Senate Judiciary Committee Considering New COICA Bill


On February 16, 2011, the Senate Judiciary Committee held a public hearing entitled “Targeting Websites Dedicated to Stealing American IP.” Witnesses testifying before the Committee included Tom Adams (President and CEO, Rosetta Stone), Scott Turow (President, Authors Guild), Christine N. Jones (EVP, General Counsel and Corporate Secretary, The Go Daddy Group, Inc.), Thomas M. Dailey (Vice President and Deputy General Counsel, Verizon), and Denise Yee (Senior Trademark Counsel, Visa, Inc.). Representatives for both Google and Yahoo were invited to attend, but declined to appear. As of this writing, a webcast (lasting the entire 2 hours of the hearing) is still available.

Based on the remarks made during the hearing, it appears that the Committee is considering introducing a modified version of the Combating Online Infringement and Counterfeits Act (COICA) that had been introduced in the last term as S. 3804 (and passed the Committee on a 19-0 vote). The Second Session of the 111th Congress ended before further action was taken on this Bill. (Summary of the status of the bill can be found here, along with a copy of the related Committee Report submitted by Sen. Leahy on December 17, 2010.)

By congressional rules, this Bill must be re-introduced in this Congress (the 112th Congress) before any further action can be taken on it. Given the amount of public comment that the Committee received in connection with the most recent version of the Bill, and given the tenor of the comments during the February 16 hearing, it is likely that the re-introduced Bill will have some important differences from last term’s Bill. Some of the issues that may be addressed in this Bill could be a private right of action, removal of a “black list” onto which “bad” websites could be placed and some measure of safe harbor provided for the ISPs and/or other service providers who comply with the regulatory provisions of the new Bill. (For more comments on some of these provisions and their expected impact, see the comments of the Electronic Frontier Foundation (as well as additional links provided on their page) and the Center for Democracy and Technology (again, including some of the cross links within their blog relating to Digital Copyright). Of course, without seeing an actual draft yet, it is difficult to predict which provisions will end up in a new version of the Bill, if introduced this term.

During the hearing, several Senators referred to a second round of questions/comments on this initiative, which suggests that the Committee may hold a follow-up hearing. As of this writing, I could not find a scheduled hearing to re-address a potential COICA draft. At the end of the hearing, Senator Leahy commented that COICA in the last term had bipartisan support and passed in the Committee on a vote of 19-0. He closed with a promise that some version of this Bill will be reintroduced in the current term.

After the hearing concluded, Senator Leahy posted a press release that identified some of the comments that both he and other Committee members have received in support of a bill to stop counterfeiting on the Internet. (Copies of the submissions were also provided in the press release and can be found separately here.) Ranking Member Sen. Grassley’s prepared remarks can be found on the hearing summary page, and also in his own list of press releases.

New Bill Seeks to Eliminate Social Security Numbers as Uniform Identifiers


On January 7, 2011, Representative Ron Paul (R-TX) introduced a bill entitled the “Identity Theft Prevention Act of 2011” (H.R. 220). The Bill seeks to address the pervasive use of Social Security Numbers by various federal, state and local government agencies and to prevent identity theft by eliminating any use of those numbers in connection with government services. It prohibits governmental agencies from requiring mandatory or even voluntary disclosure of an individual’s Social Security Number in connection with documents filed by individuals.

The Bill includes amendments to the Social Security Act (42 U.S.C. 405(c)(2)), the Internal Revenue Code (26 U.S.C. §§ 6109(d)), and the Privacy Act of 1974 (5 U.S.C. 552a note, 88 Stat. 1909) in the following notable ways:

  • Social Security Act – H.R. 220 §§ 2(b) and (d)(2):
    • Requires that Social Security Account Numbers be randomly generated instead of confirming to a specific numbering system (the Social Security Numbering Scheme is described in detail on the Social Security Administration’s archive);
    • Provides that the Social Security Account Number be owned by the individual;
    • Prohibits the Social Security Administration from divulging that number to anyone (other than the account holder himself/herself); and
    • Requires that any pre-existing Social Security Numbers be declared null and void and reissued within 5 years of enactment of the Bill in accordance with the new “random generation” rules. Certain cross-references to the old numbers may be made, but these are limited.
  • Internal Revenue Code – § 2(c)(1):
  • Privacy Act – H.R. 220 § 3:
    • Section 7 of the Privacy Act (5 U.S.C. § 552a (note)) currently reads as follows:
      Sec. 7(a) (1) It shall be unlawful for any Federal, State or local government agency to deny to any individual any right, benefit, or privilege provided by law because of such individual’s refusal to disclose his social security account number.
      (2) the provisions of paragraph (1) of this subsection shall not apply with respect to—
      (A) any disclosure which is required by Federal statute, or
      (B) any disclosure of a social security number to any Federal, State, or local agency maintaining a system of records in existence and operating before January 1, 1975, if such disclosure was required under statute or regulation adopted prior to such date to verify the identity of an individual.
      (b) Any Federal, State or local government agency which requests an individual to disclose his social security account number shall inform that individual whether that disclosure is mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of it.
    • Pursuant to H.R. 220, these provisions would be amended to read as follows:
      Sec. 7(a) (1) It shall be unlawful for any Federal, State or local government agency to deny to any individual any right, benefit, or privilege provided by law because of such individual’s refusal to disclose his social security account number.
      (2) The provisions of paragraph (1) of this subsection shall not apply with respect to any disclosure which is required under regulations of the Commissioner of Social Security pursuant to section 205(c)(2) of the Social Security Act or under regulations of the Secretary of the Treasury pursuant to section 6109(d) of the Internal Revenue Code of 1986.
      (b) Except with respect to disclosures described in subsection (a)(2), no agency or instrumentality of the Federal Government, a State, a political subdivision of a State, or any combination of the foregoing may request an individual to disclose his social security account number, on either a mandatory or voluntary basis.

The Bill also prohibits “Government Wide Uniform Identifying Numbers” (Section 4) and “Government Established Identifiers” (Section 5). These two prohibitions would go into effect on January 1, 2012.

Under Section 4, the Bill provides that “any two agencies or instrumentalities of the Federal Government may not implement the same identifying number with respect to any individual” except where authorized by 42 U.S.C. 405(c)(2) [the Social Security Act sections described above]. Id. § 4(a).

Under Section 5, the Bill prohibits any two federal agencies from implementing the same numbering system to assign individual identification numbers to any individual and from conditioning the receipt of any federal grant, contract, or funding on the adoption of a uniform numbering system by a state or local government entity or agency. The Bill makes it clear that “administrative simplification” cannot be the stated purpose in establishing or mandating a uniform standard for identification purposes. Id. § 5(b)(2).

Initial Purpose of Social Security Numbers

As initially implemented, the Social Security Numbering system was not intended as a universal numbering system, and indeed, was not adopted by other agencies as such until at least 1943, when an Executive Order mandated that if a numbering system was required to keep records on individuals, that the Social Security Numbering system be used. Executive Order 9397 (3 CFR (1943-1948 Comp.) 283-284). An interesting chronology of the history of policy changes to the Social Security Numbering System can be found at the Social Security Administration’s web site and the explanation of the meaning of each section of the Social Security Number can be found here.

Status of Legislation
Following its introduction on January 7, 2011, the Bill was referred to the House Ways and Means Committee and the House Oversight and Government Reform Committee.

Basic information about the Bill (except for the actual text) can be found through Thomas (Congress’s legislative portal) at this specific link. The actual text can be found here in a variety of formats, including text, XML and PDF.

Proposed Legislation to Address Perceived Misidentification of Geographic Source of Goods

On July 31, 2009, Representative Daniel B. Maffei (D-NY) introduced H.R. 3499, to be called the “Trademark Protection Act” in the House of Representatives. The Bill purports to assess civil liability for unfair competition in the form of misleading the public as to the geographic source of a particular product. This provision would amend Section 1125(a)(1), which prohibits “False designations of origin, false descriptions and dilution” in the use of trademarks in commerce in the U.S. 15 U.S.C. § 1125(a)(1).

Apparent Objection to Relocating Manufacturing to China

Among the findings Rep. Maffei proposes, he explains why he introduced the Bill: “Syracuse China was an upstate New York manufacturer in the city of Syracuse. The company was founded in 1871 as the Onondaga Pottery Co. and was one of the last major china makers in the U.S. On April 9, 2009, after more than 130 years in business, Libbey Inc. (of Toledo, Ohio) halted production in Syracuse, eliminating 275 local jobs. Libbey plans to continue selling dinnerware under the name ‘Syracuse China’ even after they stop production at the New York-based plant, but the company will manufacture the product in other countries and import them into the U.S.” H.R. 3499 § 2 (3).

It appears that the Syracuse China Company (which appears to be a different legal entity than the one identified in Rep. Maffei’s Bill) owns a valid registration in the word SYRACUSE, standing alone, which is registered in connection with “China tableware and ornamental chinaware” (Reg. No. 104,744, registered in 1915, alleging a date of first use in 1897). The registration was renewed in 2005, and could be asserted against a different company seeking to confuse consumers about the source of the goods sold in connection with a confusingly similar mark. (That being said, it’s possible that the Libbey Company referenced in the Bill is somehow affiliated or related to the Syracuse China Company such that litigation would not be considered.)

Indeed, it appears that at one time, predecessors of the Syracuse China Company registered variations of the mark “SYRACUSE CHINA” and then let the registrations lapse. Specifically, the following three registrations are marked “dead” in the U.S. Patent & Trademark Office’s database – and therefore cannot be asserted in litigation against some one else’s actual use of the mark in commerce:

* SYRACUSE CHINA (& design), Reg. No. 734,163 applied to “dinnerware and tableware made of China” and was registered in 1962 (alleging a date of first use in 1961). The registration was deemed abandoned in 1987 when the registrant failed to renew it.

* SYRACUSE CHINA 1871 (& design), Reg. No. 841,235 applied to “dinnerware and tableware made of China” and was registered in 1967 (alleging a date of first use in 1966). The registration was deemed abandoned in 1989 when the registrant failed to renew it.

* SYRACUSE CHINA CORPORATION (& design), Reg. No. 975,004 applied to “dinnerware and tableware made of China” and was registered in 1973 (alleging a date of first use in 1972). The registration was deemed abandoned in 1994 when the registrant failed to renew it.

Protection of “Weak” Marks

Also interesting about this proposed Bill is the following draft “finding:” “Trademarks that describe some feature or quality of the goods or that are based on someone’s name or a geographic term are considered to be ‘weak’ and thus are not protectable under trademark law. However, once the trademark owner can demonstrate substantial sales, advertising or other public awareness of a weak trademark, the trademark will be considered distinctive and can be registered with the [US Patent & Trademark Office].” H.R. 3499 § 2 (2).

The statement that “weak” marks are not protectable under U.S. trademark law perhaps goes too far, and despite the second sentence of these draft findings, suggests that these marks may never be protectable. Certainly, in any litigation or other dispute involving a “weak” mark, the parties will debate whether the owner of that mark has demonstrated secondary meaning or acquired distinctiveness, such that the consuming public would automatically associate such a “weak” mark used in connection with the relevant goods or services with the owner of the mark – in other words as a “source indicator”. Descriptive marks such as these can acquire distinctiveness and obtain a level of trademark protection that seems to somewhat be undervalued in the draft “findings” in this Bill.

In addition, this Bill appears to focus only on the ability to register a trademark with the U.S. Patent & Trademark Office. Under U.S. law, trademarks can be protected from misappropriation and confusingly similar use by someone else based on the actual use of the earlier mark in commerce. There is no requirement that every trademark be registered before protection from infringement is available. Instead, senior rights may even exist for unregistered marks in certain circumstances. Notably, the Bill contemplates amending the civil liability provisions relating to marks that are either registered or unregistered – including those known as “common law marks”.

There are definitely benefits to filing an application for trademark registration – including the presumption that the registrant can expand the use of its mark nationwide on the goods or services described in the registration. Even the U.S. Patent & Trademark Office will only register a mark if there has been bona fide use in U.S. commerce, as demonstrated by evidence submitted by the applicant through the application process. See Trademark Manual of Examining Procedure (“TMEP”) § 901.01 (quoting statutory language: “The term ‘use in commerce’ means the bona fide use of a mark in the ordinary course of trade, and not made merely to reserve a right in a mark.”).

In addition, even after registration, if a registrant stops using the mark in U.S. commerce, the registration can be cancelled or narrowed to only those goods or services on which the mark continues to be in active use. See TMEP § 1604.10 (explaining requirements to maintain a registration, which will be cancelled if continued use cannot be demonstrated).

Conclusions

Upon introduction, the Bill was referred to the House Committee on the Judiciary. At present, no hearings are scheduled for the Bill. It is unclear whether there will be any further action taken on the Bill.

It also appears that this issue of misidentification of geographic source of origin might not be a pivotal issue for Rep. Maffei. Press releases relating to the various legislative initiatives that he has sponsored or speeches that he has delivered are available on his web site, but none of them relate to this Bill (at least, none had been posted at the time that this blog entry was prepared). Instead, the only relevant reference appears to be Rep. Maffei’s June 23rd announcement that the Syracuse China Company was eligible for Trade Adjustment Assistance.

Current status of the Bill can be found through the legislature’s search service, Thomas.gov.

Copyright Protection Proposed for Fashion Designs

Under current law, fashion designs and patterns are not protected from infringement by the Copyright Act. Instead, they are considered “useful designs” that are beyond the scope of the current Act. Recent legislation proposed in the House, however, seeks to change this by amending Chapter 13 of the Copyright Act and extend copyright protection for limited purposes and a limited term. Design Piracy Prohibition Act, H.R. 2196, 111th Congr. (proposed April 30, 2009).

Provisions of H.R. 2196

H.R. 2196 was proposed by Rep. William D. Delahunt (D-MA), and co-sponsored by 23 other members of the House. It proposes to amend 17 U.S.C. § 1301 (and following), and to extend limited protection to all clothing, including “undergarments, outerwear, gloves, footwear and headgear” as well as various accessories and luggage (namely “handbags, purses, wallets, duffel bags, suitcases, tote bags and belts”) and frames for eyeglasses. H.R. 2196 § 2(a)(2)(B).

Rather than providing blanket copyright protection as you might find for an original literary work (e.g., a book), this bill proposes that copyright protection would only last for three years beginning on the date of publication of the registration or the date on which the design is first made public, whichever is earlier. Id. § 2(d); 17 U.S.C. § 1304 (determining when protection begins). The bill defines an “infringing article” as one for which “the design . . . has been copied from a design protected under this chapter, or from an image thereof, without the consent of the owner of the protected design.” H.R. 2196 § 2(e). Importantly, however, the bill excludes the following from this definition: “an illustration or picture of a protected design in an advertisement, book, periodical, newspaper, photograph, broadcast, motion picture or similar medium.” Id. 2(e)(2). Presumably, these “copies” are permitted, at the least, for advertising or marketing purposes.

There is also a carve-out for designs that are independently created, reflect a “trend” or if they are “not closely and substantially similar in overall visual appearance to a protected design.” Id. A “trend” is further defined as “a newly popular concept, idea or principle expressed in, or as part of, a wide variety of designs of articles of appear that create an immediate amplified demand for articles of apparel embodying that concept, idea or principle.” Id. § 2(a)(2)(B).

Unlike other provisions in the Copyright Act, in order to obtain copyright protection for fashion designs, this bill requires an owner to apply for registration within six (6) months of making the design available to the public either in the U.S. or another country. Id. § 2(f)(1). Failure to apply for registration within that narrow window of time will eliminate the designer’s ability to sue under copyright law relating to copies of that specific design. Id.

The bill also anticipates that the Copyright Office would provide free public access to a database cataloging all of the fashion designs that have been registered under this provision. Id. § 2 (j); id. § 2(j)(a)(3). In order for this to be effective, owners must provide a “brief description of the design for purposes of matching the search criteria of the searchable database . . . [but this description] shall in no way limit the protection granted to the design or the subject matter of the registration.” Id. § (f)(3). The database will also contain a “substantially complete visual representation of all fashion designs submitted for registration under this chapter” as well as certain objective information. Id. § 2(j).

This bill also increase certain penalties for filing for protection inappropriately, so that the current statute would be revised to read: “Whoever knowingly makes a false representation materially affecting the rights obtainable under this chapter for the purpose of obtaining registration of a design under this chapter shall pay a penalty of not less than $5,000 [current amount is $500] and not more than $10,000 [current amount is $1,000], and any rights or privileges that individual may have in the design under this chapter shall be forfeited.” Id. § 2(h); see also 17 U.S.C. § 1327 (emphasis added).

If enacted, this bill would have immediate effect. Id. § 3.

Prior Proposals

In 2006, the Copyright Office presented a written statement to the House Subcommittee on Courts, the Internet, and Intellectual Property, Committee on the Judiciary, explaining why the limitations proposed in the then-current bill (H.R. 5055, 109th Congr., 2d Sess., introduced March 30, 2006) might be acceptable. Statement, July 27, 2006. (“The Office believes that if Congress concludes that fashion design protection legislation should be enacted, H.R. 5055 provides a sound basis for balancing competing interests.”). For instance, the Copyright Office applauded the 3-year limitation to protection proposed by the bill:

“Because the peak demand for such [high-fashion] designs is relatively short-lived, a 3-year term is considered adequate to satisfy the designer’s reasonable expectation of exclusivity. . . . The Office applauds the proponents of fashion design legislation for seeking a modest term of protection that appears to be calibrated to address the period of time during which fashion designs are most at risk of being infringed and during which fashion designers are most likely be harmed by the sale of infringing goods. The Office would find it difficult to support fashion design legislation that offered such protection for the 10-year term enjoyed by vessel hull designs, but considers the 3-year term to be reasonable, assuming that the proponents of the legislation are able to make the case for protection.” Id.

The Statement outlines in detail prior proposals seeking protection for fashion and industrial designs, dating back to 1914. Id. Hearings were held about H.R. 5055 on July 27, 2006, but the bill was not enacted before the end of the session.

Current Status of H.R. 2196

Upon introduction on April 30, 2009, the bill was referred to the House Committee on the Judiciary.

Proposal to Restrict Use of Whole Body Image Scanners as Primary Screening Tool in Airport Security

On June 4, 2009, the House passed H.R. 2200, the Transportation Security Administration Authorization Act, which authorized various programs of the TSA. There are at least two House Reports that analyzed the impact and scope of the bill, but the minute details of each are largely beyond the scope of this post. See H.R. Rep. No. 111-123 (May 19, 2009); H.R. Rep. No. 111-127 (May 21, 2009).

Instead, of particular importance was Amendment No. 10 (H. AMDT. 172), introduced on June 4, 2009, by Rep. Jason Chaffetz (R-UT). Cong. Rec. H6206 (daily ed. June 4, 2009); see also id. H6208 (Rep. Chaffetz’s arguments in further support of the Amendment). The Amendment proposed limitations on the use of Whole Body Image (WBI) scanners at airport security checkpoints as a primary screening method, and recommended that travelers be given the option to have a pat-down search instead, unless other primary screening methods identify the person as a potential security risk.

Key Provisions (from a Privacy Perspective) of the Amendment

The key sections of this Amendment are:

(2) PROHIBITION ON USE FOR ROUTINE SCREENING.—Whole-body imaging technology may not be used as the sole or primary method of screening a passenger under this section. Whole-body imaging technology may not be used to screen a passenger under this section unless another method of screening, such as metal detection, demonstrates cause for preventing such passenger from boarding an
aircraft.

(3) PROVISION OF INFORMATION.—A passenger for whom screening by whole-body imaging technology is permissible under paragraph (2) shall be provided information on the operation of such technology, on the image generated by such technology, on privacy policies relating to such technology, and on the right to request a pat-down search under paragraph (4) prior to the utilization of such technology with respect to such passenger.

(4) PAT-DOWN SEARCH OPTION.—A passenger for whom screening by whole-body imaging technology is permissible under paragraph (2) shall be offered a pat-down search in lieu of such screening.

(5) PROHIBITION ON USE OF IMAGES.—An image of a passenger generated by whole-body imaging technology may not be stored, transferred, shared, or copied in any form after the boarding determination with respect to such passenger is made.

Cong. Rec. H6207 (daily ed. June 4, 2009). These amendments were proposed as modifications to 49 U.S.C. § 44901.

House Reports Analyzing Proposed Legislation & Amendments

House Report 111-127 discusses the various amendments to the Bill, and provides another source of the text of the amendment. H.R. Rep. No. 111-127 (May 21, 2009). House Report 111-123 is also available and worth reading for its concise summary of the purpose of the bill. H.R. Rep. No. 111-123 (May 19, 2009).

Arguments in Support of the Amendment

Rep. Carol Shea-Porter (D- NH) co-sponsored the amendment and spoke in support of its adoption:

“When this full-body imaging technology was first introduced, the TSA said that it would only be used as a secondary screening method for those people who set off the metal detectors. Now it has become very clear that the TSA intends for this technology to replace metal detectors at airports all over the country. The New York Times reported as much in an April 7, 2009, article.

“The Chaffetz/Shea-Porter amendment would ensure that full-body imaging remains a secondary screening method. It would also ensure that the people who do go through it are well informed and are given the option of a pat-down.

“Mr. Chair, we do not take this amendment lightly. As a member of the Armed Services Committee, I am very aware of the security threats that are facing our country. We, too, want to ensure that the Department of Homeland Security and the TSA have the tools they need to prevent future terrorist attacks. However, the steps that we take to ensure our safety should not be so intrusive that they infringe upon the very freedom that we aim to protect.

“Two weeks ago, I went to Washington National Airport to view one of these machines. I saw how the technology is being used. I saw the pictures it produces and the inadequate procedures TSA has put into place to protect our privacy. The images are incredibly revealing as I will show you here. This is a gross violation of a person’s right to privacy. It is also illogical because, if we allow this intrusion into our lives, then there should be this same scan at every single train station, at every building that we enter and on every single bus that we board.

So I ask that my fellow Members join me in voting for this resolution and for this amendment.”

Cong. Rec. H6207 (daily ed. June 4, 2009).

In response to the opposition raised during the session (quoted in detail below), Mr. Chaffetz argued in favor of the Amendment:

“Whole-body imaging does exactly what it’s going to do. It takes a 360-degree image of your body. Now, I want to have as much safety and security on the airplanes I’m flying every week, but there comes a point in which in the name and safety and security we overstep that line and we have an invasion of privacy. This happens to be one of those invasions of privacy.

“Now I understand why the gentleman from California expressed his concern. Let me be clear that this amendment on whole-body imaging only limits primary screening. It can be used for secondary screening. You may get people with artificial hips or knees or something else, and they may elect this kind of screening. It’s perfect for them.

“But to suggest that every single American–that my wife, my 8-year-old daughter–needs to be subjected to this, I think, is just absolutely wrong. Now, the technology will actually blur out your face. The reason it does this is because there is such great specificity on their face, that they have to do that for some privacy. But down in other, more limited parts you could see specifics with a degree of certainty that, according to the TSA as quoted in USA Today, ‘You could actually see the sweat on somebody’s back.’ They can tell the difference between a dime and a nickel. If they can do that, they can see things that, quite frankly, I don’t think they should be looking at in order to secure a plane. You don’t need to look at my wife and 8-year-old daughter naked in order to secure that airplane.

“Some people say there is radio communication. There is distance. Well, it’s just as easy to say there is a celebrity or some Member of Congress or some weird-looking person. There is communication.

“You say you can’t record the devices. Many of us have mobile phones or have these little cameras. There is nothing in this technology that would prohibit the recording of these. With 45,000 good, hardworking TSA employees, 450 airports, some two million air traffic travelers a day, there is inevitably going to be a breach of security. And I want our planes to be as safe and secure as we can, but at the same time, we cannot overstep that bound and have this invasion of privacy.

“I urge my colleagues to vote in support of this amendment.”

Cong. Rec. H6208 (daily ed. June 4, 2009).

Arguments in Opposition to the Amendment

Rep. Charles Dent (R-PA) argued in opposition to the amendment, but noted that his opposition was reluctant – favoring the heightened need for security over a slight risk to an individual’s privacy rights:

“Just yesterday, I visited Reagan National Airport and took a look at the whole-body imaging machines over there, and I just have to say a couple of things about this.

“I was impressed by the technology. It seems that we have a great deal of satisfaction from passengers who utilize that type of screening. There are limitations to the magnetometer. A magnetometer can pick up metallic items, like keys, but other prohibited items, like liquids and C4 for potential explosives, will be detected under the whole-body imaging technology but not under a magnetometer. So I do believe that this technology is valid.

“As for the privacy concerns that have been raised, while I understand them, I think they have been overstated. There are strong, strong restrictions in place to make sure that those individuals, the transportation security officers who actually help the passengers go through the whole-body imaging scanning, are not in contact with the person who is actually viewing the image. Those people are in a separate room, so they’re separated. The face of the individual is also blurred, so that’s another protection.

“So I do think that this technology is very valuable. It will help make us safer. Again, I think it is a step in the right direction. So I would reluctantly oppose the amendment. I understand the concerns expressed, but nevertheless, I feel that this technology is valuable and that it enhances security.”

Cong. Rec. H6207 (daily ed. June 4, 2009).

Rep. Daniel E. Lungren (R-CA) opposed the amendment, but without suggesting any reluctance in his opposition:

“I happen to be one of those people who happens to have an artificial hip. Every time I go through, I set off the screener. Every time I go through, I get hand-patted down, and even though they do it in a very nice way, frankly, that’s far more intrusive than going out to the Reagan National Airport and going through that particular system that we’re talking about with those pictures.

“We have been working for many years since 9/11 to try and come up with devices which will allow us to be able to detect those kinds of things that, if brought on airliners, would be a threat to all passengers. The whole-body imaging technology, which this amendment seeks to stop in terms of its application as a primary means of screening, can detect many things such as small IEDs, plastic explosives, ceramic knives, and other objects that traditional metal detection cannot detect. Let me underscore that: this device that this amendment seeks to take off the table as a primary means of screening can detect small IEDs, plastic explosives, ceramic knives, and other objects that traditional metal detection cannot detect. That ought to be enough for us to understand this.

“If you look at the privacy questions, let’s be clear: the person who actually is there, the employee of TSA who is there when you go through this machine, is not the one who reads the picture. That person, he or she, is in another room–isolated. They never see you. They actually talk to one another by way of radio. So this idea that somebody is sitting in this little room, waiting to see what you look like, frankly, is sort of overblown.

“All I can say is this: I have been through many, many pat-downs because I happen to have an artificial hip. Going through this at Reagan National Airport was so much quicker so less intrusive of my privacy than what we go through now. For us to sit here now and to pass an amendment which is going to stop this development and application, frankly, I think, is misguided.

“With all due respect to the gentleman from Utah, who I know is sincere about that, and to the gentlewoman, who is also sincere, I would ask you to rethink this. From my experience, this is far more protective of my privacy than what I have to go through every time I go to the airport, number one; but more importantly, it protects me and every other passenger to a greater extent than any other procedure we have now. We aren’t doing this because we want to do it. We’re doing it because we have people around the world who want to kill us, who want to destroy our way of life, and they have utilized commercial airliners for that purpose in the greatest attack in our Nation’s history since Pearl Harbor.

“This is a device which helps us take advantage of our technological know-how to gain an advance on the enemy. I would hope we would not do this by way of this amendment.”

Cong. Rec. H6207H6208 (daily ed. June 4, 2009).

Current Status of the Bill and Amendment

Initially, the Amendment failed – as recorded by voice vote at 3:00 p.m. on June 4, 2009. (Cong. Rec. H6208). Mr. Chaffetz demanded a record vote, and the vote was postponed until later the same day. Id. Shortly after 4:00 p.m, the amendment passed by a vote of 310 – 118.

The full text of the Amendment can be found in the following places: Cong. Rec. H6206 (daily ed. June 4, 2009); and H.R. Rep. No. 111-127 (May 21, 2009). Text of the bill and the amendments can also be found by checking the current status of either one – they are cross-linked.

The full Bill (H.R. 2200), as amended, passed the House by a record vote of 397 – 25. Cong. Rec. H6216 (daily ed. June 4, 2009). Presumably, this Bill will now travel to the Senate for re-introduction under a new Bill number and further debate.