Equal Protection Clause will even be relevant. Facially neutral policies with a disparate racial impact will likely be a fact of life for some time. The continued vitality of the Equal Protection Clause has perhaps never been in greater question, not just for race, but for other groups seeking equality as well. The hardfought lessons racial justice reformers have learned over the years may soon be relevant for others seeking to challenge disparate impact claims. This Article seeks to demonstrate that government policies creating such impact are not beyond the reach of the law. The workarounds identified herein do not present a solution to every racial inequality—sometimes a political solution may be more appropriate. But where a judicial fix is feasible, these workarounds point the way towards a new racial justice. NATIONAL SECURITY RULEMAKING ROBERT KNOWLES* ABSTRACT Agencies performing national security functions regulate citizens’ lives in increasingly intimate ways. Yet national security rulemaking is a mystery to most Americans. Many rules—like those implementing the National Security Agency’s vast surveillance schemes— remain secret. Others are published, but the deliberations that led to them and the legal justifications for them remain hidden. Ordinarily, these rules would undergo the Administrative Procedure Act’s notice-andcomment process, which has earned wide, if not universal, praise for advancing democratic values and enhancing agency effectiveness. But a national security exception from noticeand-comment in the APA itself, along with the overuse of classification authority, combine to insulate most national security rulemaking from public scrutiny and meaningful judicial review. The result is a national security administrative state that is insular and unaccountable to the public. Some scholars find this exceptional treatment inevitable, while others have proposed reforms. But no one has sought to provide a full accounting of national security rulemaking’s scope and historical origins. By doing so, this Article demonstrates that the APA exception is historically contingent—a response to the rise of totalitarian states and the Second World War. As a product of its time rather than an essential attribute of all administrative law systems, it is a relic in a globalized world in which the foreign and the domestic are increasingly intertwined, and the line between national security and ordinary rulemaking therefore begins to fade entirely. This Article suggests reforms that would increase public deliberation in national security rulemaking, while accounting for the importance of secret-keeping when truly necessary. Among these proposed reforms is a change to the current practice allowing national security agencies to invoke the security exception to notice-and-comment after a rule is challenged in court, rather than at the notice-and-comment stage itself. These reforms would improve the current rulemaking practice, which undermines the transparency necessary for effective democratic participation. I. INTRODUCTION .................................................................................................. II. OUR BIFURCATED ADMINISTRATIVE STATE ....................................................... A. The Importance of Notice-and-Comment Rulemaking .............................. B. The Constitutional Dimension of Notice-and-Comment............................ C. Secrecy and the National Security Exception ............................................ III. THE SCHMITTIAN VIEW OF NATIONAL SECURITY RULEMAKING ........................ IV. THE HISTORICAL ROOTS OF NATIONAL SECURITY RULEMAKING ...................... V. REFORMING NATIONAL SECURITY RULEMAKING .............................................. A. Eliminating the National Security Rulemaking Exception ....................... B. Encouraging Notice-and-Comment Rulemaking as a Best Practice ......... C. Establishing a Chenery-Type Rule for Invoking the National Security Exception .................................................................................................... VI. CONCLUSION ..................................................................................................... 884 892 894 899 903 914 919 932 935 938 941 943 * Assistant Professor, Valparaiso University Law School. I must thank Anne O’Connell, Barry Sullivan, Christopher Schmidt, Evan Criddle, David Herzig, Stuart Ford, Rachel Levinson-Waldman, D.A. Jeremy Telman, Margaret Kwoka, Kati Kovacs, Anjali Dalal, Catherine Deane, Neha Lall, Kavita Warrier, Marc Falkoff, and participants in workshops at Loyola University Chicago School of Law, Chicago-Kent College of Law, and the John Marshall Law School for helpful comments and advice. I also must thank Erin Edwards for excellent research assistance and Scott Rafferty, Director of Research and Policy at the Administrative Conference of the United States, for his valuable guidance. 884 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 “There are exceptions. If they cannot be explained, then the universal cannot be explained, either.”1 I. INTRODUCTION In 2013, a series of leaks and disclosures revealed that the National Security Agency (NSA) conducts mass surveillance of Americans’ private electronic information on an unprecedented scale.2 The content of e-mails, web searches, and phone calls of millions are regularly stored in databases, along with the metadata3 for such communications of hundreds of millions.4 Under certain rules—many still secret—agencies such as the FBI and DOJ may access these records to investigate unlawful activity by foreigners.5 But the difference between “foreign” and “American” often hangs on low-level NSA analysts’ judgment calls or search algorithms.6 And if these investigations 1. SØREN KIERKEGAARD, FEAR AND TREMBLING/REPETITION 227 (Howard V. Hong & Edna H. Hong trans., Princeton University Press 1983) (1843). 2. The legal authorization for much of this surveillance was obtained by the FBI and the Department of Justice. See Barton Gellman & Laura Poitras, U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program, WASH. POST (June 7, 2013), http://www.washingtonpost.com/investigations/us-intelligence-mining-datafrom-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e28845-d970ccb04497_story.html. 3. Metadata is not the content of a record or communication but the information about it, such as the time, date, and parties involved. See Jane Mayer, What’s the Matter with Metadata?, NEW YORKER (June 6, 2013), http://www.newyorker.com/ online/blogs/newsdesk/2013/06/verizon-nsa-metadata-surveillance-problem.html. However, metadata is often more useful for information-gathering than the content itself. See id. 4. See James Bamford, They Know Much More Than You Think, N.Y. REV. BOOKS (Aug. 15, 2013), http://www.nybooks.com/articles/archives/2013/aug/15/nsa-they-knowmuch-more-you-think/?pagination=false (observing that metadata of telephone communications of “hundreds of millions of Americans” had been collected); Barton Gellman, U.S. Surveillance Architecture Includes Collection of Revealing Internet, Phone Metadata, WASH. POST (June 15, 2013), http://articles.washingtonpost.com/2013-06-15/news/39993852_ 1_comey-national-intelligence-intelligence-collection (describing the PRISM and NUCLEON Programs, which collect Internet and phone call content, respectively); Siobhan Gorman, Evan Perez & Janet Hook, U.S. Collects Vast Data Trove, WALL ST. J. (June 7, 2013), http://online.wsj.com/news/articles/SB10001424127887324299104578529112289298922 (describing the collection of phone and credit card transaction metadata); Glenn Greenwald, NSA Collecting Phone Records of Millions of Verizon Customers Daily, GUARDIAN (London) (June 5, 2013), http://www.theguardian.com/world/2013/jun/06/nsa-phonerecords-verizon-court-order (same); Glenn Greenwald & Spencer Ackerman, How the NSA is Still Harvesting Your Online Data, GUARDIAN (London) (June 27, 3013), http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection (describing the collection of Internet metadata). 5. See Gellman & Poitras, supra note 2. 6. See William C. Banks, Programmatic Surveillance and FISA: Of Needles in Haystacks, 88 TEX. L. REV. 1633, 1634 (2010) (“Instead of building toward an individual FISA application by developing leads on individuals with some connection to an international terrorist organization . . . officials now develop algorithms that search thousands or even millions of collected e-mail messages and telephone calls for indications of suspicious activities.”); Glenn Greenwald & James Ball, The Top Secret Rules That Allow NSA to Use US 2014] NATIONAL SECURITY RULEMAKING 885 uncover illegal activity by Americans—even inadvertently—the information is passed to other agencies for investigation and prosecution.7 This surveillance is far broader and deeper than previously understood.8 But it is also, to the surprise of many, arguably lawful.9 The USA PATRIOT Act10 and the updated Foreign Intelligence Surveillance Act (FISA)11 give agencies wide discretion to obtain and search private electronic files.12 The government claims that publicly availa- Data Without a Warrant, GUARDIAN (London) (June 20, 2013), http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant. 7. See Greenwald & Ball, supra note 6. The DEA has a secretive Special Operations Unit (SOP) that funnels information from intelligence databases to law enforcement agencies, which use it to launch investigations but do not disclose how these investigations begin. See John Shiffman & Kristina Cooke, Exclusive: U.S. Directs Agents to Cover Up Program Used to Investigate Americans, REUTERS (Aug. 5, 2013), http://www.reuters.com/ article/ 2013/08/05/us-dea-sod-idUSBRE97409R20130805. 8. For a history of the NSA’s surveillance of Americans in the first decade after the September 11 attacks, see generally JAMES BAMFORD, THE SHADOW FACTORY: THE ULTRASECRET NSA FROM 9/11 TO THE EAVESDROPPING ON AMERICA (2008). 9. See, e.g., OFFICE OF THE DIR. OF NAT’L INTELLIGENCE, DNI STATEMENT ON RECENT UNAUTHORIZED DISCLOSURES OF CLASSIFIED INFORMATION (2013), available at http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dnistatement-on-recent-unauthorized-disclosures-of-classified-information (defending the leaked surveillance program as having “been authorized by all three branches of the Government”). 10. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001, Pub. L. No. 107-56, 115 Stat. 272. 11. Foreign Intelligence Surveillance Act of 1978, 50 U.S.C. §§ 1801–1855 (2006). FISA was amended in 2008 to update and expand legal authority to search electronic information. FISA Amendments Act of 2008, Pub. L. No. 110-261, § 102, 122 Stat. 2436, 2459-60 (codified at 50 U.S.C. § 1812). 12. The government has not disclosed its complete legal justification for the NSA’s programs, but some of the provisions that have been or may be relied on include USA PATRIOT Act § 216, 18 U.S.C. § 3127(3) (2012) (expanding the availability of “pen register” devices to encompass interception of internet metadata); USA PATRIOT Act § 214, 50 U.S.C. § 1842(c) (2006) (lowering the standard for obtaining internet metadata so that the FBI need only certify to the Foreign Intelligence Surveillance Court (FISC) that the information likely to be obtained is “relevant to an ongoing investigation to protect against international terrorism or clandestine intelligence activities”); USA PATRIOT Act § 21, 50 U.S.C. § 1861 (2006) (the so-called “business records” provision, apparently interpreted by the FISC, in a secret opinion, to authorize the FBI to obtain all of a carrier’s phone metadata, see David Cole, Can Privacy Be Saved?, N.Y. REV. BOOKS (Mar. 6, 2014), http://www.nybooks.com/articles/archives/2014/mar/06/can-privacy-be-saved/?pagination= false); and FISA Amendments Act § 702, 50 U.S.C. § 1881a (2006) (allowing the government to acquire foreign intelligence by obtaining the content of communications by nonU.S. persons “reasonably believed” to be outside U.S. borders, and interpreted to authorize the collection of phone and Internet content of Americans in the process). 886 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 ble regulations13 and executive orders14 authorize parts of the controversial program. The Foreign Intelligence Surveillance Court (FISC), through secret orders, approved some aspects.15 But most rules implementing the program were developed and approved internally by agencies through secret rulemaking. Leaks or public pressure eventually forced disclosure of many rules, but secrecy still enshrouds the processes that led to them and even the legal authority for them.16 Secret rulemaking makes up a growing portion of the federal government’s “legislative” rules—those that, among other things, prescribe rights or duties and fill statutory gaps—which have the force of law.17 Yet under fundamental administrative law principles enu13. See NSA, UNITED STATES SIGNALS INTELLIGENCE DIRECTIVE 18: LEGAL COMPLIANCE AND MINIMIZATION PROCEDURES (1993), available at http://www.gwu.edu/~ns archiv/NSAEBB/NSAEBB23/07-01.htm (prescribing NSA safeguards for protecting constitutional rights of U.S. persons and regulating the collection, processing, and dissemination of information concerning U.S. persons); U.S. DEP’T OF JUSTICE, THE ATTORNEY GENERAL’S GUIDELINES FOR DOMESTIC FBI OPERATIONS 16 (2008), available at http://www.justice.gov/ag/readingroom/guidelines.pdf (authorizing agents to engage in proactive intelligence gathering in a manner “not limited to ‘investigation’ in a narrow sense”); U.S. DEP’T OF DEF., DIRECTIVE 5240.1-R, PROCEDURES GOVERNING THE ACTIVITIES OF DOD INTELLIGENCE COMPONENTS THAT AFFECT UNITED STATES PERSONS (1982), available at http://www.dtic.mil/whs/directives/ corres/pdf/524001r.pdf (regulating the role of DoD personnel and resources in the NSA programs). 14. Executive Order 12,333 authorizes the NSA to collect “foreign intelligence or counterintelligence” information while not “acquiring information concerning the domestic activities of United States persons.” Exec. Order No. 12,333, 3 C.F.R. 200, 211 (1981). This executive order was most recently amended by Executive Order 13,470, 3 C.F.R. 218, 229 (2008), which authorizes the NSA to “[p]rescribe . . . security regulations” consistent with its authority. 15. See Eric Lichtblau, In Secret, Court Vastly Broadens Powers of N.S.A., N.Y. TIMES (July 6, 2013), http://www.nytimes.com/2013/07/07/us/in-secret-court-vastly-broadenspowers-of-nsa.html?pagewanted=all&_r=0. FISA created the FISC to oversee requests for surveillance warrants against suspected foreign intelligence agents inside the United States by federal law enforcement agencies. See id. The FISC has been widely criticized for its extreme deference to agencies and overly broad interpretations of statutory authority. See, e.g., Letter from F. James Sensenbrenner, Jr., Congressman, U.S. House of Representatives, to Eric Holder, Attorney Gen., U.S. Dep’t of Justice (Sept. 6, 2013), available at http://sensenbrenner.house.gov/uploadedfiles/sensenbrenner_letter_to_attorney_general_er ic_holder.pdf (noting objections by the Patriot Act’s principal author to overly broad interpretations used to justify the NSA programs); infra Part II.C. 16. See, e.g., Samuel J. Rascoff, Domesticating Intelligence, 83 S. CAL. L. REV. 575, 632 (2010) (noting that the Attorney General Guidelines regulating domestic intelligencegathering by the FBI were traditionally kept secret but are now available online); Gellman & Poitras, supra note 2 (describing secret rules instructing NSA analysts to enter search terms “that are designed to produce at least 51 percent confidence in a target’s ‘foreignness’ ”); Shiffman & Cooke, supra note 7 (describing secret documents regulating the DEA’s Special Operations Division’s use of electronic information). 17. See Kristin E. Hickman, Unpacking the Force of Law, 66 VAND. L. REV. 465, 475 (2013); see also Hemp Indus. Ass’n v. DEA, 333 F.3d 1082, 1087 (9th Cir. 2003) (“Legislative rules . . . create rights, impose obligations, or effect a change in existing law pursuant to authority delegated by Congress.”); United Techs. Corp. v. EPA, 821 F.2d 714, 719 (D.C. Cir. 1987) (describing legislative rules as those “in which the agency sought to fill gaps and inconsistencies left by the statutory scheme”); Jacob E. Gersen, Legislative Rules Revisited, 2014] NATIONAL SECURITY RULEMAKING 887 merated in the Administrative Procedure Act (APA),18 these legislative rules must ordinarily be published and undergo the notice-andcomment process before they take effect.19 Notice-and-comment— through which the public engages in dialogue with agencies, requiring them to respond to its concerns—safeguards democratic values and enhances the quality of rulemaking.20 A prominent scholar in the field called it “[o]ne of the [g]reatest [i]nventions of [m]odern [g]overnment.”21 Quite often, however, notice-and-comment is missing from national security rulemaking. Classification authority trumps other publication requirements,22 making notice-and-comment impossible.23 A massive amount of government activity takes place entirely in secret. By 2009, 1074 federal government organizations worked on programs 74 U. CHI. L. REV. 1705, 1708-09 (2007) (describing the difficulty courts sometimes encounter distinguishing legislative or “substantive” rules from merely “interpretive” rules). 18. 5 U.S.C. §§ 500–596 (2012); see also infra Part II.A (describing the APA’s fundamental importance in American law). 19. See 5 U.S.C. § 553(b) (This provision states that “[g]eneral notice of proposed rule making shall be published in the Federal Register” unless there is “actual notice,” and requires that the notice include “(1) a statement of the time, place, and nature of public rule making proceedings; (2) reference to the legal authority under which the rule is proposed; and (3) either the terms or substance of the proposed rule or a description of the subjects and issues involved.”); id. § 553(c) (requiring that agencies provide opportunity for public and interested parties to respond to the agency notice of rulemaking by tendering written opinions, information, or statements); id. § 553(d) (requiring a minimum thirty-day grace period between the announcement of a rule and its effective date); Gersen, supra note 17, at 1709-11 (explaining that legislative rules, also known as “substantive” rules, may only be promulgated through notice and comment unless a statutory exception applies). 20. See infra Part II.A. 21. Kenneth Culp Davis, Administrative Law Treatise § 6.15, at 283 (Supp. 1970). 22. See Arthur Earl Bonfield, Military and Foreign Affairs Function Rule-Making Under the APA, 71 MICH. L. REV. 221, 238-40 (1972). The APA’s publication requirements originally included an exception for “any function of the United States requiring secrecy in the public interest.” Administrative Procedure Act, Pub. L. No. 79-404, § 3, 60 Stat. 237, 238 (1946). When the APA was amended by the Freedom of Information Act (FOIA), Pub. L. No. 89-487, 80 Stat. 250 (1966) (codified at 5 U.S.C. § 552), Congress included two exceptions related to national security—Exception 1, which authorizes withholding information classified “by an Executive order to be kept secret in the interest of national defense or foreign policy,” 5 U.S.C. § 552(b)(1), and Exception 3, which authorizes withholding information “exempted from disclosure by statute,” id. § 552(b)(3). 23. Because the existence of many national security-related agencies and programs is secret, it is impossible to know how many legislative rules are developed in secret. See infra Part II.C. Examples of statutes that authorize secret rulemaking include 50 U.S.C.A. §§ 831–832 (West 2012) (providing limitations and guidelines on who has access to classified information at the NSA); id. § 3024(g) (holding the Director of National Intelligence accountable for safeguarding intelligence information from disclosure); id. § 3161 (governing the process of classifying information and accessing classified information); id. § 3365 (limiting the dissemination of privileged information); id. § 3121 (punishing individuals who reveal the identity of undercover agents and classified information); and id. § 3142 (allowing operational files of the National Geospatial-Intelligence Agency to be kept secret from the public). See also Sudha Setty, The Rise of National Security Secrets, 44 CONN. L. REV. 1563, 1583 (2012) (discussing the dangers of allowing “invocations of secrecy to go unchecked”). 888 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 at the top-secret level alone.24 The number of agencies and employees working on merely “secret” level programs is surely much larger.25 Amid these agencies’ secret rulemaking lie the great “unknown unknowns” of the administrative state.26 We can learn a great deal about dysfunctions in national security rulemaking when leaks reveal programs like the NSA’s. But we can learn even more from national security rulemaking that the public knows about but cannot participate in. I call this opaque rulemaking.27 It accounts for a larger share of national security rulemaking than secret rulemaking and is much broader in scope. It includes, for example, regulations implementing treaties28 and altering the legal rights of immigrants.29 Opaque rulemaking occurs when an agency makes legislative rules available to the public through some means, but refuses to conduct notice-and-comment or explain why.30 The authority to bypass notice-and-comment this way comes from a little-understood but broadly interpreted exception in the APA for “foreign affairs or military functions.”31 I call this the national security exception.32 24. See Dana Priest & William M. Arkin, Top Secret America: The Rise of the New American Security State 86 (2011). 25. See id. at 86-87. 26. See Donald H. Rumsfeld, Sec’y of Def., Department of Defense News Briefing (Feb. 12, 2002), available at http://www.defense.gov/transcripts/transcript.aspx?transcript id=2636. As David Posen has explained, Rumsfeld’s (infamous) taxonomy aptly describes “deep secrets”—those about which Americans “are in the dark about the fact that they are being kept in the dark.” David E. Pozen, Deep Secrecy, 62 STAN. L. REV. 257, 260 (2010). 27. Opaque rulemaking creates what David Pozen calls “shallow” secrets: the public knows about the secret’s existence only from the publicly available final rule. See Pozen, supra note 26, at 260. 28. See Int’l Bhd. of Teamsters v. Peña, 17 F.3d 1478, 1486-87 (D.C. Cir. 1994) (holding that regulations made pursuant to NAFTA exempting Mexican truck drivers from Federal Highway Administration (FWHA) licensing guidelines could be promulgated without notice-and-comment). 29. See Rajah v. Mukasey, 544 F.3d 427, 436-38 (2d Cir. 2008) (upholding, under the APA exception, the DOJ’s failure to use notice-and-comment to determine the countries whose citizens would be required to report to the FBI under a post-September 11 registration program, and who could be detained or deported in secret for immigration law violations). 30. Such rules can be published in the Code of Federal Regulations, the Federal Register, or simply online. Secret rulemaking becomes opaque when the content of the rules is made available, through leaks or deliberate disclosure, to the public. 31. See 5 U.S.C. § 553(a)(1) (2012) (stating that notice-and-comment requirements apply “except to the extent that there is involved a military or foreign affairs function of the United States”). 32. See infra Part II.C. The term “national security” lacks a precise definition, but it seems to be an ever-expanding concept. The Department of Defense recently defined it as “[a] collective term encompassing both national defense and foreign relations of the United States.” DEP’T OF DEF., JOINT PUBLICATION 1-02, DEPARTMENT OF DEFENSE DICTIONARY OF MILITARY AND ASSOCIATED TERMS 182 (2010) (as amended through Jan. 15, 2014). I use the term here in an even broader sense—to include these subjects and any action that may fall under the exception in 5 U.S.C. § 553(a)(1). 2014] NATIONAL SECURITY RULEMAKING 889 While some scholars regard the exception as inevitable,33 and others have proposed reforms to increase transparency,34 the full scope and historical origins of national security rulemaking—both secret and opaque—remain largely unexplored. Secrecy makes a complete accounting impossible, but this Article uncovers two unique features that expose the constitutionally problematic way this rulemaking is conducted and point the way toward necessary reforms. First, this Article considers the entire corpus of cases discussing the APA exception, concluding that courts generally apply it even when it was not invoked by the agency until the rule was challenged in court.35 This makes it difficult to estimate how often agencies actually rely on the exception to avoid notice-and-comment.36 It also makes court oversight of national security rulemaking far weaker. Under the Chenery rule, courts will uphold agency rules only on the grounds articulated by the agency when the rule was developed.37 Chenery I enables courts to perform their constitutionally critical role of ensuring that agencies do not exceed their delegated authority.38 33. See Major Thomas R. Folk, The Administrative Procedure Act and the Military Departments, 108 MIL. L. REV. 135, 142 (1985) (observing with approval that “[s]everal court decisions have . . . given the term ‘military function’ its broadest possible definition”); Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095, 1096 (2009) (briefly discussing the exception as one of many “black holes” in U.S. administrative law and noting that courts have generally construed it broadly). 34. Bonfield, supra note 22, at 238 (conceding that, while a narrow construction would be preferable, the language of the “military or foreign affairs function” exception is nevertheless “very broad”); Evan J. Criddle, When Delegation Begets Domination: Due Process of Administrative Lawmaking, 46 GA. L. REV. 117, 192-93, 204 (2011) (proposing that the exception be eliminated and that agencies use the APA’s “good cause” exception when notice-and-comment is inappropriate); Oona A. Hathaway, Presidential Power over International Law: Restoring the Balance, 119 YALE L.J. 140, 223-24, 262-63 (2009) (noting that the exception relieves the President of the responsibility for conducting notice-andcomment for international agreements, and proposing reforms); C. Jeffrey Tibbels, Delineating the Foreign Affairs Function in the Age of Globalization, 23 SUFFOLK TRANSNAT’L L. REV. 389 (1999) (contending that agencies use the exception too often for economic regulation, and proposing that the courts rein in its use); see also William D. Araiza, Note, Noticeand-Comment Rights for Administrative Decisions Affecting International Trade: Heightened Need, No Response, 99 YALE L.J. 669, 671 (1989) (proposing a statutory grant of notice-and-comment for rulemaking on the classification of imported goods, which is subject to the exception). 35. See infra notes 161-56 and accompanying text. 36. Over the decades, the exception has been invoked by agencies across the government—including the Departments of Defense, Homeland Security, State, Commerce, Treasury, Energy, Transportation, and Agriculture; the Federal Communications Commission; the Food and Drug Administration; the Nuclear Regulatory Commission; and even the Postal Service. See Bonfield, supra note 22, at 232 n.38; see also id. at 232-34 (describing various agencies’ responses to a survey, stating they had relied on the exception and concluding that “[i]n practice . . . most agencies do not usually exercise their discretion to follow the [notice-and-comment] requirements . . . when they are not bound to do so because” the exception applies); infra Part II.C. 37. See SEC v. Chenery Corp. (Chenery I), 318 U.S. 80, 94-95 (1943); infra Part II.B. 38. See, e.g., Kevin M. Stack, The Constitutional Foundations of Chenery, 116 YALE L.J. 952, 958-59 (2007); infra Part II.B. 890 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 When the agency does not use notice-and-comment, however—or offer any justification for departing from it—there are no legal or factual justifications for the court to review. Second, this Article examines, for the first time, the exception’s development through numerous drafts of APA predecessor legislation over eighteen years and its historical and political context.39 This analysis reveals that the national security exception was not a simple inevitability; instead, it emerged from a fierce debate during the 1930s and 1940s about how the United States could best compete with fascist states without succumbing to fascism itself.40 When the APA exception is seen as a product of its time rather than an essential attribute of all administrative law systems, its purpose becomes clearer. The Article proceeds in four parts. I focus on the national security exception in Part II, revealing the general operation of the national security administrative state. Notice-and-comment rulemaking is “the dominant mode of administrative action.”41 Because notice-andcomment rulemaking is such an important means by which agencies create rules with the force of law, exceptions from it deserve special attention. By carving out the exception, the APA creates a distinct and constitutionally suspect administrative law regime for national security rulemaking. As Part III explains, the limited scholarly debate over the APA exception has occurred without exploring its origins. Professor Adrian Vermeule, adopting the theories of German political theorist Carl Schmitt, labeled the exception one of the “black holes” permitting untrammeled executive discretion, which are “integral” and “inevitable” in “a massive and massively diverse administrative state.”42 Vermuele’s critics have argued that such black holes are not necessary and have proposed eliminating them.43 But Vermeule’s invocation of the APA exception fits neatly into discussion about emergency governance—quite often grappling with Schmitt’s perspective—that has dominated national security law scholarship at least since September 39. See infra Part IV. Scholars discussing the exception have examined the legislative history of the bill that became the APA, but not the rich history of earlier reform proposals or the historical context. See, e.g., Tibbels, supra note 34, at 395-96 (discussing the APA legislative history and noting its sparseness on the subject of the national security exception). 40. See infra Part IV. For a history of the New Deal in the context of the rise of totalitarian states around the world, see IRA KATZNELSON, FEAR ITSELF: THE NEW DEAL AND THE ORIGINS OF OUR TIME (2013). 41. Nina A. Mendelson, Rulemaking, Democracy, and Torrents of E-Mail, 79 GEO. WASH. L. REV. 1343, 1343 (2011). 42. Vermeule, supra note 33, at 1149. 43. For criticism of Vermeule’s observations, see, for example, Criddle, supra note 34, at 192, 193, 204. See also infra Part III. 2014] NATIONAL SECURITY RULEMAKING 891 11, 2001.44 This Article, in Part IV, re-orients that discussion by focusing on the specific geopolitical concerns and theories of governmental organization animating the exception’s inclusion in the APA. In Part V, this Article explores why national security rulemaking must be reformed and how to do so. Quite simply, the world has changed in fundamental ways since the APA was enacted. The distinction between the foreign and the domestic—and between what is and is not “national security”—has faded. Because people and products cross boundaries as never before, national security concerns continue to expand to new areas of government policymaking.45 And the threats America faces have changed dramatically as well. Our most dangerous enemies are no longer nation states, but terrorist organizations or lone wolves.46 And in an era of high-tech global surveillance where a mere search algorithm can determine the difference between what is foreign and domestic, the legitimating and deliberation-enhancing qualities of notice-and-comment rulemaking are as necessary for national security agency action as for any other.47 Part V concludes by proposing reforms to an area of regulation badly in need of a balance between secrecy and greater scrutiny and public participation. If eliminating the APA exception entirely is not feasible, the President should issue an executive order requiring agencies to use notice-and-comment whenever possible. In addition, the courts should be directed to impose a Chenery-type rule requiring agencies to invoke the exception specifically when they issue a rule without notice-and-comment and to specifically articulate their reasons for relying on the exception.48 Even if these justifications cannot be disclosed to the public for some time, or ever, the requirement will nonetheless discipline and improve agency decisionmaking. 44. See MARY L. DUDZIAK, WAR TIME: AN IDEA, ITS HISTORY, ITS CONSEQUENCES 11516 (2012) (discussing the surge of interest in, and citation to, Schmitt following September 11). Even before September 11, scholarly attention to the jurisprudence of emergency and exception—and the work of German political scientist Carl Schmitt in particular—was steadily increasing. See Oren Gross, The Normless and Exceptionless Exception: Carl Schmitt’s Theory of Emergency Powers and the “Norm-Exception” Dichotomy, 21 CARDOZO L. REV. 1825, 1825-26 (2000) (noting the revival of interest in Schmitt’s work in the late 1990s). 45. See, e.g., William C. Banks, Programmatic Surveillance and FISA: Of Needles in Haystacks, 88 TEX. L. REV. 1633, 1634 (2010) (“[M]ore Americans than ever are engaged in international communications, and there is far greater intelligence interest in communications to and from Americans. Both circumstances increase the likelihood that the government will be intercepting communications of innocent Americans . . . .”). 46. See infra note 315 and accompanying text. 47. See infra note 314 and accompanying text. 48. See SEC v. Chenery Corp. (Chenery I), 318 U.S. 80, 94-95 (1943); infra notes 109115 and accompanying text. 892 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 II. OUR BIFURCATED ADMINISTRATIVE STATE The United States government has a bifurcated administrative state. There is an ordinary administrative state, in which agencies must solicit and consider public comments before issuing rules with the force of law. And there is a national security administrative state, in which agencies may choose to issue the same sort of rules without first publishing them and without soliciting or receiving public comments, while some rules may be kept entirely secret. The two administrative states co-exist within most agencies, but the national security administrative state is more pervasive in the Departments of State and Defense and in the array of intelligence agencies that operate largely away from the public eye.49 Sometimes the two administrative states will co-exist within the same rulemaking process. Inevitably, however, in these instances it is the national security administrative state that governs the most important aspects of the rulemaking. After the September 11 attacks, the Department of Justice (DOJ) established a Special Call-In Registration Program “requir[ing] non-immigrant alien males over the age of 16 from designated countries to appear for registration and fingerprinting.”50 The DOJ followed the APA’s notice-and-comment requirements by publishing the proposed rule establishing the program and accepting public comments before issuing the final rule two months later.51 But the DOJ did not publish for public comment a crucial portion of the rule, which designates the countries whose citizens must report.52 Nor did the DOJ explain why it had decided not to consider comments on this portion.53 49. Secret rulemaking also accounts for a significant, and troubling, portion of the national security administrative state. See PRIEST & ARKIN, supra note 24, at 86-87; supra notes 22-26 and accompanying text. 50. Rajah v. Mukasey, 544 F.3d 427, 432 (2d Cir. 2008). 51. See Registration and Monitoring of Certain Nonimmigrants, 67 Fed. Reg. 40,581 (proposed June 13, 2002) (to be codified at 8 C.F.R. pts. 214, 264). The proposed rule received only fourteen comments, many of which were similar. See Registration and Monitoring of Certain Nonimmigrants, 67 Fed. Reg. 52,584 (Aug. 12, 2002) (to be codified at 8 C.F.R. pts. 214, 264). 52. See Registration and Monitoring of Certain Nonimmigrants, 67 Fed. Reg. at 40,581 (stating that the selected countries whose citizens must report will be specified separately in notices published in the Federal Register); Registration and Monitoring of Certain Nonimmigrants, 67 Fed. Reg. at 52,584 (affirming this procedure in the final rule). 53. See Registration and Monitoring of Certain Nonimmigrants, 67 Fed. Reg. 52,584, 52,589 (Aug. 12, 2002) (stating, in response to a comment that the future designation of countries “would be antithetical to the relationship between the United States and that country and its citizens,” that “[t]he listing of countries from which nonimmigrant aliens will be subject to special registration is determined by the Attorney General in consultation with the Secretary of State, thereby ensuring that foreign policy implications will be considered when evaluating the possible designation of any specific country” and that the “comment is outside the scope of this final rule”). 2014] NATIONAL SECURITY RULEMAKING 893 Three months later, the DOJ began publishing a series of notices in the Federal Register announcing the twenty-five designated countries—which included almost exclusively Muslim-majority nations such as Morocco, Iran, Iraq, Libya, Bahrain, and Tunisia.54 Thousands of nonimmigrant alien visitors who reported to the FBI under this program were interrogated and deported, many of them in secret, and hundreds were detained for significant periods of time.55 The Second Circuit upheld the program as lawful and explained why the DOJ was justified in invoking the national security exception. Providing justification where the DOJ had offered almost none,56 the court explained that, in the process of responding to comments, the DOJ might have been required to reveal sensitive national security information in justifying its choice of countries, which would damage relations with those countries, slow down the designation process, and diminish the nation’s ability to collect intelligence and prevent terrorist attacks.57 These were legitimate concerns—at least in the abstract. But in practice, the registration program is widely considered to have been a failure.58 Like many of the post-September 11 detention and removal policies, it had troubling implications for due process and equal protection.59 Moreover, in targeting particular religious and ethnic com54. E.g., id. (designating Iran, Iraq, Libya, Sudan, and Syria as countries whose citizens meeting the conditions must report); Registration of Certain Nonimmigrant Aliens from Designated Countries, 67 Fed. Reg. 70,526 (Nov. 22, 2002) (designating Afghanistan, Algeria, Bahrain, Eritrea, Lebanon, Morocco, North Korea, Oman, Qatar, Somalia, Tunisia, United Arab Emirates, and Yemen). In a yet later notice, three more countries—Armenia, Pakistan, and Saudi Arabia—were added. Registration of Certain Nonimmigrant Aliens from Designated Countries, 67 Fed. Reg. 77,136 (Dec. 16, 2002). A subsequent notice removed Armenia from the list and modified the registration requirements. See Registration of Certain Nonimmigrant Aliens from Designated Countries, 67 Fed. Reg. 77,642 (Dec. 18, 2002). 55. See, e.g., Kevin R. Johnson & Bernard Trujillo, Immigration Reform, National Security After September 11, and the Future of North American Integration, 91 MINN. L. REV. 1369, 1383-84 (2007); Sadiq Reza, A Trap for Middle Eastern Visitors, WASH. POST, Jan. 10, 2003, at A21. The program was only part of the constitutionally questionable detention of thousands of Muslims in the United States following the September 11 attacks. See DAVID COLE, ENEMY ALIENS: DOUBLE STANDARDS AND CONSTITUTIONAL FREEDOMS IN THE WAR ON TERRORISM 22-46(2003); Johnson & Trujillo, supra, at 1382-84. 56. When publishing the notice listing designated countries, the DOJ stated that these determinations were justified “[i]n light of recent events, and based on intelligence information available to the Attorney General.” Registration of Certain Nonimmigrant Aliens from Designated Countries, 67 Fed. Reg. at 67,766. On appeal, the DOJ argued that “[p]ublic commentary . . . would serve no other purpose, and achieve no other end, than potentially inflaming relations” with the designated countries. Brief for Respondents at 37, Rajah v. Mukasey, 544 F.3d 449 (2d Cir. 2008) (No. 06-3493), 2007 WL 6449014. 57. Rajah v. Mukasey, 544 F.3d 427, 437 (2d Cir. 2008). 58. Johnson & Trujillo, supra note 55, at 1384. 59. See, e.g., David Cole, Enemy Aliens, 54 STAN. L. REV. 953, 957 (2002); cf. Hiroshi Motomura, Immigration and We the People After September 11, 66 ALB. L. REV. 413, 42021 (2003) (disagreeing with Cole’s substantive arguments but agreeing that there are due process and equal protection concerns); see also Ty S. Wahab Twibell, The Road to Intern- 894 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 munities and casting too broad a net, such policies alienated the very people who were most likely to provide the government with useful information for preventing future terrorist attacks.60 The resulting arrests, detentions, and deportations prompted protests.61 The DOJ never claimed that the program thwarted any terrorist activity, and it was abandoned a year later.62 The DOJ’s detention program demonstrates why the failure to involve the public in rulemaking through notice-and-comment increases the likelihood of impracticable, ill-conceived agency action that results in inefficiency, abuses, and backlash. Notice-and-comment was designed to avoid such harmful effects and to root policy-making in the constitutional values of public participation, transparency, legitimacy, and governmental effectiveness. A. The Importance of Notice-and-Comment Rulemaking The difference between our two administrative regimes in the way they are permitted to undertake rulemaking is not merely procedural; it is fundamental. Notice-and-comment rulemaking is a pillar of the administrative law regime that arose after World War II. The APA, the “constitution of the administrative state,” established and codified the notice-and-comment procedure for “legislative” or “substantive” rules—those that are legally binding on agencies and the public.63 With the explosive growth of the federal government during the 1930s and 1940s, lawmakers realized that “Congress cannot ment: Special Registration and Other Human Rights Violations of Arabs and Muslims in the United States, 29 VT. L. REV. 407, 411-19 (2005). 60. Cf. Tom R. Tyler, Stephen Schulhofer & Aziz Z. Huq, Legitimacy and Deterrence Effects in Counterterrorism Policing: A Study of Muslim Americans, 44 LAW & SOC’Y REV. 365 (2010) (examining social science data regarding the Muslim community in New York City and concluding that perceptions of governmental legitimacy are the most important incentive to cooperate with counterterrorism efforts). 61. Johnson & Trujillo, supra note 55, at 1384 (citing Emily Bazar, New Battle on Civil Rights Front—The Registration of Some Immigrants Is Denounced as Racial Profiling, SACRAMENTO BEE, Jan. 20, 2003, at A1; Wyatt Buchanan, Hundreds Protest INS Registration/Men from 13 Countries Sign In, S.F. CHRON., Jan. 11, 2003, at A13). 62. Id.; see Suspending the 30-Day and Annual Interview Requirements from the Special Registration Process for Certain Nonimmigrants, 68 Fed. Reg. 67,578 (Dec. 2, 2003); see also Removing Designated Countries from the National Security Entry-Exit Registration System (NSEERS), 76 Fed. Reg. 23,830 (Apr. 28, 2011) (formally finalizing the abandonment of the program). Under US-VISIT, most visitors are subject to the collection of biometric data upon entry at air- and seaports. See Implementation of the United States Visitor and Immigrant Status Indicator Technology Program (“US-VISIT”); Biometric Requirements, 69 Fed. Reg. 468 (Jan. 5, 2004). 63. See Hickman, supra note 17, at 481-82 (discussing the factors courts use to determine whether a rule is legislative). Because agencies have incentives to avoid notice-andcomment by labeling rules as merely “interpretive,” even if they really are legislative, many courts do not accept agencies’ characterizations at face value. See id.; William Funk, Legislating for Nonlegislative Rules, 56 ADMIN. L. REV. 1023, 1029-30 (2004). 2014] NATIONAL SECURITY RULEMAKING 895 manage the regulatory demands of the modern [administrative] state on its own.”64 Notice-and-comment rulemaking was one compromise under which Congress could delegate to agencies the power to issue legally binding rules without abandoning oversight of those agencies. The APA also technically requires more robust, “formal,” trial-like rulemaking procedures in some circumstances when the agency’s enabling act or another statute requires rulemaking “to be made on the record after opportunity for an agency hearing.”65 However, courts have generally given agencies broad discretion in their choice of procedures and have rarely interpreted statutes as requiring agencies to engage in formal rulemaking.66 By the 1970s, with the courts’ blessing, notice-and-comment became the norm for agency rulemaking.67 In the twenty-first century, it remains the primary means for the resolution of policy matters by agencies and continues to enjoy the strong endorsement of administrative law scholars.68 Under its notice-and-comment procedures, the APA requires agencies to publish a proposed rule in the Federal Register and provide the public with an opportunity to respond during a fixed period, which may be as long as 180 days, depending on the rule’s complexity.69 When issuing a final rule that implements a congressional mandate, agencies must provide “a concise general statement” of the proposed regulation’s “basis and purpose.”70 The process requires agencies to “specifically explain their policy choices, their consideration of important aspects of the problem, and their reasons for not pursuing viable alternatives.”71 Publication of a proposed rule begins a dialogue between policymakers and those affected by a regulation; interested parties must 64. See Hathaway, supra note 34, at 243. 65. 5 U.S.C. § 553(c) (2012). 66. SEC v. Chenery Corp. (Chenery II), 332 U.S. 194, 203 (1947) (“The choice made between proceeding by general rule or by individual, ad hoc litigation is one that lies primarily in the informed discretion of the administrative agency.”); Edward Rubin, It’s Time to Make the Administrative Procedure Act Administrative, 89 CORNELL L. REV. 95, 107 (2003) (“Because the impracticalities of formal rulemaking are well known, Congress rarely requires this technique, and courts avoid interpreting statutes to require it, even in the rare cases where the statute seems to do so.”). 67. See Hickman, supra note 17, at 476-77; Thomas W. Merrill & Kathryn Tongue Watts, Agency Rules with the Force of Law: The Original Convention, 116 HARV. L. REV. 467, 546-59 (2002). 68. See Mariano-Florentino Cuéllar, Rethinking Regulatory Democracy, 57 ADMIN. L. REV. 411, 428-29 (2005) (“Notice and comment deserves close attention in a study of regulatory democracy because the bulk of regulation is crafted through that procedure today . . . .”); Mendelson, supra note 41, at 1380. But see, e.g., Richard J. Pierce, Jr., Response, Presidential Control Is Better Than the Alternatives, 88 TEX. L. REV. SEE ALSO 113, 116-17 (2010) (describing notice-and-comment as too burdensome). 69. 5 U.S.C. § 553(b). 70. Id. § 553(c). 71. Stack, supra note 38, at 972. 896 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 have the opportunity to comment on the proposed regulation, and the agency must respond to the comments.72 Courts enforce these requirements through “hard look” review, invalidating regulations that they find to be “arbitrary and capricious,” and upholding regulations that are well reasoned and well supported by facts.73 The notice-and-comment process has been widely praised for improving agency decisionmaking from a number of different perspectives, many of which are staples of administrative law. No matter which of the major theories of agency decisionmaking one adopts, the notice-and-comment process arguably adds value. Even from a purely “expertocratic” perspective,74 in which the public’s contribution to decisionmaking is considered less important, the notice requirement arguably results in better policy because it disciplines agency decisionmaking from the very beginning. It provides incentives for agency employees to create an accurate record, to communicate with one another clearly, to involve the entire agency in the process, and to identify and attempt to resolve critical issues before issuing notice of the proposed rule.75 For those who believe that the involvement of the public is crucial for rulemaking to result in good policies, the benefits of notice-andcomment are more obvious. A public choice or pluralist view regards 72. See 5 U.S.C. § 553(c) (enumerating the notice-and-comment requirements); United States v. Nova Scotia Food Prods. Corp., 568 F.2d 240, 253 (2d Cir. 1977) (requiring response to significant comments); Portland Cement Ass’n v. Ruckelshaus, 486 F.2d 375, 392-93 (D.C. Cir. 1973) (requiring disclosure of “technical data or studies” in time to allow for meaningful comment). 73. Judicial review of agency action is a cornerstone of the APA and necessary to enforce the notice-and-comment requirements. The APA requires reviewing courts to “hold unlawful and set aside agency action, findings, and conclusions found to be . . . arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.” 5 U.S.C. § 706(2). The Supreme Court has interpreted “arbitrary and capricious” review as requiring courts to review the record and “satisfy[] themselves that the agency has made a reasoned decision based on its evaluation of the significance—or lack of significance—of . . . information.” Marsh v. Or. Natural Res. Council, 490 U.S. 360, 378 (1989). “Hard look” review describes the way the courts enforce the “arbitrary and capricious” standard, so the terms are usually considered interchangeable. See Kathryn A. Watts, Proposing a Place for Politics in Arbitrary and Capricious Review, 119 YALE L.J. 2, 5 (2009). 74. Jim Rossi, Participation Run Amok: The Costs of Mass Participation for Deliberative Agency Decisionmaking, 92 NW. U. L. REV. 173, 179 (1997) (“Expertocratic models view the decision process primarily as an exercise in scientific validation by virtue of the method and culture of the agency experts’ profession.”). 75. See William F. Pedersen, Jr., Formal Records and Informal Rulemaking, 85 YALE L.J. 38, 59-60 (1975); Mark Seidenfeld, Demystifying Deossification: Rethinking Recent Proposals to Modify Judicial Review of Notice and Comment Rulemaking, 75 TEX. L. REV. 483, 506-10 (1997); Matthew C. Stephenson, A Costly Signaling Theory of “Hard Look” Judicial Review, 58 ADMIN. L. REV. 753, 755 (2006) (contending that judicial review of agency action disciplines and improves the rulemaking process because “the expert government decisionmaker’s willingness to produce a high-quality explanation” for a rule “signals that the government believes the benefits of the proposed policy are high,” making judicial approval more likely). 2014] NATIONAL SECURITY RULEMAKING 897 regulation as the resolution of conflicts among competing interests, while a public interest view holds that regulators can discern and pursue the general good.76 But from either view, active participation of the public matters immensely because rulemaking is an important means by which the government resolves not just “technical” or “scientific” questions, but also questions of values.77 Selecting among different potential gains is a value judgment, as Cass Sunstein observed, and one that should be “made publicly and exposed to democratic view.”78 Moreover, public deliberation and participation can be regarded as irreducible democratic values in themselves.79 Notice-and-comment rulemaking also strengthens legitimacy. Agencies must be held accountable if their actions are to be seen as legitimate. Accountability flows from meaningful constraints on agency authority.80 Notice-and-comment is a powerful constraint: it ensures that agency action is seen as legitimate because it provides direct accountability to the public, which means that its choices will more closely reflect the popular will. This can be true whether or not the process is viewed from a public choice or public interest perspective. For public choice theorists, if the agency hears from and considers a wide range of interests, its decisions will be seen as more democratic: the agency serves as a broker among interest groups, just as Congress serves as a broker for interest groups during the enactment of legislation.81 From the (more optimistic) public interest perspec76. See Rossi, supra note 74, at 198-99. 77. See Emily Hammond Meazell, Super Deference, the Science Obsession, and Judicial Review as Translation of Agency Science, 109 MICH. L. REV. 733, 735-36 (2011) (contending that “agency science . . . is laced with policy decisions at numerous levels” and that “interested parties and agencies alike are incentivized to cloak their policy choices in the seemingly unassailable mantle of science”). 78. Cass R. Sunstein, Is the Clean Air Act Unconstitutional?, 98 MICH. L. REV. 303, 364 (1999). 79. See Robert W. Bennett, Democracy as Meaningful Conversation, 14 CONST. COMMENT. 481, 481-82 (1997) (advancing a “conversational” model of democracy, “under which the citizenry is engaged by ongoing public conversation about public policy,” and arguing that “it is this engagement that is the stabilizing force in the system”); Rossi, supra note 74, at 179. 80. See Criddle, supra note 34, at 159 (“[W]hen Congress delegates lawmaking authority to administrative agencies, structural due process requires that agency lawmakers be subject to meaningful political accountability and that persons adversely affected by agency action have an opportunity to test the constitutional adequacy of Congress’s delegation through judicial review.”); Edward Rubin, The Myth of Accountability and the AntiAdministrative Impulse, 103 MICH. L. REV. 2073, 2075 (2005) (“[T]rue accountability, in the realm of law and politics, involves many of the features that are central to the administrative state and that people find so unattractive about it—hierarchy, monitoring, reporting, internal rules, investigations, and job evaluations.”). 81. Richard B. Stewart, The Reformation of American Administrative Law, 88 HARV. L. REV. 1667, 1683 (1975); id. at 1670 (“Increasingly, the function of administrative law is not the protection of private autonomy but the provision of a surrogate political process to ensure the fair representation of a wide range of affected interests in the process of administrative decision.”). 898 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 tive, the agency rulemaking process is a forum for democratic deliberation, in which agencies and citizens alike will change their views in response to reasoning of others.82 During the notice-and-comment rulemaking process, both citizens (including interest groups) and the agency engage in dialogue. Even if the dialogue is limited by the brevity of the comment period, the agency staff can act as agents of constituent stakeholders.83 In addition to its role in facilitating direct accountability to the public, notice-and-comment rulemaking can support and enhance congressional oversight of agency action. It is true that, if an agency thwarts the public interest, the public can contact their congressional representatives and exert pressure through the vote. But this process is a lengthy and frustrating one: Congress’s attention span is notoriously short, and ordinary congressional oversight through hearings, confirmation decisions, and appropriations is limited, infrequent, and ad hoc.84 This sort of congressional “walking the beat” is labeled “police-patrol” oversight by Mathew McCubbins and Thomas Schwartz, who criticize it as overlooking many important agency problems.85 Notice-and-comment rulemaking can help address this gap by enabling other informal, but complementary, oversight processes. If a proposed regulation provokes significant controversy, Congress is likely to re-examine the delegation of authority to the agency and intervene in a more timely fashion. In other words, notice-and-comment rulemaking permits the public to engage in what McCubbins and Schwartz call “fire alarm” oversight.86 Notice-and-comment rulemaking—and subsequent judicial enforcement—“allows Congress to harness the power of private actors to enhance its oversight capacity.”87 82. Mark Seidenfeld, The Quixotic Quest for a “Unified” Theory of the Administrative State, ISSUES IN LEGAL SCHOLARSHIP, Mar. 2005, at 1, 4-5, available at http://www.deg ruyter.com/view/j/ils.2005.5.issue-1/ils.2005.5.1.1056/ils.2005.5.1.1056.xml?format=INT. 83. See id. 84. See, e.g., THOMAS MANN & NORMAN ORNSTEIN, THE BROKEN BRANCH: HOW CONGRESS IS FAILING AMERICA AND HOW TO GET IT BACK ON TRACK 170 (2006) (lamenting the infrequency of congressional oversight); Brian D. Feinstein, Avoiding Oversight: Legislator Preferences and Congressional Monitoring of the Administrative State, 8 J.L. ECON. & POL’Y 23, 40-41 (2011) (concluding that members of Congress generally assign a low value to service on oversight subcomittees); David E. Lewis & Terry M. Moe, The Presidency and the Bureaucracy: The Levers of Presidential Control, in THE PRESIDENCY AND THE POLITICAL SYSTEM 374, 382-85 (Michael Nelson ed., 10th ed. 2014) (arguing that reelection-oriented legislators have scant incentive to participate in oversight activities). 85. See Mathew D. McCubbins & Thomas Schwartz, Congressional Oversight Overlooked: Police Patrols Versus Fire Alarms, 28 AM. J. POL. SCI. 165, 166 (1984). 86. See id. 87. Hathaway, supra note 34, at 247 n.320; see also Kenneth A. Bamberger, Regulation as Delegation: Private Firms, Decisionmaking, and Accountability in the Administrative State, 56 DUKE L.J. 377, 399-408 (2006) (discussing the “administrative accountability paradigm”); Lisa Schultz Bressman, Procedures as Politics in Administrative Law, 107 2014] NATIONAL SECURITY RULEMAKING 899 Although it enjoys broad support, notice-and-comment is certainly not without its critics. Notice-and-comment is a time and resourceintensive process. Indeed, the substantial literature on “agency ossification” largely blames notice-and-comment requirements for agency sluggishness and resistance to change.88 Richard Pierce summarizes this critique: [I]t takes a long time to issue a rule; agencies never issue many of the rules that would be beneficial to the public; agencies maximize their use of procedural alternatives that are inferior to rulemaking to avoid the delay and cost of the notice-and-comment process; and agencies often decline to amend or to rescind rules that have become obsolete.89 These problems may account for a noticeable trend by Congress toward forcing agencies to act without notice-and-comment, either by mandating the issuance of particular rules or by imposing deadlines that make the procedure impossible.90 Nonetheless, notice-and-comment remains the benchmark. And despite its drawbacks, it is the least-worst means for achieving better policy outcomes and keeping agencies accountable. B. The Constitutional Dimension of Notice-and-Comment The benefits of notice-and-comment rulemaking in advancing democratic values are often celebrated. But it has a constitutional dimension as well. Congress designed it to be a means through which agencies are constrained from exceeding their delegated authority and thereby violating separation of powers principles or individual rights. The Constitution, by vesting “[a]ll legislative [p]owers herein granted” in Congress, limits Congress’s ability to delegate that power to the executive branch or independent agencies.91 The nondelegation doctrine requires Congress to “ ‘lay down by legislative act an intelligible principle to which the [agency] is directed to conform.’ ”92 COLUM. L. REV. 1749, 1770 (2007) (“[C]ourts force agencies to comply with the procedures that facilitate fire-alarm oversight.”). 88. See Pierce, supra note 68, at 116-17 (summarizing the literature on ossification in agency rulemaking); see also STEPHEN BREYER, BREAKING THE VICIOUS CIRCLE: TOWARD EFFECTIVE RISK REGULATION 49 (1993); Thomas O. McGarity, Response, The Courts and the Ossification of Rulemaking: A Response to Professor Seidenfeld, 75 TEX. L. REV. 525, 525-29 (1997). 89. Pierce, supra note 68, at 117. 90. See infra notes 151-153 and accompanying text (discussing use of the “good cause” exception). 91. U.S. CONST. art. I, § 1. 92. Whitman v. Am. Trucking Ass’ns, 531 U.S. 457, 472 (2001) (quoting J.W. Hampton, Jr., & Co. v. United States, 276 U.S. 394, 409 (1928)). Under the Supreme Court’s current approach to the non-delegation doctrine, Congress cannot delegate any amount of its own actual legislative power but may nonetheless delegate vast “rulemaking” authority to 900 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 Failure to do so violates constitutional separation of powers principles. In addition, the agency itself lacks the power to create an “intelligible principle” when Congress has failed to provide one.93 It is extremely rare for courts to invoke the non-delegation doctrine to strike down legislation as unconstitutional.94 Since 1935, courts have bowed to the exigencies of the massive modern administrative state by permitting Congress to assign vast rulemaking authority to agencies.95 Instead, the courts have trod a different path toward regularly enforcing constitutional separation of powers principles in administrative law. Through judicial review of agency action, courts play a critical role in ensuring that agencies act only within the bounds of their constitutionally-valid delegated authority.96 In the APA, Congress codified this role for courts, and scholars have come to recognize that role’s constitutional dimensions.97 But it is a role that courts have been playing for as long as the administrative state has existed.98 The APA empowers courts to set aside agency action that is “arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.”99 Courts have further underscored the fundamental importance, if not explicitly the constitutional dimensions of, APA review by gradually developing more stringent standards for reviewing agency action than for review of most statutes.100 Congress originally understood the APA’s arbitrary and caagencies. See id. at 488-89 (Stevens, J., concurring) (disagreeing with the majority that the properly delegated authority is not “legislative”). 93. Id. at 472 (majority opinion). 94. See, e.g., United States v. Whaley, 577 F.3d 254, 263 (5th Cir. 2009) (observing that “the limits on delegation are frequently stated, but rarely invoked,” and that “the Supreme Court has not struck down a statute on nondelegation grounds since 1935” (citing A.L.A. Schechter Poultry Corp. v. United States, 295 U.S. 495 (1935); Pan. Ref. Co. v. Ryan, 293 U.S. 388 (1935)). 95. See Stack, supra note 38, at 956. 96. See id. at 958-59; see also Criddle, supra note 34, at 132. But cf. Eric A. Posner & Adrian Vermeule, Interring the Nondelegation Doctrine, 69 U. CHI. L. REV. 1721, 1721 (2002) (“A statutory grant of authority to the executive branch or other agents never effects a delegation of legislative power.”). 97. See generally Metzger, supra note 100 (describing the “deeply embedded practice” of judges’ infus[ing] constitutional values into their development of administrative law doctrines or readings of ordinary administrative requirements.”); Stack, supra note 38. 98. See, e.g., Mahler v. Eby, 264 U.S. 32, 44-45 (1924) (citing precedent that, if not presented on the record, express findings by an agency could not “be supplied by implication” or by reference to litigation documents before the agency and concluding that such a defect “goes to the existence of the power on which the proceeding rests” (citing Wichita R.R. & Light Co. v. Pub. Utils. Comm’n, 260 U.S. 48, 59 (1922)); see also Stack, supra note 38, at 983-89 (discussing Mahler, Wichita Railroad, and similar contemporaneous decisions holding that the limitation derived from constitutional concerns). 99. Motor Vehicle Mfrs. Ass’n v. State Farm Mut. Auto. Ins. Co., 463 U.S. 29, 41 (1983) (quoting Administrative Procedure Act, 5 U.S.C. § 706(2)(A)). 100. Gillian E. Metzger, Ordinary Administrative Law as Constitutional Common Law, 110 COLUM. L. REV. 479, 491 (2010). 2014] NATIONAL SECURITY RULEMAKING 901 pricious standard as equivalent to the “minimal scrutiny [of] constitutional rationality review.”101 Over the years, however, the courts’ interpretations of agency action have diverged from their interpretation of statutes. The APA’s arbitrary and capricious standard became gradually more rigorous, evolving into today’s “hard look” review.102 As Gillian Metzger has recounted, this divergence was driven largely by constitutional concerns raised by the expansion of regulatory authority during the 1960s and 1970s with fears of agency capture by industry.103 With separation of powers principles at stake, courts came to view agency action with a more skeptical eye. Of course, some may reject the idea that hard look review is a fullblown constitutional requirement.104 It may be merely a prudential doctrine or occupy some quasi-constitutional twilight zone.105 But it is difficult to imagine that our massive modern administrative state could function in a constitutionally sound manner without the sort of judicial scrutiny that hard look review provides. As courts have come to interpret it, the APA is, therefore, not merely a constitution for the administrative state;106 it provides essential constitutional validity for the administrative state. However, unless an agency is required to state its reasoning for acting while it takes action, and unless it actually does so, reviewing courts cannot perform their constitutionally critical duty to discern whether the agency acted for lawful reasons.107 If hard look review has constitutional dimensions, the requirement of contemporaneous 101. Id. 102. Id.; Watts, supra note 73, at 15-16. 103. Metzger, supra note 100, at 491. 104. See, e.g., Note, Rationalizing Hard Look Review After the Fact, 122 HARV. L. REV. 1909, 1921 (2009) (arguing that eliminating the Chenery rule and permitting courts to consider post-hoc rationales for agency action would be constitutional and would help ameliorate ossification of agency decisionmaking). 105. Scholars and jurists have not only likened the APA to a constitution, but they also see it as having quasi-constitutional status within the framework of American law. See, e.g., Bruce Ackerman, The Emergency Constitution, 113 YALE L.J. 1029, 1077 (2004) (“Although it is packaged as a statute, the APA is the product of constitutional thought, and the courts have given quasi-constitutional status to its provisions.”); Metzger, supra note 100, at 484-85 (describing judicial review of administrative action as a form of constitutional common law subject to congressional revision). 106. Steven P. Croley, The Administrative Procedure Act and Regulatory Reform: A Reconciliation, 10 ADMIN. L.J. AM. U. 35, 35 (1996) (describing the APA as “the constitution of the modern regulatory state”); see also Abbott Labs. v. Gardner, 387 U.S. 136, 140 (1967) (characterizing the APA as a “seminal act” governing the relationship between courts and agencies). 107. See, e.g., Olenhouse v. Commodity Credit Corp., 42 F.3d 1560, 1565 (10th Cir. 1994) (setting aside an agency decision because the court could not “ascertain” from a thorough review of the administrative record the basis and support for the decision). The court explained that “the grounds upon which the agency acted must be clearly disclosed in, and sustained by, the record,” and that “[t]he agency must make plain its course of inquiry, its analysis and its reasoning.” Id. at 1575 (citation omitted). 902 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 reason-giving by the agency would therefore have constitutional dimensions as well.108 Recognizing the fundamental importance of this requirement even prior to the APA’s enactment, the Supreme Court established the Chenery rule to test the validity of any agency’s exercise of discretion.109 In Chenery I, the Court held that discretionary administrative action will only be upheld on grounds articulated by the agency in the record.110 This is in marked contrast to judicial review of statutes: unless strict scrutiny is required, courts may uphold legislation on any constitutional basis—even one Congress never articulated.111 In establishing the Chenery rule, therefore, the Court identified a key difference between the way courts should evaluate legislation and the way they should evaluate agency action. The Chenery rule delimits the responsibilities and powers of agencies and courts in the judicial review process in a manner animated by, and sensitive to, separation of powers concerns.112 It preserves in agencies the formal authority to exercise the discretion delegated by Congress, preventing courts from substituting their own policy for that of the agency. At the same time, however, the rule limits agency power to make policy away from public scrutiny. The Chenery rule also helps promote integrated and cohesive decisionmaking within agencies. Knowing that courts will privilege those agency rationales proffered at the time of the agency decision and in the record—rather than often ad-hoc justifications by staff or counsel off the record, before the agency process officially begins, or during judicial review—senior agency officials have incentives to exercise control over staff and counsel, focusing the agency’s attention on the most persuasive, rational, and legally supportable justifications for the action. Chenery I has helped make “explicit reason-giving a major part of the industry of the administrative state.”113 For courts, in turn, “an agency’s contemporaneous explanation for its decisions remains one of the most common grounds for judicial reversal and remand.”114 As Kevin Stack has observed, courts treat an agency’s failure to articulate the right reasons for its decision as a 108. Metzger, supra note 100, at 491-93; Stack, supra note 38, at 1003-04. But see Note, Rationalizing Hard Look Review After the Fact, supra note 104, at 1921. 109. See SEC v. Chenery Corp. (Chenery I), 318 U.S. 80 (1943). 110. Id. at 87-88. 111. See, e.g., id. at 88; Helvering v. Gowran, 302 U.S. 238, 245 (1937) (stating the wellsettled principle that “if the decision below is correct, it must be affirmed, although the lower court relied upon a wrong ground or gave a wrong reason”). 112. Stack, supra note 38, at 957-58. 113. Id. at 957. 114. Id. 2014] NATIONAL SECURITY RULEMAKING 903 constitutional error.115 The Chenery rule helps enforce the nondelegation doctrine. The notice-and-comment requirements work hand-in-hand with Chenery I to ensure that agency rulemaking remains within constitutionally permissible bounds. That is why exceptions to notice-andcomment requirements are constitutionally problematic. Without a requirement that agencies articulate and test their rationales during the decisionmaking process, the courts may have difficulty discerning which rationales the agency actually relied upon in making its decision. This significantly weakens the courts’ ability to enforce the Chenery rule and with it, the non-delegation doctrine. Just as the notice-and-comment procedures have constitutional roots and a constitutional dimension, the exceptions to those procedures, too, must have some other constitutional justification. C. Secrecy and the National Security Exception As I will discuss further below, the APA provides several exceptions enabling agencies to disregard the notice-and-comment requirements, despite their importance. But the APA establishes only two substantive exceptions from notice-and-comment requirements.116 The first is an exception for “matter[s] relating to agency management or personnel or to public property, loans, grants, benefits, or contracts.”117 The first portion of this exception, respecting internal agency matters, is relatively easy to justify because these matters affect the public only indirectly.118 But the second portion is controversial in its own right: rules regarding public property, loans, grants, benefits, and contracts undoubtedly have the potential to substantially affect millions of Americans directly. Courts and com- 115. Id. at 983-84. 116. Not all departures from, or additions to, notice-and-comment rulemaking standards are found in the APA. An agency’s organic statute or other procedural statute may provide for more or fewer requirements. See, e.g., National Environmental Policy Act of 1969 (NEPA), 42 U.S.C. §§ 4321–4370h (2006) (mandating thorough scientific and systematic analysis of environmental problems in rulemaking and imposing procedural requirements to generate information for the agency and the public). 117. 5 U.S.C. § 553(a)(2) (2012). 118. Compare Tunik v. Merit Sys. Prot. Bd., 407 F.3d 1326, 1343-44 (Fed. Cir. 2005) (holding that the exception did not apply to the purported repeal by Merit Systems Protection Board (MSPB) of a regulation governing removal of administrative law judges because the rule implicated a broader interest of the public in having private rights adjudicated by persons who had some independence from the agency that opposed them), with Favreau v. United States, 317 F.3d 1346, 1359 (Fed. Cir. 2002) (holding that the exception applied to memoranda detailing when the United States could seek recoupment of prepaid bonuses from armed forces personnel). 904 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 mentators expressed puzzlement,119 and the Administrative Conference of the United States recommended that this portion of the exception be eliminated.120 Subsequent agency-specific statutes and regulations have considerably constrained its scope.121 The second substantive exception is the national security exception, which, unlike its ill-fated twin, is alive and well. It is an expression of, if not the foundation of, the national security administrative state. If the proposed rule involves a “foreign affairs” or “military” function of the United States, the agency may disregard the APA’s requirements for notice, comment, and delay in rule implementation.122 This is not the only way in which the framework of U.S. administrative law provides national security exceptions. Classification authority enables agencies to avoid notice-and-comment by keeping a portion, or the entire existence, of rulemaking secret.123 And the APA itself includes other exceptions for national security agency action. Importantly, agencies are also exempt from the adjudication requirements when conducting a foreign affairs or military function.124 And although the APA usually applies to military departments and agencies, it does not apply at all to military commissions, courts martial, or to “military authority exercised in the field in time of war or in occupied territory.”125 Moreover, Executive Order 12,866, which establishes, over all U.S. government agency rulemaking, centralized review by the Office of 119. Nat’l Wildlife Fed’n v. Snow, 561 F.2d 227, 231 (D.C. Cir. 1976) (“[T]he APA [contracts exception] does create a serious gap in the procedural protections the APA was enacted to provide.”). 120. Arthur Earl Bonfield, Public Participation in Federal Rulemaking Relating to Public Property, Loans, Grants, Benefits, or Contracts, 118 U. PA. L. REV. 540, 611 (1970). 121. See, e.g., Elimination of Certain Exceptions from the APA Rulemaking Requirements, 1 C.F.R. § 305.69-8 (1974) (detailing 5 U.S.C. § 553(a)(2) rules pertaining to “ ‘public property, loans, grants, benefits, or contracts’ ”); see also United States v. AEY, Inc., 603 F. Supp. 2d 1363, 1376 (S.D. Fla. 2009); Pierce, supra note 68, at 116. The exception is still invoked, however, for a small percentage of rules. See U.S. GOV’T ACCOUNTABILITY OFFICE, GAO-13-21, FEDERAL RULEMAKING: AGENCIES COULD TAKE ADDITIONAL STEPS TO RESPOND TO PUBLIC COMMENTS 8, 15 (2012) [hereinafter GAO REPORT]. 122. 5 U.S.C. § 553(a)(1). 123. For a list of the key statutes providing authority to classify information, see supra note 12. The President also engages in national security rulemaking directly through a variety of different types of executive orders, which are usually published in the Federal Register, and National Security Decision Directives (which go by many different names), which are usually not. See STEPHEN DYCUS, ET. AL, NATIONAL SECURITY LAW 40-41 (5th ed. 2011). 124. See 5 U.S.C. § 554(a)(4). Discussion of the adjudication exception is beyond the scope of this Article, but it raises many, if not most, of the same problems as the rulemaking exception. 125. 5 U.S.C. § 551(1)(F)–(G). For an analysis of the military authority exception and a compelling argument that it should be narrowly construed, see Kathryn E. Kovacs, A History of the Military Authority Exception in the Administrative Procedure Act, 62 ADMIN. L. REV. 673 (2010). 2014] NATIONAL SECURITY RULEMAKING 905 Information and Regulatory Affairs (OIRA) in the Office of Management and Budget (OMB), echoes the APA by exempting “[r]egulations or rules that pertain to a military or foreign affairs function of the United States, other than procurement regulations and regulations involving the import or export of non-defense articles and services.”126 By virtue of the exceptions in the APA and Executive Order 12,866, national security rulemaking is not subject to other statutory and regulatory requirements, the goal of which is to keep agencies accountable to the public and policymakers. For example, many national security rules are not included in the publication of the “Unified Agenda,” which is intended to be a central database of current agency rulemaking throughout the U.S. government.127 Nor are agencies required to conduct periodic review of existing national security regulations under the Regulatory Flexibility Act or conduct cost-benefit analyses when they engage in national security rulemaking.128 But in our administrative law’s web of national security exceptionalism, the APA’s notice-and-comment rulemaking exception stands out because it applies to every agency, in times of war and peace. And it does the most work to strip national security rulemaking of the key features that are believed to ensure democratic accountability, transparency, and legitimacy. A lack of available data makes it difficult to establish how often the national security exception has actually been used by agencies to disregard the notice-and-comment rulemaking requirements. A 1969 survey of agencies by the Administrative Conference of the United States revealed that “[i]n practice, . . . most agencies do not usually exercise their discretion to follow the [notice-and-comment] requirements . . . when they are not bound to do so because the rule-making involves a ‘military or foreign affairs function.’ ”129 Most revealing was the response by the Department of Defense (DoD), which seemed 126. Exec. Order No. 12,866, 3 C.F.R. § 638 (1993), reprinted as amended in 5 U.S.C. § 601. The OIRA review process was established by this Executive Order under the Clinton Administration. The Order was revised under the Bush Administration, but the Obama Administration restored the original language. Exec. Order No. 13,497, 74 Fed. Reg. 6113 (Feb. 4, 2009). 127. The Unified Agenda is maintained by the Regulatory Information Center in the OIRA. See Introduction to the Unified Agenda of Federal Regulatory and Deregulatory Actions, 77 Fed. Reg. 7664, 7665 (Feb. 13, 2012) (“Executive Order 12866 does not require agencies to include [in the Unified Agenda] regulations concerning military or foreign affairs functions or regulations related to agency organization, management, or personnel matters.”). The Unified Agenda is available at http://www.reginfo.gov/public/do/eAgendaMain. 128. These requirements are only triggered by the notice-and-comment process. See, e.g., Airports of Entry or Departure for Flights to and from Cuba, CUSTOMS BULL. & DECISIONS, Feb. 2011, at 1, 5 (observing that, because the national security exception relieved the Commerce Department from conducting notice-and-comment, the “Department does not consider this document to be subject to the provisions of the Regulatory Flexibility Act”). 129. Bonfield, supra note 22, at 232. 906 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 to have concluded that it was exempt entirely from notice-andcomment rulemaking requirements. When asked how often it relied on the specific exception for “military functions,” and how often it relied on the other substantive exceptions for “foreign affairs,” “agency management or personnel,” “public property,” or “contracts,” the Department replied that “ ‘[i]n a fundamental sense all regulations and directives of the Department are incident to its essentially military function of national defense.’ ”130 The State Department estimated that forty percent of its rules fit within the exception.131 However, during the mid-1970s, following the Vietnam War and Watergate, when Congress and the public heavily scrutinized the activities of military and intelligence agencies and proposals for sweeping legislative reform were in the air, DoD changed its tune.132 In response to proposals by the Administrative Conference of the United States that the national security exception be eliminated,133 DoD in 1975 issued regulations to “voluntarily adopt procedures for public participation in rulemaking having direct and substantial public impact.”134 Through 2005, the announced Department policy was to use notice-and-comment procedures for such rules “unless it [was] determined by the DoD Component as a matter within its sole and exclusive prerogative that the employment of the exception or exemption [was] appropriate to satisfy a significant and legitimate interest of the DoD Component or the public.”135 This language, which was published in the Code of Federal Regulations, obviously still left the Department plenty of flexibility to avoid notice-and-comment. In 2006, the Department undertook further reforms designed to regularize the use of notice-and-comment. It removed the rule from the Code of Federal Regulations and adopted a new Administrative Instruction (AI 102) generally requiring the Department “Components” to comply with all rulemaking requirements that would apply 130. Id. at 239 (quoting House Comm. on Gov’t Operations, 85th Cong., Survey and Study of Administration, Organization, Procedure and Practice in the Federal Agencies 278 (Comm. Print 1957)). 131. See id. at 261. 132. See Anjali S. Dalal, Shadow Administrative Constitutionalism and the Creation of 59, 78, available at Surveillance Culture, 2014 MICH. ST. L. REV. http://digitalcommons.law.msu.edu/lr/vol2014/iss1/3 (observing that revelations in the early 1970s about widespread national security-related abuses of power forced the nation “into a national dialogue about the constitutional boundaries of executive power . . . and the appropriateness of domestic intelligence gathering”). 133. Elimination of the “Military or Foreign Affairs Function” Exemption from APA Rulemaking Requirements, 1 C.F.R. § 305.73-5 (1975). 134. 40 Fed. Reg. 4911 (Feb. 3, 1975). The most recent version of this rule, valid through 2005, is codified at 32 C.F.R. § 336.3. 135. 32 C.F.R. § 336.3. The regulation was superseded by U.S. Dep’t of Defense Administrative Instruction 102 and removed from the Federal Register in 2006. See Removal of Parts, 71 Fed. Reg. 12,280, 12,281 (Mar. 10, 2006). 2014] NATIONAL SECURITY RULEMAKING 907 to non-military or foreign affairs functions when the rules would have an impact on the public in certain ways.136 Specifically, AI 102 requires the Department to follow notice-and-comment procedures when a rule “[i]s presently in the CFR”; “[g]rants a right or privilege to the public or has a direct or substantial impact on any significant portion of the public (e.g., visitors allowed to tour the Pentagon)”; “[p]rescribes a course of conduct that must be followed by persons outside the Government to avoid a penalty or secure a right or privilege (e.g., behavior when visiting the Pentagon)”; “[c]onstitutes authority for persons outside the Government to act or secure immunity from the consequence of not acting (e.g., security officers)”; “[i]mposes an obligation on the general public or members of a class of persons outside the Government (e.g., charges to reside at a dwelling owned by DoD)”; “[d]escribes where the public may obtain information, instructions, and forms; make submittals or requests; take examinations; or obtain decisions (e.g., Web site information)”; or “[d]escribes procedures by which a DoD Component conducts its business with the public (e.g., financial institutions on DoD installations).”137 These changes reduced the need for DoD to rely on the national security exception. But they did not necessarily make DoD more transparent. In imposing these requirements, DoD was careful to exclude rules that “pertain[] to a military or foreign affairs function of the United States determined to require a security classification in the interests of national defense or foreign policy under the criteria of an E.O. or statute (e.g., foreign military sales).”138 Even though DoD’s changes increased transparency with respect to certain types of rulemaking, the trend toward increased secrecy pushed other types of rulemaking further into the shadows. Overclassification of national security information has been a serious problem for decades, despite attempts at reform. In the decade after September 11, the number of government employees and contractors with security clearances and the number of documents—including agency rules—that were subject to some form of classification grew dramatically.139 Moreover, similar voluntary notice-and-comment procedures were not adopted by other agencies, such as the National Security Agency or the Departments of State, Treasury, or Homeland Security, that engage in a significant amount of national security rulemaking directly affecting American citizens. 136. WASH. HEADQUARTERS SERVS., U.S. DEP’T OF DEF., Administrative Instruction 102 (2006), available at http://www.dtic.mil/whs/directives/corres/pdf/a102p.pdf. 137. Id. §§ E3.2.1–E.3.2.1.7. 138. Id. § E3.2.2.4. 139. See PRIEST & ARKIN, supra note 24, at 86-87. 908 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 In fact, the Federal Register contains relatively few specific invocations of the national security exception by agencies.140 The most commonly found examples are from the Commerce and Treasury Departments, which seem to invoke the exception rather regularly when issuing regulations regarding trade matters.141 For reasons I discuss below, however, agencies often rely on the exception without indicating that they are doing so. It is not uncommon for agencies to issue rules without notice-andcomment for a number of reasons. For one thing, the rules may be merely interpretive and non-legally binding “policy statements.”142 The APA also exempts “rules of agency organization, procedure, or practice.”143 Even for substantive rules, moreover, the APA contains a key exception from notice-and-comment requirements for when there is “good cause” on the ground that such requirements would be “impracticable, unnecessary, or contrary to the public interest.”144 The “good cause” exception is by far the one most commonly invoked by agencies during the rulemaking process to justify disregarding the notice-and-comment procedures for legislative rules.145 A dearth of accessible data or empirical studies makes it difficult to get an accurate picture of agency rulemaking in general.146 But secrecy and opacity make national security rulemaking especially tricky to track. Anne Joseph O’Connell constructed the first extensive database of rulemaking activities reported by agencies between 1983 and 2003.147 Analyzing this data, O’Connell concluded that the agen140. A search of the Federal Register yielded 2370 results suggesting an explicit invocation of the national security exception by agencies during the rulemaking process since 1981. The following query was used: (((“military” /6 “function”) or (“foreign affairs” /6 “function”)) /p (“rulemaking” or “rule”)). However, this is a very rough measure of the number of rules for which the exception was invoked. The number may be much lower because agencies typically issue more than one publication regarding the same rule. See Anne Joseph O’Connell, Political Cycles of Rulemaking: An Empirical Portrait of the Modern Administrative State, 94 VA. L. REV. 889, 925 n.104 (2008). 141. See, e.g., Amendments to the Export Administration Regulations: Implementation of Limited Syria Waiver for Reconstruction Assistance, 78 Fed. Reg. 43,972 (July 23, 2013) (to be codified at 15 C.F.R. pts. 736, 746). 142. See, e.g., Elec. Privacy Info. Ctr. v. U.S. Dep’t of Homeland Sec., 653 F.3d 1, 7 (D.C. Cir. 2011). 143. 5 U.S.C. § 553(b)(3)(A) (2012). 144. Id. § 553(b)(3)(B). 145. See GAO REPORT, supra note 121, at 19. 146. For key exceptions, see generally Kristin E. Hickman, Coloring Outside the Lines: Examining Treasury’s (Lack of) Compliance with Administrative Procedure Act Rulemaking Requirements, 82 NOTRE DAME L. REV. 1727, 1730 (2007) (reporting results by the author of the first empirical study of Treasury’s APA compliance); O’Connell, supra note 140, at 895 (analyzing trends using the first extensive database on agency rulemaking activities between 1983–2003, constructed by the author from agencies’ semi-annual reports). 147. The construction of this database was a major accomplishment because it required identifying and consolidating numerous agency documents concerning each rule. 2014] NATIONAL SECURITY RULEMAKING 909 cies issuing the greatest percentage of their rules without notice-andcomment were, in order, the Department of State (49.4%), the Department of Homeland Security (46.2%), the Office of Personnel Management (OPM) (42.3%), the Department of Defense (37.6%), NASA (36.5%), and the Department of Justice (34.2%).148 With the exception of the OPM (whose rules are likely to fall under other APA exceptions), these agencies happen to be the most likely to engage in opaque national security rulemaking.149 In December 2012, the General Accounting Office (GAO) reported that it had examined a sample of published rules issued by agencies between 2003 and 2010, and that “agencies published about 35 percent of major rules and about 44 percent of nonmajor rules” without the Notice of Proposed Rulemaking (NPRM) required by the APA.150 The lack of an NPRM generally indicates that the agency issued the rule without following the notice-and-comment requirements, either by failing to solicit or consider comments at all or by soliciting comments only after the rule had taken effect (an “interim-final” rule). Approximately seventy-seven percent of the time this happened for major rules, the GAO reported, the agency relied on the “good cause” exception.151 The frequency with which the good cause exception is used may seem to suggest that agencies need not rely on the national security exception if they wish to avoid notice-and-comment. Indeed, observing recent use of the “good cause” exception, one scholar has argued that it is being exercised by agencies “with increasing and troubling frequency that indicates a casual disregard of public participation.”152 However, the GAO report demonstrates that something else is at work. In fact, by far the most common reason why agencies rely on the “good cause” exception is because they have no choice: Congress has either mandated issuance of the rule or imposed a strict deadline that does not give the agency enough time to conduct notice-andcomment rulemaking. The most common reasons cited by agencies for invoking this exception were that (1) another statute or court order required the agency to act before it had time to conduct the notice-and-comment procedure; (2) another statute directly prescribed the content of the rule; or (3) the agency was responding to an emer148. O’Connell, supra note 121, at 934. 149. Many other agencies, like the NSA, will have a larger percentage of their rules falling into the national security exception, but most such rules remain secret and would not be reflected in O’Connell’s study results. See supra notes 2-17 and accompanying text. 150. See GAO REPORT, supra note 121, at 8. A “major” rule is “one that, among other things, has resulted in or is likely to result in an annual effect on the economy of $100 million or more.” See id. at 7. 151. See id. at 15. 152. Babette E.L. Boliek, Agencies in Crisis? An Examination of State and Federal Agency Emergency Powers, 81 FORDHAM L. REV. 3339, 3343 (2013). 910 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 gency.153 In contrast, of the 123 rules issued without an NPRM that the GAO Report examined, only two, by the Departments of Homeland Security and Commerce, specifically invoked the national security exception.154 While the GAO Report provides a useful overall picture of the frequency with which agencies avoid notice-and-comment rulemaking for many types of rules, it is much less useful for revealing how often agencies avoid the procedures on the ground that the rules substantively fall within the national security exception. For one thing, given the vast number of agencies that conduct national security-related regulation, it is quite probable that a great deal of substantive rulemaking by federal agencies happens in secret, justified on legal grounds that never see the light of day or by the statutes that permit important government information—even rulemaking—to be kept secret.155 Therefore, with the explosion in the use of this classification by agencies in the past decade, there could be thousands of unpublished rules—which still have the force of law—that will not turn up in a search of the Federal Register and would not have been captured in the GAO Report.156 One prominent example of secret substantive rulemaking is the development and implementation of Standard Operating Procedures (SOPs) for airport passenger screening by the Transportation Security Administration (TSA), an agency in the Department of Homeland Security. Although most members of the public are directly affected by these rules, and they implicate constitutional rights, they are generally not available to the public.157 After significant public criticism and a lawsuit by privacy advocates, the D.C. Circuit held in 2011 that the TSA must use notice-and-comment rulemaking in promulgating rules for the use of advanced imaging technology (AIT) at air153. GAO REPORT, supra note 121, at 16. 154. Changes to the Visa Waiver Program to Implement the Electronic System for Travel Authorization (ESTA) Program, 73 Fed. Reg. 32,440, 32,444 (June 9, 2008); Revisions and Technical Correction to the Export Administration Regulations, 72 Fed. Reg. 20,221, 20,222 (Apr. 24, 2007) (making several corrections to the Export Administration Regulations regarding Libya and terrorist-supporting countries). 155. For examples of statutes that authorize secret rulemaking, see supra note 23. 156. See supra notes 23-26 and accompanying text (discussing the problem of rampant over-classification). “Unpublished” rules are not necessarily secret or unavailable to the public. They are often a form of opaque rulemaking signaled in various forms in agency communications, such as policy manuals, that may eventually be released. 157. Elec. Privacy Info. Ctr. v. U.S. Dep’t of Homeland Sec., 653 F.3d 1, 3 (D.C. Cir. 2011) (“Congress generally has left it to the agency to prescribe the details of the screening process, which the TSA has documented in a set of Standard Operating Procedures not available to the public.”). Some of the SOPs were inadvertently published online in 2009. See OFFICE OF INSPECTOR GEN., U.S. DEP’T OF HOMELAND SEC., OIG-10-37, TSA’S BREACH OF SENSITIVE SECURITY INFORMATION (2010), available at http://www.oig.dhs.gov/ assets/Mgmt/OIG_10-37_Jan10.pdf. 2014] NATIONAL SECURITY RULEMAKING 911 ports, although it permitted the current rules to remain in place.158 Although the D.C. Circuit rejected the TSA’s arguments that the rules were exempt, the agency did not rely on the national security exception.159 In March 2013, the TSA issued a Notice of Proposed Rulemaking on AIT, beginning the notice-and-comment process.160 But the most important factor that makes national security rulemaking difficult to track is that the APA’s national security exception is a unique card that can be played by an agency at any point. In stark contrast to the use of the “good cause” exception, courts simply have not required agencies eschewing the notice-and-comment process to invoke the national security exception as their reason for doing so contemporaneously with the issuance of the rule. In other words, an agency may fail to follow notice-and-comment rulemaking procedures without explaining why, but it may subsequently rely on the national security exception when the rule is challenged in court.161 Even when agencies do invoke the exception when issuing a rule, they have not been required by courts to provide any justification for why the exception applies.162 Since the APA was enacted, federal courts have discussed the national security exception in approximately one hundred cases.163 In approximately seventy-six of those cases, the court weighed the applicability of the exception, even though the agency had not invoked the exception during the rulemaking process and was apparently relying on the exception for the first time. In about sixty-two of those cases, the court concluded that the exception applied; in about fourteen cases, the court held that the exception did not apply and that the agency had therefore violated the APA. In stark contrast, if an agency does not invoke the “good cause” exception during the rule158. Elec. Privacy Info. Ctr., 653 F.3d at 6 (holding that, because an AIT scanner produces “an image of the unclothed passenger,” it “intrudes upon his or her personal privacy in a way a magnetometer does not,” and that this “change substantively affects the public to a degree sufficient to implicate the policy interests animating notice-and-comment rulemaking”). 159. See id. at 5. 160. See Passenger Screening Using Advanced Imaging Technology, 78 Fed. Reg. 18,287 (Mar. 26, 2013). 161. See, e.g., City of New York v. Permanent Mission of India to United Nations, 618 F.3d 172, 175 (2d Cir. 2010) (holding that the exception applied to the State Department’s regulation, despite the Department’s failure to invoke the exception during rulemaking or in the final rule); Designation and Determination Under the Foreign Missions Act, 74 Fed. Reg. 31,788 (July 2, 2009). 162. See, e.g., Rajah v. Mukasey, 544 F.3d 427, 437 (2d Cir. 2008) (rejecting petitioners’ assertion that “the foreign affairs exception is inapplicable because the regulation itself did not contain a statement of the undesirable international consequences flowing from the application of notice and comment review” and concluding that there is “no requirement that the rule itself state the undesirable consequences”). 163. These numbers, calculated from my searches on Westlaw and Lexis, are approximate because it is not always clear whether the national security exception was necessary for the court’s decision in a particular case. 912 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 making process and provide justification for invoking it, in most cases the agency will not be permitted to rely on the “good cause” exception in court.164 The courts’ practice of permitting agencies to rely on the national security exception in this manner is plainly inconsistent with the Chenery rule, under which courts will uphold agency action only on the grounds upon which the agency relied when it acted.165 Given that much of national security rulemaking happens “in the shadows” and that the agencies themselves are not normally providing contemporaneous reasons why the national security exception applies, courts have failed to offer clear guidance about the appropriate scope of the exception.166 Anything beyond a superficial discussion can be found in just a handful of cases. What is most well established is that the exception applies to international executive agreements that have the force of law.167 Similarly, regulations implementing treaties are almost always regarded as falling within the exception.168 In one of the earliest cases applying it, the Second Circuit determined that the FCC acted lawfully when it eschewed notice-and-comment procedure in promulgating, pursuant to a treaty with Canada, a regulation that reduced the rights of U.S. AM radio broadcasters.169 In 1994, the Department of Transportation relied on the national security exception to defeat a legal challenge by the Teamsters Union to a rule, enacted pursuant to the North American Free Trade Agreement (NAFTA) without notice-andcomment, exempting Mexican truckers operating in the United States from complying with U.S. motor vehicle laws.170 In the 1980s, the Court of International Trade attempted to discern the limits of the exception by analyzing the APA’s legislative history and the AG Manual.171 Looking to the purpose of the rules under review rather than the agency issuing them, the court concluded that the exception applied to rules “ ‘clearly and directly in164. See, e.g., Carlisle Tire & Rubber Co., Div. of Carlisle Corp. v. United States, 10 Ct. Int’l Trade 301, 306 (1986). 165. See supra notes 109-115 and accompanying text. 166. See Vermeule, supra note 33, at 1112. 167. Hathaway, supra note 34, at 221 (noting that, because of the national security exception, “international agreements are not subject to the same notice and comment rulemaking procedures that apply to nearly every other administrative rule and regulation issued by the U.S. government” and that “no alternative oversight mechanism stands in its place”). 168. See, e.g., Int’l Bhd. of Teamsters v. Peña, 17 F.3d 1478, 1486 (D.C. Cir. 1994); Am. Ass’n of Exps. & Imps.-Textile & Apparel Grp. v. United States, 751 F.2d 1239, 1249 (Fed. Cir. 1985); Earth Island Inst. v. Christopher, 913 F. Supp. 559, 574 (Ct. Int’l Trade 1995); Am. Inst. for Imp. Steel, Inc. v. United States, 600 F. Supp. 204, 211 (Ct. Int’l Trade 1984). 169. See WBEN, Inc. v. United States, 396 F.2d 601 (2d Cir. 1968). 170. See Int’l Bhd. of Teamsters, 17 F.3d at 1486. 171. Mast Indus., Inc. v. Regan, 8 Ct. Int’l Trade 214, 229-32 (1984) (noting that courts in prior cases had not attempted to identify a limiting principle for the exception). 2014] NATIONAL SECURITY RULEMAKING 913 volved’ in a ‘foreign affairs function,’ ”172 which extended to rules by the U.S. Customs Service negotiated with foreign governments,173 but not to rules by the Commerce Department establishing when a dumping margin was regarded as “de minimis” for determining countervailing duties in dumping investigations.174 But it has not been necessary for the agency to be regulating pursuant to an international agreement for the exception to apply. Instead, it has been enough that a court perceive that the rulemaking process would interfere with international negotiations or result in retaliation against the United States by other countries. For example, the Second Circuit held in 2010 that the exception applied to a State Department decision to abruptly cut short a long-running dispute between New York City and two nations’ foreign missions to the United Nations.175 The city had maintained that, while the mission offices were not taxable, the adjacent residences of mission employees were.176 When two of the missions brought suit to challenge the tax, the federal district court had agreed that, under relevant treaty provisions, the residences were taxable.177 While the missions appealed, the State Department acted swiftly, issuing a regulation, without notice or comment, declaring that such residences were not taxable and preempting all local and state laws.178 The Second Circuit upheld the regulation and agreed that the national security exception applied, even though the State Department had not invoked it when issuing the rule.179 Apart from the context of international agreements, courts are more likely to hold that the national security exception applies when the court perceives that notice-and-comment would cause “definitely undesirable international consequences,”180 the rulemaking is a response to a crisis with foreign affairs implications, or military operations are involved. None of these factors were present when a court held that the exception did not apply to Energy Department regulations governing civilian contractors at facilities where nuclear explosives were manufactured.181 Similarly, some courts have rejected the 172. Id. at 231 (quoting H.R. REP. NO. 79-1980, at 257 (1946)). 173. Id. at 228. 174. See Carlisle Tire & Rubber Co., Div. of Carlisle Corp. v. United States, 10 Ct. Int’l Trade 301, 305-06 (1986). 175. See City of New York v. Permanent Mission of India to United Nations, 618 F.3d 172, 201 (2d Cir. 2010). 176. Id. at 174-75. 177. Id. at 176. 178. Id. at 178. 179. Id. at 201. 180. See Rajah v. Mukasey, 544 F.3d 427, 437 (2d Cir. 2008). 181. Indep. Guard Ass’n, Local No. 1 v. O’Leary, 57 F.3d 766, 770 (9th Cir. 1995). 914 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 applicability of the exception in a few immigration contexts. For example, one court held that rulemaking regarding administrative detention of Haitian refugees did not fall within the exception, although the INS was responding to a crisis, because nothing in the record supported a finding that notice-and-comment rulemaking would have resulted in “undesirable international consequences.”182 However, multiple courts held that the national security exception applied to rules tightening restrictions on Iranian nationals in the wake of the Iranian Hostage Crisis in 1980.183 And courts have held that the exception applies to the designation by the military of “temporary security zone[s]” such as the weapons testing site near Vieques in Puerto Rico.184 Although the cases addressing the exception are rare, they do suggest that its applicability, if not always its application, is broad. Due to the secrecy and opacity of agency decisionmaking in these areas, it is difficult to tell whether agencies are, sub silentio, relying on the exception, or whether they are simply following a past practice of failing to comply with the APA. Either way, national security rulemaking takes place within an administrative culture that eschews notice-and-comment and does not value public participation or accountability. In the remainder of this Article, I discuss whether national security rulemaking should be different and why. III. THE SCHMITTIAN VIEW OF NATIONAL SECURITY RULEMAKING As Part II explained, the national security exception is not the only way in which agencies are authorized—by the APA itself or other statutes—to depart from notice-and-comment procedures when issuing rules that have the force of law. What is special about the exception is the way in which it categorically separates one substantive area of rulemaking from all others.185 If one examined only the legislative history of the bill that became the APA, one could conclude that the decision to carve out this exception was simply based on accepted, if unexpressed, assumptions about the exceptional nature of national security rulemaking.186 182. Jean v. Nelson, 711 F.2d 1455, 1477-78 (11th Cir. 1983), vacated and rev’d on other grounds en banc, 727 F.2d 957 (11th Cir. 1984), aff’d, 472 U.S. 846 (1985). 183. See Nademi v. INS, 679 F.2d 811, 814 (10th Cir. 1982); Malek-Marzban v. INS, 653 F.2d 113, 115-16 (4th Cir. 1981); Yassini v. Crosland, 618 F.2d 1356, 1360 (9th Cir. 1980). 184. United States v. Ventura-Melendez, 321 F.3d 230, 232 (1st Cir. 2003). 185. The other substantive exception is for government grants and contracts, and it has been narrowed significantly by subsequent statutes and regulations. See supra notes 119121 and accompanying text. 186. See, e.g., STAFF OF S. COMM. ON THE JUDICIARY, 79TH CONG. (Comm. Print 1945), reprinted in ADMINISTRATIVE PROCEDURE ACT: LEGISLATIVE HISTORY, 79TH CONGRESS, 1944–46, at 15, 17 (1946) (referring to the exception as “self-explanatory”); infra notes 218224 and accompanying text. 2014] NATIONAL SECURITY RULEMAKING 915 Indeed, this is probably the accepted view. Professor Adrian Vermeule has recently argued that the entire corpus of American administrative law, from authorizing statutes to court decisions, allows agencies to transcend the bounds of administrative procedure and meaningful judicial review in emergencies.187 Vermeule identifies the national security exception as one example of a number of such “black holes” created by the APA and other statutes—areas where the executive may operate free of legal constraints.188 In addition, Vermeule contends that administrative law contains numerous “grey holes”—ambiguous legal provisions that provide courts opportunities to indulge their natural tendency to give heightened deference to agencies during national crises.189 Within these grey holes, courts can preserve the pretense of the rule of law while deferring entirely to the executive.190 In articulating this thesis, Vermeule embraced the controversial theories of German political scientist Carl Schmitt, “ ‘the outstanding legal theorist of the . . . exception.’ ”191 Schmitt’s theories have descriptive and normative aspects. He is well known for his assertion that the “[s]overeign is he who decides on the exception.”192 However, Schmitt not only argued that this phenomenon is inevitable; he concluded that it is necessary for the state’s survival.193 Moreover, as Schmitt developed his theories, the exception took on greater and greater importance, and Schmitt ultimately argued against limiting the sovereign’s discretion at all.194 Because “[t]he precise details of an emergency cannot be anticipated” in advance, Schmitt argued, the “sovereign” must enjoy absolute freedom both to determine “whether there is an . . . emergency” and “what must be done to eliminate it.”195 Vermeule takes from Schmitt that an administrative legal regime replete with black and grey holes is inevitable. It is “hopelessly utopian,” Vermeule argues, to attempt to apply meaningful administra187. Vermeule, supra note 33, at 1096-97; see also Evan J. Criddle, Mending Holes in the Rule of (Administrative) Law, 104 NW. U. L. REV. 1271, 1271 (2010). 188. Vermeule, supra note 33, at 1096. 189. Id. 190. See id. at 1114. Vermeule was using and responding to the concept of grey holes and black holes used by David Dyzenhaus. See DAVID DYZENHAUS, THE CONSTITUTION OF LAW: LEGALITY IN A TIME OF EMERGENCY 3 (2006). 191. Gross, supra note 44, at 1826 (emphasis omitted) (quoting HANS KELSEN & CARL SCHMITT, A JUXTAPOSITION 10 (Dan Diner & Michael Stolleis eds., 1999)). 192. Carl Schmitt, Political Theology: Four Chapters on the Concept of Sovereignty 5 (George Schwab trans., MIT Press 1985) (1922). 193. See CARL SCHMITT, THE CRISIS OF PARLIAMENTARY DEMOCRACY 12 (Ellen Kennedy trans., MIT Press 1985) (1923); David Dyzenhaus, Emergency, Liberalism, and the State, 9 PERSP. ON POL. 69, 72 (2011). 194. See Gross, supra note 44, at 1841. 195. SCHMITT, supra note 192, at 6-7. 916 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 tive law constraints during emergencies: “The exception cannot, realistically, be banished from administrative law; exceptions are necessarily built into its fabric.”196 Vermeule is less clear about whether this state of affairs is a desirable one.197 While Vermeule is almost certainly correct that exceptions cannot be banished entirely from administrative law, critics have disagreed with his contention that courts in fact do practice the sort of absolute deference he identifies.198 They have also argued that administrative law can be reformed to reduce the ability of the executive to act without constraint during emergencies—for example, by altering the nature of the exceptions,199 changing the culture of agencies and courts to encourage consideration of “public-regarding factors,”200 or creating a more detailed legal framework for emergency administration.201 It is no coincidence that interest in Schmitt, on the part of legal scholars, has exploded in the decade following the September 11 attacks and the resulting global war against Al Qaeda and the Taliban.202 Schmitt’s core observation that states of exception must exist in liberal democracies is an intuitively powerful one. Although Schmitt’s views have recently found more sympathy among conservative scholars, their influence—even if Schmitt himself is not mentioned—is something to be reckoned with. Nearly every theorist seriously addressing emergency or war governance after September 11 has found it necessary to grapple with the Schmittian perspective.203 It is also no coincidence that Schmitt developed his theories during a period of acute crisis in his native Germany during the 1920s 196. Vermeule, supra note 33, at 1097, 1104. 197. Philip Alston, The CIA and Targeted Killings Beyond Borders, 2 HARV. NAT’L SECURITY J. 283, 429 (2011) (observing that a “problem with Vermeule’s approach is the extent to which it blurs empirical conclusions with normative arguments”). 198. See, e.g., Criddle, supra note 187, at 1274, 1275 & n.20. 199. See id. at 1272; David Dyzenhaus, Schmitt v. Dicey: Are States of Emergency Inside or Outside the Legal Order?, 27 CARDOZO L. REV. 2005, 2026 (2006). 200. Criddle, supra note 187, at 1272. 201. See Ackerman, supra note 105, at 1030-31, 1044 (proposing “a newly fashioned emergency regime” that permits “short-term emergency measures but draws the line against permanent restrictions” to “rescue the concept” of emergency power “from fascist thinkers like Carl Schmitt, who used it as a battering ram against liberal democracy”). 202. See DUDZIAK, supra note 44, at 116 (observing that “[c]itations to Schmitt in legal scholarship steadily increased” after September 11, with “twenty-four citations to Schmitt in 2001, twenty-nine in 2002, fifty-one 2003, and eighty-six in 2009”); David Luban, Carl Schmitt and the Critique of Lawfare, 43 CASE W. RES. J. INT’L L. 457, 463 (2010). Interest in Schmitt had already been gaining steam prior to September 11. See D.A. Jeremy Telman, Should We Read Carl Schmitt Today?, 19 BERKELEY J. INT’L L. 127, 129 (2001) (book review). 203. See DUDZIAK, supra note 44, at 116-18 (discussing responses to Schmitt among legal scholars). 2014] NATIONAL SECURITY RULEMAKING 917 and 1930s.204 Schmitt witnessed the perceived weakness of the democratic Weimar government and saw it collapse with Hitler’s rise to power.205 Schmitt himself became a Nazi Party member, and the extent to which he justified the exploitation of legal loopholes that enabled the rise of the Third Reich is the subject of intense debate.206 For many contemporary American legal scholars like Vermeule, however, the history is beside the point; what is important is not the historical context in which Schmitt arrived at his understanding of governance, but what he understood and explained about the essential nature of administration during war and emergency, which is true for every democratic government in every era.207 This elevation of theory over context is problematic. It is entirely possible that rules created in times of emergency and war are intended to address the current emergency and were never intended to be appropriate for future wars or emergencies. Yet path dependency and legislative and regulatory ossification leave legal frameworks in place long after the problems they were intended to address no longer exist.208 Moreover, where Vermeule’s description of black holes in American administrative law fits uneasily with Schmitt’s approach is in the concept of emergency. Although the core of Schmitt’s work explored states of “exception” (Ausnahmezustand), his later writings made clear that he meant for the term to encompass much more than what we commonly understand to be emergencies—temporary periods of extreme peril, such as war or natural disasters.209 In fact, Schmitt ultimately concluded that, to limit the exception to emergencies—or to impose any limitations at all on the breadth of the concept—would 204. See Telman, supra note 202, at 130-32 (discussing the influence of World War I and the collapse of the pre-war order on Schmitt’s philosophy). For biographical information about Schmitt, see, for example, JOSEPH W. BENDERSKY, CARL SCHMITT: THEORIST FOR THE REICH (1983). 205. See Telman, supra note 202, at 136 (“Having struggled, along with others, to provide the fledgling Weimar Republic with a legal theory that could guarantee its stability, Schmitt arrived at the conclusion that the Sovereign needed, in certain situations, to become the exception that cannot be bound by law.”). 206. Ellen Kennedy, Carl Schmitt and the Frankfurt School, TELOS, Fall 1987, at 37, 37-39; Telman, supra note 202, at 131-32. 207. Writing with Eric Posner, Vermeule described his approach as “extract[ing] the marrow from Schmitt and then throw[ing] away the bones for the professional exegetes to gnaw.” ERIC A. POSNER & ADRIAN VERMEULE, TERROR IN THE BALANCE: SECURITY, LIBERTY, AND THE COURTS 38 (2007). 208. Kim Lane Scheppele, Exceptions That Prove the Rule: Embedding Emergency Government in Everyday Constitutional Life, in THE LIMITS OF CONSTITUTIONAL DEMOCRACY 124, 124-34 (Jeffrey K. Tulis & Stephen Macedo eds., Princeton University Press 2010) (detailing examples of foreign and domestic legislative acts that tend to “constitutionalize emergency exceptions to normal government” (emphasis omitted)); cf. GIORGIO AGAMBEN, STATE OF EXCEPTION 2 (Kevin Attell trans., Univ. of Chi. Press 2005) (contending that states of emergency tend to become permanent). 209. See Gross, supra note 44, at 1826-28. 918 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 endanger the state by constraining the executive’s ability to determine when a state of exception exists and to respond appropriately.210 Therefore, our administrative law is both more and less Schmittian than Vermeule describes. It is more Schmittian because many of the black holes that he identifies are regularly used by agencies in times of peace and non-emergency. This is especially true of the national security exception. There was, for example, no war or emergency concerning Canada that required the FCC to issue regulations limiting the power of AM radio stations without notice-andcomment.211 The same could be said of most regulations to which the courts have concluded the exception applies.212 At the same time, the national security exception is perhaps less Schmittian because, although it may be broadly construed, it is arguable whether it truly constitutes a “suspension of the entire existing order.”213 The only way to make the actual operation of the exception fit with Vermeule’s use of the word “emergency” would be to acknowledge that we live in a permanent state of emergency.214 The problem with Vermeule’s Schmittian approach to our administrative law, then, is that, like Schmitt’s own theories, it has little to offer concerning the limits of the state of exception. A Schmittian/Vermeulian approach to the national security exception would be an acknowledgement that it has no practical limits. The exception is capable of swallowing the general rule. Yet if we wish to impose some limits on the exception, how can we do so? Although there are many ways to approach this question, the historical context in which the APA’s national security exception was created reveals a great deal about why the exception was believed to be necessary at the time and whether it continues to be necessary today. The next Part offers the first explanation for the exception based on this historical context. 210. See William E. Scheuerman, Legal Indeterminacy and the Origins of Nazi Legal Thought: The Case of Carl Schmitt, 17 HIST. POL. THOUGHT 571, 589 (1996) (“If legal indeterminacy is a truly ubiquitous facet of legal experience, then dictatorship similarly must take something close to an omnipresent, even permanent form.”). 211. See WBEN, Inc. v. United States, 396 F.2d 601 (2d Cir. 1968). 212. See supra notes 166-184 and accompanying text. 213. SCHMITT, supra note 192, at 12. 214. This is in fact exactly what Italian political theorist Giorgio Agamben has argued, using Schmitt’s theories and the Guantánamo Bay detention camp as points of departure. See AGAMBEN, supra note 208, at 2 (“[T]he voluntary creation of a permanent state of emergency . . . has become one of the essential practices of contemporary states, including so-called democratic ones.”). 2014] NATIONAL SECURITY RULEMAKING 919 IV. THE HISTORICAL ROOTS OF NATIONAL SECURITY RULEMAKING The conventional wisdom assumes that the fundamental exigencies driving national security rulemaking are basically static.215 Defenders of national security exceptionalism argue that the nature of national security policymaking is fundamentally different from ordinary policymaking, while critics argue that exceptional treatment of national security policymaking threatens democratic values.216 The debate is an essentialist one. However, it is entirely possible that, as the world changes and threats to America’s security change with it, the architecture of the administrative state ought to change in response. If this is so, it is vitally important to understand the historical context in which current administrative law doctrine was developed. This Part departs from the conventional wisdom and advances an alternative interpretation of the APA’s national security exception that is rooted in the history surrounding its enactment. Despite the dearth of specific legislative history explaining the exception with respect to the final APA itself, it is possible to reconstruct the exception’s purpose by reference to the historical context, the debates surrounding the predecessor legislation to the APA, and influential conceptions of organizational theory at the time of the APA’s enactment.217 An examination of this context reveals the striking degree to which the national security exceptionalism embedded in our current administrative law regime was a creature of the unique geopolitical and domestic political concerns of the 1930s and 1940s. Pearl Harbor, the rise of fascism, and the war-related failures of federal govern215. See supra Part III. For an argument that, although the conventional wisdom assumes that national security considerations are timeless, they are in fact rooted in outdated views of international relations theory, see Robert Knowles, American Hegemony and the Foreign Affairs Constitution, 41 ARIZ. ST. L.J. 87, 93 (2009). 216. Compare Jide Nzelibe, The Uniqueness of Foreign Affairs, 89 IOWA L. REV. 941, 943-44 (2004) (arguing that foreign affairs (and national security) matters deserve unique treatment by courts and in constitutional law), and supra notes 197-201, with Jeremy Waldron, Security and Liberty: The Image of Balance, 11 J. POL. PHIL. 191, 206 (2003) (“We have to worry that the very means given to the government to combat our enemies will be used by the government against its enemies . . . .”). 217. The following is drawn from primary sources and invaluable historians’ and political scientists’ accounts of the APA and its era—in particular, those that describe the deep connection between New Deal politics and international relations and those addressing specifically the debate surrounding administrative law reform. Especially helpful were DUDZIAK, supra note 44; KATZNELSON, supra note 40; IDO OREN, OUR ENEMIES AND US: AMERICA’S RIVALRIES AND THE MAKING OF POLITICAL SCIENCE (2003); DOUGLAS T. STUART, CREATING THE NATIONAL SECURITY STATE: A HISTORY OF THE LAW THAT TRANSFORMED AMERICA (2008) (offering a definitive history of the National Security Act); Kovacs, supra note 125; McNollgast, The Political Origins of the Administrative Procedure Act, 15 J.L. ECON. & ORG. 180 (1999); Reuel E. Schiller, Reining in the Administrative State: World War II and the Decline of Expert Administration, in TOTAL WAR AND THE LAW: THE AMERICAN HOME FRONT IN WORLD WAR II 185 (Daniel R. Ernst & Victor Jew eds., Praeger Publishers 2002); and George B. Shepherd, Fierce Compromise: The Administrative Procedure Act Emerges from New Deal Politics, 90 NW. U. L. REV. 1557 (1996). 920 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 ment agencies were constantly on the minds of those contemplating and constructing the modern administrative state. These contemporaneous concerns infused, even distorted, the debate concerning administrative law reform to such a degree that there is, ironically, very little discussion of national security rulemaking, as such, in the legislative history of the bill that became the APA.218 Nonetheless, through a decades-long, often-vitriolic debate on reforming the administrative state that culminated in the APA, a story emerges about the origins of national security rulemaking: against the backdrop of a world in crisis, with the rise of fascist powers—and eventually, a world war against those powers—Congress decided to carve out greater and greater space for a distinct regime of national security rulemaking, even as it created a regime for ordinary rulemaking intended to rein in the excesses of the administrative state. The APA emerged as the ultimate compromise after a long struggle during the 1930s and ’40s by New Deal opponents to tame the growing administrative state.219 With respect to core administrative law issues such as judicial review of agency action, it reflected the settlement of “ ‘long-continued and hard-fought contentions, and enact[ed] a formula upon which opposing social and political forces have come to rest.’ ”220 Yet by the time Congress debated the bill that became the APA, the question of how to treat national security rulemaking appears to have been largely settled. The presence of the national security exception was little remarked upon,221 and it was often referred to as “self-explanatory.”222 The explanations that were offered seem to suggest that some in Congress believed it should be narrowly construed. One Congressman, in reference to the exception, said the following: “The exemption of military and naval functions needs no explanation here. The exempted foreign affairs are those diplomatic functions of high importance which do not lend themselves to public procedures and with which the general public is ordinarily not directly concerned.”223 The House and Senate Report cautioned against overbroad interpretation: 218. See Tibbels, supra note 34, at 395 n.27 (noting that the legislative history on the exception is limited to a paragraph). 219. See generally Shepherd, supra note 217. 220. Vt. Yankee Nuclear Power Corp. v. Natural Res. Def. Council, Inc., 435 U.S. 519, 523 (1978) (quoting Wong Yang Sung v. McGrath, 339 U.S. 33, 40 (1950)). 221. Hathaway, supra note 34, at 243 n.312. 222. See, e.g., STAFF OF S. COMM. ON THE JUDICIARY, 79TH CONG. (Comm. Print 1945), reprinted in ADMINISTRATIVE PROCEDURE ACT: LEGISLATIVE HISTORY, 79TH CONGRESS, 1944–46, at 15, 17 (1946); see also Hathaway, supra note 34, at 171-72. 223. 92 CONG. REC. 5650 (1946) (statement of Rep. Walter). 2014] NATIONAL SECURITY RULEMAKING 921 The phrase “foreign affairs functions,” used here and in some other provisions of the bill, is not to be loosely interpreted to mean any function extending beyond the borders of the United States but only those “affairs” which so affect relations with other governments that, for example, public rule making provisions would clearly provoke definitely undesirable international consequences.224 Although some in Congress apparently believed that the national security administrative state should be small, the Executive Branch, after the APA became law, seized on the provision’s language to imagine a vast regime of national security rulemaking. Indeed, as the first scholar to analyze the exception observed, “the language of the . . . exemption is very broad” and the “functions excluded are written in terms easily susceptible to wide application.”225 The influential 1947 Interpretive Guide to the APA issued by the office of the Attorney General and future Supreme Court Justice Tom Clark took what one commentator has called an “exceptionally sweeping” view of the national security exception’s scope.226 The Attorney General’s Manual is, for courts, a “key document” for interpreting the APA, contains the “most authoritative account” of the history of its passage,227 and has been “given some deference . . . because of the role played by the Department of Justice in drafting the legislation.”228 The reference to “military and naval functions” in the national security exception, the Manual concluded, was “not limited to activities of the War and Navy Departments but covers all military and naval functions exercised by any agency.”229 For example, the Manual offered, “the exemption applies to the defense functions of the Coast Guard and to the function of the Federal Power Commission under section 202(c) of the Federal Power Act.”230 By referring to “foreign affairs functions,” according to the Manual, the provision was “applicable to most functions of the State Department and to the foreign affairs functions of any other agency.”231 The Manual’s broad interpretation of the national security exception was the culmination of a trend that began with that era’s first 224. S. REP. NO. 79-752, at 13, 16 (1945); see also H.R. REP. NO. 79-1980, at 2-3, 23, 27 (1946). 225. Bonfield, supra note 22, at 238. 226. Tibbels, supra note 34, at 396; see generally U.S. DEP’T OF JUSTICE, ATTORNEY GENERAL’S MANUAL ON THE ADMINISTRATIVE PROCEDURE ACT 26-27 (1947) [hereinafter MANUAL]. 227. Citizens Awareness Network, Inc. v. United States, 391 F.3d 338, 362 (1st Cir. 2004) (citations and internal quotation marks omitted). 228. Vt. Yankee Nuclear Power Corp. v. Natural Res. Def. Council, Inc., 435 U.S. 519, 546 (1978). 229. MANUAL, supra note 226, at 26. 230. Id. 231. Id. at 27. 922 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 efforts at administrative law reform. From the first proposed legislation intended to restrain administrative agencies in 1929, to the final passage of the APA in 1946, with some exceptions, each subsequent draft of legislation recognized a broader national security administrative state than the one before it. The earliest proposals, which saw no action in Congress, did not mention the military or foreign affairs at all.232 By 1937, however, the world had changed and domestic politics along with it. Much of the public had begun to perceive agencies in the Roosevelt Administration as overreaching. Amid a recession and backlash against Roosevelt’s court-packing plan, and with a newly-quiescent Supreme Court no longer willing to strike down New Deal programs, support for administrative reform as a counterbalance to the New Deal grew.233 The anti-New Deal “conservative coalition” of Republicans and mostly-Southern Democrats took effective control in Congress.234 Fears of federal agencies run amuck became intertwined with increasing awareness by Americans of totalitarianism in Europe and Asia. Through the 1930s, the United States had closer ties with Fascist Italy than the Communist USSR, Nazi Germany, or Imperial Japan.235 For many Americans, however, the entanglement of business and government in fascist states bore a disturbing similarity to the way U.S. government agencies were closely involved with businesses in controlling wages and prices and the detailed regulation of industries.236 The floor debates on APA predecessor legislation during the 1930s and ’40s reflect these concerns: they are “ ‘riddled with comparisons of the administrative state to fascist and communist govern232. These early proposals, which began before FDR took office, sought simply to vest review of administrative decisions in the courts, which were considered conservative and skeptical of regulation. See Kovacs, supra note 125, at 681-83; Shepherd, supra note 217, at 1566-67. The first proposal introduced by Senator George Norris in 1929, see S. 5154, 70th Cong. (1929), went nowhere because even conservatives thought it unnecessary. See Kovacs, supra note 125, at 682-83. 233. See KATZNELSON, supra note 40, at 256-75 (describing the court-packing plan and recession); Shepherd, supra note 217, at 1586-93 (describing gathering momentum for administrative reform). 234. See McNollgast, supra note 217, at 204. 235. See KATZNELSON, supra note 40, at 92-93 (“[C]ore policymakers . . . were drawn to Mussolini’s Italy, which self-identified as a country that had saved capitalism.”); id. at 6368 (describing the rapturous public reception Fascist Italy’s Air Force Marshall and Mussolini heir-apparent Italo Balbo received during a visit to the United States). 236. See, e.g., James Q. Whitman, Of Corporatism, Fascism, and the First New Deal, 39 AM. J. COMP. L. 747, 748 (1991) (“To supporters and critics alike, [the National Recovery Act], a vast scheme for delegating governmental authority to private cartels, seemed akin to the ‘corporativism’ of Italian Fascism.”); Hoover Warns New Deal Leads U.S. to Fascism, WASH. POST, May 6, 1938, at X2 (summarizing and quoting a speech by FDR’s defeated predecessor, Herbert Hoover, broadcast to millions on the radio). For a recent revisionist history echoing these criticisms and roundly condemning the New Deal’s economic reforms and alleged autocratic tendencies, see AMITY SHLAES, THE FORGOTTEN MAN: A NEW HISTORY OF THE GREAT DEPRESSION (2007). 2014] NATIONAL SECURITY RULEMAKING 923 ments’ ” and accusations that administrative agencies were being used to advance FDR’s totalitarian ambitions.237 In 1937, the influential (and decidedly anti-New Deal) ABA Special Committee on Administrative Law, led by the “dyspeptic” former Harvard Law Dean, Roscoe Pound,238 drafted legislation that would have imposed tighter control on agencies than earlier proposals. It required notice and public hearings prior to regulation, formal administrative hearings, and judicial review.239 At the same time, however, perhaps recognizing the increasing instability in geopolitics, the Committee proposed to exempt from the bill “foreign affairs” and “the conduct of military or naval operations in time of war or civil insurrection.”240 Two years later, after Hitler had invaded Poland and World War II had begun,241 a bill similar to the APA’s proposal was introduced in Congress as the Walter-Logan Bill.242 The national security exception now was slightly broader: it excluded altogether “any matter concerning or relating to the conduct of foreign affairs” and “the conduct of military or naval operations in time of war or civil insurrection.”243 Despite the presence of these exceptions, they were strongly criticized as too narrow. As the nation sought to absorb the news of the devastating strength of Hitler’s military and the relative weakness of America’s,244 the War Department savaged the Walter-Logan bill, arguing that it would be “gravely subversive of military discipline in all components of the Army, destructive of efficiency in the performance 237. See Kovacs, supra note 125, at 685 (quoting Reuel E. Schiller, Free Speech and Expertise: Administrative Censorship and the Birth of the Modern First Amendment, 86 VA. L. REV. 1, 86 (2000)). 238. Schiller, supra note 217, at 197 (describing Pound as “dyspeptic”). 239. Shepherd, supra note 217, at 1582-83; Report of the Special Committee on Administrative Law, 62 A.B.A. ANN. REP. 846-50 (1937) [hereinafter Special Committee]. 240. Special Committee, supra note 239, at 789. For various reasons—having mostly to do with pre-existing judicial review provisions—the Committee also exempted the Federal Reserve Board, the Comptroller of the Currency, and the Federal Deposit Insurance Corporation, in addition to exempting “any case arising under the internal revenue, customs, patent . . . or Longshoremen's & Harbor Workers' Laws; or any case in which the aggrieved person was denied a loan or is dissatisfied with a grading service rendered by the United States in connection with the purchase or sale of agricultural products.” Id. at 850; see also Shepherd, supra note 217, at 1600. 241. See KATZNELSON, supra note 40, at 302 (concluding that “Germany’s lightning attack on Poland transformed legislative possibilities” for ending the embargo on arms sales to Britain and France). 242. S. 915, 76th Cong. (1939); H.R. 4236, 76th Cong. (1939); H.R. 6324, 76th Cong. (1939); Schiller, supra note 217, at 197. 243. S. 915, 76th Cong. § 6(b) (1939). 244. See KATZNELSON, supra note 40, at 306-08; GEORGE F. KENNAN, AMERICAN DIPLOMACY 1900–1950, at 66 (1951) (observing that, in 1939, “the overwhelming portion of the world’s armed strength in land forces and air forces” belonged to Germany, Japan, and the USSR, and that Western democracies “had become militarily outclassed”). 924 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 of the functions of the War Department, both military and nonmilitary, obstructive to progress in preparedness for national defense, and generally disastrous from the viewpoint of the public interest.”245 The bill would, according to the Department, enable military personnel to challenge orders “on any occasion except in time of war or insurrection.”246 The Department suggested that “all matters concerning or relating to the operations of the War Department and the Army” be exempted.247 In response to these objections, one of the bill’s co-sponsors, Senator M.M. Logan, amended the bill in a draft that defined “agency” for the first time, and he broadened the military exception so that it applied “to the conduct of military or naval operations” at all times.248 However, the new draft did not include an exception for foreign affairs. Although the House Judiciary Committee reported a similar bill favorably, an influential critique emerged from Congressman Cellar, a co-sponsor of the earlier, even more restrictive ABA bill. Congressman Cellar, who had a change of heart, now argued that “it would be manifestly inappropriate to require the War Department to conduct hearings on Army regulations.”249 As the House debated the bill just days after Hitler invaded Denmark, other congressmen also complained that the military exception was too narrow.250 A lastminute amendment by Congressman Walter purported to further expand the exception, re-defining “military ‘operations’ to include ‘strictly military and naval activities of the War and Navy Departments.’ ”251 The Senate grappled with similar concerns. Two months later, in summer 1940, Hitler’s armies marched into Paris and the Luftwaffe 245. Letter from Harry H. Woodring, Sec’y of War, U.S. War Dep’t, to Rep. Hatton W. Sumners, Chairman, Judiciary Comm., U.S. House of Representatives (May 6, 1939), reprinted in Bills to Provide for the More Expeditious Settlement of Disputes with the United States, and for Other Purposes: Hearings on H.R. 4236, H.R. 6198, and H.R. 6324 Before Subcomm. No. 4 of the H. Comm. on the Judiciary, 76th Cong. 102 (1939). 246. Id. at 103. 247. Id. 248. S. REP. NO. 76-442, at 1, 5 (1939). 249. H.R. REP. NO. 76-1149, pt. 2, at 6 (1940) (Minority Rep.); see also id. at 5 (contending that the exception should encompass “other activities” of the Departments of War and the Navy “which highly affect public interest and the national defense, such as river and harbor improvements, and purchase of munitions and supplies”). 250. Id. at 688; see 86 CONG. REC. 4653 (1940) (statement of Rep. McGranery) (contending that the exemption would enable military personnel to challenge promotion decisions in the courts of appeals and substitute the court’s judgment for that of armed services). But see id. at 4649 (statement of Rep. Gwynne) (arguing, in defense of the existing language, that “the actual conduct of the armies and the navies is an executive function and Congress and the courts have very little, if anything, to do with it”). 251. Kovacs, supra note 125, at 688 (quoting 86 CONG. REC. 4725 (1940) (statement of Rep. Walter)). Congressmen disagreed about whether this actually narrowed or broadened the national security exception, but the language was added and the bill passed. See id. at 689. 2014] NATIONAL SECURITY RULEMAKING 925 began the London Blitz while “[a] remarkable national consensus developed among political leaders and the mass populace to build American strength,”252 and Congress was debating what would become the first peacetime conscription bill in U.S. history.253 The Senate Judiciary Committee, working from the same language as the House, expanded the exception further, omitting the word “conduct” and adding the phrase “any other agency or authority hereafter created to expedite military and naval defense.”254 Congressman Sumners, a proponent of the bill, concluded that this language “covers everything that may be done by any agency concerning or relating to the Military and Naval Establishments.”255 Congressman Cochran thought the language was still not broad enough and would not cover civilian agencies “performing functions which are indispensable to the workings of our defense program.”256 In any event, the full Senate adopted this language, and the House concurred in December 1940.257 Yet despite the support of large majorities from both parties in Congress, the Walter-Logan bill would not become law. President Roosevelt vetoed it on December 18, 1940, unhappy with the constraints it imposed on administrative agencies, but also concerned about its effect on preparations for war.258 In his veto statement, Roosevelt articulated the need for a broader national security administrative state. He noted that Walter-Logan would impose new regulatory burdens on agencies, such as the Maritime Commission and the Departments of Commerce and Treasury, “whose activities have an important collateral effect on the defense program,” and which had “pointed out serious delays and uncertainties which would be caused by the present bill.”259 An attempted veto override in the House failed that same day.260 Although his veto was sustained, Roosevelt had recognized the momentum behind the reformers and already ordered the creation of 252. KATZNELSON, supra note 40, at 307. 253. See 86 CONG. REC. 11,489 (1940); KATZNELSON, supra note 40, at 312-13 (describing the conscription bill as “revolutionary”). 254. The language read as follows: “Nothing contained in this act shall apply to or affect any matter concerning or relating to the Military or Naval Establishments . . . and any other agency or authority hereafter created to expedite military and naval defense.” 86 CONG. REC. 13,746-47 (1940). 255. 86 CONG. REC. 13,811 (1940) (statement of Rep. Sumners). 256. Id. at 13,810 (statement of Rep. Cochran). 257. Id. at 13,815-16; Shepherd, supra note 217, at 1625. 258. Id. at 13,942-43; Kovacs, supra note 125, at 690. 259. Franklin D. Roosevelt, U.S. President, The President Vetoes the Bill Regulating Administrative Agencies (Dec. 18, 1940), in 1940 THE PUBLIC PAPERS AND ADDRESSES OF FRANKLIN D. ROOSEVELT 616, 620 (Samuel I. Rosenman ed., 1941). 260. 86 CONG. REC. 13,953 (1940). 926 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 an Attorney General’s Committee on Administrative Procedure, which submitted a report on January 22, 1941.261 The report contained two proposals for legislation—one from the liberal majority and one from the conservative minority.262 Both bills gave more flexibility to agencies than had the ill-fated Walter-Logan bill, but their approaches varied on both ordinary rulemaking and national security rulemaking. The liberal bill “imposed little restraint on agencies,” while the conservative bill “would have controlled agencies substantially.”263 The liberal bill, however, did not exempt national security rulemaking at all, while the conservative bill carved out national security exceptions that began to closely resemble those that would be in the APA. The conservative bill authorized the President to temporarily suspend any of the act’s provisions under certain circumstances.264 And with respect to notice-and-comment rulemaking, it provided that “[w]henever expressly found by an agency to be contrary to the public interest, the provisions of this title, in whole or part, shall not apply to . . . the conduct of military, naval, or national-defense functions, or the selection or procurement of men or materials for the armed forces of the United States . . . .”265 Both bills were introduced in Congress, which debated them during the summer of 1941, as Nazi Germany began its brutal invasion of the Soviet Union, and Japan had already “conquered the Philippines, Burma, Hong Kong, Malaya, Singapore, and the Dutch East Indies.”266 The War Department objected that the national security exceptions in both bills were still inadequate, arguing that the military “could not properly function” if it had to meet the procedural requirements and demanding a full exception for all activities of the War Department and all military branches.267 The Attorney General’s Committee, chaired by Assistant Secretary (and future Secretary) of State Dean Acheson—who would play a key role in restructuring the national security state after the war268—did not seem to share these concerns, describing as “very clear” the majority bill's exceptions for 261. S. DOC. NO. 77-8 (1941); Shepherd, supra note 217, at 1632. 262. Shepherd, supra note 217, at 1632. 263. Id. at 1633-34. 264. S. 674, 77th Cong. § 111 (1941). 265. Id. § 201. 266. See KATZNELSON, supra note 40, at 41. 267. Administrative Procedure: Hearings on S. 674, S. 675, and S. 918 Before a Subcomm. of the S. Comm. on the Judiciary, 77th Cong. 36 (1941) (statement of Karl R. Bendetson, Captain, Office of the Judge Advocate General) [hereinafter Administrative Procedure: Hearings on S. 674, S. 675, and S. 918]. 268. See STUART, supra note 217, at 5. 2014] NATIONAL SECURITY RULEMAKING 927 “the military service, the armed forces, or the selection and discharge of employees.”269 But the Committee, in another sense, chose to go further. In rejecting agency-specific exceptions to rulemaking requirements, the Committee instead settled on a “functional” approach, under which any agency would be exempt from rulemaking (and adjudication) requirements to the extent that it performed certain substantive functions.270 This functional approach prevailed and was included in the APA. This approach would limit the scope of the exception in some respects: no agency could firmly declare itself entirely free of notice-and-comment requirements.271 On the other hand, the functional approach vastly expanded the number of agencies that could engage in national security rulemaking. In practice, this meant that agencies across the government could, and did, rely on the exception, to varying degrees, to eschew notice-and-comment procedures.272 And, as it turned out, agencies would enjoy a great deal of discretion to use the exception when they saw fit.273 Although administrative law reform was largely put on the back burner while the war was waged, by 1946, with the war over and New Dealers on the defensive in Congress, the moment for comprehensive administrative law reform had finally arrived.274 The APA would be enacted into law by year’s end.275 Nonetheless, the lessons learned from the war about the appropriate way to control the exploding administrative state were hardly straightforward. During the war, administrative agencies had grown even more powerful and more numerous, but significantly less popular. Americans were chafing under the price controls, comprehensive rationing, and other rigid regulations required during wartime.276 The war revealed the ugly side of bureaucracies, which proved to be often “inefficient, incompetent, bullying, and perhaps even captured 269. Administrative Procedure: Hearings on S. 674, S. 675, and S. 918, supra note 267, at 820 (statement of Dean Gooderham Acheson, Assistant Secretary of State for Economic Affairs). 270. S. DOC. NO. 79-248, at 191 (1946); see also Bonfield, supra note 22, at 235-36. The Navy was, at the time, considered a service separate from the rest of the military. See STUART, supra note 217, at 10-15 (discussing military restructuring after the war). 271. See S. DOC. NO. 79-248, at 13 (“All departments may, and often do, exercise civil and regulatory powers which should be subject to an administrative procedure statute.”); see also Bonfield, supra note 22, at 235-36. 272. See Bonfield, supra note 22, at 233-34. 273. See supra Part II.C. 274. See McNollgast, supra note 217, at 192-93, 203. 275. See Kovacs, supra note 125, at 703-04 (describing the APA’s passage). 276. See KATZNELSON, supra note 40, at 216. 928 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 by the interests they were supposed to regulate.”277 One scholar concluded that the experience “weakened Americans’ faith in expertise.”278 Americans’ confidence in the administrative state had been further weakened by the struggle against fascism. Before the war, many American political scientists had studied the governance of Nazi Germany and Fascist Italy with great interest and even admiration.279 Many more expressed not illegitimate fears that the United States would be left behind if it did not, in some sense, emulate these rising foreign powers.280 During the war, such scholars either abandoned their earlier views or fell into disrepute.281 There was a widespread belief among the public that “administrative power could pave the road to totalitarianism” and “ ‘the claim that imposing the rule of law on agency behavior could protect Americans from an administrative state run amok . . . was increasingly heard across the political spectrum.’ ”282 Despite the disgust with which the fascist governments were regarded after the war, policymakers in the military and foreign affairs establishments were well aware that the United States had, in one sense, needed to beat the enemy at its own game in order to win the war. Only through aggressive centralization, militarization, and, often, lack of transparency—hallmarks of fascist governance—had the United States managed to mobilize its resources so quickly and comprehensively during the early 1940s to meet the challenge of defeating Hitler, Mussolini, and Imperial Japan.283 Pendleton Herring, a prominent theorist of governmental organization highly influential in the Roosevelt and Truman Administrations, had argued that “totalitarian states can be opposed only through an equally effective mobilization of resources.”284 Twenty-six new agencies with broad powers had been created during the war.285 Moreover, the United States 277. Schiller, supra note 217, at 195; see also id. at 201 (“Too often American wartime agencies had the appearance of incompetent bullies, captured by special interests, acting with an autocratic disregard of due process.”). 278. Schiller, supra note 237, at 92. 279. See, e.g., Lawrence Dennis, Fascism for America, ANNALS AM. ACAD. POL. & SOC. SCI., July 1935, at 62, 62 (arguing that the New Deal was not fascist enough and that fascism is “the inevitable alternative to chaos or communism”); see also OREN, supra note 217, at 47-49. 280. See OREN, supra note 217, at 47-49. 281. See id. at 46-52. Lawrence Dennis was tried for treason in 1944. See KATZNELSON, supra note 40, at 30-31. 282. Kovacs, supra note 125, at 695-96 (quoting Reuel E. Schiller, Enlarging the Administrative Polity: Administrative Law and the Changing Definition of Pluralism, 1945– 1970, 53 VAND. L. REV. 1389, 1405 (2000)). 283. See Aziz Rana, Who Decides on Security?, 44 CONN. L. REV. 1417, 1461-62 (2012). 284. PENDLETON HERRING, THE IMPACT OF WAR 14 (1941). For a definitive account of Herring’s career and influence, see STUART, supra note 217, at 9, 27-32. 285. Schiller, supra note 217, at 190. 2014] NATIONAL SECURITY RULEMAKING 929 could not have accomplished this task without allying itself with another totalitarian regime, the Soviet Union.286 More specifically, the disaster at Pearl Harbor had left an indelible mark on the thinking of policymakers at the top of the Roosevelt and Truman Administrations.287 They, and ultimately the American people as well, believed that America had been left vulnerable to Japanese aggression by its inability to coordinate defense and military functions effectively.288 In addition, those in government responsible for national security had permitted isolationism among the public to influence critical decisions about foreign policy and national defense in ways that weakened America’s position in the world.289 The same values that were praised by proponents of administrative law reform that undergird the APA—transparency, legitimacy, deliberation, and accessibility, among others—were regarded as dangerous in the national security context.290 The threat of fascism and communism had therefore affected the APA debate in complex, conflicting ways. Influential members of the Roosevelt and Truman Administrations, such as Herring, Dean Acheson (who had chaired Roosevelt’s Committee that proposed the bill that became the APA), and George Marshall, adhered to a “Pearl Harbor” view of government policymaking that treated national security matters as uniquely requiring a closed, militarized, and centralized process—just the opposite of the principles of transparency, public participation, and judicial oversight animating the APA.291 The year after Congress enacted the APA, it enacted the APA’s mirror image—the National Security Act (NSA) of 1947.292 In contrast to the APA, the NSA, the crafting of which was very heavily influenced by Herring, was entirely animated by the Pearl Harbor view.293 Congress debated it in the shadow of the harsh, bi-partisan report on the Pearl Harbor attacks issued in mid-1946.294 The NSA’s purpose was to centralize government decisionmaking in the national security realm and, for the most part, insulate it from public scruti286. See KATZNELSON, supra note 40, at 32, 94-95 (describing the alliance and Americans’ ambivalence about the Soviet Union in the 1930s and 1940s). 287. See STUART, supra note 203, at 42. 288. Id. at 43, 70-71. 289. See id. at 39-40. 290. See id. at 70-71; Rana, supra note 283, at 1423-24 (noting “the steady emergence, beginning during the New Deal, of the prevailing American idea of security, with its emphasis on professional expertise and insulated decision-making”). 291. See STUART, supra note 217, at 41-42, 70-71. 292. National Security Act of 1947, ch. 343, 61 Stat. 495. 293. See STUART, supra note 217, at 8-9. 294. David F. Rudgers, Creating the Secret State 138-39 (2000); see also J. Comm. on the Investigation of the Pearl Harbor Attack, Investigation of the Pearl Harbor Attack, S. Doc No. 79-244, at 252-53 (1946). 930 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 ny. Although the Act’s supporters were not able to accomplish their goal of unifying the military services, the NSA created what became known as the Department of Defense (DoD), the Joint Chiefs of Staff, the National Security Council, and the CIA.295 The co-existence of these two radically different perspectives on the lessons for the administrative state to be learned from World War II—the Reform view animating the APA and the Pearl Harbor view animating the NSA—are also reflected in the structure of the APA. The national security exception enshrines the Pearl Harbor view within the constitution of the modern administrative state. The Pearl Harbor view’s influence on legislation and agency behavior was powerful, but not particularly prominent in the debates on administrative reform.296 It was only years later that the government agencies benefitting most from the national security exception would be required to defend it to Congress.297 In 1964, congressional committees first began to scrutinize the national security exception and its justifications.298 By then, the Cold War had replaced World War II as the main inspiration for national security exceptionalism.299 And yet the arguments in favor of national security administration remained the same. The difference is that, by this point, they had been essentially abstracted from the post-World War II historical context in which they had emerged and the debates over fascism that had inspired them. The justifications for the national security exception articulated by agencies in 1964 are familiar ones. They appear frequently in cases and scholarly defenses of national security exceptionalism in general.300 The first rationale agencies submitted to Congress to justify the exception is that national security often requires secrecy, which is defeated by public participation.301 Second, the agencies argued, the fluid nature of international relations requires agencies to react quickly.302 Suppose, for example, that the DoD must respond to a coup in a foreign country by immediately revising its rules regarding 295. See STUART, supra note 217, at 110-50. 296. See supra notes 287-291 and accompanying text. 297. Agencies responded to surveys about their use of the national security exception in 1957. See supra notes_130-131 and accompanying text. 298. See Letter from L. Niederlehner, Gen. Counsel of the Dep’t of Def., to James O. Eastland, Chairman, Comm. on the Judiciary, U.S. Senate (July 23, 1964), reprinted in Administrative Procedure Act: Hearings on S. 1663 Before the Subcomm. on Admin. Practice & Procedure of the S. Comm. on the Judiciary, 88th Cong. 492-93 (1964) [hereinafter Administrative Procedure Act: Hearings on S. 1663]. 299. See DUDZIAK, supra note 44, at 88-90. 300. See Knowles, supra note 215, at 105. 301. See Bonfield, supra note 22, at 280-82. 302. See id. at 279-80. 2014] NATIONAL SECURITY RULEMAKING 931 military support for that country’s government.303 Notice-andcomment would make this impossible. Finally, because nations are unitary actors on the world stage, the United States must “speak with one voice” in foreign relations; agencies must act in a coordinated fashion and cannot be changing positions in response to public comment without risking embarrassment and undermining U.S. foreign policy.304 For example, as a DOJ spokesman testified to Congress, “[a] requirement of public participation in . . . promulgation of rules to govern our relationships with other nations . . . would encourage public demonstrations by extremist factions which might embarrass foreign officials and seriously prejudice our conduct of foreign affairs.”305 These justifications are variations on the familiar tropes that still dominate national security and foreign relations law.306 They are rarely challenged outside academia, and their origins and theoretical justifications are rarely discussed. But those justifications are surprisingly brittle.307 As reasons for exempting national security rulemaking entirely from notice-and-comment, moreover, they fall short. As Professor Arthur Bonfield observed, in some rare situations, truly necessary secrecy would make notice-and-comment all but impossible.308 But this hardly supports removing notice-and-comment entirely from all national security rulemaking. Second, these hoary justifications rely on an illusion that the boundary between national security and ordinary rulemaking can be clearly delineated.309 Finally, these justifications draw on overbroad principles that seek to shut down, rather than encourage, policy debates. They are too often used to avoid accountability and public participation in governance—even in aspects of governance, such as rulemaking, in which such accountability and public participation are thought to be especially important. 303. Id. at 280. 304. Munaf v. Geren, 533 U.S. 674, 702 (2008) (“The Judiciary is not suited to secondguess such determinations . . . that would require federal courts to . . . undermine the Government’s ability to speak with one voice in this area.”); United States v. Curtiss-Wright Exp. Corp., 299 U.S. 304, 319 (1936) (“[T]he President alone has the power to speak or listen as a representative of the nation.”). 305. Administrative Procedure Act: Hearings on S. 1663, supra note 298, at 363. 306. See Knowles, supra note 215, at 111-12; Eric A. Posner & Cass R. Sunstein, Chevronizing Foreign Relations Law, 116 YALE L.J. 1170, 1202 (2007) (describing the justifications for special deference by courts in foreign relations as “often less textual than functional, based on traditional practices and understandings”). 307. See Knowles, supra note 215, at 121-23; David H. Moore, Beyond One Voice, 98 MINN. L. REV. 953, 979 (2014) (explaining why the one voice doctrine is “fatally flawed”). 308. See id. at 283. 309. See, e.g., Derek Jinks & Neal Kumar Katyal, Disregarding Foreign Relations Law, 116 YALE L.J. 1230, 1257-58 (2007) (describing the intractable boundary problems created by attempting to apply different deference standards for foreign and domestic issues). 932 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 The next Part discusses why these tropes do not accurately reflect the complexity of rulemaking in today’s world and what should be done to reform national security rulemaking. V. REFORMING NATIONAL SECURITY RULEMAKING As the history makes clear, the modern American administrative state was formed in the shadows of war and the existential threat posed by the rise of totalitarian states. These regimes, by ignoring transparency and public participation, could whip their own bureaucracies into line, leaving democracies at a disadvantage. Or so many believed. In the face of this threat, the APA’s authors carved out modes of national security rulemaking distinct from domestic ones. This response was understandable, but it is not at all clear that it was correct. One could argue that the United States and its allies prevailed over their enemies because of, and not despite, their adherence to democratic values.310 And it is even less clear that these distinct modes of national security rulemaking are serving the United States well in the twenty-first century. Few observers would argue that U.S. government agencies are functioning as efficiently or effectively as they should be in the national security realm. Obsession with secrecy, overclassification,311 unnecessary redundancy, lack of coordination, inter- and intraagency communication failures, and lack of accountability to the public—these are just a few of the criticisms regularly leveled at agencies by observers inside and outside government.312 Legislative efforts to reform the intelligence community after September 11—in part by creating the Department of Homeland Security and the position of Director of National Intelligence, who would, in theory, coordinate intelligence-gathering—was followed by massive growth in the number and type of agencies handling secret and top-secret intelligence and simply made these problems worse.313 Moreover, several factors have led to increasing entanglement of the government’s national security policies with the lives of ordinary 310. See, e.g., President Franklin D. Roosevelt, Third Inaugural Address (Jan. 20, 1941) (contending that “democracy alone, of all forms of government, enlists the full force of men’s enlightened will. . . . [I]t is the most humane, the most advanced, and in the end the most unconquerable of all forms of human society”). 311. See supra notes 22-26 and accompanying text. 312. See, e.g., PRIEST & ARKIN, supra note 24, at 95, 125 (describing two such examples); see generally STEPHEN HOLMES, THE MATADOR’S CAPE: AMERICA’S RECKLESS RESPONSE TO TERROR (2007) (contending that the failure by government agencies to follow established rules and be transparent resulted in numerous policy disasters following September 11). 313. See PRIEST & ARKIN, supra note 24, at 92, 95 (describing the creation of the Office of the Director of National Intelligence and the belief among “leaders of the intelligence agencies” that this restructuring “extremely reckless”). 2014] NATIONAL SECURITY RULEMAKING 933 Americans. Globalization continues to blur, and even erase, the distinction for Americans between what is foreign and what is domestic.314 The terrorist threat emerges primarily from small groups and individuals, rather than nation-states; in response, government more closely monitors the lives of individuals to learn about and stop these threats.315 Agencies’ national security rulemaking therefore falls more often into the category of “substantive” or “legislative” than ever before: because it directly affects the public, it was meant to be conducted through notice-and-comment procedures so that the public can be involved. For the founders of modern American administrative law, this state of affairs would be seen as the worst of both worlds. National security rulemaking today lacks both the democracy and accountability-enhancing features of ordinary rulemaking and the centralization and efficiency that were supposed to characterize rulemaking in the areas of military and foreign affairs.316 It is hard to justify maintaining broad substantive exceptions from notice-and-comment requirements for national security rulemaking when agencies conducting such rulemaking are largely inefficient, uncoordinated, and ineffective.317 In light of these changes, the traditional distinction between national security and ordinary rulemaking must be re-examined. U.S. foreign and national security policy, as well as ordinary policy, can in many, if not most, instances best be furthered by greater transparency, public participation, and deliberation—values that the APA’s notice-and-comment rulemaking procedures advance. The APA’s national security exception and the model of agency behavior that it signifies are not serving the administrative state well. The exception cannot be justified in its current form, and it should be modified to better reflect the requirements of regulation today. However, the best answer may not be simply making requirements for national security rulemaking identical to those for ordinary rulemaking. The optimal reforms will encourage more openness in rulemaking while recognizing the reality that agencies conducting national security rulemaking have the ability, through classification authority, to hide their activities from view. Classification reform is 314. See, e.g., Jinks & Katyal, supra note 309, at 1258-59; Knowles, supra note 215, at 110-20. 315. See Aziz Z. Huq, Structural Constitutionalism as Counterterrorism, 100 CALIF. L. REV. 887, 908 (2012) (describing the shift from “state-based enemies” to “new threats in the more fragmented international environment”); Neil M. Richards, The Dangers of Surveillance, 126 HARV. L. REV. 1934, 1938 (2013) (observing that democracies have “invested heavily in surveillance technologies in the aftermath of the September 11 attacks in America, the London subway bombings of 2005, and other atrocities”). 316. See supra notes 283-299 and accompanying text. 317. See Huq, supra note 315, at 905-11. 934 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 also desperately needed, but in the past this has proven very difficult to implement successfully.318 In fact, legislative reform in general would be a challenge. Amending the APA, given its quasi-constitutional status, is an immensely difficult legislative task.319 And the Vermont Yankee doctrine generally prohibits courts from imposing additional rulemaking procedures beyond those required by the APA.320 Instead, reform is more likely to take place within the executive branch. In the past, this has been the primary means by which limitations have been placed on the national security administrative state.321 In response to loss of public confidence and increased scrutiny after national security scandals, administrations have sought to pre-empt legislative solutions through the use of executive orders and regulations.322 To enact comprehensive national security rulemaking reform, the President could issue an executive order that, like E.O. 12,866, requires additional procedural requirements for rulemaking by non-independent federal agencies. Such an executive order would legally bind those agencies. And it could be enforceable in court— especially if the order itself so provided.323 One risk, of course, is that executive branch reforms are more easily undone than legislation. National security agencies, in particular, have a tendency to revert, over time, to more insular and opaque modes of operation as they seek to expand their power within the bureaucracy.324 Nonetheless, many past executive branch reforms have had “stickiness”: they have persisted and become part of agency culture.325 In any event, although they may be second-best solutions, they are better than the status quo. 318. D.A. Jeremy Telman, Intolerable Abuses: Rendition for Torture and the State Secrets Privilege, 63 ALA. L. REV. 429, 443-45 (2012). 319. William R. Andersen, Chevron in the States: An Assessment and a Proposal, 58 ADMIN. L. REV. 1017, 1033 (2006) (“The federal APA would be difficult to amend because it has acquired something like constitutional status . . . . ”). 320. See Vt. Yankee Nuclear Power Corp. v. Natural Res. Def. Council, Inc., 435 U.S. 519, 543-48 (1978). 321. The executive often undertakes its own reforms to forestall more sweeping reforms from Congress. See, e.g., supra notes 129-32 and accompanying text; see also Neal Kumar Katyal, Internal Separation of Powers: Checking Today’s Most Dangerous Branch from Within, 115 YALE L.J. 2314, 2341 (2006) (arguing that, with respect to the war on terror, the collapse of external checks on executive power demonstrates the need for internal checks on that power). 322. See supra notes 129-138 and accompanying text. 323. See City of Carmel-by-the-Sea v. U.S. Dep’t of Transp., 123 F.3d 1142, 1166 (9th Cir. 1997) (reviewing and measuring agency action against the standards in an executive order). 324. See Dalal, supra note 132, at 83-84. 325. A prominent example is OIRA review under Executive Order 12,866, 3 C.F.R. § 638 (1993), reprinted as amended in 5 U.S.C. § 601. See supra notes 126-139 and accompanying text. 2014] NATIONAL SECURITY RULEMAKING 935 A. Eliminating the National Security Rulemaking Exception To begin with, it is worth exploring whether the national security exception should be eliminated altogether. This change’s impact on rulemaking would be vast. For the large number of agencies that, unlike DoD, currently lack internal rules requiring notice-andcomment, their non-secret rulemaking would be opened up to public input for the first time. In addition, many other departments or agencies, particularly within the Treasury and Commerce Departments, that do, or might be disposed to, rely on the national security exception would be required to undertake notice-and-comment for many types of rules that had been previously exempt. For those critics of notice-and-comment rulemaking, of course, this would be moving in precisely the wrong direction, as the burden imposed on these agencies would likely be a substantial one. A complex rule can elicit thousands of comments or more, requiring hundreds of pages to address in the final rule’s statement of basis and purpose.326 Indeed, these critics argue that the procedure is not worth its cost in any policy area.327 In particular, they argue, notice-and-comment may have an anti-regulatory bias, imposing unacceptably high burdens on government agencies when swift and decisive regulatory action is necessary to address urgent problems.328 Moreover, even if one believes that notice-and-comment’s benefits exceed its costs in ordinary rulemaking, national security matters remain unique in ways that may make notice-and-comment still inappropriate—even though many of the particular concerns that drove the creation of the national security administrative state no longer exist. For one thing, the stakes are quite often higher where national security is concerned, which could make an anti-regulatory bias particularly problematic.329 For example, if the National Highway Traffic Safety Administration fails to promulgate a rule requiring more auto safety testing, this may, over time, cost lives. But if government agencies fail to properly regulate the disposal of nuclear material that falls into terrorists’ hands, the consequences could present an existential threat to the United States.330 In addition, even in a globalized world, where special interest groups often fiercely lobby national security policymakers, secrecy— 326. See, e.g., Pierce, supra note 68, at 119-20. 327. See supra notes 88-91 and accompanying text. 328. Pierce, supra note 68, at 118-19. 329. Huq, supra note 315, at 924-25 (observing that administrative “procedures can function as frictions on desirable agency action,” and that the APA’s “deregulatory bias . . . may have serious unintended consequences in the national security domain”). 330. See PHILIP BOBBITT, TERROR AND CONSENT: THE WARS FOR THE TWENTY-FIRST CENTURY 201-02 (2008) (stating that an existential threat “is precisely the sort of threat that terror poses”). 936 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 or at least some degree of opacity—still has an important place in national security policymaking. Suppose, as one critic has asked us to imagine, that the notice-and-comment requirements were imposed on decisions about military support for Taiwan and its effect on relations with China or the rules governing targeting of Al Qaeda safehouses.331 This would expose to public (indeed, global) scrutiny the inner workings of the government’s military and diplomatic machinery, making it much more difficult for the United States to effectively eliminate dangerous enemies or to conduct the delicate giveand-take at the heart of diplomacy. However, in measuring notice-and-comment’s value for national security rulemaking, it is important to take account of all the ways in which the APA and other laws insulate these types of agency decisionmaking from public scrutiny. First, even without the national security exception, administrative law would treat the two examples above quite differently. Although rulemaking regarding military aid to foreign countries would arguably require notice-and-comment, military-targeting rulemaking—along with many other rules regarding the conduct of military operations abroad—would almost certainly fall within the exclusion from the APA of “military authority exercised in the field in time of war or in occupied territory.”332 Second, as Professor Evan Criddle has persuasively argued, at least some of these concerns can be addressed through the APA’s “good cause” exception, which authorizes rulemaking without noticeand-comment when it would be “impracticable, unnecessary, or contrary to the public interest.”333 In particular, agencies could rely on previous cases in which courts have approved agencies’ invocation of the exception as “contrary to the public interest” when undertaking notice-and-comment would thwart the rule’s purpose.334 Similarly, when national security rules issued during a crisis situation must take effect immediately, notice-and-comment rulemaking could be considered by a court to be “impracticable.”335 At the same time, requiring agencies to rely on the “good cause” exception instead of the national security exception would discipline agency decisionmaking by requiring the agency to articulate a legal basis for departing from the ordinary APA process. The APA provision establishing the “good cause” exception requires that the agency explicitly invoke the exception when issuing the rule and explain why 331. 332. 333. 334. 335. Pierce, supra note 68, at 119-20. 5 U.S.C. § 551(1)(G) (2012); see Kovacs, supra note 125, at 674-76. 5 U.S.C. § 553(b)(3)(B) (2012); see Criddle, supra note 34, at 192-93. See supra notes 144-154 and accompanying text. See 5 U.S.C. § 553(b)(3)(B); GAO REPORT, supra note 121, at 16. 2014] NATIONAL SECURITY RULEMAKING 937 the exception applies.336 Courts have generally voided rules when the agency failed to follow this requirement.337 However, one risk in relying on the “good cause” exception in place of the national security exception is that it could inspire agencies to expand the breadth of rulemaking exempt for good cause, turning the exception into something like the all-purpose escape hatch from notice-and-comment that some critics (mistakenly) fear it already is.338 As the GAO report reveals, the most common reason agencies rely on the “good cause” exception is that Congress has either mandated the text of the rule or has imposed restrictions making notice-andcomment impossible.339 It is much less common for an agency to cite an “emergency” as the reason for invoking the exception.340 But if the national security exception were no longer available, it is easy to see how agencies would be tempted to broaden significantly the definition of “emergency” and expand the category of rules for which notice would be “contrary to the public interest.” Finally, and perhaps most importantly, whether or not agencies are relying on the “good cause” exception, eliminating the national security exception would leave in place agencies’ power to classify information, significantly reducing the plausibility of notice-andcomment for many rules.341 Imagine a notice of proposed rulemaking in which the most important and specific reasons for the proposed rule are redacted. Of course, the simple knowledge that an agency is conducting rulemaking in a particular area may be useful to the public. This enables concerned citizens or interest groups to alert Congress, which may have the ability to further scrutinize or influence the agency’s process.342 Outside parties could use the notice as a means for crafting more effectively targeted FOIA requests, possibly leading to the release of more specific information or, at the very least, requiring the agency to articulate in court its reasons for classifying the redacted information. It is also possible, however, that in some circumstances an agency could simply determine that the fact that rulemaking is taking place should be classified as well. 336. See 5 U.S.C. § 553(b)(3)(B) (requiring that an agency invoking the “good cause” exception must “incorporate[] the [good cause] finding and [include] a brief statement of reasons therefor in the rules issued”). 337. See, e.g., Buschmann v. Schweiker, 676 F.2d 352, 356 (9th Cir. 1982); Bohner v. Daniels, 243 F. Supp. 2d 1171, 1176 (D. Or. 2003), aff’d sub nom. Paulsen v. Daniels, 413 F.3d 999 (9th Cir. 2005). 338. See supra notes 148-154 and accompanying text; Boliek, supra note 152, at 3343. 339. See GAO REPORT, supra note 121, at 16-17. 340. See id. 341. See supra notes 22-23 and accompanying text. 342. See supra notes 85-87 and accompanying text. 938 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 The authority to classify information is a powerful one. Agencies, like most organizations, respond to new challenges using familiar tools. There is a risk that, if agencies are forced to open up their deliberations via notice-and-comment, they may be inclined to push back by ramping up classification to keep those deliberations effectively closed.343 Therefore, a potential difficulty with eliminating the national security rulemaking exception is that it could, perversely, result in a process even less accessible to the public. B. Encouraging Notice-and-Comment Rulemaking as a Best Practice If eliminating the national security exception would impose unacceptable costs by burdening agencies, encouraging over-classification, and failing to take account of the uniqueness of national security rulemaking, an alternative approach that avoids these problems would be to encourage agencies to use notice-and-comment for national security rulemaking whenever possible. Under this approach, an executive order would mandate notice-and-comment as the default mode for national security rulemaking but allow each agency to choose to opt out for particular types of rules.344 This approach would require agencies to assess the costs and benefits of notice-andcomment for each category of national security rule and make a determination about whether notice-and-comment will be used for that category. It would give agencies sufficient flexibility to permit them to take account of the uniqueness of national security policies but would bring more regularity and deliberation to the process of departing from notice-and-comment. The value of this approach depends in part on the accuracy of the ex ante determinations agencies could be expected to make about each type of rule’s suitability for notice-and-comment. For some types of rules, the decision could be a relatively easy one. Some agencies that regularly make rules in the national security realm already engage in notice-and-comment for certain types of rules. The State Department, for example, uses notice-and-comment in developing most 343. Cf. Eric J. Sinrod, Freedom of Information Act Response Deadlines: Bridging the Gap Between Legislative Intent and Economic Reality, 43 AM. U. L. REV. 325, 342 (1994) (describing agencies’ increasing use of special exceptions to avoid disclosure following a sharp increase in FOIA requests). 344. Cf. Evan J. Criddle, Fiduciary Administration: Rethinking Popular Representation in Agency Rulemaking, 88 TEX. L. REV. 441, 480-81 (2010) (advocating for a complete repeal of the national security exception). 2014] NATIONAL SECURITY RULEMAKING 939 International Traffic in Arms Regulations (ITAR)345 and rules implementing the Hague Convention on Intercountry Adoption.346 However, in other contexts, agencies will often face difficulty predicting whether in any particular instance notice-and-comment would harm national security interests. For example, one can imagine few harmful national security consequences flowing from using notice-and-comment to promulgate rules implementing a trade agreement with Great Britain or another liberal democratic ally. On the other hand, given the political volatility of U.S. relationships in the Middle East, using notice-and-comment for rules implementing a similar agreement with a nation in that region could have more negative national security consequences. Lacking certainty about how notice-and-comment would affect the process of national security policymaking for a particular rule, agencies may be inclined to be cautious and avoid it—despite a mandate that they adopt it whenever possible. On the other hand, so long as the agency is allowed to change its mind and eschew notice-andcomment should it prove unworkable, agencies could be successfully nudged to experiment with notice-and-comment in areas where it has not been used. A second factor of equal importance is agency culture. Regardless of its value, will agencies voluntarily cede some degree of control over the rulemaking process to regulated parties? In general, agencies tend to function like fiefdoms—without external pressure to do otherwise, they hoard power, avoid oversight, and provide only ex post rationales for their decisionmaking.347 Agencies making rules in the national security area are especially likely to operate this way because their mandate to protect national security provides justification for rejecting the ordinary administrative law values of transparency and accessibility.348 345. See, e.g., Amendment to the International Traffic in Arms Regulations: Initial Implementation of Export Control Reform, 78 Fed. Reg. 22,740, 22,740-01 (Apr. 16, 2013) (to be codified at 22 C.F.R. pts. 120, 121, 123). 346. See Hague Convention on Intercountry Adoption; Intercountry Adoption Act of 2000; Accreditation of Agencies; Approval of Persons, 71 Fed. Reg. 8064 (Feb. 15, 2006) (to be codified at 22 C.F.R. pt. 96); see also Anjanette Hamilton, Comment, Privatizing International Humanitarian Treaty Implementation: A Critical Analysis of State Department Regulations Implementing the Hague Convention on Protection of Children and Cooperation in Respect of Intercountry Adoption, 58 ADMIN. L. REV. 1053, 1073 (2006). 347. See, e.g., Bruce Ackerman, The New Separation of Powers, 113 HARV. L. REV. 633, 700 (2000) (describing the politicized federal agencies as “unruly bureaucratic fiefdoms”); Dalal, supra note 132, at 102. 348. See Dalal, supra note 132, at 99-100 (describing agencies given the “national security mandate” as having stronger incentives to gather more power to carry out that mandate). 940 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 On the other hand, there is evidence that agencies often do voluntarily seek to learn about best practices and adopt them.349 In many instances, a “nudge”350 may be all that is required to persuade an agency to use notice-and-comment more often. In addition, even power-hungry agencies can benefit from increased use of notice-andcomment. The act of opening up the rulemaking process to the public—particularly in response to criticism—has a strong legitimizing effect on the rules that are produced and the agency itself. This is why, for example, the Department of Homeland Security has chosen to use notice-and-comment in developing new rules for Advanced Imaging Technology at airports, despite the strong probability that it could successfully invoke either the good cause or national security exceptions to avoid notice-and-comment.351 Agencies may rationally conclude that the legitimacy gained is worth the cost of increased public awareness. Agencies also may rationally conclude that voluntarily adopting notice-and-comment is actually a way to avoid further congressional scrutiny and possible legislative reforms. In fact, executive branch reform is a strategy the President and DoD have used in the past to head off more restrictive legislation during periods of intense public criticism. The post-Watergate revelations of domestic spying by the CIA and other national security-related abuses, documented in the Church Committee Hearings and Reports, led to the passage of the Foreign Intelligence Surveillance Act.352 But the President preempted other types of legislative restrictions—for example, by imposing a ban on assassinations by executive order, which arguably contained sufficient ambiguity to allow the President to order an assassination in some circumstances.353 And, similarly, as discussed above, during the same reform-infused era, the Pentagon shrewdly deflected the 349. See David Zaring, Best Practices, 81 N.Y.U. L. REV. 294, 297-98 (2006) (identifying a trend toward “best practices,” a form of regulation “in which regulated entities experiment with best practices as a way of vindicating the broad principles of various regulatory programs, while the regulators keep track of their progress and help to celebrate and publicize particularly successful local initiatives”). 350. See RICHARD H. THALER & CASS R. SUNSTEIN, NUDGE: IMPROVING DECISIONS ABOUT HEALTH, WEALTH, AND HAPPINESS 7-8 (2008) (proposing that regulators take account of cognitive biases to craft more effective incentives for regulated parties, including default rules that individuals are free to opt out of). 351. The agency had not relied on these exceptions earlier. See supra notes 157-160 and accompanying text. 352. See Richard Henry Seamon & William Dylan Gardner, The Patriot Act and the Wall Between Foreign Intelligence and Law Enforcement, 28 HARV. J.L. & PUB. POL’Y 319, 334-36 (2005). 353. William C. Banks & Peter Raven-Hansen, Targeted Killing and Assassination: The U.S. Legal Framework, 37 U. RICH. L. REV. 667, 717-20 (2003) (contending that the assassination ban contained in President Ford’s 1976 Executive Order 11,905 extended only to assassinations, for their political views, of officials of foreign nations with which the United States was not at war, and that the president may waive the ban). 2014] NATIONAL SECURITY RULEMAKING 941 Administrative Conference’s call for elimination of the national security exemption by adopting notice-and-comment for rules “having a substantial effect upon the public” yet reserving authority to opt out.354 The skill with which agencies have used selective internal reforms to stave off legislative reform suggests that simply encouraging agencies to use notice-and-comment cannot, by itself, fully transform the way national security rulemaking is conducted. Indeed, it may be that the types of rulemaking in this area most crippled by insularity and lack of deliberation are those that agencies would be least likely to want to expose to public scrutiny. A nudge will not always be enough. C. Establishing a Chenery-Type Rule for Invoking the National Security Exception Notice-and-comment would not be effective without the courts’ enforcing the APA requirement and, under Chenery I, requiring agencies to sink or swim with the rationales they articulate during the rulemaking process. If agencies are required or strongly encouraged to use notice-and-comment for national security rulemaking, the courts will necessarily play a larger role in overseeing national security policy. For the many critics who believe the courts are far too deferential in national security matters, this would be a welcome development. However, to the extent that the national security exception remains a viable option for agencies, the way in which courts treat an agency’s invocation of the exception must also be reformed. Currently, courts allow agencies to get away with remaining silent during the rulemaking process, issuing a rule without notice-and-comment and, when a regulated party challenges the rule on the ground that it was promulgated without notice-and-comment, invoking the national security exemption as a get-out-of-jail-free card.355 This permissiveness by courts encourages agencies conducting national security rulemaking to neglect notice-and-comment. And relatedly, when an agency is aware that it need not invoke the exception during rulemaking, it will have little incentive to articulate reasons why the exception should apply. The bottom line is that, absent unusual public or congressional attention, agencies face little pressure to seriously deliberate about the boundaries of the national security exception and have strong incentives to rely on it whenever it could possibly be applicable. The likely result is a largely unmentioned but broad exception that becomes broader and broader until the very rare case where a court determines that it does not apply. 354. See supra notes 131-138 and accompanying text. 355. See supra notes 161-165 and accompanying text. 942 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 To avoid this ever-expanding national security exception and ensure that national security rulemaking is undertaken effectively, courts must play the role Chenery recognized for them—to test the legality of the rationales the agency actually used to produce a rule while it was being produced. The notice-and-comment process is fundamental to the proper functioning of the administrative state. A decision by an agency to eschew notice-and-comment should have a legally authorized basis that the agency can articulate during the rulemaking process. To encourage the serious deliberation that is a quality of all effective rulemaking, agencies should be required to specifically invoke the national security exception contemporaneously with the rulemaking process and state with specificity their reasons for invoking the exception. In addition, courts should apply a Chenery-type rule to the exception, strictly enforcing this new requirement by refusing to consider the applicability of the exception unless the agency invoked it during rulemaking. Moreover, courts should consider the exception’s applicability only on the grounds articulated by the agency.356 It could be a challenge for the courts to impose such a Chenerytype rule on their own. There is not much of a textual peg for it. In stark contrast to the “good cause” exception, the APA’s text does not require agencies to specifically invoke the national security exception when they proceed without notice-and-comment. As I discuss above, Chenery does have a constitutional dimension, however, which provides it with roots deeper than the APA’s text: it is a means of enforcing the non-delegation doctrine.357 It is true that the courts have long recognized that the non-delegation doctrine is much weaker in foreign affairs and national security matters.358 In a series of cases, most prominently United States v. Curtiss-Wright Export Corp.,359 the courts permitted the President to engage in lawmaking in foreign affairs that would not have been permissible in the domestic realm.360 Nonetheless, there must be some limit to the President’s power to make law, even where national security is concerned. To conclude otherwise is to make the error Carl Schmitt made: if national security exceptionalism has no discernible limits, it is no longer an exception but the rule.361 Wherever that limit is must, in the end, be de356. See supra notes 109-115 and accompanying text (discussing the Chenery rule). 357. See supra notes 111-115 and accompanying text. 358. See, e.g., Gonzalez v. Reno, 212 F.3d 1338, 1349 (11th Cir. 2000) (“[T]he authority of the executive branch to fill gaps is especially great in the context of immigration policy.”). 359. 299 U.S. 304 (1936). 360. See id. at 319-22. Curtiss-Wright is controversial and has been the subject of “withering criticism.” HAROLD HONGJU KOH, THE NATIONAL SECURITY CONSTITUTION: SHARING POWER AFTER THE IRAN-CONTRA AFFAIR 94 (1990). 361. See supra Part IV. 2014] NATIONAL SECURITY RULEMAKING 943 termined by the courts. In some recent cases concerning the war against terrorist organizations, the Supreme Court seems to have recognized this reality.362 Asking courts to better police the boundaries of the national security exception is another way in which the courts should ensure that the administrative state operates within constitutional bounds. Even if the courts will not recognize the constitutional necessity of a Chenery-type rule, and Congress will not reform the APA to require it, the President should impose it on agencies through an executive order. Whether required by the Constitution or the spirit of the APA, procedural reforms must be implemented for the national security administrative state to be effective. And it is the President’s duty as Commander-in-Chief to ensure that reform happens; the security of the nation depends on it. VI. CONCLUSION National security rulemaking desperately needs less secrecy and more public participation. Along with classification reform, the more frequent use of notice-and-comment procedures, enforced by the courts through a Chenery-type rule, can help immensely. Notice-andcomment deserves the fulsome praise it has received. A keystone of the APA’s “bill of rights” for those affected by agency regulation, it encourages deliberative decisionmaking, increases accountability, ensures public participation, and legitimates the final agency decision.363 In short, notice-and-comment rulemaking enhances democratic values. Notice-and-comment rulemaking has also grown more popular as technological advances continue to make it easier for the public to comment on proposed regulations and the agency to respond. In fact, the United States government now proselytizes worldwide for the procedure.364 However, notice-and-comment rulemaking turns out to be yet another practice that the United States urges for other nations while reserving for itself a healthy dose of American exceptionalism. Secrecy enshrouds a large portion of the federal bureaucracy performing a broad range of national security functions.365 The APA’s national security exception plays a more important role in establishing and maintaining the national security administrative 362. See Knowles, supra note 215, at 91-92 (discussing the Supreme Court’s refusal to defer to the government’s claims of military exigency in the enemy combatant cases such as Hamdan v. Rumsfeld, 548 U.S. 557 (2006)). 363. See supra Part II.A–B. 364. See Jeffrey S. Lubbers, The Transformation of the U.S. Rulemaking Process—For Better or Worse, 34 OHIO N.U. L. REV. 469, 471 (2008); Mendelson, supra note 41, at 1344. 365. See, e.g., PRIEST & ARKIN, supra note 24, at 22. 944 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:883 state than its sporadic invocation by agencies might suggest. To be sure, it provides a useful escape hatch for agencies whose rules are challenged in court. But more importantly, it is the formal legal incarnation of the culture of insularity that dominates national security rulemaking. And because the exception informs the rule, understanding the scope of this widespread avoidance of notice-andcomment rulemaking on national security grounds is critical for understanding how the American administrative state operates as a whole. Our bifurcated administrative state evolved from Americans’ ambiguous views toward fascism and the New Deal. It may have been a useful way to address some of that era’s challenges. But today, the existence of two overlapping administrative law regimes often encourages agencies to select the one subjecting them to less scrutiny. And in contexts like the NSA surveillance programs and the postSeptember 11 Alien Registration Program, the use of notice-andcomment would not only have made the agencies more effective in achieving their goals, but it also would have protected the rights of minorities and the American people in general.366 The present arrangement simply does not make sense in a world where the foreign and the domestic are not only intertwined, but are often indistinguishable. As the NSA surveillance programs reveal, national security rulemaking regulates our lives as intimately as any other kind. It deserves our sustained attention and participation. 366. See supra notes 10-12, 50-55 and accompanying text. RAISING THE FLOOR OF COMPANY CONDUCT: DERIVING PUBLIC POLICY FROM THE CONSTITUTION IN AN EMPLOYMENT-AT-WILL ARENA STEVEN J. MULROY* & AMY H. MOORMAN I. INTRODUCTION .................................................................................................. II. THE PUBLIC POLICY EXCEPTION TO AT-WILL EMPLOYMENT ............................. III. CONSTITUTIONAL SOURCE OF PUBLIC POLICY VERSUS OTHER LEGAL SOURCES ........................................................................................................... A. Generally .................................................................................................... B. State versus Federal Constitutions ............................................................ C. Treating Private Action as State Action .................................................... IV. THE RELEVANCE OF EXISTING STATUTORY REMEDIES...................................... V. SPECIFIC CONSTITUTIONAL PROVISIONS AS CANDIDATES FOR THE PPE ........... A. Provisions that Should Not Form the Basis of a PPE Claim .................... 1. “Structural” Constitutional Doctrines ................................................. 2. Restrictions Uniquely Focused on Government ................................... 3. Due Process/Criminal Procedure Safeguards ..................................... B. Constitutional Provisions that Should Form the Basis of a PPE Claim... 1. Free Speech: Political Expression ........................................................ (a) Forced Speech. .............................................................................. (b) Whistleblowing ............................................................................. (c) Coverage Inspired by Statutory Speech Protection for Private Employees ...................................................................................... (d) Toward a Balance of Employee and Employer Interests ............. 2. Fourth Amendment Privacy ................................................................. 3. Equal Protection .................................................................................. 4. Free Exercise ........................................................................................ C. Closer Cases ............................................................................................... 1. Reproductive Rights And Gender ........................................................ 2. Substantive Due Process ...................................................................... 3. Second Amendment.............................................................................. VI. CONCLUSION ..................................................................................................... 945 951 956 956 962 963 965 972 973 973 973 975 979 979 982 983 986 988 992 996 999 1001 1001 1005 1006 1008 I. INTRODUCTION Consider an employer that requires all employees to attend rallies for a particular presidential candidate, or to sign petitions supporting that candidate, or to lobby government for a particular position. Employees who fail to comply are subject to denial of bonuses, postponement of promotions, or even termination. If the employer were a government agency, this would clearly violate the employees’ free speech rights under the First Amendment.1 * Steve Mulroy would like to acknowledge with gratitude the comments of Profs. Lee Harris, Ernie Lidge, Andrew McClurg, and Eugene Shapiro of the Cecil C. Humphreys School of Law, University of Memphis, and the research assistance of Alex Hall and Logan Klauss. 1. See, e.g., Branti v. Finkel, 445 U.S. 507, 517-19 (1980) (stating that with the exception of certain instances where political affiliation would “interfere with the discharge of his public duties . . . continued employment of an assistant public defender cannot properly be conditioned upon his allegiance to the political party”); Elrod v. Burns, 427 U.S. 347 946 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 In some states, a private employee might have some sort of statutory protection.2 But, in the many cases where such explicit statutory protection is lacking, the vast majority of private employees would have no remedy. That is so because, for the last century or two, the general rule has been that absent explicit contract language to the contrary, employment in the private sector is “at will.”3 However, in recent decades, courts have, on some occasions, applied a common law doctrine known as the “public policy exception” (PPE) to the at-will employment rule to protect employees in extreme cases when the employer’s conduct runs contrary to a definite public policy. Originating in such relatively clear-cut cases, as where an employer fired an employee for refusing to violate the law,4 or for complying with a legal obligation like jury service,5 the exception has expanded into other areas where the employer’s adverse employment action seems contrary to a clear, widely accepted public policy in the state. The doctrine stands as a last line of defense for an employee who cannot point to express statutory text, explicit contractual language, or specific facts creating an implied contract. It creates a “floor” for fair treatment by employers to which all private employees are entitled. To the extent one considers such a floor necessary to safeguard important public policies, then, the PPE is important. Courts vary in their application of this doctrine in wrongful discharge claims. In the “forced speech” example above, which has actually occurred and is not strictly hypothetical, some courts have granted the employee relief while others have not.6 While courts that recognize the PPE may theoretically allow use of constitutional principles to inform their determination of what is clear and substantial public policy within their states, there has been less enthusiasm for using constitutional principles in PPE cases as opposed to statutory (1976) (holding termination of public employees based on party affiliation unconstitutional under the First and Fourteenth Amendments). 2. See infra Part V.B.1.c (discussing state statutory protections of free speech rights of private employees). 3. A noteworthy exception to the general rule exists in the State of Montana, which statutorily protects employees from being discharged absent good cause. MONT. CODE ANN. § 39-2-904 (2013); see also infra notes 233-38 and accompanying text (describing state statutes and case law providing protection against termination for off-duty, off-premises conduct). Cf. ARIZ. REV. STAT. ANN. § 23-1501 (2013) (regulating employment termination in the private sector). 4. See, e.g., Martin Marietta Corp. v. Lorenz, 823 P.2d 100, 109 (Colo. 1992) (recognizing a public-policy exception where “the employer directed the employee to perform an illegal act as part of the employee’s work related duties”). 5. See, e.g., Nees v. Hocks, 536 P.2d 512, 515-16 (Or. 1975) (concluding that employer’s termination of employee for refusing to be excused from jury duty was driven by a “socially undesirable motive” which created a viable cause of action for wrongful discharge based on public policy). 6. See infra Part V.B.1.a (discussing such “forced speech” cases). 2014] COMPANY CONDUCT 947 or regulatory rules.7 In large part, this is because constitutional principles are generally considered to apply only where there is state action, and thus may be seen as less directly analogous to the setting of a private employment dispute.8 Such a dilemma can occur in many different situations where private employers fire employees under circumstances at odds with confirmed policy behind a constitutional principle. For example, cases have arisen in which employers allegedly fired employees for having an abortion.9 Other cases have involved other types of “free speech” issues, such as when employers forbade workers from speaking out on matters of public concern,10 forced them to engage in political speech with which they disagreed,11 or pressured them into making political contributions.12 Controversies also have arisen over private employer decisions to fire employees for wearing long hair,13 for smoking off-duty and off-premises,14 and for drinking off-duty and offpremises.15 Such cases indicate that employees expect their fundamental rights to be respected in the workplace. Similarly, society places high value on the right to vote, the freedom of worship, and the right to be free from unwarranted intrusion into intimate matters. When employers use the coercive power at their disposal to undermine these values, one might be inclined to 7. See infra Part III.A (discussing the use of constitutional versus other sources of law in determining public policy under the PPE). 8. See infra Part III.A (discussing the use of constitutional versus other sources of law in determining public policy under the PPE). 9. Barbara Presley Noble, A Firing for Cause, or for Abortion?, N.Y. TIMES, Jan. 16, 1994, at F23. Not all such cases were resolved, id., and at least one was resolved through confidential settlement. See Alan J. Craver, Stylist Who Said Her Abortion Led to Firing Settles Suit, THE BALT. SUN, Feb. 5, 1995, at 11C. Most of these cases went resolved or unsettled. Id. 10. See Flesner v. Technical Commc’ns Corp., 575 N.E.2d 1107, 1111 (Mass. 1991) (applying the PPE to termination for cooperating with a federal investigation of the employer). 11. See Novosel v. Nationwide Ins. Co., 721 F.2d 894, 900 (3d Cir. 1983) (recognizing a PPE where company fired worker for refusing to lobby state legislature for policies favored by the company). 12. See Robert Kelner, Allegations of Employer Coercion of Political Activity Are on the Rise, INSIDE POLITICAL LAW (Oct. 17, 2012), http://www.insidepoliticallaw.com/ 2012/10/17/allegations-of-employer-coercion-of-political-activity-are-on-the-rise/ (describing such incidents). 13. Miller v. Safeway, Inc., 102 P.3d 282, 295 (Alaska 2004). 14. Debra J. Saunders, Where There’s Smoke, You’re Fired, S.F. CHRON., Feb. 17, 2005, at B13; see also Amy H. Moorman, Employer Regulation of Off-Duty Smoking: Meeting the Needs of Employers and Employees with Smoking Cessation Programs, J. INDIVIDUAL EMP’T RTS, 1994-95, at 243, 243 (discussing the merits of employing nonsmokers from an organizational perspective, but cautioning against the “slippery slope” of involvement with employees’ off-duty activities). 15. Best Lock Corp. v. Review Bd. of the Ind. Dep’t of Emp’t & Training Servs., 572 N.E.2d 520, 521-22 (Ind. App. 1991) (concluding that employer did not have just cause to fire employee for violating work policy prohibiting the off-duty consumption of alcohol). 948 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 believe that courts should provide employees with common law protections. But the law’s laissez-faire preference for “at-will” employment arrangements, and an intuitive distinction between the application of constitutional principles to public versus private employers, tug in the opposite direction. For example, in Novosel v. Nationwide Insurance Company, the Third Circuit, applying Pennsylvania law in a diversity case, explained at length how constitutional principles could legitimately form the basis for a judicially found “public policy” under the PPE.16 Several years later, after intervening Pennsylvania cases rejected constitutionally inspired PPE claims,17 the Third Circuit sharply limited Novosel, holding that the absence of state action undercut the utility of constitutional doctrine in deciding the contours of the state’s public policy.18 This divergence mirrors one shown among various state courts. While many of them either explicitly or implicitly drew upon constitutional sources,19 and no state that recognizes a broad PPE specifically excludes constitutional sources from its public policy analysis,20 a fair number of courts have criticized the practice over the years.21 Many, but not all, of the later cases involved First Amendment issues. 16. 721 F.2d at 899-900. 17. See, e.g., Booth v. McDonnell Douglas Truck Servs., Inc. 585 A.2d 24, 28 (Pa. Super. Ct. 1991) (stating that certain state constitutional provisions protecting contract rights and obligations did not support employee’s right to collect unpaid commissions as a public policy claim because there was no state action). 18. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 620 (3d Cir. 1992). 19. See, e.g., Gantt v. Sentry Ins., 824 P.2d 680, 687-88 (Cal. 1992) (referencing only “the constitution or statutory provisions”); Parnar v. Americana Hotels, Inc., 652 P.2d 625, 631 (Haw. 1982) (determining that a clear mandate of public policy is violated when “the employer's conduct contravenes the letter or purpose of a constitutional, statutory, or regulatory provision or scheme”); Fleshner v. Pepose Vision Inst., P.C., 304 S.W.3d 81, 92 (Mo. 2010) (en banc) (listing “the constitution, statutes, regulations promulgated pursuant to statute, or rules created by a governmental body”); Dohme v. Eurand America, Inc., 956 N.E.2d 825, 829 (Ohio 2011) (noting that the Constitution is one source of public policy in applying the PPE); Scott v. Extracorporeal, Inc., 545 A.2d 334, 342 (Pa. Super. Ct. 1988) (stating that public policy must be articulated “in law or a constitutional provision”); Gardner v. Loomis Armored Inc., 913 P.2d 377, 380 (Wash. 1996) (examining whether employer’s conduct “contravenes the letter or purpose of a constitutional, statutory, or regulatory provision or scheme” (quoting Parnar, 652 P.2d at 631 (emphasis added))); Birthisel v. Tri-Cities Health Servs. Corp., 424 S.E.2d 606, 612 (W. Va. 1992) (noting a constitutional basis for public policy in applying the PPE); Brockmeyer v. Dun & Bradstreet, 335 N.W.2d 834, 840 (Wis. 1983) (listing only “constitutional or statutory provision”). While state courts vary, most draw upon both federal and state constitutions as sources of public policy. See infra Part III.B. 20. See generally infra Part III.A. 21. See Grzyb v. Evans, 700 S.W.2d 399, 402 (Ky. 1985) (rejecting a “freedom of association” basis for a wrongful discharge claim, because the freedom of association right only applies to governments (citing United Bhd. of Carpenters & Joiners of Am. v. Scott, 463 U.S. 825 (1985) (dealing with a state action requirement when suing directly under the First Amendment, not a PPE))); Cisco v. United Parcel Servs., Inc., 476 A.2d 1340, 1344 2014] COMPANY CONDUCT 949 Some scholars have urged that federal or state constitutional provisions should be among the potential sources of relevant public policy for purposes of allegedly wrongful employment practices.22 However, they have not given the issue extensive analysis and discussion. In recent years, scholars have examined the issue from a more topicspecific perspective, such as the right of employee privacy,23 or with a state-specific or even case-specific focus.24 Other scholars have discussed more generally the connection between constitutional law and private law. One approach is to examine when private action may be treated as equivalent to public action, and thus be subject to constitutional norms.25 Furthermore, international law recognizes a doctrine known as “direct horizontal effect,” wherein the constitutional human rights guarantees of a country are applied to govern relations between private parties.26 Just recently, in 2012, the Supreme Court dramatically changed constitutional criminal procedure law by importing private, common law property (Pa. Super. Ct. 1984) (rejecting presumption of innocence-based PPE claim and stating that constitutional rights were not meant to be “superimposed into” one’s “remaining life experiences”); Bushko v. Miller Brewing Co., 396 N.W.2d 167, 172 (Wis. 1986) (narrowly construing the PPE and rejecting a free speech-based PPE claim, lest it open a “Pandora’s box” of due process and equal protection arguments which would “eliminate any distinction between private and governmental employment”). Cisco echoes similar choices made by other courts within Pennsylvania. See Booth, 585 A.2d at 28 (finding no constitutional basis for a public policy cause of action because no state action was involved), appeal denied, 597 A.2d 1150 (Pa. 1991); Veno v. Meredith, 515 A.2d 571, 581 (Pa. Super. Ct. 1986) (rejecting on similar grounds a PPE claim by newspaper editor fired for publishing an article criticizing a judge); Martin v. Capital Cities Media, Inc., 511 A.2d 830, 844 (Pa. Super. Ct. 1986) (rejecting free speech-based PPE claim against private newspaper). 22. See, e.g., Richard L. Alfred & Ben T. Clements, The Public Policy Exception to the At-Will Employment Rule, 78 MASS. L. REV. 88, 93-94 (1993); Henry H. Perritt, Jr., The Future of Wrongful Dismissal Claims: Where Does Employer Self Interest Lie?, 58 U. CIN. L. REV. 397, 402-03 (1989) (urging ready use by courts of both federal and state constitutional sources in applying the PPE). 23. See, e.g., Adam Shinar, Public Employee Speech and the Privatization of the First Amendment, 46 CONN. L. REV. 1, 22-24 (2013) (referencing the issue briefly as background with respect to free speech); John B. Wefing, Employer Drug Testing: Disparate Judicial and Legislative Responses, 63 ALB. L. REV. 799 (2000) (contrasting drug testing rules for public and private employers); Jill Yung, Big Brother IS Watching: How Employee Monitoring in 2004 Brought Orwell’s 1984 to Life and What the Law Should Do About It, 36 SETON HALL L. REV. 163 (2005) (discussing electronic monitoring of employees via video surveillance, GPS tracking, and Internet usage tracking software). 24. See, e.g., Ivo Becica, Note, Privacy—State Constitutional Privacy Rights Against Private Employers: A “Hairy” Issue in Alaska. Miller v. Safeway, Inc., 102 P.3d 282 (Alaska 2004), 37 RUTGERS L.J. 1235 (2006) (discussing Alaska case involving privacy of private employee); Maureen Binetti, Minding Your Business: Is Your Life After Work Really Private?, N.J. LAW. MAG., Apr. 2008, at 33 (discussing law in New Jersey on employer interference with off-duty, off-premises behavior such as smoking). 25. See Christian Turner, State Action Problems, 65 FLA. L. REV. 281 (2013). 26. See Willmai Rivera-Pérez, What’s the Constitution Got to Do with It? Expanding the Scope of Constitutional Rights into the Private Sphere, 3 CREIGHTON INT'L & COMP. L.J. 189 (2012) (comparative analysis of the “direct horizontal effect”). 950 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 notions of trespass.27 In evaluating police investigative acts, the Court held that where the common law would recognize a trespass to private property, the acts constitute a “search” within the meaning of the Fourth Amendment.28 Just as fruitful is an evaluation of the reverse dynamic, wherein constitutional principles inform the application of a common law cause of action. Assuming that constitutional principles indeed have some significant role to play in evaluating such a common law claim, significant questions remain as to which constitutional principles, and how to apply them to arguably analogous factual situations in the private employment sphere. If we acknowledge a strong public policy in favor of the right to vote, should we reason similarly with respect to the right to bear arms? If we apply free speech principles to protect an employee from being forced to sign a petition with which she disagrees, should we apply them equally to allow her to publicly criticize her employer and bring it into disrepute? Scholarship has not discussed the issues in this manner. This Article discusses the use of the PPE to vindicate constitutional interests. It takes an interdisciplinary approach, mixing analysis from business law, tort law, and constitutional law. It argues that courts can and should consider constitutional principles when deciding PPE claims. Constitutional principles have as valid a place in the PPE analysis as do statutory principles. This Article also argues that some constitutional rights are more amenable to a private-sector analogy, and/or more appropriate for a PPE analysis. For example, the right to informational privacy is more translatable to the private employment context than the rights guaranteed by the Establishment Clause. And the right to free speech enjoys more of a current public policy consensus than the right to abortion, or to bear arms. For each of several different constitutional provisions examined, this Article recommends general principles to guide courts in applying the PPE. Part II lays out background on the PPE. Part III discusses the extent to which courts have used constitutional principles to inform their discussion, and argues that such principles are appropriate sources of policy, at least in certain limited situations. Part IV discusses the extent to which the PPE cause of action is necessary or advisable, given existing statutory remedies for similar types of employee complaints. Part V suggests how one might apply to the PPE such specific constitutional provisions or doctrines as: free speech, the Fourth Amendment, equal protection, reproductive rights, substantive due process, procedural due process, and the Second Amendment. Part VI offers concluding thoughts. 27. See United States v. Jones, 132 S. Ct. 945 (2012). 28. Id. at 949-50. 2014] COMPANY CONDUCT 951 II. THE PUBLIC POLICY EXCEPTION TO AT-WILL EMPLOYMENT A fundamental rule of employment contract law is, in the absence of a contractual term or statutory provision to the contrary, employment is presumed to be at will. That is, the employer can fire the employee for a good reason, a bad reason, or no reason at all.29 One well-recognized exception to the at-will employment rule is the PPE.30 This judicially created exception emerged in recent decades, representing a departure from traditional common law at-will employment principles.31 In some ways, the rise of this exception constitutes a movement back toward the law of the eighteenth century, when masters had implied obligations to “treat the servant humanely” and to “furnish him with suitable lodging.”32 Back then, for example, instead of a presumption of at-will employment, the common law presumed an implied one-year term of employment if the term was not specified.33 This made sense in a largely agrarian society. It protected the servant from being used during the growing and harvest season only to be let go when the ground was barren; it also protected the master from having to support a servant during the winter only to be abandoned for a better offer once serious work had to be done.34 29. 10 LEX K. LARSON, EMP. DISCRIMINATION § 174.01 (2d ed. 2012); see, e.g., Phipps v. IASD Health Servs. Corp., 558 N.W.2d 198, 202 (Iowa 1997) (noting that, unless a valid employment contract exists between parties, “an employer may discharge an employee at any time, for any reason, or no reason at all”); Fleshner v. Pepose Vision Inst., P.C., 304 S.W.3d 81, 91 (Mo. 2010) (en banc) (asserting that “[g]enerally, at-will employees may be terminated for any reason or for no reason”);. 30. LARSON, supra note 29, § 174.01. 31. Donald C. Carroll, At-Will Employment: The Arc of Justice Bends Towards the Doctrine’s Rejection, 46 U.S.F. L. REV. 655, 668-69 (2012) (supporting the PPE); R. Scott Oswald & Michael L. Vogelsang Jr., The ABCs of Common Law Wrongful Termination Claims in the Washington Metropolitan Region, 3 LAB. & EMP. L.F. 197, 199-202 (2013) (tracing the development of the PPE from initial emergence to broad acceptance among jurisdictions); Christopher L. Pennington, Comment, The Public Policy Exception to the Employment-at-Will Doctrine: Its Inconsistencies in Application, 68 TUL. L. REV. 1583, 1594-98 (1994) (same, and criticizing its application); Kenneth R. Swift, The Public Policy Exception to Employment At-Will: Time to Retire a Noble Warrior?, 61 MERCER L. REV. 551, 553-63 (2010) (opposing the PPE). 32. H.G. WOOD, A TREATISE ON THE LAW OF MASTER AND SERVANT § 83, at 165-66 (William S. Hein & Co. 1981) (1877) (emphasis omitted); see generally HENRY H. PERRITT, JR., EMPLOYEE DISMISSAL LAW AND PRACTICE § 1.03 (5th ed. 2008) (discussing how the Industrial Revolution influenced an economy-driven approach to employment that undermined traditional employer obligations regarding public policy). 33. 1 WILLIAM BLACKSTONE, COMMENTARIES ON THE LAWS OF ENGLAND 413 (Oxford, Clarendon Press 1765) (“The contract between [servants] and their masters arises upon the hiring. If the hiring be general without any particular time limited, the law construes it be a hiring for a year.”); see also Kenneth A. Sprang, Beware the Toothless Tiger: A Critique of the Model Employment Termination Act, 43 AM. U. L. REV. 849, 860 (1994) (discussing the American courts’ adoption of this one-year presumption during the nineteenth century). 34. Pennington, supra note 31, at 1584-85 n.7. 952 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 With the advent of industrialization came a different approach, one which emphasized the freedom of contract so as to enhance commerce and reduce burdens on business.35 This approach enshrined a default at-will rule by the end of the nineteenth century.36 It preceded a near-parallel development in constitutional law, the socalled “Lochner era,” during which the Supreme Court imposed a laissez-faire approach to employment regulation based on a supposed constitutional freedom of contract.37 This development is another example of the interplay between constitutional law and the common law of employment. Later in the twentieth century, two decades after the end of the Lochner era, courts began to recognize policy-based exceptions to the at-will rule.38 One prominent expert in the field has called the erosion of the at-will doctrine “[t]he most significant employment law development in the last quarter of the 20th century.”39 Under the PPE, an employee can bring suit for wrongful discharge where the termination was in violation of a clear public policy.40 For example, courts may intervene when an employer fires workers because they refused to violate the law,41 complied with a legal requirement,42 or engaged in some form of protected activity.43 Jurisdictions vary as to which 35. Id. at 1585; see also infra notes 137-139 (discussing the perceived burden on employers as the motivating factor behind limiting statutory causes of action). 36. Pennington, supra note 31, at 1585. 37. Lochner v. New York, 198 U.S. 45, 64 (1905) (finding a statutory regulation of labor hours within private businesses to be an unconstitutional infringement on the “freedom of contract” due process right as well as an invalid use of police power). The Lochner era ended thirty years later when the Court rejected the notion that the freedom to contract precluded government regulation of the labor market. EDWIN CHEMERINSKY, CONSTITUTIONAL LAW PRINCIPLES AND POLICIES § 8.2 (4th ed. 2011) (analyzing this laissezfaire philosophy as stemming from a “social Darwinism” in which the individual’s freedom to contract limited the government’s regulatory power). See NLRB v. Jones & Laughlin Steel Corp., 301 U.S. 1, 31-32 (1937). 38. The first case to recognize a PPE to the at-will rule was Petermann v. Int’l Bhd. of Teamsters, 344 P.2d 25 (Cal. Dist. Ct. App. 1959). Pennington, supra note 31, at 1593. 39. Perritt, supra note 22, at 397. 40. LARSON, supra note 29, § 174.04[1]; see also Mello v. Stop & Shop Cos., 524 N.E.2d 105 (Mass. 1988) (the PPE may apply to termination of employee for reporting employer’s criminal conduct); Collins v. Rizkana, 652 N.E.2d 653 (Ohio 1995) (establishing sexual harassment as a valid basis for the PPE); Thompson v. St. Regis Paper Co., 685 P.2d 1081 (Wash. 1984) (holding that it violated clear public policy to discharge plaintiff for complying with federal statute on accounting procedures). 41. See, e.g., Woodson v. AMF Leisureland Ctrs., Inc., 842 F.2d 699 (3d Cir. 1988) (upholding a PPE action when barmaid was fired for refusing to serve alcohol to visibly intoxicated persons). 42. See, e.g., Nees v. Hocks, 536 P.2d 512 (Or. 1975) (creating a PPE where employee was fired for refusing employer's request to ask for excuse from jury duty). 43. See, e.g., Porter v. Reardon Mach. Co., 962 S.W.2d 932, 937-38 (Mo. Ct. App. 1998) (recognizing exception for “whistleblower” activity). 2014] COMPANY CONDUCT 953 public policies qualify for the PPE,44 but virtually every jurisdiction recognizes some form of this exception.45 Some courts explicitly limit the cause of action to cases where the employee has actually been discharged.46 But there is no theoretical reason why this doctrine could not apply to other adverse employment actions besides termination. Some courts have so held.47 However, the overwhelming majority of the cases involve full termination, leading courts to speak of this as a “wrongful discharge” cause of action. It also sometimes is referred to as the tort of “retaliatory discharge,” at least where the complaint alleges termination in retaliation for the exercise of a protected right, or for the failure to violate a clear law or policy upon the direction of a superior.48 The cause of action is normally characterized as a tort.49 Some authorities suggest that the cause of action also may be partially 44. Compare Sventko v. Kroger Co., 245 N.W.2d 151 (Mich. Ct. App. 1976) (creating a PPE cause of action where en employee filed workers’ compensation claim), and McGarrity v. Berlin Metals, Inc., 774 N.E.2d 71 (Ind. Ct. App. 2002) (finding cause of action for retaliatory discharge where employee refused to commit illegal act for which he would be personally liable), and Call v. Scott Brass, Inc., 553 N.E.2d 1225 (Ind. Ct. App. 1990) (applying PPE where employee was fired for complying with jury duty summons), with Campbell v. Eli Lilly & Co., 413 N.E.2d 1054 (Ind. Ct. App. 1980) (denying cause of action where employee was terminated for reporting supervisor misconduct to company officials), and Price v. Carmack Datsun, Inc., 485 N.E.2d 359 (Ill. 1985) (finding no cognizable PPE for an employee who filed insurance claim because it did not affect the public interest), and MacDonald v. E. Fine Paper, Inc., 485 A.2d 228 (Me. 1984) (declining to find a PPE for wrongful discharge of an employee who was fired for filing a workers’ compensation claim because remedy already existed under Workers’ Compensation Act). 45. GERARD P. PANARO, EMPLOYMENT LAW MANUAL: RECRUITMENT, SELECTION, TERMINATION ¶ 7.02 (1990); see also PERRITT, supra note 32, § 7.09[B][1] (acknowledging that most courts recognize a PPE to at-will employment where an employee is fired for serving jury duty). 46. See, e.g., Darchak v. City of Chi. Bd. of Educ., 580 F.3d 622, (7th Cir. 2009) (declining to extend Illinois PPE to any injury short of actual discharge); Dixon v. Denny’s Inc., 957 F. Supp. 792, 799 (E.D. Va. 1996) (concluding “that the public policy exception to Virginia's employment at will doctrine does not yet encompass constructive discharges as well as actual discharges”); Roberts v. Dudley, 993 P.2d 901 (Wash. 2000) (limiting the PPE to termination). 47. See, e.g., Hunter v. Port Auth. of Allegheny Cnty., 419 A.2d 631 (Pa. Super. Ct. 1980) (recognizing doctrine’s applicability to a refusal to hire); MISSOURI APPROVED JURY INSTRUCTIONS (CIVIL) § 38.03 cmt. A (Robert T. Adams et al., eds., 7th ed. 2012) (contemplating such a cause of action in cases of “constructive discharge, demotion, or adverse job consequences,” but declining to take a position on the validity of such a claim). 48. See, e.g., Turner v. Mem’l Med. Ctr., 911 N.E.2d 369, 375-76 (Ill. 2009) (using the terms “wrongful discharge” and “retaliatory discharge” interchangeably in a case involving a medical employee allegedly fired in retaliation for speaking out about patient safety); Birthisel v. Tri-Cities Health Servs. Corp., 424 S.E.2d 606, 611 (W. Va. 1992) (using both terms to describe a claim by a medical employee fired for choosing professional ethics standards over a conflicting company policy). 49. See, e.g., Vigil v. Arzola, 699 P.2d 613, 619 (N.M. Ct. App. 1983) (acknowledging that the majority of courts find the public policy cause of action to sound in tort, which “provides a more appropriate rationale than one [sounding] in contract”). 954 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 grounded in the common law’s implied covenant of good faith and fair dealing, which sounds in contract law.50 The basic rationale for the exception is that, while an employer should generally be free from interference in choosing whom to employ, the public has an interest in ensuring that the inherently coercive power of an employer to discharge is not used to pressure employees to disregard the law, forfeit important rights, or otherwise contravene substantial public policy interests.51 Even where such public interests are implicated, though, the employer may still prevail where there is some “separate, plausible and legitimate reason” for taking the challenged action.52 A typical listing of the elements of the cause of action includes: (1) The existence of a clear public policy: i.e., the “clarity” element; (2) The termination placed that policy in jeopardy: i.e., the “jeopardy” element; (3) The plaintiff’s termination was actually motivated by conduct related to the public policy: i.e., the “causation” element; and (4) The employer lacked a legitimate business justification for terminating the employee: i.e., the “overriding justification” element.53 While there is a theoretical difference between the second and third elements, there is little distinguishing them in practice. Typically, the public policy at issue is placed in jeopardy precisely because of the causal link between the termination and the policy. Thus, the causation proxy leads to the jeopardy prong. 50. See, e.g., Norcon, Inc. v. Kotowski, 971 P.2d 158, 167 (Alaska 1999) (public policy tort largely encompassed by implied covenant); Sterling Drug, Inc. v. Oxford, 743 S.W.2d 380, 385 (Ark. 1988) (concluding that a contract cause of action is most appropriate for a wrongful discharge claim); Brockmeyer v. Dun & Bradstreet, 335 N.W.2d 834, 841 (Wis. 1983) (finding the remedies provided by wrongful discharge statutes to be more applicable to contract causes of action than tort causes action). 51. MARK W. BENNETT ET AL., EMPLOYMENT RELATIONSHIPS: LAW AND PRACTICE § 2.02[F][b] (2014) (describing the PPE as having particular significance in situations where an employee refuses to commit illegal acts, exercises a legal right, performs a public duty, or reports an employer’s misconduct); see also Strozinsky v. Sch. Dist. of Brown Deer, 614 N.W.2d 443, 453 (Wis. 2000) (asserting that the exception “properly balances the need to protect employees from terminations that contradict public policy with the employer’s historical discretion to discharge employees under the freedom to contract embodied in the at-will doctrine”). 52. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 616 (3d Cir. 1992) (citing Cisco v. United Parcel Servs., Inc., 476 A.2d 1340, 1343 (Pa. Super. Ct. 1984)). 53. See Fitzgerald v. Salsbury Chem., Inc., 613 N.W.2d 275, 282 n.2 (Iowa 2000) (referencing this four-part elemental foundation as being a sufficient basis for a PPE cause of action); Collins v. Rizkana, 652 N.E.2d 653, 657-58 (Ohio 1995) (same); PERRITT, supra note 31, § 7.04 (recognizing these four elements as the basic analytical framework for a public policy tort cause of action). 2014] COMPANY CONDUCT 955 Courts caution that the PPE should be narrow and not expanded lightly.54 The default position is still at-will employment. Other than contractual terms between the parties, courts say, deviations from this default arrangement should be specified by the legislature.55 Further, the public policy alleged to have been violated by the adverse employment action must be “substantial.”56 As one court stated, the public policy must “strike at the heart of a citizen’s social rights, duties, and responsibilities.”57 The existence of the policy, as well as its contours and scope, must be relatively clear so as to place employers on proper notice of a potential violation.58 The analogy here would be to qualified immunity for public officials, where the court must find a violation of “clearly established law.”59 A listing of categories of typical situations in which PPE cases arise includes those where employers fired employees: (1) For refusing to commit an illegal act; (2) For performing a legal duty; (3) For exercising a legal right or privilege; or (4) In retaliation for reporting misconduct.60 An example of category (1) would be termination for refusing to commit perjury before an official panel overseeing or investigating the company.61 An example of category (2) would be an instance in which an employee must report for jury duty, or has an affirmative 54. See, e.g., Gardner v. Loomis Armored Inc., 913 P.2d 377, 380 (Wash. 1996) (stating that courts should exercise caution when declaring public policy absent express legislative or judicial expression on the subject (citing Thompson v. St. Regis Paper Co., 685 P.2d 1081 (Wash. 1984))); PERRITT, supra note 32, § 7.05[B] (describing courts’ general reluctance to extend the exception beyond the express language of a statute). 55. See Horn v. N.Y. Times, 790 N.E.2d 753, 756 (N.Y. 2003) (“[S]ignificant alteration of employment relationships . . . is best left to the Legislature . . . because stability and predictability in contractual affairs is a highly desirable jurisprudential value.” (quoting Sabetay v. Sterling Drug, Inc., 506 N.E.2d 919, 923 (N.Y. 1987))); see also Borden v. Johnson, 395 S.E.2d 628, 629 (Ga. Ct. App. 1990) (cautioning that the courts should not “usurp the legislative function” by making their own decisions regarding the public policies which would trump the general rule of at-will employment). 56. Birthisel v. Tri-Cities Health Servs. Corp., 424 S.E.2d 606, 612 (W. Va. 1992). 57. Dicomes v. State, 782 P.2d 1002, 1006 (Wash. 1989) (en banc) (quoting Palmateer v. Int’l Harvester Co., 421 N.E.2d 876 (Ill. 1981)); see also Booth v. McDonnell Douglas Truck Servs., Inc., 585 A.2d 24, 28 (Pa. Super. Ct. 1991) (using similar language). 58. Birthisel, 424 S.E.2d at 612. 59. Id. at 612 n.8. 60. See, e.g., Field v. Phila. Elec. Co., 565 A.2d 1170, 1176 (Pa. Super. Ct 1989) (disclosing safety problems at nuclear power plant); see also JOHN C. MCCARTHY, RECOVERY OF DAMAGES FOR WRONGFUL DISCHARGE 2D §§ 1.5, 1.9, 1.22, 1.24 (1990) (providing an indepth analysis for each of these four distinct situations). 61. See Woodson v. AMF Leisureland Ctrs., Inc., 842 F.2d 699, 702 (3d Cir. 1988) (upholding PPE action where barmaid was fired for refusing to serve alcohol to visibly intoxicated persons); Petermann v. Int’l Bhd. of Teamsters, 344 P.2d 25, 27 (Cal. Dist. Ct. App. 1959). 956 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 duty to report misconduct at the place of work.62 An example of (4) would be any legitimate whistleblowing case.63 It is the third category that is relevant to this Article. An uncontroversial and common example for this category would be cases involving terminations for filing a workers’ compensation claim.64 But what remedy, if any, does an employee have who is fired for exercising a constitutional right—in other words, for engaging in a constitutionally protected activity? III. CONSTITUTIONAL SOURCE OF PUBLIC POLICY VERSUS OTHER LEGAL SOURCES A. Generally Courts discussing the PPE uniformly recognize statutes and judicial decisions as valid sources of the public policy at issue in these cases.65 Regarding the former, to get a sense of the public policy of the state, a court can look not only to statutory text, but also to legislative history.66 But the use of constitutional law as a source has not always been viewed favorably. Some commentators have suggested generally that it is more difficult to use as a source of public policy,67 or that certain states exclude such use.68 In most of these states, rather than being specifically hostile to constitutional sources per se, courts are actually just hostile to the PPE in general. They either reject it out- 62. See Call v. Scott Brass, Inc., 553 N.E.2d 1225 (Ind. Ct. App. 1990) (granting cause of action for employee’s executing statutory duty to comply with a summons to appear for jury duty); Reuther v. Fowler & Williams, Inc., 386 A.2d 119, 119-20 (Pa. Super. Ct. 1978) (employee fired for missing work due to jury service). 63. See infra Part V.B.1.b. 64. See, e.g., Kelsay v. Motorola, Inc., 384 N.E.2d 353 (Ill. 1979); Frampton v. Cent. Ind. Gas Co., 297 N.E.2d 425 (Ind. 1973); Hrab v. Hayes-Albion Corp, 302 N.W.2d 606 (Mich. Ct. App. 1981). 65. PANARO, supra note 45, ¶ 7.02. 66. See, e.g., Hansen v. Am. Online, Inc., 96 P.3d 950, 954 n.7 (Utah 2004) (bypassing a statutory text analysis by looking to legislative history and debate as a legitimate means of defining the public policy of weapons in the workplace). 67. See PANARO, supra note 45, ¶ 7.03[2]. 68. See BENNETT ET AL., supra note 51, at app. 2B, 2-71 to 2-89 (2014) (listing Arizona, Colorado, Delaware, Florida, Georgia, Louisiana, New York, Pennsylvania, and Wisconsin as states that do not look to constitutional sources for public policy claims). 2014] COMPANY CONDUCT 957 right,69 or else view it so narrowly as to effectively preclude use of constitutional sources.70 Indeed, the use of constitutional principles as a source now is generally accepted, though it has received some criticism by state courts. Some state courts explicitly refer to constitutional provisions as a potential source of the public policy. A typical formulation is to ask whether the employer’s action “contravenes the letter or purpose of a constitutional, statutory, or regulatory provision or scheme.”71 This reference to at least constitutional and statutory sources of public policy is common.72 Other courts have implicitly recognized constitutional sources while rejecting constitution-sourced PPE claims on their facts, considering in detail claims involving employer actions interfering with free speech,73 religious freedom,74 and the right to 69. See, e.g., Bruley v. Village Green Mgmt. Co., 592 F. Supp. 2d 1381, 1387-88 (M.D. Fla. 2008), aff'd per curiam, 333 Fed. App’x 491 (11th Cir. 2009); Wright v. Dothan Chrysler Plymouth Dodge, Inc., 658 So. 2d 428, 431 (Ala. 1995); Pacheo v. Raytheon Co., 623 A.2d 464, 465 (R.I. 1993) (per curiam). 70. See, e.g., Poole v. In Home Health, LLC, 742 S.E.2d 492, 494 (Ga. Ct. App. 2013) (judicially created exceptions to at-will employment disfavored, so Georgia courts defer to legislature to create exceptions); McArn v. Allied Bruce-Terminix Co., 626 So. 2d 603, 607 (Miss. 1993) (recognizing only two circumstances in which the PPE applies: (1) where an employee refuses to participate in an illegal act; (2) where an employee is discharged for reporting illegal acts of his employer); Wieder v. Skala, 609 N.E.2d 105, 110 (N.Y. 1992) (creating a narrow exception to employment at-will employment but reiterating that further alterations are “best left to the legislature”); Ed Rachal Found. v. D’Unger 207 S.W.3d 330, 333 (Tex. 2006) (PPE limited to employees terminated for whistleblowing only where reporting the employer’s illegal conduct is a legal obligation rather than a mere civic duty); Paul H. Tobias, State-by-State Compendium of Leading and Representative Decisions Concerning the Public Policy Tort Doctrine, 1 LIT. WRONG. DISCHARGE CLAIMS app. 5A (last updated Dec. 2013), available at Westlaw, 1 LITWDCS App. 5A (collecting cases establishing that Indiana courts have so far limited the PPE to cases involving workers’ compensation or terminations for refusing to commit an illegal act). 71. Gardner v. Loomis Armored Inc., 913 P.2d 377, 380 (Wash. 1996) (quoting Thompson v. St. Regis Paper Co., 685 P.2d 1081, 1089 (Wash. 1984)). 72. See Gantt v. Sentry Ins., 824 P.2d 680, 687-88 (Cal. 1992) (en banc) (referencing “constitutional or statutory provisions”); Fleshner v. Pepose Vision Inst., P.C., 304 S.W.3d 81, 92 (Mo. 2010) (en banc) (listing “the constitution, statutes, regulations promulgated pursuant to statute, or rules created by a governmental body”); Scott v. Extracorporeal, Inc., 545 A.2d 334, 342 (Pa. Super. Ct. 1988) (public policy must be articulated “in law or constitutional provision”); Payne v. Rozendaal, 520 A.2d 586, 587 (Vt. 1986) (listing constitution, statute, judicial decision, and “customs and conventions of the people”); Brockmeyer v. Dun & Bradstreet, 335 N.W.2d 834, 840 (Wis. 1983) (listing only “constitutional or statutory provision”). 73. See, e.g., Korb v. Raytheon Corp., 574 N.E.2d 370 (Mass. 1991) (holding that a company spokesperson whose official remarks conflicted with employer interests did not have a cognizable wrongful discharge claim on the basis of free speech). 74. See, e.g., Kolodziej v. Smith, 588 N.E.2d 634, 638 (Mass. 1992) (acknowledging the existence of the PPE where an employer inhibits the free exercise of religion in the workplace or dismisses an employee on the basis of religion, but finding that requiring attendance at an employee training seminar referencing Christian ideology does not restrict religious exercise under this public policy). 958 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 privacy.75 Had the courts rejected constitutional sources of public policy, such extensive discussions would not have been necessary. Given the uniform acceptance of statutory provisions as potential sources of the public policy, recognition of constitutional provisions has at least some intuitive appeal. After all, since statutes are “subordinate” to constitutional provisions, “it would make little sense” to draw upon the former but not the latter for guidance.76 Of course, at first glance, the argument for not drawing upon constitutional sources in PPE cases is equally justifiable. Generally, constitutional provisions are designed to restrict government behavior.77 Arguably, constitutional principles are ill-suited to govern employment relations between private parties.78 It would make little sense, and would, perhaps, unduly restrict commerce, to make private employers abide by all the same requirements of procedural due process as a government employer.79 Based on this latter objection, courts in a few cases have flatly declined to draw upon constitutional sources in examining PPE claims. In a series of cases, the Pennsylvania Superior Court rejected PPE claims based on constitutional sources of policy, at least where applied to private employers.80 One opinion emphasized that constitu75. See, e.g., Cort v. Bristol-Myers Co., 431 N.E.2d 908, 914 (Mass. 1982) (denying specific claim of wrongful discharge for failing to fill out employee questionnaire with arguably unwarranted and intrusive questions because employee also refused to answer clearly relevant and warranted questions, but nonetheless recognizing that employee privacy rights limited the scope of questions for which refusal to answer constituted valid grounds for discharge). 76. Alfred & Clements, supra note 22, at 93-94. 77. See, e.g., CHEMERINSKY, supra note 37, § 6.4 (examining the “state action doctrine” and indicating that the Constitution applies to the government and does not regulate private conduct “no matter how discriminatory or how much [private wrongs] infringe fundamental rights”); see also Barr v. Kelso-Burnett Co., 478 N.E.2d 1354, 1356-57 (Ill. 1985) (stating that provisions of the Illinois Constitution mandate public policy protecting free speech restrict the actions of governmental or public officials, not of private employers); Hatfield v. Rochelle Coal Co., 813 P.2d 1308, 1311 (Wyo. 1991) (holding that “private employers are not subject to due process claims under their state constitutions for wrongful termination of employees”). 78. See Novosel v. Nationwide Ins. Co., 721 F.2d 894, 903 (3d Cir. 1983) (Becker, J., dissenting from denial of rehearing en banc); Perritt, supra note 22, at 400-03 (articulating, but rejecting, this argument). 79. Cf. Turner, supra note 25, at 282 (“Our dinner invitations, marriage proposals, and even business ventures certainly must be immune to at least some of the constitutional law that requires public actors to afford equal treatment, due process, and respect for all viewpoints.”). 80. Veno v. Meredith, 515 A.2d 571, 578-81 (Pa. Super. Ct. 1986) (rejecting on similar grounds a PPE claim by newspaper editor fired for publishing an article criticizing a judge); Martin v. Capital Cities Media, Inc., 511 A.2d 830, 843-45 (Pa. Super. Ct. 1986) (rejecting argument that free speech rights could form basis of a PPE claim against a private employer); Cisco v. United Parcel Servs., Inc., 476 A.2d 1340, 1344 (Pa. Super. Ct. 1984) (rejecting presumption of innocence-based PPE claim and stating that constitutional rights were not meant to be “superimposed onto” one’s “remaining life experiences”). 2014] COMPANY CONDUCT 959 tional provisions applied directly only to government conduct and not to disputes between private parties.81 Thus, the PPE claim did not apply because there had been no allegation of state action.82 Citing this line of cases, the Third Circuit (applying Pennsylvania law in a diversity case) declined to accept a PPE claim grounded, in part, on Fourth Amendment-based notions of privacy against a private employer, holding that the absence of state action was fatal to the use of constitutional principles in a wrongful discharge suit.83 Summarizing its view of the Pennsylvania case law, the Third Circuit criticized the use of constitution-inspired PPE causes of action, suggesting a certain level of skepticism to any further use of constitutional principles in future applications of the PPE.84 For similar reasons, the Third Circuit reasoned, state constitutional principles were also ineligible as evidence of public policy in evaluating a PPE claim.85 Pennsylvania is not alone. At one point, the Supreme Court of West Virginia had stated, with respect to free speech-based PPE claims, that “[t]he prevailing view among the majority of courts addressing the issue” was that absent state action, “state or federal constitutional free speech cannot . . . be the basis of a PPE in wrongful discharge claims.”86 This does not appear to be the majority view regarding free speech-based PPE claims today,87 and even West Virginia still allows theoretical consideration of constitutions in divining public policy under the PPE.88 But, a number of other states have explicitly rejected particular constitutional sources for the PPE in many instances, using language suggesting overall hostility to the transfer of constitutional policy norms to the private employment setting.89 81. Booth v. McDonnell Douglas Truck Servs., Inc., 585 A.2d 24, 28 (Pa. Super. Ct. 1991). 82. Id. 83. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 619 (3d Cir. 1992). 84. Id. at 618-20. 85. Id. at 620. 86. Tiernan v. Charleston Area Med. Ctr., Inc., 506 S.E.2d 578, 589 (W. Va. 1998). 87. See infra Part V.B.1. 88. See Wounaris v. W. Va. State Coll., 588 S.E.2d 406, 414 (W. Va. 2003) (noting the constitution as one of many sources for public policy for purposes of the PPE (citing Birthisel v. Tri-Cities Health Servs. Corp., 424 S.E.2d 606, 612 (W. Va. 1992))). 89. See Bruley v. Village Green Mgmt. Co., 592 F. Supp. 2d 1381, 1385 (M.D. Fla. 2008) (“Florida has no exception even where termination is founded on an employee’s exercise of constitutional rights.”); Deiters v. Home Depot U.S.A., Inc., 842 F. Supp. 1023, 102729 (M.D. Tenn. 1993) (declining to make the “open courts” provision of the Tennessee constitution a basis for wrongful discharge claims because it did not apply to private employers, and further stating that even if the provision did apply to private employers, the constitutional provision “does not clearly and unambiguously create a public policy which would prevent the discharge of at-will employees who sue their employers”); Hart v. Seven Resorts Inc., 947 P.2d 846, 850-51 (Ariz. Ct. App. 1997) (rejecting the right of privacy as an appropriate basis for the PPE because such a right “applies only to intrusions by the government or where there is state action”); Edmondson v. Shearer Lumber Prods., 75 P.3d 733, (Idaho 2003) (determining the constitutional right of free speech to be a source 960 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 In some instances, the reasoning supporting such a rejection seems superficial. Some courts simply note authority requiring state action for liability under the Constitution, and then reject PPE claims where there is no state action. For example, the Kentucky Supreme Court once rejected a “freedom of association” basis for a wrongful discharge claim, citing United Brotherhood of Carpenters and Joiners of America v. Scott90 for the proposition that the right to free association applies only as against government action.91 But that seems to beg the question. No one asserts that direct constitutional liability exists against private employers.92 The basis for liability is instead a common law cause of action which indisputably does regulate private action. The question is whether a constitutional right suggests a strongly held public policy which courts ought to uphold as against private employers under this common law claim. That question must be answered on some other basis besides the conclusion that a distinct constitutional claim would fail. In like manner, courts adjudicating PPE claims often draw upon statutory sources for public policy, even under circumstances in which the employer has no direct liability under the statute.93 This may be because the statutes in question are criminal and provide for no civil liability; or because they apply only to larger employers; or because the employee’s claim is precluded by statute of limitations concerns; or for other reasons.94 Nonetheless, courts rely on the statutes for the underlying public policy and then hold that the common law claim can be used to vindicate that public policy. The analysis is no different with respect to constitutional sources of public policy.95 of public policy when applied to state regulation only, and not in the context of private employment); McGarvey v. Key Prop. Mgmt., LLC, 211 P.3d 503 (Wyo. 2009) (rejecting free speech-based PPE claim while noting that no Wyoming case expressly endorsed application of Wyoming constitution to private entities). 90. 463 U.S. 825, 831-33 (1983). 91. Grzyb v. Evans, 700 S.W.2d 399, 402 (Ky. 1985). 92. But there are unusual instances in which a state constitution has been interpreted to restrict private action. See Kraslawsky v. Upper Deck Co., 65 Cal. Rptr. 2d 297, 301-03 (Cal. Ct. App. 1997) (state constitutional guarantee of the right to pursue and obtain privacy creates a right of action against private as well as government entities). Indeed, even the U.S. Constitution’s abolition of involuntary servitude restricts private actors. See U.S. CONST. amend. XIII. 93. See infra Part IV. 94. Id. 95. Even where a court has rejected constitutional provisions as a legitimate source of public policy in evaluating wrongful discharge claims, constitutional precedent may still inform the analysis. For example, after rejecting federal and state constitutional provisions as evidence of public policy, the Third Circuit analyzed the employee privacy claim under state tort law—but it used Supreme Court Fourth Amendment case law to evaluate the contours of the privacy interests at stake. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 621 n.10 (3d Cir. 1992). 2014] COMPANY CONDUCT 961 A better argument against the use of constitutional sources is the “slippery slope” concern. As the Wisconsin Supreme Court put it, giving courts the authority to scour constitutions for employerrestricting public policies would “open a Pandora’s box” of due process and equal protection arguments which would “eliminate any distinction between private and governmental employment.”96 However, this concern seems overblown. It is uncontroversial for courts to look to the entirety of common law doctrine and all statutes within the state as sources of public policy. This is a very deep well of potential public policies to draw upon in deciding whether to add to the list of protections afforded employees. In comparison the incremental increase in potential public policies, and thus potential extra employee protections, from allowing constitutional analysis would not seem to be that great. We would not be adding that much extra employee protection simply by allowing constitutional sources along with the already plentiful statutory and regulatory sources. This is particularly so where courts are circumspect about which constitutional rights they will draw upon, and how broadly or narrowly they apply them, as this Article advocates.97 On balance, while the distinction between public and private settings may justify some caution in drawing upon constitutional principles for PPE purposes, it does not justify wholesale exclusion. Constitutional principles are foundational. They often represent the most deeply held beliefs of a society, and enshrine our most cherished rights. Many of them are at least as important as the right to file a workers’ compensation claim, which almost all jurisdictions recognize as sufficiently important to form the basis of a PPE claim.98 Why would we not look to them when deciding what public policies are clear and substantial? The challenge is simply to decide when constitutional policies governing public entities are sufficiently apt analogies such that they can be logically related to a private setting. As one commentator put it in a different context, the question is “whether the values protected by declared rights are threatened by concentrated private power in a way fairly analogous to the threat presently or formerly posed by unlimited government power.”99 96. See Bushko v. Miller Brewing Co., 396 N.W.2d 167, 172 (Wis. 1986) (rejecting a free speech-based PPE claim). 97. See infra Part V (discussing these questions and making recommendations). 98. Novosel v. Nationwide Ins. Co., 721 F.2d 894, 899 (3d Cir. 1983) (making a similar observation). 99. See 1 JENNIFER FRIESEN, STATE CONSTITUTIONAL LAW: LITIGATING INDIVIDUAL RIGHTS, CLAIMS, AND DEFENSES § 9-2(b)(2) (3d ed. 2000). 962 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 B. State versus Federal Constitutions In determining the public policy underlying a PPE claim, some state courts make no distinction between federal and state constitutional sources.100 Others expressly reference both federal and state constitutions. For example, in outlining the elements of the PPE, the Supreme Court of Ohio has listed the existence of a “clear public policy . . . manifested in a state or federal constitution, statute or administrative regulation, or in the common law.”101 One of the broadest statements of sources of public policy lists, “among others:” our federal and state constitutions, our public statutes, our judicial decisions, the applicable principles of the common law, the acknowledged prevailing concepts of the federal and state governments relating to and affecting the safety, health, morals and general welfare of the people for whom government . . . is factually established. 102 On the other hand, a few courts have looked to state constitutions but not to the federal constitution. For example, the Supreme Court of Illinois referred specifically (and only) to the state constitution when listing potential sources for the public policy.103 Others take a more nuanced approach. For example, in Oklahoma, federal statutes, standing alone, cannot provide the public policy that triggers the exception, because the exception is geared toward state policy.104 But Oklahoma would not preclude the use of the PPE to protect an employee who reports the defrauding of a federal government program in violation of a federal statute, where such fraud also would be subject to criminal or civil penalties under Oklahoma law.105 Further, a federal constitutional provision can provide such policy guidance if it “prescribes a norm of conduct for the state.”106 This Oklahoma doctrine actually points the way toward the appropriate approach on this question. The better view is not to require that the policy be formulated by an agent of that state’s government, but rather to require simply that the public policy does indeed apply within that state, regardless of its original source. The PPE is a 100. See, e.g., Borse, 963 F.2d at 618-20 (rejecting both federal and state constitutional provisions as evidence of public policy for the PPE). 101. Dohme v. Eurand Am., Inc., 956 N.E.2d 825, 829 (Ohio 2011) (emphasis added). 102. Birthisel v. Tri-Cities Health Servs. Corp., 424 S.E.2d 606, 611 (W. Va. 1992) (quoting Allen v. Com. Cas. Ins. Co., 37 A.2d 37, 39 (N.J. 1944) (emphasis added)). 103. Turner v. Mem’l Med. Ctr., 911 N.E.2d 369, 374 (Ill. 2009) (quoting Palmateer v. Int’l Harvester Co., 421 N.E.2d 876, 878 (Ill. 1981)). 104. Darrow v. Integris Health, Inc., 176 P.3d 1204, 1212 (Okla. 2008). 105. Id. 106. Id. 2014] COMPANY CONDUCT 963 common law doctrine applied by state courts; in evaluating a PPE claim, it is only sensible to look to laws and policies which apply within that state. This approach suggests a distinction among different constitutional provisions as inspiration for a PPE claim. It would allow the use of only those individual rights from the federal constitution that have been “incorporated,” i.e., applied to the States through the Due Process Clause of the Fourteenth Amendment.107 C. Treating Private Action as State Action A separate ground for importing constitutional principles into PPE claims might be cases where the private action could be viewed legitimately as tantamount to state action. In constitutional law, there are well-recognized exceptions to the state action doctrine that allow courts to treat action by private entities as state action. In sum, courts may do so when (1) the private entity is engaging in a public function;108 (2) public and private entities are intertwined in a close relationship;109 or (3) government ratifies and adopts the action of the private entity.110 The best example of the “public function” exception is primary elections. Political parties run these elections, but they nonetheless engage in a public function while doing so. Courts have thus held they are bound by equal protection restrictions on discrimination.111 107. See McDonald v. City of Chicago, 130 S. Ct. 3020, 3042 (2010) (discussing the incorporation doctrine). The Supreme Court has held most of the individual rights guaranteed by the Bill of Rights to be “incorporated” and applicable to the States, although some have never been addressed by the Court. CHEMERINSKY, supra note 37, § 16.3 (discussing the “selective incorporation” doctrine). The Court has specifically declined to incorporate the Fifth Amendment right to a grand jury and the Seventh Amendment right to a jury trial in civil lawsuits. Branzburg v. Hayes, 408 U.S. 665, 687 (1972) (Fifth Amendment right to Grand Jury not incorporated); Minneapolis & St. Louis R.R. Co. v. Bombolis , 241 U.S. 211, 217 (1916) (Seventh Amendment right to civil jury trial not incorporated); see also McDonald, 130 S. Ct. at 3035 n.13 (providing the latest statement by the Court of the status of selective incorporation doctrine). Thus, even if the grand jury or civil jury trial rights could sensibly and feasibly be applied to private employers under the PPE, see infra Part V.A.3, they would be poor candidates for the PPE. 108. See, e.g., Terry v. Adams, 345 U.S. 461, 469-70 (1953) (finding state action where private political party ran primary election). 109. See, e.g., Burton v. Wilmington Parking Auth., 365 U.S. 715, 725 (1961) (finding that where government agency leased space to private parking authority, it created “interdependence” and “joint partnership” in the challenged discrimination sufficient to establish state action). 110. See, e.g., Shelley v. Kraemer, 334 U.S. 1, 18-19 (1948) (finding state action where court enforced racially restrictive covenant in private deed). 111. See, e.g., Terry, 345 U.S. at 469-70 (1953) (designating a private group’s running of a statewide primary election as state action for purposes of constitutional limitations on race discrimination); Smith v. Allwright, 321 U.S. 649, 663-65 (1944) (declaring a private political party’s racially discriminatory motives in conducting a primary election to be unconstitutional because it was operating under statutory authority of the state). 964 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 Courts also have found state action present under this category in older cases involving “company towns,” settlements owned and operated by a corporation but that functioned as municipalities for the employee residents, with the company maintaining streets, providing sanitation, and the like.112 The second category arose in Burton v. Wilmington Parking Authority, which involved a government agency that leased space to a private company running a parking lot.113 The Court noted that the government agency stood to profit from the racial discrimination being committed by the private company.114 Thus, the Court reasoned, the two entities were “interdependen[t],” with the government essentially a “joint participant” in the discrimination.115 State action was therefore present.116 The final category first arose in a case where a court was called upon to enforce a racially discriminatory restrictive covenant in a dispute between two private parties.117 The Court held that the trial court’s action to enforce the covenant amounted to ratification of the discrimination and thus state action.118 This line of authority may inform courts’ decisions as to when to use constitutional principles in enforcing the PPE. Where the private employer is engaging in a public function, as in a private prison, the argument may be stronger that it should afford its employees constitutional rights comparable to those enjoyed by public employees. Courts also might be more open to such arguments where the private employer is a monopoly, wielding the kind of power analogous to that of the government.119 Analogizing from the second category, the same 112. See, e.g., Marsh v. Alabama, 326 U.S. 501, 507-08 (1946) (enforcing First and Fourteenth Amendment rights for a woman distributing religious material in a companyowned suburb because it was accessible to the public and functioned as any other town within the community); cf. Citizens to End Animal Suffering & Exploitation, Inc. v. Faneuil Hall Marketplace, Inc., 745 F. Supp. 65, (D. Mass. 1990) (holding that a private corporation could not regulate free speech activities on land it had leased from city because the land was a public forum for public use). 113. 365 U.S. 715 (1961). 114. Id. at 725. 115. Id. 116. Id. The continuing vitality of Burton is under serious question, and its holding may be sharply limited to its facts or else to the specific situation of private commercial leasing of government property. Lebron v. Nat’l R.R. Passenger Corp., 513 U.S. 374, 409 (1995) (citing L. TRIBE, AMERICAN CONSTITUTIONAL LAW § 18-3, at 1701 n.13 (2d ed. 1988)). 117. Shelley v. Kraemer, 334 U.S. 1 (1948). 118. Id. at 18-20. 119. Turner, supra note 25, at 292-93, 317 (2013) (arguing that private action should be treated as state action where the private entity enjoys a monopoly). This argument makes sense from a market perspective. Where an employer effectively holds a monopoly within a particular job market, employees have markedly limited ability to seek employment with a competitor if they consider employee policies too rights-restrictive. See Gay Law Students Ass'n v. Pac. Tel. & Tel. Co., 595 P.2d 592, 595 (Cal. 1979) (making this observation). 2014] COMPANY CONDUCT 965 result may be obtained if the private employer is a government contractor whose operations are closely intertwined with those of government, as are some military contractors engaged in combat operations with U.S. armed forces.120 Finally, where the government is asked to enforce a problematic rule of a private employer—for example, an overly speech- or privacy-restrictive rule that provides not only for termination, but also allows the employer to claim some reimbursement of recently accrued business expenses from the employee—courts may be less willing to affirmatively enforce such provisions if the employer sues the employee, and be less willing to countenance the discharge in the first place if called upon by the employer to do so. IV. THE RELEVANCE OF EXISTING STATUTORY REMEDIES In evaluating the eligibility of constitutional provisions as sources for the public policy behind the application of the PPE, one issue bound to emerge is the applicability (if any) of statutory remedies for the kind of wrongful discharge at issue. This is a double-edged sword. On the one hand, the existence of relevant statutes covering the same or similar types of alleged wrongful discharge provides powerful evidence that the related constitutional provision does indeed express a strongly held, substantial, and clear public policy. On the other hand, the existence of statutory remedies might suggest that the PPE would be unnecessary.121 However, there are a number of instances in which a PPE claim might be needed, even where a statutory claim exists covering the same general grounds for termination. For example, the availability of the PPE drawing upon constitutional principles is a relevant concern in those cases where the employee is precluded from pursuing a statutory claim by missing a limitations period,122 failing to exhaust administrative remedies,123 or working for an employer with too few 120. Of course, one rationale for using such private security forces is their ability to act without constitutional restraints. But that very ability has become highly controversial. See Earl. F. Martin, America’s Anti-Standing Army Tradition and the Separate Community Doctrine, 76 MISS. L.J. 135, 135 (2006) (analyzing the “separate community doctrine” to highlight the uncertain balance between civilian society and the armed forces). 121. Cf. Borden v. Johnson, 395 S.E.2d 628, 630 (Ga. Ct. App. 1990) (refusing to recognize the PPE for dismissal based on gender or pregnancy due to a lack of state or federal statutes specifically addressing such rights). 122. Under Title VII of the Civil Rights Act of 1964 (“Title VII”), employees must file an EEOC complaint within 180 days of discovering the alleged discrimination. 42 U.S.C. § 2000e5(e) (2012). Once the EEOC either fails to respond within 180 days or issues a “right to sue” letter, the employee then must file a complaint in federal court within ninety days. § 2000e-5(f). 123. Rojo v. Kliger, 801 P.2d 373, 389 (Cal. 1990) (allowing PPE claim to proceed where plaintiff was barred from analogous statutory claim for failing to exhaust administrative remedies); see also Midgett v. Sackett-Chicago, Inc., 473 N.E.2d 1280, 1285 (Ill. 1984) (col- 966 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 employees to trigger coverage under the statute.124 Yet another example would be where the common law claim provides for needed remedies that are not provided for under the corresponding statute.125 This latter problem of employer size may be a relatively common occurrence, since most United States employers have five or fewer employees126 and thus would be outside the scope of many federal and state employment antidiscrimination statutes. Indeed, state courts have recognized PPE claims in exactly such circumstances.127 But, there is still significant variation among the states as to whether PPE claims should go forward against employers too small to be covered by the applicable statute, with some states rejecting such PPE claims.128 Statute of limitations issues are another salient example. Limitation periods for PPE claims vary. Generally, limitation periods for common law tort claims range from one to three years.129 States have lective bargaining agreement requirement that employees go through internal grievance procedure did not bar PPE claim, since the latter sounded in tort and not contract). 124. See § 2000e(b) (defining an employer for purposes of Title VII as one with fifteen or more employees); Thurdin v. SEI Bos., LLC, 895 N.E.2d 446, 448-49, 455, 455 n.18 (Mass. 2008) (discussing alternate liability theory of, inter alia, PPE where state pregnancy antidiscrimination statute applied only to employers with more than six employees); Roberts v. Dudley, 993 P.2d 901, 909-11 (Wash. 2000) (allowing PPE claim based on sex discrimination to proceed against small business where state sex antidiscrimination statute exempted small employers). 125. Even if a PPE claim was necessary to assist a particular employee plaintiff for one of these reasons, it might suffice for the court to draw upon the existing statutes for inspiration as to the nature of the clear public policy, avoiding reference to constitutional principles as unnecessary. But because there is no good reason for treating constitutional sources as somehow inferior to statutory ones in divining public policy, see supra Part III.A., it seems unwise for a court to wear such blinders. 126. According to 2012 Census Bureau estimates, in nine of the ten most populous states, the majority of employers have fewer than five employees. See Firm Size Data, U.S. SMALL BUS. ADMIN., http://www.sba.gov/advocacy/849/12162 (last visited Feb. 16, 2014) (spreadsheet based on census data for California, Texas, New York, Florida, Illinois, Pennsylvania, Ohio, Georgia, Michigan, and North Carolina). 127. See, e.g., Thurdin v. SEI Bos., LLC, 895 N.E.2d 446, 448-449 n.18 (Mass. 2008) (discussing alternative liability theory of, inter alia, PPE where state pregnancy antidiscrimination statute applied only to employers with more than six employees); Badih v. Myers, 43 Cal. Rptr. 2d 229 (Cal. Dist. Ct. App. 1995) (recognizing PPE claim involving pregnancy discrimination, even though employer had fewer than the five individuals required to be covered by the analogous anti-discrimination statute); Molesworth v. Brandon, 672 A.2d 608 (Md. 1996) (ruling in like manner regarding sex discrimination); Collins v. Rizkana, 652 N.E.2d 653 (Ohio 1995) (same, for sexual harassment PPE claim); Roberts, 993 P.2d at 901 (same, for pregnancy discrimination); Williamson v. Greene, 490 S.E.2d 23 (W. Va. 1997) (same, for sex discrimination and harassment). 128. See Thibodeau v. Design Grp. One Architects, LLC, 802 A.2d 731, 745-46 (Conn. 2002) (declining to find PPE extended to pregnancy-related discrimination by employers with fewer than the three employees required by statute, and explicitly stating that common law doctrines could not trump such statutory exemptions); Weaver v. Harpster, 975 A.2d 555, 567 (Pa. 2009) (declining to find employee’s sex discrimination claims actionable under PPE because workplace employed fewer than four employees, the amount required to invoke remedy under Pennsylvania Human Relations Act). 129. PERRITT, supra note 32, § 9.15. 2014] COMPANY CONDUCT 967 adopted a similar range for PPE claims, applying limitation periods of at least one year, and often up to three years.130 Because some state and federal antidiscrimination statutes involve requirements that the complainant file a claim in a shorter time period,131 there may be situations in which an employee victim of discrimination, who otherwise might have pursued a typical discrimination claim, may need to pursue a PPE claim instead.132 Further, states vary as to whether the limitation period begins to run when the termination actually occurs, when the employee receives notice of termination, or at the moment the employer decides to terminate.133 Again, where this deviates from the rule regarding an analogous statutory claim, a PPE claim may be viable where the statutory claim may no longer be viable. Thus, in a few jurisdictions courts have allowed a common law action based on public policy to proceed, even if the limitations period of the relevant employment antidiscrimination statute has expired.134 130. See, e.g., VA. CODE ANN. § 8.01-248 (2013) (two years for Virginia); Kamen v. Int’l Bhd. of Elec. Workers, 505 F. Supp. 2d 66, 78 (D.C. Cir. 2007) (three years for D.C., under the “catch-all” statute of limitations); Funk v. Sperry Corp., 842 F.2d 1129, 1133 (9th Cir. 1988) (California PPE limitation period of one year); Holien v. Sears, Roebuck & Co., 689 P.2d 1292, 1301 (Or. 1984) (two years for Oregon); Barnett v. Sequim Valley Ranch, LLC, 302 P.3d 500, 505 (Wash. Ct. App. 2013) (three years for Washington). 131. See, e.g., 29 U.S.C. § 160(b) (2012) (six months for unfair labor practice claims under the NLRA); 29 U.S.C. § 626(d) (2006) (same, for ADEA claims); 42 U.S.C. § 2000e5(e) (2012) (depending on state, federal Title VII claims must be filed within six to ten months); OHIO REV. CODE ANN. § 4112.02(N) (West 2013) (six months to file age discrimination claim); TENN. CODE ANN. § 8-50-103 (West 2009) (six months to file employment discrimination claim). 132. For some types of PPE claims, though, this may not matter. When a federal claim does not have an express statute of limitation, federal courts adopt the statute of limitations of an analogous state law claim, unless doing so would interfere with the substantive policy behind the federal claim. DelCostello v. Int’l Bhd. of Teamsters, 462 U.S. 151, 158 (1983). But for all federal statutory causes of action-based laws passed after 1990, Congress has adopted a “catch-all” limitations period of four years. 28 U.S.C. § 1658 (2012). 133. Compare Stupek v. Wyle Labs. Corp., 963 P.2d 678, 682 (Or. 1998) (determining that limitation began to run when termination became effective), and Lorenz v. Martin Marietta Corp., 802 P.2d 1146, 1149 (Colo. Ct. App. 1990) (same), with Huff v. Great W. Seed Co., 885 P.2d 723, 726 (Or. Ct. App. 1994) (finding that one-year statute of limitations began to run when plaintiff found out her dismissal was related to her workers’ compensation claim, not the date of actual termination). 134. See, e.g., Wendeln v. Beatrice Manor, Inc., 712 N.W.2d 226, 238 (Neb. 2006) (concluding that public policy-based retaliatory discharge claim based in tort was governed by the general four-year statute of limitations period found in NEB. REV. STAT. § 25-207 (2004) rather than employment discrimination claim under the NFEPA); Klopfenstein v. NK Parts Indus., Inc., 870 N.E.2d 741, 747 (Ohio Ct. App. 2007) (finding at-will employee’s independent claim for wrongful discharge was governed by general fouryear statute of limitations rather than one-year statute of limitations for claims brought under the workers’ compensation anti-retaliation statute); Pytlinski v. Brocar Prods., Inc., 760 N.E.2d 385, 388-89 (Ohio 2002) (applying general four-year limitations period to an independent cause of action based in common law for violation of public policy where employee’s OSHA complaint was otherwise barred by the 180-day limitations period of the Ohio Whistleblower Act). 968 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 Similarly, a PPE claim may be relevant despite the existence of an analogous statutory claim, because the two claims may involve different potential remedies.135 When an analogous statutory cause of action allows for administrative remedies, courts have still recognized an independent cause of action for the public policy claim.136 Of course, even if there are procedural or remedial reasons why an employee needs to bring a PPE claim, despite the existence of a statutory claim protecting the same type of employee behavior, the jurisdiction may not be willing to allow the PPE claim to proceed. After all, there are reasons why jurisdictions bar antidiscrimination statutes’ coverage of firms with fewer than the minimum number of employees. One is to limit the drain on enforcement resources of the courts, the EEOC, and similar state enforcement agencies.137 Another is to limit the hardship on small “mom and pop” operations, which may be more vulnerable to the burdens of regulation and litigation.138 Although the first concern does not really apply with respect to judicial enforcement of a common law PPE claim, the second policy rationale does. Similarly, there are reasons why we have statutes of limitations: ensuring certainty and finality, saving defendants from abusive litigation, and saving courts from adjudicating stale claims with fading evidence.139 These concerns simply do not go away when the plaintiff pursues a common law PPE claim. Title VII, like many state antidiscrimination statutes, requires administrative procedures for similar logistical, screening, and judicial economy reasons.140 To the extent 135. See Roberts v. Dudley, 993 P.2d 901, 909-11 (Wash. 2000) (en banc) (holding that statutory claim, but not wrongful discharge claim, provided for administrative proceedings and potential attorney’s fee remedies). 136. See, e.g., Holien v. Sears, Roebuck & Co., 689 P.2d 1292, 1303-04 (Or. 1984) (determining a female employee was entitled to common law tort damages based on sexual harassment because the equitable remedies available through employment antidiscrimination statute were inadequate to compensate plaintiff for the personal nature of her injuries). 137. See LARSON, supra note 29, § 174.06[3] (discussing divergence of court decisions on this question, and reasons for and against allowing PPE claim to proceed). 138. Id.; see also Thibodeau v. Design Grp. One Architects, LLC, 802 A.2d 731, 740-41 (Conn. 2002) (affirming that the primary purpose of exempting small employers from employment discrimination claims is to avoid subjecting such employers to the significant financial burdens of litigation). Aside from regulatory burden, there is also the more abstract libertarian concern regarding such “mom and pop” firms, which often involve a more intimate setting raising greater “freedom of association” issues. See infra Part V.B.1. 139. See John R. Sand & Gravel Co. v. United States, 552 U.S. 130, 133 (2008) (stating that the primary purpose of most statutes of limitations is “to protect defendants against stale or unduly delayed claims”). 140. See Title VII, 42 U.S.C. § 2000e-5 (2012); see also, e.g., ARIZ. REV. STAT. ANN. § 411463 (2013) (prohibiting employers from hiring, segregating, or classifying employees on the basis of “race, color, religion, sex, age or national origin or on the basis of disability”); NEB. REV. STAT. § 48-1104(1) (2012) (declaring discrimination on the basis of “race, color, religion, sex, disability, marital status, or national origin” an unlawful employment practice); OR. REV. STAT. ANN. § 659A.030 (2013) (stating it unlawful to “refuse to hire or em- 2014] COMPANY CONDUCT 969 that the coverage, time limitation, and administrative exhaustion provisions of these statutes leave “gaps” that are conscious policy determinations rather than oversights, there may be sound policy reasons for rejecting PPE claims in such situations.141 Thus, where the same type of employee behavior may be protected by both claims, courts may prefer to hold that the statutory remedy renders unnecessary the common law claim, both to show deference to the legislative branch and also to honor the common law presumption of at-will employment. A court could thus hold that the statute exhaustively outlines the manner in which such employee rights are vindicated.142 However, such seeming “preemption” appears not to be the majority approach. Those courts that have addressed the issue have tended to say that the existence of a statutory remedy protecting the same type of employee conduct does not bar a PPE claim, at least where that statute is not the sole source for the clear public policy the court derives in recognizing a PPE claim under those facts.143 Instead, courts will look to see if there is any indication of legislative intent that the statutory remedy, or remedies, provided were designed to replace, rather than supplement, preexisting common law remedies like the PPE. In the absence of such indication, the common law cause of action continues.144 Therefore, where, in a given case, the statutory remedy is unavailable due to some procedural or coverage ploy . . . bar or discharge” any individual from employment on the basis of “race, color, religion, sex, sexual orientation, national origin, marital status or age”). 141. For an excellent discussion of these issues, see LARSON, supra note 29, §§ 174.06[2]-.06[4]. 142. See Parlato v. Abbott Labs., 850 F.2d 203, 206-07 (4th Cir. 1988) (dismissing plaintiff’s common law claims for wrongful discharge based on race and age because statutory remedy already existed); Rupp v. Purolator Courier Corp., 790 F. Supp. 1069, 1073 (D. Kan. 1992) (Title VII and the Kansas Act Against Discrimination provided exclusive remedies for employee's common-law claims of retaliation, constructive discharge and whistleblowing); Northrup v. Farmland Indus., 372 N.W.2d 193, 197 (Iowa 1985) (stating that “the procedure under the civil rights act is exclusive, and a claimant asserting a discriminatory practice must pursue the remedy provided by the act”). 143. Phillips v. J.P. Stevens & Co., Inc., 827 F. Supp. 349, 352-53 (M.D.N.C. 1993) (recognizing that the availability of statutory remedy does not affect the availability of an alternative wrongful discharge claim); Collins v. Rizkana, 652 N.E.2d 653, 660 (Ohio 1995) (noting that a statute will not preempt common law remedies unless it is the sole source of the public policy); Atkinson v. Halliburton Co., 905 P.2d 772, 774 (Okla. 1995) (quoting Tate v. Browning-Ferris, Inc., 833 P.2d 1218, 1226 (Okla. 1992)) (“[W]here the common law gives a remedy, and another is provided by statute, the latter is merely cumulative, unless the statute declares it to be exclusive”). 144. See Collins, 652 N.E.2d at 660; Atkinson, 905 P.2d at 774. Of course, the legislature can also make express its intent to allow a parallel common law cause of action continued viability. See, e.g., N.J. STAT. ANN. § 34:19-14 (West 2013) (allowing plaintiff to choose between suing under statute or under common law public policy claim). 970 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 problem, the common law PPE tort can fill in the gap.145 This result can also be obtained where the analogous statutory claim is based on a federal statute.146 A number of courts taking this approach have tended to allow PPE claims to go forward despite parallel statutory remedies. For example, the Kentucky Supreme Court recently acknowledged that a statute protecting employees’ rights to bear arms explicitly recognized a civil cause of action, yet it also held that an employer’s violation of the statute violated a wider public policy, thus creating a PPE cause of action.147 Indeed, the Supreme Court of Wisconsin has explained that in deciding whether a clear public policy exists, courts should not focus on the “literal language” of a statutory provision or the circumstances it describes but should examine whether the employer “contravene[d] the spirit as well as the letter of a constitutional, statutory, or administrative provision.”148 Thus, courts have allowed PPE claims to go forward despite the existence of a comparable statutory claim.149 The above approaches—leaning away from a general “preemption” rule where statutory language exists, and declining to hold that the absence of such statutory language definitively excludes the recognition of a common law PPE claim—make sense, for reasons similar to 145. See, e.g., Thibodeau v. Design Grp. One Architects, LLC, 802 A.2d 731, 733 (Conn. 2002) (recognizing a PPE where a female employee was fired for missing work due to pregnancy even though she was one of two employees and the statutory remedy applied only to employers with three or more employees); Mitchell v. Univ. of Ky., 366 S.W.3d 895, 903 (Ky. 2012) (allowing claim for wrongful discharge based on gun ownership despite analogous statutory claim). 146. Wheeler v. Caterpillar Tractor Co., 485 N.E.2d 372, 375-76 (Ill. 1985) (holding that the federal nuclear safety statute with whistleblower protection provision did not preempt state law PPE claim). 147. Mitchell, 366 S.W.3d at 903. 148. Strozinsky v. Sch. Dist. of Brown Deer, 614 N.W.2d 443, 455 (Wis. 2000) (quotation marks omitted). 149. Phillips v. J.P. Stevens & Co., Inc., 827 F. Supp. 349, 352-53 (M.D.N.C. 1993) (recognizing that the availability of statutory remedy does not affect the availability of an alternative wrongful discharge claim); Collins v. Rizkana, 652 N.E.2d 653, 660 (Ohio 1995) (noting that a statute will not preempt common law remedies unless it is the sole source of the public policy); Atkinson, 905 P.2d at 774 (quoting Tate v. Browning-Ferris, Inc., 833 P.2d 1218, 1226 (Okla. 1992)) (“[W]here the common law gives a remedy, and another is provided by statute, the latter is merely cumulative, unless the statute declares it to be exclusive.”). The converse is also true: the absence of statutory language barring the kind of conduct at issue does not necessarily preclude recognition of the PPE. Though a court could take an expressio unius est exclusio alterius approach and infer a decision to exclude other common law remedies where a statutory remedy exists, courts do not seem to do so. Payne v. Rozendaal, 520 A.2d 586, 588 (Vt. 1986) (recognizing PPE cause of action for age discrimination even though termination occurred prior to the passage of state legislation barring such discrimination). This approach is sensible. At bottom, the question is a straightforward one of statutory construction. Sometimes the legislature intended to “preempt” common law causes of action, and sometimes it did not. Courts can, of course, use tools of statutory construction to divine legislative intent 2014] COMPANY CONDUCT 971 the continued recognition of common law causes of action in the first place. The legislature cannot anticipate all potential situations when drafting statutory language. Case-by-case, incremental development of legal doctrine is useful for that reason and also because it provides the flexibility needed for adapting older principles to new situations. These new situations emerge constantly, and the legislature cannot always keep up. Such judicial latitude is nonetheless consistent with the general preference for having the legislature make the kinds of policy decisions involved in formulating a PPE.150 Where the legislature intends a statutory remedy to be exhaustive and exclusive of common law remedies, it need only say so explicitly to prevent judicial overreach. Such language effectively preempts otherwise applicable common law causes of action.151 The legislature also can assert such preeminence after the fact: when a court applies an overly broad PPE, the legislature may legislatively overrule the decision with proper preemption language.152 Also, recognition of PPE claims based in whole or in significant part on constitutional principles may be especially appropriate. After all, constitutional principles are foundational. They are designed to supersede statutory and regulatory principles. And by its very na150. See, e.g., Borden v. Johnson, 395 S.E.2d 628, 629 (Ga. Ct. App. 1990) (discussing the court’s precedent resting on the principle that the legislature is the body most qualified to set public policy for purposes of interpreting the PPE); Horn v. N.Y. Times, 790 N.E.2d 753, 756-57 (N.Y. 2003) (same). 151. See, e.g., ARIZ. REV. STAT. ANN § 23-1501B (West 2012) (remedies provided for in statutes creating liability for wrongful discharge at the sole and exclusive remedies for vindicating any “public policy . . . arising out of the statute”). 152. Analogizing once again from constitutional principles, courts can also find “implied preemption” in some circumstances. Where the state has so pervasively regulated in an area to create an inference that it intended to “cover the field,” courts may decide that the existence of statutory remedies for a given situation may indeed crowd out a PPE claim. Similarly, where the recognition of a PPE claim would stand as a substantial “obstacle” to the fulfillment of the legislature’s underlying policy in an area, courts may infer a different category of implied preemption. See Arizona v. United States, 132 S. Ct. 2492, 2502-03 (2012) (describing “field” and “obstacle” preemption). For the reasons stated immediately above, these kinds of “implied preemptions” of PPE claims should not be the norm. Nor do they seem to be the existing norm, according to the case law. See supra notes 143-149 and accompanying text. The mere existence of a statutory remedy based on a comparable ground for termination need not create a negative inference of an intent to have such ground be the sole remedy. The law is filled with examples of parallel statutory and common law remedies, and having alternate theories of liability can serve a salutary purpose. Nonetheless, there may indeed be especially compelling occasions where legislative history, statutory purpose, or the overall structure of the statutory scheme in a given state evince a legislative purpose to crowd out all common law claims, or at least PPE claims, even in the absence of express preemption language in the statutes. Allowing courts the ability to recognize such “implied preemption” provides needed flexibility. It also provides adequate deference to legislative prerogatives, effectively rebutting criticisms that recognition of a PPE cause of action parallel to an analogous statutory remedy represents judicial usurpation. 972 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 ture, PPE liability exists only when the public policy at issue is both clear and substantial. If any public policy deserves vindication even when the facts place it in a “gap” within the statutory framework, it would be a policy that is clear, substantial, and foundational. In sum, the existence of statutory remedies for comparable employer actions involving similar public policies may or may not warrant precluding a supplemental PPE claim. Reasonable arguments exist on both sides. Resolution of the question should most appropriately turn on the specifics of the intent of the legislature which passed the statute in question: whether it intended to supplant or supplement common law remedies.153 But at least where such remedies do not “crowd out” the PPE, courts should still be able to look to constitutional as well as statutory sources of authority. V. SPECIFIC CONSTITUTIONAL PROVISIONS AS CANDIDATES FOR THE PPE If constitutional provisions can indeed inform a court’s analysis of the prevailing public policy under the PPE, which types of constitutional provisions can most properly fill that function? Are there any constitutional doctrines that are particularly appropriate, or inappropriate, for this role?154 To begin to answer this question, this Article uses provisions of the U.S. Constitution as examples, keeping in mind that state constitutions often have analogous provisions.155 153. See supra note 144 and accompanying text. 154. One overarching consideration might be the constitutional standard of review applied when evaluating alleged deprivations of a specific constitutional right. Obviously, the higher the standard of review, the more important the right, and therefore, the stronger the employee’s argument for the PPE. Most constitutional claims of alleged deprivations of individual rights are evaluated using (from most lenient to most exacting) “rational basis” review, “intermediate scrutiny,” or “strict scrutiny.” 3 RONALD D. ROTUNDA & JOHN E. NOWAK, TREATISE ON CONSTITUTIONAL LAW: SUBSTANCE AND PROCEDURE § 18.3(a)(v) (4th ed. 2008). In most of the examples considered infra Parts V.B-C, as potential candidates for the PPE, the applicable standard is either “strict scrutiny,” e.g., free speech, or “intermediate scrutiny,” e.g., gender discrimination. See United States v. Virginia, 518 U.S. 515, 570 (1996) (Scalia, J., dissenting) (noting that the Court applies intermediate scrutiny in gender discrimination cases); Perry Educ. Ass’n v. Perry Local Educators’ Ass’n, 460 U.S. 37, 45 (1983) (“For the state to enforce a content-based exclusion it must show that its regulation is necessary to serve a compelling state interest and that it is narrowly drawn to achieve that end.” (citing Carey v. Brown, 447 U.S. 455, 461 (1980)). In a few cases, the standard of review is outside the traditional three tiers of constitutional review (abortion) or still undefined (the Second Amendment). See McDonald v. City of Chicago, 130 S. Ct. 3020, 3046-48 (2010) (applying individual Second Amendment right to bear arms to the states but failing to specify a particular standard of review); Planned Parenthood of Se. Pa. v. Casey, 505 U.S. 833, 869 (1992) (applying unique “undue burden” standard for abortion rights). 155. See, e.g., W. VA. CONST. art. III, § 7 (“No law abridging the freedom of speech, or of the press, shall be passed.”). 2014] COMPANY CONDUCT 973 A. Provisions that Should Not Form the Basis of a PPE Claim 1. “Structural” Constitutional Doctrines There are certain types of constitutionally based policies which are obviously inappropriate sources for the PPE. Some are structural policies that do not implicate individual rights and would thus afford no basis in drawing an analogy with respect to the interests of an individual employee fired from her job. For example, the doctrine of separation of powers is a well-respected, longstanding policy that is arguably both substantial and clear.156 But no terminated employee could plausibly claim her termination violated this policy. The same is true with respect to the doctrine of federalism. 2. Restrictions Uniquely Focused on Government Similarly, inherent in Establishment Clause doctrine is the idea that it is only the government, not private entities that may not endorse religion.157 While as a legal matter, all federal constitutional provisions restrict only government action, the Establishment Clause, by its very nature, focuses uniquely on government action. Thus, the doctrine stands in contrast to constitutional provisions guaranteeing individual rights of privacy, free speech, or nondiscrimination, all of which can easily be analogized to a private setting. True, one could imagine situations in which a terminated employee might coherently invoke the values affirmed by this Clause: say, a Jewish employee fired for objecting to a “Keep Christ in Christmas” sign outside a workplace, to printing Christian Bible verses on all 156. Actually, while the existence of a separation of powers doctrine is clear, its contours are not. See ROTUNDA & NOWAK, supra note 154, § 3.12(a) (describing the concept of separation of powers as one that evades “precise legal definition” and often provides nebulous solutions to intra-governmental disputes); see also Martin H. Redish & Elizabeth J. Cisar, “If Angels Were to Govern”: The Need for Pragmatic Formalism in Separation of Powers Theory, 41 DUKE L.J. 449, 450 (1991) (characterizing the modern court’s treatment of the doctrine as “something of a split personality,” seemingly wavering from strict and “formalistic” to the use of a lenient, “functional” approach). The uncertain state of the law in this area is beyond the scope of this piece. 157. See Bd. of Educ. of Westside Cmty. Schs. v. Mergens, 496 U.S. 226, 250 (1990) (explaining that: (1) the Establishment Clause forbids only government speech endorsing religion, while private speech endorsing religion is actually constitutionally protected; and (2) that “there is a crucial difference between government speech endorsing religion, which the Establishment Clause forbids, and private speech endorsing religion, which the Free Speech and Free Exercise Clauses protect”); Cooper v. U.S. Postal Serv., 577 F.3d 479, 484 (2d Cir. 2009) (affirming an Establishment Clause violation only where religious material was displayed on postal units serving a public function, but declaring the private business surrounding in which the units operated free from such restrictions); Ams. United for Separation of Church & St. v. City of Grand Rapids, 980 F.2d 1538, 1553 (6th Cir. 1992) (holding that a private organization’s menorah display in a public forum did not constitute an endorsement of religion for purposes of Establishment Clause restrictions). 974 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 paychecks, or to holding weekly Christian evangelical rallies on employer premises. Indeed, at a certain point, such situations might trigger employer liability for religious harassment under Title VII or analogous state antidiscrimination statutes.158 But applying a “no endorsement of religion” restriction on a private employer seems overly intrusive. Indeed, a court order preventing an employer from endorsing religion would likely violate the employer’s rights under the Free Speech and Free Exercise Clauses.159 Certainly, one might have legitimate concerns about an abusive employer coercing employees into engaging in unwelcome religious observances or preventing employees from engaging in their own non-disruptive religious practices. Can the employer require its Jewish employee to attend Christian services, make him sport a “Keep Christ in Christmas” button, or prevent him from wearing a yarmulke? But such concerns can be addressed adequately by reliance on the Free Exercise Clause, discussed below, which is indeed designed to protect individual rights.160 Thus, the Establishment Clause makes a poor candidate for a source of public policy underlying a PPE claim. For the same reason, the Fifth Amendment Takings Clause guarantee of “just compensation” also seems an unlikely source for policy under the PPE. It clearly focuses uniquely on the responsibility of government to reimburse private parties for “takings” by that government. Disputes under the Clause typically arise in cases involving eminent domain, a doctrine uniquely applicable to the right of the government to take private property for public uses.161 Moreover, where it is a private employer who has engaged in some form of analogous “taking,” a common law PPE claim is entirely superfluous. A more mundane common law claim in contract, property, or tort (e.g., conversion, tortious damage to property) will be a far more straightforward path to just compensation. 158. See EEOC v. Townley Eng’g & Mfg. Co., 859 F.2d 610, 620-21 (9th Cir. 1988) (recognizing the ability of employers to express themselves in the workplace but distinguishing this ability from coercing employees to conform with conflicting religious convictions); Thomas C. Berg, Religious Speech in the Workplace: Harassment or Protected Speech?, 22 HARV. J.L. & PUB. POL'Y 959, 1002 (1999) (“[W]hen an employer encourages a worker to attend church, the worker is likely to feel more pressure to do so than if a co-worker urged it. These activities, then, are quite likely to be prima facie covered by Title VII or analogous state anti-harassment statutes.”). 159. Mergens, 496 U.S. at 250 (“[T]here is a crucial difference between government speech endorsing religion, which the Establishment Clause forbids, and private speech endorsing religion, which the Free Speech and Free Exercise Clauses protect.”). 160. See CHEMERINSKY, supra note 37, § 12.1.1 (stating that the Free Exercise Clause “clearly safeguards individual liberty” while the Establishment Clause “seems directed at the government”). 161. Armstrong v. United States, 364 U.S. 40, 49 (1960) (describing the aim of the Takings Clause as preventing the government "from forcing some people alone to bear public burdens which, in all fairness and justice, should be borne by the public as a whole”). 2014] COMPANY CONDUCT 975 If, for example, an employer required employees to contribute their own money, property, or uncompensated services toward the employer’s enterprise, or toward the employer’s own pockets, without compensation, one could plausibly consider this a deduction from the employee’s pay, one for which there is either no liability or liability in contract, property, or tort. An employee fired for protesting such harsh contractual terms would have either no PPE remedy or else a remedy analyzable under Free Speech principles.162 As an example of the latter, consider an employee terminated for reporting or protesting “wage theft;”163 if she has a PPE claim at all, it would seem to lie better within a whistleblower theory than under some sort of analogy to a “taking.” At least one court has explicitly distinguished constitutional provisions which by their very nature apply only to government action. For example, in Booth v. McDonnell Douglas Truck Services, Inc., the Pennsylvania Superior Court rejected a wrongful discharge claim based on a provision of the state constitution prohibiting any “laws which impair the obligations of contracts.”164 The court specifically emphasized that by its plain terms, the constitutional provision bars only the passage of a “law” impairing contract rights; thus, since the case involved no allegation of state action, the constitutional provision did not apply.165 3. Due Process/Criminal Procedure Safeguards Procedural safeguards guaranteed by the Bill of Rights might conceivably form the basis of a PPE claim, most likely because the employer failed to provide an analogous version of them in any investigation of employee misconduct. But it is unreasonable to expect that every private employer provide every employee charged with jobrelated misconduct the full panoply of procedural protections guaranteed by the Bill of Rights. In some cases, this is obvious. For example, as applied to a private employer, the Sixth Amendment right to a trial by jury would seem to be either inherently inapplicable, overly burdensome, or both. Courts hardly could be expected to require firms to assemble “juries” of fellow employees to settle disputed claims of employee misconduct. 162. See infra Part V.B.1. 163. “Wage theft” occurs when an employer unlawfully “deprives a worker of legally mandated wages,” either by not paying proper overtime compensation, paying less than what the employee deserves, or not paying the employee at all. KIM BOBO, WAGE THEFT IN AMERICA 6 (2009); see also Barbosa v. Impco Techs., Inc., 101 Cal. Rptr. 3d 923, 927 (Cal. Ct. App. 2009) (qualifying an employer’s duty to pay overtime wages as a “well-established fundamental public policy affecting the broad public interest”). 164. 585 A.2d 24, 28 (Pa. Super. Ct. 1991) (citing PA. CONST. art. I, § 17). 165. Id. 976 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 Similarly inapplicable and/or unduly burdensome are the rights to a speedy trial, a public trial, and a trial with a proper venue and jurisdiction, as well as the rights to counsel and compulsory process in one’s defense.166 The right to a grand jury and a jury trial in civil lawsuits are inapt sources of policy for similar reasons and for the additional reason that they do not apply to state governments.167 In other cases, the inapplicability of traditional criminal procedure safeguards is less obvious and perhaps less convincing; for example, a Pennsylvania court has rejected a PPE claim based on the right of an accused’s presumption of innocence.168 However, there is no shortage of PPE cases protecting employees discharged for completing jury service.169 Most of these cases rely on statutory provisions requiring persons to perform jury service and protecting those who do from adverse employment action.170 However, at least one court has based this PPE claim on the constitutional right to a jury trial.171 To the extent courts can draw upon the constitutional basis of the jury trial right to underscore the importance of protecting employees’ ability to perform jury service free from retaliation, such use of that constitutional provision is certainly appropriate and uncontroversial. But given that jury service is both required by statute and protected from retaliation by statute in virtually all jurisdictions, the use of this constitutional provision is unnecessary as a practical matter. The Fifth Amendment’s privilege against self-incrimination should likely be on this same “ineligible” side of the line, for a somewhat distinct reason. Arguably, it could apply by analogy to private employment situations. For example, it could be said to apply when an employer investigating workplace misconduct calls an employee in 166. See U.S. CONST. amend. VI. Protection under double jeopardy doctrine also falls into this category. See U.S. CONST. amend. V. 167. See supra note 107. 168. Cisco v. United Parcel Servs., Inc., 476 A.2d 1340, 1344 (Pa. Super. Ct. 1984). 169. See, e.g., Wiskotoni v. Mich. Nat’l Bank-W., 716 F.2d 378, 383 (6th Cir. 1983) (stating that discharge based on subpoena to testify before a grand jury violates public policy); Call v. Scott Brass, Inc., 553 N.E.2d 1225, 1230 (Ind. Ct. App. 1990) (recognizing valid PPE claim where employee was terminated for fulfilling duty to appear for jury duty); Shaffer v. Frontrunner, Inc., 566 N.E.2d 193, 196 (Ohio Ct. App. 1990) (establishing valid claim for employee fired for jury service); Hodges v. S.C. Toof & Co., 833 S.W.2d 896, 899 (Tenn. 1992) (reinstating lost wages to employee fired for serving on jury duty). 170. See, e.g., Call, 553 N.E.2d at 1230 (reasoning that the public policy was “expressed by the statutes enacted by the legislature”); Wright v. Faggan, 773 S.W.2d 352 (Tex. App. 1989) (considering the underlying statutory purpose as a basis for making jury service a PPE). 171. See Nees v. Hocks, 536 P.2d 512, 516 (Or. 1975); see also Reuther v. Fowler & Williams, Inc., 386 A.2d 119, 120-21 (Pa. Super. Ct. 1978) (relying on statute making jury service mandatory, as well as state constitutional provision granting the right of trial by jury, in defining the state’s public policy). 2014] COMPANY CONDUCT 977 for questioning. This is especially the case if the employer’s grievance procedures or a collective bargaining agreement provide for some sort of hearing prior to termination. Furthermore, it would not necessarily be fatally burdensome on an employer to forbid firing (or threatening to fire) all those who wish to remain silent until they can adequately prepare for such a grievance hearing, or until they can consult with a union official, or lawyer, for example. The Supreme Court has made clear that the reason an accused has a right to remain silent is that custodial interrogation is inherently coercive.172 It is the ability of the state to use force to detain a suspect, as well as its ability to threaten a suspect with jail time, that makes the interrogation process so fraught, and the need for a brightline right to keep silent so imperative.173 Certainly, being summoned to the boss’s office with one’s job on the line can be an intimidating experience. But the boss can neither physically force the employee to stay and cooperate with questioning, nor credibly threaten a significant curtailment of physical liberty in the future (although the threat of termination can certainly create substantial psychological pressure). For this reason, the right to remain silent seems a less than compelling candidate for a source of public policy under the PPE. Finally, the Eighth Amendment’s protections against excessive fines and “cruel and unusual punishment”174 seem an unlikely PPE candidate for a different reason. First, in jurisdictions recognizing the PPE only in cases of actual discharge,175 it would not apply to cases where an employer imposed fines or other punishments for employee misconduct short of termination.176 Where adverse employment actions short of termination could give rise to a PPE claim, or where termination itself is considered the “cruel and unusual punishment,” applicability still would seem to be rare. Even as to clear state action, 172. Miranda v. Arizona, 384 U.S. 436, 455, 502 (1966) (explaining that such interrogation “exacts a heavy toll on individual liberty and trades on the weakness of individuals” through “psychologically coercive pressures”). 173. Id. at 512 (emphasizing the important premise that “pressure on the suspect must be eliminated”). 174 U.S. CONST. amend. VIII. 175. See supra note 47. 176. Of course, were the punishment excessive enough, it might constitute constructive discharge. Pa. St. Police v. Suders, 542 U.S. 129, 147 (2004) (determining the requirements for “constructive discharge” to be satisfied where “working conditions [become] so intolerable that a reasonable person would have felt compelled to resign”); see also LARSON, supra note 29, § 15.08 (stating that most courts apply some form of this “reasonable person” test). Given that Eighth Amendment claims succeed only in cases of the most extreme, “grossly excessive” fines and punishments, it may rarely matter whether a jurisdiction recognizes a PPE claim for action short of termination. 978 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 these clauses apply only in the most extreme cases of grossly excessive fines and punishments.177 This area closely tests the requirement that only policies that “go to the heart of a citizen’s rights, duties, and responsibilities” can support a PPE claim.178 The public may have a strong interest in ensuring that private employees are not forced to forfeit their privacy, their right to choose to participate in (or refrain from participating in) worship, or their freedom of speech about matters of public concern. Does it have a similarly strong interest in policing the presumably rare instance in which an abusive employer, for example, docks a month’s pay because an employee forgot to properly log her start time on the sign-in sheet?179 Given the strong presumption toward atwill employment, this seems a less viable candidate for the PPE. While some of the procedural protections from the Bill of Rights seem implausible sources of the public policy applicable to the PPE cases, it still may be that society has an interest in promoting basic notions of fairness in the workplace, such that the procedural due process protections created by the Due Process Clause itself may be a legitimate source of policy. Where a company is large enough to afford internal grievance procedures, for example, it may be appropriate to require that employees using such procedures should be informed of the basis for the allegation of misconduct, and be given notice and an opportunity to rebut the accusation before being discharged.180 This is certainly a requirement for state action under procedural due process, applicable not only in criminal matters, but also 177. See Cooper Indus., Inc. v. Leatherman Tool Grp., Inc., 532 U.S. 424, 425 (2001) (finding this constitutional constraint to be applicable only where punishments are “grossly disproportional to the gravity of the offense”); Rummel v. Estelle, 445 U.S. 263, 272 (1980) (acknowledging that “[o]utside the context of capital punishment, successful challenges to the proportionality of particular sentences have been exceedingly rare”); see also BMW of N. Am., Inc. v. Gore, 517 U.S. 559, 559-61 (1996) (declaring a punitive damages award “excessive” only after concluding that none of the elements associated with reprehensible conduct were present, the ratio of punitive damages to actual harm was five hundred to one, and the economic sanction was substantially greater than any civil penalty available in the state where the harm occurred); TXO Prod. Corp. v. Alliance Res. Corp., 509 U.S. 443, 444 (1993) (admitting that a $10 million punitive damage award alongside a $19 thousand actual damages award was “certainly large” but refusing to classify it as “grossly excessive”). 178. Booth v. McDonnell Douglas Truck Servs., Inc., 585 A.2d 24, 28 (Pa. Super. Ct. 1991). 179. Many state statutes forbid employers from deducting their employees’ pay unless authorized to do so by federal law, state law, or contract. See, e.g., ARIZ. REV. STAT. ANN. §§ 23-352, -355 (2013); COLO. REV. STAT. § 8-4-105 (2013); OR. REV. STAT. § 652.610(3) (2013). An arbitrary, spontaneous employer decision of punishment “overkill” in such a situation might trigger a statutory cause of action for the employee, arguably mooting any potential PPE issue. But if such overkill is part of existing managerial policy or practice, these statutes would be of no help to the employee, for they do not create any minimum “floor” of protection against unreasonable deductions from pay. 180. Cf. NLRB v. J. Weingarten, Inc., 420 U.S. 251, 266-68 (1975) (holding that National Labor Relations Act supported administrative rule entitling union employee to have union representative present at any meeting which might lead to disciplinary action). 2014] COMPANY CONDUCT 979 when a government employer purports to act against a government employee.181 The requirement of notice, at least, is one that private employers may need to respect, even where the at-will doctrine otherwise applies.182 Or, if the company perversely punishes an employee for availing herself of those grievance procedures, it may be seen as violating fundamental fairness.183 In like manner, at least one court has stated that where the employee bypasses the usual grievance channels, he is less likely to have a claim.184 But this seems to be an area calling for great caution. Due process cases involving government employer-employee relationships seem more closely analogous to the PPE situation than due process cases involving individual defendants in criminal or civil cases. And, in Due Process doctrine, a government employee has no legally cognizable due process interest, and thus may not even assert a due process claim, if that employee is an at-will employee as opposed to one who has a right to continued employment (absent bad behavior) under either contract or statute.185 It would be incongruous, at the least, and possibly unduly burdensome and economically inefficient, to apply stricter standards to private employers via the PPE than are applied to public employers under the analogous constitutional doctrine. B. Constitutional Provisions that Should Form the Basis of a PPE Claim 1. Free Speech: Political Expression Let us begin with the First Amendment right of free speech. Can it support a PPE claim? An illustrative case is Novosel v. Nationwide Insurance Company.186 Novosel, a district claims manager at an insurance company, was fired after he refused to participate in his employer’s political agenda 181. See Cleveland Bd. of Educ. v. Loudermill, 470 U.S. 532, 542-43 (1985) (balancing employer interests with employee interests in concluding that due process requires that a government employee receive notice and an opportunity to respond before being denied a constitutionally protected property or liberty interest); CHESTER JAMES ANTIEAU & WILLIAM J. RICH, MODERN CONSTITUTIONAL LAW § 35.18 (2d ed. 1997) (discussing procedural due process rights in public employment dismissal proceedings as requiring proper notice and an opportunity to respond). 182. See Person v. Bell Atl.—Va., Inc., 993 F. Supp. 958, 961 (E.D. Va. 1998) (characterizing Virginia common law at-will employment doctrine as incorporating requirement that employer give reasonable notice before termination. in the absence of any agreement to the contrary). 183. Cf. Wounaris v. W. Va. St. Coll., 588 S.E.2d 406 (W. Va. 2003) (upholding PPE claim against state actor when college rehired employee after she won an ALJ proceeding, only to immediately re-fire her while an appeal was still pending). 184. See Geary v. U.S. Steel Corp., 319 A.2d 174,179-80 (Pa. 1974). 185. Bishop v. Wood, 426 U.S. 341, 344-47 (1976). 186. 721 F.2d 894 (3d. Cir. 1983). 980 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 and efforts to lobby the Pennsylvania House of Representatives.187 Defending against a PPE claim, the insurance company argued that a wrongful discharge action depended upon the violation only of a statutorily recognized policy, and that a constitutional provision could not provide the source of a PPE claim.188 The Third Circuit rejected this argument and held for the employee. Even though the dismissal did not violate a specific statute, it was enough that it contravened a “clearly mandated public policy” that arose “directly from the Constitution,” i.e., political and associational freedoms.189 Accordingly, the court reasoned that a corporation’s interest in supporting its state legislature did not outweigh societal interests in free political expression.190 As the Third Circuit explained, “the protection of an employee’s freedom of political expression would appear to involve no less compelling a societal interest than the fulfillment of jury service or the filing of a workers’ compensation claim.”191 Novosel represents perhaps the high-water mark for aggressive use of constitutional principles for the PPE. The Third Circuit declined to extend Novosel a decade later, holding that intervening Pennsylvania cases cast doubt on the availability of constitutional sources, and that, at any rate, the narrowness of the PPE counseled against extending Novosel to reach the First and Fourth Amendments.192 Instead, the Third Circuit relied on normal tort law (in that case, invasion of privacy) rather than the “search and seizure” provision of the Fourth Amendment.193 Of course, a too robust PPE may actually interfere with the free speech rights of employers. Arguably, an employer who wishes to further ideological aims with his business ought to be able to hire (and fire) based on whether an employee shares the employer’s sense of mission. An eco-friendly energy company should be able to decide to hire only “green” employees and to terminate the employee who denies the existence of human-induced climate change. For that matter, ought not a diehard, conservative, Republican small-business owner have the right to decide to spend his workdays only with like-minded employees who share his values—including his party affiliation? At least, in a small business setting, such an employer may have a free association interest in choosing the persons with whom he spends forty hours a week. It is partly for this reason that antidiscrimination 187. 188. 189. 190. 191. 192. 193. Id. at 895-96. Id. at 898. Id. at 899-901. Id. at 899. Id. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 619-20 (3d Cir. 1992). Id. at 621-22. 2014] COMPANY CONDUCT 981 statutes exempt small businesses with only a very small number of employees.194 The Supreme Court has recognized a right of freedom of association in membership organizations that is greater for smaller, more intimate groups than it is for larger, more widespread groups.195 Such a freedom of association is not as great when it comes to choosing with whom one works,196 but it should enjoy some respect.197 It is precisely the right to hire and fire based on party affiliation which the law denies to a public employer, except for high-ranking political appointments.198 A government employer cannot fire an employee for being of the wrong political party.199 But a private employer presumably can: there is no direct First Amendment protection given the lack of state action, and while some state antidiscrimination statutes list party affiliation as a protected status for private employees,200 Title VII201 and many state anti-discrimination statutes do not.202 194. Leroy D. Clark, Employment Discrimination Testing: Theories of Standing and a Reply to Professor Yelnosky, 28 U. MICH. J.L. REFORM 1, 15 (1994). It is certainly for this reason that part of the Civil Rights Act’s public accommodations provision, 42 U.S.C. § 2000a(b)(1) (2012), and part of the Fair Housing Act, 42 U.S.C. § 3603(b)(2) (2012), have the so-called “Mrs. Murphy’s boardinghouse” exemption for dwellings with at most four or five units or families. James D. Walsh, Reaching Mrs. Murphy: A Call for Repeal of the Mrs. Murphy Exemption to the Fair Housing Act, 34 HARV. C.R.-C.L. L. REV. 605, 606 (1999). 195. Roberts v. U.S. Jaycees, 468 U.S. 609, 621-22 (1984) (stating that a large national organization with large, otherwise nonselective memberships did not have a First Amendment Free Association right to engage in sex discrimination illegal under state law). 196. Id. (“[T]he Constitution undoubtedly imposes [free association] constraints on the State’s power to control the selection of one’s spouse that would not apply to regulations affecting the choice of one’s fellow employees.”); see also Guesby v. Kennedy, 580 F. Supp. 1280, 1284 (D. Kan. 1984) (“[I]n the context of an employment relationship, the scope of the right of association is much more limited than in the context of membership in an organization.”). 197. See Julie Manning Magid & Jamie Darin Prenkert, The Religious and Associational Freedoms of Business Owners, 7 U. PA. J. LAB. & EMP. L. 191 (2005) (arguing that employers with an avowed religious or theological mission and orientation, even if not themselves a religious organization, should enjoy a free association-based latitude to prefer co-religionists as employees). 198. See, e.g., Branti v. Finkel, 445 U.S. 507, 517-19 (1980) (stating that with the exception of certain instances where political affiliation would “interfere with the discharge of his public duties . . . the continued employment of an assistant public defender cannot properly be conditioned upon his allegiance to the political party”). 199. See Elrod v. Burns, 427 U.S. 347, 373 (1976) (plurality opinion) (stating that termination of public employees based on party affiliation unconstitutional under the First and Fourteenth Amendments). 200. CAL. LAB. CODE § 1101 (West 2012) (prohibiting private employers from controlling or directing the political affiliations of employees); D.C. CODE § 2-1401.01 (2013) (prohibiting private employers from making employment decisions based on political affiliation). 201. 42 U.S.C. § 2000e-2 (2012). 202. See, e.g., 775 ILL. COMP. STAT. ANN. 5/1-102 (2012) (not including political affiliation among categories protected from employment discrimination); IOWA CODE § 216.6 (2013) (same); TENN. CODE ANN. § 4-21-401 (2012) (same); MISS. CODE ANN. § 33-1-15 (2013) (same). 982 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 So it seems sensible to say that not every free speech-centered limit constitutionally imposed on a government employer action ought to apply to private employers. But that should not mean that there are no proper free speech-type rights enjoyed by employees. Some should exist, subject to limitations, based on the considerations below. (a) Forced Speech The Novosel case illustrates a prime candidate for such protection, namely when employers force employees to engage in unwelcome speech. The problem is real, and in recent years, reports of employers who have pressured employees into making political campaign contributions or even attending political rallies have risen.203 These employers make attendance at political rallies mandatory, and strongly encourage monetary contributions.204 They keep track of who cooperates and who does not, with the latter group subject to sanctions like demotions and the withholding of bonuses.205 Given the rising influence of large corporations on the political scene,206 this potential to arm-twist armies of surrogate speakers bodes ill for the political process. This danger to the political process justifies the application of the PPE to protect free speech values, at least where the employer is using the employer-employee relationship to unduly influence employees. So, while a private employer may be able to burden employee free speech values more than the government, this ability is still somewhat constrained: at a minimum, they should not be able to force their employees to engage in expressive political activity. Existing FEC regulations prohibit such coercion if designed to result in a financial contribution in a federal election.207 However, such protections at the state level for state and local elections are far more rare. Even at the federal level, the regulations apply only to coerced 203. See, e.g., Robert Kelner, Allegations of Employer Coercion of Political Activity Are on the Rise, INSIDE POLITICAL LAW (Oct. 17, 2012), http://www.insidepoliticallaw.com/2012/ 10/17/allegations-of-employer-coercion-of-political-activity-are-on-the-rise/; Alec MacGillis, Coal Miner’s Donor, THE NEW REPUBLIC (Oct. 4, 2012), http://www.newsrepublic.com/ article/politics/108140/coal-miners-donor-mitt-romney-benefactor (describing pressure tactics used by Murray Energy to get employees to attend political rallies and to make contributions). 204. MacGillis, supra note 203. 205. Id. 206. See Citizens United v. Fed. Election Comm’n, 558 U.S. 310, 343 (2010) (recognizing the free speech rights of corporations through political spending and holding invalid campaign finance reform rules which treat corporate entities different from natural persons); see also Developments in the Law: Corporations and Society, 117 HARV. L. REV. 2272 (2004) (discussing the prominence of corporations in the political sphere that has led to an increase in their social accountability). 207. 11 C.F.R. § 114.2(f)(2)(E)(iv) (2013). 2014] COMPANY CONDUCT 983 contributions, and not forced attendance at rallies, pressure to sign petitions, or the like. Most state provisions ban discrimination based only on a refusal to contribute rather than upon the act of making a financial contribution.208 States more commonly protect the right to vote,209 sometimes classified as “the right of suffrage.”210 However, some courts construe this protection to extend to other forms of political activity besides actually casting a vote.211 This construction supports the tendency among jurisdictions to provide protection to employees seeking to express political beliefs in a way that does not substantially interfere with their employer’s interests. (b) Whistleblowing Another prime candidate for protection is “whistleblowing.” Certainly, there are no shortage of whistleblower cases, where employees reporting misconduct obtain relief either through statutes212 or the PPE itself.213 The case for a clear and substantial public policy here is compelling. First, there is the impressive number of statutes at the 208. ALA. CODE §§ 10A-21-1.01(b), 17-5-17 (2012); IDAHO CODE ANN. § 67-6605 (2012); LA. REV. STAT. ANN. § 18:1461.1(A)(2), :1483, :1505.2 (2011); MASS. GEN. LAWS ch. 56, § 33 (2012); MO. REV. STAT. §§ 130.028.1(2)-(3) (1997); N.H. REV. STAT. ANN. § 664:4-a(II) (2012); S.C. CODE ANN. § 8-13-1332(2) (2011); TEX. ELEC. CODE ANN. § 253.102 (West 2011); WASH. REV. CODE § 42.17A.495(2)(a) (2011); WIS. STAT. § 12.07(4) (2011); WYO. STAT. ANN. § 22-26-111(a)(ii) (2011). 209. HAW. REV. STAT. § 19-3 (2011); IDAHO CODE ANN. § 18-2305 (2012); KY. REV. STAT. ANN. § 121.310(1) (West 2011); 25 PA. CONS. STAT. § 3547 (2012); TENN. CODE ANN. § 2-19134(b) (2012); W. VA. CODE § 3-8-11 (2012); WYO. STAT. ANN. § 22-26-111 (2011). 210. See BLACK’S LAW DICTIONARY 712 (9th ed. 2009) (defining “suffrage” as “[t]he right or privilege of casting a vote at a public election”). 211. See, e.g., Am. Indep. Party in Idaho, Inc. v. Cenarrusa, 442 P.2d 766, 768 (Idaho 1968) (recognizing the right of citizens to gather and express political beliefs as inherent to the term “suffrage”); Md. Green Party v. Md. Bd. of Elections, 832 A.2d 214, 228 (Md. 2003) (indicating that the term “suffrage” includes the right to sign a referendum petition). 212. See, e.g., ALASKA STAT. § 39.90.100 (2013); ARIZ. REV. STAT. ANN. § 23-1501(3)(c)(ii) (2013); N.D. CENT. CODE § 34-01-20(1)(a) (2012); R.I. GEN. LAWS § 28-50-3(4) (2012). 213. See, e.g., N.J. STAT. ANN. § 34:19-4 (West 2013) (allowing plaintiff to choose between suing under statute or under common law public policy claim); Porter v. Reardon Mach. Co., 962 S.W.2d 932, 938 (Mo. Ct. App. 1998) (recognizing whistleblower exception to doctrine of employment at will). 984 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 federal214 and state215 levels providing whistleblower protection of one manner or another. Recognizing this as a clear and substantial public policy is almost tautological, inasmuch as the activity is often recognized as whistleblowing only when the misconduct alleged is a matter of significant public concern or implicates significant matters of public policy.216 While whistleblowing activities are often mentioned as the kind of socially desirable activity that might trigger the PPE, in practice, whistleblowing has not always sufficed. Courts often distinguish between whistleblowing to vindicate a public interest versus exposing mere private wrongdoing. For example, the Supreme Court of Oklahoma expressly distinguished between the employee reporting of “crimes,” “violation of health or safety laws,” or other actions breaching a public trust, that would be protected under the PPE, and the employee reporting of conduct harming “private or proprietary interests,” that would not.217 Thus, exposing an employer’s Medicare fraud was protected, but exposing a co-employee’s embezzlement from a private employer was not.218 Examples of cases applying the PPE for “whistleblowing” activities aimed at actual violations of law 214. See, e.g., Asbestos Emergency Response Act, 15 U.S.C. § 2651 (2012) (protects employees from discrimination or retaliation for reporting alleged violations of environmental laws relating to asbestos in elementary and secondary school systems); SarbanesOxley Act, 18 U.S.C § 1514(A) (2012) (protects employees of publicly traded companies, and their contractors, subcontractors, and agents from discrimination or discharge for reporting violations of the federal mail, wire, bank, or securities fraud statutes, or any other provision of federal law relating to fraud against shareholders); Occupational Safety and Health Act, 29 U.S.C § 660(c) (2012) (protects employees from discrimination or retaliation for reporting workplace or safety hazards); 33 U.S.C. § 1367 (2006); Energy Reorganization Act, 42 U.S.C. § 5851 (2006) (protects employees in the nuclear power and nuclear medicine industries against discrimination or discharge for reporting violations of nuclear safety laws); 42 U.S.C § 6971 (2006) (each protecting employees from discrimination or discharge for reporting violations of certain environmental laws or regulations); 42 U.S.C § 7622 (2006); International Safe Container Act, 46 U.S.C. App. § 1506 (2006) (protects employees who are discharged or discriminated against for filing an OSHA complaint alleging unsafe containers for internal cargo); Surface Transportation Assistance Act, 49 U.S.C. § 31105 (2006) (protects employees of the trucking industry who are discharged, disciplined, or discriminated against for reporting commercial motor vehicle safety hazards, health, or safety concerns). 215. See, e.g., FLA. STAT. § 448.102(1) (2013) (prohibiting “retaliatory personnel action” where an employee reports employer’s unlawful conduct or refuses to engage in illegal activity); NEV. REV. STAT. § 281.631 (2013) (prohibiting the use of “authority or influence to prevent disclosure of improper governmental action by another state or local governmental officer or employee”); TENN. CODE ANN. § 50-1-304 (2013) (providing that “[n]o employee shall be discharged or terminated solely for refusing to participate in, or for refusing to remain silent about, illegal activities”); W. VA. CODE § 6C-1-1 (2013) (providing protection to a discharged employee “where the employer's motivation for the discharge is to contravene some substantial public policy principle”). 216. See supra notes 142-145. 217. Darrow v. Integris Health, Inc., 176 P.2d 1204, 1213-15 (Okla. 2008). 218. Id. (citing Hayes v. Eateries, Inc., 905 P.2d 778, 785 (Okla. 1995)). 2014] COMPANY CONDUCT 985 abound.219 But, the employee is less likely to be protected when the speech concerns employment grievances or generic concerns about quality control not involving illegality.220 The extent to which courts recognize a whistleblowing-based PPE suit may involve whether the employee had a legal duty to report the alleged impropriety; whether the employee followed proper internal reporting procedures or violated the chain of command; and whether the employee had the requisite expertise in the area in question to recognize a legitimate need for whistleblowing.221 At least one court has held that an employee enjoys no right to champion “product safety” where the employee is not qualified to render an expert opinion on product safety, or where safety assessment was not part of his duties.222 The somewhat tepid protection given to whistleblowing activities is actually consistent with constitutional rules. In free speech cases involving public employees who criticize their organizations, the Supreme Court has provided First Amendment protection only when (1) the speech relates to a matter of “public concern;” (2) it is not spoken by the employee as part of the employee’s job duties; and (3) its value outweighs any potential damage to the government office’s reputation, efficiency, or the like.223 This is because public employers have a legitimate interest in controlling speech that can directly affect the performance of their agency or office.224 If the speech satisfies conditions (1) and (2) above, and the court determines that the legitimate interests of the government employer in efficient operations do not 219. See, e.g., Sheets v. Teddy’s Frosted Foods, Inc., 427 A.2d 385 (Conn. 1980) (state labeling and licensing laws); Palmer v. Brown, 752 P.2d 685, 689-90 (Kan. 1988) (Medicaid fraud); Harless v. First Nat’l Bank in Fairmont, 246 S.E.2d 270 (W. Va. 1978) (state and federal consumer credit protection laws). 220. Compare Flesner v. Technical Comm’n Corp., 575 N.E.2d 1107, 1111 (Mass. 1991) (applying exception to termination for cooperating with a federal investigation of the employer), with Wright v. Shriners Hosp. for Crippled Children, 589 N.E.2d 1241, 1245 (Mass. 1992) (declining to apply PPE to termination for criticizing employer to national medical accrediting body), and Hrehorovich v. Harbor Hosp. Ctr., Inc., 614 A.2d 1021, 1033 (Md. App. 1992) (declining to apply PPE where hospital employee, claiming right to “promote quality health care,” engaged in extensive criticisms of the hospital). See also Suchodolski v. Mich. Consol. Gas Co., 316 N.W.2d 710 (Mich. 1982) (corporate management dispute regarding internal accounting procedures did not amount to violation of a clearly mandated public policy). 221. Field v. Phila. Elec. Co., 565 A.2d 1170, 1180-81 (Pa. Super. Ct. 1989) 222. Geary v. U.S. Steel Corp., 391 A.2d 174, 180 (Pa. 1974). 223. Garcetti v. Ceballos, 547 U.S. 410, 423 (2006); Connick v. Myers, 461 U.S. 138, 147 (1983) (“When employee expression cannot be fairly considered as relating to any matter of political, social, or other concern to the community, government officials should enjoy wide latitude in managing their offices, without intrusive oversight by the judiciary in the name of the First Amendment.”). 224. Garcetti, 547 U.S. at 421-23. 986 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 outweigh the employee’s free speech interests, then the employer may not engage in any adverse employment action.225 Something analogous ought to apply in the private employment sphere under the PPE. Speech on matters not of a public concern ought not to trigger PPE protection. And, if a job’s duties require an employee to make presentations, write memos, etc., the employer must fire the employee based on the content of what she says. The tougher question arises when the speech concerns a matter of public interest and is not made pursuant to job duties. (c) Coverage Inspired by Statutory Speech Protection for Private Employees While the above principles apply equally to state government employees,226 neither federal nor state constitutional principles directly provide free speech protection to private employees.227 Further, most states lack any explicit statutory free speech protection for private employees. However, a minority of states have promoted similar free speech principles in varying degrees within the realm of private employment.228 Over a half-dozen states generally prohibit employers from punishing employees for engaging in political activities.229 A few prohibit discrimination based narrowly on election-related speech,230 and a few others extend employment protection to the expression of “political” ideas, opinions, or beliefs.231 Another area of variation is whether anti-discriminatory provisions apply only to expressions occurring outside of the employer’s 225. Id. 226. See Gitlow v. New York, 268 U.S. 652, 630 (1925) (Fourteenth Amendment Due Process Clause incorporates First Amendment right to free speech); Smith v. Novato Unified Sch. Dist., 59 Cal. Rptr. 3d 508 (Cal. Ct. App. 2007). 227. See Hudgens v. NLRB, 424 U.S. 507, 513 (1976) (stating that the Constitution does not directly provide free speech protection to private corporations or persons); Jacobs v. Major, 407 N.W.2d 832, 836 (Wis. 1987) (stating that the free speech clause of the state constitution provides protection only against state action). 228. See Eugene Volokh, Private Employees’ Speech and Political Activity: Statutory Protection Against Employer Retaliation, 16 TEX. REV. L. & POL. 295 (2012) (discussing the ways in which state statutes provide protection for employee political speech and activity). 229. See CAL. LAB. CODE § 1101 (West 2012); COLO. REV. STAT. § 8-2-108 (2013); LA. REV. STAT. ANN. § 23.961 (2011); MO. ANN. STAT. § 115.637(6) (West 2012); NEB. REV. STAT. § 32-1537 (2012); NEV. REV. STAT. § 613.040 (2012); S.C. CODE ANN. § 16-17-560 (2011); W. VA. CODE § 3-8-11(b) (2012). See also SEATTLE, WASH. MUN. CODE § 14.04.040 (2011) (creating similar general free speech rights for private employees at the municipal level); MADISON, WIS. MUN. CODE §§ 39.03(1), .03(2)(cc), .03(8)(c), .03(8)(d)(1) (2010) (same). 230. See 5 ILL. COMP. STAT. ANN. § 5/29-4 (2012); N.Y. LAB. LAW § 201-d (McKinney 2012); WASH. REV. CODE § 42.17A.495(2) (2012). 231. See MINN. STAT. § 10A.36 (2012); N.M. STAT. ANN. § 1-20-13 (West 2012). 2014] COMPANY CONDUCT 987 premises, or additionally, to expressions taking place at the work site.232 Even where the statute expressly provides protection to offpremises speech, there is variation as to degree. For example, in mandating employers to terminate employees only for “[g]ood cause,” Montana clarifies that the scope of protection applies, but is not limited to, “[t]he legal use of a lawful product by an individual off the employer’s premises during nonworking hours.”233 While such statutes are often applied to smoking and drinking after hours and offsite,234 they also can be applied to more inherently expressive products like political signs and social media programming.235 Colorado and North Dakota broaden the reach of this protection by forbidding employers to terminate employees for engaging in “any lawful activity” that occurs off the employer’s premises.236 Finally, state statutes also vary the breadth of protection afforded by the use of the term “political,”237 and whether protection extends to hiring practices, or to only disciplinary actions against current employees.238 The variations above alert one to several salient issues regarding the proper breadth of free speech protections in the private sphere. Courts using free speech principles to inform their PPE analysis would do well to consider such issues as, for example, the extent to which the expression is political, off-site, or after-hours. 232. Compare Cotto v. United Techs. Corp., 711 A.2d 1180 (Conn. App. Ct. 1998) (finding statutory language that does not explicitly limit protection to off-the-job speech extends to on-the-premises speech through implication), with Dixon v. Coburg Dairy, Inc., 330 F.3d 250, 262 (4th Cir. 2004) (interpreting a similar state statute to apply only to offpremises speech, for fear of making the workplace a “constitutionally protected forum for political discourse”). 233. MONT. CODE ANN. § 39-2-903 (2011). 234. See, e.g., MINN. STAT. § 181.938 (2012) (employers may not discipline or discharge employee based on use of lawful products off-premises during nonworking hours). 235. See, e.g., Angel v. Rayl, No. 04CV3420, 2005 WL 6208024, at *2 (D. Colo. Dec. 1, 2005) (interpreting lawful activity off the job premises to include “attend[ing] certain political or social-activism events”); Joseph Lipps, State Lifestyle Statutes and the Blogosphere: Autonomy for Private Employees in the Internet Age, 72 OHIO ST. L.J. 645, 652-54 (advocating for a distancing between blogs and social networking activities and adverse employment action). But see Kolb v. Camilleri, No. 02-CV-0117A(Sr), 2008 WL 3049855, at *13 (W.D.N.Y. Aug. 1, 2008) (concluding that picketing did not constitute a “recreational activit[y]” for purposes of a statute protecting such activity when conducted off the job premises). 236. COLO. REV. STAT. § 24-34-402.5(1) (2013); N.D. CENT. CODE ANN. § 14-02.4-03, 408 (West 2011). 237. Compare Thompson v. Borg-Warner Protective Servs. Corp., No. C-94-4015 MHP, 1996 WL 162990, at *9 (N.D. Cal. Mar. 11, 1996) (finding the term “political activities” to include opinions on alcohol and drug policies within the meaning of sections 1101 and 1102 of the California Labor Code), with Vanderhoff v. John Deere Consumer Prods., Inc., No. C.A. 3:02–0685–22, 2003 WL 23691107, at *2 (D.S.C. March 13, 2003) (holding that a confederate flag decal was not a “political opinion” as intended by S.C. CODE ANN. § 16-17-560). 238. Compare Bools v. Gen. Elec. Co., 70 F. Supp. 2d 829, 832 (S.D. Ohio 1999) (limiting statute’s protection to persons already employed), with Gay Law Students Ass’n v. Pac. Tel. & Tel. Co., 595 P.2d 592, 610 n.16 (Cal. 1979) (interpreting a statute that protects “employees” to include job applicants). 988 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 As noted above,239 in jurisdictions protecting private employees’ speech, the existence of such statutory claims need not prevent a court from considering a PPE claim. And, the existence of such statutory remedies can help a court decide that a clear public policy to that effect exists, such that a PPE claim should be recognized. But, even where such statutory remedies do not exist, the constitutional basis alone for free speech protections ought to be sufficient to convince courts that a clear public policy favoring free speech rights supports a PPE claim. (d) Toward a Balance of Employee and Employer Interests It is axiomatic that the right of free speech is “fundamental” in our country, and the Supreme Court has repeatedly so held.240 It is the very first right listed in the Bill of Rights.241 It was the first substantive (i.e., non-procedural) right to be recognized as “fundamental,” and thus, “incorporated” through the Fourteenth Amendment’s Due Process Clause and applied to the states.242 There is no individual right more celebrated in the United States. A leading scholar has termed it “the Constitution’s most majestic guarantee,” one which helps to preserve all other rights.243 If constitutional principles can ever inform a courts’ application of the PPE, then such constitutional inspiration must include free speech rights.244 Certainly, the kind of free speech protection offered to conventional government whistleblowers also should apply to private employees who blow the whistle on illegal acts. But should the PPE extend beyond such a straightforward type of employer harassment, to adverse employment action taken against an employee for engaging in other types of speech? If one is committed to a vibrant, free speech-oriented society, the answer should be yes. 239. See supra Part III.A. 240. See, e.g., McDonald v. City of Chicago, 130 S. Ct. 3020, 3061 (2010); Near v. Minnesota, 283 U.S. 697, 707 (1931); Gitlow v. New York, 268 U.S. 652, 666 (1925). 241. U.S. CONST. amend. I. 242. See Gitlow, 268 U.S. at 666. 243. Nelson v. McClatchy Newspapers, Inc., 936 P.2d 1123, 1129 (Wash. 1997) (quoting LAWRENCE H. TRIBE, AMERICAN CONSTITUTIONAL LAW § 12-1 (2d ed. 1988)). 244. Cf. San Diego Bldg. Trades Council v. Garmon, 359 U.S. 236, 244-45 (1959) (National Labor Relations Act’s protection of union employees’ picketing rights preempted contrary state law principles). The existence of strong NLRA preemption of state law might suggest that much of the Free Speech-based PPE discussion in this Section was unnecessary: perhaps federal labor law statutes preempted the analysis entirely. But, analogizing from Supreme Court First Amendment case law, this Article suggests that the PPE should not apply to job-related speech. This approach would thus apply the PPE only in situations in which federal labor law did not apply, and could thus raise no legitimate issue of federal preemption. 2014] COMPANY CONDUCT 989 First, the case for protecting employees from “forced speech” is quite compelling. Even in relatively trouble-free economic times, employees are simply not that portable. Being fired from one’s job and being forced to find new employment is a traumatic experience for many, especially those who live paycheck to paycheck. Employers, thus, have a potent coercive influence over their employees.245 Allowing them to abuse that power to influence the political process would skew our political debate and undermine our democratic process. Even beyond forced speech situations, there is a strong public policy interest in granting private employees a certain amount of free speech latitude. We protect free speech not merely as a means of promoting discussion and participation in democratic government, and not merely to further the discovery of truth through “the marketplace of ideas,” but also because individual self-expression is good for its own sake.246 It leads to happier, more fulfilled lives: a better quality of life for the individuals doing the expressing, and because these individuals are more fulfilled, a more pleasant environment for the friends and coworkers around them. The vast majority of Americans are employees who spend about one-third of their lives, and almost half their waking lives, at their place of work. It is a prime place for them to communicate with their peers, and for them to receive information from their peers. For workers to be denied a certain range of motion in their expression could seriously dampen this individual self-fulfillment, not to mention sabotage the search for truth and diminish the vitality of our democracy. Again, it is no answer to suggest that anyone who does not like the free speech restrictions of their employer can find other employment. For most of these people, the prospect of losing their jobs is a significant hardship, and has a formidable chilling effect on their speech. Current law recognizes certain limitations on the PPE doctrine to recognize the legitimate interests of employers. Again, Novosel 245. A similar analysis informs federal labor law. In NLRB v. Gissel Packing Co., 395 U.S. 575 (1969), the Supreme Court explained that the “economic dependence” of employees required that employers be very careful in expressing anti-union sentiments prior to union elections, lest employees be unduly influenced by coercive “intended implications” of such efforts. Id. at 617. And in NLRB v. Exch. Parts Co., 375 U.S. 405 (1964), the Court held that the NLRA kept employers from granting benefits on the eve of a union election, even if they were unconditional and permanent. The potential coercive influence of such employer action was so great, the Court reasoned, that even the implicit threat of such a move—i.e., the suggestion that future benefits could dry up if employees did not vote the way the employer wanted—could constitute a “fist inside the velvet glove” and thus violate the NLRA. Id. at 409-10. 246. See Curtis Publ’g Co. v. Butts, 388 U.S. 130, 147 (1967) (free speech protection advances “truth, science, morality, and arts in general as well as responsible government” (quotation marks omitted)); 25 JOHN STUART MILL, ESSAY ON LIBERTY 246-49 (Charles W. Eliot ed., 1909) (1859) (famously expounding the “utilitarian” rationale for free speech protections). 990 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 provides a good example. Even as it drew upon constitutional principles to extend free speech protection to private employers via the PPE, the court stated guidelines to protect the employers’ prerogatives.247 It called for other courts considering such claims to weigh, inter alia, the employer’s contractual interests; whether the time, place, and manner of the speech interferes with business operations, or with “essential and close working relationships;” and whether it prevents the employer or employee from efficiently carrying out the requisite responsibilities.248 Although such employer interests do not typically qualify for the bona fide occupational qualification exception, state legislatures have included provisions within their statutes to constrain broad employee protection in order to protect employer interests.249 As an illustration, courts have held that a newspaper could prevent its reporters from engaging in political activity when such activity frustrates the employer’s purpose by creating an apparent conflict of interest,250 or from engaging in speech when that speech was placing an advertisement in a rival newspaper.251 Similarly, a New York court found a discharge lawful where an employee’s affiliation with Holocaust deniers threatened to harm the reputation of the employer.252 Even where the speech involved does not present a conflict of interest or bring the company into public disrepute generally, it may be unprotected if it is a publicly expressed opinion at odds with that of the employer’s and potentially injurious to the employer’s financial interests. For example, a Massachusetts court found it legitimate for a defense contractor to fire its spokesperson for publicly advocating a decline in defense spending, a topic of “acute concern” to the company in which it had a direct “financial stake.”253 In general, then, courts 247. Novosel v. Nationwide Ins. Co., 721 F.2d 894, 901 (3d Cir. 1983). 248. Id. 249. See MONT. CODE ANN. § 39-2-903(5) (2013) (establishing “good cause” for dismissal where employees cause “disruption of the employer's operation, or other legitimate business reason”); N.D. CENT. CODE § 14-02.4-03 (2011) (limiting employee protection to activities that are “not in direct conflict with the essential business-related interests of the employer”). 250. See Nelson v. McClatchy Newspapers, Inc., 936 P.2d 1123, 1127 (Wash. 1997) (determining that a state law prohibiting employment discrimination based on an employee's political conduct was not constitutionally applicable to newspaper publishers). 251. See Martin v. Capital Cities Media, Inc., 511 A.2d 830, 844 (Pa. Super. Ct. 1986). 252. See Berg v. German Nat’l Tourist Office, 248 A.D.2d 297, 298 (N.Y. App. Div. 1998) (affirming the lower court’s dismissal of the wrongful discharge suit, without referencing the initial grounds for the discharge); Salvatore Arena, Tourist Office KOs Damage Suit, N.Y. DAILY NEWS (Feb. 12, 1997, 12:00 AM), http://www.nydailynews.com /archives/news/tourist-office-kos-damage-suit-article-1.760157 (explaining that the employee was fired for Holocaust denial associations, and that the lower court upheld the termination because Holocaust denial conflicts with the business interests of the German National Tourist Office). 253. Korb v. Raytheon Corp., 410 N.E.2d 581, 584-85 (Mass. 1991). 2014] COMPANY CONDUCT 991 may reject free speech-based PPE claims where the employee speaks “against the interests” of the employer.254 There is no protection for speech which actively disrupts the employer or provides assistance to competitors. A middle-ground approach is needed, one which balances the public interest in protecting employees’ rights of expression with those of the employer. Existing PPE case law already points the way. For example, protected whistleblowing activity is more likely to be protected when it involves actual illegality, as opposed to mere criticism of a firm’s products or procedures. Employees should not have the right to trash their employers publicly or to engage in conduct that diminishes their reputation, but they certainly should have the right to point out illegal employer conduct. At the same time, even where the Supreme Court recognizes a legitimate business prerogative on the part of an employer, it has shown its willingness to withdraw such deference when the facts show that the employer is using its business rationale as a pretext for more ordinary unfair labor practices.255 Drawing upon existing statutory and case law protections for guidance, we recommend some basic guidelines for PPE claims based on free speech principles. First, an employer should not be able to discharge an employee for expression protected by the First Amendment taking place while the employee is off-duty and off-premises, unless such activity is against the employer’s interest. Expression can run counter to the employer’s interest if it (1) aids a competitor; (2) exposes confidential information; (3) runs counter to the avowed mission of the firm or organization; (4) harms the reputation of the employer; or (5) materially and substantially disrupts productivity (e.g., by harming morale). The latter two exceptions would not apply if the employee speech was not merely criticism but actual whistleblowing, i.e., accurate factual assertions exposing illegal or unethical practices, or practices threatening the public health or welfare. Further, the above exceptions would not apply where the facts showed that the employer’s proffered business justification was pre-textual. 254. Id. at 284. See also Rossi v. Pa. St. Univ., 489 A.2d 828 (Pa. 1985) (employee who lost PPE claim had continuously complained to supervisors about financial waste in his department, thus becoming “troublesome”). See, e.g., COLO. REV. STAT. § 24-34-402.5(1)(b) (2012) (prohibiting employers from firing employees based on their lawful conduct off the employment premises unless such conduct conflicts with their responsibilities to the employer); N.Y. LAB. LAW § 201-d(3)(a) (2011) (making it unlawful for an employer to discriminate based on employees’ off-duty political activities unless such activities interfere with the employer’s interest). 255. See Assoc’d Press v. NLRB, 301 U.S. 103, 131 (1937) (NLRA restrictions on firing for attempting to organize a workforce did not violate media employer’s free press rights where the employer acted not out of editorial prerogative but out of a desire to suppress union membership). 992 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 Tying the PPE to expression protected by the First Amendment means an employer can fire an employee for off-premises, off-duty speech that, e.g., is obscene or defamatory, or constitutes “fighting words.” Speech that is highly offensive but constitutionally protected— e.g., racist or anti-Semitic slurs, or sexually “indecent” but non-obscene speech—could be grounds for termination to the extent it was open, public, and notorious, and could plausibly be connected back to the employer by the public, thus harming the employer’s reputation. For speech made on-duty, on-premises, or using the employer’s facilities, resources, or materials, the employer should have wide latitude to discipline or terminate an employee. Courts should intervene only where the employer is using its power to pressure employees to make political contributions, vote a certain way, or express a certain political opinion. 2. Fourth Amendment Privacy The personal privacy rights256 guaranteed by the Fourth Amendment’s protection against unreasonable searches and seizures are also excellent candidates for constitutional rights driving a PPE analysis. These rights are well known to citizens at large, as the recent controversy over domestic surveillance by the National Security Agency demonstrates.257 The Fourth Amendment’s privacy protections apply to the states through incorporation, of course.258 Moreover, all state constitutions have some comparable provision.259 And, 256. The privacy concerns protected by the Fourth Amendment are analytically distinct from the “right to privacy” held to apply under the Due Process Clause as part of substantive due process. The latter protects individuals from unwarranted state interference in deeply personal matters such as childrearing, family, reproduction, and intimate relations. See infra Part V.C.1-2. The Fourth Amendment search and seizure brand of privacy is sometimes referred to as “informational privacy.” See Planned Parenthood of S. Ariz. v. Lawall, 307 F.3d 783, 789 (9th Cir. 2002) (defining “informational privacy” as encompassing “privacy interest in avoiding disclosure of sensitive personal information”); Francis S. Chlapowski, Note, The Constitutional Protection of Informational Privacy, 71 B.U. L. REV. 133, 135 (1991) (asserting that an individual’s “interest in informational privacy is a right that the Constitution protects under the due process clauses' protection of both liberty and property”). 257. See David Aronofksy & Matthew Cooper, The War on Terror and International Human Rights: Does Europe Get it Right?, 37 DENV. J. INT'L L. & POL'Y 567, 576 (2009) (describing the NSA’s surveillance program as having deleterious effect on privacy rights by “reaching into the homes and offices of Americans all throughout the United States and elsewhere”); Joshua Kopstein, Senators Strike at Surveillance Laws Authorizing NSA’s Warrantless Data Collection, THE VERGE (June 24, 2013, 6:25 PM), http://www.theverge.com/2013/6/24/4460334/senators-strike-at-nsa-surveillance-laws. 258. See Mapp v. Ohio, 367 U.S. 643, 655 (1961). 259. ALA. CONST. art. I § 5; ALASKA CONST. art. I § 14; ARIZ. CONST. art. II § 8; ARK. CONST. art. II § 15; CAL. CONST. art. I § 13; COLO. CONST. art. II § 7; CONN. CONST. art. I § 7; DEL. CONST. art. I § 6; FLA. CONST. art. I § 12; GA. CONST. art. I, § 1, § XIII; HAW. CONST. art. I § 7; IDAHO CONST. art. I § 17; Ill. CONST. art. I § 6; IND. CONST. art. I § 11; IOWA CONST. art. I § 8; KAN. CONST. BILL OF RIGHTS § 15; KY. CONST. § 10; LA. CONST. art. 2014] COMPANY CONDUCT 993 all states are subject to certain federal statutes protecting privacy interests of even private employees. For example, Congress has restricted the use of polygraph tests for pre-employment screening,260 inquiries about employee disabilities,261 and the use of genetic information in employment decisionmaking.262 At least one state constitution includes a right of privacy that applies to private action.263 Further, as with free speech rights, many states have passed statutes guaranteeing private employee privacy, at least in specific contexts, such as drug testing.264 This privacy interest is perhaps even stronger than free speech as a PPE candidate, given that the common law recognizes a variety of privacy-based causes of action.265 The strength of this interest is intuitive. We all have certain sensitive information concerning our lives away from the office—off-duty matters which have no effect on one’s work productivity. It should not be controversial that society has an interest in protecting the ability of workers to keep that information private. As the Third Circuit put it: It may be granted that there are areas of an employee’s life in which [the] employer has no legitimate interest. An intrusion into I § 5; ME. CONST. art. I § 5; MD. CONST., DECLARATION OF RIGHTS, art. XXVII; MASS. CONST. PT. 1, art. XIV; MICH. CONST. art. I § 11; MINN. CONST. art. I § 10; MISS. CONST. art. III § 23; MO. CONST. art. I § 15; MONT. CONST. art. II § 11; NEB. CONST. art. 1, § 7; NEV. CONST. art. I § 18; N.H. CONST. PT. 1, art. XIX; N.J. CONST. art. I § 7; N.M. CONST. art. II § 10; N.Y. CONST. art. I § 12; N.C. CONST. art. I § 20; N.D. CONST. art. I § 8; OHIO CONST. art. I § 14; OKLA. CONST. art. II § 30; OR. CONST. art. I § 9; PA. CONST. art. I § 8; R.I. CONST. art. I § 6; S.C. CONST. art. I § 10; S.D. CONST. art. VI § 11; TENN. CONST. art. I § 7; TEX. CONST. art. I § 9; UTAH CONST. art. I § 14; VT. CONST. CH. 1, art. I § 11; VA. CONST. art. I § 10; WASH. CONST. art. I § 7; W. VA. CONST. art. III § 6; WIS. CONST. art. I § 11; WYO. CONST. art. I § 4. 260. Employee Polygraph Protection Act of 1988, 29 U.S.C. §§ 2001–2009 (2012). 261. Americans with Disabilities Act, 42 U.S.C. § 12112 (2012). 262. Genetic Information Nondiscrimination Act of 2008, 42 U.S.C. § 2000ff-1 (Supp. II 2008). 263. See, e.g., CAL. CONST. art. I § 1; Luck v. S. Pac. Transp. Co., 267 Cal. Rptr. 618, 627-28 (Cal. Ct. App. 1990) (forcing employee to offer urine sample violated her right of privacy as articulated in state constitution). 264. See, e.g., CAL. CIV. CODE § 56.20 (West 2013) (providing standards of confidentiality regarding employee medical records); CONN. GEN. STAT. §§ 31-51t to -51aa (2012) (regulating an employer’s right to enforce drug testing of current employees in the private sector); HAW. REV. STAT. § 378-26.5(5) (2013) (making it unlawful for an employer “to [u]tilize any device that intrudes into any part or cavity of the body for the purpose of truth verification”); MASS. GEN. LAWS ch. 214, § 1B (2013) (protecting an individual from “unreasonable, substantial or serious interference with his privacy”); see generally Wefing, supra note 23 (comparing drug testing policies of public employers with that of private employers). 265. See RESTATEMENT (SECOND) OF TORTS § 652A-E (1977) (listing the types of torts grounded in the right of privacy). See e.g., GA. CODE. ANN. § 16-11-62(1) (2013) (prohibiting by law any form of eavesdropping or surveillance performed in a “clandestine manner”); West v. Media Gen. Convergence, Inc., 53 S.W.3d 640 (Tenn. 2001) (recognizing the tort of false light invasion of privacy). 994 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 one of these areas by virtue of the employer’s power of discharge might plausibly give rise to a cause of action, particularly where some recognized facet of public policy is threatened.266 Some courts have recognized a privacy-based PPE cause of action. In some cases, courts have merely drawn on statutory sources,267 but sometimes they have drawn, at least in part, on constitutional interests.268 These courts have often engaged in a balancing-of-interests approach, weighing the privacy interests of the employee with the legitimate business interests of the employer.269 In the context of drug testing, for example, courts have been willing to recognize a wrongful discharge claim where a mandatory drug-testing policy tested for drug use outside the workplace and work hours, was not based on individualized suspicion, and did not involve sensitive safety-related positions.270 These factors are also central to the Supreme Court’s Fourth Amendment analysis of government-imposed drug testing programs on public employees.271 Similarly, some courts have recognized a privacy-related PPE cause of action where plaintiffs 266. Borse v. Piece Goods Shop, Inc., 963 F.2d 611, 622 (3d Cir. 1992) (quoting Geary v. U.S. Steel Corp., 456 A.2d 174, 180 (Pa. 1974)). The Third Circuit actually had rejected use of the Fourth Amendment as a source for public policy, but acknowledged that the privacy concerns under state tort law and the Constitution were similar. See id. at 621 n.10. 267. See, e.g., Doyon v. Home Depot USA, Inc., 850 F. Supp. 125 (D. Conn. 1994) (private employer's post-accident drug-testing policy violated statutory provision prohibiting employers from requiring an employee to submit to urinalysis testing without reasonable suspicion). 268. See, e.g., Luedtke v. Nabors Alaska Drilling, Inc., 768 P.2d 1123, 1130 (Alaska 1989); Hennessey v. Coastal Eagle Point Oil Co., 609 A.2d 11, 16-17 (N.J. 1992); Twigg v. Hercules Corp., 406 S.E.2d 52, 55 (W. Va. 1990). 269. Twigg, 406 S.E.2d at 55-56; but see Jennings v. Minco Tech. Labs, Inc., 765 S.W.2d 497, 502 (Tex. App. 1989) (rejecting a balancing approach, and holding drug testing within an employer’s prerogative). The analysis is different, and more employee-favorable, in California, where the state constitution’s privacy right actually applies directly to private employers. See Kraslawsky v. Upper Deck Co., 65 Cal. Rptr. 2d 297 (1997) (state constitutional guarantee of the right to pursue and obtain privacy creates a right of action against private as well as government entities). Some cases have also recognized a PPE cause of action against employee drug testing based on non-constitutional statutory sources. See, e.g., Doyon, 850 F. Supp. at 125 (private employer's post-accident drug testing policy violated statutory provision prohibiting employers from requiring an employee to submit to urinalysis testing without reasonable suspicion). 270. Compare Luedtke, 768 P.2d at 1123 (rejecting PPE claim where plaintiffs performed safety-sensitive jobs), with Twigg, 406 S.E.2d at 55 (accepting PPE claim because the positions did not involve safety and the employer lacked “reasonable good faith objective suspicion”). Cf. Borse, 963 F.2d at 625-26 (these factors were relevant and probative but their absence was not necessarily fatal to a private employer’s mandatory drug testing policy). 271. See Skinner v. Ry. Labor Execs.’ Ass’n, 489 U.S. 602, 603, 624 (1989) (justifying employee drug tests by asserting the government’s interest in regulating “safety-sensitive tasks” which outweighs the “requirement of individualized suspicion”). 2014] COMPANY CONDUCT 995 challenged employer policies mandating polygraph testing272 and personal property searches.273 Not all PPE claims involving employee drug testing have been successful. Sometimes, the court explicitly rejects a constitutional privacy right as a basis for a PPE claim.274 In others, the court examines only statutory sources of public policy before rejecting the employee’s claim.275 As a general matter, the privacy right would normally not extend to information reasonably related to activity at the workplace for which the employer would have a legitimate business interest, especially where the investigative methods were not overly intrusive. For example, a federal district court in Pennsylvania rejected a privacybased PPE claim brought by an employee fired after an allegedly intrusive investigation of a personal matter, an alleged affair with a coworker.276 Noting that the employer confined its investigation to interviewing other employees and examining company records, the court found that the employer’s methods were reasonable and rejected the wrongful discharge claim.277 Furthermore, although it declined to use constitutional principles as evidence of public policy, the Third Circuit has analyzed privacy issues (based on common law privacy torts) as affected by employer drug-testing policies.278 The court found an employer’s policy requiring employees to provide urine samples for drug screenings to be a significant intrusion of privacy.279 This was both because of the extremely intrusive manner in which a urine sample is collected, and because urine samples can yield “a host of private medical facts about an employee,” together creating a very strong expectation of privacy.280 272. See, e.g., Leibowitz v. H.A. Winston Co., 493 A.2d 111, 115 (Pa. Super. Ct. 1985). 273. See, e.g., Borse, 963 F.2d at 625. 274. See, e.g., Wilkinson v. Times Mirror Corp., 264 Cal. Rptr. 194 (Cal. Dist. Ct. App. 1989) (private employer's offer of employment conditional on submission to the drug test not a violation of the right to privacy under the state constitution); Hennessey v. Coastal Eagle Point Oil Co., 589 A.2d 170, 176 (N.J. Super. Ct. App. Div. 1991), aff’d, 609 A.2d 11 (N.J. 1992) (declining to apply federal and state constitutional privacy protections to private employers); Stein v. Davidson Hotel Co., 945 S.W.2d 714, 718 (Tenn. 1997) (no constitutionbased public policy protecting employees from random drug testing-based terminations). 275. See, e.g., Webster v. Motorola, Inc., 637 N.E.2d 203 (Mass. 1994) (holding private employer's universal drug testing program did not violate employee driver's statutory privacy rights); Folmsbee v. Tech Tool Grinding & Supply, Inc., 630 N.E.2d 586 (Mass. 1994) (holding private employer's universal drug testing program did not violate employee driver's statutory privacy rights). 276. Rogers v. Int’l Bus. Mach. Corp., 500 F. Supp. 867, 868 (W.D. Pa. 1980). 277. Id. at 870. 278. Borse, 963 F.2d 611. 279. Id. at 620-21. 280. Id. at 619-21. 996 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 Drawing again on statutory and case law protection for guidance, and analogizing to the free speech rules set out above, we propose Fourth Amendment-inspired contours to the PPE claim. Where an employee enjoys a reasonable expectation of privacy regarding particular information,281 an employer should not be able discharge an employee for failure to disclose such information unless it could reasonably affect productivity, or materially and substantially affect the work environment. For example, for drug testing, intrusive employee questionnaire inquiries, or searches of personal areas owned by the employee like the employee’s car or purse, the employer must have some form of individualized suspicion that the “search” will uncover information relevant to actual employer interest. In the case of drug testing, individualized suspicion would not be required if the employment positions involved were safety-related. In like manner, the level of individualized suspicion required in any manner might decline for particularly sensitive positions, e.g., inquiries into an employee’s financial affairs for positions entrusting employees with large sums of money. 3. Equal Protection The Fourteenth Amendment’s guarantee of “equal protection” is another substantive right that quite logically translates to the private work sphere. The salience of employment discrimination issues is obvious, as demonstrated by the plethora of federal and state statutes providing protection against various types of employment discrimination. There is no serious question that all states have a strong public policy against invidious discrimination in employment, at least with respect to such commonly protected categories as race, color, creed, national origin, and sex.282 There is a widespread societal consensus that such types of discrimination are invidious.283 While disapproval of these other types of discrimination may not be as 281. This “reasonable expectation of privacy” is a well-recognized concept in Fourth Amendment jurisprudence. Katz v. United States, 389 U.S. 347, 360 (1967) (Harlan, J., concurring). Courts applying the PPE as suggested above would be able to draw upon a rich body of analogous case law to help make the initial determination of whether an employee had such an expectation of privacy. 282. See, e.g., 42 U.S.C. § 2000e-2 (2006) (declaring the discharge or refusal to hire on the basis of “race, color, religion, sex, or national origin” an “unlawful employment practice”); LA. CONST. art. I, § 12 (all prohibiting discrimination on the basis of race, religion, or nationality); MICH. COMP. LAWS § 37.2202 (2013); OHIO REV. CODE ANN. § 4112.02 (2013). 283. E.g., Frank Newport, Little “Obama Effect” on Views About Race Relations, GALLUP (Oct. 29, 2009), http.//www.gallup.com/poll/123944/Little-Obama-Effect-on-RaceRelations.aspx (addressing views on equal job opportunities, or the lack thereof, among non-whites); Regina Corso, Three in Five Americans Say U.S. Has Long Way to Go to Reach Gender Equality, THE HARRIS POLL (Aug. 16, 2010), http://www.harrisinteractive.com/News Room/HarrisPolls/tabid/447/ct/ReadCustomDefault/mid/1508/ArticleId/452/Default.aspx (addressing views on gender equality in the workplace). 2014] COMPANY CONDUCT 997 longstanding, both age discrimination and disability discrimination should probably also be counted as categories for which there is a clear policy of nondiscrimination.284 Moreover, the rights of women are implicated whenever employers engage in sexual harassment. Although such cases are normally resolved by reference to federal or state antidiscrimination statutes, procedural issues or the absence of statutory protection due to the small size of an employer may leave a common law claim like the PPE as the only available course.285 And, courts have recognized PPE claims in the context of sexual harassment.286 There also would seem to be no reason to exclude racial or religious harassment from coverage under the PPE. For commonly recognized workplace harassment claims, the PPE seems appropriate where necessary to vindicate constitutional principles regarding sex discrimination. Indeed, in this general area of employment discrimination, statutory remedies may be so abundant that they may very well “crowd out” much of the use of the PPE. In Georgia, an appellate court held that the absence of state statutory protection for pregnancy discrimination ruled out recognition of a wrongful discharge cause of action on that ground.287 However, in Vermont, the state’s highest court ruled that the absence of state statutory protection against age discrimination did not prevent recognition of a common law PPE action.288 In addition, Washington’s Supreme Court recognized a wrongful discharge claim based on sex discrimination where the employer had too few employees to fall within the state’s otherwise applicable antidiscrimination statute.289 Even though the state had recognized a public policy of protecting small businesses by limiting statutory remedies against them, the state Supreme Court allowed a sexdiscrimination-based PPE claim to proceed against a small business.290 The court noted salient differences between the statutory and common law causes of action: only the former provided for adminis284. See, e.g., Age Discrimination in Employment Act, 29 U.S.C. § 631(a) (2012) (forbidding discrimination against anyone at least forty years of age); Americans with Disabilities Act, 42 U.S.C. § 12112 (2012) (stating that a “covered entity shall not discriminate against a qualified individual on the basis of disability”); GA. CODE ANN. § 34-6A-4 (2013); OR. REV. STAT. § 659A.112 (2013) (all generally forbidding employer discrimination based on certain disabilities); VA. CODE ANN. § 51.5-41 (2013); Payne v. Rozendaal, 520 A.2d 586, 589 (Vt. 1986) (“[D]ischarge . . . solely on the basis of age is a practice so contrary to our society’s concern for providing equity and justice that there is a clear and compelling public policy against it.”). 285. See, e.g., Collins v. Rizkana, 652 N.E.2d 653, 660-61 (Ohio 1995). 286. Id. at 660-62. 287. Borden v. Johnson, 395 S.E.2d 628, 629-30 (Ga. Ct. App. 1990). 288. Payne, 520 A.2d at 593-94. 289. Roberts v. Dudley, 993 P.2d 901, 909-11 (Wash. 2000). 290. Id. at 908; Griffin v. Eller, 922 P.2d 788, 792 (Wash. 1996). 998 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 trative proceedings, attorney fee remedies, and potential liability for adverse employment action other than full termination.291 Certainly, the availability of a PPE cause of action under common law could help a wronged employee where a state or federal statute covers the same type of discrimination, i.e., the same protected class, but the common law claim provides better remedies, has a more forgiving limitations period, or allows suit against small employers with too few employees to be statutorily covered.292 Moreover, the availability of the PPE also might be desirable if the protected class in question is not covered by statute. For example, suppose an employer fires a worker for living with a romantic partner without being married, or for having children out of wedlock. Or, suppose the employer discriminates against the employee because the employee had been born out of wedlock, or because the employee proceeded to marry someone the employer disapproved of against the employer’s advice. In some jurisdictions, this might be covered by statutes barring discrimination on the basis of marital status.293 However, in most states, no statutory relief would be available.294 Such are prime examples of the importance of using constitutional principles as evidence of public policy. The Supreme Court has long held that government discrimination against children of unmarried parents violates the Equal Protection Clause,295 and has subjected such types of discrimination to heightened, so-called “intermediate,” scrutiny.296 It also has held that a combination of sex plus marital discrimination violates the Equal Protection Clause.297 Further, the Court has held that marriage is a “fundamental right.”298 It might very well be the case that, despite the absence of any substantive statutory protection for that type of discrimination, an employee fired under any of the circumstances described above could 291. Id. at 911. 292. See supra Part IV. 293. See, e.g., MASS. GEN. LAWS ch. 151B, § 4 (2013); MINN. STAT. § 363A.08 (2013); OR. REV. STAT. § 659A.030 (2013) (all prohibiting employment discrimination based on marital status). 294. Federal antidiscrimination law does not provide employment discrimination protection on the basis of marital status. See 42 U.S.C. § 2000e-2 (2012) (Title VII bars discrimination on the basis of race, color, religion, sex, or national origin). 295. See, e.g., N.J. Welfare Rights Org. v. Cahill, 411 U.S. 619, 620-21 (1973); Weber v. Aetna Cas. & Sur. Co., 406 U.S. 164, 175-76 (1972). 296. United States v. Virginia, 518 U.S. 515, 570-71 (1996) (analyzing “intermediate scrutiny” as an inquiry into whether a statutory classification is “substantially related to an important governmental objective”). 297. Weinberger v. Wiesenfeld, 420 U.S. 636, 652-53 (1975) (holding that a statute that treats widower less favorably than widows is an invalid “sex plus marital status” type of discrimination). 298. Zablocki v. Redhail, 434 U.S. 374, 381 (1978); Loving v. Virginia, 388 U.S. 1, 11 (1967). 2014] COMPANY CONDUCT 999 make out a PPE claim, using constitutional principles as a basis.299 Under such circumstances, the constitutionally-inflected common law claim would actually expand the scope of protected categories from those listed in the applicable antidiscrimination statutes. Rather than deviating from analogous statutes in such procedural ways as statute of limitations or types of remedies available, this use of the PPE would depart from an analogous statute in substance. If successful, such a use of the PPE might have a dramatic effect on the gay rights debate. Many states, like the federal government, lack any statutory protection for employees discriminated against because of their sexual orientation. However, governmental discrimination against homosexuals has come under fire from the Supreme Court in recent decades, and this past year’s decisions have only increased the pressure.300 Such decisions, plus the large number of lower court decisions striking down anti-gay discrimination,301 may establish a strong public policy against discrimination on the basis of sexual orientation, such that discharging a private employee would create wrongful discharge liability. 4. Free Exercise The Free Exercise Clause prevents the government from interfering in the worship practices of individuals.302 At a minimum, it cre299. However, at least one court rejected a PPE claim alleging termination because the employee had married a coworker, rejecting the idea that an employee had a right to marry the person of their choice free of employer action. McCluskey v. Clark Oil & Ref. Corp., 498 N.E.2d 559, 561 (Ill. App. Ct. 1986). 300. See United States v. Windsor, 133 S. Ct. 2675, 2693 (2013) (invalidating on equal protection and federalism grounds a provision of a federal statute denying federal benefits to same-sex couples legally married in their home state); Lawrence v. Texas, 539 U.S. 558, 578 (2003) (invalidating on substantive due process grounds a statute criminalizing same-sex sodomy); Romer v. Evans, 517 U.S. 620, 635 (1996) (invalidating on equal protection grounds a state constitutional amendment which barred local jurisdictions from passing gay rights ordinances). 301. See, e.g., MacDonald v. Moose, 710 F.3d 154, 166 (4th Cir. 2013) (concluding that statute prohibiting sodomy between two persons is facially unconstitutional); Finstuen v. Crutcher, 496 F.3d 1139, 1156 (10th Cir. 2007) (declaring Oklahoma's adoption statute unconstitutional under the Full Faith and Credit Clause because it denied recognition to valid out-of-state adoptions by same-sex couples); Perry v. Schwarzenegger, 704 F. Supp. 2d 921, 1003 (N.D. Cal. 2010) (state’s same-sex marriage ban violated both federal equal protection and due process); Jegley v. Picado, 80 S.W.3d 332, 353 (Ark. 2002) (determining that a statute prohibiting certain sexual conduct between members of same sex violated the fundamental right to privacy and equal protection clause of the state constitution); Goodridge v. Dep’t of Pub. Health, 798 N.E.2d 941, 969 (Mass. 2003) (granting same-sex couples the protections, benefits, and obligations of civil marriage on equal protection grounds). 302. Thomas Berg, Free Exercise of Religion, in THE HERITAGE GUIDE TO THE CONSTITUTION 309-11 (Edwin Meese III et al. ed., 2005) (summarizing the Free Exercise Clause as protecting a person’s religiously motivated conduct and belief from government action); see also Emp’t Div., Dep’t of Human Res. of Or. v. Smith, 494 U.S. 872, 877 (1990) (defining the free exercise of religion as “the right to believe and profess whatever religious doctrine one desires”). 1000 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 ates a clear and substantial public policy against religious discrimination, one which is mirrored in federal and state statutes barring religious discrimination in employment.303 If use of the Free Exercise Clause in the PPE did no more than this, it would not contribute much, since antidiscrimination statutes of this type are so widespread. However, as with the Equal Protection Clause discussed above, it could provide the basis for a PPE claim in those instances where the comparable statute(s) do not apply, e.g., where the employer is too small for statutory coverage, or where the plaintiff seeks a different remedy from the one provided by the statute. Beyond that, its greatest impact might be to protect employees who are fired for refusing to engage in worship practices. If an employer holds weekly prayer services during working hours, can it require employee attendance on pain of termination? A Free Exercise Clause-inspired PPE would suggest not. 304 Such a PPE cause of action would have to give way if the employer were itself a religious organization. Antidiscrimination statutes often create exemptions for religious organizations, which are allowed to favor coreligionists, or even exclude persons outside the faith, when hiring for certain positions. These exemptions are motivated, in significant part, by a desire to avoid interfering in the Free Exercise interests of the religious organization employers.305 Another scenario would cover an employee dismissed for engaging in non-disruptive worship practices, either on or off premises. For example, consider an employer who employs many Muslims, and treats them the same as non-Muslims, but does not permit them to pray on prayer mats during the day, even if they are on break; or, an employer who has many Jewish employees, but does not permit them to wear yarmulkes because he bars all employees from wearing headgear of any kind. They may not be guilty of religious discrimination, but they may be interfering with the employees’ rights to worship as they see fit. Of course, this is one scenario where antidiscrimination statutes may provide more protection than the PPE. Title VII, and many comparable state statutes, require that employers provide a “reasonabl[e] 303. For examples of state statutes prohibiting employment discrimination based on religion, see NEB. REV. STAT. § 23-2513 (2012); OR. REV. STAT. § 659A.003 (2013); TEX. LAB. CODE ANN. § 21.125 (West 2013); UTAH CODE ANN. 1953 § 34A-5-106 (West 2013). 304. Of course, such a situation might already be covered under a “forced speech” theory. See supra Part V.A.1. 305. Hosanna-Tabor Evangelical Lutheran Church & Sch. v. EEOC, 132 S. Ct. 694, 710 (2012) (holding that the Free Exercise Clause required the “ministerial exception” to bar teacher from suing her school under workplace discrimination laws). 2014] COMPANY CONDUCT 1001 accommodat[ion]” of employee religious practices.306 Thus, the employer might be required to take affirmative steps to make exemptions for a particular employee so as to avoid a substantial burden on that employee’s religious practices. Thus, if there were an otherwise neutral dress code which did not permit men to wear head garments indoors, an employer might be required to exempt men wearing turbans or yarmulkes for religious reasons.307 This is not the case under the Free Exercise Clause, where the rule is that the government has no obligation to modify neutral laws of general application, even if their effect is to place a substantial burden on religious practice.308 If the PPE followed the contours of the constitutional right in this manner, it would not require reasonable accommodations for religious employees. If this were in fact the rule, it arguably addresses the concern that this application of the PPE would be too burdensome on employers. C. Closer Cases The constitutional provisions discussed immediately above are strong candidates for inclusion in a PPE analysis. The provisions discussed below also represent very important liberty interests, but are controversial enough, or sufficiently ill-defined, to warrant caution regarding their usage by courts adjudicating PPE claims. 1. Reproductive Rights And Gender The Due Process Clause gives rise not only to procedural due process protections, but substantive due process protections as well. More specifically, there is a long line of cases stemming from the early to mid-twentieth century where the Supreme Court recognized a right of “privacy” that protects individuals from state intrusions into certain deeply private decisions. These decisions include both basic ones about whether to bear children,309 and also, those involving chil- 306. See 42 U.S.C. § 2000e(j) (2012); see also D.C. CODE § 1-607.01 (2013) (mandating reasonable accommodation for the free exercise of religion); TEX. LAB. CODE ANN. § 21.108 (West 2013) (prohibiting religious discrimination unless reasonable accommodation unduly burdens the employer). 307. See, e.g., EEOC v. Reads, Inc., 759 F. Supp. 1150, 1158 (E.D. Pa. 1991) (describing “religious garb” as falling within the ambit of statutory protection). 308. See Emp’t Div., Dep’t of Human Res. of Or. v. Smith, 494 U.S. 872, 879 (1990) (holding that neutral laws of general applicability do not implicate the Free Exercise clause). 309. Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965) (invalidating statute prohibiting the use of birth-control devices by holding that the penumbras of the guarantees in the Bill of Rights create “zones of privacy”); Skinner v. Oklahoma, 316 U.S. 535, 541-42 (1942) (striking down a forced sterilization act while addressing marriage and procreation as being “fundamental to the very existence and survival of the race”). 1002 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 drearing,310 family living arrangements,311 and intimate relations.312 The strength of these rights is bolstered by statutes that protect against discrimination on the basis of marital status.313 Within the general area of substantive due process, one area ripe for PPE analysis is the area of reproductive rights. In a variety of cases around the country, wrongful discharge plaintiffs have claimed they were fired for having abortions.314 Most of these cases either went unresolved or were settled.315 The array of statutory remedies for persons in this situation is unclear. Employees discriminated against for having abortions likely have a claim under the Pregnancy Discrimination Act (PDA).316 The Third and Sixth Circuits have so held,317 and the EEOC regulations so indicate.318 This right, apparently, also extends to adverse employment actions taken because an employee merely considers having an abortion.319 A related potential issue involves an employer taking an adverse action against an employee for not having an abortion. Such an employer may prefer that the employee not bring the pregnancy to term for practical reasons: for example, out of fear the employee will ask for maternity leave and flexible hours, and/or will not be able to devote the same energy to the job. Or, the employer may disapprove of the employee becoming pregnant out of wedlock, or through an illicit affair. Several state courts have recognized the PPE for pregnancy discrimination. Both Washington and California have recognized such 310. Pierce v. Soc’y of Sisters, 268 U.S. 510, 534-35 (1925) (rejecting statute requiring all children to attend public elementary school); Meyer v. Nebraska, 262 U.S. 390, 399 (1923) (finding statute requiring all classes to be taught in English unconstitutional under a substantive due process analysis). 311. Village of Belle Terre v. Boraas, 416 U.S. 1, 8 (1974) (upholding limitations on single-family dwellings to traditional families or to two or fewer unrelated persons). 312. Lawrence v. Texas, 539 U.S. 558, 578 (2003) (holding that intimate consensual sexual conduct was part of the liberty protected by substantive due process). 313. See, e.g., Federal Equal Credit Opportunity Act, 15 U.S.C. § 1691 (2012); ALASKA STAT. § 18.80.220 (2013) (both making it unlawful for employers to discriminate on the basis of, inter alia, marital status). 314. Noble, supra note 9. Not all such cases were resolved, id., and at least one was resolved through confidential settlement. See Craver, supra note 9. 315. Noble, supra note 9. 316. See 42 U.S.C. § 2000e-2(a)(1) (2012) (barring sex discrimination); see also § 2000e(k) (defining sex discrimination to include discrimination on account of “pregnancy, childbirth, or related medical conditions”). In 1978, Congress passed the Pregnancy Discrimination Act as an amendment to Title VII. See Turic v. Holland Hospitality, Inc., 85 F.3d 1211, 1213 (6th Cir. 1996). 317. Doe v. C.A.R.S. Prot. Plus, Inc., 527 F.3d 358, 364 (3d Cir. 2008); Turic, 85 F.3d at 1214. 318. 29 C.F.R. § 1604 app. (2013). 319. Turic, 85 F.3d at 1214. 2014] COMPANY CONDUCT 1003 claims, drawing from their state constitutions to derive the requisite public policy where the employer’s small size made the relevant state statute inapplicable.320 By contrast, an intermediate appellate court in Georgia rejected such a pregnancy discrimination PPE claim, reasoning that courts generally should defer to the legislature in deciding what public policies could trump the general rule of at-will employment.321 Perhaps cognizant of the PDA, the Georgia opinion refers to the fact that in addition to state statutes, there are unspecified “federal statutes” that also limit the at-will doctrine.322 But the extent to which such federal statutes should inform the “public policy” analysis for PPE purposes, the court reasoned, is a decision best left to the state legislature.323 This seems to be a proper area for the PPE. The constitutional right of persons to make decisions about reproduction has a long lineage. Early in the twentieth century, the Supreme Court recognized an unenumerated federal constitutional right to decide to reproduce free from government interference.324 The Court extended the protection for the right to reproduce to the decision not to reproduce, guaranteeing a right of access to contraception.325 In order to recognize such rights despite their not being expressly laid out in the Constitution’s text, the Court had to find that these rights were “fundamental,” i.e., that they were “implicit in the concept of ordered liberty.”326 Forty years ago, the Court recognized that the constitutional right to decide not to reproduce extended to the decision to have an abortion, a right which was reexamined and reaffirmed twenty years later and which is still recognized today.327 Given the long history of reproductive rights, 320. Badih v. Myers, 43 Cal. Rptr. 2d 229, 293 (Cal. Dist. Ct. App. 1995); Roberts v. Dudley, 993 P.2d 901, 911 (Wash. 2000). 321. Borden v. Johnson, 395 S.E.2d 628, 629 (Ga. Ct. App. 1990). 322. Id. 323. Id. 324. See Skinner v. Oklahoma, 316 U.S. 535, 541 (1942) (invalidating law providing for forced sterilization of recidivist offenders). 325. See Carey v. Population Servs. Int’l, 431 U.S. 678, 694 (1977) (extending this right to persons over age sixteen); Eisenstadt v. Baird, 405 U.S. 438, 453 (1972) (extending this right to unmarried couples); Griswold v. Connecticut, 381 U.S. 471, 485-86 (1965) (recognizing this right for married couples). 326. Washington v. Glucksberg, 521 U.S. 702, 703 (1997) (citing multiple Supreme Court cases using this phrase). The Court has used several different formulations of this test for being a “fundamental” right. See id. at 721 (observing fundamental rights to be “deeply rooted in this Nation's history and tradition”); see also Planned Parenthood of Se. Pa. v. Casey, 505 U.S. 833, 851 (1992) (noting that these fundamental rights “involv[e] the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy”). 327. See Casey, 505 U.S. at 869-74 (reaffirming the core holding of Roe regarding the right to an abortion, and adopting an “undue burden” test for all restrictions on abortion prior to fetal viability); Roe v. Wade, 410 U.S. 113, 153 (1973) (holding a constitutional right to abortion). 1004 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 it seems a good candidate for the kind of public policy which courts can rely on to protect at-will employees under the common law. As a matter of constitutional rights, it should make no difference whether the right in question is the right to bear a child or not to bear a child. The Court has made clear that among the most fundamental rights is the “decision whether to bear or beget a child.”328 Arguably, though, abortion may be properly separated from the rights to be pregnant or to use contraception. Because a difficult moral question exists as to exactly when a fetus becomes a “person,” it is distinct. This philosophical question is still largely unresolved in our society, making abortion rights extremely controversial. For this reason, perhaps courts should be cautious about wading into this area with the PPE. Further, because so many people have strongly held religious beliefs about abortion, court-imposed limits on employers via the PPE might trigger constitutional issues about the employers’ own religious freedom rights.329 If an employer considers abortion to be murder, perhaps it should not be required to (from its viewpoint) support murderers by employing them. Indeed, the awkwardness of continued employment after the abortion would seem most acute in small firms with only a few employees, where employer and employee likely personally interact. These are precisely the types of firms where the PPE might be most relevant, given its utility as a backup where statutory remedies are unavailable. The solution may be to recognize abortion rights only narrowly through the PPE. Under current precedent, a constitutional right to abortion exists only before fetal viability.330 Outside that period, the right exists only where necessary to protect the woman from serious threats to life or health.331 Public opinion polls show a consistent majority of Americans favor abortion rights, at least during the very early stages of pregnancy.332 But such support drops during later stages of the pregnancy.333 If PPE protection were to exist for abortion at all, 328. Eisendstadt, 405 U.S. at 453. 329. See Michael Dichiara, A Case of First Impression: The Third Circuit Recognizes that Having an Abortion Is Protected by Title VII, 33 RUTGERS L. REC. 12, 14-15 (2009) (raising this concern with respect to statutory protection for employment discrimination targeting abortion). 330. Casey, 505 U.S. at 846. 331. Id. 332. Abortion, GALLUP HISTORICAL TRENDS (May 13, 2014), http://www.gallup.com/poll/ 1576/abortion.aspx (over 60% of Americans believed abortions should be legal in the first trimester; percentage dropped to less than 30% with respect to the second trimester). 333. Lydia Saad, Majority of Americans Still Support Roe v. Wade Decision, GALLUP (Jan. 22, 2013), http://www.gallup.com/poll/160058/majority-americans-support-roe-wadedecision.aspx (acknowledging that “support drops off sharply, to 27%, for second-trimester abortions, and further still, to 14%, for third-trimester abortions”). 2014] COMPANY CONDUCT 1005 it should be limited to abortions taking place to prevent serious and legitimate health risks to women, or which take place relatively early on during pregnancy. 2. Substantive Due Process A Native-American sales clerk wears shoulder-length hair as an expression of his identity and spirituality. His private employer, a grocery store, orders him to cut his hair; when he refuses, it fires him. Does the employee have any legal remedy? The Alaska Supreme Court said no, rejecting a claim that the employee had any right of privacy or free expression as against a private employer, given the constitutional requirement of state action.334 The court resolved the issue by rejecting the threshold notion that constitutional principles had any analogous relevance to the PPE’s regulation of purely private conduct. But the case presents an interesting test for the use of substantive due process as a source of policy under the PPE.335 Substantive due process doctrine suggests that there exist certain individual rights that are so fundamental that the state may not burden them, even if they are not expressly enumerated in the text of the Constitution.336 Substantive due process is controversial precisely because it is open-ended. The recognition of rights untethered to constitutional text creates the potential for subjective “judicial activism.”337 Thus, with the exception of those reproductive rights like contraception for which there has emerged a sound and broad judicial and public opinion consensus, courts should not use substantive due process as a “catch-all” measure to broaden the PPE, lest the exception swallow the rule and all non-merit-related grounds for termination become invalid violations of an employee’s right to be free from arbitrary action. If at-will employment is to retain any robust meaning, 334. Miller v. Safeway, Inc., 102 P.3d 282, 288-90 (Alaska 2004). 335. One can safely put aside consideration of this as a Free Speech issue. Where conduct as opposed to pure speech is concerned, the First Amendment’s Free Speech Clause affords no protection unless the conduct is properly considered “expressive conduct.” Here, while the Native American may have intended his long hair to express an idea, it may not be the case that most people would reasonably interpret the long hair as principally expressive. See Texas v. Johnson, 491 U.S. 397, 409 (1989) (defining “expressive conduct” under the First Amendment so as to require that persons would reasonably interpret the conduct as being expressive). 336. See James W. Ely Jr., Due Process Clause, in THE HERITAGE GUIDE TO THE CONSTITUTION 395 (Edwin Meese III et al. ed., 2005) (describing these fundamental rights to be “beyond the reach of government”). 337. See Luís Roberto Barroso, The Americanization of Constitutional Law and its Paradoxes: Constitutional Theory and Constitutional Jurisdiction in the Contemporary World, 16 ILSA J. INT'L & COMP. L. 579, 580, 599-604 (2010) (using this term to describe an era in which “contemporary democracies” sought to advance rights not listed in the Constitution). 1006 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 employers must be able to fire people for irrational, arbitrary, idiosyncratic, even quirky reasons, as long as those reasons do not threaten broadly, strongly recognized rights.338 3. Second Amendment Another candidate for the PPE is the Second Amendment. Within the last few years, the Supreme Court has recognized that this Amendment does indeed guarantee a right to bear arms even for an individual with no connection to militia service.339 This right extends to the use of arms reasonably related to individual self-defense, and includes those arms, including handguns, which are not “dangerous and unusual weapons.”340 It applies to state governments as well as the federal government.341 While the Supreme Court cases to date have dealt with the use of guns in the home, credible arguments exist for protecting the right to carry arms outside the home into public areas to further the self-defense rationale.342 Should the PPE protect the right of employees to bring weapons to work? Courts are just beginning to address the general issue of the right to bear arms at work, and are split. In Mitchell v. University of Kentucky, the Supreme Court of Kentucky extended the PPE to the right to bear arms, finding wrongful discharge where a public university fired a properly licensed at-will employee for keeping a weapon in his car on university property in violation of university rules.343 In that case, conflicting statutes seemed to side with both employee and employer in this situation, and the court concluded, through a general 338. See Hunter v. Port Auth. of Allegheny Cnty. 419 A.2d 631, 634-35 (Pa. Super. Ct. 1980) (state constitutional provision protecting freedom to seek a livelihood prevented refusal to hire based on prior criminal convictions unrelated to job merit; though the employer was government agency, language suggests possible broader application); see also Fellhauer v. City of Geneva, 568 N.E.2d 870, 877 (Ill. 1991). 339. District of Columbia v. Heller, 554 U.S. 570, 635 (2008). 340. Id. at 627. 341. McDonald v. City of Chicago, 130 S. Ct. 3020, 3036-44 (2010). 342. United States v. Masciandaro, 638 F.3d 458, 467 (4th Cir. 2011) (“[T]here now exists a clearly-defined fundamental right to possess firearms for self-defense within the home. But a considerable degree of uncertainty remains as to the scope of that right beyond the home and the standards for determining whether and how the right can be burdened by governmental regulation.”); Michael P. O’Shea, Modeling the Second Amendment Right to Carry Arms (I): Judicial Tradition and the Scope of “Bearing Arms” for SelfDefense, 61 AM. U. L. REV. 585, 615 (2012) (interpreting Heller to suggest that “the defensive role for which handguns are uniquely suited—routine carry outside the home—is also constitutionally protected”). Cf. Scott v. Extracorporeal, Inc., 545 A.2d 334, 342-43 (Pa. Super. Ct. 1988) (declining to apply exception to asserted right of self-defense in workplace fistfight, deferring to management to assign responsibility to some or all participants in disruptive workplace altercations). 343. 366 S.W.3d 895, 903 (Ky. 2012). 2014] COMPANY CONDUCT 1007 review of still other statutes, that the termination violated Kentucky’s public policy.344 Although the employer in this case was a public entity, the court found a public policy that extended to private employers as well.345 The court did not rely expressly on the Second Amendment or a Kentucky Constitution provision; indeed, it said it would “refrain from reaching constitutional issues when other, non-constitutional grounds can be relied upon.”346 Since the employer was a state actor, this statement could merely indicate an unwillingness to interpret directly either the state or federal constitution; it may not explicitly address whether the court felt comfortable in drawing upon Second Amendment or related constitutional doctrines in reaching the PPE merits. Contrast Hansen v. America Online, Inc., where the Supreme Court of Utah rejected a similar claim involving the keeping of guns in an employer’s parking lot.347 The court looked to the Utah Constitution in evaluating the state’s public policy. That constitution did protect a right to bear arms, but did not specifically address rights of employees during working hours.348 Given the court’s general preference to apply the PPE “parsimoniously” in deference to the default at-will doctrine, it declined to extend the right to bear arms to the workplace.349 The two cases might be reconciled by noting that the Kentucky statutes provided protection for employees of private employers, whereas the legislative history of the Utah statutes suggested no application to private employers.350 However, the at-will-friendly Utah case arose before the U.S. Supreme Court decisions recognizing for the first time an individual right to bear arms,351 while the PPEfriendly Kentucky case arose afterwards. The difference may be simply due to evolving constitutional doctrine. A related issue arose in West Virginia, where the state supreme court recognized a PPE claim based on a policy guaranteeing a right of self-defense.352 In that case, the plaintiff was discharged for disarming a woman who was attempting to rob the employer’s premises, an act that violated company policy against interfering with a store robbery.353 The court looked to the state constitution, state statutes, 344. Id. at 900-03. 345. Id. at 901. 346. Id. at 898 (quoting Baker v. Fletcher, 204 S.W.3d 589, 597-98 (Ky. 2006)). 347. 96 P.3d 950, 956 (Utah 2004). 348. Id. at 953. 349. Id. at 954. 350. Compare Mitchell, 366 S.W.3d at 901, with Hansen, 96 P.3d at 954-55. 351. McDonald v. City of Chicago, 130 S. Ct. 3020, 3036-44 (2010); District of Columbia v. Heller, 554 U.S. 570, 635 (2008). 352. Feliciano v. 7-Eleven, Inc., 559 S.E.2d 713, 723-24 (W. Va. 2001). 353. Id. at 716. 1008 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 and West Virginia case law, finding the existence of a public policy favoring a right of self-defense.354 However, the court held that this right must be balanced against the employer’s legitimate interests in keeping order on its premises.355 Thus, firing an employee for defending himself creates a presumption of PPE wrongful discharge liability, but the employer may rebut that presumption by showing it had a legitimate business reason for the termination.356 This latter approach seems more reasonable, especially in the context of bringing guns to work. Although some states have recognized by statute a right of employees to bring weapons to work,357 in the absence of such statutes, there is a paucity of case law supporting such a right as a constitutional matter. That is not surprising, since reasonable people differ as to whether an employer has a legitimate interest in eliminating the risk of gunplay on its premises or preferring other means to ensure employee safety. Thus, standing on its own and without state statutory support, the Second Amendment, and similar constitutional provisions regarding the right to bear arms, seem unlikely candidates for the PPE.358 This may change, given that the law in this area is just beginning to take shape. For example, the Supreme Court has not yet established the applicable standard of review for Second Amendment rights. Nor has the Court determined what interest an employer has in regulating arms in the workplace. How the federal courts ultimately treat this employer interest will inform the development of the PPE with respect to the Second Amendment. VI. CONCLUSION Courts considering constitutional claims borrow from common law doctrine. There is no reason to treat with suspicion the reverse dynamic. Constitutional principles are compelling sources of our public policy. They stem from foundational principles embodying our most deeply held beliefs. They should certainly inform the analysis when courts apply the PPE to the at-will employment rule. 354. Id. at 718-22. 355. Id. at 723. 356. Id. at 723-24. 357. See, e.g., GA. CODE ANN. § 16-11-135 (2013) (certifying that private and public employers do not have the right to prohibit their employees from keeping lawful fir earms locked in their vehicles); VA. CODE ANN. § 15.2-915 (2012) (“[N]o locality shall adopt any workplace rule . . . that prevents an employee of that locality from storing at that locality’s workplace a lawfully possessed firearm and ammunition in a locked pr ivate motor vehicle.”). 358. See Gardner v. Loomis Armored Inc., 913 P.2d 377, 386 (Wash. 1996) (PPE claim succeeded where company fired security guard for violating company rule in order to save woman from life-threatening hostage situation). 2014] COMPANY CONDUCT 1009 But courts should be circumspect in applying to the private employment context constitutional principles designed to cabin abuses by government. In doing so, they should limit their gaze to constitutional rules creating rights held by individuals—rights which are clear, uncontroversial, and readily analogous to the situation of a private employee. Matters of free speech, Fourth Amendment privacy, and equal protection fall easily into this category. Criminal procedure rights, substantive due process concerns, and Second Amendment issues do not. Traditionally, business and employment law questions are viewed as inquiries distinct from, and perhaps more pragmatic than, the seemingly more abstract doctrines of constitutional law. The PPE provides a means for an open exchange of ideas between these two ostensibly distinct areas of the law. At the same time, the use of constitutional values in the PPE creates a fail-safe, a means of filling the gap left by statutory and contract theories to curb the most troubling employer abuses. Understandably, employers will be concerned about adding yet another set of grounds for employees to sue them. The employeremployee relationship is, and should remain, a business decision and the at-will doctrine, therefore, should not be undermined. However, if we are to continue recognizing a PPE—and we should, to curb the most outrageous subversions of public policy by employers while also acknowledging the economic vulnerability of employees—then it makes no sense to consider “lesser” sources of public policy but suddenly become shy about using the “greater” source of the Constitution. The law sets a floor for minimum fair treatment of employees. A properly robust, and properly selective, use of constitutional law to inform the PPE raises that floor where it could use some raising. 1010 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:945 MAKING ROOM FOR COOPERATIVE INNOVATION LIZA S. VERTINSKY ABSTRACT Patent law, created in response to a constitutional mandate to encourage innovation, may be discouraging important forms of cooperative innovation. Advances in technology have enabled new ways of pooling knowledge and computational capabilities, facilitating cooperation among many participants with complementary skills and motivations to collectively solve complex problems. But emerging models of cooperative innovation increasingly run into patent roadblocks. Why might patent law sometimes thwart instead of support socially beneficial cooperative innovation? The problem lies in the tensions between the market-based incentives that patent law creates and the mechanisms that support emerging models of cooperative innovation. The complexity and cost of solving contemporary public challenges are nudging diverse participants together to collectively build their knowledge, but patents often serve to keep them apart. While digital technologies enable new forms of massively distributed, open and collaborative intellectual production, patents threaten the vitality and even the viability of these promising types of innovation. In this Article I use two examples—the risk of crowding out crowd science and the battle between proprietary software companies and free open source software platforms—to illustrate how patent law in its current form may sometimes impede beneficial cooperation in innovation. I then suggest how we might limit the negative effects of patents in contexts of cooperative innovation without undermining the patent system. I. INTRODUCTION .................................................................................................. II. AN ALTERNATIVE WAY OF INNOVATING ............................................................ A. Distinct Features of Cooperative Innovation ............................................. B. Two Examples ............................................................................................ 1. Crowd Science: The Example of Foldit ................................................ 2. Open Source Software: The Example of Linux .................................... III. PATENT ROADBLOCKS ....................................................................................... IV. PATENT REMEDIES WITH COOPERATION IN MIND ............................................. A. Remedies Without Context ......................................................................... B. Principles for the Design of Remedies ........................................................ 1. First Principle ...................................................................................... 2. Second Principle .................................................................................. 3. Third Principle..................................................................................... V. CONCLUSION ..................................................................................................... 1067 1072 1073 1076 1076 1086 1095 1103 1103 1110 1112 1115 1121 1123 I. INTRODUCTION “In the long history of humankind (and animal kind, too), those who learned to collaborate and improvise most effectively have prevailed.”—Charles Darwin Systems of decentralized, massively distributed open innovation are emerging with increasing frequency and with the ability to harness new resources in powerful new ways.1 People with no prior in1. See, e.g., Yochai Benkler, Law, Policy, and Cooperation, in GOVERNMENT AND MARKETS: TOWARD A NEW THEORY OF REGULATION 299 (Edward J. Balleisen & David A. Moss eds., 2010); see also ERIC VON HIPPEL, DEMOCRATIZING INNOVATION (2005). For a list 1068 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 volvement in biotechnology contribute hours of their time to solve protein-folding puzzles posed by Foldit, an online video game that uses crowd science to solve complex scientific problems.2 Data gathered from volunteer bird watchers through the global orthinological network eBird are used to detect important environmental changes that might otherwise go unnoticed.3 The U.S. Air Force is harnessing collaborative online platforms to solicit input from students on complex technological problems,4 and the National Institute of Health is enlisting the help of citizen scientist volunteers to collect and analyze data from bacteria samples as part of the American Gut project.5 All of these processes of crowd science rely on cooperation among many participants with diverse motivations and skills to collectively and openly develop solutions to complex scientific or technological problems.6 Advances in technology have enabled greater computational capabilities and new ways of pooling knowledge. They have facilitated the growth of massively distributed open access innovation processes that rely upon voluntary participation by large numbers of people who bring with them a diversity of skills and perspectives.7 These participants share their ideas and discoveries openly with other members of the innovation community in order to collectively and cumulatively advance the innovation process. I refer to these kinds of innovation processes as “cooperative innovation.” Cooperative innovation can harness underutilized and unused human resources and combine existing disciplines and perspectives in new ways to solve previously intractable scientific problems. In some cases it may comof some crowd science projects, see Citizen Science, SCI. AM., http://www.scientific american.com/citizen-science/ (last visited Mar. 22, 2014). 2. See The Science Behind Foldit, FOLDIT, http://fold.it/portal/info/about (last visited Mar. 22, 2014). 3. Jim Robbins, Crowdsourcing, for the Birds, N.Y. TIMES (Aug. 19, 2013), http://www.nytimes.com/2013/08/20/science/earth/crowdsourcing-for-the-birds.html?page wanted=all&_r=0 (eBird aggregates data about bird sightings that could not be collected other than through individual observations and uses it to uncover changes in the environment). 4. Jane L. Levere, Air Force Asks Students to Solve Real World Problems, N.Y. TIMES (July 28, 2013), http://www.nytimes.com/2013/07/29/business/media/air-force-asks-stud ents-to-solve-real-world-problems.html. 5. See American Gut, HUMAN FOOD PROJECT, http://humanfoodproject.com/americangut/ (last visited Mar. 22, 2014). 6. While these and other examples of what I am calling “cooperative innovation” have important similarities, an equally important distinction can be drawn between projects that rely primarily on cooperative data gathering, such as in the eBird and American Gut project examples, and projects that involve cooperative problem solving and free sharing of ideas, such as the Foldit and U.S. Air Force examples. The concerns that I address in this paper apply most strongly to the latter cases, where at least some participants are engaging in more than collecting data, although the lines between activities that generate data and activities that lead to invention are often blurred. 7. See, e.g., VON HIPPEL, supra note 1; Benkler, supra note 1. 2014] COOPERATIVE INNOVATION 1069 plement existing modes of market-driven innovation, and in other cases it may challenge them, increasing competition in important areas of intellectual production.8 However, emerging models of cooperative innovation sometimes run into patent roadblocks. The problems that patents pose for cooperation in processes of innovation are becoming difficult to ignore.9 The patent litigation wars between major players in the smart phone industry such as Apple, Samsung, Google, and Microsoft illustrate the divisive role that patents can play in an industry that relies upon the shared development and use of technology standards to achieve interoperability, particularly when network effects are important. By some accounts Apple and Google now spend more on patent litigation than they do on R&D.10 These problems are even greater for systems of cooperative innovation such as open source software and crowd science. Open source software systems like Linux challenge proprietary products like Microsoft Windows in the marketplace, only to find their viability threatened by patent lawsuits.11 Ironically, the open source software community finds it necessary to spend substantial resources acquiring patents as a way of protecting free software use.12 While harder to detect and measure, the problems 8. Scholars such as Yochai Benkler have argued that cooperative innovation is valuable in itself, offering a way of democratizing innovation. In this article I am not arguing that cooperative innovation is better than existing approaches, or even that cooperation is always good. I am simply arguing that some kinds of cooperative innovation have the potential to increase social welfare and deserve a chance to compete with alternative approaches. 9. See, e.g., Rochelle Cooper Dreyfuss, Does IP Need IP? Accommodating Intellectual Production Outside the Intellectual Property Paradigm, 31 CARDOZO L. REV. 1437 (2010) (describing the need to change IP law to accommodate new forms of collaborative intellectual production); Aija Leiponen & Justin Byma, If You Cannot Block, You Better Run: Small Firms, Cooperative Innovation, and Appropriation Strategies, 38 RES. POL’Y 1478 (2009) (“Earlier research has emphasized patents and trade secrets as key strategies of appropriation, yet these strategies do not appear to be very beneficial for small firms engaged in cooperative innovation. These results raise policy questions regarding the functionality of the existing system of intellectual property rights.”); Mark A. Lemley, The Myth of the Sole Inventor, 110 MICH. L. REV. 709, 709 (2012); Katherine J. Strandburg, Evolving Innovation Paradigms and the Global Intellectual Property Regime, 41 CONN. L. REV. 861, 863-65 (2009) (arguing that current IP regimes are not designed to cope with changes in the innovative process). 10. See Charles Duhigg & Steve Lohr, The Patent, Used as a Sword, N.Y. TIMES (Oct. 7, 2012), http://www.nytimes.com/2012/10/08/technology/patent-wars-among-tech-giants-can-stif le-competition.html?pagewanted=all. 11. See Roger Parloff, Microsoft Takes on the Free World, FORTUNE (May 14, 2007, 9:35 AM), available at http://money.cnn.com/magazines/fortune/fortune_archive/2007/05/28/ 100033867/ (“Microsoft claims that free software like Linux, which runs a big chunk of corporate America, violates 235 of its patents. It wants royalties from distributors and users. Users like you, maybe.”). 12. See Clark D. Asay, Enabling Patentless Innovation, MD. L. REV. (forthcoming 2014) (manuscript at 47-48), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_ id=2289326); Keith Bergelt & William Wong, Interview: Keith Bergelt Discusses Open Invention 1070 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 that patents create for systems like Foldit that rely most heavily on non-market mechanisms might prove to be even more costly. Patents may interfere with the growth and vitality of these cooperative systems, limiting the opportunities that they provide for socially beneficial intellectual production. Scholars of innovation such as Yochai Benkler and Eric von Hippel have already challenged us to consider what changes to the design of the legal and institutional system are necessary to sustain cooperative innovation.13 They have identified intellectual property law, particularly patent law, as threatening the open, inclusive and collaborative nature of these systems. But they and other scholars following in their wake have left the precise contours and magnitude of the patent threats and specific proposals for patent law change for further study.14 This Article responds to the challenge by identifying and addressing specific ways in which patent law may interfere with non-market mechanisms that support cooperative innovation. It focuses on three mechanisms that play a critical role in systems of cooperative innovation: trust, benefit-sharing, and reciprocity.15 Patents interfere with these mechanisms by increasing incentives for group members to defect from the group and by increasing threats from third parties against the group. This can make it harder to sustain the intrinsic motivations and the related norms of trust and sharing that cooperative systems rely upon, as well as increasing the cost and risk of participation to potentially unsustainable levels. I argue that courts should take these negative effects into account when fashioning patent remedies in contexts of cooperative innovation.16 Network, ELEC. DESIGN (Mar. 6, 2014), http://electronicdesign.com/embedded/interview-keithbergelt-discusses-open-invention-network. 13. “Policymakers . . . can design institutions and social systems to foster cooperation by shaping social and psychological dynamics, rather than by focusing on individual incentives. The question then becomes, what aspects of the design of an institution or system— be it technical platform, legal rule, business process, or policy intervention—are likely to lead to a stable cooperative social dynamic?” Benkler, supra note 1, at 302; see also VON HIPPEL, supra note 1. 14. See Katherine J. Strandburg, Intellectual Property at the Boundary (N.Y.U. Sch. of Law Pub. Law & Legal Theory Res. Paper Series, Working Paper No. 13-60, 2013) (setting out an agenda for investigating how IP rules impact cooperative innovation systems). 15. While these basic mechanisms seem to capture important ways in which many cooperative systems operate, there are many other aspects of cooperative systems that distinguish them from market-based systems, including a rich variety of non-economic motivations and incentives for participating. For a discussion of the variety of incentives, as well as some of the mechanisms, driving open source software systems, see, for example, Stephen M. Maurer & Suzanne Scotchmer, Open Source Software: The New Intellectual Property Paradigm, in 1 HANDBOOK OF ECON. & INFO. SYS. 285 (Terrence Hendershott ed., 2006). 16. Preventing cooperation may, however, sometimes be socially desirable. See, e.g., F. Scott Kieff, On Coordinating Transactions in Intellectual Property: A Response to Smith’s Delineating Entitlements in Information, 117 YALE L.J. POCKET PART 101 (2007); Klaus 2014] COOPERATIVE INNOVATION 1071 The Article proceeds as follows. Part I explores the potential of cooperative innovation as an alternative to the traditional marketdriven approach. It provides two examples of cooperative innovation, crowd science and open source software, to illustrate both the power of cooperative systems and their vulnerabilities to patent threats. Part II examines how and why patents may create problems for cooperative innovation.17 Part III shows how patent law could be adapted to accommodate cooperative innovation through limited changes to patent remedies. It provides three principles for contextualizing patent remedies in ways that respond to and limit the costs of patents for socially beneficial cooperative innovation.18 These principles would be triggered and applied by the courts only in contexts of cooperative innovation,19 leaving other areas of patent law unchanged. Making room for cooperative innovation in this way will facilitate Kultti et al., Patents Hinder Collusion (Helsinki Ctr. of Econ. Res., Discussion Paper No. 144, 2007); see also Jonathan Barnett, Dynamic Analysis of Intellectual Property: Theory, Evidence and Policy (USC Gould Sch. of Law Ctr. in Law, Econ. & Org. Res. Papers Series, Research Paper No. C13-4, 2013) (noting that periods of weak patent protection may actually disadvantage new entrants). 17. See, e.g., Dreyfuss, supra note 9; see also Gregory N. Mandel, Left-Brain Versus Right-Brain: Competing Conceptions of Creativity in Intellectual Property Law, 44 U.C. DAVIS L. REV. 283 (2010) (noting IP law has failed to recognize insights from psychology, neurobiology and cultural research about how to promote creativity, resulting in laws based on distorting stereotypes of creativity); Gregory N. Mandel, To Promote the Creative Process: Intellectual Property Law and the Psychology of Creativity, 86 NOTRE DAME L. REV. 1999, 2000 (2011) (noting patents may have psychological effects that alter incentives to innovate, particularly in collaborations); Michael Mattioli, Communities of Innovation, 106 NW. U. L. REV. 103, 103 (2012) (examining collective patent licensing as a form of collective behavior in the patent system). 18. For discussions of the need for principles to guide policy determinations about patent remedies, see, for example, Thomas F. Cotter, Four Principles for Calculating Reasonable Royalties in Patent Infringement Litigation, 27 SANTA CLARA COMPUTER & HIGH TECH. L.J. 725 (2011); John M. Golden, Principles for Patent Remedies, 88 TEX. L. REV. 505 (2010) (providing principles to guide policymakers in assessing the relative merits of alternative policy proposals); Paul J. Heald, Optimal Remedies for Patent Infringement: A Transactional Model (Univ. of Chi. Law Sch. John M. Olin Law & Econ., Working Paper No. 431, 2008), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1278062. 19. The literature includes an increasing number of proposals for tailoring patent remedies in ways that take the public interest in supporting innovation into account. See, e.g., Sarah R. Wasserman Rajec, Tailoring Remedies to Spur Innovation, 61 AM. U. L. REV. 733 (2012); Ted Sichelman, Purging Patent Law of ‘Private Law’ Remedies, 92 TEX. L. REV. 517 (2014); Samson Vermont, Basing Patent Remedies on Harm to the World Instead of Harm to the Patentee (May 12, 2012) (unpublished manuscript) (on file with author). It also includes proposals for tailoring patent remedies to reflect the relational or transactional aspects of patents. See, e.g., Thomas F. Cotter, Patent Holdup, Patent Remedies, and Antitrust Responses, 34 J. CORP. L. 1151 (2009) (focusing on the relational value of patents and the importance of employing practical reason as an approach to patent remedies); Heald, supra note 18, at 1176 (stating that the goal of patent remedies is to provide incentives for efficient transactions to occur while minimizing cost of transacting). 1072 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 competition among alternative modes of innovation without materially undermining the patent system.20 II. AN ALTERNATIVE WAY OF INNOVATING “Gettin’ good players is easy. Gettin’ ‘em to play together is the hard part.”—Casey Stengel In a controversial presidential campaign speech, now known as the “you didn’t build that” speech, President Obama told his audience that “[i]f you were successful, somebody along the line gave you some help,” referring to the essential role of shared infrastructure and collective knowledge in supporting individual achievement.21 Since then, Obama has continued to challenge the image of the rugged individual inventor and entrepreneur, emphasizing the social context in which innovation takes place and the importance of cumulative contributions to business success.22 An emphasis on collaboration and cooperation among stakeholders is now evident in both federal and state innovation policies.23 While the need for collaboration to solve scientific and technological problems is not new,24 what is new is the scale and complexity of the problems that need to be solved and the large and diverse group of people who can come together to solve them using decentralized, 20. I am not arguing that patents are always bad for cooperation. Patents may be useful, even essential, in supporting certain kinds of coordination and cooperation in innovation. See, e.g., Jonathan M. Barnett, The Illusion of the Commons, 25 BERKELEY TECH. L.J. 1751 (2010) [hereinafter Barnett, The Illusion of the Commons]; Paul J. Heald, A Transaction Costs Theory of Patent Law, 66 OHIO ST. L.J. 473 (2005); F. Scott Kieff, Coordination, Property, and Intellectual Property: An Unconventional Approach to Anticompetitive Effects and Downstream Access, 56 EMORY L.J. 327 (2006). Moreover, firms have alternative appropriability strategies that they can use in place of patents, so weakening patents may not necessarily mean greater access. See, e.g., Jonathan M. Barnett, Is Intellectual Property Trivial?, 157 U. PA. L. REV. 1691 (2009). I argue only that patents create systematic disadvantages for certain kinds of cooperative innovation that provide social benefits such as lower cost innovation, competition with existing proprietary systems, or the creation of new products and ideas that might otherwise be unavailable. 21. This speech now has its own spot on Wikipedia. See a full discussion of this and related speeches at You Didn’t Build That, WIKIPEDIA.ORG, http://en.wikipedia.org/wiki/ You_didn’t_ build_that (last modified Jan. 19, 2014). 22. SEE BARACK OBAMA, U.S. PRESIDENT, REMARKS AT A CAMPAIGN EVENT IN ROANOKE, VIRGINIA (JULY 13, 2012) (TRANSCRIPT AVAILABLE AT HTTP://WWW.WHITEHOUSE.GOV/THE-PRESSOFFICE/2012/07/13/REMARKS-PRESIDENT-CAMPAIGN-EVENT-ROANOKE-VIRGINIA). 23. See, e.g., Steven C. Currall & Ed Frauenheim, How the U.S. Can Lead on Technological Innovation, SEATTLE TIMES (Mar. 7, 2014, 5:14 PM), http://seattle times.com/html/opinion/2023076667_stevencurralledfrauenheimopedinnovationresearchxx xml.html; Bruce Katz & Judith Rodin, Innovative State and City Government Solutions to Watch in 2012, THE ATLANTIC (Jan. 17, 2012), http://www.theatlanticcities.com/jobs-andeconomy/ 2012/01/innovative-local-government-solutions-watch-2012/951/. 24. See generally Ernan McMullin, Openness and Secrecy in Science: Some Notes on Early History, 10 SCI. TECH. & HUMAN VALUES 14 (1985) (examining the history of the ideal and reality of open science). 2014] COOPERATIVE INNOVATION 1073 low-cost, web-based technologies. Emerging forms of cooperative innovation can harness new resources, bring multiple disciplines and perspectives to bear on previously intractable scientific problems, and increase competition in key areas of intellectual production. I argue that innovation policies need to respond to the opportunities of these cooperative innovation systems. To do so, however, requires an understanding of how these systems diverge from traditional market-driven modes of innovation in ways that leave them vulnerable to patents. I therefore explore the mechanisms on which cooperative systems of innovation rely and the potential effects of patents on these mechanisms. Two examples of cooperative innovation help to illustrate both the power of these models and their vulnerability to patents. A. Distinct Features of Cooperative Innovation “[W]hat really distinguishes open source is not just source, but an ‘architecture of participation’ . . . .”—Tim O’Reilly Cooperative innovation is used in this article to refer to open access innovation processes fueled by the voluntary participation of large numbers of people who share their ideas and discoveries freely and openly with other members of the innovation community. Entry is free, or close to free, and the cost to participate is low. Progress is highly sequential and dependent upon large numbers of small steps that build upon each other. This kind of innovation diverges from traditional market-based modes of innovation in its reliance on nonmarket mechanisms for sustaining cooperation. Cooperation involves working together to advance common goals or obtain mutual benefits. It can occur among even purely selfish economically rational actors where individual economic interests align with the collective interest. Sustaining cooperation when individual economic interests diverge from the interests of the collective is more challenging. A number of studies have tried to identify the factors that are needed to sustain cooperation beyond situations in which rational economic actors have aligned interests.25 Case studies 25. See, e.g., YOCHAI BENKLER, THE PENGUIN AND THE LEVIATHAN (2011); SOCIAL DILEMMAS: PERSPECTIVES ON INDIVIDUALS AND GROUPS (David A. Schroeder ed., 1995) (giving an overview of different perspectives on decisions made by those in social dilemmas and the factors that influence choices to act in the interests of the group); Benkler, supra note 1; see also ROBERT C. ELLICKSON, ORDER WITHOUT LAW: HOW NEIGHBORS SETTLE DISPUTES (1991); ELINOR OSTROM, GOVERNING THE COMMONS: THE EVOLUTION OF INSTITUTIONS FOR COLLECTIVE ACTION (1990); Elinor Ostrom, A General Framework for Analyzing Sustainability of Social-Ecological Systems, 325 SCI. 419 (2009). For an organizational approach to understanding how patents influence knowledge communities, see, for example, Fiona Murray & Scott Stern, Learning To Live with Patents: A Dynamic Model of a Knowledge Community’s Response to Legal Institutional Change (Nov. 2008) (unpublished manuscript) (on file with author). 1074 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 of open source software communities have been particularly helpful in identifying the mechanisms that support cooperative intellectual production.26 They have illustrated the importance of trust and reciprocity, and shown how these mechanisms can work when groups become large and relationships attenuated. In open source software communities, people cooperate with each other even when they do not know each other and their interactions are limited. Team members must decide how much they can trust each other before joining the team and without the chance to establish personal relationships or forms of mutual control.27 Instead of personal relationships, the decision to join the team is based on beliefs about the motivation of other team members to adhere to the mutual norms of the open source software community. Participants must believe that other members of the community will continue to act in ways that are consistent with the open source model of free sharing. This is an example of swift trust, a unique form of trust that occurs between people or groups who come together in temporary teams to solve collaborative tasks.28 The maintenance of these communities depends on “their ability to a) develop and enforce rules of cooperation in a self-organized manner, and to b) develop selfenforcing swift trust which is based on generalized reciprocity between group members.”29 Keeping the cost of participation low is also essential to the sustainability of these groups.30 A growing body of empirical work in other areas involving selfgoverning systems of cooperative resource management and use supports these findings, emphasizing the importance of trust— particularly swift trust, benefit-sharing, and reciprocity in attracting 26. See, e.g., Greg R. Vetter, Commercial Free and Open Source Software: Knowledge Production, Hybrid Appropriability, and Patents, 77 FORDHAM L. REV. 2087 (2009). 27. See Margit Osterloh & Sandra Rota, Trust and Community in Open Source Software Production, 26 ANALYSE & KRITIK 279 (2004). 28. For early development and use of “swift trust,” see, for example, Debra Meyerson et al., Swift Trust and Temporary Groups, in TRUST IN ORGANIZATIONS 166, 168 (Roderick M. Kramer & Tom R. Tyler eds., 1996). For an interesting discussion of swift trust as it arises in different contexts and the factors affecting its formation, see Michael J. Fahy, Understanding “Swift Trust” To Improve Interagency Collaboration in New York City (Sept. 2012) (unpublished M.A. thesis, Naval Postgraduate School), available at http://hdl.handle.net/10945/17362. 29. Osterloh & Rota, supra note 27, at 280; see also C. Brad Crisp & Sirkaa L. Jarvenpaa, Swift Trust in Global Virtual Teams: Trusting Beliefs and Normative Actions, 12 J. PERSONNEL PSYCHOL. 45 (2013) (examining the role and vulnerabilities of swift trust in ad hoc global virtual teams). 30. Copyright law has provided a limited enforcement mechanism, through the use of licenses that impose varying commitments on users of open source software to make their own contributions open and accessible. Even with these licenses in place, however, trust remains an important part of sustaining open source software systems. 2014] COOPERATIVE INNOVATION 1075 and sustaining participation.31 This work also suggests that to sustain cooperation, laws need to be applied in ways that support, or at the very least minimize interference with, the norms, customs, and organizational structures that support these critical non-market mechanisms.32 Where members of a group are contributing their time and ideas freely and voluntarily, their willingness to participate will be influenced by the behavior of other group members and even, to a lesser extent, by the behavior of non-group members.33 Their willingness to make contributions will depend on the extent to which other group members act in accordance with shared group norms and reciprocate with their own contributions and the extent to which the contributions that group members freely provide remain free. Free riding and private appropriation of the benefits produced in the group by people outside of the group may also undermine internal motivations to contribute. Problems may arise for the group where legal rules or the incentives that these rules create undermine or conflict with the shared understandings and commitments of the group, leading to deviations from accepted and expected cooperative behavior. These insights are making their way into at least some areas of the law. In contract law, for example, relational contract theory provides a view of contracts as relations rather than discrete transactions, with many of the contract terms left implicit and governed by trust between the parties.34 Recent work on contracts and innovation illustrates how firms use incomplete contracts to sustain cooperative relationships in the face of imperfect information.35 In corporate law, 31. See, e.g., TRUST AND RECIPROCITY: INTERDISCIPLINARY LESSONS FROM EXPERIMENTAL RESEARCH (Elinor Ostrom & James Walker eds., 2003); UNDERSTANDING KNOWLEDGE AS A COMMONS (Charlotte Hess & Elinor Ostrom eds., 2007); STEVEN WEBER, THE SUCCESS OF OPEN SOURCE (2004); Benkler, supra note 1; Dan M. Kahan, The Logic of Reciprocity: Trust, Collective Action, and Law, 102 MICH. L. REV. 71 (2003); Osterloh & Rota, supra note 27; Margit Osterloh, Sandra Rota & Bernhard Kuster, Trust and Commerce in Open Source—A Contradiction? (Nov. 22, 2002) (unpublished manuscript), available at http://www.research gate.net/publication/226907215_Trust_and_Commerce_in_Open_Source_A_Contradiction. 32. See, e.g., TRUST AND RECIPROCITY: INTERDISCIPLINARY LESSONS FROM EXPERIMENTAL RESEARCH, supra note 31; UNDERSTANDING KNOWLEDGE AS A COMMONS, supra note 31. 33. See, e.g., Osterloh, Rota & Kuster, supra note 31, at 9. 34. See, e.g., Ian R. Macneil, The Many Futures of Contract, 47 S. CAL. L. REV. 691 (1974). 35. See, e.g., Ronald J. Gilson et al., Contracting for Innovation: Vertical Disintegration and Interfirm Collaboration, 109 COLUM. L. REV. 431 (2009). Contracts allow parties to structure their relationships with each other in ways that foster trust and facilitate relationship-specific investments where the payoffs from the relationship cannot be predicted and contracted for in advance. In some cases the terms governing the division of payoffs from a shared innovation project are left open, the parties relying instead on the braiding of formal terms for sharing information about the progress and prospects of their joint activities with informal terms governing subsequent outcomes of the joint work. This information-sharing regime “braids” together the formal and informal elements of the contract in a way that endogenizes the growth of trust between the participants. See Ronald J. Gilson et al., Braiding: The Interaction of Formal and Informal Contracting in Theory, Practice, and Doctrine, 110 COLUM. L. REV. 1377 (2010). 1076 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 behavioral theories based on trust and trustworthiness challenge conventional views of the firm.36 This work cautions against excessive reliance on external sanctions that may undermine internal trust.37 As new forms of collective production emerge, there have even been suggestions for creating an entirely new field of law, cooperation law, to reflect arrangements between people that are based on a variety of modes of sharing, cooperation, and collaboration—such as co-housing, barter, and community-financed businesses.38 These legal responses aim to modify existing formal rules where needed to support and protect beneficial informal rules and understandings. I suggest that internalizing the negative effects that patents may have on non-market mechanisms of trust, benefit-sharing, and reciprocity in cooperative systems will begin to pull similar considerations into patent law in contexts, such as those described below, where they are most important.39 The following two examples illustrate both the power of cooperative innovation and the vulnerabilities of such systems to the incentives and associated transaction costs that patents create. B. Two Examples 1. Crowd Science: The Example of Foldit The power of crowd science, the use of many volunteers working together to solve complex data intensive problems, has been illustrated in areas as diverse as finding planets, deciphering ancient texts, and building climate models.40 Crowd science is increasingly informing what we know about diverse natural phenomena such as bird populations and their distributions,41 the pollination habits of 36. See, e.g., Margaret M. Blair & Lynn A. Stout, A Team Production Theory of Corporate Law, 85 VA. L. REV. 247 (1999); Margaret M. Blair & Lynn A. Stout, Trust, Trustworthiness, and the Behavioral Foundations of Corporate Law, 149 U. PA. L. REV. 1735 (2001) [hereinafter Blair & Stout, Trust] (arguing that the behavioral phenomena of internalized trust and trustworthiness play important roles in encouraging cooperation within firms); Donald C. Langevoort, Behavioral Approaches to Corporate Law, in RESEARCH HANDBOOK ON THE ECONOMICS OF CORPORATE LAW 442 (Claire A. Hill & Brett H. McDonnell eds., 2012). 37. See Blair & Stout, Trust, supra note 36. 38. See, e.g., Janelle Orsi, Cooperation Law for a Sharing Economy, YES! MAG. (Sept. 23, 2010), http://www.yesmagazine.org/new-economy/cooperation-law-for-a-sharing-economy (“A new sharing economy is emerging—but how does it fit within our legal system? Time for a whole new field of cooperation law.”). 39. For a discussion of how IP operates at the boundaries between groups, see, for example, Strandburg, supra note 14. 40. GAMING FOR THE GREATER GOOD, http://gamingforthegreatergood.com (last visited Mar. 22, 2014). 41. The Audubon Society’s Christmas Bird Count began in 1900. A transformed version, eBird, was launched in 2002 by Cornell Lab of Ornithology in collaboration with the National Audubon Society. About eBird, EBIRD, http://ebird.org/content/ebird/about/ 2014] COOPERATIVE INNOVATION 1077 bees,42 and the surface of the moon,43 and is also helping to solve puzzles in quantum physics,44 the anthropology of microbes,45 and the early development stages of dinosaurs.46 These divergent crowd science projects share a common foundation built upon open access, sharing, and cooperation between many heterogeneous participants with diverse motivations that may not be consistent with a pricebased system. They illustrate the opportunities that cooperation outside of the marketplace offer for scaling up the collection and analysis of large amounts of data and for building knowledge through the accumulation of many incremental contributions of information and ideas.47 Unfortunately they also share common vulnerabilities to a patent system that is not designed with them in mind. The story of Foldit, a particularly promising citizen science project, highlights both the risks and opportunities of these kinds of cooperative innovation.48 This story starts with the creation of a video game called Foldit that anybody can play.49 Within ten days of their start on December 16, 2010, players of this new online protein folding game were able to solve the protein structure of a retrovirus similar to HIV, a structure that had eluded scientists for over ten years.50 The results provided scientists with important insights into the treatment of AIDS and were published in a scientific journal with the video game team players as co-authors.51 This is only one of a number of scientific advances made by Foldit players. Other contributions by Foldit players include (last visited Mar. 22, 2014). eBird collects bird abundance and distribution data and enlists public participation in analyzing the over eighty million observations. See id. 42. The Great Sunflower Project was started by a single academic researcher interested in examining the pollination activities of bees, and it now has 90,000 registered volunteers planting sunflowers and taking observation samples. See GREAT SUNFLOWER PROJECT, http://www.greatsunflower.org (last visited Mar. 22, 2014). 43. See, e.g., Moon Zoo, ZOONIVERSE, https://www.zooniverse.org/project/moonzoo (last visited Mar. 22, 2014). 44. See, e.g., The Story Behind “Quantum Moves,” SCI. HOME, http://www.science athome.org (last visited Mar. 22, 2014) (describing Quantum Moves, a game that uses community efforts to help build a quantum computer). 45. See American Gut, supra note 5. 46. See OPEN DINOSAUR PROJECT, http://opendino.wordpress.com/ (last modified May 17, 2013). 47. See, e.g., Clay Shirky, How the Internet Will (One Day) Transform Government, Address at TED Conference (June 2012), available at http://www.ted.com/talks/clay_ shirky_how_the_internet_will_one_day_transform_government. 48. See, e.g., Eric Hand, People Power, 466 NATURE 685 (2010) (discussing projects involving the concept of distributed thinking, featuring Foldit); Collins Kilgore, Gaming for the Greater Good, VAND. J. ENT. & TECH. L. (Sept. 27, 2011), http://www.jetlaw.org/?p=8381. 49. See FOLDIT, http://fold.it/portal/ (last visited Mar. 22, 2014). 50. See Firas Khatib et al., Crystal Structure of a Monomeric Retroviral Protease Solved by Protein Folding Game Players, 18 NATURE STRUCTURAL & MOLECULAR BIOLOGY 1175, 1177 (2011). 51. Id. 1078 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 the discovery of a unique enzyme “backbone” configuration for the development of novel enzymes, a discovery described by scientists as the most detailed remodeling of a protein structure by humans working through a computer-based process.52 This work moves beyond protein folding, which is critical for understanding how the human body works, and into the realm of protein design, which holds promise for advancing drug discovery. The protein design results were published in Nature Biotechnology, a prestigious scientific journal, with Foldit Players again included in the author list.53 Foldit was developed by David Baker, a protein research scientist at the University of Washington, together with Zoran Povic and Seth Cooper, computer scientists at the same university. The program is supported through a collaboration between the Biochemistry Department and the Center for Game Science at the University of Washington.54 The vision behind Foldit is one of enabling public participation in large-scale distributed science. The project “aims to predict, design, and understand biochemical structures, and study how humans and computers can best work together to further these aims” through a growing community of game-developed expert volunteers.55 Anybody can play the game simply by visiting the Foldit website, consenting to user-friendly terms of use that focus primarily on explaining how information is collected and shared, and downloading the free software needed to play the game.56 Participants in the game, most of who have little or no background in biochemistry, are introduced to some basic concepts of protein folding and then engaged in solving “puzzles” designed around specific protein structure problems that have been identified but not solved by scientists. The players collaborate with teammates while competing against other players to obtain the highest-scoring (lowestenergy) models. The scoring system includes different categories based on levels and types of contributions. The website identifies the 52. See Christopher B. Eiben et al., Increased Diels-Alderase Activity Through Backbone Remodeling Guided by Foldit Players, 30 NATURE BIOTECHNOLOGY 190, 192 (2012); see also David Baker, More Amazing FoldIt Results and New Flu Virus Challenges, FOLDIT (May 27, 2011, 6:41 PM), http://fold.it/portal/node/989769; Zoran, Recent Exciting Discoveries by Foldit, FOLDIT (Apr. 19, 2011, 5:15 PM), http://fold.it/portal/node/989576. 53. See Eiben et al., supra note 52 (showing that Foldit Players are included on the publication list; reporting the use of game-driven crowdsourcing to enhance the activity of a computationally designed enzyme through the functional remodeling of its structure). 54. See CENTER GAME SCI., http://centerforgamescience.com/site/ (last visited Mar. 22, 2014). 55. See Foldit Terms of Service and Consent, FOLDIT, http://fold.it/portal/legal (last updated Mar. 8, 2013). 56. New players begin by loading the game and watching tutorials that explain the game and the scientific concepts needed to understand it. See How To Download and Start Playing Foldit!, FOLDIT (Nov. 9, 2010, 11:47 PM), http://fold.it/portal/node/988864. 2014] COOPERATIVE INNOVATION 1079 top players in each category and for each puzzle. It also provides rankings based on global scores and a hall of fame for the very top scorers. The game has separate rankings for soloists, who work on their projects alone, and evolvers, who work on and improve solutions that have been shared with other people. A high ranking is valued and sought after by the active players, and many of them carefully watch the scores and study the ways in which the rankings are calculated. Players are quick to point out areas where they believe the scoring is not accurately reflecting good performance or otherwise seems unfair.57 Three years into the life of the Foldit games, there is clear evidence that this massively multiplayer online game, which enlists players worldwide to solve challenging protein-structure prediction problems, offers improvements over the computational models currently being used by scientists.58 “Obsessive gamers’ hours at the computer have now topped scientists’ efforts to improve a model enzyme, in what researchers say is the first crowd sourced redesign of a protein.”59 The use of games offers valuable ways for engaging citizen scientists, drawing on the vast amounts of free time that people are willing to devote to problem solving just because they want to. “[T]he average young person today in a country with a strong gamer culture will have spent 10,000 hours playing online games by the age of twenty-one. . . . [C]ollectively all the World of Warcraft gamers have spent 5.93 million years solving the virtual problems of [that particular game world].”60 Foldit harnesses this energy to solve difficult and data-intensive problems, serving as the flagship game for the concept of using crowds to solve complex scientific problems.61 This system of intellectual production relies upon non-market mechanisms of trust, benefit-sharing, and reciprocity. While the game is structured as a competition to get the highest score, competi- 57. See, e.g., Bruno Kestemont, Actual Competitors for the Global Score, FOLDIT (Oct. 25, 2013, 9:46 AM), http://fold.it/portal/node/996160. 58. See Seth Cooper et al., Predicting Protein Structures with a Multiplayer Online Game, 466 NATURE 756, 756 (2010). 59. Jessica Marshall, Victory for Crowdsourced Biomolecule Design: Players of the Online Game Foldit Guide Researchers to a Better Enzyme, NATURE (Jan. 22, 2012), http://www.nature.com/news/victory-for-crowdsourced-biomolecule-design-1.9872. 60. See Jane McGonigal, Gaming Can Make a Better World, Address at TED Conference (Feb. 2010) (emphasis added), available at http://www.ted.com/talks/jane_mcgonigal_gaming_ can_make_a_better_world. 61. See, e.g., John Walker, The Inaugural Horace Awards for Forgotten IGF Entrants, ROCK, PAPER, SHOTGUN (Jan. 8, 2013, 9:00 PM), http://www.rockpapershotgun.com/2013/ 01/08/the-inaugural-horace-awards-for-forgotten-igf-entrants/ (discussing the Foldit game in the wake of results on the winners of the Fifteenth Annual Independent Games Festival, which is well known in the video game industry, and suggesting it should be recognized with the Horace Award for Actually Advancing Science). 1080 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 tion among the players is moderated by the fact that there are no monetary consequences attached to having a winning score. Moreover, the results of gameplay are portrayed as contributions to the public domain of scientific knowledge. The Foldit site explains that diversity advances this knowledge, so even those with lower scores feel they are doing something important. The low-level incentives to win are combined with norms of sharing and open communication to foster a collaborative environment.62 Members are encouraged to communicate, share ideas, and troubleshoot through the Foldit blog, forum, wiki, or through sharing “recipes” useful in solving various puzzles. The importance of sharing as a fundamental value for the community is highlighted in the Foldit Terms of Service, which remind members that: “We are sharing what we learn with others from all over the world. That is how science is done. We have to share so others can learn, too.”63 Reciprocity in the exchange of ideas is also encouraged. It is encouraged through member interests in sustaining a robust forum for troubleshooting and a library of shared recipes to advance gameplay. There is also a built-in reciprocal exchange between the players and Foldit. With the consent of the players, the Foldit project continuously gathers and analyzes gameplay data such as biochemical structures, algorithms, and tool and algorithm usage that may have research benefits, and in return the project agrees to give attribution to the players who make discoveries and to make these discoveries publicly available. Out of this collective effort has come publishable results and novel discoveries.64 While scientific publications co-authored by video game players may seem unusual, this could become the norm in at least some areas of science if crowd science continues to progress at its current rate. The Foldit community is large and growing. In January 2012, the game had 240,000 registered players and approximately 2200 active players.65 In January 2014 the game appears to have almost doubled this number of registered players and more than doubled the number of active players.66 The game continues to expand not just its number of players, but also the reach of its problemsolving power. Most recently, the creators of the game have turned their eyes to the design of new therapeutic enzymes and even small 62. Foldit community rules can be found online at Community Rules, FOLDIT, http://fold.it/portal/communityrules (last updated Apr. 18, 2013). 63. Foldit Terms of Service and Consent, supra note 55. 64. See, e.g., Khatib et al., supra note 49, at 1175 (listing authors as including the “Foldit Contenders Group” and the “Foldit Void Crushers Group”). 65. Marshall, supra note 59 (noting that active players are players who have logged in and been active on the web site within the last week as measured on a particular day). 66. See Top Evolvers, FOLDIT, http://fold.it/portal/players (last visited Mar. 22, 2014). 2014] COOPERATIVE INNOVATION 1081 molecule design, taking the crowdsourcing approach into the realm of drug development.67 As puzzles move into areas with more direct commercial potential, however, tensions between the non-market mechanisms on which Foldit relies and proprietary interests enabled by patenting are likely to emerge. Analogies can be drawn to the tensions that have emerged in many areas of academic science as the distinction between research and commercial application has blurred.68 During its first few years the Foldit website provided little information on intellectual property ownership, not seeing it as something that was needed. In response to queries by its participants, the site administrators/founders stated that the “Foldit project was initiated with the goal of democratizing science, and we stand behind that. [T]he process of discovery and the eventual results of game play will all be open domain.”69 In line with the original game philosophy of democratic science, the founders of the game then asked the game participants for their views on intellectual property ownership. Developer chat discussions in 2012 were used to flesh out what a Foldit intellectual property ownership policy should look like.70 The community discussions about intellectual property ownership raised a number of important issues about how patents might impact Foldit. Some Foldit members focused on negative effects that patenting of results might have on the intrinsic motivations and norms of sharing that motivate the game. They expressed the view that Foldit is a public, volunteer-driven process, and therefore all ideas and contributions should remain public.71 Others focused more on the challenges of benefit-sharing in a system that works best when it is collaborative and invites cumulative refinements of ideas by competing members of the game. Many of the contributions take the form of computer recipes for improving game play, contributions which may 67. Rebecca Hersher, FoldIt Game’s Next Play: Crowdsourcing Better Drug Design, SPOONFUL OF MEDICINE, NATURE MED. (Apr. 13, 2012, 4:35 PM), http://blogs.nature.com/ spoonful/2012/04/foldit-games-next-play-crowdsourcing-better-drug-design.html?WT.mc_id= TWT_NatureBlogs. 68. See, e.g., Robert P. Merges, Property Rights Theory and the Commons: The Case of Scientific Research, in SCIENTIFIC INNOVATION, PHILOSOPHY, AND PUBLIC POLICY 145 (Ellen Frankel Paul, Fred D. Miller, Jr. & Jeffrey Paul eds., 1996). I have explored the challenges that patents create in biomedical research at greater length. Liza Vertinsky, Universities as Guardians of Their Inventions, 2012 UTAH L. REV. 1949. 69. Zoran, Comment to Set My Mind at Ease, FOLDIT (Mar. 22, 2009, 3:31 AM), http://fold.it/portal/node/267249. 70. See Developer Chat, FOLDIT (June 1, 2012), http://fold.it/portal/node/992849. 71. See, e.g., GlaciusCool, Comment to Foldit Ownership Policy, FOLDIT (May 31, 2012, 1:25 AM), http://fold.it/portal/node/992792 (“That which is created by the public should remain in the hands of the public for the benefit of all human kind. Scientific discovery—even if it’s just a molecular recipe—should be used by and available to all who seek the knowledge.”). 1082 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 not themselves be patentable or serve as patent-invalidating prior art but which could lead to the discovery of something that is. Participants might not be willing to share their recipes freely if they thought that someone else could use them to make and appropriate results for private commercial gain. Other issues raised by Foldit members focused on the practical challenges, transaction costs, and administrative headaches that patents might create. Participants worried about what formula would be used to allocate rights in a way that fairly rewarded performance, and whether it would be possible to discern who the co-inventors of an invention are in the context of cumulative contributions. The possibility that some contributions might come from employees with preexisting obligations to their companies created a further layer of complexity and concern. Ultimately, the Foldit administrators proposed the following ownership provision, guided no doubt by the University of Washington Center for Commercialization: Scientific discoveries will be made publicly available and the University of Washington will handle ownership of discoveries. All significant scientific discoveries (such as structures, algorithms, etc) made in game will be made publicly available. In the event that some discoveries may warrant patent protection, University of Washington will handle the patent application process. US patent law will govern IP attribution for each discovery. Individual players who contributed to the discovery will be considered coinventors for any discovery produced through play.72 A few things are notable about this policy. First, the University of Washington plays a direct role in managing patent choices. The University of Washington has an active technology transfer center, the Center for Commercialization, and its intellectual property policies and licensing practices reflect traditional assumptions about patenting and technology transfer. The University’s intellectual property policies are “intended to show the University’s positive attitude toward transfer of results of its research to the private sector” and are based on the assumption that “it is generally in the best interests of the University and the public that patents be obtained and/or licenses granted.”73 This approach conflicts with one focused on the free and open sharing and use of ideas. 72. Foldit Terms of Service and Consent, supra note 55; see also Seth Cooper, Comment to Foldit Ownership Policy, FOLDIT (June 4, 2012, 5:48 PM), http://fold.it/portal/node/992792 (announcing a draft ownership policy). 73. PRESIDENT OF THE UNIV. OF WASH., EXEC. ORD. NO. 37: PATENT, INVENTION, AND COPYRIGHT POLICY (last updated Oct. 27, 2003), available at http://www.washington.edu/ admin/rules/policies/PO/EO36.html. 2014] COOPERATIVE INNOVATION 1083 Second, while the implication is that inventors will be the owners of their inventions, the policy is not clear about what rights the University will have, what rights the inventors will have, and what restrictions will be imposed on participant inventors who end up with ownership rights over a patented invention. The policy indicates only that the University will handle ownership and that significant scientific discoveries will be made publicly available. Perhaps in response to concerns about the sustainability of a public domain approach, the Foldit developers, who are University of Washington employees, have announced to the Foldit community that they have committed to assign all proceeds from any patents on inventions that they discover back to the development of the Foldit community. Third, although the policy provides that “[i]ndividual players who contributed to the discovery will be considered co-inventors for any discovery produced through play,”74 joint inventorship is determined solely by patent law.75 In some cases, individuals might think that they are co-inventors when they are not, since the statutory definition of joint inventorship is narrower than the policy suggests.76 Finally, the Foldit Terms of Service can be changed at any time, leaving the University to reconsider its stance on ownership should the Foldit game start to yield results that are commercially lucrative. While the concerns of the Foldit members have yet to be realized, the potential of the game to aid in areas of commercial interest, such as drug discovery, will inevitably increase tensions between the system of volunteer contributions and sharing on the one hand and patenting and revenue sharing on the other hand.77 One of the remark74. Foldit Terms of Service and Consent, supra note 55. 75. Joint inventorship is legally determined under patent law based on involvement by each inventor in the original conception of the invention. See, e.g., Burroughs Wellcome Co. v. Barr Labs. Inc., 40 F.3d 1223, 1227 (Fed. Cir. 1994). The contributor must have in mind and be contributing to the idea of the complete and operative invention, which would require knowledge of the entire invention and not just an understanding that some kind of discovery is likely to result. Reducing the invention to practice, while a valuable contribution, is not an inventorship contribution. Id. at 1228. While each joint inventor must contribute to the conception of the invention, it is enough to contribute to one claim. 35 U.S.C. § 116 (2012). While there must be some element of joint behavior involved, a loose collaboration, “working under common direction,” or even “one inventor seeing a relevant report and building upon it,” may be enough. Kimberly-Clark Corp. v. Procter & Gamble Distrib. Co., 973 F.2d 911, 916-17 (Fed. Cir. 1992). If joint inventorship has occurred, the U.S. patent application must name all of the inventors. In the absence of any agreement to the contrary, the joint inventors are joint owners of the patent and can independently exploit the benefits of the patent. 35 U.S.C. § 262 (2012). 76. For an interesting discussion of some of the problems caused by this disconnect between common understandings and legal definitions of joint inventorship, see Aaron Fellmeth, Conception and Misconception in Joint Inventorship, 2 N.Y.U. J. INTELL. PROP. & ENT. L. 73, 77-78 (2012). 77. See, e.g., Merges, supra note 68 (noting the tensions that patents create in academic science). 1084 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 able features of the Foldit community is the willingness of game players to share the recipes that they develop to solve protein structure puzzles.78 This sharing helps to sustain the evolvers, who copy and build on the game strategies used by others, and also aids the general population of game players. These recipes function like research tools, serving as critical inputs into the processes that lead to discoveries about protein folding without describing such discoveries or being independently patentable. The ability to patent a discovery that may have commercial value will make participants less willing to share their game strategies for a number of reasons. First, participants will be less willing to reveal game strategies, including the software code that enables these strategies, if there is a chance that a third party will take this information and use it to make proprietary discoveries that are not in turn shared with the group. The nature of the information that is shared in the exchange of recipes is unlikely to give these participants any claim as a joint inventor and is unlikely to constitute prior art, leaving them with little ability to either block the patent or share in its control. Second, patenting will shift attention from the intrinsic motivation of obtaining a high score to the extrinsic motivation of obtaining commercially valuable intellectual property. Those who have contributed significant ideas that are not patentable may have to sit by and watch as their contributions lead to commercially lucrative patentable inventions that benefit others. The rules around coauthorship and the ability to be expansive in attributing coauthorship at low cost make joint authorship a useful way of respecting group contributions. The approach does not translate well into situations of joint inventorship, since contributions will typically take the form of tools that make discovery more likely rather than contributions to the conception of the invention.79 Members may even have incentives to drop out of the game and seek patent protection for discoveries that they would not have made but for access to the ideas contributed by other players. 78. As one high-scoring player of Foldit explained during an interview, “I shared BF [blue fuse tool] fully because Foldit is so much more than a game—the competition is serious and fierce, but we are also trying to improve the understanding of huge biological proteins. We collaborate and compete at the same time.” Researchers Uncover Foldit Gamers’ Strategies, DRUG DISCOVERY & DEV. (Nov. 8, 2011, 11:16 AM), http://www.dddmag.com/ news/2011/11/researchers-uncover-foldit-gamers’-strategies. 79. In the scientific world, journal articles often include a variety of contributors, including those who have performed experiments or contributed hard work to generate the results. In contrast, joint inventorship is legally determined under patent law based on involvement by each inventor in the original conception of the invention. For further discussion of joint inventorship, see supra notes 75-76. 2014] COOPERATIVE INNOVATION 1085 Third, if and when Foldit moves into areas where it competes with commercial players, particularly if it partners with pharmaceutical companies or other private companies, there will be stronger pressures on the administrators of the Foldit game to limit the public use of the discoveries generated. Where discoveries have identifiable commercial applications, the financial incentives to limit information sharing and to restrict use of the discoveries will be larger. In addition, if commercial partners play a bigger role in the game, the very different norms and rules governing commercial drug development will influence the ways in which the game is organized and the results are shared. While these harms remain primarily prospective for now, the risks that market-based incentives may crowd out non-market mechanisms of cooperation have been well documented in other similar areas and should not be ignored.80 Crowding out occurs when one approach to incentivizing participation has a negative impact on another.81 It can occur in a variety of different ways, including internal displacement of intrinsic motivations and disruptions of the system through the actions and pressures of participants from outside of the system.82 In projects like Foldit, the social value of contributing to the project and the enjoyment derived from playing games in an open science context, as well as the commitment of Foldit administrators to open science, may eventually be overshadowed by financial incen- 80. As described by Yochai Benkler, “[w]e have now . . . almost two decades of literature in experimental economics, game theory, anthropology, political science field studies, that shows that cooperation in fact does happen much more often than the standard economics textbooks predict, and that under certain structural conditions non-price-based production is extraordinarily robust. The same literature also suggests that there is crowding-out, or displacement, between monetary and non-monetary motivations as well as between different institutional systems: [sic] social, as opposed to market, as opposed to state.” Yochai Benkler, Comment to Calacanis’s Wallet and the Web 2.0 Dream, ROUGH TYPE (July 28, 2006, 11:22 AM), http://www.roughtype.com/?p=466; see also Yochai Benkler, Coase’s Penguin, or, Linux and The Nature of the Firm, 112 YALE L.J. 369 (2002) [hereinafter Benkler, Coase’s Penguin]. 81. “Crowding out, or the non-separability of social preferences from the introduction of explicit extrinsic motivation, poses a systemic challenge to using traditional, incentivesbased mechanisms, both private and public, for eliciting desirable behavior.” Benkler, supra note 1, at 307; see also Samuel Bowles, Policies Designed for Self-Interested Citizens May Undermine “The Moral Sentiments”: Evidence from Economic Experiments, 320 SCI. 1605 (2008). One of the most widely debated examples of crowding out is the use of payments to encourage blood donations, which pits an economic framework for blood donations against a system of altruistic unpaid donors. See, e.g., RICHARD M. TITMUSS, THE GIFT RELATIONSHIP 158-59 (1971); Alena M. Buyx, Blood Donation, Payment, and NonCash Incentives: Classical Questions Drawing Renewed Interest, 36 TRANSFUSION MED. & HEMOTHERAPY 329, 329-30 (2009) (exploring strategies for creating well-designed non-cash incentives which cut across the rigid dichotomy of altruistic donation versus payment). 82. See, e.g., OSTROM, supra note 25; SUCCESSFUL MANAGEMENT BY MOTIVATION: BALANCING INTRINSIC AND EXTRINSIC INCENTIVES (Bruno S. Frey & Margit Osterloh eds., 2002). 1086 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 tives, such as patent royalties. The financial incentives might thus crowd out social motivations. This kind of displacement poses an undeniable risk for open source, volunteer-driven models of innovation like Foldit.83 Sustaining the kinds of non-market mechanisms that support Foldit, including the important mechanisms of trust, benefitsharing, and reciprocity, will undoubtedly become harder in the presence of patents.84 Ironically, the more successful the non-market mechanisms are in generating inventions, the more likely it is that they will come under challenge. 2. Open Source Software: The Example of Linux “No one ‘owns’ the software in the traditional sense . . . . The result has been the emergence of a vibrant, innovative and productive collaboration, whose participants are not organized in firms and do not choose their projects in response to price signals.”—Yochai Benkler 85 The second example is drawn from open source software.86 Open source software projects have proven to be a significant economic and social phenomenon, particularly in the context of software development.87 Sourceforge, which is one of the main internet sites hosting open source software projects, lists more than 4.8 million daily downloads, more than 430,000 open source software projects involving more than 3.7 million developers. Its directory connects more than 41.8 million consumers with these open source projects.88 While most of these projects are small, some, such as the Linux operating system, the Apache web server software, the MySQL database, and the Firefox web browser, are massive and compete with established proprietary software products. The open source smartphone operating 83. For discussions of intrinsic versus extrinsic motivations and the crowding-out effects of carrot and stick approaches, see DANIEL H. PINK, DRIVE: THE SURPRISING TRUTH ABOUT WHAT MOTIVATES US 3-4, 8-9, 17-21 (2009). 84. As noted earlier, there are many reasons why people become involved in projects like Foldit, and the three mechanisms described here are meant simply to capture the ways in which these cooperative systems sustain the involvement of these diverse participants with their diverse motivations and interests. 85. Benkler, Coase’s Penguin, supra note 80. 86. Much has been written about the free and open source software movement. For a good overview from an intellectual property perspective, see Vetter, supra note 26. 87. See, e.g., Eric von Hippel & Georg von Krogh, Open Source Software and the “Private-Collective” Innovation Model: Issues for Organization Science, 14 ORG. SCI. 209, 209 (2003) (discussing history of open source software and its emergence as major cultural and economic phenomenon); see also ERIC S. RAYMOND, THE CATHEDRAL AND THE BAZAAR: MUSINGS ON LINUX AND OPEN SOURCE BY AN ACCIDENTAL REVOLUTIONARY (1999). 88. SOURCEFORGE, http://sourceforge.net/about (last visited Mar. 22, 2014). 2014] COOPERATIVE INNOVATION 1087 system Android, for example, which is closely tied to Linux, was estimated to have seventy percent of the smartphone market in 2012.89 Open source software projects deviate from private proprietary models of software development in at least two important ways.90 First, most truly open source software projects are fueled at least in part by software developers who are primarily intrinsically rather than extrinsically motivated to participate. People contribute to the project because they want to, whether to solve their own problems, contribute to a community that they have benefited from in the past, gain a reputation, or as an outlet for creativity.91 Second, participants freely reveal the software that they have developed in ways that allow other participants not only to use it, but also to modify and build upon it.92 These characteristics are combined with organizational innovations that allow people to contribute to the software project in a massively distributed, decentralized way, and with very low transaction costs. These open source software systems show how valuable products can be developed in systems that are based upon the free contribution and sharing of ideas.93 While a few open source software systems, such as Linux and its stepchild Android, have been able to compete with proprietary products, the costs of doing so in the presence of an increasing number of software patents have been large. These costs include millions of dollars spent by Linux and Android users in obtaining patents solely for defensive purposes, the development and refinement of defensive patent pooling and licensing organizations and strategies, time spent trying to invalidate patents that might impede use of Linux, and foreclosure of potentially valuable development paths for Linux 89. See, e.g., Nirav Patel, Apple’s iPhone Is Losing Market Share as Android Gets 70% of the Smartphone Market, GADGET MASTERS (Jan. 28, 2013), http://www.thegadget masters.com/2013/01/28/apple-iphone-is-losing-market-share-as-android-gets-70-of-the-sma rtphone-market/. 90. For an overview of open source software and its implications and intersections with intellectual property, see, for example, Maurer & Scotchmer, supra note 15. 91. See, e.g., Jürgen Bitzer et al., Intrinsic Motivation in Open Source Software Development, 35 J. COMP. ECON. 160, 162 (2007); Georg von Krogh et al., Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development, 36 MIS Q. 649, 652 (2012); Chorng-Guang Wu et al., An Empirical Analysis of Open Source Software Developers’ Motivations and Continuance Intentions, 44 INFO. & MGMT. 253, 254-55 (2007). But see, e.g., Sharon Belenzon & Mark Schankerman, Motivation and Sorting in Open Source Software Innovation (Nov. 5, 2012) (unpublished manuscript), available at https://faculty. fuqua.duke.edu/~sb135/bio/Belenzon%20Schankerman%20OSS%20July%202012.pdf (examining observed pattern of contributions to open source software projects to extract revealed preferences of developers and illustrating the importance of understanding incentives heterogeneity in open source contributions). 92. See von Hippel & von Krogh, supra note 87 (describing open source software development systems, referring to them as illustrations of a private-collective model of innovation that occupies the middle ground between private investment and collective action). 93. Id. 1088 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 where such paths fall outside of the protective boundaries established by large corporate users of open source.94 Moreover, other promising open source systems switch course or even shut down when confronted with real or imagined patent threats.95 I focus on the story of Linux and the patent shadows created by Microsoft’s patents for two reasons. First, this story illustrates the susceptibility of even the most successful open source models to patent threats. Second, it demonstrates the difficulties that open source software supporters face in reducing patent threats.96 Linux was one of the pioneering free and open source software projects. It has its roots in the intertwined ideologies and development models generated by early free software and open source software movements, which are collectively referred to as Free and Open Source Software (FOSS).97 At a general level, FOSS is software which is made freely available, in both object and source code form, for anyone to use, copy, modify, and distribute, thus enabling people to voluntarily improve the design of the software.98 On a closer look, however, FOSS refers both to an ideology about the freedom to use, modify, and share this resource, which lies at the core of the Free Software Movement, and to a methodology for peer-to-peer development, which is the focus of the Open Source Movement.99 94. For a discussion of some of these costs, see, for example, Deborah Nicholson, Open Invention Network: A Defensive Patent Pool for Open Source Projects and Businesses, 2012 TECH. INNOVATION MGMT. REV. 12. For a discussion of recent efforts by Microsoft to raise the costs for a number of Android manufacturers through threats of patent infringement suits and licensing deals with large royalties and very restrictive licensing terms, see, for example, Michele Boldrin & David K. Levine, The Case Against Patents (Fed. Reserve Bank of St. Louis, Working Paper No. 2012-035A, 2012), available at http://research.stlouisfed.org/wp/2012/2012035.pdf (discussing impact of patents in Android context); Tom Warren, Barnes & Noble “Exposes” Microsoft’s Android Patent Fees and Strategy, WINRUMORS (Nov. 14, 2011, 6:53 PM), http://www.winrumors.com/barnes-noble-exposes-microsofts-android-patent-fees-and-strategy/. 95. See, e.g., Nicholson, supra note 94, at 14 (discussing chilling effect of potential patent threats on small companies and smaller projects even when no actual patent is asserted); Wen Wen et al., Patent Commons, Thickets, and Open Source Software Entry by Start-Up Firms, (Nat’l Bureau of Econ. Res., Working Paper No. 19394, 2013), available at http://www.nber.org/papers/w19394 (empirical study showing that rate of entry of start-up software firms increases with the size of open source software communities). 96. For an example of the power of open source software models as a substitute for traditional standard-setting approaches, see Greg R. Vetter, Open Source Licensing and Scattering Opportunism in Software Standards, 48 B.C. L. REV. 225 (2007). 97. See, e.g., Vetter, supra note 26; see also WOLFGANG LEISTER ET AL., OPEN SOURCE, OPEN COLLABORATION AND INNOVATION 15-26, 47-78 (Wolfgang Leister & Nils Christophersen eds., 2012). 98. See, e.g., The Open Source Definition, OPEN SOURCE INITIATIVE, http://opensource.org/osd (last visited Mar. 22, 2014); What Is Free Software and Why Is It So Important for Society?, FREE SOFTWARE FOUND., http://www.fsf.org/about/what-is-freesoftware (last visited Mar. 22, 2014). 99. For a related discussion of the causal factors underlying FOSS, see Greg R. Vetter, Exit and Voice in Free and Open Source Software Licensing: Moderating the Rein over Software Users, 85 OR. L. REV. 183 (2006). For the Free Software Movement’s description of how they 2014] COOPERATIVE INNOVATION 1089 While these two camps share many features, they have different views about what FOSS requires—disparities that quickly become apparent in their responses to proprietary uses of software.100 The Free Software Movement believes that software should be free. To promote this goal and to protect the free use of software, it advocates that uses of and improvements to open source software should be made available on open source terms. Beliefs about freedom, fairness, and reciprocity lie at the center of the free software movement. The Open Source Software movement is less worried about proprietary software and proprietary use of FOSS, viewing open source more as a development methodology and less as a social movement.101 Both groups share a reliance on swift trust and reciprocity, however, and beliefs about the value of open source software help to sustain norms of open access and sharing that are critical to open source software.102 The entanglement of ideology and development methodology is important in explaining both the strengths and the vulnerabilities of even large and successful open source projects like Linux.103 Linux was developed pursuant to a unique collaborative development project,104 and it remains one of the largest systems of collaborative development in the history of computing. As described by Eric Raymond in his seminal article The Cathedral and the Bazaar, “Who would have thought even five years ago (1991) that a world-class operating system could coalesce as if by magic out of part-time hacking by several thousand developers scattered all over the planet, connected only by the tenuous strands of the Internet?”105 It encapsudiffer from the Open Source Movement, see Why “Free Software” Is Better Than Open Source, GNU OPERATING SYS., https://www.gnu.org/philosophy/free-software-for-freedom.html (last visited Mar. 22, 2014) (noting that the movements “disagree on the basic principles, but agree more or less on the practical recommendations”). 100. See, e.g., Richard Stallman, Free Software as a Social Movement, ZNET (Dec. 18, 2005), http://www.zcommunications.org/free-software-as-a-social-movement-by-richard-stallman. 101. See, e.g., Anne Barron, Free Software Production as Critical Social Practice, 42 ECON. & SOC’Y 597 (2013) (describing the contrast between the ideological approach of the free software movement and the pragmatic approach of the subsequent open source software movement). 102. See, e.g., Osterloh & Rota, supra note 27; Osterloh, Rota & Kuster, supra note 31, at 2 (“The fragile balance between intrinsically and extrinsically motivated developers may be disturbed by the entrance of extrinsically motivated commercial firms into the world of open source.”). 103. See, e.g., Vetter, supra note 99 (exploring important aspects of this entanglement between ideology and methodology). 104. See, e.g., LINUX FOUNDATION, http://www.linuxfoundation.org (last visited Mar. 22, 2014) (describing how Linux is built). 105. See Eric Steven Raymond, The Cathedral and the Bazaar, http://www.catb.org/~esr/ writings/cathedral-bazaar/cathedral-bazaar/index.html (last updated Aug. 2, 2002) (contrasting two forms of software development, the hierarchical cathedral approach used in proprietary software and the decentralized, open, Internet-based development style used by Linux). 1090 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 lates the powerful idea of software as a modular and communal Internet-based effort.106 The source code of Linux is made available without charge, and with the ability to freely modify and use this code, pursuant to version two of a well-known free and open source copyright license called the General Public License (GPL).107 The licensing model is a legal innovation, what has been referred to as legal jujitsu, designed to use intellectual property rights to preserve the open source nature of the project.108 The GPL embodies principles of open access, free sharing, and reciprocity in its license restrictions and contractual obligations as a way of preserving and expanding the domain of open source software. While open source licensing strategies such as this one have helped to sustain open source efforts, the need for additional strategies to preserve open source has been widely acknowledged by proponents of open source.109 In the case of Linux, backing by large corporate players was an essential part of its survival. Linux rapidly gained popularity as an alternative to Microsoft’s proprietary software operating system. In response, Microsoft began a concerted strategy to disadvantage Linux by encouraging companies to trade open source participation for financial gain and by getting the users of Linux to pay royalties to Microsoft. This included a controversial joint patent agreement between Microsoft and a company called Novell, Inc., a software company that had initially set itself up to compete with Microsoft using Linux-based open source 106. See, e.g., LEISTER ET AL., supra note 97, at 47-78. 107. The GPL provides that software licensed under the GPL can be freely used, copied and modified, provided that any modifications and improvements to this software are also made available to the public in source code form under the same license terms. The first two versions of the GPL focused primarily on copyright, but a third version has been developed to address the significant challenges that software patents create for the open source process. See GNU General Public License, Version 2, GNU OPERATING SYS. (June, 1991), http://www.gnu.org/licenses/gpl-2.0.html; GNU General Public License, Version 3, GNU OPERATING SYS. (June 29, 2007), http://www.gnu.org/licenses/gpl.html; see also Robert W. Gomulkiewicz, A First Look at General Public License 3.0, 24 COMPUTER & INTERNET L. 15, 15 (2007). For critiques of GPL version 3 see, for example, James E.J. Bottomley et al., Kernel Developers’ Position on GPLv3: The Dangers and Problems with GPLv3, LWN.NET (Sept. 15, 2006), http://lwn.net/Articles/200422/; John Carroll, The Crux of the GPL Problem, ZDNET (June 4, 2007, 7:42 AM), http://www.zdnet.com/blog/ carroll/the-crux-of-the-gpl-problem/1707. 108. The GNU/Linux computer operating system includes the Linux kernel, an open source project initiated by Linus Torvalds in 1991, and GNU software emerging from the free software movement founded by Richard Stallman in 1985. Richard Stallman, Linux and the GNU System, GNU OPERATING SYS., http://www.gnu.org/gnu/linux-and-gnu.html (last updated Apr. 12, 2014). I focus here on the development of the Linux kernel, although the issues extend to the broader GNU/Linux operating system. 109. See, e.g., Clark D. Asay, A Case for the Public Domain, 74 OHIO ST. L.J. 753 (2013); Jason Schultz & Jennifer M. Urban, Protecting Open Innovation: The Defensive Patent License as a New Approach to Patent Threats, Transaction Costs, and Tactical Disarmament, 26 HARV. J.L. & TECH. 1 (2012); Greg R. Vetter, A Public Domain Approach to Free and Open Source Software?, 75 OHIO ST. L.J. FURTHERMORE (forthcoming 2014). 2014] COOPERATIVE INNOVATION 1091 software products.110 Novell received large payments pursuant to its deal with Microsoft, and when the deal ended, a technology consortium led by Microsoft acquired key intellectual property assets from Novell for $450 million.111 Members of the FOSS community criticized Novell for what they saw as a defection from group norms and a compromise of the interests of the free software community. Novell was seen as free-riding on the value created by the open source community and capitalizing on the holdup value of patents covering inventions used by the open source community. More importantly, the deal was seen as providing unwarranted legitimacy for patent claims made against Linux, creating a cloud of uncertainty and fear for users of Linux and deterring open source developers.112 Shortly after the first agreement with Novell was signed, Microsoft began making public claims that Linux violated more than 200 of Microsoft’s patents—no fewer than 235 according to Microsoft’s general counsel at that time.113 The fact that the Linux source code is freely available allows patent holders to scrutinize the code for areas that might implicate their patents. The fact that the system involves combining and building on incremental contributions means that patents covering even small parts of the system may have tremendous holdup power. Since its initial claims of infringement, Microsoft has focused on systematically securing patent licensing deals from Linux users, although it has also relied on patent infringement litigation against select users of Linux.114 Patent assertion entities such as IP Innovations, a subsidiary of Acacia Technologies, have also brought patent suits against prominent users of Linux such as Red Hat. Some speculate that Microsoft backed the Acacia litigation against Red Hat.115 Red Hat, which provides services based 110. See, e.g., Elizabeth Montalbano, Update: Microsoft, Novell Strike Linux Deal, COMPUTERWORLD (Nov. 2, 2006, 12:00 PM), http://www.computerworld.com/s/article/ 9004723/Update_Microsoft_Novell_strike_Linux_deal; Paul Krill, The Microsoft-Novell Linux Deal: Two Years Later, INFOWORLD (Nov. 18, 2008), http://www.infoworld.com/d/opensource/microsoft-novell-linux-deal-two-years-later-858. 111. See sources cited supra note 104. 112. See, e.g., Katherine Noyes, Microsoft’s Hand in Novell Deal Bodes Ill for Linux, PCWORLD (Nov. 22, 2010, 3:12 PM), http://www.pcworld.com/article/211414/microsofts_ hand_in_novell_deal_bodes_ill_for_linux.html; TECHRIGHTS, http://www.techrights.org/home/ (last visited Mar. 22, 2014) (showing Roy Schestowitz is editor of the site). 113. See, e.g., Mary Jo Foley, Microsoft: Free and Open Source Software Violates 235 Microsoft Patents, ZDNET (May 13, 2007, 4:46 PM), http://www.zdnet.com/blog/microsoft/ microsoft-free-and-open-source-software-violates-235-microsoft-patents/436; Peter Lattman, Patent Litigation’s Battle Royale: Microsoft v. Open Source, WALL ST. J., LAW BLOG (May 15, 2007. 9:21 AM), http://blogs.wsj.com/law/2007/05/15/patent-litigations-battle-royalemicrosoft-v-open-source/. 114. See, e.g., John C. Dvorak, Microsoft’s Nuisance Suit Strategy, PC MAG. (Sept. 21, 2011), http://www.pcmag.com/article2/0,2817,2393361,00.asp. 115. See, e.g., J. Nicholas Hoover, Acacia Research, Linux Patent Adversary, Has Long Litigation History, INFORMATIONWEEK (Oct. 12, 2007, 4:32 PM), http://www.information 1092 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 on Linux, is often heralded as one of the open source software company success stories, making it a natural target for opponents of Linux. The company complains of having to routinely address “attempts to impede the innovative forces of open source via allegations of patent infringement.”116 General and widespread threats like those made by Microsoft increase the real and perceived risks and the transaction costs of contributing to and using open source software for all participants in the open source system, with the largest impact on developers and users who are not affiliated with and protected by large companies. Even small changes in cost and risk may deter many users of the resulting software, chill development efforts, and alter otherwise promising development paths. The availability of software patents increased the commercial attractiveness of defecting from the FOSS community for Novell and increased the risks of third party patent infringement suits against community members.117 These risks ultimately forced community members to rely heavily on the resources of large commercial participants such as IBM to protect Linux through defensive patenting strategies. Linux survived despite patent risks and costs largely by becoming an established part of the business model of major participants in the software industry.118 By some estimates more than half of the companies in the Fortune 500 are using Linux in their data centers.119 These large corporate users have invested significant resources both in the development and the protection of the Linux project.120 In response to patent infringement threats made by Microsoft against Linux, large corporate users of Linux—i.e. IBM, NEC, Novell, Phillips, Red Hat, and Sony—set up the Open Invention Network week.com/acacia-research-linux-patent-adversary-has-long-litigation-history/d/d-id/106 0255?; Roy Schestowitz, Red Hat Pays Microsoft-Linked Patent Troll Again, Refuses to Provide Details, TECHRIGHTS (May 25, 2013, 7:16 AM), http://techrights.org/2013/05/25/acacia-red-hat/. 116. See, e.g., Soulskill, Red Hat Settles Patent Case, SLASHDOT (Oct. 4, 2010, 6:45 PM), http://linux.slashdot.org/story/10/10/04/2148218/red-hat-settles-patent-case?sdsrc=rel. 117. See, e.g., Krill, supra note 110. 118. See, e.g., Oliver Alexy & Markus Reitzig, Private-Collective Innovation, Competition, and Firms’ Counterintuitive Appropriation Strategies, 42 RES. POL’Y 895 (2013) (examining role of exclusion rights for technology in competition between private-collective and other innovators); Joel West, How Open Is Open Enough? Melding Proprietary and Open Source Platform Strategies, 32 RES. POL’Y 1259 (2003) (examining hybrid strategies and contrasting them with purely open and purely proprietary software alternatives). 119. Parloff, supra note 11. 120. See, e.g., Dan Woods, Can Intel Heal the Hadoop Open Source Ecosystem?, FORBES (Feb. 26, 2013, 9:22 AM), http://www.forbes.com/sites/danwoods/2013/02/26/can-intel-heal-thehadoop-open-source-ecosystem/2/ (“In the Linux community the primary contributors are those who benefit from using Linux in their businesses. IBM, Intel, Google, HP, Oracle all make a pile of money because Linux solves a variety of problems for them. The amount of value that they receive from this use dwarfs that captured by Red Hat or Suse, the Linux distributors. Linux thrives because the big players take part of the massive revenue from the use value and invest heavily in large development teams.”). 2014] COOPERATIVE INNOVATION 1093 (OIN) in 2005 to acquire a portfolio of patents that could create problems for companies like Microsoft should they create problems for Linux users.121 OIN is self-described as “an intellectual property company that was formed to promote the Linux system by using patents to create a collaborative ecosystem.”122 “Patents owned by OIN are available royalty-free to any [entity] or individual that agrees not to assert its patents against [the] Linux” system.123 In addition, Open Source Development Labs, which is the consortium that promotes and coordinates Linux development, established its own patent commons to accept donations of rights to use patents.124 The Patent Commons Project is self-described as creating an area of safety, “a preserve where developers and users of software can innovate, collaborate, and access patent resources in an environment of enhanced safety, protected by pledges of support made by holders of software patents.”125 These patent pooling efforts can be seen as a way of trying to preserve the trust and reciprocity on which open source systems depend. Compliance with group norms is achieved by providing a patent shield for members who adhere to group norms. Reciprocity is enforced through contingent protections that are available only to participants who do not themselves assert their patents against other group members or protected open source projects. Other community responses to the patent threats have included Linux Defenders, an online clearinghouse for prior art designed to invalidate poor-quality software patents,126 and a project called A Patent a Day, with its goal of identifying one Microsoft-owned patent every day that Linux potentially infringes with the goal of helping to get rid of the dependency on these patents and/or get rid of the patents.127 These efforts illustrate the ways in which open source communities must participate in the patent system simply as a way of protecting their nonproprietary software systems from extinction. Such efforts come with a very steep price tag both in terms of cost and in terms of increasingly centralized control over open source. Monitoring and acquiring patents are ironic ways for an open source 121. Nicholson, supra note 94, at 16; see also OPEN INVENTION NETWORK, http://www.openinventionnetwork.com (last visited Mar. 22, 2014). 122. Nicholson, supra note 94, at 16. 123. OPEN INVENTION NETWORK, supra note 121. 124. See, e.g., Steve Hamm, Linux Marches On, BLOOMBERG BUSINESSWEEK (Nov. 16, 2005), http://www.businessweek.com/the_thread/techbeat/archives/2005/11/linux_marches_ o.html; see also PATENT COMMONS, http://www.patentcommons.org (last visited Mar. 22, 2014). 125. PATENT COMMONS, supra note 124. 126. LINUX DEFENDERS, http://linuxdefenders.org (last visited Mar. 22, 2014). 127. See PatentSleuth, Introduction Post: A Patent a Day Project, LINUX PATENTS (July 4, 2009, 8:26 AM), http://linuxpatents.blogspot.com/2009/07/introduction-post-patent-dayproject.html. 1094 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 community to spend its funds. Reliance on defensive patenting and pooling strategies also changes the balance of power within the open source community, giving corporate participants with large patent holdings control over the directions that open source projects take. One of the largest corporate supporters of Linux, IBM, also regularly tops the list of patents filed at the U.S. Patent and Trademark Office.128 Corporate patent holders like IBM have significant power in shaping the boundaries of protected open source software spaces, aligning the boundaries with their own private business interests and strategies. In addition to favoring some open source software projects but not others, commercial partners of the open source community tend to favor hybrid models in which proprietary and open source software development coexists.129 While not everybody sees this shift towards hybrid models as a problem,130 many members of the open source software community are skeptical that a balance of closed and open source software will survive.131 Their concerns include the negative impact of hybrid models on the motivations supporting open source software communities, the shift in control over development paths for software that impacts private business interests, the high direct and indirect costs of defensive patents strategies that pervade this hybrid world, and the threats that patents will continue to pose for open source models not backed by large corporate users.132 Thus, while private orderings of intellectual property rights such as defensive patent pooling may serve to mitigate patent threats for open source software, they do so in a limited and costly way. Patents continue to challenge the viability of FOSS systems that rely on 128. See, e.g., IBM Earns Most U.S. Patents for 17th Consecutive Year; Will Offer Licenses to Patent Portfolio Management Know-How, IBM (Jan. 12, 2010), http://www03.ibm.com/press/us/en/pressrelease/29168.wss. 129. See, e.g., Open-Source Software: Going Hybrid, ECONOMIST, (July 25, 2002), available at http://www.economist.com/node/1251254; Rosa Maria Ballardini, Proprietary Software vs. FOSS: Challenges with Hybrid Protection Models (May 2012) (Ph.D. dissertation, IPR Univ. Ctr.), available at http://www.iprinfo.com/julkaisut/verkkojulkaisut/ipr-series-b/en_GB/ proprietary-software-vs-foss/_files/88742337887406149/default/B4_Ballardini_eng.pdf. 130. See, e.g., Dreyfuss, supra note 9; Ronald J. Mann, Commercializing Open Source Software: Do Property Rights Still Matter?, 20 HARV. J.L. & TECH. 1, 3 (2006) (exploring the symbiotic relationship between proprietary and open source software); Jay P. Kesan, The Fallacy of OSS Discrimination by FRAND Licensing: An Empirical Analysis (Univ. of Ill. Coll. of Law Pub. Law & Legal Theory Res. Paper Series, Paper No. 10-14, 2011), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1767083 (examining compatibility of OSS licenses with proprietary uses). 131. See, e.g., Sonali K. Shah, Motivation, Governance, and the Viability of Hybrid Forms in Open Source Software Development, 52 MGMT. SCI. 1000 (2006). For a discussion of hybrid models and the issues that may arise, see, for example, Vetter, supra note 26. 132. See, e.g., Arnold Polanski, Is the General Public License a Rational Choice?, 55 J. INDUS. ECON. 691 (2007) (showing that proprietary licensing can lead to a holdup problem which may terminate a sequence of innovation prematurely, and that free open source licensing may be able to avoid this). 2014] COOPERATIVE INNOVATION 1095 keeping costs and risks low and adherence to community norms based on openness, trust, and reciprocity high.133 I suggest that in the absence of larger patent reforms addressing concerns with software patents,134 systematic efforts by courts to take into account the costs of patents in cooperative contexts may help to limit these costs and to support a greater diversity of open source software projects. III. PATENT ROADBLOCKS As cooperative systems such as crowd science and free and open source software develop, they must confront patent laws that are designed with a very different model of cooperation in mind. In some cases the incentives that patents create may interfere with the mechanisms of trust, benefit-sharing, and reciprocity on which these and other cooperative innovation systems rely, increasing collective action problems. In other cases, patent laws may help to solve collective action problems. Fashioning the right policy response requires closer scrutiny of the relationship between patent laws and intellectual production when private incentives and public interests diverge.135 Patents may impede the collective action needed to sustain cooperative innovation in two different ways. First, patents increase the incentives for individual members of a cooperative system to defect from group norms of open access and sharing. Where a member of a group has the opportunity to patent and privately exploit an invention that is useful to the group, this member will be less willing to share her ideas with the group and may be more likely to free ride on 133. For studies of the survival factors of open source software, see, for example, Kevin Crowston et al., Free/Libre Open-Source Software Development: What We Know and What We Do Not Know, 44 ACM COMPUTING SURV. 7:1 (2012); Vishal Midha & Prashant Palvia, Factors Affecting the Success of Open Source Software, 85 J. SYS. & SOFTWARE 895 (2012); Jing Wang, Survival Factors for Free Open Source Software Projects: A Multi-Stage Perspective, 30 EUR. MGMT. J. 352 (2012). 134. There is a rich literature identifying and responding to problems with software patents. See, e.g., Kevin Emerson Collins, Patent Law’s Functionality Malfunction and the Problem of Overbroad, Functional Software Patents, 90 WASH. U. L. REV. 1399 (2013); Mark A. Lemley, Software Patents and the Return of Functional Claiming, 2013 WIS. L. REV. 905 (2013); James Bessen, A Generation of Software Patents, (Bos. Univ. Sch. of Law, Working Paper No. 11-31, 2011) (critically examining software patenting practices and impact on social welfare). 135. For use of game-theoretic models to explore opportunities for using patents to improve cooperative outcomes, see, for example, Shubha Ghosh, Patent Law and the Assurance Game: Refitting Intellectual Property in the Box of Regulation, 18 CAN. J.L. & JURISPRUDENCE 307 (2005) (referencing the assurance game as an alternative way of thinking about the role of patent law in regulating innovation). Under the assurance game, more commonly known as the stag hunt, two hunters can jointly hunt a stag for high payoffs or individually hunt rabbits for smaller payoffs. If either hunts a stag alone, the chance of success is minimal. Hunting stags is most beneficial for the group but requires significant trust among its members. See also Ted Sichelman, Quantum Game Theory and Coordination in Intellectual Property (San Diego Legal Studs., Paper No. 10-035, 2010). 1096 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 and exploit the ideas generated by the group. Additionally, a member may be driven against her interest to seek patent protection for protective reasons, fearing that others will appropriate the benefits from her contribution without sharing in return. Patents thus increase the individual payoffs from defecting from group norms and may reduce the payoffs from adhering to group norms. As a result, members of the group will have reduced expectations that other members will behave in accordance with group norms of open and free sharing, further weakening these norms. Members of the group might also place less value on non-market rewards within the group such as reputation. Second, patents increase the risks to group members posed by third parties. The open and transparent nature of intellectual production in contexts of cooperative innovation makes it easy for third parties to assert patents against the group, and where third parties have patents covering technologies that are widely used by the group the third parties will have the ability to hold up the group and collect more than the incremental value of their technological contribution. Third parties may also be able to free ride on the intellectual production of the group without any reciprocating contributions. Even generalized threats of third party litigation increase transaction costs for developers and users of open source software by forcing them into defensive patent licensing and pooling arrangements which need to be maintained and enforced. This requires them to spend time examining potential patent risks and planning for potential patent infringement claims, and in some cases induces them to enter licenses and make royalty payments simply as a way of averting threats from aggressive patent holders.136 Cooperative systems are particularly sensitive to these kinds of transaction costs, since they rely on large numbers of volunteers freely sharing ideas. Even small changes in the cost of participation—such as the need to reserve funds to respond to cease-and-desist letters from third parties, the learning costs associated with participating in defensive patent pools, the administrative costs associated with making and using software covered by a growing family of different open source software license agreements, and small changes in the risk of participation—may therefore interfere with the continuing operations of the group. In some cases, these groups survive only by aligning the activities of the group with the private interests of one or a few large players with deep pockets and vested interests in the innovation system. By increasing defections from group norms, and by increasing threats from 136. See, e.g., Schultz & Urban, supra note 109 (surveying options and some of the costs involved with these options); see also Nicholson, supra note 94, at 14 (discussing some of the transaction costs and chilling effects of patents for open source software participants). 2014] COOPERATIVE INNOVATION 1097 outside the groups, patents may sometimes threaten or distort valuable processes of cooperative innovation. The disconnect between the needs of cooperative innovation and the incentives that patents create can be explained in part by patent law’s attachment to an outdated model of innovation. The U.S. patent statute, as well as the broader international patent law framework now in place, is anchored on a paradigm of market-based, producerdriven innovation.137 As a result, the patent statute and implementing laws and regulations deal primarily with the creation, definition, and enforcement of ownership rights over inventions and the administration of this process.138 The right of the patent owner to exclude others from use of the invention forms the backbone of patent law, and most of the statute is devoted to defining and policing these rights. Patent remedies are designed to restore the patent owner to the status quo before infringement through the award of reasonable royalties, lost profits resulting from lost sales or price erosion,139 and/or injunctive relief.140 The statute pays much less attention to the source and nature of the inputs leading to invention,141 and to how the subsequent patents are managed and used,142 or, even more importantly, not used.143 Patent law does address issues of team production, but it does so largely with a focus on identifying the true inventors and protecting their collective rights through rules governing derivation and joint 137. See, e.g., Rochelle Cooper Dreyfuss, Commodifying Collaborative Research, in THE COMMODIFICATION OF INFORMATION 397 (Niva Elkin-Koren & Neil Weinstock Netanel eds., 2002) (examining myth of the individual inventor and disjuncture between current IP law and issues of importance to collaborators). 138. See 35 U.S.C. (2012). Part I of the statute deals with the establishment and operation of the USPTO, and Part II focuses primarily on how to obtain a patent, including requirements for patentability. Part III focuses on protection of patent rights. Part IV deals with the Patent Cooperation Treaty, addressing international issues relevant to the Act. 139. Compensation to the patent owner extends even to harm from offers to sell. See, e.g., Timothy R. Holbrook, Liability for the “Threat of a Sale”: Assessing Patent Infringement for Offering To Sell an Invention and Implications for the On-Sale Patentability Bar and Other Forms of Infringement, 43 SANTA CLARA L. REV. 751, 756-64 (2003). 140. For a description and critique of this private law focus of patent remedies, see Sichelman, supra note 19. 141. See, e.g., Mark A. Lemley, Point of Novelty, 105 NW. U. L. REV. 1253 (2011); Lemley, supra note 9; Sean B. Seymore, Rethinking Novelty in Patent Law, 60 DUKE L. J. 919, 929 (2011) (exploring complexity of ensuring that a patent does not issue if the public already possesses the invention, and joining “a larger project to bridge the disconnect between patent law and the norms of science”). 142. See, e.g., Herbert Hovenkamp, Innovation and the Domain of Competition Policy, 60 ALA. L. REV. 103 (2008) (discussing rules dealing with patent management confined to defining what constitutes infringement, remedies, and patent misuse). 143. See, e.g., Oskar Liivak & Eduardo M. Peñalver, The Right Not to Use in Property and Patent Law (Cornell Law Sch. Legal Studs. Res. Paper Series, Research Paper No. 12-62, 2012), available at http://ssrn.com/abstract=2162667. 1098 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 inventorship. Doctrines of derivation144 and the shared ownership rules for co-inventors145 protect the rights of those team members who have either made an invention that is misappropriated or made inventorship contributions to a collective invention. Pursuing derivation or joint inventorship claims is costly, however, and involves evidentiary burdens that may be difficult to satisfy in contexts of massively distributed innovation. In addition, these doctrines do little to recognize or protect many kinds of valuable contributions to the collective process of intellectual production. To be a joint inventor, an individual must contribute to the conception of the invention. This leaves out individuals who make contributions that increase the likelihood of discovery but do not contemplate the discovery and individuals who work hard to reduce the invention to practice. Derivation proceedings address only situations in which it can be shown that members of the group actually made an invention that the patent applicant took without authorization.146 Again, this leaves out many situations in which the group performs the hard work needed to make discovery more likely through contributions such as research tools and ideas about paths not to take, as well as situations in which the group contributes to the reduction of the invention to practice. Moreover, both doctrines will be of limited practical relevance for many cooperative innovation projects that have limited budgets and 144. Derivation refers to situations in which an alleged inventor has derived the claimed invention from another. See 35 U.S.C. § 135 (2012). Derivation proceedings are costly and evidence intensive, requiring the challenging inventor(s) to file their own patent application, file a derivation petition within one year of the first publication of the claimed invention, show that the invention is “the same or substantially the same” as the earlier claim to the invention, provided a detailed explanation for claiming unauthorized derivation, and provide substantial evidence to support the petition. See, e.g., Derivation Proceeding: Overview, AM. INVENTS ACT, http://www.aiarulemaking.com/rulemaking-topics/group-3/derivation-proceedings.php (last visited Mar. 22, 2014). For concerns about the limits of derivation proceedings, see, for example, N. Scott Pierce, The Effects of the Leahy-Smith America Invents Act on Collaborative Research, 94 J. PAT. & TRADEMARK OFF. SOC’Y 133 (2012); Joshua D. Sarnoff, Derivation and Prior Art Problems with the New Patent Act, 2011 PATENTLY-O PAT. L.J. 12; Dennis Crouch, With 102(f) Eliminated, Is Inventorship Now Codified in 35 U.S.C. 101? Maybe, but not Restrictions on Patenting Obvious Variants of Derived Information, PATENTLY-O (Oct. 4, 2012), http://www.patentlyo.com/patent/2012/10/with-102f-eliminated-is-inventorship-now-codifiedin-35-usc-101.html. 145. Where an invention is made by two or more persons jointly, they are considered joint inventors even if they did not work together or make the same kinds or amount of contribution. 35 U.S.C. § 116 (2006). Unless otherwise agreed by contract, they are joint owners of the resulting patent and are free to use and authorize others to use the invention without the consent of or accounting to the other owners and all must join in an infringement suit based on the patent. 35 U.S.C. § 262 (2006). 146. See supra note 138; see also Gene Quinn, First Inventor to File: USPTO Derivation Proceedings Go Final, IPWATCHDOG (Sept. 10, 2012, 11:26 AM), http://www.ipwatchdog.com/ 2012/09/10/first-inventor-to-file-uspto-derivation-proceedings-go-final/id=27986/ (describing derivation proceedings). 2014] COOPERATIVE INNOVATION 1099 a decentralized, volunteer-based project design that is poorly suited to the pursuit of legal measures.147 In addition to the doctrines relevant to team production discussed above, patent law has been amended in response to the special needs of collaborations among different entities, but once again its response has been largely confined to ensuring that inventions can be patented by at least one of the collaborators. When different entities collaborate to innovate, patent law has been adjusted to limit the barriers that sharing information may pose for patenting inventions that emerge from the collaboration.148 With respect to how subsequent patents are managed and used, or not used, the focus in patent law remains on the patent owner’s rights to exclude others from using the patented invention. Little effort has been made to distinguish between socially beneficial and detrimental kinds of unauthorized patent use.149 Defenses to infringement based on special circumstances of creation and use, such as independent discovery or experimental use, remain narrow even after changes introduced to patent law by the America Invents Act (AIA) to expand protections for prior inventors.150 Third parties are generally not free to use the patented invention for any purposes, not even for experimentation or to confirm that the invention actually works as disclosed in the patent. Concepts of protecting certain kinds of publicly beneficial uses, such as the fair use found in copyright law, are missing altogether from the patent statute.151 147. See Aaron X. Fellmeth, Conception and Misconception in Joint Inventorship, 2 N.Y.U. J. INTELL. PROP. & ENT. L. 73 (2012) (discussing problems with claim fixation in inventorship and consequences for collaborative research). 148. See Cooperative Research and Technology Enhancement (CREATE) Act of 2004, Pub. L. No. 108-453, 118 Stat. 3596 (amending Section 103 of the Patent Act). For a discussion of the CREATE Act, including some potential concerns that it may pose for participants in collaborations, see Liza S. Vertinsky, Understanding and Applying the CREATE Act in Collaborations, in 3 AUTM TECHNOLOGY TRANSFER PRACTICE MANUAL (3d ed. 2008); see also Pierce, supra note 144. 149. This may be changing, albeit in a limited way, as courts and perhaps even Congress respond to the challenges that patents covering standards essential to critical technologies have created. See Part IV.A. 150. See, e.g., Lemley, supra note 9 (examining the disconnect between traditional theories of patent law and real-world experience, particularly in the context of independent invention). The AIA expands the protection for prior inventors. It provides a “prior use defense” to patent infringement that protects parties who can establish that they have in good faith commercially used a product or process covered by a patent at least one year before the earlier of the public disclosure or the effective filling date of the patent disclosing the invention. Although more robust than the one it replaced, it includes a number of limitations. See U.S. PAT. & TRADEMARK OFF., REPORT ON THE PRIOR USER RIGHTS DEFENSE (2012), available at http://www.uspto.gov/aia_implementation/20120113-pur_report.pdf. 151. See, e.g., Maureen A. O’Rourke, Toward a Doctrine of Fair Use in Patent Law, 100 COLUM. L. REV. 1177 (2000) (arguing that new technology has put pressure on patent laws that increasingly interfere with follow on innovation, and proposes a doctrine of fair use in patent law to relieve some of this pressure); Katherine J. Strandburg, Patent Fair Use 2.0, 1 U.C. 1100 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 Members of a community that contribute valuable ideas to the inventor are simply out of luck unless they have the resources and the ability to show that they are joint inventors, that their invention was derived from them, or that the patented invention would be obvious to individual community members in light of the combined knowledge and effort of the community.152 Determining who contributed what to an invention in a collaborative effort is difficult, particularly where innovation takes the form of cumulative, incremental contributions by many participants.153 Showing that an invention was derived from the cumulative, widely-shared discoveries of the group is likely to be both costly and challenging. The limits that nonobviousness imposes on patentability are also unlikely to provide adequate protection for collective intellectual production.154 Even if a group can find and present prior art challenging the novelty of a patent, they must overcome the legal presumption that the patent is valid. This presumption holds regardless of whether the U.S. Patent and Trademark Office considered the prior art when granting the patent.155 Patent law, both on the books and as applied, remains too heavily oriented around the patent ownership rights of the pioneering lone inventors and their assignees. In doing so, patent law neglects the needs of other very different forms of intellectual production such as cooperative innovation.156 This is not to suggest that patents are always or even mostly a constraint on innovation or that innovation would increase in the ab- IRVINE L. REV. 265 (2011) (arguing that there should be greater use of defenses and exemptions to patent infringement to respond to the different contexts in which inventions are used); see also Lorelei Ritchie de Larena, What Copyright Teaches Patent Law About “Fair Use” and Why Universities Are Ignoring the Lesson, 84 OR. L. REV. 779 (2005) (arguing that a doctrine of fair use will help reduce negative externalities and clarify expectations on what type of infringement is actionable). 152. See 35 U.S.C. § 103 (2012) (addressing conditions for patentability and nonobvious subject matter); supra note 75 (discussing joint inventorship); supra note 144 (discussing derivation). 153. See also Dennis Crouch, Inventorship: Limits of Collaboration, PATENTLY-O (Apr. 1, 2013), http://patentlyo.com/patent/2013/04/inventorship-limits-of-collaboration.html (discussing outcome of Rubin v. Gen. Hosp. Corp., 523 F. App’x 719 (Fed. Cir. 2013)). 154. See, e.g., Shawn P. Miller, Where’s the Innovation: An Analysis of the Quantity and Qualities of Anticipated and Obvious Patents, 18 VA. J.L. & TECH. 1 (2012) (suggesting patents are being awarded with negligible innovation value); see also Gregory Mandel, The NonObvious Problem: How the Indeterminate Nonobviousness Standard Produces Excessive Patent Grants, 42 U.C. DAVIS L. REV. 57 (2008). 155. See, e.g., Sciele Pharma Inc. v. Lupin Ltd., 684 F.3d 1253, 1260 (Fed. Cir. 2012). 156. While the requirement to disclose the invention could be seen as facilitating sharing, it is at best a limited form of sharing. See Timothy R. Holbrook, Possession in Patent Law, 59 SMU L. REV. 123, 132-34 (pointing out the disconnect between role of disclosure as teaching and theory of combating free-riding, suggests that we think of the function of disclosure as possession). 2014] COOPERATIVE INNOVATION 1101 sence of patents.157 Patents play important roles in attracting resources and providing market incentives for proprietary, producerdriven innovation.158 Patents can also enable limited departures from closed, producer-driven systems of innovation by supporting open innovation models in which companies sell or license out unused technologies and acquire or license in third party discoveries.159 Where patents interfere with cooperation that patent owners are interested in preserving, the patent owners can create their own contract-based forms of sharing and pooling patent rights. Patent pools,160 licensing strategies that incorporate broader public objectives and public uses into the license terms,161 and patent licensing strategies modeled on those employed by open source software,162 can and do operate to preserve areas of cooperation.163 Moreover, existing rules and doctrines such as joint inventorship and the limiting effects of prior art and derivation on patentability in contexts of cumulative intellectual production mitigate some of the incentive problems that patents might otherwise create for cooperative innovation. While these legal tools and private arrangements are helpful in making room for cooperative innovation, they do not adequately address the harmful incentive effects of patents on non-market mecha157. See, e.g., Jonathan M. Barnett, Intellectual Property as a Law of Organization, 84 S. CAL. L. REV. 785 (2011) [hereinafter Barnett, Law of Organization] (discussing the role of patents in supporting disaggregation of innovation process); Barnett, The Illusion of the Commons, supra note 20 (examining the importance of property in supporting sharing regimes). 158. Strong patent rights may facilitate coordination among many different market players by reducing transaction costs, solving problems of incomplete contracting, signaling firm value, or facilitating bargains over use of the patent rights. See, e.g., Ashish Arora & Robert P. Merges, Specialized Supply Firms, Property Rights and Firm Boundaries, 13 INDUS. & CORP. CHANGE 451 (2004); Barnett, Law of Organization, supra note 157 (patents as facilitating specialization); Heald, supra note 20 (discussing the role of patents in solving team production problems and facilitating technology transfer through transaction cost savings); Kieff, supra note 20 (focusing on the role of patents in facilitating coordination among many diverse complementary users of an asset in a way that increases competition and access). 159. See, e.g., Henry Chesbrough, Open Innovation: A New Paradigm for Understanding Industrial Innovation, in OPEN INNOVATION: RESEARCHING A NEW PARADIGM (Henry Chesbrough, Wim Vanhaverbeke & Joel West eds., 2006) (defining open innovation as “a paradigm that assumes that firms can and should use external ideas as well as internal ideas, and internal and external paths to market, as they look to advance their technology”); see also Barnett, Law of Organization, supra note 157. 160. See, e.g., Robert P. Merges, Institutions for Intellectual Property Transactions: The Case of Patent Pools, BERKELEY L. (1999), https://2048.berkeley.edu/files/pools.pdf. 161. See, e.g., Amy Kapczynski et al., Addressing Global Health Inequities: An Open Licensing Approach for University Innovations, 20 BERKELEY TECH. L.J. 1031 (2005); Peter Lee, Contracting To Preserve Open Science: Consideration-Based Regulation in Patent Law, 58 EMORY L.J. 889, 915 (2009). 162. See, e.g., Schultz & Urban, supra note 109. 163. See, e.g., Robert P. Merges, A New Dynamism in the Public Domain, 71 U. CHI. L. REV. 183 (2004) (examining private efforts to self-correct for excesses of patents). 1102 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 nisms important to some forms of cooperative innovation. The doctrinal tools available to support collaboration remain tethered to a market-based, producer-driven model of innovation. They do little to support the kinds of exchanges that are needed in a volunteer-driven system of combined intellectual production. In many cases, the private measures are inherently incomplete, primarily or even solely defensive in nature, and often extremely expensive.164 Some of the strategies used to preserve openness may even backfire if patents obtained for defensive purposes later become litigation tools. Despite mitigating doctrines and private market responses,165 patents as currently enforced can and do systematically and significantly disadvantage some forms of cooperative innovation.166 Since it is effectively impossible to opt out of the patent system, change may be needed from within patent law to give forms of cooperative innovation that are vulnerable to patents a chance to compete.167 In addition, the public nature of a change in the law might have expressive effects missing from private efforts to circumvent the law, effects that would help to strengthen group norms and values important to cooperative systems.168 In Part IV, I propose one way for courts to respond to the vulnerabilities of cooperative innovation systems without radically changing 164. See, e.g., Asay, supra note 109, at 805 (describing the costs involved in trying to preserve open systems of knowledge exchange through private orderings); Mattioli, supra note 17, at 108 (examining question of whether patent sharing reflects a form of market self-regulation, and critiquing view that private ordering can always correct for excessive apportionment of patent rights). 165. See, e.g., U.S. DEP’T OF JUST. & FED. TRADE COMM’N, ANTITRUST GUIDELINES FOR THE LICENSING OF INTELLECTUAL PROPERTY §§ 3.4, 4, and 5.6 (1995), available at http://www.justice.gov/atr/public/guidelines/0558.pdf (discussing the use of the rule of reason to evaluate various kinds of IP agreements and arrangements); Sheila F. Anthony, Antitrust and Intellectual Property Law: From Adversaries to Partners, 28 AIPLA Q.J. 1 (2000) (discussing intersection of IP and antitrust, key focus of antitrust on precompetitive nature of various agreements and arrangements involving IP). 166. For example, as work by Nobel Prize winner Elinor Ostrom and others on the management of common pool resources has shown, external legal rights that control allocations within the group may interfere with valuable non-market forms of cooperation that could achieve better collective outcomes. See, e.g., UNDERSTANDING KNOWLEDGE AS A COMMONS, supra note 31, at 7 (including design principles for managing the production of knowledge, viewed as a common pool resource; emphasizing importance of trust and reciprocity in sustaining cooperative systems; and emphasizing role of locally designed rules). 167. See, e.g., Schultz & Urban, supra note 109, at 10. 168. See, e.g., Jeanne C. Fromer, Expressive Incentives in Intellectual Property, 98 VA. L. REV. 1745, 1746 (2012) (exploring the role of expressive incentives, those that express solicitude for and protect a creator’s strong personhood and labor interests, in patent law); Timothy R. Holbrook, The Expressive Impact of Patents, 84 WASH. U. L. REV. 573, 613 (2006) (exploring the expressive impact that patent law can have, looking at how the grant of a patent could communicate a message of inferiority to groups whose identity is tied to their biology); William Hubbard, Inventing Norms, 44 CONN. L. REV. 369, 391 (2011) (arguing that patent law has an important role to play in supporting “inventing norms” and that these inventing norms should be incorporated into traditional patent law analysis). 2014] COOPERATIVE INNOVATION 1103 the patent system. Recent pressures on the patent system fueled by patent wars over the use of critical technology standards have created opportunities to make room for cooperative innovation in discussions about patent remedies. Rather than adding to the costs and uncertainties associated with broader judicial discretion in patent remedies, the principles I suggest might even act to limit existing uncertainties by providing a focal point for how patent remedies should be adjusted and limiting the areas in which they are to be adjusted. IV. PATENT REMEDIES WITH COOPERATION IN MIND Patent remedies have become the topic of increasing public interest and debate as the social costs of patent litigation mount and the divergence of public and private interests in laws governing patent remedies become more apparent.169 In the pages that follow I show why, when, and how we should make patent remedies more responsive to the needs of cooperative innovation. A. Remedies Without Context Patent remedies have historically been based on measuring and awarding reasonable compensation for past infringement to the owner of a valid, infringed patent, generally accompanied by injunctive relief to preclude future infringement.170 The patent owner has been entitled to no less than a reasonable royalty, generally defined as the royalty that a willing licensor and licensee would have agreed to at the time of the initial infringement.171 Historically, courts would also routinely provide the plaintiff patent owner with injunctive relief preclud- 169. See James Boyle, Open Source Innovation, Patent Injunctions, and the Public Interest, 11 DUKE L. & TECH. REV. 30 (2012); Thomas F. Cotter, Reining in Remedies in Patent Litigation: Three (Increasingly Immodest) Proposals, 30 SANTA CLARA COMPUTER & HIGH TECH. L.J. 1 (2014); Ghosh, supra note 135; Golden, supra note 18, at 507 (“In legislative debates, public-choice concerns loom large, as proposed reforms appear commonly to track private, rather than necessarily public, interests.”); Megan M. La Belle, Patent Law As Public Law, 20 GEO. MASON L. REV. 41 (2012); Rajec, supra note 19; Sichelman, supra note 19. 170. See also 35 U.S.C. § 284 (2006). The Patent Act provides that the owner of a valid, infringed patent is entitled to damages that are “adequate to compensate for the infringement, but in no event less than a reasonable royalty for the use made of the invention by the infringer” with the possibility of punitive damages for willful infringement. Id. 171. See, e.g., Christopher B. Seaman, Reconsidering the Georgia-Pacific Standard for Reasonable Royalty Patent Damages, 2011 BYU L. REV. 1661, 1676-81 (discussing Federal Circuit approach to reasonable royalties). Monetary remedies for patent infringement may take the form of either lost profits or lost royalties. In practice, however, determining what the appropriate monetary remedies are has been “a complicated and confusing task.” Roger D. Blair & Thomas F. Cotter, Rethinking Patent Damages, 10 TEX. INTELL. PROP. L. J. 1, 2 (2001) (providing overview of traditional approaches to lost profits and reasonable royalties and suggesting economic framework to aid in rethinking how patent damages are calculated). 1104 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 ing further infringing activity by the defendant.172 This approach to patent remedies aligns roughly with the reward function of patents within the traditional paradigm of producer-driven, market-based innovation. Focusing on compensation to the patent owner, however, may result in patent remedies that decrease rather than increase innovation in some contexts of cooperative intellectual production.173 One of the biggest limitations of the traditional approach to patent remedies has been its focus on the interests of the patent owner, to the exclusion of the interests of additional participants in the innovation process and the broader public interests in socially optimal levels of innovation.174 Interests beyond those of the patent owner, including both the infringer and the public more generally, started to play a bigger role in the calculation of patent remedies following the Supreme Court decision in eBay v. MercExchange in 2006.175 The Supreme Court held in eBay that injunctive relief in patent cases, just as in other types of cases, should not be presumed but rather should be determined based on the conventional four-factor test for injunctive relief.176 The Supreme Court thus shifted the calculus used by courts when determining whether to award injunctive relief to the owner of an infringed patent by requiring courts to take the harm of an injunction to the public and the defendant explicitly into account.177 Justice Kennedy’s influential concurring opinion went on to 172. See, e.g., Richardson v. Suzuki Motor Co., 868 F.2d 1226, 1247 (Fed. Cir. 1989) (“It is the general rule that an injunction will issue when infringement has been adjudged, absent a sound reason for denying it.”). 173. See, e.g., Ted Sichelman, Purging Patent Law of “Private Law” Remedies, 92 TEX. L. REV. 517 (2014); see also Boyle, supra note 169, at 32-34 (outlining some of the ways in which open source innovation is particularly vulnerable to patent injunctions); Thomas R. Cotter, Make No Little Plans: Response to Ted Sichelman, Purging Patent Law of “Private Law” Remedies, 92 TEX. L. REV. 25 (2014); Paul J. Heald, Optimal Remedies for Patent Infringement: A Transactional Model, 45 HOUS. L. REV. 1165 (2008). 174. Patent remedies take the form of injunctive relief and damages. Damages are based on calculations of loss to the patent owner, either in the form of a patent owner’s lost profits, price erosion, or reasonable royalties. See, e.g., THOMAS F. COTTER, COMPARATIVE PATENT REMEDIES: A LEGAL AND ECONOMIC ANALYSIS (2013) (comprehensively discussing patent remedies in the United States and selected other countries). The works referenced in footnote 171 highlight various limitations of the traditional approach to remedies taken by the courts. 175. eBay Inc. v. MercExchange, LLC, 547 U.S. 388, 394 (2006) (holding that the wellestablished principles of equitable relief apply with equal force to disputes under the Patent Act). 176. Id. at 391-93. This case replaced the Federal Circuit’s “general rule” in favor of granting injunctions based on a presumption of irreparable harm with a required balancing of interests. To obtain injunctive relief, the plaintiff must show that it has suffered irreparable harm, remedies available under the law are inadequate to compensate, the balance of hardships associated with injunctive relief favor the plaintiff, and the public interest will not suffer by the issuance of the requested injunction. Id. 177. See, e.g., FED. TRADE COMM’N, THE EVOLVING IP MARKETPLACE: ALIGNING PATENT NOTICE AND REMEDIES WITH COMPETITION 253 (2011) [hereinafter FTC REPORT]; see also 2014] COOPERATIVE INNOVATION 1105 suggest specific situations in which district courts might find injunctive relief inappropriate, such as patent assertion by non-practicing entities and situations of patent holdup.178 While eBay has made the role of the public interest explicit in determinations of injunctive relief, the case fails to provide principles to guide courts in their determinations of what the public interest is or how it should be measured.179 Courts have taken into account a greater variety of factors when determining whether an injunction should be awarded, although many of these considerations remain focused on whether the patent owner will suffer irreparable harm due to the infringement through loss of market share, price erosion, difficulty in calculating damages, or harm to reputation or goodwill.180 Whether the patent owner and infringer compete and whether the patent owner is a practicing entity appear to be important but not determining factors in predicting the availability of injunctive relief, and factors such as market structure and the relationship of the patented invention to the infringing product increasingly inform court decisions.181 Despite the more contextualized analysis of the effects of infringement and injunctive relief, however, detailed analysis of the effects of injunctive relief on the broader public interest Mark P. Gergen, John M. Golden & Henry E. Smith, The Supreme Court’s Accidental Revolution? The Test for Permanent Injunctions, 112 COLUM. L. REV. 203, 204-05 (2012) (suggesting that the eBay case has launched a revolution in the law of equitable remedies beyond patent law). 178. See, e.g., eBay Inc., 547 U.S. at 395-97 (Kennedy, J., concurring). 179. See, e.g., FTC REPORT, supra note 177, at 255 (“After enumerating the four equitable factors in the eBay decision, the opinion of the full Court gave little guidance on their application.”); see also Scott A. Allen, “Justifying” the Public Interest in Patent Litigation, 88 IND. L.J. 1047, 1051 (2013). 180. FTC REPORT, supra note 177, at 215 (discussing the ways in which courts have considered and applied the four factors in the test for injunctive relief); see also James M. Fischer, What Hath eBay v. MercExchange Wrought?, 14 LEWIS & CLARK L. REV. 555, 564-65 (2010); Stephen E. Noona, Permanent Injunctions for Patent Infringement in a Post eBay World, INSIDE BUS. (Dec. 9, 2010, 4:12 AM), http://insidebiz.com/blogs/kaufman-canoles/ permanent-injunctions-patent-infringement-post-ebay-world; Bryan J. Vogel & Shane St. Hill, IP: Injunctions and Irreparable Harm After eBay, INSIDECOUNSEL (June 19, 2012), http://www.insidecounsel.com/2012/06/19/ip-injunctions-and-irreparable-harm-after-ebay. 181. See, e.g., FTC REPORT, supra note 177, at 259 (showing results of survey of case law); see also eBay, 547 U.S. at 393 (Supreme Court’s warning against categorical rules in injunction analysis); Andrew Beckerman-Rodau, The Aftermath of eBay v. MercExchange, 126 S. Ct. 1837 (2006): A Review of Subsequent Judicial Decisions, 89 J. PAT. & TRADEMARK OFF. SOC’Y 631 (2007); Bernard H. Chao, After eBay, Inc. v. MercExchange: The Changing Landscape for Patent Remedies, 9 MINN. J.L. SCI. & TECH. 543 (2008) (arguing the importance of factors such as whether infringer is a competitor and showing of irreparable harm in post-eBay cases). For a more recent update that largely affirms the importance of whether the parties were competitors and the ability to show irreparable harm, see, for example, Barbara A. Fiacco, The Impact of eBay v. MercExchange, Presentation at the Duke Pat. Law Inst. (May 16, 2013) (presentation available at http://law.duke.edu/sites/default/files/centers/judicialstudies/patentlawintensive/Fiacco-Ma y%2016%20eBay%20v%20MercExchange.pdf). 1106 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 remains rare except in situations in which injunctions would have severe consequences for public health and safety or would significantly disrupt markets, or more recently in situations where patents cover important industry standards.182 Instead of conducting a broader inquiry into the effects of injunctions on innovation, some courts still simply equate the public interest with supporting innovation through a strong patent system.183 Although injunctive relief is no longer routine in the wake of eBay, injunctive relief seems to be based most frequently on a showing of irreparable harm to the patent owner and continues to be granted in the majority of cases.184 Thus, while determinations of injunctive relief following eBay have moved patent remedies in the direction of reflecting a richer range of entitlements, I suggest that courts still have not adequately captured the public interest in limiting injunctive relief or given it sufficient context or weight. This limited approach to the public interest may be starting to change, particularly in the context of cases involving patents that are essential to the use of important industry-wide technology stand182. See, e.g., FTC REPORT, supra note 177, at 232-34 (discussing the role of public interest, including survey of cases that address public interest explicitly as part of decision to award or deny injunctive relief). Greater attention to the public interest does seem to occur in cases involving substantial network effects that are threatened by patents. See, e.g., Apple, Inc. v. Samsung Elecs. Co., 909 F. Supp. 2d 1147, 1163 (N.D. Cal. 2012) (taking impact on consumers into account and denying injunctive relief despite status of parties as direct competitors); Apple Inc. v. Samsung Elecs. Co., 735 F.3d 1352, 1375 (Fed. Cir. 2013) (affirming District Court’s denial of injunctive relief despite status of parties as direct competitors for design patents, but vacating denial of injunctive relief for utility patents). 183. FTC REPORT, supra note 177, at 270-271 (“Only a small number of post-eBay cases have provided an extended discussion of this factor in deciding whether to grant an injunction. In the majority of cases, courts simply recognize that the ‘public has an interest in maintaining a strong patent system. This interest is served by enforcing an adequate remedy for patent infringement.’ ” (quoting TiVo Inc. v. Echostar Commc’ns Corp., 446 F. Supp. 2d 664, 670 (E.D. Tex. 2006)); see also, e.g., Pozen Inc. v. Par Pharm., Inc., 800 F. Supp. 2d 789, 825 (E.D. Tex. 2011) (reasoning that an injunction served the public interest because it encouraged innovation by upholding patent owner’s “right to exclude”); Zen Design Grp., Ltd. v. Clint, No. 08-cv-14309, 2009 WL 4050247, at *6 (E.D. Mich. Nov. 23, 2009) (reasoning that a permanent injunction served the public interest because, without it, the patent’s actual value would be reduced to “a fraction of its intended value”); Funai Elecs. Co., Ltd. v. Daewoo Elecs. Corp., 593 F. Supp. 2d 1088, 1111 (N.D. Cal. 2009) (“Protection of the rights of patent holders is generally in the public interest.”). 184. See, e.g., FTC REPORT, supra note 177, at 217-218 (“Surveys of post-eBay cases reveal that district courts have granted approximately 72%–77% of permanent injunction requests.”); see also Ernest Grumbles III et al., The Three Year Anniversary of eBay v. MercExchange: A Statistical Analysis of Permanent Injunctions, INTELL. PROP. TODAY, Nov. 2009, at 25, 26 (noting that seventy two percent of requests were granted through May 1, 2009, based on review of decisions available through Lexis); Erin Coe, Injunctions Harder To Win in Post-EBay Courts, LAW360 (Oct. 30, 2008, 12:00 AM), http://www.law360.com/ articles/74829/injunctions-harder-to-win-in-post-ebay-courts; Post-eBay Permanent Injunction Rulings in Patent Cases, PATSTATS.ORG, http://www.patstats.org/Patstats2.html (last updated May 26, 2013) (showing that injunctions were granted in 167 cases and denied in 55 cases, that is, granted seventy-five percent of the time). 2014] COOPERATIVE INNOVATION 1107 ards.185 In a series of high-profile patent infringement cases involving patents covering technology standards used in the smartphone industry, courts have had to consider whether injunctive relief should be available where patent owners have previously agreed to license patents essential to the use of these standards on reasonable and non-discriminatory terms. In one of the first court decisions to weigh in on this matter, Judge Posner suggested that injunctive relief should not be available, emphasizing the harm to the public interest that such relief would impose.186 Judge Posner went on to suggest that if the patent owner and infringer cannot agree on licensing terms, compulsory licensing with ongoing royalties should be used to resolve the dispute in a way that appropriately balances the harm to the patentee from infringement with the harm to the infringer and to the public from an injunction.187 This approach focuses explicitly on what the public interest is and how it should be reflected in determinations of patent remedies in standard setting contexts.188 While Judge Posner’s willingness to radically reshape how remedies are calculated diverges from the mainstream,189 his underlying message about the need to reconsider patent remedies in contexts where they may threaten important forms of coordination and cooperation is being taken seriously by policymakers. So far, however, this reconsid185. For an optimistic view of this change more generally, see, for example, Boyle, supra note 169. On the other hand, one fragmented opinion from the Federal Circuit illustrates the divergence of views held by judges in that court about when injunctive relieve should be available in the context of patents covering important industry standards. See Apple Inc. v. Motorola, Inc., Nos. 12-1548, 12-1549, 2014 WL 1646435, at *30-35 (Fed. Cir. April 25, 2014); id. at *36-37 (Rader, C.J., dissenting in part); id. at *43-46 (Prost, J., concurring in part and dissenting in part). 186. See Apple, Inc. v. Motorola, Inc. 869 F. Supp. 2d 901, 913-14 (N.D. Ill. 2012), aff’d in part, rev’d in part, Apple Inc., 2014 WL 1646435. (suggesting that the purpose of the fair, reasonable, and non-discriminatory terms (FRAND) requirement is “to confine the patentee’s royalty demand to the value conferred by the patent itself as distinct from the additional value—the hold-up value—conferred by the patent’s being designated as standard-essential”). But see Apple, Inc., 2014 WL 1646435, at *35 (affirming Judge Posner’s ruling that this particular holder of the patent subject to FRAND requirements was not entitled to injunctive relief, but insisting that eBay analysis of factors, with particular attention to whether patent holder will suffer irreparable harm as a result of the infringement, is required). 187. Apple Inc., 869 F. Supp. 2d at 918. 188. See eBay Inc. v. MercExchange, LLC, 547 U.S. 388, 395-97 (2006) (Kennedy, J., concurring). 189. See, e.g., Gene Quinn, Chief Judge Rader on the Supreme Court and Judge Posner, IPWATCHDOG (Mar. 17, 2013, 12:07 PM), http://www.ipwatchdog.com/2013/03/17/chiefjudge-rader-on-the-supreme-court-and-judge-posner/id=37620/; see also Apple, Inc., 2014 WL 1646435, at *35 (holding that Judge Posner erred in his district court opinion by applying “a per se rule that injunctions are unavailable for [standard-essential patents]”); id. at *36-37 (Rader, C.J., dissenting in part) (reasoning that the district court’s failure to consider the appropriate factors left it “adrift without a map”); id. at *45 (Prost, J., concurring in part and dissenting in part) (rejecting the district court’s “categorical rule that a patentee can never obtain an injunction on a FRAND-committed patent”). 1108 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 eration has been limited primarily to the context of standardessential patents encumbered by contractual commitments to license on reasonable and non-discriminatory terms.190 Calculations of patent damages have also moved in the direction of a more contextualized analysis, driven largely by decisions in the standard setting context. In the first court decision to confront and calculate reasonable and non-discriminatory royalties for patents essential to the use of industry standards, Judge Robart concluded in Microsoft v. Motorola that the traditional factors used to determine reasonable royalties, referred to as the Georgia-Pacific factors, should be explicitly modified to take the standard-setting context into account.191 Judge Robart, as Judge Posner had before him, emphasized the importance of the public interest in access to the standards and 190. Judge Posner’s approach in Apple v. Motorola is contrasted with Judge Robart’s ruling on FRAND damages in Microsoft Corp. v. Motorola, Inc., No. C10-1823JLR, 2013 WL 2111217, at *18-19 (W.D. Wash. April 25, 2013). Areas of divergence include Judge Robart’s reliance on the traditional Georgia-Pacific factors as a good way of calculating patent damages, and Judge Posner’s rejection of this framework. Compare id. (summarizing Judge Robart’s position), with Apple, Inc., 869 F. Supp. 2d at 910-11 (giving Judge Posner’s take). Judge Posner also insists that the FRAND value of a standardessential patent should be determined ex ante, pre-standardization, as compared to the traditional approach based on the date that infringement began. See, e.g., Florian Mueller, A Closer Look at the 207-Page, Landmark FRAND Rate-Setting Decision in Microsoft v. Motorola, FOSS PATENTS (Apr. 28, 2013, 11:49 PM), http://www.fosspatents.com/2013/04/acloser-look-at-207-page-landmark.html#judgesrobartandposner. Both decisions, however, point to the importance of the public interest in access to standard-essential patents and the need to exclude the holdup value of patents covering standards from royalty determinations. 191. See, e.g., Microsoft Corp., 2013 WL 2111217, at *1, 18 (deciding in contract dispute over whether Motorola had breached contract to offer patents on FRAND terms by asking for royalties that were unreasonably high). Judge Robart’s decision seems to explicitly modify the traditional Georgia-Pacific factors to account for the standard-setting context. Id. at *18-20. He recognizes that the licensing of standard-essential patents takes on a public character and must be conducted and reviewed with those public benefits in mind. He emphasizes, for example, that patent royalties should not incorporate the holdup value that may result after a standard incorporating the patent has been chosen, and attention to royalty stacking. Id.; see also Thomas F. Cotter, Some Initial Reactions to Judge Robart’s Opinion in Microsoft v. Motorola, INTELLECTUALIP (May 3, 2013), http://intellectual ip.com/2013/05/03/some-initial-reactions-to-judge-robarts-opinion-in-microsoft-v-motorola/; Michael Carrier, A US Court Issues First Analysis of an Appropriate Royalty that a Patentee Could Obtain After Promising To License Its Patent on Reasonable and Nondiscriminatory (RAND) Terms (Microsoft v Motorola), E-COMPETITIONS BULL. (Inst. of Competition Law, New York, N.Y.), May 2013; Jorge L. Contreras, So That’s What “RAND” Means?: A Brief Report on the Findings of Fact and Conclusions of Law in Microsoft v. Motorola, PATENTLY-O (Apr. 27, 2013), http://patentlyo.com/patent/2013/04/so-thats-whatrand-means-a-brief-report-on-the-findings-of-fact-and-conclusions-of-law-in-microsoft-vmotorola.html; Thomas F. Cotter, Day 2 of the University of Florida Workshop on Standard Essential Patents and FRAND: Page on “Judging Monopolistic Pricing: F/RAND and Antitrust Injury”, COMP. PAT. REMEDIES BLOG (Sept. 12, 2013), http://comparativepat entremedies.blogspot.com/2013/09/day-2-of-university-of-florida-workshop_12.html (summarizing comments by William Page suggesting that while the form of FRAND royalties was as a hypothetical bilateral negotiation, in reality it was a calculation in light of the economic consensus of what FRAND rates should be). 2014] COOPERATIVE INNOVATION 1109 the need to exclude any patent holdup value arising from the collective adoption of a standard covered by the patent from the calculation of damages. Judge Robart’s approach, including the emphasis on excluding the value of standardization in royalty determinations, has been followed in a second court ruling on reasonable and nondiscriminatory royalty rates.192 Recognizing the strong public interest in using standards as mechanisms for coordinating interoperable technologies, the Federal Trade Commission, the Department of Justice, the U.S. Patent and Trademark Office, and even the U.S. Trade Representative have all offered similar opinions about limiting injunctive relief and damages.193 Courts and policymakers alike are thus emphasizing the public interest in preserving access to innovative standards, and their responses illustrate ways in which the broader effects of patent remedies on cooperation in innovation can be incorporated into remedy determinations.194 So far, however, they remain limited primarily to patents essential to common industry technology standards.195 They also remain focused primarily on determinations of injunctive relief and damages for past infringement, leaving open questions about whether the public interest will similar- 192. See In re Innovatio IP Ventures, LLC Patent Litig., 921 F. Supp. 2d 903, 915-17 (N.D. Ill. 2013); see also Michael Carrier, A US Court Issues Second Ruling Determining RAND Rate for Standard Essential Patent (Innovatio), E-COMPETITIONS BULL. (Inst. of Competition Law, New York, N.Y.), Oct. 2013. 193. See, e.g., Editorial Board, FTC/DOJ/USPTO Take Action on Standards-Essential Patents, ANTITRUST & COMPETITION NEWSL., ORRICK (Feb. 4, 2013), http://blogs.orrick.com/ antitrust/2013/02/04/dojftcuspto-take-action-on-standards-essential-patents/ (summarizing recent actions by FTC, DOJ, and USPTO with regard to standard-essential patents); John Ribeiro, Google Withdraws Standard-Essential Patent Claims in Xbox Complaint, COMPUTERWORLD (Jan. 9 2013, 12:20 PM), http://www.computerworld.com/s/article/ 9235502/google_withdraws_standard_essential_patent_claims_in_Xbox_complaint; see also Letter from Michael B.G. Froman, Ambassador, Exec. Off. of the President, to Irving A. Williamson, Chairman, U.S. Int’l Trade Comm’n (Aug. 3, 2013) available at http://www.ustr.gov/sites/default/files/08032013%20Letter_1.PDF (discussing a policy decision to disapprove Commission’s determination to enjoin Apple from importing and selling infringing devices, after review in light of public interest concerns). 194. See, e.g., Thomas F. Cotter, Remedies for the Infringement of Standard Essential Patents Subject to a FRAND Commitment, COMP. PAT. REMEDIES BLOG (May 8, 2013, 9:40 AM), http://comparativepatentremedies.blogspot.com/2013/05/remedies-for-infringementof-standard.html. 195. Existing proposals in the literature focus primarily on risks of patent holdup and related forms of opportunistic behavior by patent holders. See, e.g., Cotter, supra note 19; Mark A. Lemley & Carl Shapiro, Patent Holdup and Royalty Stacking, 85 TEX. L. REV. 1991 (2007); Mark A. Lemley, Ten Things To Do About Patent Holdup of Standards (and One Not To), 48 B.C. L. REV. 149 (2007); Robert P. Merges & Jeffrey M. Kuhn, An Estoppel Doctrine for Patented Standards, 97 CALIF. L. REV. 1 (2009); Joseph Scott Miller, Standard Setting, Patents, and Access Lock-in: RAND Licensing and the Theory of the Firm, 40 IND. L. REV. 351 (2007). While I am also concerned with patent holdup, my concerns extend to other ways in which patents might interfere with cooperative innovation, and my goal is to limit patent remedies when, and to the extent, that the presence of patents makes useful cooperative systems of innovation unviable. 1110 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 ly inform determinations of ongoing royalties where injunctive relief is denied.196 These responses to cooperative contexts, while creating opportunities to inject broader public interests into determinations of patent remedies, leave open important questions about how tensions between patents and systems that rely more heavily on non-market mechanisms of cooperation should be handled. They address only problems arising from commercial participants in standard setting organizations who do not honor their obligations to each other relating to standard-essential patents. They limit their focus to the potential harms to the public from refusals of both patent-holding members of standard setting and the users of patented standards to negotiate licenses to patents essential to innovative standards on terms that are reasonable and non-discriminatory. Moreover, they fail to acknowledge or protect the public interest in sustaining non-market mechanisms of cooperation that are valuable to innovation. The principles proposed below are largely consistent with but go further than existing policy responses. They provide the courts with a way of systematically incorporating the harm that patents impose on cooperative systems into determinations of patent remedies.197 B. Principles for the Design of Remedies Where patent rights impact systems of cooperative innovation, these negative effects should be included in determinations of patent remedies.198 As the examples of Foldit and open source software demonstrated, three key non-market mechanisms play important roles in sustaining cooperative innovation: trust, benefit-sharing, and reciprocity.199 Patents under the current system directly threaten 196. See, e.g., Thomas F. Cotter, Four Principles for Calculating Reasonable Royalties in Patent Infringement Litigation, 27 SANTA CLARA COMPUTER & HIGH TECH. L.J. 725 (2011); Mark A. Lemley, The Ongoing Confusion over Ongoing Royalties, 76 MO. L. REV. 695 (2011); see also Thomas F. Cotter, U.S. District Court Awards Carnegie Mellon $1.5 Billion in Patent Damages, COMP. PAT. REMEDIES BLOG (Apr. 21, 2014), http://comparative patentremedies.blogspot.com/2014/04/us-district-court-awards-carnegie.html (suggesting decision not to award a higher ongoing royalty than the reasonable royalties awarded for past infringement is consistent with view that courts should take socially optimal incentives to innovate into account). 197. Ideally this is just a first step in thinking more systematically about where patent laws need to change in response to changing forms of collaborative and cooperative innovation. 198. For a related discussion and insights into the challenges of cumulative and sequential innovation and the disconnect with current approaches to patent remedies, see, for example, J. H. Reichman, Of Green Tulips and Legal Kudzu: Repackaging Rights in Subpatentable Innovation, 53 VAND. L. REV. 1743 (2000). For a similar discussion focusing on open source innovation, see, for example, James Boyle, supra note 169. 199. As noted earlier, there are other important aspects of cooperative innovation systems that may not be fully captured by these three mechanisms. I focus on them for 2014] COOPERATIVE INNOVATION 1111 each of these mechanisms, putting such cooperative innovation systems at risk. In response, I provide three principles for courts to use in determining patent remedies that are designed to protect the operation of these mechanisms in situations of socially beneficial cooperative innovation. The three principles are: (1) protect reliance interests in norms of open access and sharing;200 (2) limit the private appropriation of collective value;201 and (3) reinforce reciprocity in free, open systems of innovation. Where the negative effects of patents on cooperative mechanisms are likely to be strong, the principles provide a reasoned way of incorporating these patent harms into determinations of patent remedies. This approach would lead not only to changes in how courts determine remedies for patents that arise from or cover the activities of cooperative systems of innovation, but also, and more importantly, to changes in ex ante decisions by members of a cooperative innovation system about whether to defect from the system and decisions by third parties about whether and when to obtain and enforce patents against members of the cooperative system in the first place.202 It is these ex ante effects on decisions to de- the purpose of this analysis because they seem to play an important role in many of the cooperative systems and also seem to capture many of the effects that patents might have on the rich variety of non-economic factors and motivations that drive cooperative innovation. 200. The idea of respecting the reliance interests of firms in standards that are adopted by the industry has been suggested in Merges & Kuhn, supra note 195. This principle goes further, extending to any situation in which multiple participants work collectively to advance a particular product or field and either must coordinate their activities through standards and/or find it necessary to use certain core technologies as research tools or platform technologies on which to build their contributions. There are also similarities here to an essential-facilities doctrine approach to intellectual property. See, e.g., M. Elaine Johnston, Intellectual Property As an “Essential Facility”, 22 COMPUTER & INTERNET L. 17 (2005) (summarizing case law and trends in applying essential-facilities doctrine to intellectual property contexts). Jorge Contreras proposes a “market reliance” approach in the context of promises not to assert patents on FRAND terms, focusing on the importance of protecting the reasonable reliance of third-party market participants on such promises. His work provides additional ideas about how this kind of principle might work in the context of cooperative innovation. See Jorge L. Contreras, Market Reliance and Patent Pledges, UTAH L. REV. (forthcoming Spring 2015), available at http://ssrn.com/ abstract=2309023. 201. See, e.g., Cotter, supra note 169 (arguing that damages should be apportioned according to relative value of patent to the whole product); Lemley & Shapiro, supra note 195 (exploring problems of patent holdup, royalty-stacking, and consequent royalty overcharges). 202. The principles will have the effect of limiting injunctive relief and patent damages in ways that reduce the payoffs that group members might expect from defecting and their expectations that others might defect. This will, in turn, reduce the incentives of group members to defect from the group in the first place, and will also strengthen the motivations of group members to continue to adhere to group norms of open access and sharing. The principles will also limit the ability of outside parties to appropriate the value arising from collective efforts and their ability to threaten the activities of the group. Third parties will have lower expected payoffs from asserting or threatening to assert patents against the group in contexts where they are seeking to tax or free ride on the collective 1112 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 fect and decisions to threaten and enforce patents against the group that are most important to the survival of cooperative innovation. 1. First Principle The first principle requires courts to protect reliance interests in norms of open access and sharing. Where the norms are supporting socially valuable innovation, reliance interests in continued access to an invention based on this norm should be treated as part of the public interest in continued access, to be balanced against the interests of a patent owner in restricting access when fashioning patent remedies.203 To receive protection, the reliance must be reasonable in light of widely adopted and publicly known norms governing when and how knowledge will be shared and used. It must be reliance on a norm of open access and sharing that is relevant to the cooperative process of innovation. Defining what is reasonable reliance would thus be context-specific, depending on the scope and nature of the norms and customs of the innovation community, the extent to which these norms are publicly known, the relationship of the inventor and patent owner to the community, and the balancing of collective interests in access and private incentives to make and develop the patented technology. This approach provides courts with a way of respecting and reinforcing informal rules that establish socially beneficial uses of knowledge by giving them weight when balancing public and private interests. Pursuant to this principle, reasonable reliance on norms of open access and sharing would become an important factor that weighs against injunctive relief. This reliance would also become a factor limiting damages for infringement of patented inventions that are used in the context of cooperative innovation.204 Calculations of reasonable royalties should be lower where reliance interests are efforts of the group and less bargaining power in situations where injunctive relief is likely to be unavailable. This may discourage them from asserting claims or making threats and will also limit the deterrent effects of potential third-party claims on participation rates in cooperative-innovation projects. Where licenses are required, third parties will settle for lower royalties based on expectations that courts will limit injunctive relief and damages. 203. This principle finds support in studies of the role that informal norms play in knowledge communities. See, e.g., Robert P. Merges, From Medieval Guilds to Open Source Software: Informal Norms, Appropriability Institutions, and Innovation (Univ. of Wis. Law Sch. Conf. on the Legal Hist. of Intell. Prop., Working Paper, 2004). 204. For discussions of the effects of patents on norms, see, for example, Merges, supra note 68; Katherine J. Strandburg, User Innovator Community Norms: At the Boundary Between Academic and Industry Research, 77 FORDHAM L. REV. 2237 (2009) (exploring implications of convergence of academic research with commercial interests and implications for norms of sharing research tools and materials and suggesting need for policies to enhance sharing); Murray & Stern, supra note 25; Fiona Murray, The Oncomouse that Roared: Resistance & Accommodation to Patenting in Academic Science (March 2006) (unpublished manuscript) (on file with author). 2014] COOPERATIVE INNOVATION 1113 higher and royalties should reflect the economic constraints of the group. Courts would apply this principle with the goal of reducing the attractiveness for members of a cooperative system to deviate from sharing norms, and to limit at least some of the third-party actions that increase the cost of adhering to group norms of sharing. While finding a way to measure and account for this reliance interest will be difficult, courts, as a starting point, can look to the emerging framework for determining when injunctive relief should be available and what reasonable and nondiscriminatory royalties are in the standard-setting context. While existing doctrines of implied license and estoppel, as well as the shop rights that a company may have over its employees’ inventions, go part of the way towards recognizing and protecting reasonable reliance in continued group use of inventions, this first principle goes beyond the limits of these doctrines.205 The principle would encompass the reliance interests of participants who are not in contractual privity, or even in direct or indirect communication, with the patent owner, as long as the norms of open access and sharing that the group relies upon are widely adopted and publicly known and are associated with a socially valuable system of innovation. Protection of the reliance interest in continued use will be strongest for inventions discovered by members of the group that are used by the group. It will extend in a more limited way to inventions made by group members working on independent projects entirely outside of the group, and in an even more limited way to inventions owned by third parties that the group uses. In these latter two cases, the reliance interest will play a role only for inventions that are both closely related and important to the activities of the group and additionally made accessible to the group in ways that encourage, whether directly or indirectly, widespread use by the group. If a software company benefits from Linux and makes available software tools with a reasonable expectation that members of the Linux community will pick up and widely use the tools, for example, the principle would limit the remedies that the software company might expect from asserting patents covering this software. The principle would also weigh against injunctive relief and limit damages in situations such as the generalized patent threats made by Microsoft to Linux users. Knowing that 205. See, e.g., Barnes & Noble, Inc. v. LSI Corp., 849 F. Supp. 2d 925, 939-40 (N.D. Cal. 2012) (holding that a competitor’s adoption of set standards can constitute reasonable reliance); Lautzenhiser Techs., LLC v. Sunrise Med. HHG, Inc., 752 F. Supp. 2d 988, 1009 (S.D. Ind. 2010) (holding that amicable dealings over a period of years may be enough to constitute misleading conduct that induces reasonable reliance). Similar trends are evident in contract law, where courts are increasingly willing to protect reasonable reliance interests of negotiating parties prior to or in the absence of a final contract. See, e.g., Alan Schwartz & Robert E. Scott, Precontractual Liability and Preliminary Agreements, 120 HARV. L. REV. 661 (2007). 1114 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 injunctive relief and remedies will be limited, Linux users would feel more comfortable continuing to participate in open source software, and Microsoft would find its divide-and-conquer strategies less effective. In contrast, this principle would not block injunctive relief or limit damages in situations of blatant copying of an independent proprietary product for the purpose of making it open source. Where established norms of open access and sharing govern intellectual production and members have expectations of continued access to and use of inventions based on these norms, protecting their reliance interests in this way makes it easier to maintain the swift trust that both open source software systems and crowd science systems rely on.206 Participants in cooperative innovation make contributions and adhere to group rules with the expectation that others will do the same. Sustaining this kind of trust in the behavior of the group requires participation by most, if not almost all, members of the group. Anything that increases the ability and incentives of group members to defect from group norms will threaten this equilibrium state of general trust and make it harder to sustain norms of open access and free sharing. In the Linux example, one of the reasons that the license between Novell and Microsoft was so troubling to the open source community was its negative impact on expectations that open source norms would continue to govern open source software. Patents covering open source software provided Novell with an opportunity for significant private commercial gain, leading to a defection from open access norms. Not surprisingly, additional license deals between Microsoft and other open source software companies followed in the wake of the Novell deal.207 Without the backing and defensive patenting of large companies like IBM, such defections might have led to unraveling of cooperation and the future of Linux might have been questionable. While Linux survived, this survival has come at a high cost, both in terms of centralized corporate control over development paths and the costs of defensive patenting. Application of this proposed principle would have limited the ability of Novell or any third party acquirer to obtain injunctive relief or damages from the assertion of Novell’s open source patents against the open source community. This would have made the patents less commercially attractive and reduced Novell’s incentives to defect. In the context of Foldit, the commitment of the Foldit administrators and Foldit players to ensuring that scientific discoveries and the 206. For a discussion of swift trust and its role in open source software communities, see Part II.A. 207. See, e.g., Mary Jo Foley, Microsoft and SUSE Extend Microsoft’s Controversial Novell Linux Pact, ZDNET (July 25, 2011), http://www.zdnet.com/blog/microsoft/ microsoft-and-suse-extend-microsofts-controversial-novell-linux-pact/10164; Paul Krill, supra note 110. 2014] COOPERATIVE INNOVATION 1115 research tools that enable such discoveries are made publicly available is critical to its success. Members of Foldit are willing to freely contribute their energy and ideas because they expect and believe both that other participants will behave similarly and that the results of their collective efforts will be freely shared with each other and with the scientific community. While defensive publishing of results may limit the ability of Foldit players to patent their discoveries, and claims of joint inventorship may limit the ability of any individual to obtain exclusive control, much of what the game members contribute and share are software tools and problem solving techniques rather than the ultimate discovery. Moreover, the fact that participants make their results public now does not mean that they will continue to do so if commercial considerations play a larger role.208 This additional protection is therefore necessary to protect Foldit norms of open and free sharing. 2. Second Principle The second principle is to limit the private appropriation of collective value by a patent owner, with the goal of supporting benefitsharing in contexts of cooperative innovation. The principle would limit patent remedies where patents are used to hold up group production or extract rents from the group based on the group’s adoption and collective use of the invention.209 While this is analogous to the patent holdup concerns that arise when patents cover the use of standards adopted by industry members, it is broader, encompassing situations in which a group widely adopts and uses inventions that further the innovation objectives of the group. Concerns about the appropriation of collective value through patent holdup will be strongest in situations where the cost of switching to another technology would be high and where the fact that the group has used the patented invention has made it more valuable to the group and to people outside the group. This principle would weigh strongly against 208. Similar considerations and concerns about the effects of patents on sharing have arisen in academic science. Academic science is characterized by norms that support open dissemination and use of research results. The more scientists can rely on these norms, the more willing they will be to continue to share their own discoveries and to use and experiment with the discoveries of other scientists, encouraging trust and reciprocity. These norms are public knowledge, there are social benefits from encouraging reliance on these norms, and it appears that many scientists do indeed rely on these norms. See, e.g., Mark A. Lemley, Ignoring Patents, 2008 MICH. ST. L. REV. 19. But see Merges, supra note 68. 209. There is an extensive literature on patent holdup, and this principle adopts and extends the recommendations that many patent scholars have made in the context of patents covering one component of a larger product. See, e.g., Lemley, supra note 195. But see F. Scott Kieff & Anne Layne-Farrar, Incentive Effects from Different Approaches to Holdup Mitigation Surrounding Patent Remedies and Standard-Setting Organizations, 9 J. COMPETITION L. & ECON. 1091 (2013) (emphasizing importance of context but in this case to limit the situations of patent holdup that deserve a patent remedy response). 1116 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 awarding injunctive relief where the value of a patented invention is largely attributable to its widespread adoption and use by the group.210 The interests of the group would nevertheless still be balanced against the interests of the patent owner, and the principle will have most application for patents covering inventions that are made by members of the group or third-party patent owners who collaborate with or directly benefit from the activities of the group. This principle would also factor into the determination of damages by excluding the value that the patented invention has as a result of its widespread adoption and use by the group.211 The principle will also limit patent remedies to account for the benefits, if any, received by the patent owner from the group— primarily but not exclusively patent owners who are members of the group or who obtained their rights to the invention from a member of the group. First, the group will have limited ability to patent and restrict use of inventions discovered by the group, making bargaining with third-party patent owners and members of the group who defect and patent their own inventions more difficult.212 Determining when an invention has emerged, who the inventors are, and whether and how patenting should be pursued, as well as handling negotiations with a third party regarding use of their patented technology, can be extremely difficult in contexts of massively distributed collective intellectual production. In addition, many systems of cooperative innovation rely on a set of beliefs that are not consistent with patenting and enforcing patents. This puts the group at a disadvantage when 210. For a similar line of reasoning in the context of FRAND promises, see Jorge Contrerras, supra note 200 (manuscript at 11-12). 211. This approach was adopted by Judge Robart in his modification of the GeorgiaPacific factors in the Microsoft v. Motorola decision. See, e.g., Contreras, supra note 191. Thomas Cotter and Norman Siebrasse have suggested an alternative way of thinking about the ex ante hypothetical negotiation, focusing on the ex ante contingent value of patented technologies that might be adopted as part of a standard and, if adopted, would have higher value. This approach provides a way of thinking about a reasonable ex ante negotiation that is not based on holdup value, but rather on the incremental contribution that the patented technology makes to the standard as compared with the next best alternative technology. See, e.g., Norman Siebrasse, Comments on Sidak Part 2: The Ex Ante Contingent Value Approach (Siebrasse), COMP. PAT. REMEDIES BLOG (Dec. 6, 2013), http://comparativepatentremedies.blogspot.com/2013/12/comments-on-sidak-part-2-ex-an te.html; Thomas F. Cotter, Comments on Sidak, Part 3: Should a FRAND Royalty be Higher than a Reasonable Royalty? (Cotter), COMP. PAT. REMEDIES BLOG (Dec. 18, 2013), http://comparativepatentremedies.blogspot.com/2013/12/comments-on-sidak-part-3-shouldfrand.html. Comparing and evaluating alternative approaches and their implications for contexts of cooperative innovation is left for further discussion. 212. This principle may actually make it even harder for the group to obtain their own patents, making defensive patenting and licensing strategies harder. While I think that the benefits of the principle will likely outweigh the costs in the contexts I am focusing on, this potential cost should not be ignored. 2014] COOPERATIVE INNOVATION 1117 they are forced to pay for their use of a third party’s technology but cannot charge for the use of their technology. Second, the group will have limited ability to extract payment for the use of its non-patentable contributions by either a group member or a third party who obtains a patent covering an invention that was discovered through the use of the group’s knowledge. As a result of these limits, third parties or defectors from the group may be able to capture the benefits of group production for free while extracting payment for their own incremental contributions. Where a member of the group is able to defect from the group, that is, patent and privately benefit from an invention that builds on the efforts of the group, this erodes the group members’ trust that other members of the group will adhere to its norms of sharing and reciprocity. Where the incremental improvement is made and patented by a third party, the result is less harmful to group dynamics but still increases the cost of innovation for the group and reduces the incentives of the group members to freely and openly share their ideas. If the patent can be used to block the future efforts of the group or to extract rents from the group through licensing, benefit-sharing is even more skewed, and the transaction costs for participants in the cooperative project increase. This problem is not unique to systems of cooperative innovation, but it is particularly harmful to them because it disrupts the non-market mechanisms upon which they rely. While existing patent law doctrines of derivation, joint inventorship and prior art significantly limit the ability of an individual to patent inventions that utilize, borrow from, or build on group discoveries, these protections do not adequately address the following problems that patents create for group investments in intellectual production.213 One of the biggest limits of these existing patent law doctrines is their failure to remove the ex ante incentive problems that are created when individual members of the group see chances to limit their sharing of knowledge so as to increase the chances of their own individual discovery and patenting for monetary gain. These doctrines also do not address and protect many of the valuable contributions made by group members. Member contributions often take the form of tools that increase the chances of invention but are not themselves either patentable or prior art for the resulting invention. In Foldit, for example, participants develop software programs that help to increase scores in the game, and these programs, along with observations about how to solve problems in game play, are some- 213. See supra Part II (discussion of limits of these doctrines in cooperative innovation contexts). 1118 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 times shared among the players.214 Although the software programs and strategies may increase the likelihood that a patentable discovery about proteins will be made, they do not themselves describe such a discovery and therefore do not constitute prior art for such a discovery. The people contributing the programs are not joint inventors of the resulting discovery. Moreover, although providing valuable information that increases the chances of a patentable discovery, it is unlikely that the software programs or strategies for gameplay will themselves be patentable discoveries. Even where the doctrines do apply, they may be difficult and costly for the group to utilize. Where the group wants to challenge thirdparty inventorship claims on the grounds of joint inventorship or derivation, it is forced to undertake the costs of pursuing these claims and may find it difficult to satisfy the evidentiary requirements under patent law despite the value of its contributions. The massively distributed nature of the group and the importance of keeping transaction costs low similarly limit the usefulness of these doctrines. In addition, where the group wants the value of its contributions reflected in negotiations for the use of third-party patents, it may be forced to explore patenting, and this can be inconsistent with and potentially undermine group beliefs and values. Additional help from the law is needed to fill these gaps and address these limits. In response to some of these gaps, I am suggesting that where a patented invention benefits from the knowledge provided by the group, the benefits received from the group should be considered and sometimes limit the remedy that a patent owner receives. This principle, like the first, builds on and finds support in existing proposals to address patent holdup by limiting the ability of patent holders to obtain injunctive relief and by restricting what can be included in the calculation of damages.215 It is also consistent with recent court decisions in the context of standard-essential patents that seek to limit patent damages to the value of the technology and exclude the value conferred by the standardization of this technology.216 The principle goes further than these existing ap214. See Public-Shared Recipes, FOLDIT, https://fold.it/portal/recipes/public (last visited Mar. 22, 2014). 215. See, e.g., Cotter, supra note 19, at 1174-87 (explaining how patent law should play a role in responding to, or enabling private parties to avoid, patent holdup); Lemley & Shapiro, supra note 195 (explaining how patent law should be modified to respond to problems of patent holdup and royalty-stacking, including limits on injunctive relief and damages). 216. See Microsoft Corp. v. Motorola, Inc., No. C10-1823JLR, 2013 WL 2111217, at *98101 (W.D. Wash. Apr. 25, 2013). There are also proposals designed to address patent holdup in context of standard-setting. Jay P. Kesan & Carol M. Hayes, FRAND’s Forever: Standards, Patent Transfers, and Licensing Commitments, 89 IND. L.J. 231 (2014) (suggesting combination of contract and property principles to govern FRAND commitments); 2014] COOPERATIVE INNOVATION 1119 proaches, however. It is not limited to technology standards and patents covering those standards, but instead applies when a group adopts an invention as part of its research platform and this adoption and use confers value on the invention. Where the value arising from widespread adoption and use is large, this should be a factor weighing against injunctive relief, and this value should be excluded from royalty calculations to the extent that the value reflects simply its use as a standard. The principle also requires courts to look at whether knowledge contributions from the group were instrumental in leading to the invention. If the knowledge contribution was substantial, this should weigh against injunctive relief and should be reflected in reduced royalties. In this way courts will play a role in enforcing benefit-sharing and promoting fairness, making members of the group more willing to participate and freely contribute their work to the group. This principle would play the strongest role in situations where members of a cooperative innovation project, such as Linux or Foldit, defect with an invention, patent it, and either seek to assert it against the group or to assign it to a third party who then asserts it against the group. In this case the combination of benefits from group production and public interest in continued group use of the invention would weigh against injunctive relief and would substantially limit royalties where the invention relates closely to the intellectual production of the group. This principle would also extend, although with less force, to limit patent damages where a third party who is not a member of the group benefits from the intellectual production of the group and/or seeks to hold up the production of the group. In the Linux example, Novell and its assignees would have found it harder to enforce their patents against the open source community, and knowing this, the open source community would have been less worried, and the patents would have been less valuable. Novell would therefore have had less incentive to defect from the community in the Merges & Kuhn, supra note 195 (arguing for a standards estoppel doctrine to check for good-faith behavior by the patentee). As well, there are proposals designed to protect areas of innovation that rely on free sharing of information. Strandburg, supra note 150. Alternative approaches have included improving incentives of private parties to agree through limits on injunctive relief, mandatory arbitration, and other mechanisms for improving private ordering. See, e.g., Jorge L. Contreras, Fixing FRAND: A Pseudo-Pool Approach to Standards-Based Patent Licensing, 79 ANTITRUST L.J. 47 (2013) (adapting patent pool approach to standard-setting organizations); Mark A. Lemley & Carl Shapiro, A Simple Approach to Setting Reasonable Royalties for Standard-Essential Patents, 28 BERKELEY TECH. L.J. 1135 (2013) (discussing a mandatory arbitration mechanism where owner of standardessential patent and standard implementer do not agree on FRAND terms); Timothy Simcoe, Governing the Anti-Commons: Institutional Design for Standard Setting Organizations (July 1, 2013) (unpublished manuscript) (on file with the National Bureau of Economic Research) (examining SSO practices and debates using Elinor Ostrom’s selfgoverning common pool framework). 1120 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 first place. Microsoft might have found its patent threats and licensing strategies less effective, reducing the need for defensive patenting. This principle could limit incentive problems in Foldit as well. Foldit members will have less incentive to use patents opportunistically and will be more willing to continue to volunteer their efforts without compensation if they all know that the contribution of ideas by the group will factor heavily in determining remedies for any invention made and patented by a group member. This principle will also limit the ability of third parties with inventions that build upon or are heavily utilized by the group to the benefit of the patent owner to obtain injunctive relief and damages from these infringing uses.217 The key challenge in employing this principle is to provide the courts with tools or specific guidelines for how to identify and value these contributions. Indeed, concerns with the ability of the courts to measure the contribution of an invention to a larger product or project have stalled changes in patent remedies in the past. Courts are now confronting and finding ways to navigate analogous measurement problems, however, in the context of determining reasonable royalties for standard-essential patents.218 This provides a starting point for courts seeking to take into account the value of group knowledge contributions and group use when assessing patent damages.219 In the hypothetical negotiation of a license to a patented invention, the court would consider not just the value of the patented technology but also the value of the intellectual contributions of the cooperative innovation community. In this hypothetical exchange, the contributions from the group would reduce the royalty owed to the patent owner. In addition, royalties to the patent owner would exclude any value that the invention has as a result of its widespread adoption by the group. This hypothetical licensing negotiation should reflect the reduced bargaining power of the patent owner where injunctive relief is unlikely, and the increased bargaining power of the group where they are providing value through their activities. 217. This approach could also address the practical limits of prior art and derivation doctrines by presuming that the community has some rights over the invention, leaving the patent owner with the burden of showing that the invention did not benefit from community production and did not derive its value from adoption by the community as a standard technology. 218. See, e.g., Cotter, supra note 19, at 1180-88; Mark A. Lemley & Carl Shapiro, Patent Holdup and Royalty Stacking, 85 TEX. L. REV. 1991, 1994 (2007); Mark A. Lemley, Ten Things To Do About Patent Holdup of Standards (and One Not To), 48 B.C. L. REV. 149, 153 (2007). 219. How royalties should be determined in this context is an area in which the law and commentary are in flux. See, e.g., J. Gregory Sidak, The Meaning of FRAND, Part I: Royalties, 9 J. COMPETITION L. & ECON. 931 (2013); Cotter, supra note 211. 2014] COOPERATIVE INNOVATION 1121 3. Third Principle The third principle is to reinforce reciprocity in free, open systems of innovation.220 This principle would treat both formal and informal rules governing open access and sharing of ideas and discoveries as commitments by participants to share their own contributions with other participants in the project. Where discoveries relevant to free and open source projects are made by members of the project, free and open access and use of the discoveries by the group should be presumed unless the members of the group have explicitly agreed otherwise. In this way the law reinforces informal rules and norms of reciprocity and reduces the payoffs from defecting from group norms.221 Provided that people know about this change in the law in advance, it makes it easier for members of the group to commit to behavior in compliance with these rules and norms, in addition to facilitating ex ante bargaining. The principle would also apply to limit relief for industry members who know about and maybe even benefit from the use of their invention by the cooperative innovation project unless these parties have taken reasonable precautions to put the community on notice of their proprietary rights before the invention is in use. Where third parties develop inventions that rely on the work done by an open source project and relate to the open source project, this principle would weigh heavily against allowing this third party to block the use of the discovery by the group, either through an injunction or royalties that are not feasible for group participants to pay. The impact of this principle should become larger the closer the relationship of the patent owner to the group and the greater the benefit to the patent owner of the group’s activities. Open access and reciprocity play critical roles in both open source software and crowd science projects.222 In cooperative systems such as these, discoveries that benefit from the productive efforts of the group should be available for use by the group at either no cost or, where the discovery is made outside of the project, at a cost that is reasonable in light of the competing interests and investments of the group and the patent owner. Efforts have been made to build reciprocity into open source communities through the use of licenses such 220. For thoughts on motivating reciprocity, see, for example, Stephen Leider et al., Directed Altruism and Enforced Reciprocity in Social Networks, 124 Q.J. ECON. 1815 (2009). 221. For a related idea on how open source systems can reduce opportunism in the context of open standards, see, for example, Vetter, supra note 96. 222. See, e.g., Jane Kaye et al, Data Sharing in Genomics—Re-Shaping Scientific Practices, 10 NATURE REVS. GENETICS 331 (2009); Jennifer C. Molloy, The Open Knowledge Foundation: Open Data Means Better Science, 9 PUB. LIBR. SCI. BIOLOGY 1. 1122 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 as the General Public License and the Reciprocal Public License.223 These contracting approaches are generally limited to the world of free and open source software, however, and questions about the enforceability and transaction costs associated with these licenses remain.224 Large public funding agencies such as the National Institute of Health have sought to build reciprocity into public funding requirements, but again with high transaction costs and questionable enforceability.225 The principle that I propose can complement these efforts. It can also expand upon them, applying in situations where there is no contractual privity and without depending upon the organizational structure that underpins open source software production or publicly funded research. In the Foldit context, this principle would limit the ability of both members of Foldit and third parties to impede the free use of scientific discoveries by Foldit members for the non-commercial purposes of solving Foldit puzzles. It would thus operate in ways that are analogous both to proposed concepts of patent fair use and proposals for research use exemptions, but in both cases limited to the context of crowd science.226 This principle would be most valuable in sustaining non-mainstream, volunteer-based open source projects, which are among the most vulnerable to transaction costs and the least able to engage in defensive patenting activities. All three of these principles draw from a rich body of research that critiques the lack of safe harbors within patent law for publicly beneficial uses of patented technology, particularly where the patented technologies have been created through the use of public funds.227 The patent literature includes a number of carefully constructed proposals for research use exemptions and patent fair use.228 Instead of 223. See, e.g., Reciprocal Public License 1.5 (RPL-1.5), OPEN SOURCE INITIATIVE (July 15, 2007), http://opensource.org/licenses/rpl-1.5; see also Tom Hall, Open Source— Reciprocal Licenses, TECH L. GUY BLOG (Sept. 18, 2013, 12:21 PM), http://techlawguy.blog spot.com/2013/09/p-margin-bottom-0.html (including a list of reciprocal open source licenses as determined by GNU). 224. See, e.g., Gomulkiewicz, supra note 107 (examining the most recent version of general public license that tries to deal with issues such as patents and digital rights management); Sapna Kumar, Enforcing the GNU GPL, 2006 U. ILL. J.L. TECH. & POL’Y 1. 225. See, e.g., Arti K. Rai & Bhaven N. Sampat, Accountability in Patenting of Federally Funded Research, 30 NATURE BIOTECH. 953 (2012). 226. See, e.g., Joshua I. Miller, Towards a Doctrine of Fair Use in Some of Patent Law, 2 INTELL. PROP. BRIEF 56 (2011); O’Rourke, supra note 151; Strandburg, supra note 150. 227. See, e.g., Strandburg, supra note 150 (arguing for the use of defenses and exemptions from infringement as a way of responding to the fact that different uses of patented technology can have different social costs and benefits). 228. See id.; see also Rochelle Dreyfuss, Protecting the Public Domain of Science: Has the Time for an Experimental Use Defense Arrived?, 46 ARIZ. L. REV. 457, 464 (2004); Rebecca S. Eisenberg, Patents and the Progress of Science: Exclusive Rights and Experimental Use, 56 U. CHI. L. REV. 1017 (1989) (proposing research-use defense that 2014] COOPERATIVE INNOVATION 1123 focusing on the types of uses, however, the focus here is on preserving non-market mechanisms for cooperative innovation. Moreover, the principles are not intended as rules that dictate particular patent remedies, but rather as mechanisms for expanding the range of interests that courts are required to think about when fashioning patent remedies.229 These principles require courts to systematically take into account the broader costs of patents on socially beneficial cooperative innovation when fashioning patent remedies.230 Ideally, the principles would also be adopted by agencies such as the Federal Trade Commission, the Department of Justice and the International Trade Commission, and used to guide future changes in the patent statute made by legislators.231 The principles provide a focal point for all of these patent policymakers to use when fashioning their responses to patent problems in contexts of cooperative innovation. V. CONCLUSION “Many ideas grow better when transplanted into another mind than the one where they sprang up.”—Oliver Wendell Holmes Cooperative innovation can bring together diverse perspectives and ideas and harness underutilized human resources in new ways to solve previously intractable scientific problems. In some cases, systems of cooperative innovation that rely at least partially on nonmarket mechanisms may complement existing modes of marketdriven innovation. In other cases, they may challenge incumbent systems of intellectual production and intensify competition in ways that accelerate scientific and technological progress. The potential of distinguishes between situations requiring payment and those not requiring payment, with a focus on protecting robust domain for basic research uses); O’Rourke, supra note 151, at 1204-05; Katherine J. Strandburg, What Does the Public Get? Experimental Use and the Patent Bargain, 2004 WIS. L. REV. 81. 229. But see, e.g., Michael A. Carrier, Cabining Intellectual Property Through a Property Paradigm, 54 DUKE L.J. 1 (2004) (stating the idea that propertization of patent rights can lead to the narrowing of IP, providing for limits based on development, necessity, and equity). 230. Efforts have been made to provide general principles or principles for determining patent remedies. See, e.g., Thomas F. Cotter, Patent Remedies and Practical Reason, 88 TEX. L. REV. SEE ALSO 125 (2010); Golden, supra note 18. I am not providing principles that govern the application of remedies generally, but rather specific principles that require policymakers to consider the effects of patent remedies on the viability of cooperative innovation. 231. The patent statute provides little guidance for courts in how they determine patent remedies, leaving the implementation primarily to common law. I focus on the role of the courts in responding to cooperation through their approach to patent remedies, utilizing the ability of courts to operate through what Burk and Lemley have termed “policy levers.” See Dan L. Burk & Mark A. Lemley, Policy Levers in Patent Law, 89 VA. L. REV. 1575 (2003). 1124 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1067 these emerging systems of innovation may be limited, however, by patent roadblocks. This Article has shown that patents may sometimes interfere with important non-market mechanisms that sustain systems of cooperative innovation by increasing both the costs of participating and the benefits of defecting from these systems. While some forms of open, collaborative innovation persist in the face of patent threats, they do so only at great cost and with uncertainty about their future sustainability. To these costs and uncertainties we must add the social loss from potentially valuable innovation paths foreclosed. In response to these concerns, I suggest that courts and other patent policymakers need to pay more attention to the ways in which patent law may systematically disadvantage cooperative innovation. As a starting point, I take advantage of current areas of opportunity in judicial thinking about patent remedies to propose modest changes in the ways that courts implement patent remedies where nonmarket mechanisms of cooperation are important. Three principles are provided to guide courts in their determinations of patent remedies with cooperative contexts in mind. The principles are intended to support cooperation where patents are not already accomplishing this goal, and only to the extent that patents are impeding this goal. Limiting the negative incentive effects of patents on non-market mechanisms in this way may give cooperative innovation systems chances to complement and to compete against market-driven systems of innovation. In addition, a greater legal commitment to balancing individual interests with broader public interests in cooperative innovation may improve the relationships that cooperative innovative communities have to patent law. Implementing patent law in ways that take the interests and needs of these communities into account may move us closer towards a patent system that can accommodate alternative paradigms of innovation. AGGREGATING DEFENDANTS GREG REILLY* ABSTRACT No procedural topic has garnered more attention in the past fifty years than the class action and aggregation of plaintiffs. Yet, almost nothing has been written about aggregating defendants. This topic is of increasing importance. Recent efforts by patent “trolls” and BitTorrent copyright plaintiffs to aggregate unrelated defendants for similar but independent acts of infringement have provoked strong opposition from defendants, courts, and even Congress. The visceral resistance to defendant aggregation is puzzling. The aggregation of similarly situated plaintiffs is seen as creating benefits for both plaintiffs and the judicial system. The benefits that justify plaintiff aggregation also seem to exist for defendant aggregation—avoiding duplicative litigation, making feasible negative-value claims/defenses, and allowing the aggregated parties to mimic the non-aggregated party’s inherent ability to spread costs. If so, why is there such resistance to defendant aggregation? Perhaps, contrary to theoretical predictions, defendant aggregation is against defendants’ self-interest. This may be true in certain types of cases, particularly where the plaintiff’s claims would not be viable individually, but does not apply to other types of cases, particularly where the defendants’ defenses would not be viable individually. These latter cases are explained, if at all, by defendants’ cognitive limitations. In any event, defendant selfinterest does not justify systemic resistance to defendant aggregation. Likewise, systemic resistance is not warranted because of concerns of weak claims or unsympathetic plaintiffs, the self-interest of individual judges handling aggregated cases, or capture by defendant interests. This Article proposes that to obtain the systemic benefits of defendant aggregation and overcome the obstacles created by defendant and judicial self-interest, cognitive limitations, and capture, defendant aggregation procedures should use non-representative actions, provide centralized neutral control over aggregation, and limit aggregation to common issues. This Article concludes with a modified procedure to implement these principles: interdistrict related case coordination. I. INTRODUCTION .................................................................................................. II. OVERVIEW OF DEFENDANT AGGREGATION ........................................................ A. Aggregation Procedures ............................................................................. B. Two Types of Defendant Aggregation ........................................................ C. The Argument for Aggregating Similarly Situated Defendants................ D. Resistance to Aggregating Similarly Situated Defendants ....................... 1. Patent Litigation .................................................................................. 2. Trademark and Copyright Litigation .................................................. 3. Telecommunications Cases .................................................................. 4. Other Examples.................................................................................... E. The Puzzle of Defendant Aggregation ........................................................ III. DEFENDANTS’ OPPOSITION TO DEFENDANT AGGREGATION............................... A. Creating Additional Litigation for Defendants ......................................... B. Cost-Differentials ....................................................................................... C. Substantive Effects .................................................................................... 1012 1015 1017 1020 1021 1023 1023 1025 1028 1029 1029 1030 1030 1032 1033 * Harry A. Bigelow Teaching Fellow and Lecturer in Law, University of Chicago Law School. Thanks to Daniel Abebe, Douglas Baird, Omri Ben-Shahar, Lisa Bernstein, Bob Bone, Vince Buccola, Tony Casey, Adam Chilton, Zachary Clopton, Lee Fennell, Brian Fitzpatrick, Roger Ford, Brad Greenberg, James Grimmelmann, Vinay Harpalani, William H.J. Hubbard, Aziz Huq, Ken Klein, Genevieve Lakier, Saul Levmore, Jonathan Masur, Arthur R. Miller, Ariel Porat, John Rappaport, David Schwartz, Allan Stein, Crystal Yang, Steve Yelderman, and participants at the Sixth Annual Junior Federal Courts Workshop, the Chicago Junior Faculty Workshop, the 2013 Intellectual Property Scholars Conference, and faculty workshops at the University of Chicago Law School, California Western School of Law, and Valparaiso University Law School, for helpful discussions and comments. 1012 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 1. Asymmetric Preclusion......................................................................... 2. Jury and Judicial Confusion ............................................................... 3. Autonomy ............................................................................................. 4. Tool to Achieve Other Substantive Objectives ...................................... D. Cognitive Limitations ................................................................................ 1. Involuntary Groups .............................................................................. 2. Self-Serving Bias ................................................................................. 3. Loss Aversion ....................................................................................... E. Summary and the Role of Selection Effects ............................................... IV. DEFENDANT AGGREGATION FROM THE SYSTEMIC PERSPECTIVE ...................... A. Cost-Differentials, Weak Claims, and Unsympathetic Plaintiffs .............. B. Substantive Effects, Fairness, Autonomy, and Due Process ...................... C. Capture ...................................................................................................... D. Judicial Self-Interest ................................................................................. V. OVERCOMING RESISTANCE TO DEFENDANT AGGREGATION ............................... A. Principles of a Defendant Aggregation Procedure ..................................... 1. Non-Representative Aggregation.......................................................... 2. Centralized Control Over Aggregation................................................. 3. Issue-Only Aggregation ........................................................................ B. Inter-District Related Case Coordination .................................................. 1. Overview of Inter-District Coordination .............................................. 2. Mechanics of Inter-District Coordination ............................................ C. Potential Obstacles to Inter-District Coordination .................................... 1. Practical Obstacles: Free Riding .......................................................... 2. Statutory and Constitutional Obstacles .............................................. VI. CONCLUSION ..................................................................................................... 1033 1035 1036 1037 1039 1039 1041 1042 1043 1045 1046 1048 1050 1051 1052 1053 1053 1054 1055 1056 1056 1058 1061 1061 1063 1065 I. INTRODUCTION Suppose that Netflix offered a one-month free trial before a customer was billed,1 but actually added a small additional charge to the first bill to cover tax owed for this “free” trial. If customers wanted to sue Netflix for deceptive trade practices, it would be unsurprising if they sought to sue collectively via voluntary joinder, a class action, or multi-district litigation and, absent a contractual provision, were permitted to do so.2 But what if Netflix discovered widespread violations of a provision of the Terms of Use prohibiting users from sharing their passwords with people other than “household members?”3 1. See Netflix Terms of Use, NETFLIX, https://signup.netflix.com/TermsOfUse (last visited July 25, 2014). 2. This is similar to AT&T Mobility LLC v. Concepcion, 131 S. Ct. 1740 (2011), where there was little doubt aggregation would have been possible absent a contractual provision requiring individual arbitration; indeed, it is exactly the likelihood of aggregation that led to the inclusion of the contractual provision. See Myriam Gilles, Opting Out of Liability: The Forthcoming, Near-Total Demise of the Modern Class Action, 104 MICH. L. REV. 373, 414 (2005). See generally Myriam Gilles & Gary Friedman, After Class: Aggregate Litigation in the Wake of AT&T Mobility v Concepcion, 79 U. CHI. L. REV. 623 (2012) (discussing Concepcion and its aftermath). 3. Netflix’s terms of use permit sharing of passwords with “household members” but are actually ambiguous about sharing with non-household members. See NETFLIX, supra note 1. The hypothetical assumes that the Terms of Use include choice of law, choice of 2014] AGGREGATING DEFENDANTS 1013 Could Netflix aggregate its breach of contract claims and litigate against the consumers collectively? Both experience and most people’s gut reactions suggest no. This raises a puzzle. Why are multiple people harmed by the same defendant in similar ways considered an appropriate litigation group but multiple people harming the same defendant in similar ways are not? In theory, aggregation of similarly situated defendants offers the same benefits as aggregation of similarly situated plaintiffs: avoiding duplicative and potentially inconsistent litigation; promoting optimal deterrence by making negative-value claims (for plaintiffs) or defenses (for defendants) viable; and encouraging resolution on the merits, not litigation costs, by allowing the aggregated party to spread its costs in the same way that the non-aggregated party inherently can.4 Yet, efforts to aggregate similarly situated defendants across several substantive areas have sparked widespread and vehement opposition from defendants, courts, and policymakers. Courts have rejected joinder where “the plaintiff does no more than assert that the defendants ‘merely commit[ted] the same type of violation in the same way’ ”5 and have even described efforts to aggregate similarly situated defendants as a “gross abuse of procedure.”6 Even Congress has weighed in, with one member describing defendant aggregation as an “abusive practice.”7 Defendant aggregation has been particularly controversial in patent litigation, where courts and defendants have resisted efforts by patent holders, particularly controversial patent assertion entities or “trolls,” to join unrelated companies with similar but competing products alleged to infringe the same patent.8 When the plaintifffriendly Eastern District of Texas permitted it, Congress passed a special statutory provision prohibiting joinder or consolidation for trial of unrelated accused infringers.9 Efforts by copyright holders of pornographic films to join dozens or hundreds of users of the internet file sharing protocol “BitTorrent” have encountered similar forum, and consent to jurisdiction provisions, though the actual terms of use include an individual arbitration provision like in Concepcion. See id. 4. See Assaf Hamdani & Alon Klement, The Class Defense, 93 CALIF. L. REV. 685, 696-99 (2005); see also David Rosenberg, Class Actions for Mass Torts: Doing Individual Justice by Collective Means, 62 IND. L.J. 561, 563-64, 570-72 (1987) (describing rationales for aggregating plaintiffs). 5. Digital Sins, Inc. v. Does 1–245, No. 11Civ.8170(CM), 2012 WL 1744838, at *2 (S.D.N.Y. May 15, 2012) (alteration in original). 6. Nassau Cnty. Ass’n of Ins. Agents, Inc. v. Aetna Life & Cas. Co., 497 F.2d 1151, 1154 (2d Cir. 1974). 7. David O. Taylor, Patent Misjoinder, 88 N.Y.U. L. REV. 652, 703 (2013) (quoting 157 CONG. REC. H4426 (daily ed. June 22, 2011) (statement of Rep. Bob Goodlatte)). 8. See generally id. 9. See 35 U.S.C. § 299 (Supp. V 2011); see generally Taylor, supra note 7. 1014 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 resistance,10 as has the music industry’s own copyright fight against internet file sharers and DirecTV’s campaign against individual signal “pirates.”11 Unlike the exhaustive scholarly consideration of plaintiff aggregation,12 only a handful of articles have addressed defendant aggregation.13 Entirely overlooked in this limited scholarship is the basic puzzle of defendant aggregation—that is, why aggregation of similarly situated defendants has been so controversial in practice despite its theoretical benefits.14 This Article tackles this puzzle. The disconnect between the benefits defendant aggregation offers and the opposition it has encountered may result from an assumption that defendant aggregation must take the procedural form most familiar from plaintiff aggregation—the class action—and a belief that the class action is problematic when absent defendants, not absent plaintiffs, are to be bound by a class judgment. This Article, however, is not an analysis of defendant class actions. Rather, it first steps back from the mechanics of aggregation and asks whether collective resolution of claims against similarly situated defendants is desirable in the first place. Only then does it address the appropriate procedural mechanism for achieving this collective resolution, whether already existing or newly developed for the specific needs of multi-defendant cases. The Article proceeds in four main parts. Part II describes the background of aggregation generally and the puzzle of defendant aggregation specifically. Part III looks at the puzzle from the defendant perspective and Part IV from the societal perspective. Defendants’ resistance to being aggregated is the easier of the two to understand. In many contexts defendants have strategic reasons to oppose being aggregated, including avoiding litigation that otherwise would not be brought and resisting the choice of the presumably self-interested plaintiff. On the other hand, defendants often overestimate the strength of these strategic concerns, and these strategic reasons do not even exist in certain contexts—particularly where the stakes are 10. See, e.g., Sanne Specht, Judge Dismisses Film Company's Lawsuit Against Local Defendants, MAIL TRIBUNE (May 14, 2013, 2:00 AM), http://www.mailtribune.com/apps/ pbcs.dll/article?AID=/20130514/NEWS/305140311; Claire Suddath, Prenda Law, the Porn Copyright Trolls, BLOOMBERG BUSINESSWEEK (May 30, 2013), http://www.businessweek. com/articles/2013-05-30/prenda-law-the-porn-copyright-trolls#p1. 11. See infra Part III.D. 12. PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. a, at 15 (2009). 13. But see infra notes 20–23. 14. Prior works either focus on the theoretical benefits to defendants and ignore the practical opposition from defendants, see Hamdani & Klement, supra note 4, or focus on the practical opposition from defendants and ignore the theoretical benefits to defendants, see Sean B. Karunaratne, Note, The Case Against Combating BitTorrent Piracy Through Mass John Doe Copyright Infringement Lawsuits, 111 MICH. L. REV. 283 (2012). 2014] AGGREGATING DEFENDANTS 1015 too low to justify an individual defense—which are explained, if at all, by defendants’ cognitive limitations. Turning to the more interesting and important question of why aggregation of similarly situated defendants has faced systemic resistance, Part IV first concludes that any negative effects defendants suffer from being aggregated should not trouble courts and policymakers, as they neither distort the substantive remedial scheme nor raise fairness concerns. They explain systemic resistance, if at all, based on “capture” by defendants’ interests. Although courts and policymakers may use de-aggregation as a way to police weak or disfavored substantive claims, these problems are better addressed through other procedural mechanisms or substantive reform. Finally, while managing the complexities created by defendant aggregation may challenge an individual judge’s self-interest, it is not worse for the judicial system than repetitive or overlapping dispersed litigation. Part V identifies three core features of an optimal procedure for aggregating similarly situated defendants: (1) a non-representative structure (i.e., not class actions); (2) control by a centralized body, not the parties or individual judges; and (3) aggregation only of common issues, not cases. Part V concludes by sketching a mechanism to implement these principles: inter-district related case coordination, which is a hybrid of existing multi-district litigation and the related case procedures many federal district courts use to manage cases filed within a single district. II. OVERVIEW OF DEFENDANT AGGREGATION Scholars and policymakers have paid surprisingly little attention to aggregation of defendants in litigation.15 To some extent, this is because complex litigation scholarship focuses overwhelmingly on the class action and largely overlooks other means for aggregating parties, like joinder (Federal Rules of Civil Procedure 19 and 20), consolidation (Federal Rule of Civil Procedure 42), and multi-district litigation (28 U.S.C. § 1407).16 Recent efforts to aggregate defendants largely have been via these other procedural devices, not defendant class actions,17 and therefore have escaped the notice of many classaction-focused scholars. Moreover, efforts to aggregate similarly situ15. Hamdani & Klement, supra note 4, at 689, 696. 16. See Robin J. Effron, The Shadow Rules of Joinder, 100 GEO. L.J. 759, 763-64 (2012) (noting that analysis of joinder is mentioned largely as an afterthought to the discussion of mass tort class actions); Emery G. Lee et al., The Expanding Role of Multidistrict Consolidation in Federal Civil Litigation: An Empirical Investigation 5-7 (July 10, 2010) (unpublished manuscript), available at http://papers.ssrn.com/sol3/papers.cfm? abstract_id=1443375 (summarizing limited literature on multi-district litigation). 17. RICHARD L. MARCUS & EDWARD F. SHERMAN, COMPLEX LITIGATION: CASES AND MATERIALS ON ADVANCED CIVIL PROCEDURE 382 (3d ed. 1998). 1016 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 ated defendants are uncommon compared to aggregation of similarly situated plaintiffs,18 though they are becoming more frequent as mass communications allow dispersed people to cause the same injury to the same person in the same way.19 The leading work on aggregating similarly situated defendants is a paper by Professors Assaf Hamdani and Alon Klement in which they argued that the same justifications for plaintiff aggregation apply to defendant aggregation and proposed a procedure by which defendants could initiate a defendant class action.20 A subsequent article by Nelson Netto, largely tracking Hamdani and Klement, contended that defendant classes were an important “functional device for the defendants” and proposed mandatory defendant class actions without opt-out.21 More recent work by Francis Shen developed in more detail the theoretical case for defendant class actions, arguing that the device can maximize social welfare.22 In contrast to this theoretical work, several scholars, practitioners, and students have described efforts by plaintiffs in specific substantive contexts to aggregate defendants and the resistance of defendants, courts, and policymakers.23 These conflicting lines of scholarship neatly illustrate the puzzle of defendant aggregation, which is laid out in more detail in this Part. Section A provides a background of aggregation procedures generally and Section B of defendant aggregation specifically. Section C describes the theoretical argument for aggregation of similarly situated defendants, and Section D describes the widespread resistance it has faced. 18. PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. b(1)(A), at 17 (2009); id. § 1.02 reporters’ note to cmt. b(1)(B), at 23; STEPHEN C. YEAZELL, FROM MEDIEVAL GROUP LITIGATION TO THE MODERN CLASS ACTION 58 (1987). 19. Hamdani & Klement, supra note 4, at 741. 20. Hamdani & Klement, supra note 4, at 699 (discussing the similarities between numerous plaintiffs and numerous defendants and benefits to defendants from being aggregated). A few previous articles touched on defendant aggregation while focusing on plaintiff aggregation. Howard M. Erichson, Informal Aggregation: Procedural and Ethical Implications of Coordination Among Counsel in Related Lawsuits, 50 DUKE L.J. 381, 401-08 (2000). Defendant class actions also have received some attention in student notes and practitioner articles. See, e.g., Robert R. Simpson & Craig Lyle Perra, Defendant Class Actions, 32 CONN. L. REV. 1319 (2000); Notes, Defendant Class Actions, 91 HARV. L. REV. 630 (1978). 21. Nelson Rodrigues Netto, The Optimal Law Enforcement with Mandatory Defendant Class Action, 33 U. DAYTON L. REV. 59, 67, 97-101 (2007). 22. Francis X. Shen, The Overlooked Utility of the Defendant Class Action, 88 DENV. U. L. REV. 73, 74 (2010). 23. See, e.g., Annemarie Bridy, Is Online Copyright Enforcement Scalable?, 13 VAND. J. ENT. & TECH. L. 695 (2011) (copyright); Gideon Parchomovsky & Alex Stein, Intellectual Property Defenses, 113 COLUM. L. REV. 1483 (2013) (intellectual property); Taylor, supra note 7 (patent); Tracie L. Bryant, Note, The America Invents Act: Slaying Trolls, Limiting Joinder, 25 HARV. J.L. & TECH. 687 (2012) (patent); Karunaratne, supra note 14, at 286-87 (copyright). 2014] AGGREGATING DEFENDANTS 1017 A. Aggregation Procedures Federal procedural mechanisms have been the focal point for debate over defendant aggregation.24 The most famous of these mechanisms is the class action, which is a representative action by which one or more people can sue on behalf of a class of similarly situated individuals, provided the many threshold requirements of Federal Rule of Civil Procedure 23 are satisfied: sufficient class size; common question of fact or law; adequacy and typicality of the representative; etc.25 Class actions bind all individuals that meet the class definition, even if not actual parties to the litigation.26 Hundreds of class actions are filed in federal court every month,27 and they have been subject to substantial political, public, and scholarly scrutiny.28 Although Rule 23 purports to apply equally to plaintiffs and defendants, defendant classes are virtually non-existent.29 Aggregation occurs less famously but more commonly by joining a person as a party in the same lawsuit.30 Joinder actions only bind the individuals to the litigation; at least in theory, each individual party retains control over its separate claims, defenses, and rights.31 Federal Rule of Civil Procedure 19 describes when a plaintiff must join other parties,32 while Rule 20 gives the plaintiff discretion to do so in other circumstances.33 Rule 24 describes when a third-party can “intervene” or join itself to a lawsuit,34 while Rule 14 permits the defendant to “implead” or add a third party that is liable for the claim made against the defendant.35 Finally, Rule 22 allows a party to “in24. Aside from formal aggregation in federal court, aggregation can occur: (1) in state court under procedures similar to federal aggregation procedures; (2) inherently when corporations or voluntary associations (e.g., unions) litigate on behalf of their members; (3) informally among counsel on the same side of related individual cases; and (4) via some substantive remedial schemes like bankruptcy. See Erichson, supra note 20; Judith Resnik, From “Cases” to “Litigation”, 54 LAW & CONTEMP. PROBS. 5, 23, 28, 38-39 (1991). 25. FED. R. CIV. P. 23. 26. PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 cmt. b(1)(B), at 11 (2009). 27. See Emery G. Lee III & Thomas E. Willging, The Impact of the Class Action Fairness Act on the Federal Courts: An Empirical Analysis of Filings and Removals, 156 U. PA. L. REV. 1723, 1750 (2008). 28. See Allan Erbsen, From “Predominance” to “Resolvability”: A New Approach to Regulating Class Actions, 58 VAND. L. REV. 995, 997 n.1 (2005) (collecting scholarship). 29. See Thomas E. Willging et al., An Empirical Analysis of Rule 23 to Address the Rulemaking Challenges, 71 N.Y.U. L. REV. 74, 119-20 (1996). 30. PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. b(1)(A), at 16 (2009). 31. Id. § 1.02 cmt. b(1)(A), at 11; id. § 1.02 reporters’ note to cmt. b(1)(A), at 18. 32. FED. R. CIV. P. 19. 33. FED. R. CIV. P. 20. 34. FED. R. CIV. P. 24. 35. FED. R. CIV. P. 14. 1018 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 terplead” other parties that have claims exposing the party to doubleor multiple-liability.36 These joinder rules generally apply to both plaintiffs and defendants.37 They normally are used to aggregate a small number of parties; though joinder of tens, hundreds, or thousands is increasingly common, particularly in mass torts.38 Most mass joinders involve plaintiffs.39 The third type of aggregation is coordination or consolidation of individual lawsuits, which can occur for hearing, trial, or any other purpose via Rule 42(a) if all of the cases are pending in the same federal district40 or only for pre-trial proceedings (e.g., discovery, summary judgment, etc.) via the multi-district litigation statute, 28 U.S.C. § 1407, if cases are pending in different federal districts.41 Aggregation occurs in two types of cases.42 First, many of the procedures only apply if individual adjudication could result in a problematic remedy, such as incomplete relief,43 exposure to double, multiple, or inconsistent obligations or liability,44 prejudice to a third party,45 or effective determination of an entire group’s rights.46 This type of remedy-driven aggregation has deep historical roots47 and is generally uncontroversial.48 Second, several procedures permit aggregation based only on various levels of commonality among the claims. Permissive joinder under Rule 20 requires a common “question of law or fact” and that the claim “aris[e] out of the same transaction, occurrence, or series of 36. FED. R. CIV. P. 22. 37. PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. b(1)(A), at 16 (2009). 38. Id. § 1.02 reporters’ note to cmt. b(1)(A), at 16-17. 39. Id. § 1.02 reporters’ note to cmt. b(1)(A), at 17. 40. FED. R. CIV. P. 42(a). District courts often have procedures for designating cases as related and assigning them to the same judge or permitting intra-district transfer. See, e.g., U.S. DIST. CT. S.D. CAL. R. 40.1; U.S. DIST. CT. N.D. ILL. R. 40.4. 41. 28 U.S.C. § 1407(a) (2012); see also Lexecon Inc. v. Milberg Weiss Bershad Hynes & Lerach, 523 U.S. 26 (1998) (requiring remand to original district for trial). 42. See Effron, supra note 16, at 764, 819-21 (proposing similar division). 43. See FED. R. CIV. P. 19(a)(1)(A) (mandatory joinder); see also FED. R. CIV. P. 14(a)(1) (interpleader). 44. See FED. R. CIV. P. 19(a)(1)(B)(ii) (mandatory joinder); FED. R. CIV. P. 22 (interpleader); FED. R. CIV. P. 23(b)(1)(A) (class action). 45. See FED. R. CIV. P. 19(a)(1)(B) (mandatory joinder); FED. R. CIV. P. 23(b)(1)(B) (class action); FED. R. CIV. P. 24(a)(2) (intervention). 46. See FED. R. CIV. P. 23(b)(2) (class action). 47. See YEAZELL, supra note 18, at 16, 58, 65. 48. But see MARTIN H. REDISH, WHOLESALE JUSTICE: CONSTITUTIONAL DEMOCRACY AND THE PROBLEM OF THE CLASS ACTION LAWSUIT (2009) (suggesting that mandatory class treatment is inconsistent with individual autonomy but not challenging non-class aggregation in similar circumstances). 2014] AGGREGATING DEFENDANTS 1019 transactions or occurrences . . . .”49 A class action under Rule 23(b)(3) requires only a common question of law or fact but requires that the common question(s) “predominate over any questions affecting only individual members . . . .”50 Multi-district litigation under 28 U.S.C. § 1407, consolidation under Rule 42(a), and permissive intervention under Rule 24(b) permit aggregation based only on a common question,51 though courts tend to require a strong overlap before ordering aggregation.52 Commonality-driven aggregation was largely an innovation of the 1938 Federal Rules of Civil Procedure and amendments in the 1960s.53 Coordination or consolidation is generally uncontroversial,54 while permissive joinder has been described as both too restrictive for requiring an overlap in operative facts and too expansive for allowing mass joinders.55 Common question class actions under Rule 23(b)(3) are far more controversial: they have been accused of creating substantial exposure that encourages settlement of even meritorious defenses;56 enriching plaintiffs’ lawyers with large fee awards while recouping trivial recoveries for class members;57 being inappropriate for substantive claims that are positive-value and rife with individual 49. FED. R. CIV. P. 20(a)(1)(A)-(B); 4 JAMES WM. MOORE ET AL., MOORE’S FEDERAL PRACTICE § 20.05[3] (3d ed. 2013). 50. FED. R. CIV. P. 23(a)(2); FED. R. CIV. P. 23(b)(3). Common-question class actions must also be superior to other means for resolving the dispute. FED. R. CIV. P. 23(a)(1)-(4). 51. See 28 U.S.C. § 1407(a) (2012); FED. R. CIV. P. 24(b); FED. R. CIV. P. 42(a). The multi-district litigation statute only expressly includes “common questions of fact,” 28 U.S.C. § 1407(a) (2012), but consolidation has occurred based primarily on common legal questions or mixed questions of law and fact. See Stanley J. Levy, Complex Multidistrict Litigation and the Federal Courts, 40 FORDHAM L. REV. 41, 47-48 (1971). 52. PRINCIPLES OF THE LAW: AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. b(2), at 27-28; Effron, supra note 16, at 789-804 (suggesting courts normally apply predominance standard when evaluating permissive joinder or consolidation). 53. See Robert G. Bone, Mapping the Boundaries of a Dispute: Conceptions of Ideal Lawsuit Structure from the Field Code to the Federal Rules, 89 COLUM. L. REV. 1, 47-60 (1989); Resnik, supra note 24, at 16, 29-32. 54. See 9A CHARLES ALAN WRIGHT & ARTHUR R. MILLER, FEDERAL PRACTICE AND PROCEDURE § 2381 (3d ed. 2008) (Rule 42(a)); Resnik, supra note 24, at 35 (multi-district litigation). Some say that limiting multi-district litigation to pre-trial proceedings is too constraining. See Resnik, supra note 24, at 35; see also Erichson, supra note 20, at 416. 55. Compare Douglas D. McFarland, Seeing the Forest for the Trees: The Transaction or Occurrence and the Claim Interlock Civil Procedure, 12 FLA. COASTAL L. REV. 247, 265-66 (2011) (stating that the free joinder of parties is encouraged), with PRINCIPLES OF THE LAW OF AGGREGATE LITIGATION § 1.02 reporters’ note to cmt. b(1)(A), at 16 (stating that the rules of joinder “allow[] persons with related claims to join as coparties but [do] not requiring them to”). 56. Resnik, supra note 24, at 16. 57. See, e.g., Arthur R. Miller, Of Frankenstein Monsters and Shining Knights: Myth, Reality, and the “Class Action Problem”, 92 HARV. L. REV. 664, 679 (1979). 1020 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 issues, like mass torts;58 and threatening the autonomy of absent class members.59 B. Two Types of Defendant Aggregation Though the historical roots of group litigation lie in aggregation of defendants—often an entire village with a shared obligation of harvest to a landlord or tithe to a church—aggregation of defendants has been described as a “rarity” in modern times.60 Yet, litigation against multiple defendants occurs every day in courts across the country: employers and employees, corporations and their subsidiaries, principals and agents, co-conspirators, manufacturers and distributors, insured and insurers, etc.61 Two types of defendant aggregation must be distinguished. When a plaintiff has a single claim to a single recovery for which more than one person is potentially liable, whether jointly (e.g., coobligors on a contract), severally (e.g., joint tortfeasors), or in the alternative (e.g., a manufacturer and its component part supplier in a product defect case), aggregation of defendants is common and uncontroversial.62 Remedy-driven aggregation procedures often apply. Even if not, aggregation reflects the core purposes for which commonality-driven procedures were added to the federal rules: to prevent division of a single recovery into multiple lawsuits.63 Like the historical roots of defendant aggregation, the defendants in these cases tend to have a pre-existing relationship, often direct (e.g., a manufacturer and its distributor) but at least indirect (e.g., two component part suppliers for the same manufacturer). On the other hand, when a plaintiff has similar but independent claims (each entitled to its own recovery) against multiple unrelated but similarly situated defendants, aggregation is far less common and more controversial. This Article focuses on these cases and uses the phrases defendant aggregation or aggregation of similarly situated defendants to refer to them. Notably, aggregation of unrelated plaintiffs with similar but independent claims is common and widely accepted.64 This is not to deny the serious debate, extensive commentary, and numerous policy proposals surrounding aggregation of simi58. 59. 60. 61. See Rosenberg, supra note 4, at 565-66 (summarizing criticism). See REDISH, supra note 48, at 169-73. YEAZELL, supra note 18, at 58, 135-36. See, e.g., 7 CHARLES ALAN WRIGHT, ARTHUR R. MILLER & MARY KAY KANE, FEDERAL PRACTICE AND PROCEDURE § 1657 (3d ed. 2001) (and notes therein). 62. See FED. R. CIV. P. 20(a)(2)(A); see also WRIGHT, MILLER & KANE, supra note 61, § 1654 (and notes therein). 63. See McFarland, supra note 55, at 260 n.66. 64. See Developments in the Law—Class Actions, 89 HARV. L. REV. 1318, 1322 (1976). 2014] AGGREGATING DEFENDANTS 1021 larly situated plaintiffs, particularly via the class action. However, that debate is over the proper scope (e.g., are class actions appropriate for mass tort claim?) or procedures (e.g., how to protect absent class members or avoid agency problems with plaintiffs’ lawyers). On the defendant side, the controversy is over the basic availability of aggregation for similarly situated defendants. C. The Argument for Aggregating Similarly Situated Defendants Prior scholarship on defendant aggregation has concluded, “the fundamental justification for consolidating plaintiff claims applies with equal force to defendants.”65 Specifically, aggregation of similarly situated plaintiffs is justified on three primary grounds that also seem to apply to similarly situated defendants: eliminating duplicative litigation, making otherwise negative-value claims viable, and allowing plaintiffs to match defendants’ inherent ability to spread costs. First, a benefit of all aggregative devices is the elimination or reduction of repetitive litigation over the same or similar issues, which wastes judicial and litigant resources66 and risks inconsistent judgments that could undermine public faith in the administration of justice.67 Multi-defendant cases are as likely to raise the same or similar issues as multi-plaintiff cases; for example, multiple patent defendants can each challenge the validity of the patent and rely on the same evidence and arguments.68 Second, plaintiff aggregation makes viable otherwise negativevalue claims, that is, “where the net expected recovery is [individually] small” and would not justify the cost of litigation, “but the total extent of societal loss is large.”69 Aggregation insures that the defendant “pay[s] an amount equal to the losses caused by its wrong,” thereby “secur[ing] the practical implementation of the substantive law” and providing a deterrent that “reduces the willingness of the defendant to engage in the illegal conduct that caused the harm in 65. Hamdani & Klement, supra note 4, at 689. 66. See WRIGHT & MILLER, supra note 54, R. 42(a) (consolidation); Richard D. Freer, Avoiding Duplicative Litigation: Rethinking Plaintiff Autonomy and the Court’s Role in Defining the Litigative Unit, 50 U. PITT. L. REV. 809, 813 (1989); Mary Kay Kane, Original Sin and the Transaction in Federal Civil Procedure, 76 TEX. L. REV. 1723, 1728-30 (1998) (permissive joinder); Susan M. Olson, Federal Multidistrict Litigation: Its Impact on Litigants, 13 JUST. SYS. J. 341, 341 (1988-89) (multi-district litigation); Rosenberg, supra note 4, at 563-64 (class actions). 67. See Freer, supra note 66, at 814; Edward F. Sherman, Aggregate Disposition of Related Cases: The Policy Issues, 10 REV. LITIG. 231, 236-43 (1991). 68. See Bryant, supra note 23, at 704-05. 69. Richard A. Epstein, Commentary, The Consolidation of Complex Litigation: A Critical Evaluation of the ALI Proposal, 10 J.L. & COM. 1, 6 (1990); see also Rosenberg, supra note 4, at 563-64, 570-72. 1022 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 the first place.”70 Aggregation of defendants similarly allows the plaintiff to eliminate some costs that cannot be spread over multiple individual actions (e.g., filing fees, attending hearings and trial, and taking and defending depositions). This cost-reduction will make otherwise negative-value claims viable, promoting optimal deterrence. Moreover, the negative-value defense provides a “mirror-image” justification for aggregation of similarly situated defendants.71 Even defendants with meritorious defenses will settle if the cost of litigation exceeds the potential liability, and this threat of overpaying could over-deter legitimate conduct ex ante.72 For example, many say patent-assertion entities exploit their cheaper litigation costs to obtain settlement payments less than the expected cost of defense, even for weak patents.73 Aggregation should allow defendants to reduce total costs by exploiting economies of scale, making more defenses positive-value, and moving closer to optimal deterrence.74 Third, even for individually positive-value claims, plaintiff aggregation allows plaintiffs to share and spread costs over the whole set of their claims, which the defendant naturally will be able to do simply by being involved in many similar cases (e.g., by using the same expert witnesses, reusing briefing, undertaking a single document collection, etc.).75 Aggregation thus evens the ability and incentives of the parties to invest in litigation, making it more likely that the resolution will reflect the merits rather than a “war of attrition” of costly discovery and motion practice.76 Cost-spreading also applies in reverse—that is, absent aggregation of defendants, plaintiffs have a greater ability to exploit economies of scale and therefore have greater settlement leverage or ability to engage in a war of attrition.77 For example, patent assertion entities have been accused of exploiting their lower cost of litigation and ability to spread costs among many defendants by making broad and costly discovery requests.78 Thus, in theory, defendant aggregation offers the same benefits as plaintiff aggregation, and these benefits generally accrue to the 70. Epstein, supra note 69, at 6-7; see also, e.g., Rosenberg, supra note 4, at 563-64 (discussing how aggregation can reduce the costs of individual litigation and promote optimal deterrence). 71. Hamdani & Klement, supra note 4, at 696-99. 72. Id. at 697. 73. See Ranganath Sudarshan, Nuisance-Value Patent Suits: An Economic Model and Proposal, 25 SANTA CLARA COMPUTER & HIGH TECH. L.J. 159, 160 (2008); Taylor, supra note 7, at 674-75; Bryant, supra note 23, at 693. 74. Hamdani & Klement, supra note 4, at 698-99. 75. See Rosenberg, supra note 4, at 570-71. 76. See id. 77. Hamdani & Klement, supra note 4, at 696-99. 78. See Sudarshan, supra note 73, at 166-67; J. Jason Williams et al., Strategies for Combating Patent Trolls, 17 J. INTELL. PROP. L. 367, 368, 375 (2010). 2014] AGGREGATING DEFENDANTS 1023 courts and the party being aggregated (the defendant) at the expense of the non-aggregated party (the plaintiff).79 It also may serve an additional socially beneficial function not shared by plaintiff aggregation, forcing defendants to produce information about relative contributions to harm.80 D. Resistance to Aggregating Similarly Situated Defendants Recent efforts by plaintiffs to aggregate unrelated but similarly situated defendants have sparked fierce resistance from defendants, courts, policymakers, and commentators in a variety of substantive areas. Although most of the controversy has centered on joinder of defendants under Rule 20, there also has been resistance to aggregating defendants via defendant class actions,81 consolidation under Rule 42(a),82 and the multi-district litigation statute.83 1. Patent Litigation In recent years, patent litigation has become concentrated in districts seen as particularly friendly to patent owners, also known as “patentees,” especially the Eastern District of Texas.84 Filing in a plaintiff-friendly district has been popular among what are variably called patent assertion entities, non-practicing entities, or pejoratively, patent trolls,85 which derive revenue from threatening or filing patent litigation rather than commercializing the invention.86 Patent assertion entities are “perhaps the most controversial and least popular group of patent [holders]” accused of delaying litigation to maximize damages and leverage and using weak patents that are likely invalid but costly to invalidate.87 79. See Hamdani & Klement, supra note 4, at 698-99 (describing benefit to defendants); id. at 726-27 (noting that “[f]or plaintiffs, the downsides of the class defense are obvious” and “[t]he upside of the class defense for plaintiffs is unclear”). 80. See Shen, supra note 22, at 98. 81. See Donald E. Burton, The Metes and Bounds of the Defendant Class Action in Patent Cases, 5 J. MARSHALL REV. INTELL. PROP. L. 292 (2006) (describing disuse of defendant class actions and objections raised to it). 82. See 35 U.S.C. § 299 (Supp. V 2011) (prohibiting consolidation of patent defendants for trial). 83. See Greg Ryan, JPML Head Judge Explains Why Panel Is More Picky, LAW360 (May 24, 2013, 8:21 PM), http://www.law360.com/articles/442674/jpml-head-judge-explainswhy-panel-is-more-picky (attributing increase in denial of multi-district litigation motions to increase in motions in patent cases, i.e., where defendants being aggregated). 84. Mark A. Lemley, Where to File Your Patent Case, 38 AIPLA Q.J. 401, 404 (2010). 85. PWC, 2012 PATENT LITIGATION STUDY 24 (showing that 37.4% of patent decisions in the Eastern District of Texas involved patent assertion entities compared to 20.6% in all districts). 86. Colleen V. Chien, Of Trolls, Davids, Goliaths, and Kings: Narratives and Evidence in the Litigation of High-Tech Patents, 87 N.C. L. REV. 1571, 1578 (2009). 87. Id. at 1577-80. 1024 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 Patent assertion entities often filed a single lawsuit against multiple unrelated defendants accused of infringing the same patent(s) with independent but similar products. For example, a patent assertion entity whose patent purportedly covered MMS messaging in mobile phones might sue LG, Sanyo, Samsung, Research in Motion, and Apple—each of whom developed and sold MMS-capable phones but did so independently of, and in competition with, each other. Though not used exclusively by patent assertion entities, multi-defendant patent suits came to be associated with their questionable (or to be fair, questioned) litigation tactics and the plaintiff-friendly Eastern District of Texas. Patent assertion entities filed nineteen percent of patent cases but sued twenty-eight percent of defendants,88 and nearly twice as many defendants were sued per case in the Eastern District of Texas than the national average.89 Patent assertion entities were assumed to file multi-defendant suits to decrease their own costs, increase the costs of defendants, and decrease the chances of transfer by naming at least one defendant with a connection to the plaintiff-friendly district.90 The overwhelming majority of district courts, ultimately endorsed by the Federal Circuit, held that claims against “separate companies that independently design, manufacture and sell different products in competition with each other” did not arise from the same transaction or occurrence for purposes of joinder, even where the products were accused of infringing the same patent and operated similarly.91 Rather, “an actual link” between the products was required, such as a relationship between the defendants, the use of identically sourced components, or overlap in the products’ development or manufacture.92 The minority view, adopted almost exclusively by the Eastern District of Texas,93 held that patent infringement claims arose from the same transaction or occurrence “if there is some nucleus of operative facts or law,” such as allegations that the defendants infringed the same patent or had products that were not “dramatically differ88. Id. at 1603-04 (2000–08 time period). 89. See James C. Pistorino, 2012 Trends in Patent Case Filings and Venue: Eastern District of Texas Most Popular for Plaintiffs (Again) but 11 Percent Fewer Defendants Named Nationwide, PAT., TRADEMARK & COPYRIGHT L. DAILY, Feb. 11, 2013, at 3. This number is derived from the data reported for 2011, before Congress altered the joinder rules for patent cases. 90. Taylor, supra note 7, at 671-78. 91. Pergo, Inc. v. Alloc, Inc., 262 F. Supp. 2d 122, 128 (S.D.N.Y. 2003); Androphy v. Smith & Nephew, Inc., 31 F. Supp. 2d 620, 623 (N.D. Ill. 1998); see also In re EMC Corp., 677 F.3d 1351, 1357 & n.2, 1359 & n.3 (Fed. Cir. 2012) (adopting the overwhelming view outside the Eastern District of Texas that joinder is inappropriate for independent but similarly situated defendants). 92. In re EMC Corp., 677 F.3d at 1359-60. 93. Id. at 1357 & n.2. 2014] AGGREGATING DEFENDANTS 1025 ent.”94 Citing judicial economy, these decisions reasoned that the most important issues, including the determination of patent scope, or “claim construction,” and invalidity, would be identical.95 Congress resolved this split as part of a more general overhaul of the patent system in the 2011 America Invents Act (AIA).96 A new statutory provision, 35 U.S.C. § 299, provided that joinder, or consolidation for trial, of accused infringers only was permitted if the claims involved the making, using, importing, offering to sell, or selling “of the same accused product or process” and clarified that “allegations that [the defendants] each have infringed the patent or patents in suit” alone were insufficient for joinder.97 Though the legislative history is sparse, the provision appears to have been motivated by concern about the Eastern District of Texas and perceived abusive litigation practices of patent assertion entities.98 As a result of the AIA’s anti-joinder provision, claims against unrelated defendants with independent products only can be aggregated for pre-trial purposes and only through Rule 42(a) consolidation (if pending in the same district) or through multi-district litigation (if pending in different districts).99 2. Trademark and Copyright Litigation Trademark holders have similarly sought to join several unrelated defendants for similar but independent activities alleged to violate the same rights. Defendants have objected, and courts have held that these independent activities are not part of the same transaction or occurrence for purposes of joinder.100 Efforts to aggregate similarly situated copyright defendants have been even more controversial. The internet allows diffuse individuals to share copyrighted movies, videos, or music through so-called “peerto-peer” (P2P) networks, the earliest and most famous of which was 94. MyMail, Ltd. v. Am. Online, Inc., 223 F.R.D. 455, 456-57 (E.D. Tex. 2004). 95. See Innovative Global Sys. LLC v. Tpk. Global Techs. LLC, No. 6:09-CV-157, 2009 U.S. Dist. LEXIS 105929, at *5-7 (E.D. Tex. Oct. 20, 2009); Adrain v. Genetec Inc., No. 2:08-CV-423, 2009 U.S. Dist. LEXIS 86855, at *7-10 (E.D. Tex. Sept. 22, 2009); Sprint Commc’ns Co. v. Theglobe.com, Inc., 233 F.R.D. 615, 617 (D. Kan. 2006); MyMail, 223 F.R.D. at 456-58. 96. See generally Taylor, supra note 7 (discussing background and consequences of AIA reforms to patent joinder). 97. 35 U.S.C. § 299 (Supp. V 2011). 98. See Taylor, supra note 7, at 700-06. 99. See id. at 719-22. 100. See Bravado Int’l Grp. Merch. Servs. v. Cha, No. CV 09-9066 PSG, 2010 U.S. Dist. LEXIS 80361, at *11-14 (C.D. Cal. June 30, 2010); Golden Scorpio Corp. v. Steel Horse Bar & Grill, 596 F. Supp. 2d 1282, 1285 (D. Ariz. 2009); Colt Def. LLC v. Heckler & Koch Def., Inc., No. 2:04CV258, 2004 U.S. Dist. LEXIS 28690, at *15-16 (E.D. Va. Oct. 22, 2004); SB Designs v. Reebok Int’l, Ltd., 305 F. Supp. 2d 888, 892 (N.D. Ill. 2004). 1026 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 Napster.101 After early efforts to hold P2P networks liable ultimately failed,102 the Recording Industry Association of America (RIAA) and its major record label members began suing individual file-sharers, primarily as a deterrent.103 The RIAA’s basic strategy was to search P2P networks for particular copyrighted materials; collect the IP addresses of uploaders of infringing files; sue numerous “John Does” in a single lawsuit, with each John Doe representing a different uploader’s IP address; seek court approval for early subpoenas to internet service providers (ISPs) to determine the identities of the John Does; and contact the John Does and offer to settle the case for around $3000, which was less than the cost of defense.104 Overall, the RIAA and its members sued 30,000 individuals during its 2003 to 2008 enforcement campaign, sometimes in individual lawsuits and sometimes in groups of dozens or hundreds of individuals, most of whom were John Does.105 Of the many potential problems with the RIAA’s strategy,106 courts and defendants focused primarily on the propriety of joinder.107 Plaintiffs alleged that joinder was proper because each defendant “committed violations of the same law (e.g., copyright law), by committing the same acts (e.g., the downloading and distribution of copyrighted sound recordings owned by Plaintiffs), and by using the same means 101. Bridy, supra note 23, at 698-710; Hamdani & Klement, supra note 4, at 699-700. 102. See Hamdani & Klement, supra note 4, at 700. 103. See id. at 700-01. 104. Karunaratne, supra note 14, at 286-87. 105. Bridy, supra note 23, at 721. Commentators frequently suggest that the RIAA “usually nam[ed] dozens or hundreds of defendants per suit.” David Kravets, Copyright Lawsuits Plummet in Aftermath of RIAA Campaign, WIRED (May 18, 2010, 1:24 PM), http://www.wired.com/threatlevel/2010/05/riaa-bump/. But the RIAA sued the 30,000 individuals in approximately 13,000 lawsuits, an average of only 2.3 defendants per lawsuit. Bridy, supra note 23, at 721 (noting increase in copyright lawsuits from 2003–2008 and attributing it to RIAA campaign). The RIAA lawsuits were a mix of suits against a single individual file-sharer and suits against dozens or hundreds of file-sharers, most of whom were John Does. See Ray Beckerman, P.C., Index of Litigation Documents Referred to in “Recording Industry vs. The People”, BECKERMANLEGAL, http://beckermanlegal.com/ Documents.htm (last updated May 17, 2013) (listing exemplary music industry cases). The RIAA generally used aggregated actions when it did not know the identity of the defendants and individual actions when it did. See Arista Records, LLC v. Does 1–11, No. 1:07– CV–2828, 2008 WL 4823160, at *3 & n.3, *6 (N.D. Ohio Nov. 3, 2008) (stating that the RIAA will likely re-file individual actions once the defendants are identified). Individual suits may have been used to deprive defendants of economies of scale, see Hamdani & Klement, supra note 4, at 699-702, or it may be that most defendants chose to settle and those that did not were not subject to personal jurisdiction and venue in the same district. See Karunaratne, supra note 14, at 287, 298-302. 106. See generally Karunaratne, supra note 14 (noting concerns about abuse of John Doe procedures, insufficient showings for expedited subpoenas, lack of personal jurisdiction, and lack of a necessary connection between IP address and file-sharer). 107. See id. at 287-88 (noting that courts in RIAA cases responded “with particular force on the joinder issue” and that courts “were less willing to confront questions of personal jurisdiction”). 2014] AGGREGATING DEFENDANTS 1027 (e.g., a file-sharing network) that each Defendant accessed via the same ISP.”108 The propriety of joinder often was contested by a defendant109 or the court sua sponte,110 and “the majority of district courts who . . . addressed the issue of joinder . . . concluded that those allegations were insufficient to satisfy the transactional requirement of Fed.R.Civ.P. 20(a)(2) and that joinder was therefore improper.”111 Courts held that “merely alleging that the Doe Defendants all used the same ISP and file-sharing network to conduct copyright infringement without asserting that they acted in concert was not enough to satisfy the same series of transactions requirement under the Federal Rules,” and that merely alleging that the defendants caused “the same type of harm” rather than “the same harm” was insufficient for joinder.112 Some courts even proposed sanctions against the plaintiffs for attempting joinder.113 With the end of the RIAA’s campaign, mass copyright enforcement shifted to the movie industry and to the pornographic films industry in particular. The litigation model essentially was the same as that of the RIAA, though joinder often was now of hundreds or thousands of John Does.114 As with the RIAA litigation, defendants115 or courts sua sponte116 challenged the mass joinder of defendants, and many courts held that “the fact that a large number of people use the same method to violate the law does not authorize them to be joined as defendants in a single lawsuit” because each defendant independently accessed the P2P network and downloaded the copyrighted file pieces in “discrete and separate acts that took place at different times” without concerted action.117 108. Does 1–11, 2008 WL 4823160, at *1 (quoting complaint); Arista Records, LLC v. Does 1–27, No. 07-162-B-W, 2008 WL 222283, at *1 (D. Me. Jan. 25, 2008) (quoting complaint), report and recommendation adopted, 584 F. Supp. 2d 240 (D. Me. 2008). 109. Does 1–11, 2008 WL 4823160, at *1. 110. See Does 1–27, 2008 WL 222283, at *6 n.5. 111. Does 1–11, 2008 WL 4823160, at *6; see also Bridy, supra note 23, at 722, 723 & nn.164-69 (explaining the reasoning of courts’ sua sponte finding of improper joinder in multiple jurisdictions); Karunaratne, supra note 14, at 287-88 & nn.25-28 (noting that courts find joinder to be improper in file-sharing cases when defendants only use the same ISP and peer-to-peer networks). The limited courts not ordering de-aggregation generally concluded only that severance was premature until the Does were identified. See Does 1– 11, 2008 WL 4823160, at *3-5. 112. Does 1–11, 2008 WL 4823160, at *6. 113. See Does 1–27, 2008 WL 222283, at *6 n.5. 114. See Bridy, supra note 23, at 721-22. See generally Karunaratne, supra note 14 (discussing the propriety of joinder in copyright infringement cases against John Does). 115. See Hard Drive Prods., Inc. v. Does 1–188, 809 F. Supp. 2d 1150, 1153 (N.D. Cal. 2011). 116. See Next Phase Distrib., Inc. v. Does 1–27, 284 F.R.D. 165, 166 (S.D.N.Y. 2012). 117. Digital Sins, Inc. v. Does 1–245, No. 11 Civ. 8170(CM), 2012 WL 1744838, at *2 (S.D.N.Y. May 15, 2012). 1028 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 Courts in the pornography cases are more divided on joinder than in the RIAA cases, but the division is over whether the defendants acted in concert, not whether similar claims against unrelated defendants can be aggregated.118 In earlier P2P networks, a single user uploaded a copyrighted file, which was then downloaded in its entirety separately by other users. BitTorrent breaks the copyrighted material into pieces, which a user then collects from various other users and must share with others once in her possession.119 Some courts have upheld joinder (or postponed resolution), concluding that concerted action existed to the extent the defendants were part of the same group of users (called a “swarm”) sharing the same pieces at the same time or in the same time period.120 3. Telecommunications Cases Controversy over aggregation of similarly situated defendants has frequently arisen in telecommunications cases,121 most notably in DirecTV’s campaign against piracy. DirecTV raided businesses selling devices that could unscramble its signals and sent demand letters to more than 170,000 purchasers, offering to settle for $3500 per purchaser (presumably less than the cost of defense).122 DirecTV ultimately sued over 24,000 individuals under various wiretap, communications, and copyright laws, often by suing several unrelated and independent violators in a single suit.123 Once again, many potential problems existed with these cases,124 but the joinder issue, raised either by defendants’ motions or sua sponte by the court,125 was the focal point of resistance.126 “Most courts presented with a suit of this type have concluded that the claims against the various defendants are not transactionally relat118. See Next Phase, 284 F.R.D. at 168-69. 119. Karunaratne, supra note 14, at 288-90. 120. Digital Sin, Inc. v. Does 1–27, No. 12 Civ. 3873(JMF), 2012 WL 2036035, at *2 (S.D.N.Y. June 6, 2012). 121. See, e.g., Don King Prods., Inc. v. Colon-Rosario, 561 F. Supp. 2d 189 (D.P.R. 2008); Movie Sys., Inc. v. Abel, 99 F.R.D. 129, 129-30 (D. Minn. 1983) (18 suits against 1,795 total individuals). 122. In re DIRECTV, Inc., No. C-02-5912-JW, 2004 WL 2645971, at *2 (N.D. Cal. July 26, 2004); Hamdani & Klement, supra note 4, at 703-06. 123. See David W. Opderbeck, Peer-to-Peer Networks, Technological Evolution, and Intellectual Property Reverse Private Attorney General Litigation, 20 BERKELEY TECH. L.J. 1685, 1725-26 (2005). For example, DirecTV sued 775 defendants in 180 lawsuits in the Northern District of California. See DIRECTV, 2004 WL 2645971, at *2. 124. See Hamdani & Klement, supra note 4, at 703-06 (noting concerns about viability of statutory claims, investigative techniques, and lack of necessary correlation between device and piracy). 125. See, e.g., DIRECTV, 2004 WL 2645971, at *1 (sua sponte); DirecTV, Inc. v. Beecher, 296 F. Supp. 2d 937, 939 (S.D. Ind. 2003) (motion). 126. See DIRECTV, 2004 WL 2645971, at *5 (summarizing cases). 2014] AGGREGATING DEFENDANTS 1029 ed” for joinder.127 They have held that “[i]ndividual purchasers, who have no business connection with one another and who make their purchases independently of one another are not engaged in the same transaction,” even though they received their devices from the same shipping facility, “perform[ed] the same act in the same [geographic] area,” and engaged in “similar statutory violations” that “injured DIRECTV in the same manner.”128 4. Other Examples Technology cases are not the only examples of efforts by plaintiffs to aggregate similarly situated defendants and corresponding resistance by defendants, courts, and policymakers. This has also occurred in products liability,129 environmental,130 consumer protection,131 indemnification,132 and other types of cases.133 E. The Puzzle of Defendant Aggregation The narrative of plaintiff aggregation has become well defined in its nearly half-century at the forefront of American litigation. Plaintiffs (and their attorneys) seek aggregation because they benefit from its economies of scale, while defendants generally oppose plaintiff aggregation because of the in terrorem effect of the aggregated liability.134 Courts and policymakers walk a middle ground, allowing ag127. MOORE ET AL., supra note 49, § 20.05[3], at 20-37; see also DIRECTV, 2004 WL 2645971, at *5 (summarizing cases and rationales); McFarland, supra note 55, at 268 (noting that out of the several courts that have considered joinder in television-pirating cases, one has allowed joinder while a dozen others have denied it). 128. DIRECTV, 2004 WL 2645971, at *4. 129. Erichson, supra note 20, at 403 & n.80. Many multi-defendant products liability cases, and multi-defendant cases in other contexts, involve aggregated plaintiffs each injured in similar ways but only by one defendant. Defendants have contested the propriety of defendant aggregation in these cases, see, e.g., Turpeau v. Fidelity Fin. Servs., 936 F. Supp. 975, 980 (N.D. Ga. 1996), but more often, defendants contest whether plaintiffs meet the requirements for a class action, see, e.g., Arch v. Am. Tobacco Co., 175 F.R.D. 469, 489 (E.D. Pa. 1997), or joinder, see, e.g., Abdullah v. Acands, Inc., 30 F.3d 264, 268 & n.5 (1st Cir. 1994). 130. See, e.g., Coal. for a Sustainable Delta v. U.S. Fish & Wildlife Serv., No. 1:09–CV– 480 OWW GSA, 2009 WL 3857417 (E.D. Cal. Nov. 17, 2009). 131. See, e.g., Turpeau, 936 F. Supp. at 979-80. 132. See, e.g., United States v. Katz, 494 F. Supp. 2d 645, 646 (S.D. Ohio 2006). 133. See, e.g., Nassau Cnty. Ass’n of Ins. Agents v. Aetna Life & Cas. Co., 497 F.2d 1151, 1152 (2d Cir. 1974) (employment and antitrust case). 134. See Richard A. Nagareda, Aggregation and Its Discontents: Class Settlement Pressure, Class-Wide Arbitration, and CAFA, 106 COLUM. L. REV. 1872, 1873-74 (2006) [hereinafter Nagareda, Discontents]. This description is admittedly a generalization. See Elizabeth Chamblee Burch, Litigating Groups, 61 ALA. L. REV. 1, 11-12 (2009) (discussing a defendant’s preference for aggregated settlements of mass joinder actions); Richard A. Nagareda, Autonomy, Peace, and Put Options in the Mass Tort Class Action, 115 HARV. L. REV. 747, 751 (2002) (discussing defendants’ support for settlement classes) [hereinafter Nagareda, Autonomy]; David Rosenberg, Adding a Second Opt-Out to Rule 23(b)(3) Class Actions: Cost 1030 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 gregation of similarly situated plaintiffs but imposing limits in some cases and some contexts. By contrast, the narrative of defendant aggregation is utterly confused. Theoretically, defendants obtain similar economies of scale and the judicial system obtains similar efficiencies from aggregation. Defendants face no in terrorem effect, as an individual defendant’s liability does not change with aggregation. To the contrary, defendant aggregation increases resources on the defense side and raises the stakes for the plaintiff, since a single loss extinguishes all of its claims. Yet, plaintiffs have generally sought to aggregate defendants while defendants, courts, and policymakers have resisted, assuming that defendant aggregation benefits plaintiffs at the expense of defendants.135 Parts III and IV seek to solve this puzzle of defendant aggregation, with the former focusing on defendant resistance and the latter systemic resistance. III. DEFENDANTS’ OPPOSITION TO DEFENDANT AGGREGATION This Part explores why defendants oppose being aggregated despite the economies of scale benefits they should obtain. In some contexts, the explanation is easy because aggregation is clearly against defendants’ interests. In other contexts, the effects of aggregation on defendants are unclear. And, in at least one category of cases, defendants lose nothing from being aggregated and their resistance appears irrational. A. Creating Additional Litigation for Defendants Defendants’ opposition to being aggregated is easy to explain in cases, like the BitTorrent copyright litigation, where the stakes are small, each defendant’s liability is less than the cost of individual litigation, and the claims are only economically viable because of the cost-savings the plaintiff realizes from defendant aggregation. Defendants are better off without being aggregated because these claims would never be brought individually and defendants would have no need for the economies of scale aggregation offers them. This category of cases may not be particularly large. Even without aggregation, a plaintiff can spread many of its costs over the full portfolio of individual cases through, for example, form complaints; reuse of briefs, expert reports, and discovery requests; and a single fact investigation and document collection.136 In only a limited set of Without Benefit, 2003 U. CHI. LEGAL F. 19, 22-23 (2003) (discussing hold-out and opt-out plaintiffs in mass joinders and class actions). 135. See, e.g., Bridy, supra note 23, at 722-24; Taylor, supra note 7, at 671-78. 136. See Hamdani & Klement, supra note 4, at 696 n.36. 2014] AGGREGATING DEFENDANTS 1031 cases will the additional savings the plaintiff realizes from defendant aggregation—filing fees, administrative costs related to preparing and submitting court documents, and attendance at depositions, hearings, and trial137—be the difference in the viability of the claim. In the BitTorrent cases, the plaintiff had unusually high up-front costs because it only knew the infringers’ IP addresses and needed expedited subpoenas to obtain the identities of those whom it could target for settlement demands.138 The cost of separate filing fees, moving individually for expedited subpoenas, attending separate subpoena hearings, and executing individual subpoenas on the ISPs would likely dwarf the few thousand dollars at stake.139 A small subset of extreme patent troll cases also may fit in this category, where the patentee sues large numbers of end-users of common technology (e.g., hotels using Wi-Fi related patents or small businesses using scanners) and demands only a few thousand dollars from each.140 The patent anti-joinder provision seems to have deterred these smallstakes patent cases.141 On the other hand, higher stakes cases where defendant aggregation is not the difference in the viability of the plaintiffs’ claims will be brought even if defendants cannot be aggregated. This is true of most patent cases; there was only a small decrease in the total number of defendants sued and no significant effect on patent assertion entities’ share of defendants after enactment of the patent anti-joinder provision.142 Similarly, the financial stakes in the individual RIAA and DirecTV cases were small, but the corporate plaintiffs derived significantly greater value from the larger deterrent effect of the suits.143 While it is possible they would have sued fewer defendants without aggregation, depending on how many suits were necessary to provide sufficient deterrence, both the RIAA and DirecTV plaintiffs often pursued individual, negative-value lawsuits when necessary.144 137. See Bridy, supra note 23, at 722; Taylor, supra note 7, at 672. 138. See Karunaratne, supra note 14, at 291. 139. See Karunaratne, supra note 14, at 303-04. 140. See, e.g., Joe Mullin, Wi-Fi Patent Troll Hit with Racketeering Suit Emerges Unscathed, ARS TECHNICA (Feb. 13, 2013, 10:05 AM), http://arstechnica.com/tech-policy/ 2013/02/wi-fi-patent-troll-hit-with-novel-anti-racketeering-charges-emerges-unscathed/. 141. See Colleen Chien, Patent Trolls by the Numbers 3 (Mar. 13, 2013) (unpublished manuscript), available at https://ssrn.com/abstract=2233041. 142. Id.; Pistorino, supra note 89, at 4. 143. See supra Part III.D.2-3. 144. See Arista Records, LLC v. Does 1–11, No. 1:07–CV–2828, 2008 WL 4823160, at *5 (N.D. Ohio Nov. 3, 2008) (“Plaintiffs indicated to the Magistrate Judge that they intend to sever the Doe Defendants’ cases once they have been identified.”). 1032 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 B. Cost-Differentials Even for claims with high enough stakes to be brought individually, defendant aggregation could create, or accentuate, a pro-plaintiff cost-differential, incentivizing plaintiffs to bring weak claims and defendants to settle meritorious defenses, at least at the margins.145 Despite the suggestions that this has occurred in multi-defendant patent “troll” cases,146 it is unclear why the net costs of defendant aggregation would favor plaintiffs.147 Although empirical evidence is lacking, it is doubtful that aggregating defendants would eliminate more costs from individual litigation for plaintiffs than defendants. Plaintiffs can spread many of their costs over individual cases, and any efforts by defendants in individual suits to spread costs through a joint defense group or other informal aggregation are likely to be less effective, efficient, and substantial.148 With the exception of the $400 filing fee, an insubstantial amount for any individually viable claim, defendants can match or exceed whatever additional cost-savings plaintiffs realize from defendant aggregation by, for example, dividing responsibility for depositions, hearings, and trial; splitting up document review and fact investigation; and preparing joint briefing or expert reports on common issues.149 On the other hand, defendant aggregation may impose new costs on defendants not present in individual litigation and not matched by the individual plaintiff. Aggregated parties often are required, either by court order or strategic considerations, to agree on a common strategy, achieve consensus on the myriad of issues that arise in litigation, divide tasks, file a single brief on common issues, or even present a single argument at a hearing or single case at trial,150 all of which could impose substantial coordination costs in attorney time and client money.151 Aggregated plaintiffs minimize these coordination costs because plaintiffs’ lawyers’ contingency fee arrangements provide an incentive to reduce costs by dividing, rather than duplicat145. See John C. Coffee, Jr., The Regulation of Entrepreneurial Litigation: Balancing Fairness and Efficiency in the Large Class Action, 54 U. CHI. L. REV. 877, 891 (1987). 146. See Taylor, supra note 7, at 673-75. 147. See Coffee, supra note 145, at 891-94 (describing difficulty in identifying existence and extent of cost-differential in litigation). 148. See Taylor, supra note 7, at 673-75. 149. See Erichson, supra note 20, at 403-05. 150. Taylor, supra note 7, at 673 & n.103, 674. 151. See Mark Baghdassarian & Aaron Frankel, Litigation: Managing Joint Defense Groups in Asymmetrical Lawsuits, INSIDECOUNSEL (Aug. 23, 2012), http://www.inside counsel.com/2012/08/23/litigation-managing-joint-defense-groups-in-asymme?t=litigation&page=2; see also Judith Resnik et al., Individuals Within the Aggregate: Relationships, Representation, and Fees, 71 N.Y.U. L. REV. 296, 304 (1996) (noting increase in plaintiff aggregation of “multiple sets of lawyers within a single aggregated litigation”). 2014] AGGREGATING DEFENDANTS 1033 ing, work and compromising, rather than disputing, strategy or responsibilities.152 But for aggregated defendants, defense attorneys’ hourly fee arrangements are likely to increase coordination costs, as duplicating work (e.g., attending every deposition or carefully editing every joint submission) and disputing strategy and responsibilities maximizes fees.153 Yet, if the resulting high coordination costs eliminated the cost-savings defendants otherwise realize from being aggregated, a rational defendant would respond by insisting on fee arrangements that minimized coordination costs, not by rejecting aggregation. Before Congress passed the patent anti-joinder provision, companies sued in multi-defendant patent cases in the Eastern District of Texas had begun to share a common attorney with other defendants, insist on a fixed fee, or refuse to pay for duplicative work.154 Aggregated defendants also face potential free-rider problems, that is, some defendants do the minimal work necessary for their individual cases and rely on other defendants to develop common defenses that apply to all defendants regardless of who pays for them.155 However, common defenses are public goods and a defendant that prevails on a common defense in individual litigation will bear the full cost but realize only some of the benefits, which are shared with any other similarly situated defendant.156 Thus, aggregation poses no greater free-rider costs than individual litigation.157 C. Substantive Effects Defendant aggregation does not just affect the costs of litigation; it also affects its substance. Perhaps defendants oppose being aggregated despite its potential economies of scale, because of substantive concerns. 1. Asymmetric Preclusion The doctrine of non-mutual issue preclusion precludes a party from re-litigating an issue it lost in a prior suit but does not bind a non-party to the prior suit.158 As a result, if a plaintiff loses on a key issue in an individual case then it will be bound by that loss in all other cases against similarly situated defendants, but if it prevails, it 152. See Coffee, supra note 145, at 889-94; see also Resnik et al., supra note 151, at 309-14 (describing workings of aggregated plaintiffs’ lawyers). 153. See Coffee, supra note 145, at 892. 154. See Baghdassarian & Frankel, supra note 151 (suggesting shared counsel). 155. See id. 156. See Roger Allan Ford, Patent Invalidity Versus Noninfringement, 99 CORNELL L. REV. 71, 109-12 (2013). 157. See Defendant Class Actions, supra note 20, at 648. The public good nature of common defenses is normally an argument for, not against, aggregation of similarly situated defendants. See Parchomovsky & Stein, supra note 23, at 1534-35. 158. See Blonder-Tongue Labs., Inc. v. Univ. of Ill. Found., 402 U.S. 313, 329 (1971). 1034 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 still has to re-litigate the issue with each subsequent defendant, with the risk that a subsequent loss will be binding in all remaining cases. Aggregation deprives defendants of the multiple bites at the apple offered in serial litigation by non-mutual preclusion. However, this is only a loss to defendants if their defenses are individually positive-value, that is, the potential liability exceeds the cost of individual litigation. If the cost of individual litigation exceeded the potential liability, defendants would settle, and there would be no final judgment to which asymmetric preclusion could apply.159 For example, some patent troll cases, the RIAA file-sharing litigation, and the DirecTV suits likely involved negative-value defenses where asymmetric preclusion would be largely irrelevant.160 Even in higher stakes cases with individually positive-value defenses, asymmetric preclusion only is significant in limited circumstances. If the primary issues are legal, subsequent defendants often will be effectively bound by resolution of an issue in earlier litigation through stare decisis, persuasive power, or simply disinclination to revisit something already decided.161 A rational defendant probably would prefer aggregation and the opportunity to influence the initial decision than the gamble that it can convince a subsequent court to revisit the issue after it was botched by the first defendant,162 especially since plaintiffs in serial litigation target weak, underfunded defendants first to cheaply and quickly obtain favorable precedent.163 Asymmetric preclusion also is of little help in cases where the primary issues relate to fact questions unique to each defendant—say the purpose to which the defendant put the DirecTV unscrambling device—since favorable findings for earlier defendants would be inapplicable to subsequent defendants. Thus, asymmetric preclusion only is advantageous to defendants in cases where the primary issues are factual but common, such as questions related to the plaintiff’s conduct. Patent litigation is one such example: two key patent defenses—invalidity and misconduct in the Patent Office (i.e., “inequitable conduct”)—have significant factual components common to each defendant.164 It is possible that patent 159. See Hamdani & Klement, supra note 4, at 737. 160. See id. at 701-04 (describing negative-value nature of defenses in RIAA and DirecTV cases); Jeremy P. Oczek, Rethinking Defense in “Patent Troll” Cases, CORP. COUNS., Mar. 27, 2013, available at http://www.bsk.com/media-center/2730-rethinking-defensepatent-troll-cases (noting that the average cost to defend patent cases is $1 million when less than $1 million is at stake and $3 million when $1 to 25 million is at stake). 161. See Markman v. Westview Instruments, Inc., 517 U.S. 370, 391 (1996) (noting that stare decisis would apply to patent claim interpretation even without issue preclusion). 162. See Jeffrey T. Haley, Strategies and Antitrust Limitations for Multiple Potential Patent Infringers, 21 AIPLA Q.J. 327, 334-35 (1993). 163. See Parchomovsky & Stein, supra note 23, at 1488. 164. See id. at 1501-03. 2014] AGGREGATING DEFENDANTS 1035 defendants realize more benefits from asymmetric preclusion than they do from aggregation’s economies of scale, though, even here, commentators have suggested that the rejection of an invalidity defense in an earlier case makes a later finding of invalidity less likely.165 2. Jury and Judicial Confusion Pursuing separate claims simultaneously against multiple defendants may allow the plaintiff to exploit judicial or jury confusion over which evidence and arguments apply to which defendants.166 Confusion is not inherently detrimental to aggregated defendants. For example, a similar risk of confusion of evidence and arguments is seen as benefitting aggregated plaintiffs by allowing them to focus on the strongest claims or combine strong parts of various claims to create a collective claim stronger than any individual one.167 However, plaintiffs may strategically use their control over aggregation to combine weaker claims with stronger claims, hoping the evidence and arguments for the latter will bolster the former. For example, a DirecTV defendant that used the unscrambling device for some legitimate purpose will have a difficult time highlighting this when aggregated with lots of defendants who used the device to steal DirecTV’s signals. Similarly, aggregating claims that a few defendants willfully and knowingly infringed a patent may bolster claims of ordinary (strict liability) infringement against other defendants. When applicable, the risk of judicial or jury confusion is a strong reason for defendants to resist being aggregated. On the other hand, potential confusion from aggregation does not make defendants whose individual defenses are negative-value worse off, since they would default or settle individual litigation without the opportunity to benefit from an unconfused decision-maker. Even for positivevalue defenses, confusion only poses a problem if there is significant heterogeneity among the defendants.168 If the primary defenses are common (e.g., patent invalidity when the claims are broad and clearly cover the accused products) or very similar (e.g., patent noninfringement when the patentee alleges the patent covers all prod- 165. Glynn S. Lunney, Jr., FTC v. Actavis: The Patent-Antitrust Intersection Revisited 44 (Tulane Sch. of Law Pub. Law & Legal Theory Working Paper Series, Paper No. 13-19, 2013), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2348075. 166. See, e.g., Bridy, supra note 23, at 722-23. 167. See Erbsen, supra note 28, at 1009-14. 168. See id. at 1014; see also, e.g., Philips Elecs. N. Am. Corp. v. Contec Corp., 220 F.R.D. 415, 418 (D. Del. 2004) (citing potential prejudice in ordering de-aggregation because co-defendant was not presenting defense to infringement at trial). 1036 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 ucts with certain functionality regardless of how implemented),169 there is little risk of prejudice to defendants from jury or judicial confusion. For example, potential confusion does not explain resistance to aggregation in many patent troll cases, which often involve broadly asserted claims and, consequently, defenses of either invalidity or non-infringement that apply equally to all defendants. 3. Autonomy Autonomy includes “the power of individuals to make fundamental choices concerning their legal rights of action – for example, the power to choose when and how to sue, whether to settle, and if so, under what terms.”170 Plaintiff aggregation increasingly faces autonomy concerns,171 and these concerns may also underlie resistance to defendant aggregation.172 However, aggregation can only raise autonomy concerns for positive-value defenses; for negativevalue defenses, aggregation promotes defendants’ autonomy by allowing them to defend rather than default and by deterring plaintiffs from bringing strike suits.173 Individual autonomy also is of questionable relevance to corporate defendants, who lack the strong autonomy interests of individuals.174 Moreover, in practice, defendant aggregation almost never is attempted through representative procedures, like the class action, that pose the greatest threat to individual autonomy.175 Rather, defendant aggregation has generally occurred via procedures (e.g., permissive joinder, consolidation, or multi-district litigation) that leave the substantive rights of the defendants separate and allow each defendant to retain control over its own case, obtain a separate judgment as to its liability, choose its own attorney, settle whenever and on whatever terms it chooses, and present its individual de- 169. See Mark A. Lemley, Software Patents and the Return of Functional Claiming, 2013 WIS. L. REV. 905, 907-08 (describing common problem of broad functional claims that “purport to cover any possible way of achieving a goal”). 170. Nagareda, Autonomy, supra note 134, at 750; see also Epstein, supra note 69, at 5 (stating that autonomy over one’s lawsuit is a critical element of fairness). 171. Sergio J. Campos, Mass Torts and Due Process, 65 VAND. L. REV. 1059, 1060-61 (2012). 172. See, e.g., Wiav Networks, LLC v. 3COM Corp., No. C 10-03448 WHA, 2010 U.S. Dist. LEXIS 110957, at *16 (N.D. Cal. Oct. 1, 2010) (“[T]he accused defendants — who will surely have competing interests and strategies — are also entitled to present individualized assaults on questions of non-infringement, invalidity, and claim construction.”). 173. Cf. Epstein, supra note 69, at 6 (concluding that plaintiff aggregation raises no autonomy concerns when the plaintiffs’ claims are too small to pursue individually because individual control is too expensive for anyone to rationally choose it). 174. See Nathan Oman, Corporations and Autonomy Theories of Contract: A Critique of the New Lex Mercatoria, 83 DENV. U. L. REV. 101, 114 (2005). 175. REDISH, supra note 48, at 230. 2014] AGGREGATING DEFENDANTS 1037 fense.176 Thus, aggregated defendants are not “forced to adjudicate their [defenses] passively” but rather are “able to represent [their] own interests fully as a litigant before the court.”177 Thus, the only autonomy interest inherently threatened by defendant aggregation is the ability to present one’s defense without the judge or jury hearing any other defense or to pursue one’s preferred strategy without any compromise or potential dilution from the judge or jury being presented with competing strategies from codefendants. A defendant would have to value autonomy unusually highly to conclude that this limited threat outweighed the benefits from aggregation’s economies of scale. Admittedly, judicial practices aimed at maximizing efficiency or minimizing workloads do accentuate autonomy concerns, as judges sometimes mandate that all aggregated defendants file a single brief, speak with a single voice, or share the same amount of trial time as allotted to a single plaintiff.178 If these practices were defendants’ real concerns, the proper recourse would be to challenge judicial case management procedures or judicial discretion, not to seek full-scale de-aggregation. 4. Tool to Achieve Other Substantive Objectives Another possibility is that defendants oppose being aggregated not because they dislike defendant aggregation as such but because seeking de-aggregation is doctrinally possible and serves other strategic objectives, such as creating delay and cost for the plaintiff from motion practice and re-filing179 or eliminating a co-defendant with ties to a plaintiff-friendly jurisdiction that serves as an anchor preventing transfer.180 Or perhaps defendants take the doctrinal opportunity for de-aggregation simply as a reflex from always opposing plaintiff aggregation or because they fear that greater use of aggregative procedures will have spillover effects that will promote plaintiff aggregation. Of course, the benefits from these other strategic objectives 176. See, e.g., FED. R. CIV. P. 20(a)(3); Malcolm v. Nat’l Gypsum Co., 995 F.2d 346, 352 (2d Cir. 1993); Dupont v. S. Pac. Co., 366 F.2d 193, 195-96 (5th Cir. 1966); MacAlister v. Guterma, 263 F.2d 65, 68 (2d Cir. 1958); MANUAL FOR COMPLEX LITIGATION (FOURTH) §§ 10.222, 12.21–.22, 13.21 (2004); MOORE ET AL., supra note 49, § 20.02[4]. 177. REDISH, supra note 48, at 230. 178. See, e.g., Trial Scheduling Order, Fractus S.A. v. Samsung Elecs. Corp., No. 6:09– CV–203 (E.D. Tex. May 6, 2011) (allotting thirty minutes per side for jury selection, forty minutes per side for opening arguments, fifteen hours per side for direct/cross examination, and one hour per side for closing arguments in patent case involving single plaintiff and multiple unrelated defendants). 179. See Rosenberg, supra note 4, at 571. 180. See Taylor, supra note 7, at 676-79. De-aggregation has done little to help patent defendants get out of the Eastern District of Texas, as courts have relied on the pending litigation in the same district against the previously aggregated defendant as a basis for denying transfer. See In re EMC Corp., 501 F. App'x 973, 976 (Fed. Cir. 2013). 1038 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 would have to be greater than the benefits defendants realize from aggregation’s economies of scale, which is unlikely to be true at least when the defenses are individually negative-value. De-aggregation is doctrinally viable for defendants. Under Rule 20, the primary tool for defendant aggregation, joinder is permitted when “any right to relief is asserted against [the defendants] jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence, or series of transactions and occurrences.”181 Although courts only require a “logical relationship” for events to be part of the same transaction or occurrence,182 they have narrowly defined from what events the “right to relief” arises, requiring that there be a “logical relationship” in the defendants’ activities that allegedly violate the legal duty.183 Even though the right to relief arguably arises out of each of the four elements of a prototypical legal claim—(1) a violation of (2) a legal duty that (3) causes (4) harm to the plaintiff—courts generally have held that a logical relationship in the events giving rise to the legal duty (e.g., the issuance of the patent)184 or the harm caused to the plaintiff (e.g., the stealing of the same broadcast signal without paying for the rights)185 is insufficient for joinder.186 This interpretation of Rule 20 favors joinder of multiple unrelated plaintiffs suing a single defendant, where it is more likely that the defendant’s alleged violation of the legal duty is the same or factually related for all plaintiffs (e.g., the same allegedly illegal practice or policy). By contrast, for a single plaintiff suing multiple unrelated defendants, the defendants’ alleged violations of the legal 181. FED. R. CIV. P. 20(a)(2)(A) (emphasis added). 182. Mosley v. Gen. Motors Corp., 497 F.2d 1330, 1333 (8th Cir. 1974); WRIGHT, MILLER & KANE, supra note 61, § 1653, at 409. 183. See, e.g., In re EMC Corp., 677 F.3d 1351, 1358 (Fed. Cir. 2012) (requiring that “the defendants’ allegedly infringing acts” share operative facts to satisfy logical relationship test); Nassau Cnty. Ass’n of Ins. Agents, v. Aetna Life & Cas. Co., 497 F.2d 1151, 1154 (2d Cir. 1974) (finding no logical relationship because defendants’ allegedly wrongful actions were “separate and unrelated”). 184. See, e.g., Androphy v. Smith & Nephew, Inc., 31 F. Supp. 2d 620, 623 (N.D. Ill. 1998) (allegations of infringement of same patents “does not mean the claims against the two companies arise from a common transaction or occurrence”); see also Nassau Cnty., 497 F.2d at 1154 (“violations of the same statutory duty” are not enough to permit joinder (quoting Kenvin v. Newburger, Loeb & Co., 37 F.R.D. 473, 475 (S.D.N.Y. 1965))). 185. McFarland, supra note 55, at 268-69; see also Colt Def. LLC v. Heckler & Koch Def., Inc., No. 2:04CV258, 2004 U.S. Dist. LEXIS 28690, at *12 (E.D. Va. Oct. 22, 2004) (rejecting argument that transaction or occurrence requirement was satisfied because both defendants were “attempting to commit ‘genericide’ on Colt’s M4 trademark”). 186. Consolidation under Rule 42(a) and the multi-district litigation statute only require a common question, but courts tend to require a degree of similarity approaching what is required of permissive joinder. See supra Part III.A. In fact, when Congress prohibited joinder of similarly situated patent defendants, it also prohibited consolidation for trial even though such claims certainly possess the single common question required by the plain language of Rule 42(a). See 35 U.S.C. § 299(a) (Supp. V 2011). 2014] AGGREGATING DEFENDANTS 1039 duty are unlikely to be factually related, even if similar (e.g., developing and selling different products alleged to infringe the same patent). D. Cognitive Limitations Cost and substantive explanations only partially explain defendants’ widespread resistance to being aggregated. Since defendants should realize significant economies of scale from being aggregated and, in some cases, lack economic or strategic reasons to oppose collective resolution, perhaps defendants’ opposition to being aggregated is not fully motivated by rational concerns. Information problems may exist, with defendants and their counsel unaware of the benefits of being aggregated (given that defendant aggregation is rare and novel compared to plaintiff aggregation) or failing to adequately distinguish between plaintiff aggregation (which is generally against defendants’ interests) and defendant aggregation (which often aligns with defendants’ interests). Alternatively, some of the resistance to defendant aggregation may result from cognitive biases—biases and aversions that can lead to inaccurate perceptions of what is and is not in defendants’ interest.187 There is good reason to think that cognitive biases are part of the explanation, as the resistance to defendant aggregation has been vehement even though the economic and strategic arguments are, at best, ambiguous. Anecdotal evidence points to three relevant cognitive limitations: bias against forced groups, self-serving biases, and loss aversion. 1. Involuntary Groups Research in a variety of fields indicates that, compared to individuals, groups perform better, make better decisions, and are better problem-solvers.188 Admittedly, aggregated plaintiffs generally choose their litigation group,189 whereas similarly situated defendants 187. Christine Jolls, Cass R. Sunstein & Richard H. Thaler, A Behavioral Approach to Law and Economics, in BEHAVIORAL LAW AND ECONOMICS 13, 14-15 (Cass R. Sunstein ed., 2000); Cass R. Sunstein, Introduction to BEHAVIORAL LAW AND ECONOMICS 1, 3-5 (Cass R. Sunstein ed., 2000) [hereinafter Sunstein, Introduction]. 188. See Martin Kocher et al., Individual or Team Decision-Making—Causes and Consequences of Self-Selection, 56 GAMES AND ECON. BEHAV. 259, 259-60, 268 (2006). See generally CASS R. SUNSTEIN, INFOTOPIA: HOW MANY MINDS PRODUCE KNOWLEDGE (2006) (discussing how aggregating knowledge and perspectives can produce more accurate information and decisions). 189. See Freer, supra note 66, at 823-24. Joinder by definition requires a voluntary choice by plaintiffs. Id. Common-question class actions include an opt-out mechanism, while other types of class actions normally track groups that pre-date litigation. See Elizabeth Chamblee Burch, Aggregation, Community, and the Line Between, 58 U. KAN. L. REV. 889, 890-92 (2010) (describing, though questioning, reliance on pre-existing groups). Consolidation via Rule 42(a) or multi-district litigation can be initiated by the court sua sponte or on a defendant’s motion, but plaintiffs are more likely to initiate these procedures. See 1040 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 normally are forced to litigate together by the plaintiff with no ability to avoid group litigation if the requisite commonality in the claims is present.190 Yet, research demonstrates that self-selection of groups is not a prerequisite for successful group performance and involuntarily selected groups are as capable of successful and cohesive performance as voluntarily selected groups.191 Thus, a rational defendant would seem to prefer litigating as part of a defendant group, rather than individually. Despite these benefits of even involuntary groups, people are often biased against working in forced groups, resisting participation, expressing skepticism of the group’s objectives, showing distrust of fellow group members, being less cooperative, and being worse at resolving conflicts.192 These biases against forced groupings are exacerbated when, as with aggregated defendants, the group is chosen by an adversary, not a neutral. “Reactive devaluation” suggests that “proposals made by adversaries will be valued lower than identical proposals made by a neutral party or a member of one’s own group”193 as a result of zero-sum or fixed-pie bias (i.e., the assumption that a gain for the opponent equals a loss for self).194 To overcome initial biases and perform effectively, an involuntary group often requires a collective goal that generates a task-based cohesion.195 Aggregated defendants lack an inherently collective goal, as each defendant’s goal is to defeat the plaintiff’s claim with whatever combination of individual and common defenses is best for that Olson, supra note 66, at 360-63; Notice of Hearing Session, (J.M.P.L. July 25, 2013) (MDL No. 875), available at http://www.jpml.uscourts.gov/sites/jpml/files/Hearing_Order-7-25-13.pdf (listing plaintiff as moving party for multi-district proceedings in twelve of sixteen matters). 190. See Freer, supra note 66, at 823-26; Parchomovsky & Stein, supra note 23, at 1522. 191. See Dwight R. Norris & Robert E. Niebuhr, Group Variables and Gaming Success, 11 SIMULATION & GAMES 301, 306-09 (1980). 192. See, e.g., Ronald Rooney & Michael Chovanec, Involuntary Groups, in HANDBOOK OF SOCIAL WORK WITH GROUPS 212, 215-16 (Charles D. Garvin et al. eds., 2004) (involuntary psychotherapy groups); Work with Involuntary Groups, in STRATEGIES FOR WORK WITH INVOLUNTARY CLIENTS 244, 246, 256 (Ronald H. Rooney ed., 2d ed. 2009) (involuntary psychotherapy groups); Donald R. Bacon et al., Lessons from the Best and Worst Student Team Experiences: How a Teacher Can Make the Difference, 23 J. MGMT. EDUC. 467, 468, 482 (1999) (management/business education); Kenneth J. Chapman et al., Can’t We Pick Our Own Groups? The Influence of Group Selection Method on Group Dynamics and Outcomes, 30 J. MGMT. EDUC. 557, 565 (2006) (management/business education); Paul Miesing & John F. Preble, Group Processes and Performance in a Complex Business Simulation, 16 SMALL GROUP BEHAV. 325, 334-36 (1985) (management/business education). 193. Maurits Barendrecht & Berend R. de Vries, Fitting the Forum to the Fuss with Sticky Defaults: Failure in the Market for Dispute Resolution Services?, 7 CARDOZO J. CONFLICT RESOL. 83, 96-97 (2005). 194. See Robert S. Adler, Flawed Thinking: Addressing Decision Biases in Negotiation, 20 OHIO ST. J. ON DISP. RESOL. 683, 740-42 (2005). 195. Norris & Niebuhr, supra note 191, at 306-09. 2014] AGGREGATING DEFENDANTS 1041 defendant, regardless of the outcome for the rest of the group.196 In fact, aggregated defendants that are competitors have an incentive to favor individual defenses over class or general defenses exactly because they can prevail without benefitting their competitors.197 Anecdotal evidence supports the intuition that biases against involuntary groups create resistance to defendant aggregation. Defendants seeking de-aggregation have argued “that it is inherently unfair to join separate defendants in the same proceeding when they are competitors,”198 that is, to force a group where none would otherwise exist. Similarly, even though Rule 20 focuses on the relationship of the claims, arguments often focus on the lack of relationship or existence of competition among the defendants, that is, the lack of a preexisting group, even when the claims have common roots.199 2. Self-Serving Bias Aside from, or perhaps in conjunction with, biases against forced groupings, “[p]eople tend to make judgments about themselves, their abilities, and their beliefs that are ‘egocentric’ or ‘self-serving.’ ”200 This bias can manifest itself in several ways, including “a tendency for people to see themselves as having a greater than average share of some desirable quality” or “skewed predictions; that which is desired is thought more likely to occur than that which is undesired.”201 Applied to the litigation context, self-serving bias suggests that “litigants, their lawyers, and other stakeholders might overestimate their own abilities, the quality of their advocacy, and the relative merits of the positions they are advocating.”202 In the litigation context, egocentrism is most commonly applied to explain settlement failures,203 but it also suggests that each defendant will over-value the strength of its own defense and each defense 196. See Ford, supra note 156, at 93-112; see also Parchomovsky & Stein, supra note 23, at 1483 (categorizing defenses into general, class, and individual). 197. See Ford, supra note 156, at 109-12. 198. Sprint Commc’ns Co. v. Theglobe.com, Inc., 233 F.R.D. 615, 617 (D. Kan. 2006) (emphasis added). 199. See, e.g., Spread Spectrum Screening, LLC v. Eastman Kodak Co., No. 10 C 1101, 2010 U.S. Dist. LEXIS 90549, at *6 (N.D. Ill. Sept. 1, 2010) (noting alleged common roots between each defendant’s accused product, but emphasizing that “Kodak and Heidelberg are business competitors of one another” in rejecting joinder); Pergo, Inc. v. Alloc, Inc., 262 F. Supp. 2d 122, 128 (S.D.N.Y. 2003). 200. Chris Guthrie & Jeffrey J. Rachlinski, Insurers, Illusions of Judgment & Litigation, 59 VAND. L. REV. 2017, 2042 (2006). 201. Ward Farnsworth, The Legal Regulation of Self-Serving Bias, 37 U.C. DAVIS L. REV. 567, 569-70 (2003). 202. Guthrie & Rachlinski, supra note 200, at 2044. 203. Linda Babcock et al., Creating Convergence: Debiasing Biased Litigants, 22 LAW & SOC. INQUIRY 913, 922-23 (1997). 1042 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 attorney will over-value her own abilities and strategies. This has two important consequences for defendant aggregation. First, even absent a rational reason to assume a stronger defense than codefendants, an egocentric defendant will perceive aggregation as detrimentally mixing its “stronger” position with the “weaker” positions of the co-defendants. Second, if each defendant (and defense attorney) is overly confident in her own strategy, compromise will be more difficult when coordinated action is required, leading to conflict and increased coordination costs. Similarly, an egocentric defense attorney will be more likely to duplicate efforts (e.g., ask her own questions at depositions, revise every joint brief, etc.) rather than divide labor and trust the work of other defense lawyers perceived as of lower quality. This again increases coordination costs. Although plaintiffs and plaintiffs’ attorneys should be subject to similar selfserving biases, contingent fee arrangements necessitate the division of labor and reduction of coordination costs to maximize fees. Plaintiffs’ attorneys’ economic incentives thus mitigate egocentrism. Anecdotal evidence again supports the role of egocentrism in multi-defendant cases. Practitioners report that managing aggregated defendants in patent litigation “can sometimes be like herding cats, with each defendant wanting to go in its own direction. Clients and their counsel may have differing strategies, and it can be necessary to remind co-defendants that healthy compromise may be necessary to get everyone rowing in the same direction.”204 3. Loss Aversion A common reaction to aggregation of similarly situated defendants is that the problems created by collective resolution are worse for aggregated defendants, who face a potential judgment against them, than for aggregated plaintiffs, who only seek to obtain new benefits.205 This reaction reflects loss aversion; that is, despite being economically equivalent, people “are more displeased with losses than they are pleased with equivalent gains – roughly [sic] speaking, twice as displeased.”206 As a result, defendants will care more about paying $100 in damages than plaintiffs will care about recovering $100 in damages. Of course, loss aversion does not directly explain resistance to defendant aggregation; if aggregation helps defendants, a loss-averse defendant should strongly favor it. But loss aversion does seem rele204. Baghdassarian & Frankel, supra note 151. 205. Cf. Phillips Petroleum Co. v. Shutts, 472 U.S. 797, 810-11 (1985) (suggesting that due process protections are greater for defendants than plaintiffs because “an adverse judgment typically [will not] bind an absent plaintiff for any damages” even though it will “extinguish any of the plaintiff's claims which were litigated”). 206. Sunstein, Introduction, supra note 187, at 5. 2014] AGGREGATING DEFENDANTS 1043 vant in two ways. First, defendants are more likely to overvalue the potential problems with aggregation than are plaintiffs because they are more concerned about their potential loss than plaintiffs are about their potential gain. Second, the status quo is normally the reference point for determining whether something is a gain or loss.207 The individual lawsuit is the status quo for all procedural rules,208 particularly for the relatively uncommon and novel aggregation of similarly situated defendants. Thus, defendants are likely to overvalue the “losses” they realize from being aggregated (as compared to the individual lawsuit) and undervalue the gains. E. Summary and the Role of Selection Effects The justifications for defendants’ opposition to aggregation of similarly situated defendants fall on a spectrum. At one end, collective resolution is clearly against defendants’ interests when the plaintiff’s claim is so small that it could not be profitably brought individually, such as in the BitTorrent copyright cases. Without aggregation, defendants would never be sued. At the other end, defendants have no economic or strategic reasons to oppose being aggregated when there are asymmetric stakes, such that the plaintiff’s claim against each defendant would be individually viable but each defendant’s cost of individual defense would be greater than its expected liability. These asymmetric stakes can arise, first, because the plaintiff has a cost advantage due to the lesser amount of discoverable information in its possession or its ability to spread costs across multiple individual cases. This is often the case with patent trolls.209 Alternatively, asymmetric stakes exist when the plaintiff receives some additional benefit from the litigation beyond the damages paid by the defendant, such as the deterrence sought by the RIAA and DirecTV plaintiffs. A rational defendant in these circumstances would default or settle and is no worse off from aggregation regardless of any strategic consequences. To the contrary, these defendants are better off because the economies of scale that aggregation offers increase the chances of a positive-value defense. Thus, cognitive biases are the only possible explanation for resistance to defendant aggregation when there are asymmetric stakes. Between these two extremes lie cases where there is enough at stake to justify the plaintiff in bringing litigation individually and 207. Id. at 6. 208. See David Marcus, From “Cases” to “Litigation” to “Contract”: A Comment on Stability in Civil Procedure, 56 ST. LOUIS U. L.J. 1231, 1232 (2012). 209. See Coffee, supra note 145, at 899; see also In re Genentech, Inc., 566 F.3d 1338, 1345 (Fed. Cir. 2009) (noting that patent defendants generally have more discoverable information than patentees). 1044 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 each defendant to defend individually, as is true for most patent cases, even those brought by so-called trolls. In these cases, objecting to being aggregated with similarly situated defendants may or may not be rational for a defendant, depending on the fact-specific question of whether the strategic benefits of, for example, asymmetric preclusion or avoiding jury confusion outweigh the economies of scale of a collective defense. Part III.C suggests that the strategic considerations often will not outweigh the economies of scale aggregation and therefore defendants opposing aggregation in these cases often will be acting irrationally. Perhaps selection effects provide a simple explanation for why defendants oppose being aggregated. The plaintiff generally controls whether or not to aggregate defendants,210 and it is reasonable to think that aggregation only occurs when it is in the plaintiff’s selfinterest and, presumably, against the defendants’ self-interest. Defendants’ consistent resistance to being aggregated thus may result from selection effects—they are only aggregated in those cases where it is detrimental to their interests. The limited cases in which the plaintiff aggregates defendants even when it is beneficial to defendants may simply go unnoticed because no one objects to collective resolution. Although perfectly plausible, there are three reasons to doubt the simplicity of this explanation. First, defendants appear to oppose aggregation even when it is not a self-interested choice by the plaintiff. Defendants have some mechanisms to seek aggregation even if the plaintiff chooses individual litigation, yet rarely use them.211 For example, in the RIAA and DirecTV cases where the plaintiff proceeded individually, the defendants did not request consolidation or multi-district litigation. Second, aggregated defendants have objected to collective resolution even in the category of cases in which they should favor it, that is, where a plaintiff with a positive-value claim sues a defendant with a negative-value defense. For example, patent defendants pushed for and obtained a blanket prohibition on joinder of similarly situated defendants, even in the many patent troll cases where a cost-differential makes the patentee’s claim greater than its litigation costs but less than the defendant’s cost of defense. Similarly, the RIAA and DirecTV 210. See Freer, supra note 66, at 823-26; Parchomovsky & Stein, supra note 23, at 1522. 211. Defendants appear to be able to request defendant class treatment, yet virtually never do so. See Defendant Class Actions, supra note 20, at 630 n.3. Defendants also can seek permissive intervention in similarly situated defendants’ cases, but never do so. See Haley, supra note 162, at 334. Nor have similarly situated defendants made significant use of opportunities to aggregate themselves via Rule 42(a) or multi-district consolidation. See Olson, supra note 66, at 360-63; see also Notice of Hearing Session, (J.M.P.L. July 25, 2013) (MDL No. 875), available at http://www.jpml.uscourts.gov/sites/jpml/files/Hearing_Order-725-13.pdf (listing plaintiff as moving party for multi-district proceedings in twelve of sixteen matters). 2014] AGGREGATING DEFENDANTS 1045 defendants repeatedly opposed being aggregated despite their negative-value defenses and the likely positive-value claims. Third, just because plaintiffs choose aggregation does not mean that it is against the defendants’ interest. Multiple lawsuits are more time-consuming and bothersome to the plaintiff than a single suit, regardless of the strategic benefits.212 Moreover, the plaintiff may have capital constraints that necessitate the immediate savings from a collective lawsuit even if the long-term benefits favor defendants, or the plaintiff may have agency problems if its lawyer realizes benefits from aggregating defendants that are not passed on to the plaintiff (e.g., less work in a contingency fee arrangement). Finally, aggregation is not necessarily zero-sum but instead may reduce the transaction costs for both parties or offer both the plaintiff and defendants benefits that are not mutually exclusive. For example, a plaintiff suing multiple defendants internalizes the entire risk from asymmetric preclusion, whereas each defendant only internalizes a part of the benefit, making elimination of asymmetric preclusion a greater gain for the plaintiff than loss for each defendant. Thus, both the plaintiff (from eliminating asymmetric preclusion) and the defendants (from economies of scale) could be better off from defendant aggregation. IV. DEFENDANT AGGREGATION FROM THE SYSTEMIC PERSPECTIVE Part III identified several potential problems with defendant aggregation, finding them more limited or weaker than may be initially thought. But Part III focused only on whether defendant aggregation was problematic for defendants. That defendant aggregation may be bad for defendants in some circumstances tells us little about whether it is socially optimal. To the contrary, it may be socially optimal exactly because it is against defendants’ interest, for example, by increasing the chances that wrongful conduct will be remedied. From a societal or systemic perspective, there are two key questions. The first is the economic question of whether aggregating similarly situated defendants makes litigation more efficient or more costly.213 The second is the substantive question of whether defendant aggregation promotes the substantive remedial scheme by increasing the chances that wrongdoers are found liable and innocent parties escape liability or whether defendant aggregation distorts the substantive remedial scheme by permitting wrongdoers to escape liability or by imposing liability on innocent actors.214 212. See Freer, supra note 66, at 824 (arguing that plaintiffs are unlikely to omit defendants). 213. See Rosenberg, supra note 4, at 562-65. 214. See Nagareda, Discontents, supra note 134, at 1874-78. Common-question plaintiff class actions have been accused of distorting substantive law by increasing the costs of 1046 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 As discussed earlier, defendant aggregation is socially optimal from a theoretical perspective, as it eliminates duplicative litigation, promotes deterrence by permitting negative-value claims and defenses to be brought, and encourages resolution based on the merits, not costs.215 Yet, in practice, courts, policymakers, and commentators have been highly critical of efforts to aggregate similarly situated defendants. This Part considers possible justifications for this systemic resistance, finding them insufficient to reject defendant aggregation wholesale but suggestive of the proper procedures for aggregating similarly situated defendants. The first three Sections consider whether systemic opposition to defendant aggregation is warranted based on its potential negative consequences for defendants, with Section A addressing the economic consequences for defendants, Section B the substantive consequences for defendants, and Section C the possibility of capture by defendant interests. Section D considers, and rejects, the possibility that systemic resistance to defendant aggregation is warranted based on negative consequences for judges or the judicial system. A. Cost-Differentials, Weak Claims, and Unsympathetic Plaintiffs Defendants sometimes have sound economic reasons to resist being aggregated, despite its theoretical economies of scale, because aggregation offers cost-savings to plaintiffs that allow litigation that otherwise would not be brought or accentuates pro-plaintiff costdifferentials by imposing coordination costs on defendants.216 However, the fact that aggregating defendants makes some otherwise negative-value claims viable is a reason for the judicial system to embrace defendant aggregation, not resist it, as this promotes optimal deterrence and secures faithful implementation of the substantive remedial regime.217 Likewise, aggregated defendants’ potentially high coordination costs are largely a result of defense attorneys’ fee structure,218 and systemic resistance is not warranted simply to preserve the fees of defense attorneys, countenance inefficient lawyer-client arrangements, or stifle innovation in fee arrangements. However, courts and policymakers may be concerned that the additional litigation and cost-differentials created by defendant aggregation encourage strike suits, that is, non-meritorious claims that are defense or increasing the risks of litigation through the massive potential liability. See Resnik, supra note 24, at 16. 215. See supra Part III.C. 216. See supra Parts IV.A-B. 217. See supra Part III.C. 218. See supra Part IV.B. 2014] AGGREGATING DEFENDANTS 1047 settled for less than the cost of defense.219 For example, one district court cited a BitTorrent plaintiff’s prior “abusive litigation practices,” “coercive settlements,” and “thus-far-unsubstantiated and perhaps erroneous allegation”220 in rejecting defendant joinder, while Congress relied on “abusive” litigation practices by patent assertion entities to justify the patent anti-joinder provision.221 De-aggregation and re-filing may be seen as a way to eliminate individually negativevalue strike suits and make positive-value strike suits less profitable. The Supreme Court recently cautioned against allowing merits questions to drive the aggregation decision.222 Addressing strike suits through de-aggregation has spillover effects, as it creates doctrine— and in the case of patent law, statutory provisions—hostile to defendant aggregation generally, foreclosing meritorious negative-value suits that promote the substantive remedial scheme and optimal deterrence. Courts have more direct means that are better tailored to addressing weak claims and strike suits, such as dismissal for failure to state a claim upon which relief can be granted,223 sanctions for harassing or frivolous litigation,224 and review of the merits before entering a default judgment.225 More troubling, courts’ concern with the multi-defendant suits may be that they are undesirable as a matter of policy, not that they lack legal merit.226 Multi-defendant cases have often involved unsym219. Next Phase Distrib., Inc. v. Does 1–27, 284 F.R.D. 165, 170-71 (S.D.N.Y. 2012) (“[T]he Court recognizes that joining 27 defendants, a substantial number of whom may have no liability in this case, in a copyright infringement case when the copyright itself might be deemed invalid, could prove to be a costly and futile exercise for Next Phase and the Court, and a damaging an [sic] unnecessary ordeal for the John Does.”); Taylor, supra note 7, at 674-75 (noting concern with strike suits in multi-defendant cases). 220. Digital Sins, Inc. v. Does 1–245, No. 11 Civ. 8170(CM), 2012 WL 1744838, at *3-4 (S.D.N.Y. May 15, 2012). 221. Taylor, supra note 7, at 702. 222. See Amgen Inc. v. Conn. Ret. Plans & Trust Funds, 133 S. Ct. 1184, 1194-95 (2013) (“Rule 23 grants courts no license to engage in free-ranging merits inquiries at the certification stage. Merits questions may be considered to the extent—but only to the extent—that they are relevant to determining whether the Rule 23 prerequisites for class certification are satisfied.”). 223. FED. R. CIV. P. 12(b)(6); see also Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (describing what is needed for a complaint to survive a motion to dismiss for failure to state a claim). 224. FED. R. CIV. P. 11(b)(2). 225. In re DIRECTV, Inc., No. C–02–5912–JW, 2004 WL 2645971, at *7-12 (N.D. Cal. July 26, 2004). 226. See Ingenuity 13 LLC v. Doe, No. 2:12–cv–8333–ODW (JCx), 2013 WL 1898633, at *1 (C.D. Cal. May 6, 2013) (noting that BitTorrent plaintiffs “outmaneuvered the legal system” by “discover[ing] the nexus of antiquated copyright laws, paralyzing social stigma, and unaffordable defense costs” (emphasis added)); DIRECTV, 2004 WL 2645971, at *7-12 (finding that most of DirecTV’s claims had sufficient legal merit to warrant a default judgment); Karunaratne, supra note 14, at 303 (noting that file-sharing plaintiffs “generally have legitimate substantive grounds for their allegations of copyright infringement” but still suggesting need to make litigation less profitable for them). 1048 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 pathetic plaintiffs: patent trolls;227 the “porno-trolling” BitTorrent plaintiffs accused of fraud, extortion, and exploiting antiquated copyright laws and social stigma;228 and large corporate interests like DirecTV and the RIAA suing individuals or small businesses.229 Many today view: patents as too prevalent or too broad;230 copyright as a poor fit for the internet;231 and large corporate interests suing financially limited individuals as not a proper use of judicial resources.232 Using de-aggregation as a de facto reform of substantive law is inconsistent with the ideal that “the format for the resolution of civil disputes . . . should not alter substantive law.”233 Of course, it would not be the first time that “[t]he affording or withholding of aggregate treatment . . . operates as a backdoor vehicle to restructure the remedial scheme in applicable substantive law.”234 However, judicial nullification of substantive law via de-aggregation hinders the development of substantive law. Legislators who know judges will use procedural tools to avoid implementation of substantive law when it seems the most unfair or antiquated will have little incentive to undertake efforts to repeal or amend the law. For example, to the extent that the patent anti-joinder provision decreases litigation by patent assertion entities, it could relieve some of the pressure on Congress or the Federal Circuit to adjust substantive patent law doctrines that create broad patents, even though the problem of broad patents is not limited to multi-defendant cases or patent assertion entities. B. Substantive Effects, Fairness, Autonomy, and Due Process Aside from its effects on litigation costs, defendants’ resistance to being aggregated may be motivated by non-economic concerns. Three of defendants’ possible concerns are clearly inapplicable from the systemic perspective. Asymmetric preclusion, though potentially beneficial to defendants, is generally seen as undesirable from a systemic perspective because it encourages gamesmanship and duplicative 227. See Bryant, supra note 23, at 690-94. 228. See Ingenuity, 2013 WL 1898633, at *1. 229. See supra Part III.D.2-3. 230. See, e.g., Charles Duhigg & Steve Lohr, The Patent, Used as a Sword, N.Y. TIMES (Oct. 7, 2012), http://www.nytimes.com/2012/10/08/technology/patent-wars-among-tech-gia nts-can-stifle-competition.html?pagewanted=all&_r=0. 231. See, e.g., Jessica Litman, Real Copyright Reform, 96 IOWA L. REV. 1, 1 (2010). 232. See, e.g., Opderbeck, supra note 123, at 1727. 233. Nagareda, Discontents, supra note 134, at 1874-78. 234. Id. at 1877-78. Professor Nagareda argues “that aggregate procedure is under constant pressure—sometimes from plaintiffs and sometimes from defendants—to serve as the vehicle for reform of underlying substantive law through means other than actual reform legislation.” Id. at 1877. 2014] AGGREGATING DEFENDANTS 1049 litigation. Aggregation procedures are often justified exactly because they eliminate asymmetries in the preclusive effect of judgments.235 Similarly, doctrinal opportunities to de-aggregate may offer defendants some benefits and may explain some recent court decisions taking a narrow doctrinal focus,236 but they do not explain why the doctrine developed or has persisted in this manner, or why Congress has endorsed the doctrine. Permitting joinder based on overlap in the underlying legal duty or the harm caused to the plaintiff, not just the defendants’ allegedly unlawful conduct, is equally consistent with Rule 20’s plain language and policy goal, that is, promoting efficiency by avoiding separate litigation where there is a substantial evidentiary overlap.237 Finally, judges and policymakers are not immune from cognitive biases,238 but biases against participation in involuntary groups, selfserving biases, and loss aversion more directly explain why defendants would conclude aggregation is against their interests than why judges or policymakers would.239 On the other hand, the risk of judicial or jury confusion is a significant systemic concern and is often cited by courts in ordering deaggregation.240 Allowing a defendant to be found liable, or escape liability, simply because the jury or judge misattributed evidence or arguments against another defendant could distort the substantive remedial regime. Of course what this means for defendant aggregation depends on how strong and extensive this risk is and whether the other ways in which aggregation promotes the substantive remedial scheme are greater than the distortions created by confusion. In any event, courts’ severance orders, as well as Congress’s patent anti-joinder provision, are written broadly to bar aggregation of similarly situated defendants generally, even in the many situations in 235. See 18A CHARLES ALAN WRIGHT, ARTHUR R. MILLER & EDWARD H. COOPER, FEDERAL PRACTICE AND PROCEDURE § 4464, at 692-93 (2d ed. 2002); Developments in the Law, supra note 64, at 1394. 236. See Taylor, supra note 7, at 701. 237. See McFarland, supra note 55, at 268-70; see also Kane, supra note 66, at 1729-30, 1746 (explaining that the policy goal of joinder rules is to encourage efficient resolution of claims, especially when there is factual overlap). 238. See Chris Guthrie et al., Inside the Judicial Mind, 86 CORNELL L. REV. 777, 778 (2001). 239. See supra Part III.D.1–3. On the other hand, courts in other contexts have been skeptical of forced associations. See, e.g., Boy Scouts of Am. v. Dale, 530 U.S. 640, 648 (2000) (right of expressive organizations to exclude members); Jay M. Feinman, The Development of the Employment at Will Rule, 20 AM. J. LEGAL HIST. 118 (1976) (employment relationships). 240. See, e.g., Colt Def. LLC v. Heckler & Koch Def., Inc., No. 2:04CV258, 2004 U.S. Dist. LEXIS 28690, at *15 (E.D. Va. Oct. 22, 2004). 1050 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 which there is little risk of problematic confusion.241 Moreover, courts and policymakers have more tailored ways to address potential confusion short of de-aggregation, such as requiring that common questions predominate or satisfy some other threshold of similarity, asking whether individual issues are so prevalent as to make aggregate resolution unduly burdensome,242 or holding separate trials for individual issues.243 There also seems to be some sense that aggregating similarly situated defendants is unfair or contrary to due process. This largely reflects concerns about forced groupings, autonomy, or potential confusion that have already been addressed. There may be some additional belief that defendants facing liability are entitled to pursue whatever strategy they choose without having to compromise or be affected by defendants pursuing other strategies. This contention is doubtful. Even without aggregation, defendants will often be effectively bound by the strategic decisions of earlier defendants via principles like stare decisis, and it is equally unfair to require earlier defendants to bear the burden of defense alone.244 Moreover, extreme defendant autonomy creates externalities unfair to third parties by consuming judicial resources that otherwise could be spent on other cases or other socially beneficial activities. Admittedly, joint resolution of individual issues and judicial case management procedures that limit the ability of defendants to present defenses on individual issues may raise greater fairness or due process concerns, but this problem is with the aggregation procedures, not aggregation itself. C. Capture Even if the potential problems aggregation creates for defendants are not troubling from a systemic perspective, these concerns could still explain systemic resistance based on a “capture” theory. Public choice theory predicts that policy outcomes will favor concentrated groups with high individual stakes, such as organized corporate interests, because more diffuse interests, such as taxpayers, consumers, or citizens, generally suffer greater free-rider problems and are more difficult to mobilize.245 Because defendants are more likely to be 241. See Taylor, supra note 7, at 708-15 (describing situations where joinder is likely not permitted despite little risk of harmful confusion regarding patent infringement); supra Part IV.C.2. 242. See Erbsen, supra note 28, at 1002. 243. See, e.g., Jaime Dodge, Disaggregative Mechanisms: The New Frontier of MassClaims Resolution Without Class Actions, 63 EMORY L.J. (forthcoming 2014), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2243032. 244. See supra Part IV.C.1. 245. See Daniel A. Farber, Introduction to PUBLIC CHOICE AND PUBLIC LAW ix, x (Daniel A. Farber ed., 2007). 2014] AGGREGATING DEFENDANTS 1051 large corporate interests and plaintiffs to be individuals, public choice theory would predict that procedural rules are more likely to reflect the interests of defendants than plaintiffs. For example, Congress is widely seen as enacting the anti-joinder provision for patent cases at the behest of corporate interests, largely in the high technology area, which are frequently targeted by small patent assertion entities.246 However, in other prominent examples, concentrated corporate plaintiffs (e.g., DirecTV and RIAA) sought to aggregate diffuse individual defendants.247 Therefore, resistance to defendant aggregation is the opposite of public choice predictions. Moreover, the public choice literature debates to what extent the independent judiciary is subject to interest group pressures.248 Whatever the descriptive power of public choice theory for systemic opposition to defendant aggregation, it does not provide a normatively sound justification on which to deny aggregation of similarly situated defendants. However, it does provide an important insight. Overcoming systemic resistance to defendant aggregation and obtaining the efficiencies and other benefits it offers likely requires blunting defendants’ opposition to being aggregated. Thus, a procedural mechanism that mitigates the problems for defendants created by aggregation is more likely to be adopted and be effective in practice. D. Judicial Self-Interest A judge may resist aggregating defendants, not because it is against defendants’ interests, but because it is against the judge’s own self-interest.249 In granting de-aggregation, judges sometimes cite self-interested justifications that are weak from a disinterested perspective, such as the plaintiff’s circumvention of filing fees or the single credit the judge gets for purposes of caseload distribution.250 Judges also often cite concerns that multi-defendant cases will require too much effort to manage, contending, for example, that aggregation lacks “litigation economies” because each defendant “is 246. See Bryant, supra note 23, at 701-02 & n.102. 247. See supra Part II.D.2-3. 248. See William M. Landes & Richard A. Posner, The Independent Judiciary in an Interest-Group Perspective, 18 J.L. & ECON. 875 (1975), reprinted in PUBLIC CHOICE AND PUBLIC LAW 22, 22-24 (Daniel A. Farber ed., 2007). 249. See Richard A. Posner, What Do Judges and Justices Maximize? (The Same Thing Everybody Else Does), 3 SUP. CT. ECON. REV. 1 (1993). On the other hand, aggregation (whether of plaintiffs or defendants) may be in judges’ self-interest, since handling “big” cases is a way for a judge to enhance prestige and reputation. Id. at 13-15. 250. Order Severing Parties Due to Misjoinder and Dismissing All but the First Named Defendant at 2, Finisar Corp. v. Source Photonics, Inc., No. C 10–00032 WHA (N.D. Cal. dismissed May 5, 2010). 1052 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 likely to have some individual defense to assert.”251 Of course, the fact that there may be “some individual defense” says little about litigation economies without also considering the common questions that exist, the relative importance of common and individual questions in the particular case, and the ability to efficiently resolve individual questions through means short of de-aggregation, such as separate trials. Moreover, the concern that multi-defendant litigation is too complex to handle collectively reflects a narrow focus on the self-interest of the individual judge in the aggregated proceedings, rather than the interests of the judiciary as a whole. Individual litigation requires resolution of both individual and common issues for each defendant. By contrast, aggregate litigation allows resolution of common issues collectively for all defendants, even if it still necessitates some form of separate proceedings to resolve individual issues. Unless common issues are minor, greater systemic efficiency should result from aggregate proceedings (even if individual issues must be addressed separately) than individual proceedings (where both individual and common issues must be addressed separately). Managing individual issues in aggregate litigation may be more work for the individual judge, but it normally will be less work for judges as a whole than numerous individual cases. Thus, concerns about the complexity of aggregated litigation are unpersuasive from a systemic perspective. V. OVERCOMING RESISTANCE TO DEFENDANT AGGREGATION To this point, this Article has focused on the why (and the what) of defendant aggregation, explaining that aggregating defendants is socially desirable because it can improve efficiency, deterrence, and compensation. This Part turns to the how of defendant aggregation, identifying how defendant aggregation can be implemented while minimizing the problems it may create. Minimizing the problems from aggregation both enhances its social desirability and, more pragmatically, increases the chances that courts and policymakers will actually permit collective resolution of claims against similarly situated defendants. This Part does not purport to definitively resolve the proper procedural mechanism for aggregating defendants, nor does it purport to work out all of the logistical considerations. That will have to wait for further work, debate, and practical experience. Rather, this Part has three goals: to question the common assumption that defendant aggregation is synonymous with defendant class actions, to identify key 251. Digital Sins, Inc. v. Does 1–245, No. 11 Civ. 8170(CM), 2012 WL 1744838, at *3 (S.D.N.Y. May 15, 2002) (emphasis added); see also Next Phase Distribution, Inc. v. Does 1–27, 284 F.R.D. 165, 169-70 (S.D.N.Y. 2012); Colt Def. LLC v. Heckler & Koch Def., Inc., No. 2:04CV258, 2004 U.S. Dist. LEXIS 28690, at *15-16 (E.D. Va. Oct. 22, 2004). 2014] AGGREGATING DEFENDANTS 1053 principles to guide design of defendant aggregation procedures, and to sketch the initial outlines of a procedural mechanism that implements these principles: inter-district related case coordination. A. Principles of a Defendant Aggregation Procedure Regardless of the precise details, a procedural mechanism for aggregating similarly situated defendants should be nonrepresentative, subject to centralized (neutral) control and limited to common issues. These features will both optimize defendant aggregation and reduce the resistance from defendants, courts, and policymakers that stands as a practical obstacle to achieving the benefits of defendant aggregation. 1. Non-Representative Aggregation Commentators often assume that if defendants are to be aggregated, the procedure must track the most common form of plaintiff aggregation: the class action.252 This is probably unsurprising given the scholarly, political, and popular obsession with the class action. Yet, the possibilities for aggregation are far richer than just the representative class action and include procedures that permit collective resolution while offering much greater protection for individual interests than the class action, like joinder and multi-district litigation.253 Admittedly, the class defense is probably the mechanism for aggregating defendants with the lowest litigation costs, since treating the defendants as a unitary body with centralized representation maximizes cost-savings and cost-spreading, while minimizing coordination costs.254 But it also accentuates the substantive concerns with aggregating similarly situated defendants. Because it minimizes the individualized nature of the claims and defenses, it increases the chances of jury confusion and the possibility that evidence will be misattributed in a way that improperly imposes or excuses liability.255 Moreover, a class defense is a representative procedure that would impose liability on absent defendants based on the decisions and strategies pursued by other defendants and their chosen counsel. This raises autonomy concerns (to those who emphasize individual 252. See, e.g., Hamdani & Klement, supra note 4; Netto, supra note 21; Shen, supra note 22; Simpson & Perra, supra note 20; Matthew K.K. Sumida, Note, Defendant Class Actions and Patent Infringement Litigation, 58 UCLA L. REV. 843, 853-57 (2011). But see Parchomovsky & Stein, supra note 23, at 1513-15 (semi-voluntary joinder); Edward Hsieh, Note, Mandatory Joinder: An Indirect Method for Improving Patent Quality, 77 S. CAL. L. REV. 683 (2004). 253. See supra Part III.A. 254. See Hamdani & Klement, supra note 4, at 711-13. 255. See Erbsen, supra note 28, at 1009-14 (recognizing the problem of jury confusion in context of plaintiff class actions). 1054 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 autonomy)256 and is likely to generate practical opposition from defendants, courts, and policymakers. Of course, defendants could be permitted to opt out,257 minimizing autonomy concerns, but this would likely undermine the practical benefits of defendant aggregation. Many defendants likely would opt out because: the plaintiff’s claims would not be individually viable; other self-interested reasons exist; or self-serving biases make them unwilling to hand over control of their defense to the class representative.258 If opting out were not permitted, a mandatory class defense would likely run afoul of due process protections, at least if damages were at stake,259 as well as raise serious concerns about jury confusion, autonomy, and involuntary groupings. Thus, defendant aggregation is unlikely to be adopted by courts and policymakers in practice unless it uses a non-representative procedure—more akin to joinder, consolidation, or multi-district litigation—where the claim against each defendant remains separate and each defendant can retain its own lawyer and make its own decision regarding settlement. 2. Centralized Control Over Aggregation Professor Richard Freer has argued that aggregation generally should be controlled by a neutral judge, rather than the plaintiff, to minimize duplicative litigation, maximize efficiency, and avoid the whims of the plaintiff’s strategic interests.260 Centralized neutral control is a particularly sound principle for defendant aggregation. Plaintiff aggregation is generally in the interest of plaintiffs, and therefore the plaintiffs’ incentives will normally line up with the sys256. See, e.g., REDISH, supra note 48, at 169-73 (raising autonomy concerns in context of plaintiff class actions). 257. See FED. R. CIV. P. 23(c)(2)(B)(v). 258. Hamdani and Klement struggle with opt-out. They suggest that plaintiffs opt out only in low numbers and conclude that this will likely be true of defendants, overlooking the effects of loss aversion on defendants. See Hamdani & Klement, supra note 4, at 725. Although they suggest that defendants are unlikely to opt out because they will not want to identify themselves to the plaintiff, in the primary examples of defendant aggregation, the defendants were either already known to the plaintiff (patent and DirecTV litigation) or easily identifiable through other means (subpoenas to ISPs in the file-sharing litigation). See id. at 722. Moreover, because claims against similarly situated defendants normally involve money damages, the potential defendants would already need to be identified for purposes of notice if they are to be bound by the class judgment. See FED. R. CIV. P. 23(c)(2)(B); Phillips Petroleum Co. v. Shutts, 472 U.S. 797, 811-13 (1985). Ultimately, Hamdani and Klement acknowledge that “[t]he barriers to opting out pose a major challenge to the legitimacy of the class defense as the opt-out option is important in preserving due process rights.” Hamdani & Klement, supra note 4, at 722. 259. See Phillips Petroleum, 472 U.S. at 811-13; see also Netto, supra note 21, at 68 (proposing mandatory defendant class actions without considering opt -out and due process requirements). 260. See Freer, supra note 66, at 812-13. 2014] AGGREGATING DEFENDANTS 1055 temic interest in collective resolution.261 By contrast, who benefits from defendant aggregation is more complex and dependent on the facts of particular cases; therefore, the plaintiffs’ incentives will not always correspond to the systemic interest in collective resolution.262 Defendant aggregation at the plaintiff’s behest, such as permissive joinder, has provoked resistance from defendants, courts, and policymakers. The different stakeholders likely resist aggregation because the plaintiff is perceived as aggregating only when it benefits and when the defendants suffer from aggregation. Alternatively, resistance could stem from biases against forced groupings, reactive devaluation, and zero-sum biases.263 On the other hand, defendant aggregation at the defendants’ behest, as some have suggested, wound tend to be underutilized, as is true of the existing procedures defendants have to aggregate themselves.264 Self-interested concerns and self-serving biases would lead defendants to think they were better off litigating alone.265 Finally, if the aggregation decision were left to the individual presiding judge, the self-interest of that judge may cause him or her to reject aggregation even when beneficial to the judicial system as a whole. Thus, to best overcome obstacles to defendant aggregation, a centralized body representing the judicial system’s interests should be provided with information about related cases and then allowed to determine sua sponte whether to aggregate them.266 3. Issue-Only Aggregation Most aggregative devices presumptively apply to entire cases, not merely common issues. Permissive joinder applies to entire cases, though a court is permitted to order separate trials or take other precautions “to protect a party [from] embarrassment, delay, expense, or other prejudice . . . .”267 Similarly, the multi-district litigation statute generally provides for transfer of the entire “civil action[],” though the statute allows the panel to separate and remand “any claim, cross-claim, counter-claim, or third-party claim” to the original judge.268 At the same time, the Judicial Panel on Multi-District Litigation has concluded that it “does not have power to separate issues 261. See supra Part III.E. 262. See supra Part III.E. 263. See supra Part III. 264. See Freer, supra note 66, at 823-26; Parchomovsky & Stein, supra note 23, at 1522. 265. See supra Part III. 266. Cf. Freer, supra note 66, at 841-51 (proposing duty to notify court of potential duplicative litigation and court determination of whether to “package” litigation). 267. FED. R. CIV. P. 20(b). 268. 28 U.S.C. § 1407(a) (2012). 1056 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 in civil actions, assigning one or more to the transferee court and one or more to transferor courts.”269 Although Rule 23 appears to provide for class actions limited to specific common issues, with resolution of other issues left for subsequent individual cases, issue class actions remain an exception.270 Consolidation under Rule 42(a) is the only aggregative device that does not presumptively apply to the entire case.271 When entire cases are aggregated, a mix of common and individual issues will exist, creating concerns about fact-finder confusion, fairness and autonomy, and coordination costs. Moreover, the different portfolio of individual and common defenses possessed by each defendant can hinder the development of a shared-task focus to overcome bias against forced groupings and can create room for egocentric perceptions of the relative strengths of the different defendants’ positions. Limiting aggregation to common issues, with individual issues resolved separately outside of the group litigation, eliminates or minimizes these problems. B. Inter-District Related Case Coordination 1. Overview of Inter-District Coordination Multi-district litigation is a good starting point for a defendant aggregation procedure because it offers a non-representative structure, uses a centralized, neutral body to make the aggregation decision, and allows the exercise of nationwide jurisdiction and venue.272 However, multi-district litigation suffers from three shortcomings that undermine its effectiveness for aggregating similarly situated defendants. First, in practice, multi-district litigation only happens at the request of one of the parties, with only four percent of proceedings initiated via the panel’s authority to order aggregation sua sponte.273 Second, multi-district litigation normally applies to entire cases, 269. In re A.H. Robins Co., 610 F. Supp. 1099, 1101 (J.P.M.L. 1985); see also 15 CHARLES ALAN WRIGHT, ARTHUR R. MILLER, EDWARD H. COOPER & RICHARD D. FREER, FEDERAL PRACTICE AND PROCEDURE § 3862, at 451 (3d ed. 2013) (“The ability to subdivide a case is limited . . . . The Panel will not separate and transfer discrete issues for [multidistrict litigation] . . . .”). 270. See Jon Romberg, Half a Loaf is Predominant and Superior to None: Class Certification of Particular Issues Under Rule 23(c)(4)(A), 2002 UTAH L. REV. 249, 251-54, 266-67. But see Laura J. Hines, Challenging the Issue Class Action End-Run, 52 EMORY L.J. 709, 713-14, 763-64 (2003); see also Laura J. Hines, The Dangerous Allure of the Issue Class Action, 79 IND. L.J. 567, 568 (2004) (questioning permissibility and desirability of issue classes). 271. FED. R. CIV. P. 42(a)(1) (allowing the court to “join for hearing or trial any or all matters at issue in the actions”); 9A CHARLES ALAN WRIGHT & ARTHUR R. MILLER, FEDERAL PRACTICE AND PROCEDURE § 2382, at 9-10 (3d ed. 2008). 272. 28 U.S.C. § 1407(a), (c) (2012); see also In re FMC Corp. Patent Litig., 422 F. Supp. 1163, 1165 (J.P.M.L. 1976). 273. See § 1407(c)(i); Lee et al., supra note 16, at 4. 2014] AGGREGATING DEFENDANTS 1057 or at least claims, and therefore aggregates individual issues as well as common issues.274 Third, aggregation of cases or claims via multidistrict litigation is only for the purpose of pre-trial proceedings and does not allow ultimate resolution of common issues via trial.275 To overcome these shortcomings, the proposed inter-district coordination procedures are more akin to the related case procedures most district courts use for intra-district coordination, except applied across district lines. Most district courts require a notice of related cases to be filed with the complaint that identifies any other action previously filed or currently pending in the same district that, inter alia, involves the “determination of the same or substantially related or similar question[s] of law and fact” or “would entail substantial duplication of labor if heard by different judges.”276 In many districts, assignment or transfer of related cases to the same judge is automatic. For example, in the Southern District of California, the clerk is tasked with identifying cases that meet the definition of related cases, with identified cases automatically assigned (or reassigned) to the judge with the first-filed of the related actions.277 The procedures for resolution of these related cases vary depending on the district, the nature of the cases, and the degree of overlap. Sometimes cases are consolidated for all purposes, while other times they remain entirely separate with coordination simply allowing a single judge to master the issues involved and avoid inconsistent results. But, importantly for present purposes, it is common in intradistrict related cases for the common issues to be resolved collectively in a group proceeding and individual issues in separate individual proceedings, with consolidation or reassignment sometimes happening only for the limited purpose of resolving common issues. For example, multiple cases alleging infringement of the same patent pending in the same district have been reassigned to a single judge only to interpret the patent claims.278 Similarly, the Northern District of California assigned 200 DirecTV cases to a single judge only to resolve the propriety of joinder, determine whether certain statutory provisions allowed private rights of action, and establish the necessary showing under various statutes for default judgments.279 274. See supra Part V.A.3. 275. See § 1407(a); Lexecon Inc. v. Milberg Weiss Bershad Hynes & Lerach, 523 U.S. 26, 28 (1998). Common issues can be resolved via summary judgment in multi-district proceedings or tested via sample or “bellwether” trials. 276. C.D. CAL. L.R. 83-1.3.1.1; see also, e.g., S.D. CAL. L.R. 40.1(e)-(j). 277. S.D. CAL. L.R. 40.1(e)-(j). 278. See, e.g., Kohus v. Toys “R” Us, Inc., Nos. C-1-05-517, C-1-05-671, 2006 WL 1476209, at *1-2 (S.D. Ohio May 25, 2006). 279. In re DIRECTV, Inc., No. C-02-5912-JW, 2004 WL 2645971, at *1, *12 (N.D. Cal. July 26, 2004). 1058 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 In essence, the proposed inter-district coordination applies the tools developed for intra-district related case procedures—especially the use of automatic reassignment and reassignment for the limited purpose of (final) resolution of only common issues—to cases involving similarly situated defendants that reach across district boundaries. It also formalizes the standards and procedures for related case coordination, which in the intra-district context, often are ad hoc and subject to substantial judicial discretion, and therefore judicial self-interest. Although developed for the needs of defendant aggregation, interdistrict related case coordination may be useful for certain types of multi-plaintiff cases that share similarities with multi-defendant cases, including the presence of both significant individual and significant common issues and the inappropriateness of representative procedures. For example, mass tort cases, which fit these criteria and have faced obstacles to aggregation under existing procedures, may benefit from inter-district coordination. Indeed, aspects of interdistrict coordination echo the proposals from the American Law Institute’s Complex Litigation Project in the 1990s, which was largely focused on plaintiff aggregation.280 2. Mechanics of Inter-District Coordination The proposed inter-district coordination procedures would be initiated when the plaintiff filed a complaint (probably a form complaint) against each defendant in a chosen district court with jurisdiction and venue over that defendant. The plaintiff also would file a notice listing any “related cases” already pending or concurrently filed.281 Related cases could be defined generically to include, inter alia, cases with a common, or perhaps “significant,” question of fact or law.282 Substance-specific aggregation protocols, discussed in more detail below, also would be useful to provide more specific definitions or guidance as to what constitutes a related case in various substantive areas.283 To prevent serial litigation when it suited the plaintiff’s interest, incentives could be provided to name all defendants at once, such as a substantially discounted bulk rate filing fee, a penalty or moratorium for subsequently filing related cases, or even preclusion of related claims that were identifiable and could have been brought at the time of original filing.284 280. AM. LAW INST., COMPLEX LITIGATION PROJECT 1-4 (Proposed Final Draft 1993). 281. See, e.g., Notice of Designation of Related Civil Cases Pending (D.D.C.), available at https://www.dcd.uscourts.gov/dcd/sites/dcd/files/CO932-online.pdf. 282. See S.D. CAL. L.R. 40.1(f)-(g). 283. See D.D.C. L.R. 40.5(a) (providing different definitions of “related case[s]” for criminal, civil forfeiture, and civil cases). 284. Cf. Parchomovsky & Stein, supra note 23 (suggesting that procedural tools, like preclusion and restitution, can lead to more efficient defense-side outcomes). 2014] AGGREGATING DEFENDANTS 1059 The notice of related cases would be filed simultaneously with the chosen court and a centralized body—perhaps the Judicial Panel on Multidistrict Litigation (JPML). The centralized body would conduct a preliminary review to insure the cases actually qualify as related cases. If the definition of related cases is clearly specified, this task could be assigned to the equivalent of a clerk to reduce costs.285 The centralized body would then reassign the related cases to a single judge for the limited purpose of resolving common issues. Under existing multi-district litigation procedures, the choice of judge is at the discretion of the JPML and often is subject to briefing and a hearing.286 Because of its automatic application, inter-district coordination will involve many more cases than multi-district litigation, and it will be infeasible to litigate the identity of the coordinating judge in every case. To reduce transaction costs, the identity of the coordinating judge should be determined automatically287—perhaps by assigning the related cases to a judge in the district with the most related cases, a judge in the district that is geographically closest to the most defendants, a judge that has volunteered for coordinated cases either generally or in specific substantive areas, a judge that has passed some minimal screening for ability to handle complex litigation, or a judge with some combination of these factors. Once reassigned for coordination, the coordinating judge would develop a coordination plan specifying the common issues, the plan for discovery and resolution of the common issues, and the status of the individual cases. This coordination plan would involve input from the parties and probably a hearing, and the parties would also have the chance to seek de-aggregation on limited, specific grounds (e.g., although the same patent is involved, totally different claims are asserted against each defendant). The coordinating judge could stay proceedings in the individual cases pending outcome of the common issues, especially where the common issues could be dispositive of all cases (e.g., patent invalidity). In other circumstances, individual issues may be litigated simultaneously with the coordinated proceedings, such as when one patent has been asserted against many defendants but a second patent is asserted individually against just one defendant. Once the common issues have been resolved, the related cases would be returned to the individually chosen districts for reso285. See S.D. CAL. L.R. 40.1(g)-(h) (requiring clerk to identify related cases and prepare an order for judge’s signature). 286. See Margaret S. Williams & Tracey E. George, Who Will Manage Complex Civil Litigation? The Decision to Transfer and Consolidate Multidistrict Litigation, 10-11, 23-24 (July 1, 2010) (unpublished manuscript), available at http://ssrn.com/abstract=1633703. 287. Cf. S.D. CAL. L.R. 40.1(h)-(i) (assigning related cases to the judge with the “lownumbered” case). The low-number rule would not work for inter-district coordination because plaintiffs could consistently choose the most plaintiff-friendly districts simply by filing the first of the related cases in that district. 1060 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 lution of individual issues.288 Any common issues resolved in the coordinated proceedings would have law of the case or collateral estoppel effect in the individual proceedings.289 To reduce litigation costs, minimize disputes over the coordination plan, and constrain judicial variability and self-interest, presumptively binding guidelines could be used to specify what constitutes a common issue appropriate for coordinated resolution, what constitutes an individual issue not appropriate for coordinated resolution, in what circumstances to stay individual proceedings, how to structure discovery, and how to handle trials. Although trans-substantive guidelines would help, substance-specific protocols would allow greater specificity and detail and be preferable, at least for substantive areas that repeatedly produce multi-defendant cases (e.g., patent litigation or internet file-sharing).290 For example, under a patent-specific protocol, a related case could be defined as one alleging infringement of the same patent or perhaps patents that issued from a common application. The common issues would include interpretation of the patent (i.e., “claim construction”), whether the patent is invalid for failing to meet the statutory requirements,291 defenses related to the patentee’s conduct in the Patent Office (e.g., “inequitable conduct”), and maybe infringement issues in those cases where they are likely to be identical for each defendant.292 As for structure, the patent-specific protocol could provide for an early claim construction hearing to resolve the scope of the patent,293 then discovery limited to invalidity and inequitable conduct issues, and finally trial of invalidity and inequitable conduct. Because the common defenses are potentially case-dispositive and therefore can save the costs from discovery and trial on infringement, 288. Cf. In re DIRECTV, Inc., No. C-02-5912-JW, 2004 WL 2645971, at *12 (N.D. Cal. July 26, 2004) (referring cases back to originating judge after resolving certain common issues on a district-wide coordinated basis). 289. See Romberg, supra note 270, at 254 (similar suggestion for issue class actions). 290. Despite the trans-substantive nature of most procedural rules, see Paul D. Carrington, Making Rules to Dispose of Manifestly Unfounded Assertions: An Exorcism of the Bogy of Non-Trans-Substantive Rules of Civil Procedure, 137 U. PA. L. REV. 2067, 2067 (1989), substance-specific procedures are increasingly common in complex areas, including Patent Local Rules, see, e.g., N.D. CAL. PATENT L.R., available at http://www.cand. uscourts.gov/localrules/patent, guidelines from court advisory councils on discovery and case management, see Jason Rantanen, Model Order Addressing Numerosity of Claims and Prior Art [UPDATED], PATENTLYO (July 26, 2013), http://www.patentlyo.com/ patent/2013/07/model-order-addressing-numerosity-of-claims-and-prior-art.html, and the ad hoc guidelines on the showing required for a DirecTV default judgment created by the Northern District of California, see In re DIRECTV, Inc., 2004 WL 2645971, at *6-11. 291. Parchomovsky & Stein, supra note 23, at 1484-86 (classifying patent law defenses as individual or common). 292. See Taylor, supra note 7, at 717-19. 293. See, e.g., N.D. CAL. P ATENT L.R. 4 (setting procedures for early claim construction hearing). 2014] AGGREGATING DEFENDANTS 1061 damages, and other individual issues—individual proceedings generally should be stayed until after the common issues are resolved,294 or at least until claim construction is resolved.295 C. Potential Obstacles to Inter-District Coordination A benefit of inter-district coordination is that it is a hybrid of two well-established procedures (multi-district litigation and intra-district related case coordination) and therefore poses minimal implementation problems. This Section considers a few implementation obstacles. 1. Practical Obstacles: Free Riding Although common defenses are public goods and raise the possibility of free riding with or without aggregation,296 aggregation may accentuate the problem. In individual litigation, each defendant must expend money and effort to develop its defenses, including common defenses; if it does not, it loses.297 But aggregated defendants prevail when the group succeeds on a common defense, regardless of their contribution. Thus, in theory, each defendant’s incentive is to underinvest in the common defense, relying on other defendants to develop defenses that also allow the free-riding defendant to escape liability.298 Free riding poses fewer obstacles to aggregation of similarly situated plaintiffs because successful aggregated claims create a common pool of money from which to pay the lawyers, incentivizing lawyers to vigorously pursue the common cause.299 Aggregated defenses create no common fund, but rather require expenditures to avoid greater expenditures.300 To overcome the free-riding problem for aggregated defendants, Hamdani and Klement proposed one-way fee-shifting, 294. See Ford, supra note 156, at 119-22 (suggesting resolving invalidity first for substantive reasons). 295. Claim construction is the single most important event in patent cases and is often case-dispositive. See Greg Reilly, Judicial Capacities and Patent Claim Construction: An Ordinary Reader Standard, 20 MICH. TELECOMM. & TECH. L. REV. (forthcoming 2014) (manuscript at 24-25), available at https://papers.ssrn.com/sol3/papers.cfm?abstract_ id=2310026. 296. See supra Part IV.B. 297. An individual defendant may be able to free ride if it is sued after another defendant has prevailed on a common defense, see Parchomovsky & Stein, supra note 23, at 1518, or is part of a joint defense group sharing information and work product, see Erichson, supra note 20, at 401-08. Moreover, a rational defendant in individual litigation may focus on individual defenses to avoid creating a common good. See Ford, supra note 156, at 109-12. 298. See Hamdani & Klement, supra note 4, at 712. 299. See Judith Resnik, Money Matters: Judicial Market Interventions Creating Subsidies and Awarding Fees and Costs in Individual and Aggregate Litigation, 148 U. PA. L. REV. 2119, 2139-40 (2000). 300. See Hamdani & Klement, supra note 4, at 715. 1062 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 where a losing plaintiff would pay the defendants’ fees.301 However, most cases settle.302 A settlement for aggregated plaintiffs still creates a common fund to pay the lawyers, but a settlement for aggregated defendants neither creates a common fund nor results in a losing plaintiff. Hamdani and Klement would have the plaintiff pay fees when the defendants prevail or settle,303 even though the settlement could reflect the strength of the plaintiff’s case, not its weakness. This could deter plaintiffs from bringing meritorious claims or reduce settlements, increasing costs and congestion in the courts. Free riding may not pose as great an obstacle to inter-district coordination as may be first thought. Practitioners involved in multidefendant litigation, at least in higher stakes cases like patent litigation, suggest free riding is less of a problem than “over-riding,” that is, each defendant insisting on pursuing its preferred strategies and being involved in or taking the lead on every aspect of the litigation.304 The incentive for defense lawyers to over-ride is clear: it maximizes their billable hour fees. Over-riding may be rational for defendants themselves when aggregation occurs via non-representative procedures and each defendant can settle separately. If other defendants settle, a free-riding defendant would be left exposed to liability without having developed a defense. In fact, practitioners report “plaintiffs often offer the most favorable settlements to the defendants that are best prepared, to remove them from the case and focus on the more vulnerable parties.”305 Even if not perfectly rational, clients may permit over-riding because of monitoring deficiencies or the influence and self-interested advice of the lawyers. Finally, because of loss aversion, defendants will tend to pay more in defense than they rationally should, and because of self-serving bias, defendants will overvalue their own strategies and abilities (or the wisdom of their choice of counsel) and be unwilling to sacrifice their defense to perceived “weaker” defendants or lawyers. Even in lower stakes cases, like the DirecTV and internet filesharing cases, one or more defendants have been willing to take on 301. Id. at 715-17; see also Netto, supra note 21, at 112-16 (also supporting fee-shifting in part to motivate attorneys to present defenses instead of settling). 302. Jonathan D. Glater, Study Finds Settling Is Better than Going to Trial, N.Y. TIMES (Aug. 7, 2008), http://www.nytimes.com/2008/08/08/business/08law.html?_r=1& (“The vast majority of cases do settle — from 80 to 92 percent by some estimates . . . .”). 303. Hamdani & Klement, supra note 4, at 715-17. 304. See, e.g., Irene C. Warshauer et al., Methods to Effectively Manage Complex MultiParty Disputes, 14A ROCKY MTN. MIN. L. FOUND. (SPECIAL INST. ON RESOL. & AVOIDANCE OF DISPUTES) 3, 3-15, 20 (1984); Baghdassarian & Frankel, supra note 151. 305. Baghdassarian & Frankel, supra note 151; see, e.g., Warshauer et al., supra note 304, at 3-19. 2014] AGGREGATING DEFENDANTS 1063 common issues on behalf of all defendants.306 Aggregation probably makes it more likely that the common defense will be developed in low-stakes cases because it offers greater opportunities to fund defense lawyers than individual litigation. For example, aggregation may encourage involvement by public interest groups whose substantive interests line up with the defendants—such as the open-access movement in intellectual property cases—by lowering the required costs and effort and raising the stakes and prominence.307 Alternatively, defense lawyers could collect an inventory of cases, charging each defendant a small amount but creating a respectable war chest.308 For example, if a defense lawyer can sign up 100 clients for a flat fee of $1000,309 the $100,000 total should allow a better common defense than any defendant could put on in individual litigation. Finally, free riders in aggregate litigation do not make participating defendants worse off than in individual litigation, as participating defendants would likely litigate the same common issues at virtually the same cost without aggregation.310 To the extent that free riding is seen as unfair or creating under-investment in common defenses, mechanisms could be used to encourage or force all defendants to contribute where feasible.311 2. Statutory and Constitutional Obstacles Much of the proposed inter-district coordination procedure can be implemented under the JPML’s existing rulemaking authority,312 including the procedures for choosing a coordinating judge and the development of general and substance-specific protocols. However, inter-district coordination cannot be fully implemented without 306. See, e.g., Arista Records, LLC v. Does 1–11, No. 1:07–CV–2828, 2008 WL 4823160, at *1-2 (N.D. Ohio Nov. 3, 2008) (noting that Defendant Doe #9 had entered an appearance via counsel and filed a motion “to dismiss all Doe Defendants except Defendant Doe # 1” for improper joinder); In re DIRECTV, Inc., No. C-02-5912-JW, 2004 WL 2645971, at *1 (N.D. Cal. July 26, 2004) (noting that attorneys appeared on behalf of defendants at hearing on joinder and DirecTV’s required prima facie showing). 307. Cf. Hamdani & Klement, supra note 4, at 717-18 (noting that class defense mechanisms could provide additional funding for public interest organizations). 308. See DirecTV, Inc. v. Beecher, 296 F. Supp. 2d 937, 939 (S.D. Ind. 2004) (“Many of the defendants in the several cases in this court have banded together for a common defense.”). 309. People with minimal resources regularly pay $1000 or more to defend DUI charges. See, e.g., Lisa Ellis, What It Costs for a DUI Attorney, WHAT IT COSTS, http://business. whatitcosts.com/dui-attorney.htm (last visited July 25, 2014). 310. See Defendant Class Actions, supra note 20, at 648. Coordination costs are unlikely to be significant if other defendants are free riding. 311. See Ford, supra note 156155, at 123 (proposing accounting action for defendants who prevail on a common defense to recover from other potential defendants); Parchomovsky & Stein, supra note 23, at 1520-24. 312. See 28 U.S.C. § 1407(f) (2012) (“The panel may prescribe rules for the conduct of its business not inconsistent with Acts of Congress and the Federal Rules of Civil Procedure.”). 1064 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 amendments to the multi-district litigation statute to permit issueonly coordination since the JPML has interpreted the statute as limited to coordination of entire claims.313 Likewise, statutory amendments would be necessary to implement automatic coordination procedures, as the statute currently requires notice and a hearing before transfer,314 and to allow trial of common issues in the consolidated proceedings, since the statutory language and Supreme Court precedent require remand at the end of pre-trial proceedings.315 Inter-district coordination does not appear to raise any novel constitutional issues. Although the coordinating forum may not otherwise have personal jurisdiction and venue over all defendants, “Congress may, consistent with the due process clause, enact legislation authorizing the federal courts to exercise nationwide personal jurisdiction,” which it did in the multi-district litigation statute.316 Likewise, issue-only aggregation does not run afoul of the Seventh Amendment’s guarantee that “no fact tried by a jury, shall be otherwise re-examined in any Court of the United States . . . .”317 Common legal issues do not implicate the Seventh Amendment, and even for common issues subject to a jury trial, the Seventh Amendment only bars revisiting of the same issue, not simply an overlap in evidence presented to two juries.318 If common issues are properly defined by the coordinating judge and properly given preclusive effect in indi- 313. See supra Part V.A.3. 314. See § 1407(c). 315. See § 1407(a); Lexecon Inc. v. Milberg Weiss Bershad Hynes & Lerach, 523 U.S. 26, 40 (1998). 316. In re “Agent Orange” Prod. Liab. Litig. MDL No. 381, 818 F.2d 145, 163 (2d. Cir. 1987) (absent class members); see also In re FMC Corp. Patent Litig., 422 F. Supp. 1163, 1165 (J.P.M.L. 1976) (defendants). This is clearly true for cases subject to federal question jurisdiction. In these cases, the Due Process Clause of the Fifth Amendment applies and requires only minimum contacts with the United States as a whole. See 4 CHARLES ALAN WRIGHT & ARTHUR R. MILLER, FEDERAL PRACTICE AND PROCEDURE § 1068.1, at 597-602, 612 (3d ed. 2002). By contrast, in diversity cases, the Due Process Clause of the Fourteenth Amendment applies; allowing a federal, nationwide jurisdiction statute to trump the statespecific minimum contacts analysis required in state courts would seem to run afoul of the Erie Doctrine. Id. § 1068.1, at 592. Yet, personal jurisdiction has not proven an obstacle to multi-district litigation, even in diversity cases. See Agent Orange, 818 F.2d at 152, 163. For aggregated defendants, personal jurisdiction may prove more problematic in diversity cases because of the heightened due process concerns for defendants as compared to plaintiffs. See Phillips Petroleum Co. v. Shutts, 472 U.S. 797, 810-11 (1985). At the very least, personal jurisdiction issues are likely to receive more attention than they have received in multi-district litigation if inter-district related case coordination is used in diversity cases. 317. U.S. CONST. amend. VII. 318. See Romberg, supra note 270, at 324-25. For a detailed consideration of the Seventh Amendment issue in the context of issue class actions, see Patrick Woolley, Mass Tort Litigation and the Seventh Amendment Reexamination Clause, 83 IOWA L. REV. 499 (1998). 2014] AGGREGATING DEFENDANTS 1065 vidual litigation, there is no risk that the individual jury would reconsider issues resolved by the coordinated jury.319 VI. CONCLUSION This Article has explored the overlooked puzzle of defendant aggregation: the opposition of defendants, courts, and policymakers to aggregation of similarly situated defendants despite the theoretical benefits it offers courts and the judicial system. Defendants’ opposition is more easily explained, at least for some defendants and some types of cases. Yet, these explanations are weaker and less broadly applicable than may be commonly assumed. Systemic opposition likely results from some combination of improper merits or policy determinations, capture by defendant interests, and a narrow focus on a judge’s own self-interest rather than that of the judicial system as a whole. The need for aggregation of similarly situated defendants to date has largely arisen in technology cases—patent cases, internet file-sharing copyright litigation, and satellite television piracy—but is likely to spread to other areas in the coming years as a result of mass communications that increase the ability of dispersed people to injure a single plaintiff.320 Others have noted the parallels between the rise of mass communications and defendant aggregation in the 21st century and the rise of mass production and a national economy and plaintiff aggregation in the mid-20th century.321 Overlooked, however, is that the increased demand for plaintiff aggregation in the 1950s and 1960s sparked procedural innovation that resulted in new multi-district litigation procedures322 and substantially revised class action procedures.323 The modern demand for defendant aggregation similarly necessitates procedural innovation that will overcome the obstacles created by defendant and judicial self-interest and cognitive limitations. This Article takes a first step in that direction and proposes an inter-district related case coordination procedure. The debate going forward should be about how to better tailor a procedure for the needs of defendant aggregation, not whether, or how well, aggregation of similarly situated defendants fits into the boxes of existing procedures largely crafted for aggregating plaintiffs. 319. See Romberg, supra note 270, at 324-25 (reaching a similar conclusion in the context of issue class actions). 320. See Hamdani & Klement, supra note 4, at 741; Netto, supra note 21, at 61-62. 321. See Hamdani & Klement, supra note 4, at 741; Netto, supra note 21, at 61. 322. See Resnik, supra note 24, at 30-33 (describing the history of the 1968 enactment of the multi-district litigation statute). 323. See id. at 9-17 (describing the history of the 1966 revisions to class action procedures). 1066 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1011 IMPAIRED PHYSICIANS AND THE SCOPE OF INFORMED CONSENT: BALANCING PATIENT SAFETY WITH PHYSICIAN PRIVACY SARAH HASTON I. II. III. IV. V. VI. INTRODUCTION .................................................................................................. INFORMED CONSENT DOCTRINE ........................................................................ IMPAIRED PHYSICIANS ...................................................................................... IMPAIRED PHYSICIANS AND THE SCOPE OF INFORMED CONSENT ...................... DUTIES OF THE HOSPITAL: A CORPORATE NEGLIGENCE THEORY ..................... CONCLUSION ..................................................................................................... 1125 1127 1132 1134 1139 1144 I. INTRODUCTION A thirty-eight-year-old orthopedic surgeon comes home to his empty house following a typical ten-hour day at the hospital. Recently divorced and without children, he drops his keys at the front door and heads towards the living room with the take-out dinner he picked up on his way home. He turns on the news and pours himself a glass of red wine. Ever since his divorce, he has been drinking wine more frequently than he used to, perhaps to mask his loneliness. After his third or fourth glass of wine, he turns off the television, brushes his teeth, and goes to bed. At five o’clock in the morning, he awakes to his alarm clock and throws on his running shoes. After his usual five-mile run, he grabs a piece of toast and heads to the hospital. Today is just like any other day for the surgeon; at eleven o’clock, he reviews the chart of a patient scheduled for a total knee-replacement. The surgeon goes into the operating room to discuss with the patient, one more time, the risks and alternatives associated with this surgery, along with its potential benefits. He asks the patient whether she has any further questions before anesthesia is administered. After the patient signs the standard informed consent form and acknowledges that she wishes to proceed with the surgery, the orthopedic surgeon leaves the room to prepare for the procedure. Shortly after the knee-replacement surgery, the patient begins developing complications, ultimately requiring an additional surgery. Frustrated with the outcome of the original procedure, the patient chooses to have a different physician perform the second surgery. Despite all efforts during the second surgery, the patient loses full function of her leg. J.D. Candidate 2015, Florida State University College of Law. I would like to thank my parents, Laurie and Jim Haston, for their love and support throughout all of my educational endeavors. I would also like to thank the incredible faculty at the Florida State University College of Law for their support, feedback, and encouragement. 1126 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 The patient begins hearing rumors about the orthopedic surgeon’s recent, nasty divorce. She also sees him at local restaurants, sitting alone at the bar with a drink in front of him. After the patient calls some mutual friends of the surgeon’s ex-wife, she learns that the orthopedic surgeon has developed a drinking problem since his divorce. She decides to file a medical malpractice suit, alleging that the surgeon did not obtain her informed consent before the procedure because he failed to inform her of his alcoholism. Situations like the one described above present an important and undefined question to the medical field: whether a physician has a duty to inform his patient about his alcoholism, drug abuse, and/or mental illness (such as depression) in gaining a patient’s informed consent before a procedure.1 On one hand, we live in a country with a medical system that values patient autonomy.2 We believe a patient has the right to make her own medical decisions based on a physician’s adequate disclosure of the potential risks and benefits involved in a given procedure.3 The large amount of medical malpractice suits and medical regulations also demonstrate the importance we place on patient safety.4 On the other hand, however, we also recognize the shortcomings of the informed consent doctrine.5 We recognize an individual’s right to privacy6 and that alcoholism, mental illness, and drug-related impairments are private matters deserving protection from disclosure to the public to effect recovery.7 This Note will argue that a physician, in gaining a patient’s informed consent, does not have a duty to disclose to the patient whether he suffers, or has suffered, from alcoholism, drug abuse, or mental illness. Physicians are still human and thus deserve the right to privacy regarding such personal matters as are enjoyed by the 1. See Mary Anne Bobinski, Autonomy and Privacy: Protecting Patients from Their Physicians, 55 U. PITT. L. REV. 291, 376 (1994) (“The types of personal characteristics . . . requiring disclosure are undefined.”). 2. See Canterbury v. Spence, 464 F.2d 772, 780 (D.C. Cir. 1972) (“The root premise is the concept, fundamental in American jurisprudence, that ‘[e]very human being of adult years and sound mind has a right to determine what shall be done with his own body.’ ” (quoting Schloendorff v. Soc’y of N.Y. Hosp., 105 N.E. 92, 93 (1914))). 3. See id. at 781. 4. See, e.g., Frederick Levy et al., The Patient Safety and Quality Improvement Act of 2005: Preventing Error and Promoting Patient Safety, 31 J. LEGAL MED. 398-406 (2010). 5. See Sheldon F. Kurtz, The Law of Informed Consent: From “Doctor is Right” to “Patient has Rights”, 50 SYRACUSE L. REV. 1243, 1245 (2000). 6. See Barry R. Furrow, Data Mining and Substandard Medical Practice: The Difference Between Privacy, Secrets and Hidden Defects, 51 VILL. L. REV. 803, 803 (2006) (“We properly value privacy: it is a desirable end state and a precondition for identity, allowing individuals to achieve goals such as autonomy and solidarity with peers . . . .”). 7. See Rebecca Sara Feinberg, The Impaired Physician: Medical, Legal, and Ethical Analysis with a Policy Recommendation, 34 NOVA L. REV. 595, 605 (2010) (“Confidentiality is [a] key element to successful intervention and treatment.”). 2014] SCOPE OF INFORMED CONSENT 1127 public generally. This Note will point out that such conditions do not have as material of an effect on the performance of medical procedures as people generally assume. Yet, if these impairments were to rise to a level such that patient safety would be compromised, liability must fall somewhere. Thus, instead of requiring physicians to disclose their personal impairments during the informed consent process, the emphasis should be placed on the hospital’s duty to properly monitor its physicians’ credentials. Further, disclosure through the informed consent doctrine is not the proper way to protect patients from physicians who are incapable of adequately performing medical procedures due to alcoholism, drug abuse, or mental illnesses. Rather than pointing the finger at the physician for lack of disclosure, the issue of impaired physicians involves a bigger picture that the hospital system is, itself, deficient. Hospitals should implement methods that will incentivize physicians to get the treatment they need without the attached stigmatization. Hospitals must implement and properly maintain confidential yet effective programs designed to identify and rehabilitate physicians suffering from alcoholism, drug-dependency, and mental illnesses to ensure that those physicians practicing medicine are safely capable of doing so. This emphasis on a hospital’s duty to monitor and qualify physicians provides the ideal balance of physician privacy and patient safety. This Note will begin by exploring the history and evolution of the informed consent doctrine in the American medical field. A discussion of the characteristics of “impaired physicians” will follow. This Note will then examine the relationship between impaired physicians and the scope of the informed consent doctrine. Finally, I will articulate that the duties of a hospital to monitor and credential physicians via a corporate negligence theory strikes the proper balance between protecting a physician’s privacy and patient’s safety. II. INFORMED CONSENT DOCTRINE The informed consent doctrine is a relatively recent phenomenon principled on the American concept of autonomy.8 Informed consent was seen as one tool in response to the imbalance of power in the provider-patient relationship.9 The idea was that “requiring physicians to provide more information to their patients [would] help to 8. See Barbara L. Atwell, The Modern Age of Informed Consent, 40 U. RICH. L. REV. 591, 594 (2006). 9. See MARK A. HALL ET AL., MEDICAL LIABILITY AND TREATMENT RELATIONSHIPS 197-98 (Vicki Been et al. eds., 3d ed. 2013). 1128 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 redress the power imbalance problems created by the inequality of knowledge.”10 The doctrine was originally an outgrowth of the tort of battery.11 Claims for an informed consent violation amounted to an intentional and unauthorized touching of another. 12 Beginning in the 1950s, courts “viewed risk nondisclosure situations as analogous to and an extension of those battery cases where consent was fraudulently obtained.”13 Bringing an informed consent claim under a battery theory had significant advantages over bringing a negligence-based claim: First, and most importantly, battery did not require the patient to prove by an expert medical witness that the defendant had deviated from an accepted medical standard of care. Second, battery did not require the patient to prove that he would have refused the treatment if he had been given the proper information. Third, battery would entitle the patient to recover damages even if the operation did not have a “bad result.” Fourth, as an intentional tort, battery might have entitled the patient to an instruction on punitive damages, which would not be available in an action based upon negligence.14 Recognizing the possibility for unnecessary liability, courts gradually began pulling away from the battery theory of informed consent and, instead, started moving toward a standard negligence theory of medical malpractice.15 The battery-based claims generally dealt more with procedures in which no consent was given, while the new negligence-based claims more commonly involved situations in which the consent given was inadequate.16 Indeed, basing an informed consent claim on a theory of negligence “more closely comports with the reality of medical practice.” 17 “[D]octors’ informed consent practices require the exercise of judgment. . . . Since the treating physician retains some flexibility in determining how much information to disclose, cases based on a failure to obtain informed consent, like other medical malpractice claims, are based on negligence.”18 10. Id. at 198. 11. William J. McNichols, Informed Consent Liability in a “Material Information” Jurisdiction: What Does the Future Portend?, 48 OKLA. L. REV. 711, 714-16 (1995). 12. See Atwell, supra note 8, at 593 (“[The informed consent doctrine] is a natural outgrowth of the common law tort of battery that prohibits intentional unauthorized bodily contact.”). 13. McNichols, supra note 11, at 714. 14. Id. at 715. 15. See id. 16. See Laurel R. Hanson, Note, Informed Consent and the Scope of a Physician’s Duty of Disclosure, 77 N.D. L. REV. 71, 72, 75 (2001). 17. Atwell, supra note 8, at 595. 18. Id. at 595-96. 2014] SCOPE OF INFORMED CONSENT 1129 Autonomy is a fundamental American concept that is furthered by the informed consent doctrine.19 “Competent adults exercise that autonomy by deciding whether or not to consent to medical treatment.” 20 Judge Cardozo, in one of the pioneer cases involving informed consent, famously stated: “Every human being of adult years and sound mind has a right to determine what shall be done with his own body.” 21 Thus, the informed consent doctrine ensures that patients “have the material information with which to make an informed choice.”22 There are two main standards that courts apply to determine a physician’s required level of disclosure: the “reasonable patient” 23 standard and the “professional malpractice”24 standard.25 Under the reasonable patient standard, a physician’s required level of disclosure is that which a reasonable patient would consider “material” in making a medical treatment decision.26 Some courts have argued that determining the materiality of a risk from a reasonable patient’s point of view is the best way to respect autonomy.27 The professional malpractice standard defines the scope of disclosure as the information which a reasonable physician in similar circumstances would provide to a patient. 28 Today, about half of the states follow this standard.29 The professional malpractice standard 19. See id. at 594-95. 20. Id. at 594. 21. Schloendorff v. Soc’y of N.Y. Hosp., 105 N.E. 92, 93 (1914), abrogated by Bing v. Thunig, 142 N.E.2d 3, 7-9 (1957), superseded by statute, Act of May 21, 1975, ch. 109, 1975 N.Y. Laws 134-35. 22. See Atwell, supra note 8, at 596. 23. This is also known as the “material risk” or “patient-centered” standard. 24. This is also known as the “professional disclosure” or “reasonable physician” standard. 25. See HALL ET AL., supra note 9, at 205; Hanson, supra note 16, at 75. 26. See HALL ET AL., supra note 9, at 205; see also Hanson, supra note 16, at 75. 27. See, e.g., Canterbury v. Spence, 464 F.2d 772, 786 (D.C. Cir. 1972) (“[T]he patient’s right of self-decision shapes the boundaries of the duty to reveal. . . . The scope of the physician’s communications to the patient, then, must be measured by the patient’s need, and that need is the information material to the decision.” (emphasis added)); see also Kurtz, supra note 5, at 1251 (“The Canterbury patient-based standard seems more consistent with the purpose of 'informed consent' which includes a respect for a patient’s autonomy interest and a desire to have patients participate in the decision making process.”). “A small number of jurisdictions take an even more protective approach, requiring disclosure of information that a particular patient (as contrasted with a ‘rational patient’) would have wanted to make his or her decision.” HALL ET AL., supra note 9, at 205. 28. HALL ET AL., supra note 9, at 205; see also Hanson, supra note 16, at 75. 29. HALL ET AL., supra note 9, at 214. “In adopting the reasonable physician standard, courts seemed to be assuming that a competent physician acting in good faith would convey to patients information essential to their understanding of relevant risks, benefits, and alternatives, rather than simply provide the traditionally meager disclosures . . . .” Ben A. Rich, Medical Paternalism v. Respect for Patient Autonomy: The More Things Change the More They Remain the Same, 10 MICH. ST. U. J. MED. & L. 87, 106-07 (2006). 1130 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 does not require physicians to speculate as to what the reasonable patient would want to know; instead, it applies the appropriate medical standard of care to utilize the physician’s professional judgment.30 Testimony from medical experts is necessary, however, because the professional malpractice standard measures disclosure according to the appropriate physician’s standard of care.31 Under either standard of informed consent, various situations may excuse disclosure, 32 including emergencies, 33 areas of common knowledge, 34 areas of individualized knowledge, 35 situations where disclosure would “ ‘foreclose rational decision’ or ‘pose psychological damage’ to the patient,”36 and occasions when a patient has waived disclosure.37 Such exceptions to the doctrine are generally set up as affirmative defenses.38 Regardless of which standard courts apply, the informed consent doctrine has received significant criticism.39 Many studies suggest a dichotomy between disclosure and comprehension or retention.40 As such, even when physicians disclosed sufficient information, “few patients understood or remembered what they had been told about their medical condition and treatment options.”41 Additionally, there is a valid concern that excessive disclosure, often due to a fear of litigation, will result in patients foregoing medically necessary treat30. See Culbertson v. Mernitz, 602 N.E.2d 98, 103 (Ind. 1992) (“[A physician] should not be called upon to be a ‘mind reader’ with the ability to peer into the brain of a prudent patient to determine what such patient ‘needs to know,’ but should simply be called upon the discuss medical facts and recommendations with the patient as a reasonably prudent physician would.”). 31. HALL ET AL., supra note 9, at 215; see also Hanson, supra note 25, at 75 (“Under this standard, a patient usually must present expert testimony to demonstrate that a physician, following acceptable medical practice, would have disclosed the injury-causing risk.”). 32. See Hanson, supra note 25, at 73-75. 33. HALL ET AL., supra note 9, at 221 (“There is no duty to disclose information in an emergency situation where the patient is not competent, immediate treatment is required to prevent more serious harm, and no substitute decisionmaker is available.”). 34. Id. at 221 (“There is no duty to disclose risks ‘of which persons of average sophistication are aware.’ ”). 35. Id. (“The patient cannot recover for the physician’s failure to disclose a risk already known by the patient.”). 36. Id. at 221. This is known as the “therapeutic privilege,” which courts have applied only in a few circumstances. Id. at 221-22. 37. Id. at 222. 38. See id. (“The defendant generally has the burden of proving that an exception to the duty to inform is present.”). 39. See, e.g., Atwell, supra note 8, at 597-98 (“In practice, informed consent is far from perfect.”); Kurtz, supra note 5, at 1245 (“[T]he doctrine falls short of its intended purpose.”). 40. See also, e.g., David A. Herz et al., Informed Consent: Is It a Myth?, 30 NEUROSURGERY 453 (1992); Alan Meisel & Loren H. Roth, Toward an Informed Discussion of Informed Consent: A Review and Critique of Empirical Studies, 25 ARIZ. L. REV. 265 (1983). 41. HALL ET AL., supra note 9, at 202. 2014] SCOPE OF INFORMED CONSENT 1131 ments.42 Other scholars suggest that the doctrine of informed consent doctrine does not fulfill its “goals of patient protection” in the modern practice of medicine.43 Further, the elements needed to succeed in a cause of action for lack of informed consent make recovery difficult; thus, many claims are never litigated.44 In bringing an informed consent claim, the plaintiff will generally have to prove the following: “(1) that the medical procedure carried a specific risk that was not disclosed, (2) that the physician violated the applicable standard of disclosure, (3) that the undisclosed risk materialized, and (4) that the failure to disclose the information caused the patient’s injury.”45 Proving materialization of the undisclosed risk and causation are often the most difficult barriers for plaintiffs. 46 One can imagine many circumstances where physicians might fail to disclose a risk without the risk ever materializing. For example, if a physician fails to disclose to a patient that a particular surgery could result in paralysis (arguably a very material risk), and paralysis never materializes, the patient would not have a valid claim against the physician. When such a situation occurs, it seems the informed consent doctrine serves the purpose of protecting patients from injury rather than its stated purpose of respecting patient autonomy.47 To prove causation, a plaintiff must convince the court that a reasonable patient in similar circumstances would have refused the treatment had the disclosure been sufficient.48 This requirement is often a very difficult burden of proof to satisfy and tends to raise a range of issues.49 While the causation requirement is an objective standard, the jury is permitted to consider the plaintiff’s particular circumstances.50 The law is still fuzzy and inconsistent regarding how much of a plaintiff’s subjective circumstances should be considered.51 42. See Barry R. Furrow, Doctors’ Dirty Little Secrets: The Dark Side of Medical Privacy, 37 WASHBURN L.J. 283, 293 (1998) (“Disclosure creates the risk that a patient will refuse the physician’s care because of the status or the addiction, rather than looking at the particular case and the risks posed.”). Ironically, this trend would actually compromise patient safety. 43. Atwell, supra note 8, at 611. 44. See, e.g., HALL ET AL., supra note 9, at 217. 45. Id. 46. See id. 47. “Vindicating patient autonomy is at the heart of all inadequate consent cases, whether the theory is based on battery or negligence.” McNichols, supra note 11, at 715. 48. HALL ET AL., supra note 9, at 217. 49. See id. at 217-18. 50. See id. (“[A] fact finder applying objective causation rules may take into account characteristics of plaintiff, including ‘idiosyncrasies, fears, age, medical condition, and religious beliefs.’ ” (quoting Ashe v. Radiation Oncology Assocs., 9 S.W.3d 119, 123-24 (Tenn. 1999))). 51. See id. 1132 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 III. IMPAIRED PHYSICIANS “As a result of their status [doctors] are expected to be above human failings, while proving immune to the ailments that afflict the general population. Nonetheless, to err is human and in being human doctors inevitably make mistakes in the normal course of providing care.”52 An “impaired physician is a medical doctor who suffers from alcoholism, drug addiction, or mental illness.”53 The American Medical Association (AMA) uses the phrase “impaired physician” as a term of art and defines it as “ ‘the inability to practice medicine adequately by reason of physical or mental illness, including alcoholism or drug dependency.’ ”54 The AMA’s designation of a physician as being impaired can potentially result in the suspension or revocation of the physician’s medical license.55 “Given the everyday work stress that medical professionals experience, it is not surprising that many physicians may turn to alcohol or substance abuse.”56 The rate of impairment for physicians is consistent among various specialties, regions, and age ranges; “[n]o group of physicians are immune.”57 The problem is real and the numbers are frightening. The Medical Board of California estimates that eighteen percent of the physicians in California abuse alcohol or other drugs at some point during their careers.58 The sad fact remains: physicians have a higher rate of impairment than non-physicians, yet they have more trouble securing treatment. 59 The fear that physicians will receive some negative stigma from their peers, along with the fear of potential punishment, often causes physicians to conceal their alcoholism, substance abuse, or mental illness.60 This pattern 52. A. Mavroforou et al., Alcohol and Drug Abuse Among Doctors, 25 MED. & L. 611, 612 (2006). 53. Feinberg, supra note 7, at 598. 54. Id. 55. Id. at 601, 613. For purposes of this note, the phrase “impaired physician” shall refer to the concept more generally (that of a physician suffering from alcoholism, drug abuse, or mental illness) rather than the term of art, as used by the AMA. 56. Ila S. Rothschild, Law for Physicians: An Overview of Medical Legal Issues, 21 J. LEGAL MED. 437, 440 (2000) (book review). 57. Roger S. Cicala, Substance Abuse Among Physicians: What You Need to Know, HOSPITAL PHYSICIAN, July 2003, at 39. 58. See Lucian L. Leape & John A. Fromson, Problem Doctors: Is There a System-Level Solution?, 144 ANNALS INTERNAL MED. 107, 108 (2006). 59. See Feinberg, supra note 7, at 599 (“Physicians have both a higher prevalence of impairment and more difficulty obtaining treatment than non-physicians.”). 60. Id. (“[T]he impaired physician often conceals his addiction because the stigma attached to physician impairment makes seeking help significantly more difficult than for the general population. Potential punitive responses may also play a role in incenting concealment.”). 2014] SCOPE OF INFORMED CONSENT 1133 means that physicians have a much lower likelihood of receiving the treatment they need.61 Alcoholism and substance abuse have been so stigmatized among medical professionals that discussion of the topic is taboo.62 Despite the high incidences of alcoholism and drug abuse among physicians, little talk is present at professional meetings, and coverage in medical school curricula is sparse.63 Unsurprisingly, there is a good deal of literature arguing that physician impairment has a significant, negative impact on a physician’s medical performance.64 One study reveals that physicians who reported making a major medical mistake within the last three months were more likely to suffer from depression or struggle from alcohol or drug dependence.65 However, as one professor at the University of Tennessee College of Medicine also suggests: “Most physician substance abusers continue to function quite well until the problem is far advanced.”66 Further, “[a]lcoholics can often remain sober during working hours for many years, even though they drink large quantities at night and on weekends.”67 Other medical literature often compares alcoholism in physicians to sleep-deprivation. Indeed, studies have revealed that physicians who have not slept in twentyfour hours (as is not entirely uncommon) have impaired “cognitive psychomotor performance to the same degree as having a 0.1% blood alcohol level.”68 Yet, there is a lack of empirical evidence demonstrating a correlation between sleep deprivation and medical errors.69 This 61. See id. at 600. 62. See Cicala, supra note 57, at 39; see also Feinberg, supra note 7, at 597 (“Physician addiction is taboo, but this silence injures both the physician and his patients.”). 63. Cicala, supra note 57, at 39. 64. See, e.g., Bobinski, supra note 1, at 298-99 (“The abuse of drugs and alcohol is in turn associated with higher risks of work-related performance deficits. Physicians with substance abuse problems may present several different sorts of risks to their patients.”); Feinberg, supra note 7, at 597 (“Alcohol and drug addiction interfere with multiple functions in daily life. There is no doubt, when the addicted individuals are physicians, the interference affects their ability to practice medicine, causing their patients to receive a lower standard of care than they would otherwise receive.”). 65. Looking at Alcohol Use Disorders Among Surgeons, PHYSICIAN’S WEEKLY (Aug. 23, 2012), http://www.physiciansweekly.com/surgeons-alcohol-use-disorders/ [hereinafter Alcohol Use]. However, “the study did not identify the nature of the errors or determine the cause and effect.” Carolyne Krupa, 15% of Surgeons Struggle with Alcohol Problems, AM. MED. NEWS (Mar. 6, 2012), http://www.amednews.com/article/20120306/ profession/303069998/8/. 66. Cicala, supra note 57, at 39. 67. Id. 68. Merit Buckley, Imposing Liability in the United States Medical Residency Program: Exhaustion, Errors, and Economic Dependence, 12 DEPAUL J. HEALTH CARE L. 305, 313 (2009). 69. See id. at 314. 1134 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 logically seems to suggest that a similar correlation between alcoholism and medical errors would also be lacking.70 Regardless, the fact remains that there is a higher percentage of physicians suffering from alcoholism or drug abuse than there is in the general population, and something must be done to address this. IV. IMPAIRED PHYSICIANS AND THE SCOPE OF INFORMED CONSENT Under either a professional malpractice standard or a reasonable patient standard, the exact scope of required disclosure remains gray. It is clear that informed consent requires, at a baseline, the benefits and risks of a particular medical procedure and potential medical alternatives.71 But even at this minimal level, how much does a physician have to disclose about the benefits, and how significant must a risk be to warrant disclosure? The reasonable patient standard attempts to answer this question by applying the materiality concept: whether the information would be material to the reasonable patient’s decision about the treatment. 72 Yet, this also leaves little guidance. The professional malpractice standard judges the scope of disclosure based on the applicable standard of care in the particular circumstances, but this often and simply yields a battle of expert witnesses.73 The bottom line is that the exact scope of required disclosure, under either standard, remains unknown.74 Given this level of uncertainty, coupled with increased medical litigation and attention to patient autonomy,75 it is not surprising that the trend in the informed consent doctrine seems to be moving toward expanding the scope of disclosure. Beyond just the disclosure of risks, benefits, and alternatives to the medical treatment, recent attempts to raise this “floor” of disclosure have been made.76 Attention has been drawn towards disclosure of a medical treatment’s economic implications and a physician’s per- 70. See Alcohol Use, supra note 65 (“Although actual injury to patients from impaired physicians is incredibly rare, alcohol abuse and dependence are important factors to consider when thinking about patient safety in surgery . . . .”). 71. See Bobinski, supra note 1, at 293 (“In the past, both patients and courts have focused attention on the benefits and risks of a particular treatment . . . .”). 72. See Hanson, supra note 16, at 75. 73. See Atwell, supra note 8, at 596. 74. See Bobinski, supra note 1, at 342-43. 75. I say this hesitantly. See supra Part II for a critique of the informed consent doctrine. 76. See Kurtz, supra note 5, at 1255-56 (“In recent years, the preoccupation of the informed consent rules with disclosure of risks inherent in a proposed treatment has expanded to the disclosure of risks of not having a proposed treatment and risks associated with having treatment by a particular physician.”). 2014] SCOPE OF INFORMED CONSENT 1135 sonal characteristics. 77 The personal characteristics of physicians that have been discussed as potentially warranting disclosure before medical procedures include a physician’s surgical experience,78 HIV status, 79 deterioration of skills, 80 conflicts of interest, 81 and impairments.82 Though the majority rule does not require physicians to disclose personal characteristics, a growing minority of states are requiring such disclosures.83 Although the scope of disclosure obligations continues to expand, the line must be drawn somewhere. Requiring physicians to disclose to patients that they have suffered from, or are currently suffering from, alcoholism, drug abuse, or mental illness, opens the door to a flood of other potential disclosure obligations. Sure, one could argue that alcoholism, drug abuse, or mental illness has the potential to negatively affect a physician’s medical performance, and thus should be disclosed.84 But if we are willing to say that these personal impairments require disclosure, where do we end? Conceivably, almost every personal attribute of a physician might be relevant 77. See id. at 1257-58. 78. See Johnson v. Kokemoor, 545 N.W.2d 495, 498, 506-07 (Wis. 1996) (proposing that a physician’s lack of experience with intricate and difficult procedures may be material to a patient’s decision to proceed with the particular physician, rather than the actual procedure). However, the Johnson principle of disclosure has not been widely expanded, as the case is seen as unique and fact-specific. See Barry R. Furrow, Patient Safety and the Fiduciary Hospital: Sharpening Judicial Remedies, 1 DREXEL L. REV. 439, 454 (2009); see also Emmanuel O. Iheukwumere, Doctor, Are You Experienced? The Relevance of Disclosure of Physician Experience to a Valid Informed Consent, 18 J. CONTEMP. HEALTH L. & POL’Y 373, 402-07 (2002). 79. See Iheukwumere, supra note 78, at 396. 80. See Semeraro v. Connolly, Civ. A. No. 92-4636, 1992 WL 392621, at *1 (E.D. Pa. Dec. 14, 1992). 81. Compare Furrow, supra note 78, at 452 (“Courts have been less willing to impose an obligation on physicians to disclose putative economic conflicts of interest.”), with Moore v. Regents of the Univ. of Cal., 793 P.2d 479, 485 (Cal. 1990) (“[A] physician who is seeking a patient’s consent for a medical procedure must, in order to satisfy his fiduciary duty and to obtain the patient’s informed consent, disclose personal interests unrelated to the patient’s health, whether research or economic, that may affect his medical judgment.”). 82. See, e.g., Hidding v. Williams, 578 So. 2d 1192, 1196 (La. Ct. App. 1991) 83. See, e.g., id. (holding that physician’s failure to inform patient of physician’s chronic alcohol abuse violated obligations of informed consent disclosure); Gaston v. Hunter, 588 P.2d 326, 351 (Ariz. Ct. App. 1978) (stating that a physician’s surgical experience should be disclosed to a patient during the informed consent process). 84. See Hidding, 578 So. 2d at 1196 (holding that physician’s chronic alcohol abuse “create[d] a material risk associated with the surgeon’s ability to perform, which if disclosed would have obliged the patient to have elected another course of treatment . . . .”); see also Iheukwumere, supra note 78, at 402 (“Certainly, the fact of a physician’s alcoholism would be of significant concern to a reasonable patient, since an alcohol impaired physician, or one likely to be impaired during an invasive procedure would impact on the likelihood of a mistake during the procedure.”). 1136 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 to a patient in making a decision on whether to proceed with a medical intervention.85 For example, consider a physician who skips breakfast the morning of a surgery. Should he have to inform his patient of this personal detail? If a physician skips breakfast, he will certainly become hungry (if he is not already). Surely, hunger could potentially have a negative effect on a physician’s medical performance. Even more extreme yet under the same logic, consider a physician who gets into a heated argument with his wife the night before performing surgery and is now in a bad mood. Should he be required to inform his patient of this in gaining consent before the surgery? One could also see how a bad mood might negatively affect a physician’s medical performance. And finally, consider a physician who has a ritual of listening to a certain song before every surgery for good luck. He has listened to this song before every successful surgery for the past fifteen years of his practice. The morning of his next surgery, however, he is in a rush and does not get a chance to listen to his “lucky song.” Cognizant that he skipped this important step, he becomes concerned. Should the physician have to disclose this information to his patient? As outrageous as the scenario might sound, requiring disclosure of this idiosyncrasy logically follows from the current, expanding scope of the informed consent doctrine. As demonstrated above, expanding the disclosure obligations to include a physician’s alcoholism, drug abuse, or mental illness has the potential to create unintended bounds.86 The process of obtaining informed consent from a patient will likely transform from an explanation of the potential risks associated with a procedure to a laundrylist-reading of the physician’s personal life.87 In fact, for this exact reason, the Supreme Court of Pennsylvania refused to expand the doctrine of informed consent to include mandatory disclosure of a physician’s alcoholism.88 As explained in Kaskie v. Wright, “[t]o do so, where the absent information consists of facts personal to the treating physician, extends the doctrine into realms well beyond its original boundaries.”89 Such an expansion of the doctrine will likely make 85. See Kaskie v. Wright, 589 A.2d 213, 217 (Pa. Super. Ct. 1991) (affirming summary judgment for defendant physician in an informed consent claim, rhetorically asking: “Are patients to be informed of every fact which might conceivably affect performance in the surgical suite?”). 86. See id. 87. See Bobinski, supra note 1, at 295 (“A seemingly infinite number of provider characteristics combine to determine the physician’s ability to deliver appropriate care to a particular patient at any given moment.”). 88. Kaskie, 589 A.2d at 217. 89. Id. 2014] SCOPE OF INFORMED CONSENT 1137 any attempt at line-drawing very difficult,90 and patients will likely become so overwhelmed with information to the point that they decline many important medical procedures. Though physicians are undoubtedly held to higher expectations than the general public and are bound by fiduciary obligations to their patients,91 it is easy to forget that physicians are still human. Physicians make mistakes and have struggles in their personal lives just like everyone else. Because alcoholism, drug abuse, and mental illnesses are such personal and sensitive issues, physicians will have even more incentive to conceal or deny any such problems if they know they will have to share these details with their patients. The result will be even more physicians who are unable to seek the treatment they need due to conscious denial or concealment.92 Further, because physicians are even more likely to keep their impairments invisible, as has been indicated, requiring physicians to disclose such impairments to patients in the informed consent process will likely be a fruitless expansion of the doctrine. This is not to say that a patient who receives substandard care from a physician who suffered from alcoholism, drug abuse, or mental illness is without legal recourse against that physician.93 However, such recourse does not create a separate legal issue under the informed consent doctrine.94 Legal remediation for substandard care is still an option for patients who are injured by their physicians’ negligence.95 As the Court of Appeals of Arizona properly held as a matter of law in Ornelas v. Fry: [T]he fact that [the physician] may have been an alcoholic at the time of the surgery on [the patient] does not create in and of itself a separate issue or claim of negligence. It is only when that alcoholism translates into conduct falling below the applicable standard of care that it has any relevance.96 90. See id. (explaining that expansion of the informed consent doctrine to include disclosure of a physician’s alcoholism will make limitations not easily definable). 91. See Furrow, supra note 78, at 444. 92. See Feinberg, supra note 7, at 598 (“It is [the] risk to patients that makes physician impairment incompatible with the practice of medicine. And it is this incompatibility that leads the impaired physicians to further conceal their addiction . . . .”). 93. See Duttry v. Patterson, 771 A.2d. 1255, 1259 (Pa. 2001) (“[I]nformation personal to the physician, whether solicited by the patient or not, is irrelevant to the doctrine of informed consent. Our holding should not, however, be read to stand for the proposition that a physician who misleads a patient is immune from suit. . . . [We do not] see a need to expand this doctrine into a catchall theory of recovery since other causes of action provide avenues for redress to the injured patient.”). 94. See Ornelas v. Fry, 727 P.2d 819, 823 (Ariz. Ct. App. 1986). 95. See Duttry, 771 A.2d at 1259 (“For example, it is conceivable that a physician’s lack of experience in performing an operation would support a plaintiff’s case in negligence.”). 96. Ornelas, 727 P.2d at 823. 1138 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 Additionally, it is undisputed that the doctrine of informed consent is based on the concept of autonomy. Under the most patientfriendly standard of the doctrine, a physician informs a patient of the material risks associated with the procedure in order to facilitate an informed decisionmaking process.97 However, to allow practicability of the doctrine, the materiality of a risk must be limited to risks specifically related to the medical procedure itself. 98 Determining the materiality of a risk specifically related to the medical procedure has already proven to be a difficult task.99 If we further consider the physician’s personal characteristics to be a material risk, the doctrine will eventually prove unworkable because of undefined boundaries.100 By disclosing the risks “specifically germane to surgical or operative treatment,”101 a patient is able to exercise his “right to determine what shall be done with his own body.”102 This limitation to the concept of materiality accomplishes the doctrine’s intended goal: autonomy.103 However, considering a physician’s impairment to be a material risk is not concerned with autonomy, it concerns something entirely separate: patient safety. The arguments in favor of expanding the informed consent doctrine to impose a disclosure obligation of the physician’s alcoholism, drug abuse, or mental illnesses all implicitly center around the same general argument: such physician impairments negatively affect a physician’s performance of medical procedures, thereby compromising the safety of the patient.104 Yet, the informed consent doctrine 97. See Atwell, supra note 8, at 594-95. 98. The informed consent doctrine should not be expanded “to include matters not specifically germane to surgical or operative treatment.” Kaskie v. Wright, 589 A.2d 213, 217 (Pa. Super. 1991); see also Semeraro v. Connolly, Civ. A. No. 92-4636, 1992 WL 392621 (E.D. Pa. Dec. 14, 1992). 99. See HALL ET AL., supra note 9, at 217-18; Iheukwumere, supra note 78, at 392 (“Subsequent to Canterbury many important informed consent decisions came down addressing the materiality of information in divergent ways . . . .”); see also Feinberg, supra note 7, at 621 (“There is no clear consensus in the courts or in the medical literature about physician disclosure and the informed consent process.”). 100. See Kaskie, 589 A.2d at 217 (refusing to expand the informed consent doctrine to include matters not specifically germane to the surgical treatment because such expansion would “extend[] the doctrine into realms well beyond its original boundaries” and limitations would not be easily definable). 101. Kaskie, 589 A.2d at 217. 102. See Schloendorff v. Soc’y of N.Y. Hosp., 105 N.E. 92, 93 (1914), abrogated by Bing v. Thunig, 142 N.E.2d 3, 7-9 (1957), superseded by statute, Act of May 21, 1975, ch. 109, 1975 N.Y. Laws 134-35. 103. Kurtz, supra note 5, at 1251. 104. See, e.g., Hidding v. Williams, 578 So. 2d 1192, 1198 (La. Ct. App. 1991) (determining that the physician’s abuse of alcohol “increased [the] potential for injury during surgery”); Feinberg, supra note 7, at 597 (stating that physician impairment results in “patients . . . receiv[ing] a lower standard of care than they would otherwise receive”); Furrow, supra note 42, at 293 (“Certainly an alcoholic surgeon may have an impairment that might seriously affect performance and thus success rate.”); Iheukwumere, supra note 78, 2014] SCOPE OF INFORMED CONSENT 1139 was not developed with the purpose of ensuring patient safety.105 The doctrine was simply intended to allow patients to weigh the potential risks against the potential benefits of a specific medical procedure in order to informatively decide for themselves whether they wish to proceed with the procedure.106 However, within this informed decisionmaking process, the patient must be able to assume that the physician will operate in a reasonably safe manner; the patient must be able to proceed under an assumption that the physician’s alcoholism, drug abuse, or mental illness will not pose a significant risk.107 The solution to such a dilemma is not an expansion of the informed consent doctrine. If a physician is truly impaired by alcoholism, drug abuse, or a mental illness such that it will significantly and negatively affect his performance of medical procedures to a degree that would compromise patient safety, the physician should not be able to simply disclose this information to a patient and avoid any potential liability. The informed consent doctrine should not be expanded such that it can be used strategically as a liability “out” where physicians are truly unfit to perform medical procedures. Instead, stepping back and considering the bigger picture is necessary. V. DUTIES OF THE HOSPITAL: A CORPORATE NEGLIGENCE THEORY “[With impaired physicians,] the goal is to eliminate the risk to the patient, not simply to inform the patient and let the patient choose.”108 Despite various opinions in medical literature, something we know for sure is that physicians who are currently suffering or have suffered from alcoholism, drug abuse, or mental illness may pose threats to patient safety by performing medical operations.109 If such impairment reaches a level where patient safety would be compromised, the solution is not disclosure through expanded informed con- at 402 (“[A]n alcohol impaired physician . . . would impact on the likelihood of a mistake during the procedure.”); see also Judice v. Hosp. Serv. Dist. No. 1, 919 F. Supp. 978, 984 (E.D. La. 1996) (holding that the discovery of alcohol in a physician’s system just prior to surgery raised valid concerns about the risk to public safety). 105. “[P]atient autonomy is at the heart of all inadequate consent cases . . . .” McNichols, supra note 11, at 715. 106. See Atwell, supra note 8, at 596 (“Informed consent, then, is designed to protect patients by ensuring that they have the material information with which to make an informed choice.”). 107. See Bobinski, supra note 1, at 302 (discussing other personal physician conflicts: “we want to ensure that patients receive good quality care of sufficient amount, duration, and scope regardless . . . .”). 108. Furrow, supra note 42, at 293. 109. See Feinberg, supra note 7, at 598. 1140 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 sent obligations, but rather a bigger-picture solution: placing a duty on hospitals to properly credential and monitor physicians.110 A hospital’s duty to non-negligently credential and monitor physicians is an obligation that is part of a larger conception known as the “corporate negligence theory.”111 Under the corporate negligence theory, a hospital can be held directly liable for injuries to patients resulting from substandard medical care.112 The reasons for such a theory are obvious: as blame for sub-quality medical treatment continues to be placed directly on the treating physicians, hospitals will be free of any duty (and thus any incentive) to try and prevent medical errors.113 Consider the nature of the modern hospital. Hospitals are big businesses, spending millions marketing themselves through “expensive advertising campaigns.” They provide a range of health services, and the public expects emergency care, radiological and other testing services, and other functions as a result of hospitals’ self-promotion. And yet the legal relationships in the hospital are byzantine, creating two strongly autonomous management structures side by side: a hospital administrative structure in parallel with the hospital medical staff, which operates as a staff of independent contractors. The very existence of this odd structure shields hospitals from liability under agency law rules for the errors of their physicians, even when it is the hospital systems that have allowed the physicians to fail.114 The concept of placing liability directly on a hospital under a corporate negligence theory has long been argued as an abdication of the medical practice; “only an individual properly educated and licensed, and not a corporation, may practice medicine.”115 Traditionally, hospitals were seen as merely the structure under which physicians operated. 116 Nonetheless, in 1965, the Supreme Court of Illinois announced its decision to impose liability directly on a hospital for inju110. See Furrow, supra note 42, at 293 (“[D]isclosure of [the physicians’] limitations may be of questionable efficacy . . . . It risks destroying provider privacy while reducing the pressure on state authorities and hospitals to monitor their physicians and set proper and reasonable standards for practice.”). 111. See Judith M. Kinney, Tort Law—Expansion of Hospital Liability Under the Doctrine of “Corporate Negligence”—Thompson v. Nason Hospital, 591 A.2d 703 (Pa. 1991), 65 TEMP. L. REV. 787, 792 (1992). 112. HALL ET AL., supra note 9, at 481 (“Direct or ‘corporate’ liability contrasts with vicarious liability in that it imposes on hospitals a duty of care owed directly to patients with respect to medical judgment.”). 113. See Furrow, supra note 42, at 459. 114. Id. (emphasis added). 115. Darling v. Charleston Cmty. Mem’l Hosp., 211 N.E.2d 253, 256 (Ill. 1965). 116. See Pedroza v. Bryant, 677 P.2d 166, 169 (Wash. 1984) (“The hospital’s role is no longer limited to the furnishing of physical facilities and equipment where a physician treats his private patients and practices his profession in his own individualized manner.”). 2014] SCOPE OF INFORMED CONSENT 1141 ries resulting from physician error.117 Darling v. Charleston Community Memorial Hospital has since been seen as the seminal case for imposing direct liability on a hospital via a corporate negligence theory for substandard medical care.118 A hospital’s duty to non-negligently credential its physicians is the critical first step to addressing the issue of impaired physicians. This duty “entails reviewing physicians’ competency and performance history before admission to the medical staff and periodically (typically every two years) thereafter.”119 The Supreme Court of Wisconsin in Johnson v. Misericordia Community Hospital described the minimum requirements for a hospital (or the hospital’s credentialing committee) in investigating and evaluating an applicant’s qualifications for hospital privileges: [A] hospital should, at a minimum, require completion of the application and verify the accuracy of the applicant’s statements . . . . Additionally, it should: (1) solicit information from the applicant’s peers, including those not referenced in his application, who are knowledgeable about his education, training, experience, health, competence and ethical character; (2) determine if the applicant is currently licensed to practice in this state and if his licensure or registration has been or is currently being challenged; and (3) inquire whether the applicant has been involved in any adverse malpractice action and whether he has experienced a loss of medical organization membership or medical privileges or membership at any other hospital. The investigating committee must also evaluate the information gained through its inquiries and make a reasonable judgment as to the approval or denial of each application for staff privileges.120 Additionally, in 1986, the National Practitioner Data Bank (NPDB) was established as part of the Healthcare Quality Improvement Act121 and was designed to provide licensing and credentialing entities with a more uniform body of information regarding discipli- 117. Darling, 211 N.E.2d at 258. 118. HALL ET AL., supra note 9, at 481. “Conventional forms of direct liability entail primarily administrative, not medical, functions such as maintaining safe premises, sterile equipment, and adequate rules and regulations. Darling is recognized as extending direct corporate liability to substandard medical care rendered by independent doctors. Hospitals thus can be found liable for some act of negligence on their part with respect to patient care decisions made by independent doctors . . . .” Id. 119. Id. at 482. 120. Johnson v. Misericordia Cmty. Hosp., 301 N.W.2d 156, 174-75 (Wis. 1981). 121. Healthcare Quality Improvement Act of 1986, 42 U.S.C. §§ 11101–11152 (2006). 1142 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 nary actions taken against physicians.122 Especially following the establishment of this databank, the duty to properly credential physicians makes clear that a hospital cannot simply plead ignorance with respect to a physician’s information in granting that physician privileges.123 Imposing this duty on hospitals also means that if a hospital chooses to grant privileges to a physician who has suffered from alcoholism, drug abuse, or mental illness in the past, the hospital bears the risk of such impairments resurfacing. Through the credentialing process, the hospital should be regarded as having been put on notice about potential relapses that may occur and thus should be charged with taking necessary, continual steps to prevent such occurrences. Further, a hospital should be free to grant privileges to a physician currently undergoing treatment for alcoholism, drug abuse, or mental illness; however, it should be presumed that the hospital underwent investigative measures to ensure that this physician is able to safely practice medicine.124 The AMA has made clear that it opposes the discrimination against otherwise capable physicians solely because “the physician is either presently, or has in the past, been under the supervision of a medical licensing board in a program of rehabilitation.”125 Hospitals must be charged with granting privileges to only those physicians capable of safely practicing medicine. This may entail a standardized screening evaluation for current alcoholism, drug abuse, or mental illness. When this evaluation is conducted at the commencement of the credentialing process, it will be regarded as nondiscriminatory and can be a step towards removing the stigmatization of such impairments in the medical profession. In a case for negligent credentialing, evidence to show a breach of this duty would 122. “The comprehensive reporting system requires medical boards to report licensure revocations, suspensions, restrictions, censures, reprimands, probation, and licenses surrendered relating to the physician’s professional competence or professional conduct. The statutory restrictions of the ADA do not insulate impaired physicians from being reported to the NPDB.” Yuri N. Walker, Protecting the Public: The Impact of the Americans with Disabilities Act on Licensure Considerations Involving Mentally Impaired Medical and Legal Professionals, 25 J. LEGAL MED. 441, 447 (2004). 123. See Elisabeth Ryzen, The National Practitioner Data Bank: Problems and Proposed Reforms, 13 J. LEGAL MED. 409, 411, 419 (1992) (“Hospitals are required to query the Data Bank before granting physicians privileges. . . . Failure to request information [from the NPDB every two years] means the hospital will be presumed to have knowledge of any information in the Data Bank concerning the applicant in any subsequent lawsuit.”). Nonetheless, the consistency of the NPDB regarding the reporting of physician impairments needs improvement. See POLICIES RELATED TO PHYSICIAN HEALTH § H-355.992 (Am. Med. Ass’n 2011) (“Our AMA will continue to monitor the issue of reporting impaired physicians to the National Practitioner Data Bank and will seek further clarification of ambiguities or misinterpretations of the reporting requirements for impaired physicians.”). 124. See Katharine A. Van Tassel, Blacklisted: The Constitutionality of the Federal System for Publishing Reports of “Bad” Doctors in the National Practitioner Data Bank, 33 CARDOZO L. REV. 2031, 2057 (2012); see also Kinney, supra note 111, at 793-95 (discussing actual or constructive notice triggering a hospital’s duties to act). 125. POLICIES RELATED TO PHYSICIAN HEALTH, supra note 123, § H-275.949. 2014] SCOPE OF INFORMED CONSENT 1143 include the hospital’s own bylaws on credentialing physicians, state licensing regulations, the Joint Commission’s Standards for Hospital Accreditation,126 common law, and other relevant authorities.127 The hospital’s duty to non-negligently credential physicians is generally accepted by the courts as part of the obligations of hospital administration. 128 However, an affirmative duty on the hospital to monitor its physicians has been seen as more controversial.129 Several courts have rebuffed any duty to contemporaneously monitor treatment decisions made by its physicians, reasoning that it would constitute an unlawful interference of the physician-patient relationship.130 Starting at the local level, under a corporate negligence theory, a hospital must be much more active in monitoring its physicians to ensure those practicing medicine are safely capable of doing so. 131 Given that the hospital should have non-negligently credentialed its physicians, it will be charged as being on notice of any potential red flags in the physician’s record of past or current alcoholism, drug abuse, or mental illness. The hospital should have a heightened affirmative duty to monitor these physicians. In order to adequately monitor physicians, general awareness of the prevalence of impaired physicians must increase. 132 Hospitals’ risk management committees should go through training and education programs on the potential signs of alcoholism, drug abuse, or mental illnesses. Similar information should be distributed to all hospital staff so that everyone is aware of the symptoms to look for in potentially impaired physicians. The frequent monitoring of these high-risk physicians, then, should include frequent in-person interviews, self-evaluations, and anonymous peer-review programs. To ensure that such monitoring programs are effective, however, hospitals also need to have a system in place that guarantees confi126. See JOINT COMMISSION, www.jointcommission.org (last visited June 29, 2014). 127. See Kinney, supra note 111, at 790-91. 128. See HALL ET AL., supra note 9, at 482. But see Paulino v. QHG of Springdale, Inc., 386 S.W.3d 462, 467 (Ark. 2012) (refusing to recognize a claim for negligent credentialing on the basis that regulatory oversight of hospitals is sufficient). 129. See HALL ET AL., supra note 9, at 482. 130. See, e.g., Gafner v. Down East Cmty. Hosp., 735 A.2d 969, 979-80 (Me. 1999). 131. Id. at 979 (quoting Pedroza v. Bryant, 677 P.2d 166, 168-69 (Wash. 1984)) (“The doctrine of corporate negligence has . . . been utilized by courts to require hospitals to exercise reasonable care to insure that the physicians selected as members of hospital medical staffs are competent. [Those courts] have also held that hospitals have a continuing duty to review and delineate staff privileges so that incompetent staff physicians are not retained.”). “Health care’s casual approach to monitoring physician performance contrasts markedly to that of other professions whose conduct affects the public welfare. Commercial pilots, for example, must pass both physical and performance examinations every year.” Leape, supra note 58, at 109. 132. See Feinberg, supra note 7, at 597 (“Physician addiction is taboo, but this silence injures both the physician and his patients.”). 1144 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 dentiality and includes penalty waivers.133 Because many physicians already conceal any impairment they may have for fear of potential penalties and stigmatization from their peers, hospitals must ensure that all monitoring policies are conducted with the utmost respect for the physician’s confidentiality.134 Upon discovering alcoholism, drug abuse, or mental illnesses in physicians, hospitals should motivate those physicians to seek recovery through participation in treatment programs.135 Every state has a form of a physician health program designed specifically for physicians suffering from alcoholism or substance abuse.136 Completion of such a program should be a prerequisite for waiving the penalty of a complete revocation of hospital privileges, which will encourage physicians to obtain the treatment they need but all so often do not get. Imposing liability on hospitals for negligent credentialing and monitoring of physicians, rather than expanding the doctrine of informed consent, will place the task of determining the competency of physicians with the party in the more capable position to do so: the hospital. VI. CONCLUSION “The real issue is whether the physician is likely to perform well, regardless of an impairment or other personal characteristic.” 137 Physicians suffering from alcoholism, drug abuse, or mental illnesses may be perfectly capable of performing medical treatments to the necessary standard of quality.138 However, should such impairments rise to a level such that the safety of the patient is compromised, liability must fall somewhere in order to ensure proper preventative measures are taken and injured patients are not left without legal recourse. The prevalence of physicians suffering from alcoholism, drug abuse, or mental illnesses is a sad reality that cannot continue to be ignored.139 However, attempting to solve such a large-scale issue by expanding the scope of disclosure obligations under the informed consent doctrine would be both impracticable and counterintuitive. Such an expansion would be inconsistent with the original purpose of 133. See Feinberg, supra note 7, at 608. 134. See id. 135. See id. at 607-09. 136. See Cicala, supra note 57, at 43-44. 137. Furrow, supra note 42, at 293. 138. See id. (“[A disclosure obligation] raises a difficult causation question, since alcoholism may not always impair a physician’s performance.”). 139. See generally Feinberg, supra note 7, at 605 (discussing the prevalence of alcoholism, drug abuse, and similar impairments in the medical field). 2014] SCOPE OF INFORMED CONSENT 1145 informed consent and would render the doctrine so lacking in certainty that it would eventually prove completely unworkable. Further, confidentiality is an essential element for the proper identification of, treatment of, and recovery from alcoholism, drug abuse, and mental illness. Patients want to be sure that impaired physicians, incapable of safely practicing medicine, are identified and obtain the treatment they need. Yet, requiring physicians to disclose to patients that they suffer from, or have suffered from, such impairments would be entirely illogical to achieve such a goal. Addressing the issue of impaired physicians is part of a much larger web of actors than can be remedied through the informed consent doctrine. Awareness to the problem of impaired physicians must increase generally within the medical profession. State medical boards and the Joint Commission on Accreditation of Health Care Organizations must cooperate with hospitals so that they have the necessary tools and information to begin the process. Rather than expanding the informed consent doctrine, liability should be placed on the hospital under a corporate negligence theory when a hospital negligently credentials and monitors its physicians. The hospital is in the best position to ensure the competency of the physicians performing medical treatments, not the patient. Such a structure would protect the privacy of the physician and encourage detection and rehabilitation while having the effect of increasing patient safety on a broader scale. 1146 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1125 DURBIN AMENDMENT TO THE DODD FRANK ACT: TWO CAPS ARE BETTER THAN ONE FOR DEBIT CARD INTERCHANGE FEES MAUREEN KANE I. INTRODUCTION .................................................................................................. II. DODD-FRANK WALL STREET REFORM AND CONSUMER PROTECTION ACT ........ A. History of the Financial Crisis and Implementation of the Dodd-Frank Act .............................................................................................................. B. Durbin Amendment ................................................................................... 1. Reasonable and Proportional............................................................... 2. Considerations ..................................................................................... 3. Fraud Prevention ................................................................................. 4. Small Bank Exemption ........................................................................ 5. Final Rule ............................................................................................ III. DEBIT CARDS AND INTERCHANGE FEES ............................................................ A. Debit Card Transactions ........................................................................... B. Debit Card Market ..................................................................................... C. The Hidden Fee .......................................................................................... IV. EFFECTS ON THE PARTIES ................................................................................. A. Cost Savings for Merchants ....................................................................... B. Lost Profits on Low-Priced Items ............................................................... C. Decrease Revenue Generation for the Banks.............................................. D. Effect on Exempted Banks ......................................................................... E. Use of Other Methods of Payment .............................................................. V. SOLUTIONS ........................................................................................................ A. Leave the Durbin Amendment “As Is”—Cap on the Total Fee................... B. Repeal the Durbin Amendment—No Caps ................................................ C. No Interchange Fee .................................................................................... D. Cap the Percentage of the Transaction ...................................................... E. Double Cap: Cap Percentage of the Transaction Price and Total Interchange Fee .......................................................................................... VI. CONCLUSION ..................................................................................................... 1147 1150 1150 1150 1151 1151 1152 1152 1153 1153 1154 1156 1157 1158 1158 1159 1162 1163 1163 1164 1165 1165 1166 1167 1167 1171 I. INTRODUCTION Ignorance is not always bliss. Every day in the United States, there are over one hundred million debit card transactions completed to purchase goods or services;1 however, most consumers do not know or even care how they work–they just care that they work. This ignorance allows the card-issuing banks to charge “hidden” fees, known as interchange fees. Every time a debit card is swiped, J.D. 2014, magna cum laude, Business Law Certificate with High Honors, Florida State University College of Law; B.A., Biology and minor in Business Administration, 2011, cum laude, University of Florida. I would like to thank Professor Manual A. Utset, Jr. for his guidance and comments. I would also like to thank my family for their unconditional love and support. 1. See Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,723 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). There were 37.9 billion transactions in 2009. Id. 1148 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 fees are deducted from the amount taken out of the consumer’s bank account,2 and the remainder is deposited into the merchant’s bank account. Since, normally, neither merchants nor consumers are fully aware of the exact cost of the debit card interchange fees, the cardissuing bank can abuse these fees.3 Even though merchants are aware of the fees, they likely will not stop accepting debit cards because they need to remain competitive in the market, and because consumers want and expect to be able to use them. Before the Durbin Amendment, interchange fees were a percentage of the transaction cost and could be negotiated between the merchants and the networks, such as Visa and MasterCard.4 Obviously, larger merchants with a greater number of transactions were able to negotiate lower percentage fees than smaller merchants.5 Senator Richard Durbin and other members of Congress saw a problem with this, so they proposed an amendment to the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), seeking to “help small businesses, merchants, and consumers by providing relief from high interchange fees for debit card transactions.”6 The Durbin Amendment gave the Federal Reserve Board (Board) the rulemaking power to create regulations for debit card interchange fees so that they “shall be reasonable and proportional to the cost incurred by the issuer with respect to the transaction.”7 The Board was tasked to take into consideration the cost per transaction for the card issuer.8 The final rule adopted by the Board provides that the interchange 2. Fees are not added to the purchase price stated when the consumer swipes his or her card, but instead are deducted from the price stated, so the merchant does not get the full transaction price. See Patrick C. McGinnis, Misguided Regulation of Interchange Fees: The Consumer Impact of the Durbin Amendment, 25 LOY. CONSUMER L. REV. 285, 286 (2013). 3. This was true before and after the Durbin Amendment. See infra Part III.C. 4. See Richard A. Epstein, The Constitutional Paradox of the Durbin Amendment: How Monopolies are Offered Constitutional Protections Denied to Competitive Firms, 63 FLA. L. REV. 1307, 1315 (2011). The interchange fees were not negotiated between merchants and the card-issuing bank. Id. Networks also had the ability to create categories based on the type of merchant or the transaction volume. See Debit Card Interchange Fees and Routing, 75 Fed. Reg. at 81,723. 5. A merchant is able to negotiate the fees with its bank, and the merchant’s bank and the card-issuing bank can negotiate their fees. Interchange Myths and Facts, MASTERCARD, www.mastercard.com/us/merchant/pdf/021208 MythsFacts.pdf (last visited Apr. 6, 2014). To avoid thousands of separate negotiations, MasterCard sets “default” interchange rates. Id. 6. 156 CONG. REC. S4839 (daily ed. June 10, 2010) (statement of Sen. Richard Durbin) (“My amendment sought to give small businesses and merchants and their customers across America a real chance in the fight against the outrageously high swipe fees charged by Visa and MasterCard credit card companies.”); see also 156 CONG. REC. S3695 (daily ed. May 13, 2010) (statement of Sen. Richard Durbin). 7. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2068 (2010) (emphasis added). 8. See id.; Debit Card Interchange Fees and Routing, 75 Fed. Reg. at 81,733. 2014] DURBIN AMENDMENT 1149 fees charged cannot exceed the sum of $0.21, plus five basis points of the value of the transaction, as a fraud-prevention adjustment.9 This Note does not suggest changing the goals of the Durbin Amendment, but instead suggests an alteration to the regulations created by the Board. The regulations suggested in this Note aim to better match the Amendment’s goals of being “reasonable and proportional” while taking into consideration the card issuer’s cost per transaction. This Note suggests placing a double cap on interchange fees.10 The suggested fees would be reasonable because they would cap the total amount that can be charged based on the cost per transaction, and would be proportional because they would base the fees on a capped percentage of the purchase price. This Note does not suggest an exact value of either cap, because it would require more information to ensure that the caps capture the actual cost per transaction while taking into account the number of transactions with percentages that are potentially below the actual cost per transaction. This Note focuses primarily on the three parties participating in the two-sided market: (1) the merchant, (2) the consumer, and (3) the card-issuing bank. There are other parties involved in the debit card transfer, but their role in the realm of interchange fees is minimal.11 These three parties are in a two-sided market because the card-issuing bank’s goal is to make sure that both merchants and consumers want to use its card. This is a careful balancing act because both merchants’ and consumers’ decisions are affected by fees. If the fees are too high then merchants will not accept the card, and if merchants do not accept the card, then consumers will not want the card. Part II examines the economic background and implementation of the Dodd-Frank Act and then explains the Durbin Amendment’s key parts. Part III explains how a debit card transaction takes place and the two-sided nature of these transactions. It also discusses the hidden nature of the debit card interchange fees. Part IV discusses the effects that the Durbin Amendment has on each of the parties, including: merchants’ cost savings or lost profits on low-priced items, banks’ loss of revenue generation, the effect on exempted banks, and the possibility of switching to other methods of payment. Part V discusses the advantages and disadvantages of some potential alternatives. This Note discusses five possible alternatives to this problem: (1) leave the Durbin Amendment “as is;” (2) repeal the Durbin Amendment and return to a pre-amendment status with no regulation; (3) have no interchange fees; (4) change the Amendment 9. Debit Card Interchange Fees and Routing, 76 Fed. Reg. 43,394, 43,404 (July 20, 2011) (to be codified at 12 C.F.R. pt. 235). 10. See infra Part V.E. 11. See infra Part III.A. 1150 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 to cap the fees on the percentage of the sale; or (5) change the Amendment to cap fees on the percentage of the sale price while capping the total interchange fees. Ultimately this Note will suggest an alteration to the Durbin Amendment that caps both the fees based on a percentage of the sale price and the total amount allowed in interchange fees, so that the regulation more closely tracks the Amendment’s goal of being “reasonable and proportional.” II. DODD-FRANK WALL STREET REFORM AND CONSUMER PROTECTION ACT A. History of the Financial Crisis and Implementation of the DoddFrank Act The U.S. Government passed the Glass-Steagall Act after the Great Depression, which created banking regulations.12 However, in 1999, President Clinton repealed many of the banking regulations that were established under the Glass-Steagall Act.13 Many people believe that one cause of the 2008 financial crisis was the deregulation of the banking industry and the fact that new regulations were needed to rehabilitate the economy.14 On July 21, 2010, the Dodd-Frank Act became law.15 The DoddFrank Act’s goal, as stated in its short title, is “[t]o promote the financial stability of the United States by improving accountability and transparency in the financial system, to end ‘too big to fail’, to protect the American taxpayer by ending bailouts, to protect the consumers from abusive financial services practices, and for other purposes.”16 Whether the Dodd-Frank Act is meeting this goal is a topic for many other articles. B. Durbin Amendment A few months after the Dodd-Frank Act was passed, Senator Durbin recommended an addition, seeking to help small businesses.17 This addition can be found in section 1075 of the Dodd-Frank Act, entitled “Reasonable Fees and Rules for Payment Card Transactions,” but is commonly referred to as the Durbin Amendment.18 The 12. See McGinnis, supra note 2, at 292. 13. Id. 14. See id. at 292-93. 15. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1, 124 Stat. 1376, 1376 (2010); McGinnis, supra note 2, at 293. 16. Dodd-Frank Act § 1. 17. See 156 CONG. REC. S4839 (daily ed. June 10, 2010) (statement of Sen. Richard Durbin). 18. Dodd-Frank Act § 1075. 2014] DURBIN AMENDMENT 1151 Durbin Amendment, which took effect on October 1, 2011, adds section 920 to the Electronic Fund Transfer Act (EFTA).19 Before the Dodd-Frank Act, debit networks incorporated an ad valorem percentage to determine the interchange fees for each transaction.20 Networks also had the ability to create categories based on the type of merchant or the transaction volume.21 Before the Durbin Amendment, the average interchange fee was between 1.15% and 1.35% of the transaction cost, and averaged approximately $0.47 per transaction.22 1. Reasonable and Proportional The Durbin Amendment gave the Board the rulemaking power to create regulations “regarding any interchange transaction fee that an issuer may receive or charge with respect to an electronic debit transaction.”23 The principle provided as guidance to the Board was that the interchange transaction fees “shall be reasonable and proportional to the cost incurred by the issuer with respect to the transaction.”24 2. Considerations The Board was directed to consider the “functional similarity” between debit transactions and checking transactions that clear at par, as well as “the incremental cost incurred by an issuer for the role of the issuer in the authorization, clearance, or settlement of a particular electronic debit transaction.”25 However, the Board was not to consider “other costs incurred by an issuer which are not specific to a particular electronic debit transaction.”26 The Board requested public comment, as is required in the rulemaking process, to determine an interchange fee for debit transaction that shall be “reasonable and proportional to the cost[s] incurred.”27 19. See 15 U.S.C. § 1693 (2012); Dodd-Frank Act § 1075. 20. Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,724 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). 21. See id. at 81,723. 22. Richard A. Epstein, The Dangerous Experiment of the Durbin Amendment: Congress’ Interchange Fee Limit is a Reckless Exercise in Price Regulation, REG.: CATO REV. BUS. & GOV’T, Spring 2011, at 24, 25; CADY NORTH, BUSINESS IMPACT OF THE DODD-FRANK DEBIT FEE CAP, BLOOMBERG GOV’T STUD. 12 (Lisa Getter ed., 2011). 23. Dodd-Frank Act § 1075. 24. Id. (emphasis added). 25. Id. See infra Part III for an explanation of a check clearing at par. 26. Dodd-Frank Act § 1075. 27. Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,722 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). See infra Part II.B.1. 1152 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 The Board originally proposed two alternatives.28 Alternative one combined a cap of $0.12 per transaction and a safe-harbor level of $0.07 per transaction.29 Alternative two was simply a cap of $0.12 per transaction.30 The Board received over 11,500 comments from “issuers, payment card networks, merchants, consumers, consumer advocates, trade associations, and members of Congress.”31 The merchants suggested lowering the cap so that the savings could be passed along to consumers because the costs were significantly below the $0.12 cap.32 Merchants also suggested prohibiting exclusivity arrangements to increase competition.33 On the other hand, payment card networks, such as Visa and MasterCard, were concerned that the cap would decrease revenue for card-issuing banks, which would increase cardholder fees and decrease benefits for merchants and consumers.34 After considering all the comments, the Board adopted a modified version of alternative two.35 3. Fraud Prevention In addition, the Durbin Amendment allows the Board to create an adjustment to the interchange fees if the “adjustment is reasonably necessary to make allowance for costs incurred by the issuer in preventing fraud in relation to electronic debit transactions involving that issuer; and the issuer complies with the fraud-related standards established by the Board.”36 The goal of this addition is to encourage the card-issuing bank to take necessary actions to prevent fraud.37 4. Small Bank Exemption The Durbin Amendment does not apply to any card issuer that has less than $10 billion in assets.38 These “small issuers” will not 28. Debit Card Interchange Fees and Routing, 75 Fed. Reg. at 81,736. 29. See id. at 81,736, 81,755. 30. Id. at 81,738, 81,756. 31. Debit Card Interchange Fees and Routing, 76 Fed. Reg. 43,394, 43,394 (July 20, 2011) (to be codified at 12 C.F.R. pt. 235). 32. See id. at 43,402. 33. See id. 34. Id. 35. Id. at 43,404. 36. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2069 (2010). 37. Id.; Debit Card Interchange Fees and Routing, 76 Fed. Reg. 43,394, 43,404 (July 20, 2011) (to be codified at 12 C.F.R. pt. 235). 38. 15 U.S.C. § 1693o-2 (2012). The value of the assets was raised from $1 billion to the $10 billion in order to get enough votes. Epstein, supra note 4, at 1326; see also, M. Pierce Sandwith, Note, Debit Card Interchange Fees and the Durbin Amendment’s Small Bank Exemption, 16 N.C. BANKING INST. 223, 234-36 (2012). 2014] DURBIN AMENDMENT 1153 have to prescribe to the Board’s regulations of debit card interchange transaction fees and can instead charge whatever fee they need to or can.39 Only three credit unions and approximately sixty banks have enough assets to be affected by the Durbin Amendment, while approximately 7500 credit unions and 7000 banks are exempt.40 One reason for this exemption to the cap on interchange fees is that smaller banks have fewer transactions, and thus, they have fewer transactions across which they can spread their fixed costs.41 5. Final Rule The final rule adopted by the Board is an adaptation to alternative two and provides that the interchange fees charged cannot exceed the sum of $0.21, plus five basis points of the value of the transaction, as a fraud-prevention adjustment.42 III. DEBIT CARDS AND INTERCHANGE FEES When consumers want to purchase goods or services, they have a variety of payment options, including but not limited to: cash,43 check,44 debit card, or credit card. However, consumers are increasingly shifting to electronic payment methods such as debit and credit cards.45 This is good news for merchants, because they have an informational asymmetry problem when consumers pay with checks, 39. Sandwith, supra note 38, at 235-36. 40. Epstein, supra note 22, at 24. 41. See David C. John, The Durbin Debit Card Interchange Fee Cap Hurts Consumers, THE HERITAGE FOUNDATION (Mar. 17, 2011), http://report.heritage.org/wm3194. 42. See Debit Card Interchange Fees and Routing, 76 Fed. Reg. 43,394, 43,404 (to be codified at 12 C.F.R. pt. 235). See supra Part II.B for a more detailed explanation of the Durbin Amendment. 43. In cash payments the purchaser provides the merchant with cash equal to the amount of purchase price. The risk that the merchant will not get paid does not exist here because goods and services are not exchanged without the full value of the cash unless otherwise agreed upon (under certain circumstances such as contracts or the delivery of goods, payment might not be tendered until after the goods are received). The downside of cash payments for merchants is there is a risk of theft from employees or outsiders. Additionally, the payments are not automatically deposited, so the merchant or merchant’s employees have to manually transfer the cash to the merchant’s bank. 44. In a check payment, the purchaser provides a check for the amount of the purchase price. After the merchant receives the check, the merchant has to manually transfer the checks to the merchant’s banks because the deposit is not automatic. In the past few years there have been improvements in check depositing, such as being able to deposit checks by using the camera on your mobile phone. See, e.g., Press Release, Sun National Bank, Sun National Bank Launches SunMobile Deposit (Oct. 8, 2013), available at http://online.wsj.com/article/PR-CO- 20131008-906737.html. This only eliminates the deposit problem and not the risk of adequate funds. Furthermore, check writing is timeconsuming and will slow down the checkout process, which may lead to merchants needing to staff more employees. See Epstein, supra note 4, at 1317. 45. Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,723 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). 1154 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 since merchants have no information about the consumers’ financial positions.46 Additionally, consumers often make larger purchases with debit cards and credit cards than they would with cash.47 Checks normally clear “at par,” and therefore, the merchant receives the full value of the check without fees.48 On the other hand, credit and debit cards both have interchange fees, but these higher fees are paid in exchange for greater merchant and consumer benefits, such as convenience and assuring the merchant that there are available funds.49 Merchants are essentially paying for the option to have more information about the consumers’ financial positions, and to avoid making irreversible decisions without having all of the information.50 Both debit cards and credit cards also eliminate the hassle and risk of having and processing cash or check payments.51 A. Debit Card Transactions Debit card usage has rapidly increased since the mid-1990s and is the fastest-developing form of electronic payment.52 The Durbin Amendment defines a debit card as “any card, or other payment code or device, issued or approved for use through a payment card network to debit an asset account (regardless of the purpose for which the account is established), whether authorization is based on signature, PIN, or other means.”53 46. In check transactions, the merchant assumes the risk that there might not be enough money in the checking account to cover the cost of the purchase. See Epstein, supra note 4, at 1317. The merchant also has no additional knowledge about the consumer’s financial position; therefore, the merchant has less information in these transactions than it does in debit card transactions. Id. 47. John, supra note 41, at 1. 48. Epstein, supra note 4, at 1316. At first glance, it seems like merchants would prefer paying zero fees. However, there are some added risks, one being that the merchant bears the risk that there might not be sufficient funds to cover the cost of the purchase, and another being that the merchant takes this risk without any knowledge of the consumers’ financial status. Id. at 1316-17. 49. Epstein, supra note 22, at 29. Often the fees for credit cards are higher than the debit card fee because the benefits for credit card users are generally greater. Id. 50. This is very similar to other option agreements or contracts because merchants are purchasing the option to get more information before making a decision. See BLACK’S LAW DICTIONARY 544 (4th pocket ed. 2011) (defining option agreement as “[a] share-transfer restriction that commits the shareholder to sell, but not the corporation or other shareholders to buy, the shareholder’s shares at a fixed price when a specified event occurs”). 51. See supra notes 43-44. 52. Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,723 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). 53. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2073 (2010). 2014] DURBIN AMENDMENT 1155 Most debit card transactions are processed in the following manner, commonly referred to as the “open-loop” or “four-party” system.54 The parties in this system are: the consumer; the merchant; the merchant’s bank; the debit card network (e.g., Visa or MasterCard); and the entity that issued the debit card to the consumer, that is, the card-issuing bank.55 When a debit card is swiped, the consumer’s identity and bank account information is made available; however, a signature or a personal identification number (PIN) is needed to initiate the transaction.56 The transaction information is then sent to the merchant’s bank.57 If the transaction is authorized, then the merchant’s bank sends the transaction information to a debit-card network.58 This debit-card network connects the merchant’s bank with the consumer’s bank.59 A network is used to relay information through the bank that issued the consumer’s debit card.60 The consumer’s bank then verifies that there are sufficient funds and that the card has not been reported lost or stolen.61 If there is enough money in the consumer’s debit account, then notice of a complete transaction is sent to the merchant through the processors, and the purchase is finalized.62 The consumer’s bank then transfers the transaction amount from the consumer’s account to the merchant’s account; however, the card-issuing bank assesses interchange fees and other processing fees at this point.63 The bank that issued the consumer’s debit card will transfer the funds to the merchant’s account at the merchant’s bank.64 The merchant will pay their bank for interchange fees and other processing charges at a later time.65 Merchants pay three types of fees: (1) to their bank; (2) to card companies, e.g., Visa and MasterCard; and (3) to the card-issuing 54. This Note focuses on the four-party, or open-loop system; however, it is important to acknowledge that there is a less commonly used “three-party” or “closed-loop” system. See Debit Card Interchange Fees and Routing, 75 Fed. Reg. at 81,723, n.6. The three-party system is different because the merchant and consumers contract directly with the network, instead of the network setting the fees. See Lisa Farrell, A Step in the Right Direction: Regulation of Debit Card Interchange Fees in the Durbin Amendment, 15 LEWIS & CLARK L. REV. 1077, 1082 (2011). 55. Debit Card Interchange Fees and Routing, 75 Fed. Reg. at 81,723. 56. NORTH, supra note 22, at 8. 57. Id. 58. Id. 59. Id. 60. Id. 61. Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,723 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235). 62. NORTH, supra note 22, at 8. 63. See id. The card-issuing bank takes the interchange fee before transmitting to the merchant’s bank, so the merchant does not receive the full value of the transaction. Id. 64. McGinnis, supra note 2, at 288. 65. NORTH, supra note 22, at 8. 1156 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 bank, i.e., the consumer’s bank.66 These fees are often one of the largest portions of merchants’ costs of doing business.67 The Durbin Amendment only regulates the interchange fees to the consumer’s card-issuing bank.68 In an open-loop system, the interchange fees are set by the debit card-issuing bank69 and are often the largest portion of the fees for each transaction.70 The debit card-issuing bank and the merchant’s bank both receive a portion of the fees.71 Under their contractual obligations to networks such as Visa and MasterCard, merchants are not allowed to assess a surcharge on consumers who use debit cards or credit cards instead of other payment methods.72 The consumer does not directly see the effects of the interchange fees; instead, the fees are incorporated into the price of the goods or services as a cost to the merchant.73 B. Debit Card Market Electronic payment tools such as debit cards and credit cards operate in a two-sided market.74 A two-sided market occurs during a three-party transaction, when the middle party has an incentive to make sure that the other two sides want to do business together.75 “[T]he ability to satisfy one side of the market depends on the continued participation of the other.”76 In debit card transactions, cardissuing banks need both merchants to accept and consumers to use debit cards in order to stay in business. Merchants will not accept a company’s debit card if the fees are too high or if there are no consumers using that company’s card. Conversely, consumers will not obtain or use a company’s card if few merchants accept it or if the 66. Id. 67. Gregory D. Wasson, the CEO of Walgreens, stated that interchange fees are his company’s fourth-largest cost after salaries, mortgages and rent, and healthcare. Epstein, supra note 22, at 24. 68. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2068 (2010). 69. See Debit Card Interchange Fees and Routing, 75 Fed. Reg. 81,722, 81,723 (proposed Dec. 28, 2010) (to be codified at 12 C.F.R. pt. 235); John, supra note 41, at 1. 70. Farrell, supra note 54, at 1083. 71. Id. 72. Id. Merchants can increase the cost of their goods or services and therefore spread the cost of these fees among all payment methods. 73. See id. 74. See id. at 1087. 75. Epstein, supra note 4, at 1323. Examples of two-sided market scenarios include the following: (1) Newspapers put a greater-cost burden on advertisers because advertisers will only purchase ads if enough people read the newspaper, so the cost for readers has to be lowered to encourage more readers, Marc Rysman, The Economics of Two-Sided Markets, 23 J. ECON. PERSP. 125, 128 (2009); and (2) Groupon tries to match businesses with customers, and typically, the fees are borne by the businesses, Epstein, supra note 4, at 1324. 76. Epstein, supra note 22, at 26. 2014] DURBIN AMENDMENT 1157 fees are too high.77 Therefore, card-issuing banks have to carefully balance the interests of both parties when setting the amount of fees and when determining who will bear the burden of those fees.78 In most two-sided markets, the fees are not shared equally.79 Typically, the party that is inelastic, i.e., less sensitive to changes in price, will pay a greater portion of the costs.80 A merchant’s demand for consumers is often less sensitive to changes in price than a consumer’s demand for the goods and services provided by the merchants.81 Therefore, merchants are more likely to bear a majority of the costs associated with interchange fees. C. The Hidden Fee The debit card interchange fee is similar to a “hidden tax.”82 The card-issuing banks are able to generate revenue with very little detection, because normally, neither the merchant nor the consumer is fully aware of how much these fees cost since they are not billed separately to the merchant but instead are deducted from the amount deposited into the merchant’s account.83 Regulations such as the Durbin Amendment protect merchants from these hidden fees. The consumer does not directly see the cost of the interchange fees; instead, it is incorporated into the price of the goods or services because it is a cost to the merchant.84 This is similar to a hidden tax for consumers, because if they are unaware of these fees, their spending and use of the card is not affected by the price of the interchange fee.85 However, if the listed prices are higher because of this additional merchant cost, then the consumer might be less likely to base a purchase on the sticker shock than if the fee was added on at the register.86 This is basic supply-and-demand economics: if the price is 77. See e.g., NORTH, supra note 22, at 15; McGinnis, supra note 2, at 301. 78. See Epstein, supra note 4, at 1323. For example, online dating services want to have an equal number of men and women, so they charge lower prices to women to attract more of them, because women are less likely to join an online dating service than men. Id. at 1324. 79. Id. 80. Id. The Ramsey pricing principle states that a price should be set so that the price-marginal cost margins are inversely related to the sensitivity of demand to the price; and thus, that more revenue will be recovered from the side with a more inelastic demand. ORG. FOR ECON. CO-OPERATION & DEV. [OECD], POLICY ROUNDTABLES: TWO-SIDED MARKETS 12-13, 25 (2009), available at http://www.oecd.org/daf/competition/44445730.pdf. 81. Epstein, supra note 22, at 26. 82. See generally Brian Galle, Hidden Taxes, 87 WASH. U. L. REV. 59 (2009) (explaining that a hidden tax is a tax that goes unnoticed by those who pay them). 83. NORTH, supra note 22, at 8; McGinnis, supra note 2, at 288. 84. See Farrell, supra note 54, at 1083. 85. See Galle, supra note 82, at 75-77. 86. See Raj Chetty et al., Salience and Taxation: Theory and Evidence, 99 AM. ECON. REV. 1145, 1146 (2009). 1158 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 higher, fewer consumers will demand the good or service; however, if the consumer is ignorant of the higher price—because it is hidden— then it may not affect the demand.87 Since the interchange fees are taken out of the amount deposited into the merchant’s bank account, merchants may be unaware of the exact cost of these fees, unless they calculate the fees themselves. The merchants never see a bill with the total cost of the interchange fees.88 This might explain why the cost savings post-Durbin Amendment may not have been passed along to the consumer. The hidden nature of the interchange fees is beneficial for the card-issuing banks because they are able to generate revenue without negative effects from either side of the two-sided market. When banks attempt to issue more obvious fees, they often lose consumers to other methods of payment.89 IV. EFFECTS ON THE PARTIES Senator Durbin and other members of Congress saw a problem with the debit card interchange fee, so they enacted the Durbin Amendment to help small businesses.90 It remains unclear whether the Amendment actually helps small businesses;91 however, it does affect all three parties—the merchants, the consumers, and the card issuers—in a variety of ways. These effects are interesting because of the nature of the two-sided market; i.e., something that affects one party will also affect one of the other parties.92 Keeping merchants and consumers in the market, while simultaneously allowing the card issuer to make a profit, is a careful balancing act. This Note will discuss a few of the big issues and then explain the interwoven effects on the parties involved. A. Cost Savings for Merchants In an ideal world, merchants would pass their cost savings along to consumers; unfortunately, the real world is more complicated than that. Merchants save over $8 billion per year with the Durbin 87. See, e.g., Galle, supra note 82, at 75-77. 88. See supra Part III.A. 89. On September 29, 2011, Bank of America and other major banks announced a $5 monthly fee for debit cards, but due to consumer outrage, the banks had to abandon the plan about a month later. NORTH, supra note 22, at 9. 90. 156 CONG. REC. S4839 (daily ed. June 10, 2010) (statement of Sen. Richard Durbin). 91. See e.g., McGinnis, supra note 2, at 285. 92. See supra Part III.B. 2014] DURBIN AMENDMENT 1159 Amendment interchange fees.93 If merchants do not pass these savings along to consumers, then consumers lose on both ends because the banks have to make the lost revenue up by charging additional fees or by cutting services.94 A decrease in debit card interchange fees would be good for the economy if the savings were passed along to the consumers and if consumer spending increased. Scholars and analysts disagree on whether the savings are being passed along to consumers. Some say that merchants are holding on to the $8 billion in savings they received from the Durbin Amendment,95 while others argue that the savings are being passed along to consumers.96 It is possible that merchants are unaware of their cost savings, which would explain why they have not lowered their prices.97 There is also a possibility that card issuers will raise the interchange fees on credit cards because they are currently unregulated by the Durbin Amendment.98 If these fees increase, there may not be any cost savings for merchants to pass along to consumers.99 B. Lost Profits on Low-Priced Items While high-priced items will create cost savings for merchants with regard to the interchange fees, low-priced items will cost merchants more in fees.100 Merchants that sell items worth less than $20 will actually pay higher interchange fees than they were paying be- 93. Vicki Needham, Report: Businesses Passing on Swipe Fee Savings to Consumers, THE HILL (Oct. 1, 2013, 5:16 PM), http://thehill.com/blogs/on-the-money/banking-financialinstitutions/325851-report-businesses-passing-on- swipe-fee-savings-to-consumers. This also means that banks are losing $8 billion in revenue. See infra Part IV.C. 94. See infra Part IV.C. 95. The Durbin Effect: Two Years Later, Consumers Still Not Benefitting from Durbin Amendment, ELEC. PAYMENTS COAL., http://wheresmydebitdiscount.com/the-durbin-effect/ (last visited Apr. 6, 2014). This article, however, cites a survey that looks at low-cost items, such as milk, peanut butter, a hammer, and a Slurpee, to illustrate that the cost savings have not been passed along. This is flawed logic because low-priced items have a higher burden with the post-Durbin Amendment interchange fees than they did before the Durbin Amendment. 96. Vicki Needham, Retailers File Appeal Over Credit Card Swipe Fee Settlement, THE HILL (Jan. 2, 2014, 6:19PM), http://thehill.com/policy/finance/194318-retailers-file-appealover-credit-card (quoting Mallory Duncan, Senior Vice President and General Counsel of the National Retail Federation). 97. See supra Part III.C. There are also a lot of other factors that could explain the increase in prices above inflation, such as an increase in other costs or an increase in demand for a good or service. 98. Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2068 (2010). 99. This also suggests that if fees and costs can be shifted to credit card interchange fees, then the mere regulation of debit card interchange fees is a frivolous task; therefore, it would be beneficial to also regulate the credit card interchange fees, but this idea extends beyond this Note. 100. See infra Table 1. 1160 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 fore the Durbin Amendment.101 Approximately 20% of all debit card purchases are for low-priced items.102 These small-ticket sales come from coffee shops, convenience stores, fast food restaurants, and other merchants that sell items or services worth less than $20. Before the Durbin Amendment, there was special pricing for merchants with low-cost items; however, after the Durbin Amendment, the networks set interchange fees at the maximum amount allowed.103 Therefore, instead of using the ad valorem interchange fee, the maximum of $0.21, plus fraud prevention, is being charged.104 As illustrated in Table 1, when the transaction cost is below approximately $20, merchants are actually paying more in interchange fees than they were before the Durbin Amendment. Table 1: BEFORE DURBIN AMENDMENT AFTER DURBIN AMENDMENT – FEE CAP AFTER DURBIN AMENDMENT – FEE CAP PLUS FRAUD PREVENTION MERCHANT SAVINGS OR (COSTS) Interchange fee of 1.15% per transaction 105 Interchange fee of $0.21 per transaction Interchange fee of $0.21 per transaction plus 0.05% Fee Before minus Fee After plus Fraud Prevention $1 $0.0115 $0.21 $0.2105 ($0.119) $5 $0.0575 $0.21 $0.2125 ($0.155) $10 $0.115 $0.21 $0.215 ($0.1) $20 $0.23 $0.21 $0.22 $0.01 $25 $0.2875 $0.21 $0.2225 $0.065 $38106 $0.437 $0.21 $0.229 $0.208 $50 $0.575 $0.21 $0.235 $0.34 $100 $1.15 $0.21 $0.26 $0.89 PRICE OF TRANSACTION 101. See id. 102. Dakin Campbell & Donal Griffin, Visa, MasterCard Risk “Mom and Pop” Ire with Debit-Fee Increase, BLOOMBERG (Sept. 23, 2011), http://www.bloomberg.com/news/2011-0923/visa-mastercard-risk-mom-and-pop-ire-with-debit-fee-increase.html. 103. Sandwith, supra note 38, at 241-42. 104. See e.g., Visa U.S.A. Interchange Reimbursement Fees, VISA 2-3, 7-8 (Apr. 20, 2013), http://usa.visa.com/download/merchants/visa-usa-interchange-reimbursement-feesapril2013.pdf. 105. NORTH, supra note 22, at 6. This is just one example of the average interchange fee. Another source stated the average interchange fee was 1.35%. Epstein, supra note 22, at 25. 106. The average purchase price for all debit transactions is $38. NORTH, supra note 22, at 12. 2014] DURBIN AMENDMENT 1161 BEFORE DURBIN AMENDMENT AFTER DURBIN AMENDMENT – FEE CAP AFTER DURBIN AMENDMENT – FEE CAP PLUS FRAUD PREVENTION MERCHANT SAVINGS OR (COSTS) $250 $2.875 $0.21 $0.335 $2.54 $500 $5.75 $0.21 $0.46 $5.29 PRICE OF TRANSACTION Companies like Redbox and Starbucks that sell low-priced items have had to raise prices to cover the increase in debit interchange fees for their products and services.107 Redbox states the following on its website regarding its increase in prices: “The increase is a result of rising operational costs, including increased debit card fees.”108 Redbox raised the daily rental price from $1 to $1.20 because of the increased fees. Redbox is also an interesting example because its business plan requires the use of a debit or credit card for all purchases, so it cannot offset the increased costs by setting a minimum transaction price or by switching to other payment methods. Instead, Redbox has to pass the costs along to its consumers.109 Businesses such as coffee shops, dollar stores, and convenience stores could offset some of the higher fees by utilizing the minimum-purchase-price-per-transaction. Merchants can now require a minimum purchase before allowing a consumer to use a credit card or debit card.110 Before the DoddFrank Act, merchants would have been penalized for such requirements.111 Ideally, this would allow merchants to offset some of the added costs of accepting debit cards for low-cost purchases. However, merchants do not want to discourage consumers from making purchases, so merchants have little choice but to accept debit cards in order to remain competitive.112 This forces merchants to pay the fees, especially with respect to companies with products and services worth less than $20.113 Companies, such as Redbox, with business models that require the use of a debit card or credit card, and without the ability to use a minimum purchase price to offset the higher interchange fees, cannot easily offset the added costs without raising prices. 107. General Questions: Price Change, REDBOX, http://www.redbox.com/pricechange (last visited Apr. 6, 2014). There is speculation that Starbucks increased the price of some of its items due to the increased interchange fees. See Willy Staley, Starbucks Price Hike: Could Debit Interchange Be the Culprit?, MY BANK TRACKER (Jan. 9, 2012), http://www.mybanktracker.com/news/2012/01/09/why-did-starbucks-raise-price/. 108. General Questions: Price Change, REDBOX, http://www.redbox.com/pricechange (last visited Apr. 6, 2014). 109. Id. 110. NORTH, supra note 22, at 12. 111. Id. 112. Epstein, supra note 4, at 1319. 113. Id. 1162 FLORIDA STATE UNIVERSITY LAW REVIEW [Vol. 41:1147 C. Decrease Revenue Generation for the Banks The Federal Reserve estimates that banks will lose around $8 billion annually due to the current interchange fees, assuming there is no change in debit card usage.114 This is approximately half of the roughly $16 billion that banks made in 2009.115 Card-issuing banks will want to make up for the lost revenue in other ways. Not only are the banks making less in interchange fees than they made in previous years, but these fees may not fully cover the cost per transaction, because the Federal Reserve used a narrow definition of which costs to consider when determining the cap.116 Card issuers can make up for their lost revenue by: (1) adding fees in other places, (2) cutting back on rewards programs, (3) imposing an annual fee, (4) raising other fees, or (5) lowering interest rates on deposits.117 However, the card issuers have to be careful with how they generate this revenue because they do not want to upset the careful balance of this two-sided market.118 Card issuers will have a more difficult time imposing other nonhidden fees.119 For example, on September 29, 2011, Bank of America announced a $5 monthly fee for debit cards