'Whose Social Network Account? A Trade Secret Solution to Allocating Rights' by Zoe Argento in
Michigan Telecommunications and Technology Law Review (forthcoming)
asks
Who has the superior right to a social network account? This is the question at issue in the growing number of disputes between employers and workers over social network accounts. The problem has no clear legal precedent. Although the disputes implicate rights under trademark, copyright and privacy law, these legal paradigms fail to address the core issue. At base, disputes over social network accounts are disputes over the right to access the account’s followers – the people, sometimes numbering in the tens of thousands, who follow an account. This article evaluates the problem from the perspective of the public interest in social network use, particularly in use that blurs professional and personal roles. The article argues that the public interest is best served by resolving these disputes under a trade secret approach.
Argento comments that
Imagine that you work for a law firm, focusing on a discrete practice area, say music law. One of your many nonbillable responsibilities is to contribute to an industry newsletter. However, the law is changing so rapidly in your area that your articles are typically out of date the moment they are published. One day, you decide that your time would be better spent opening a Twitter account and
simply tweeting the latest developments. You open an account and start
tweeting. In the casual spirit of Twitter, you write tweets that are not only
informative, but also entertaining for both your clients and yourself. You make
wry comments about judicial opinions and the antics of the out-size personalities
in the industry. You also write a little about your personal life, in part simply
because you use the same account to keep in touch with friends and family.
Within a few months, several thousand people in your industry have become
followers of your Twitter stream. You and your law firm are delighted. The firm
even adds a link to your account on the firm web page.
A few years later, you leave your employer to go to a different firm. To your surprise, a week after you leave, your old firm demands that you return ‘their’ Twitter account. What to do? Who ‘owns’ the account?
This is, of course, not a problem unique to law firms. In many industries, workers maintain popular social network accounts followed by thousands, even millions, of people. How do we figure out when the account ‘belongs’ to the employer and when it ‘belongs’ to the worker? Who gets the account when the parties part ways? This question has recently arisen in a spate of cases. In
PhoneDog v. Kravitz, a company that provides cell phone reviews sued a reviewer for taking his Twitter account with him after he left the job. In Eagle v. Morgan a former employee sued a financial service company for changing the password on her LinkedIn account and transferring it to another employee the day she was fired. In Christou v. Beatport, LLC a night-club owner sued a former employee for using the password to the plaintiff’s MySpace pages to advertise his new
club.
The cases have aroused intense interest. Approximately one billion
people participate in social network sites. In addition, more than 70% of
companies maintain a social network site presence, and the number is rapidly
increasing. Cumulatively, employers and individuals have enormous
investments in social network sites at stake. The precedents set will affect not
only these investments but the public interest in preserving the immense benefits
of social network use.
These disputes are likely the harbingers of many more to come for two
principal reasons. First, social network accounts can become quite valuable. A
social network account may provide the means to transmit a message to thousands
of people. In the PhoneDog case, for example, 17,000 people followed the
Twitter account at issue. However, a social network account provides much
more than a means to make a one-way broadcast. A popular social network
account offers access to an engaged audience, a means to crowd-source ideas and
feedback, a self-reinforcing community of people connected by their shared
interests, and, finally, a way to reach into the network of each person linked to the
account. Take Lady Gaga’s Facebook page, for example. The pop star has 50
million Facebook users linked to her account. She uses her Facebook page to
promote her music, products, and charities by sending messages which appear
automatically in the newsfeeds of her followers. Meanwhile, her followers can
both respond to Lady Gaga and communicate with each other by posting on her
web page, giving Lady Gaga direct feedback and strengthening her community of
fans, the so-called “little monsters.” Moreover, each fan may pass on Lady
Gaga’s comments and other postings to their friends. As a result, Lady Gaga’s
messages are distributed to an even larger circle than the 50 million Facebook
users linked to her account. Unsurprisingly, not only individuals, but a broad
range of organizations, have created social network accounts to take advantage of
these opportunities.
Second, the blurring of personal and professional roles on social network
sites leads to confusion over who owns the value in the account – for several
reasons. Because the account is in some ways a proxy for a person, people tend to
use one account on a given platform to represent themselves for all purposes,
including both personal and professional types of use. And because users
participating in social network sites expect interaction with people, organizations
have found that using real people to ‘converse’ on their behalf in a personal
manner leads to success on social network sites. Therefore, the features that make
social network sites effective as a means of communication lead to competing
claims to an account. Individuals tend to blur personal and professional use at the
same time that employers ask their workers to represent them in a personal
manner. Where there is no express agreement on the issue, the question of who
has the superior right to the account becomes blurry indeed.
This is a new area with no clear legal framework. The problem of legal
framing is this: a social network account can be shorn of all content that gives rise
to clear legal rights. The name of the account may be changed to avoid a
trademark claim. Copyrighted and private content can be deleted. The account
may be reduced to a node to which other people have linked their accounts. No
clear legal rights inhere in the links to the account, yet, by providing automatic
access to an audience, the links are what give the account itself value.
This article argues that trade secret law provides the best legal framework
for resolving these disputes. The secret of access to the social network account –
the password – should be protectable as a trade secret. As required for trade
secret protection, the password to the account is generally secret. And its
secrecy confers independent economic value by giving the account holder
exclusive access to the links in the account. This trade secret protection would
be highly limited. It would protect only access to the account, but not to any
content otherwise available to the public. Crucially, any other user could still
contact the account’s followers through other accounts. Although narrow, trade
secret protection would make possible assertion of a right to the interest at the
heart of these disputes – the value in retaining exclusive access to followers
through the links collected in an account.
Similar trade secret claims have survived motions to dismiss in two of the
cases on the issue. This article expands on the cursory reasoning in these cases
and argues that protecting the secret of account access as a trade secret best
balances the interests at stake in these disputes. The investment of time and effort
to build up links to a social network account appears to yield significant social
benefits in the form of improved dissemination of information, economic
efficiency, and labor mobility. The blurring of professional and personal roles
while building up the links to the account only appears to add to these benefits.
Trade secret law preserves incentives to invest in the account and create
these benefits by protecting access to the account from misappropriation. Further,
the hired to invent doctrine would allocate rights in social network accounts
between employers and workers at the moment of creation in a manner that not
only maximizes incentives to invest in social networking, but also preserves
workers’ incentives to invest in themselves. As a result, the trade secret law
approach promotes the public interest in social network site use without unduly
hampering workers. Moreover, this approach would, except for a few rare cases,
work in concert with the resolution of other legal interests, such as privacy,
copyright, and trademark, that are implicated in these disputes.
This article proceeds as follows: Part II describes in detail why and in
what circumstances disputes over social network accounts arise. In Part III, the
article analyzes the legal rights and interests at stake in disputes over social
network accounts. These disputes implicate legal rights under trademark,
personality rights, copyright, and privacy law. The paper argues, however, that
the core issue does not fall under any of these legal paradigms and instead
implicates the public interest in developing links to the social network account.
Part IV shows that trade secret law not only provides a mechanism to assert a
right in the core value of the account, but provides the best framework to resolve
the interests at stake in disputes over social network accounts.
Argento goes on to argue that
The trade secret approach applies in a straightforward fashion to optimize
the incentives of the employer and worker to invest in social networking. First,
the party that does the work of creating the account should, by default, have the
rights to the account. Creating the account should not be defined as merely the
trivial work of opening the account, however, but as the substantial investment of
time and energy needed to develop the links in the account. The links to the
account are an integral part of the account, the aspect of the account which makes
the account itself valuable.
Second, where the parties have agreed, even impliedly, that the worker
created the account in exchange for his salary or other compensation from the
employer, the employer should have the right to the account. Again, allocating
rights based on contract principles optimizes incentives to invest in social network
accounts. In a free market, the worker bargains for the highest compensation for
his labor in developing a following for the social network account. The employer
bargains for access to the account at the lowest cost. And the public benefits from
the creation of the account at low cost.
Trade secret law recognizes two competing policy concerns in employer-worker
disputes over rights to material developed during the course of
employment. On the one hand, allowing the parties the freedom to bargain
enables each to optimize their benefits through contract. On the other hand,
granting the employer rights in a worker’s skills and information harms the
worker by decreasing his ability to earn a livelihood. The public interest in
open competition in turn suffers when workers are prevented from competing
with former employers. Granting the employer a right to such skills and
information, either by contract or through trade secret protection, discourages an
employee from leaving because she cannot make a living outside the company. As a result, employers do not compete for the best employees, either to retain or
hire them. The worker then has no incentive to improve her skills because she
will not be compensated for her investment in herself through competition among
employers for the rewards of her enhanced skill. A number of undesirable
consequences result, especially decreases in innovation, worker mobility and
economic growth.
Trade secret law attempts to resolve this tension by carving out the skills,
experience and knowledge necessary to a worker to make a living in her chosen
profession from trade secret protection and from non-compete agreements. Therefore, trade secret law does not give the employer a right to a worker’s skill
or knowledge, even skill or knowledge acquired during the employment as the
company’s trade secret. Neither may the employer contractually restrict a
departing worker from using his skills or knowledge to the extent that the
agreement unreasonably restricts the worker’s ability to make a living. Indeed,
a growing chorus of commentators argues that all types of non-compete
agreements harm the public interest and should not be enforced. The same concerns arise in the context of rights to social network
accounts. Workers use their social network accounts to develop skills and
knowledge and to build a network which enables them to continue developing
skills and knowledge. A worker might, for example, use her social network
account to hone her communication skills and to build a personal brand, to learn
about news and opportunities specific to her industry, and to build a personal and
professional network. Allowing the employer to prevent a worker from using
her skills and knowledge when she leaves her employer without compensation
would decrease the worker’s incentive to invest in himself through social network
sites. Nevertheless, a distinction can be made between the social network account
and the worker’s collective abilities. The account is only the consequence of a
worker’s skill and experience in her chosen field not the worker’s skill or
experience itself. With regard to the worker’s network, the social network
account is likewise only a virtual representation of links to people rather than the
network itself.
Therefore, a worker’s agreement to transfer rights in the social network
account to the employer would not necessarily harm the worker’s interest or the
public interest. Where the worker freely bargains away the social network
account in exchange for its market value, the worker will have received optimal
compensation for his labor and skill. Such an agreement does not prevent the
worker from making a living in his chosen profession. He may still use his
expertise. Moreover, his personal brand is still his because he retains the right to
his identity. Thus, the worker could enjoin the employer from continuing to use
his name or even a username associated with him without his permission based on
a trademark, right of publicity or misappropriation of identity theory. The
worker can open new accounts to recreate the electronic links with his network
and, to the extent his former followers followed him personally, they might be
persuaded to follow him again. Of course, recreating the links to former
followers would take an investment of time and effort. But in a fair bargain, the
employer will have compensated him for the work required to recreate the
electronic links to his network.
Nevertheless, the employer should bear a heavy burden to prove that the
worker in fact agreed not only to ensure that both parties had a true opportunity to
bargain for the best deal, but also to avoid the harms caused by decreasing the
worker’s incentive to invest in his own skills and knowledge. A worker may
make less effort to build a social network online and to develop a personal brand
if she believes that her employer may take away her social network account
without compensation. As a result, she may forego opportunities to learn more
about her industry, to hone her communication skills, to meet other professionals,
and, in general, to improve her expertise and knowledge.
As in the trade secret context, the challenge in applying this analysis is
determining the nature of the agreement. The distinctions are subtle. The fact
that the worker used the trade secret – here, access to a social network account –
on the employer’s behalf does not end the analysis. The parties must agree not
only that the worker will use the trade secret on the employer’s behalf, but that the
employer will obtain the rights to the trade secret. Thus, in the context of
social network sites, the fact that a worker agreed to use his social network
account to benefit the employer – for example, by linking to the employer’s web
site in the PhoneDog case – does not necessarily imply that the parties agreed that
the account itself belongs to the employer. As in the trade secret context, a court
must carefully scrutinize the circumstances and the objective manifestations of
each party to determine the nature of the agreement.
The inquiry and factors used in trade secret cases provide useful tools for
analyzing the facts in a given case. The first challenge in analyzing the terms
of any implied agreement between employer and worker is to determine the
nature of the employer’s offer. The relatively easy case is one in which the
employer gives specific instructions to create social network accounts for the
employer’s use. Where the employer gives the worker more general instructions,
a court might look to the factors outlined above – custom, relation to the
employer’s business, and the employer’s dedication of resources to the task – to
determine whether the employer made clear its expectation that the worker create
a social network account for the employer in exchange for compensation.
Regarding custom, the fact that workers at a particular employer routinely
gave the employer access to their accounts upon leaving would be indicative of
the parties’ understanding. Another circumstance indicating agreement would be
the employer’s dedication of resources to help workers develop social network
accounts, such as guidance, training and evaluation.
The nature of the content in the account also indicates the purpose for
which the account is created and developed. Courts, however, should be cautious
in drawing conclusions solely based on the account’s content. Again, the
professional and the personal blur on social network sites. An individual may
post professional content for personal reasons, such as to build skills and a
professional network. Conversely, an individual may post personal content on
behalf of the employer: for example, to attract an audience for the employer’s
website. A court should not conclude that a worker created an account on behalf
of the employer solely because the worker posted content related to his
profession.
To determine whether the worker agreed to the employer’s implied offer,
the court must evaluate the objective manifestations of the worker. The
worker’s agreement might be manifested through his words. For example, in
Morris v. Scenera Research, the court construed the worker’s reference to himself
as the “chief inventor” and his statement that his employment goal was to develop
new inventions as indicating that the worker understood that his inventions would
belong to the employer. Similarly, in the social network context, a worker’s
reference to herself as “social networking director” and a statement that her goal
is to develop a social network account for her employer might indicate an
understanding that the worker had built the social network account for her
employer to keep. In a case where the employer made the terms quite clear, the
employee’s agreement might simply be gleaned from her decision to stay at the
job and perform by creating the social network account.
A number of other factors specific to the social network account context
would help to determine the intentions of the parties: the name of the account,
exclusivity of access, the type of account, and whether the account pre-exists the
employment relationship. First, the name of the account provides an important
clue. Where the account is named after the employer, for example, the name
suggests that the parties intended that the employer would have a right to the
account. Similarly, an account named after the worker suggests that the parties
understood that the worker would retain the exclusive right of access to the
account. Of course, the harder cases are those like the PhoneDog case where the
name of the account combined both the name of the employer and the worker,
like “@PhoneDog_Noah.366
With regard to the exclusivity of access, the fact that several workers had
access to and worked on one account would suggest that the parties did not
contemplate that any one worker had an exclusive right to the account.
Conversely, the fact that only one worker ever accessed the account would be
evidence in support of that worker’s exclusive right to the account. The type of
account might also indicate the parties’ intentions. For example, on Facebook, a
user’s “personal timeline” must only represent individuals, at least according to
Facebook’s instructions. However, “Facebook Pages” may represent an
organization, business, or celebrity. The fact that a worker chose to create a
“personal timeline” on Facebook as opposed to a “Facebook Page,” or some other
form of social network account, might indicate that the parties intended that the
account would belong to the worker. Finally, the fact that an account pre-exists
the employment relationship obviates the need to analyze ownership under the
work-made-for-hire doctrine. The worker was clearly not hired to invent if she
created the account before she was hired.
In short, these factors might help ascertain the parties’ intentions.
However, in each case, a court would have to carefully evaluate all the
circumstances to determine the nature of the parties’ “tacit understanding.”
To conclude, trade secret law offers a flexible and appropriate set of rules
for allocating the right of exclusive access to a social network account between
employers and workers. Trade secret law not only provides the best framework
for optimizing incentives to create valuable information and invest in workers, the
trade secret analysis can be applied directly to disputes over social network
accounts to achieve the right outcome.
Trade Secrets in Conjunction with Other Legal Concerns
Trade secret analysis will also lead to a just outcome for legal claims
arising under other legal paradigms. In many cases, the question of access to the
account can be separated from the issue of legal rights in the content of the
account. The outcome of the trade secret analysis in these cases will have no
bearing on the outcome of other legal claims. Where access to the account
implicates other rights, however, the trade secret resolution to the access question
will generally not conflict with the resolution of other legal claims related to the
account.
1. Trademark and Personality Rights
In general, trademark and personality rights claims may be resolved
independently from the issue of access to the account.371 Where trademarks or
signifiers of identity are used confusingly in an account, they may often be
deleted or changed.372 If the trademark holder has lingering concerns about
confusion, a court might require the account holder to post disclaimers
disavowing any connection to the trademark’s owner.
That is not to say that the issue of rights in an account and the issue of
rights in the name of the account have no relation to each other. As described in
part IV.B.2, the name of the account should be a factor in the hired to invent
analysis. For example, when a Coca Cola employee creates a Facebook page
named “Coca Cola,” the name strongly suggests that the parties agreed that the
page would belong to Coca Cola. In most cases, as a result, the trade secret
approach would award access to the account to the party that owned the rights to
the trademark or persona in the name of the account.
2. Privacy and Trade Secrets
To the extent that an account contains trade secrets in addition to the
password, the analysis regarding the rights to those trade secrets would parallel
the analysis regarding the right to access the account. Thus, whichever party had
the right to the account would, in most cases, also have the right to trade secrets in
the account. If the outcomes conflicted, a court might simply order the party that
loses the account to delete the secret information before turning over the
password. Privacy concerns can be resolved similarly.
Moreover, like trademarks and personality rights, the existence of private
information may help to resolve the hired to invent question by indicating the
expectations of the parties. The fact that a worker posted highly private
information in the account may indicate that the worker did not foresee and
therefore did not agree to turn the account over to the employer. Similarly, the
trade secret analysis may help to resolve the privacy question. Where the parties
clearly agreed that the employer would take the account, a court might reasonably
conclude that the worker did not consider the information in the account to be
private.
The expectations of the followers linked to the account raise a more
difficult privacy problem. Where the account is only visible to a small circle, such
as friends and family, followers of that account might reasonably expect that
information sent to that account or visible from that account would remain out of
public view. Simply as a matter of public policy, social network users should
be able to proceed with some confidence that their private information will not be
turned over to others as accounts change hands. Although the followers may
not be party to a suit over rights to a social network account, the plaintiff in most
cases will request that the court enjoin the defendant from using the account and,
in considering whether to grant an injunction, the court must consider the public
interest as a factor in the decision. This consideration of the public interest
should include an analysis of the interests of the followers. On privacy grounds, a
court should hesitate to turn over an account unless the followers should have
reasonably expected that the employer would have access to the information.
However, the factors for determining the reasonable expectations of the
followers will significantly overlap with the factors in determining whether the
account belongs to the employer under a hired to invent analysis. Where the
worker is clearly acting on behalf of the employer – for example, by naming the
account at least in part after the employer, advertising the employer’s products, or
frequently posting links to the employer’s website – a follower should reasonably
expect that the employer would have access to anything that follower decided to
share with the account. Thus, in the main, privacy concerns will not be in tension
with the proposed trade secret resolution of disputes over rights to the account.
3. Copyright
Finally, the trade secret approach would be unlikely to conflict with
concerns regarding the display of content under copyright law. With respect to
copyright law, the analysis to determine which party has the rights to new
copyrightable material in the account is quite similar and likely to lead to the
same outcome as the analysis to determine which party has the right to the
account itself. The rules regarding ownership of copyrightable works in the
employment context closely parallel the rules in the trade secret context. As in
trade secret, copyright vests in the creator of the work by default. In the trade
secret context, this default rule is modified by the hired to invent doctrine, in
which the employer obtains the rights to trade secrets that the employee was hired
to create. Copyright law has a similar doctrine called work-made-for-hire. Where the copyrighted work is created as a work-made-for-hire during the course
of employment, the rights vest in the employer.
The chief difference between the trade secret and copyright analysis is
that, unlike the hired to invent doctrine, which is based in principles of contract
law, the work-made-for-hire rule is based in principles of agency law. The
copyright in a worker’s work belongs to the employer when the worker is an
employee and the work is created in the scope of the employee’s employment. Both the question of whether a worker is an independent contractor and the
question of whether the work was prepared in the scope of employment are
determined in light of the common law of agency. Where the worker is an
employee, the outcome of the analysis of work-made-for-hire is likely to be the
same as the outcome of a hired to invent analysis because the inquiry in both is
essentially whether the worker consented to do the work on behalf of the
employer based on the objective manifestations of the parties.
The factors courts consider are quite similar in each analysis. Again, to
determine whether a worker is hired to invent a trade secret, a court would
consider whether the worker was directed to create specific information for the
employer. In a situation without a specific instruction, the court consider
factors such as how closely related the information was to the employer’s
business, the amount of resources assigned to this task, and whether workers have
assigned inventions to the employer in the past. Similarly, a court seeking to
determine whether a copyrightable work is a work-made-for-hire, would consider
whether “(a) [the work] is of the kind [the servant] is employed to perform; (b) it
occurs substantially within the authorized time and space limits; [and] (c) it is
actuated, at least in part, by a purpose to serve the master.” As a result, the
circumstances that would indicate that the worker had impliedly agreed to leave
the social network account to the employer would also likely be circumstances
suggesting that the copyrightable content in the account was a work-made-for-hire.
Even where the ownership of the copyright in the content and the
ownership of the account differ, copyright law will most likely not be a barrier to
resolving the right of access to the account under the trade secret law approach.
For example, where the worker is an independent contractor, the copyright in any
content she posted in a social network account would vest in her at creation, even
if she had impliedly agreed that the account itself would belong to her
employer. However, where the worker has agreed to give the right of access to
the account to her employer, she would likely be considered to have given the
employer an implied license to the content to the extent necessary to use the
account. In the worst case, however, where the court determined that different
parties owned the rights to copyrighted material as opposed to rights to the
account, the court could order that copyrighted material be deleted from the
account. In short, copyright claims would likely not conflict with the trade
secret approach to resolving access to the account.
Inevitably, there will be some hard cases where rights conflict – where one
party clearly has rights to the social network account and the other has a right to
copyrighted material therein, which cannot be deleted. Courts will struggle to
balance the interests in these cases. Nevertheless, in most cases, the trade secret
approach will offer the best approach to allocating rights in the account without
conflict with other legal paradigms.
D. The Comparative Inferiority of a Personal Property Approach
A possible alternative to the trade secret approach is treating a social
network account as a form of personal property. The plaintiff might claim a right
of personal property in the account itself and make a claim for conversion.
Indeed, in the cases thus far, the plaintiffs have done just that. The trade secret
approach, however, is superior for two principal reasons. First, the hired to invent
doctrine in trade secret law offers a robust common law framework to resolve the
issue of allocation of rights ab initio which, in comparison, the law of personal
property lacks. Second, the definition of a trade secret restricts trade secret
protection to the interests at the heart of these disputes. In contrast, personal
property does not have such strict definitional limitations. As a result, protecting
social network accounts as personal property may result in over-protection, to the
detriment of competition and the public interest.
Assuming a plaintiff can establish that she has a personal property right in
a social network account, she would be likely to succeed in a conversion claim
against someone who locked her out of the account. Conversion is an intentional
exercise of dominion or control over personal property which “seriously interferes
with the right of another to control it.” Where a defendant locks the plaintiff
out of the account by changing the password, the defendant has “seriously
interfered” with the right of control. The plaintiff, in fact, loses all control. The harder question is whether the account should be considered a form of
personal property.
A social network account possesses some of the characteristics of
property. It is rivalrous: only one of the disputing parties may effectively use
the links in the account to communicate with others at one time. The account is
also excludable in the sense that access requires a password which can be
safeguarded from others. Finally, the account resembles property in that it
satisfies Locke’s justification for property rights. Under the Lockean labor theory
of property, the account holder should have a property right in the fruits of her
own labor.
In some cases, courts have found that similar items qualified as property
and could be the subject of conversion. In Kremen v. Cohen, for example, the
Ninth Circuit held that, under California law, an internet domain name was
personal property for purposes of a conversion claim. And in Staton Holdings,
Inc. v. First Data Corp., the Northern District of Texas found that, under Texas
law, a telephone number could be subject to conversion as personal property. In general, the law appears to be moving in the direction of finding intangible
items such as domain names and numbers to be personal property and subject to
conversion.
Granting a personal property rights in the account does not necessarily
conflict with the terms of use of the social network site. The property rights in the
account might be defined quite narrowly, perhaps only as a right of use and
exclusion subject to the rights of the social network site provider.
The conversion cause of action however stumbles in the employment
context where the challenge is to determine which party has the right to the
account at the moment of creation. It is, in a sense, previously un-owned.
Personal property law rarely tackles the question of who gains the property right
in previously unowned items. Except for a few odd cases involving things like
foxes on public beaches, most issues of personal property ownership are
resolved by tracing the chain of title back one link or so to the last instance of
good title. Thus, in the employment context, even if the agreement between the
parties is unclear, disputes over items of personal property created during the
course of employment can typically be resolved by reference to the chain of title.
For example, if a worker makes a shoe, the employer has a right to the shoe when
the shoe was made from leather belonging to the employer.
The chain of title approach, however, does not resolve disputes over rights
to an account. Both the account and the links in the account are created anew.
They are previously non-existent and un-owned, subject to rights of the social
network services. Moreover, a right to possess the account does not flow
clearly from the social network site provider to one party or the other. Although
the terms of use create a contract with the user granting a limited right to use the
account, it is not necessarily clear on whose behalf the user has contracted with
the social network site provider.
In intellectual property law, however, new intellectual property is created
all the time. As a result, intellectual property law has a robust set of rules for
assigning rights in new intellectual property, especially in the employment
context. This article has described in some detail the hired to invent and workmade-
for-hire doctrines.
In the personal property context, the law of agency would likely govern
disputes about title to items created during the course of employment. Because
the law of agency governs when a worker’s actions affect the employer’s legal
position, the law of agency would also govern when the worker’s actions vest
legal property rights in the employer to a new account. However, because the
problem is so rare, there is no robust common law tradition or legislation
addressing the problem of rights to newly created personal property in the
employment context. As a result, courts would have to create law which
balances interests in optimizing incentives to create, promoting worker mobility
and protecting the expectations of the parties out of whole-cloth. In contrast,
trade secret law provides a ready framework for balancing the relevant policy
concerns.
Furthermore, the dangers of conferring a new property right in social
network accounts outweigh the advantages. As a general rule, property rights
should only be granted when they promote the public good. In this case, where
trade secret law provides a limited and effective form of protection, it is
unnecessary to create a new personal property right to resolve the problem.
Worse, granting a personal property right may cause harm. Personal
property rights would have to be very narrowly defined to avoid over-protecting
the account. But properly delineating the extent of rights would be challenging
for the courts or legislatures, especially since the technology and terminology is
changing rapidly. A broadly defined personal property right in a social network
account might propertize information, thereby circumventing intellectual property
limitations, reducing the public domain, and diminishing the free flow of
information. For example, a personal property right in the publicly available
names of followers linked to a social network account might decrease competition
by preventing others from collecting and using this information. In addition, a
proliferation of rights might create an anti-commons in which the transactional
costs of dealing with the rights of other participants discourages investment in
social network sites.
Limiting the trade secret rights to a social network account poses
considerably less challenge because trade secrets are already adequately limited
by their definition. Again, trade secrets are limited, by definition, to information
that derives independent economic value from being secret and that is subject to
reasonable efforts to maintain its secrecy. In contrast, the definition of personal
property is broad: “any movable or intangible thing that is subject to ownership
and is not classified as real property.” Indeed, the definition of personal
property is effectively a definition by default; property that is not real property.
Trade secrets, by definition, do not encompass information in the public
domain. Trade secret protection would only provide protection for exclusive
access to the account and only when the secret of access is kept secret and derives
independent economic value from its secrecy. Damages would essentially only
cover the loss of convenience that losing this secret access to the account would
entail.
A trade secret approach would also limit frivolous litigation. If protection
were not limited to accounts to which exclusive access conferred a competitive
advantage, the putative owner could sue, for example, for purposes of harassing a
former worker who had gone to a competitor, even if the account would provide
no commercial advantage. Trade secret law would also require that the
plaintiff take reasonable steps to keep the password secret. A broadly defined
personal property might require no such self-help efforts.
The personal property approach has another flaw. Because many states do
not allow claims for conversion for intangible items, the law would not develop in
a coherent manner. In contrast, trade secret law, including the hired to invent
principles, are quite similar in every state.
For all these reasons, the better approach solution is to resolve the disputes
using trade secrets law.