Public schools and libraries in the U.S. can save a lot of money on Internet service by applying for the Schools and Libraries Program, a federal subsidy better known as E-Rate.
E-Rate funding, capped yearly at $3.9 billion, helps eligible institutions cover costs of Internet service. Participants can save anywhere from twenty to ninety percent of their Internet expenses—the precise amount being dictated by the economic standing of both the participating institution and the school district where it is located.
E-Rate and three other programs are part of the Universal Service Fund (USF), a system of subsidies born out of the Telecommunications Act of 1996 as a way to ensure affordable telecom rates across the country. Although the Federal Communications Commission (FCC) oversees the USF, the fund is managed by a nonprofit corporation called the Universal Service Administrative Company (USAC).
Detailed information on how to apply for E-Rate can be found in the Schools and Libraries Program overview. Basically it works as a bidding process. An applicant fills out FCC Form 470, requesting specific services, and submits it to the USAC. The USAC then issues an RFP for telecom providers who want to bid for the requested services. After 28 days, the applicant can study the bids. When it selects one, it requests E-Rate funding by filing FCC Form 471 within a deadline set by the FCC (for FY2016 it is May 26).
The discount rate is generally determined by the size of the population, in the applicant’s school district, that qualifies for the National School Lunch Program. The applicant must also file Form 486, listing services for which funds are requested and ensuring compliance with the Children’s Internet Protection Act.
There are limits to what E-Rate can cover. The applicant is solely responsible for end-user equipment, like hardware and software, and also for any non-discounted portions of Internet services.
While it is a great opportunity to save money, E-Rate isn’t a free-for-all. To discourage abuse and misuse of the program, the FCC requires applicants to comply with a series of rules, notably:
- Compliance with state and local law. It’s not enough to follow the FCC standards only.
- Applicants cannot seek discounts for services not requested. In other words, services listed on Form 471 must match (or not exceed) services requested on Form 470.
- Fair, competitive bidding. Applicants are responsible for ensuring an open, fair, and competitive bidding process to select the most cost-effective provider.
- Document retention. Applicants must save all competing bids for services to demonstrate they selected the most cost-effective bid, with price being the primary consideration. Records should be kept for at least ten years after the last date of service delivered.
- CIPA compliance. Applicants must confirm compliance with the Children’s Internet Protection Act, which requires schools and libraries that receive federal funding to employ Internet filters that protect children from harmful content.
In spite of these rules, the wealth of funds in the E-Rate program can attract abuse. In response, the FCC created the USF Strike Force in 2014 and tasked it with combatting waste, fraud, and abuse of the USF programs. Federal agents have shown that they are serious about investigating alleged abuses. One widely publicized case in Ramapo, NY, recently led to several raids. We will look at that case and others like it in upcoming posts.
Does the federal government have the right to seize a domain name without notice? With growing frequency, the feds have seized the domain names of thousands of websites for alleged criminal wrongdoing. The latest example is the seizure earlier this week of 67 website domain names for the alleged illegal sale and distribution of counterfeit and prescription drugs.
There still is little information publicly available on the recent seizure. The Justice Department issued a short new release with a statement from U.S. Attorney Bill Nettles, in which he noted,
It’s important for consumers to understand the significant risks involved in purchasing pharmaceutical drugs from these websites. The generic versions of these prescription drugs are not approved by the Food and Drug Administration and cannot be distributed in the United States legally. To be safe and effective, prescription drugs must be taken under the care and supervision of appropriate health care professionals; not purchased off the internet from unknown and unregulated foreign sources.
Whether or not the sites facilitated the alleged criminal behavior remains to be decided by a judicial proceeding (if the case ever gets to that point). Federal agents can obtain a seizure order based merely upon probable cause set forth in an affidavit. That’s a relatively low bar considering the consequences of domain name seizures.
The only recourse for the sites at this point is to file a petition with a federal court to contest the forfeiture. Contesting a forfeiture is an uphill—and oftentimes protracted—battle. In the meantime the businesses operating through those domain names are effectively shut down, if the seized websites were their main channel of business. Once the feds carry out a domain name seizure, the “offending” sites will show a seizure banner notifying any visitors that the domain name has been seized by federal authorities for violations of federal laws. No business can be done on the site and the chances of visitors returning are slim.
So how is it okay for a domain name to be seized based on the allegation of a crime, before proper notice and hearing? The feds are taking advantage of a process known as an in rem proceeding, whereby they can file suit against the offending property itself for its alleged role in facilitating criminal conduct. Typically in rem proceedings are filed against tangible assets like a car involved in a drug deal or a bank account used to funnel illegal funds. But in recent years, in rem proceedings have been used by both state and federal agencies against domain names in order to crack down on alleged criminal behavior carried out through the websites. Examples include (1) the Justice Department’s “In Our Sites” operation in which it seized the domain names of thousands of sites accused of violating U.S. copyright laws and (2) the state of Kentucky’s attempt to seize 141 domain names of online poker sites.
Despite the increasing use of pretrial domain name seizures, the legality is still hotly debated by civil liberties groups, free market advocates, and international organizations. These groups raise constitutional concerns, such as due process and restraint on free speech, as well as jurisdictional concerns, such as federal or state authority to reach domain names owned by foreign individuals or entities. The biggest issue is that an in rem proceeding is inappropriate against domain names because a domain name is not property – it is a contractual right that, as such, should not be subject to seizure. We will discuss these concerns in more detail in a coming post once we learn more about the Justice Department’s recent actions against the 67 pharmaceutical domain names.
There are limits to what the government can take from you. The Supreme Court recently ruled that the Constitution forbids the government from freezing a defendant’s “untainted” assets in advance of prosecution. The ruling is a significant victory for those caught in the government’s crosshairs. It is also a significant victory for a traditional concept of justice, which prefers to err on the side of the accused over government agents.
In its decision in Luis v. U.S., the high court agreed with a criminal defendant who argued that her Sixth Amendment right to counsel was violated when the government froze assets unrelated to allegedly criminal behavior. Without access to those funds, the defendant would be unable to retain the attorney of her choice.
The Court considered the government’s interest in preserving funds to pay restitution and criminal penalties, but concluded that a defendant’s right to counsel is “fundamental,” outweighing any interest the government mightultimately have: “[The government’s] interests are important, but — compared to the right to counsel — they seem to lie somewhat further from the heart of a fair, effective criminal justice system.”
In a 5-3 ruling, the Court based its decision on this balancing test, as well as on traditional understandings of common law, which distinguish between assets directly related to alleged criminal behavior and assets considered “innocent” or untainted. The Court found no legal precedent to authorize “unfettered, pretrial forfeiture of the defendant’s own ‘innocent’ property.” Moreover, the Court highlighted concerns that the government’s position has no obvious stopping point and could erode defendants’ right to counsel considerably.
Encroaching on the Sixth Amendment is but one of the several concerns posed by the government’s growing love of forfeiture — it has become too handy of a tool in prosecutors’ pockets — but it is perhaps the gravest concern, as it threatens an individual’s ability to effectively defend him or herself. It puts defendants at a significant disadvantage: they want to obtain the best representation they can afford in order to defend themselves, but they may not be able to afford any if the government freezes all their assets in the hope of confiscating them after a conviction. They may be left begging friends and family to help fund their defense or relying upon overburdened public defenders to represent them. The government’s tactic is the courtroom equivalent of inviting an opponent to a boxing match and then tying one hand behind his back.
The criminal defense bar has decried government’s overuse of asset forfeiture for years. While the government has argued that pre-trial asset seizure is justified in order to preserve its ability to recover funds and penalties, the process has been used to try to deter behavior by making an example of people. Moreover, pre-trial asset seizure looks a lot like presumed guilt, as opposed to presumed innocence. The occasional constitutionally minded congressional representative has tried to curb forfeiture overuse through legislative initiatives, but these bills keep getting left to die in committees and subcommittees. It is nice to see some effective limits placed on the practice by the Court.
Justice Thomas, in a concurring opinion, took issue with Justice Breyer’s opinion “balancing” the state’s interest against individuals’ constitutional rights. He argued the Sixth Amendment prevents the government from seizing untainted assets, period; there is no need to consider a balancing approach. But at least the plurality of the Court recognized that, when balancing the government’s interests in the outcome of a case against the individual’s right to adequately defend him or herself, you should err on the side of the individual.
If that means the state sometimes loses out on full satisfaction of a monetary judgment, that is preferable to defendants being prevented from mounting an effective defense. More wrongful convictions would result from that policy, and the seizure of a few more dollars from the truly guilty would be no consolation. If there is any question whether historically we have favored individual rights over the state’s interests in criminal prosecutions, look only to the Bill of Rights. Justice demands that if anyone’s hand is to be tied in the courtroom, it should be the hand of the government.
FBI Director James Comey took a rare break from the posturing typical of investigators and prosecutors in the current showdown between Apple and the FBI. While prosecutors argue that Apple’s privacy concerns are a smokescreen to avoid “assist[ing] the effort to fully investigate a deadly terrorist attack,” Comey posted a statement over the weekend in which he took the position that the tension between security and privacy “should not be resolved by corporations that sell stuff for a living. It also should not be resolved by the FBI, which investigates for a living. It should be resolved by the American people deciding how we want to govern ourselves in a world we have never seen before.”
Comey’s statement highlights a crucial problem with the development of privacy law: it often is developed in the context of important criminal cases. This comes at a real cost. We all know that Syed Farook committed a horrific crime, and any rights he once had against government searches are now forfeit. But though Apple may have chosen to serve as a limited proxy for its consumers in the San Bernardino case, often the interests of private citizens are wholly absent from the courtroom (or, often, judge’s chambers) when issues of fundamental privacy are debated.
This leads to a serious imbalance: Apple is talking about the diffuse privacy rights of its consumers and the risks of potential incursions by more restrictive, less democratic governments such as China. On the other hand, Manhattan District Attorney Cyrus Vance can point to 175 Apple devices that he cannot physically access even though those devices may contain evidence helpful to the government.
New York Police Commissioner Bill Bratton and one of his deputies put an even finer point on it in an Op-Ed in The New York Times, citing a specific case of a murder victim in Louisiana (more than one thousand miles outside of Mr. Bratton’s jurisdiction) whose murder is unsolved because officers cannot unlock her iPhone, which is believed to contain her killer’s identity. “How is not solving a murder, or not finding the message that might stop the next terrorist attack, protecting anyone?” asks Bratton.
But in assuming that private citizens have no greater fear than whether the police can investigate and prevent crimes, Bratton begs the question. In reality, citizens may see law enforcement as a threat of itself. Learning that the NSA was engaging in comprehensive warrantless surveillance likely has given many law-abiding Americans a greater incentive to protect their data from being accessed by the government. Indeed, in light of the NYPD’s record over the last few years—including a finding by a federal judge that they were systematically violating the rights of black New Yorkers and a lawsuit over religion-based spying on Muslims—it is not hard to see why citizens might want protection against Bratton’s police force.
But even if the police were the angels they purport to be, opening a door for a white hat can easily allow access to a black one. Less than a year ago, hackers used a “brute force” approach to exploit a flaw in iCloud’s security, and dozens of celebrities had their private photos shared with the world. These sex crimes are all but forgotten in the context of the San Bernardino shootings, even though the security weakness the FBI wants installed in Farook’s iPhone is markedly similar to that exploited with respect to iCloud.
Nor do those who wish for privacy need to invoke hackers or criminals. A private, intimate moment with a spouse or loved one; a half-finished poem, story, or work of art; or even a professional relationship with a doctor or mental health professional cannot exist unless they can remain private. Once these interactions took place in spoken, unrecorded conversations or on easily discarded paper; now many of our daily activities are carried out on our mobile devices. Even if one has nothing to hide, many citizens might balk at the prospect of having to preserve their private conversations in a format readily accessible by the police.
But if Mr. Comey has shown unusual insight, Mr. Bratton’s one-sided, myopic question illustrates the importance of Apple’s position and the inability of law enforcement officials to be objective about the interests at stake. Police and prosecutors are not always your friends or your defenders. Their goals are—and always will be—investigating and solving crimes and convicting suspected criminals. The less an officer knows, the harder it will be to investigate a case. As a result, privacy rights—even when asserted by innocent, law-abiding citizens—make their job more difficult, and many officers see those rights as simply standing in their way.
This is hardly news. Nearly sixty years ago the Supreme Court observed that officers, “engaged in the often competitive enterprise of ferreting out crime,” are simply not capable of being neutral in criminal investigations. For precisely that reason, the Fourth Amendment requires them to seek approval from a “neutral and detached magistrate” before a search warrant may issue.
That is why Mr. Comey’s acknowledgement that the FBI is not a disinterested party is so refreshing. Pro-law-enforcement voices have been clamoring to require Apple to compromise the security it built into the iPhone, invoking their role as public servants to buttress their credibility. But when it comes to privacy, the police do not—and cannot—represent the public interest. As Comey acknowledged, they are “investigators,” and privacy rights will always stand as an obstacle to investigation.
As a matter of course, federal prosecutors often pile on charges in order to strong-arm defendants into entering a favorable guilty plea quickly. Those who exercise their jury trial right and put the government to its proof often receive harsh sentences based on these overreaching indictments. But last week, a federal judge in Oklahoma took a rare stand against this practice.
United States v. King, a fifty-nine-defendant prosecution, appeared to be following the typical pattern. Though the only unlawful conduct seemed to be violations of the payment-processing provisions of the Unlawful Internet Gaming and Enforcement Act (“UIGEA”), the government had charged the defendants with gambling, money laundering, and even racketeering offenses carrying lengthy prison sentences. Several defendants entered favorable guilty pleas, likely because of sticker shock at the relevant sentencing guidelines.
However, many other defendants chose to go to trial and several jury trials were held before the Honorable Stephen P. Friot, resulting in convictions on one or more counts. Having given up their chance for a favorable plea, it appeared that those who went to trial would be sentenced harshly under laws intended to combat organized crime. But before sentencing, Judge Friot took the unusual step of issuing “Preliminary Findings and Comments with Respect to Sentencing” in which he took a critical eye to typical charging and sentencing practices.
Judge Friot’s focus was the requirement under federal law that a sentence be “sufficient, but not greater than necessary,” to punish offenders and deter future crimes. To give meaning to this vague standard, Judge Friot took the unusual step of quoting from a letter that was written by the jury foreman in one of the trials, who said:
The way I look at it, with all the “legal” sports gambling that goes on the U.S.[,] coupled with the fact that no one was physically harmed and nobody was forced to place bets, I see no threat to society by allowing both Mr. Dorn and Mr. Korelewski [sic] to avoid prison time. I truly believe that our taxpayer money is better spent on these “criminals” by allowing them the opportunity to make a legal living outside of prison walls. I strongly support some sort of deferred sentence or probation.
Though Judge Friot said that this letter was not “determinative,” he also refused to rely on the government’s charging decisions in deciding how to sentence those convicted, focusing instead on “the real conduct that should be punished.” He concluded by saying that he was “particularly interested in what the government may have to say about” why those particular defendants should be imprisoned. In light of this skepticism, it is not surprising that his subsequent sentences were for probation or time served, not further imprisonment.
The ability of prosecutors to charge minor offenses as if they were serious crimes often turns the constitutional right to a jury trial into a very risky proposition. Judge Friot’s thoughtful opinion recognizes that even if defendants can be punished for their role in unlawful gambling, they should not be penalized for the decision to roll the dice before a jury.
A Canadian federal court recently released an opinion holding that meta tags, at least in some circumstances, are not entitled to copyright protection. Although the precedent is not binding in American courts, the well-reasoned opinion provides an excellent logical analysis on why meta tags may or may not be afforded copyright protection.
In Red Label Vacations Inc. v. 411 Travel Buys Limited, the plaintiff travel business implemented meta tags including its registered trademarks: “redtag.ca,” “redtag.ca vacations,” and “Shop. Compare. Payless!! Guaranteed.” The defendant is a competing travel business in the Canadian market. In 2009, Red Tag experienced a drop in sales and noticed that search engine results for its company were returning results for its competitor, 411 Travel Buys. Upon further inspection, Red Label found that 411 had apparently copied its metadata including content, ordering, and misspellings. Red Label informed 411 of the violation and 411, being Canadian, immediately removed the content. Nevertheless, Red Label brought suit for lost profits during the period it was active.
In analyzing the duplicated meta tags, the court concluded that the tags were substantially derived from a list of Google keywords which were incorporated into phrases describing travel. The court held that there was little evidence of any degree of skill, judgment, or creativity in creating the meta tags at issue in the case. The court noted that there may be circumstances in which meta tags are so creative and original so as to qualify for copyright protection, but they were not present here.
The court further found that there was not substantial copying when viewing the website as a whole. Defendant 411 copied 48 pages out of approximately 180,000 on Red Tag’s website. The court considered substantial similarity between the original work and the allegedly infringing work when viewed as a whole, and did not find that a substantial reproduction had occurred.
Even though 411 used Red Tag’s trademarks in its meta tags, the court held that no trademark violation had occurred because the meta tags were not visible to the site’s visitors, but were rather used by search engines. The court found that even if a patron had reached the 411 site by searching for Red Tag terms, once visitors arrived at the website they would have no doubt that they were at the site of 411. Notably, the Canadian court identified a substantial difference between its law and trademark law in the US. In the US, a court may find a trademark violation occurred where trademark use causes “initial interest confusion” where a patron searching for one company diverts their business to what the patron realizes is a different company offering a similar product or service. Regardless, the Canadian court indicated that it wouldn’t find a trademark violation even under the initial interest confusion test, because when search engines use meta tags they return a list of links that customers may choose from at will, rather than directing the viewer to a particular competitor.
Despite the Canadian court’s thoughtful and in-depth analysis, in the six years since the events of the case meta tags have increasingly become a relic of the past as search engines increasingly use their own algorithms to determine search results. However this is still a claim that many plaintiffs include when throwing in the kitchen sink in a trademark case, and it would not be surprising to see US courts cite to the reasoning of our neighbors to the north in future decisions.
Photo: “LAX-International-checkin” by TimBray at en.wikipedia.
Developments in law are sluggish compared to the rapid rate of technological advancement, and courts must constantly apply old legal principles to technologies which were not contemplated at the time the laws were enacted. Recently, technology has been at the forefront of privacy rights debates, in light of revelations that the government has access to online communications, personal data storage and extensive monitoring via technology. The Fourth Amendment of the United States Constitution establishes a privacy right by prohibiting unreasonable search and seizure, but the extent to which that applies to technology is largely untested. Last week, a federal judge upheld this fundamental right as she ruled that our client’s rights had indeed been violated by an unreasonable search and seizure of a laptop computer conducted by the government.
U.S. District Court Judge Amy Berman Jackson granted a motion which we filed on behalf of our client, South Korean businessman Jae Shik Kim, to suppress evidence seized from his laptop as he departed the country from Los Angeles International Airport in October 2012. The decision severely cripples the government’s case alleging that Kim conspired to sell aircraft technology illegally to Iran, in United States of America vs. Jae Shik Kim, Karham Eng. Corp. (Crim. Action No. 13-0100 in the U.S. District Court for the District of Columbia).
The seizure of Mr. Kim’s laptop presents a unique challenge in an undeveloped area of law. The government claimed that because Mr. Kim’s laptop was seized at the border, it was free to search the computer without having any suspicion that he was presently engaged in criminal activity, the same way the government is free to search a piece of luggage or a cargo container. Yet anyone who owns a laptop, smartphone, tablet, or any other personal mobile device, knows that the breadth and depth of private information stored within these gadgets are intimately tied to our identities and should be entitled to a heightened level of privacy.
Judge Jackson, who understood this aspect of modern mobile devices, wisely rejected the government’s argument that a computer is simply a ‘container’ and that the government has an ‘unfettered right’ to search. In her memorandum opinion and order, she wrote, “…given the vast storage capacity of even the most basic laptops, and the capacity of computers to retain metadata and even deleted material, one cannot treat an electronic storage device like a handbag simply because you can put things in it and then carry it onto a plane.”
In her decision, Judge Jackson also repeatedly referred to “reasonableness” as the “touchstone for a warrantless search.” She keenly balanced the government’s imperative to protect our borders with individuals’ privacy rights. Judge Jackson found that the nature of the search — including that the government conducted the search as Kim departed the country (and not as he entered) to gather evidence in a pre-existing investigation, and that it made a copy of the entire contents of Kim’s laptop for an “unlimited duration and an examination of unlimited scope” — amounted to an invasion of privacy and an unreasonable search and seizure.
While the search of Mr. Kim was technically a border search, his laptop was not searched at the airport. Instead, it was transported 150 miles to San Diego and held until government agents were able to find and secure information they deemed valuable to their case. In fact, Mr. Kim was deemed so little of a threat to national security that he was permitted to board his flight. Judge Jackson noted that if the government’s asserted justification for the search were to stand, it “would mean that the border search doctrine has no borders.”
In this case, unfortunately, the government overstepped the boundaries established by Fourth Amendment of the Constitution, however the checks and balances imposed by the same foundational document proved to correct this error, and rightly so, as our laws continuously strive to adjust to the reality of rapidly evolving technology.
Many small business government contractors may have to rethink the way they do business. The Small Business Administration issued a proposed rule at the end of December to implement provisions of the National Defense Authorization Act of 2013. The NDAA, which was signed into law in January 2013, requires several significant modifications to the rules for small business concerns, including changes to the Limitations on Subcontracting Rule (13 C.F.R. 125.6).
The proposed rule suggests a number of changes that would impact small businesses qualifying under one or more of the size or socioeconomic categories for set-aside contracts. These changes would (1) require companies to change how they determine compliance under §125.6, (2) require them to certify compliance in the bidding process, and (3) impose steep monetary penalties for delinquencies.
The Limitations on Subcontracting rule limits the extent to which prime contractors may subcontract obligations to outside entities, say to large companies that would not themselves qualify for a government set-aside. Under the current rule, a cost-based metric controls what prime contractors on set-aside contracts can subcontract to other entities: the prime must incur a certain percentage of the contract costs. For instance, for services contracts, a prime contractor must “perform at least 50 percent of the cost of the contract incurred for personnel with its own employees.” Section 125.6 currently provides different cost-base ratios based upon the type of contract (e.g., services, supplies, construction) and the type of set-aside (e.g., 8(a), SDVOB, HUBZone).
The proposed rule, if implemented, would alter how limitations are calculated, using an income-based, as opposed to a cost-based, metric. Under the proposed rule, prime contractors on set-aside contracts would be required to keep in-house a certain percentage of income—including passive income—paid by the government. For services and supply contracts, no more than fifty percent of the amount paid under the contract could be passed on to subcontractors; for construction no more than eighty-five percent; and for specialty trade, no more than seventy-five percent. (note that these are the same ratios used under the current cost-based metric, but now apply to the income-based metric). There no longer would be a distinction in ratios based upon type of set-aside, however.
An important exception to the rule would exist for “similarly situated entities.” Maintaining the philosophy behind the set-aside program, the proposed rule would allow prime contractors to contract out to companies who also qualify under their set-aside category without that relationship counting towards the income limit. In other words, the entities would be treated the same for purposes of the Limitations on Subcontracting rule. For instance, an SDVOB could subcontract out a services contract to another SDVOB and that contract relationship would not count towards the fifty percent income limit. However, the subcontractor must qualify under the same set-aside category as the prime in order to take advantage of this exception.
Another exception is that the rule would not apply to contracts valued under $150,000.
Closing a former loophole, the revised §125.6 would count all levels of subcontractor relationship, not just to the first prime-sub relationship. So companies could not get around the subcontract limitation through subcontracting out under the subcontractor.
In order to satisfy the new Limitations on Subcontracting rule, companies would need to address the rule in their contract bids for set-aside contracts. They would be required to certify that they can satisfy the rule. They would further be required to identify any similarly situated entities they planned to subcontract with and to what extent (percentage) they planned to subcontract with them. Any post-award changes would need to be presented to the contracting officer.
Unlike in the past, the proposed rule would institute steep penalties for non-compliance with the Limitations on Subcontracting rule. Companies found violating the rule would be subject to fines “the greater of either $500,000 or the dollar amount spent in excess of the permitted levels for subcontracting.”
The SBA’s proposed changes may seem staggering to small businesses that have carefully defined their business relationships to remain compliant under the current cost-based regime. But the changes could ultimately help to ensure the viability of the SBA’s set-aside programs. When small and disadvantaged prime contractors subcontract the bulk of their work to large businesses, they call into question the purpose of the set-aside structure. Those interested in presenting comments on this proposed change may submit their comments through regulations.gov by February 27, 2015.
When it comes to a conviction, or even an arrest, the collateral consequences that are sometimes overlooked by client and counsel can be extremely damaging, especially when dealing with government agencies and programs.
One such set of consequences is unique to contractors who do business with federal or state governments. Because even a plea to a criminal conviction represents a person’s affirmative statement of the underlying facts, that can lead to a proceeding to suspend or debar (that is, prohibit) the contractor from federal or state business. A government agency may issue a notice of suspension or debarment based on the criminal conviction alone, if the statute provides for such a basis of debarment. Moreover, in some circumstances, a government agency may issue a notice of suspension or debarment based on the underlying conduct (which the plea or conviction affirms as true) that poses a risk to the integrity of government contractors. Thus, even if a government contractor facing serious charges and a lengthy trial enters a plea to a less serious charge, that plea may cause the debarment of the government contractor and possibly deal a fatal blow to its business based on the conduct on which it was based.
Another example of an unforeseen consequence is when a person applies for one of the various government programs that are a “privilege” and not a right. The U.S. Customs and Border Protection (CBP) has implemented Trusted Traveler Programs, such as the Global Entry program, which allows expedited clearance for pre-approved, low-risk travelers upon arrival in the United States. There is no right to participate in that program; rather, it is a privilege granted to individuals upon acceptance by the CBP. There is an application process for entry into the program, and, the CBP explicitly warns that applicants may not qualify if they have been convicted of any criminal offense or have pending criminal charges or outstanding warrants. Notably, as with similar statutes or prohibitions, there is no end date for when the CBP will stop considering the criminal conviction. Therefore, the criminal conviction will likely act as a lifetime bar to gaining acceptance into this program and into similar types of programs.
Collateral consequences are increasingly becoming an important area of law due to the fact that the total number of collateral consequences has increased tremendously in recent years. This requires a broad understanding of many areas, which is contrary to the trend in law practice of specialization in niche practice areas. Unfortunately, counsel are often completely unaware of the potential collateral consequences in practice areas outside their scope of practice. With funding provided by a DOJ grant and other sources, the ABA has developed an interactive tool called the National Inventory of the Collateral Consequences of Conviction (available at www.abacollateralconsequences.org), which provides a database of the sanctions and restrictions in each state. This is a useful tool for both counsel and client in understanding the full gamut of collateral consequences resulting from a criminal conviction.
Photo Credit: Meinzahn
Three more casinos are set to close in Atlantic City. Unions, politicians and lobbyists are pointing fingers. One thing is for certain, newly introduced online gaming legislation is not to blame. If experts had been paying attention to the trends, they would have introduced regulated online gaming into New Jersey years ago…
Want to know more? Read the full post on Ifrah Law’s new iGaming Blog