ࡱ> =?<ky ZbjbjEE .f''R1111M17asss?t)"1F7H7H7H7H7H7H7$8a;Nl7444l7s?76664*s?F764F7666s`H166277076;6 ;66; 7(44644444l7l7644474444;444444444 : Top of Form  HTMLCONTROL Forms.HTML:Hidden.1  HTMLCONTROL Forms.HTML:Hidden.1  HTMLCONTROL Forms.HTML:Hidden.1  HTMLCONTROL Forms.HTML:Hidden.1  HTMLCONTROL Forms.HTML:Hidden.1  Copyright (c) 2006 by Orange County Bar Association Orange County Lawyer May, 2006 48 Orange County Lawyer 18 FEATURE: EMPLOYEE PRIVACY IN THE HIGH-TECH WORLD By Michael Baroni Michael Baroni is General Counsel and Secretary for BSH Home Appliances Corporation. He has written heavily on law and technology, including a number of cutting-edge pieces for The New York Times. He currently serves as Co-Chair of the OCBA's Product Liability Section and may be contacted at  HYPERLINK "mailto:MichaelBaroni@hotmail.com" \t "_blank" MichaelBaroni@hotmail.com. TEXT: [*18] "Naked x-ray" machines. Pens with cameras the size of a pin-head. Cell phones with GPS tracking. Secret voice-stress analyzers used to determine if an employee is lying. Chip implants and office "bugs". Technological advances have drastically altered the modem workplace in recent years, far beyond a plainly-visible video camera mounted in a common area or over a cashier's head. Employers now have the ability to obtain relatively inexpensive "spy" technologies to track, monitor, and record employees and their communications anytime and anywhere -- from cubicles to water coolers, executive offices to home offices, and Internet chat rooms to corporate cars. Employees are often fully exposed, whether they know it or not. General Principles of Employee Privacy It is well established that employees are entitled to a "reasonable expectation of privacy." This is a vague standard, however, requiring an analysis of all relevant factors from the viewpoint of a reasonable person, a viewpoint which is shaped by ever-changing societal norms. Furthermore, the right to privacy is not absolute; it is always balanced against competing interests, such as the desire of an employer to prevent theft or employee drug use. Even the most fundamental of privacy rights, such as protection against involuntary sterilization or freedom to pursue familial relationships, can conceivably be over-ridden by a compelling government interest. Also, absent a statute to the contrary, private entities conceivably could successfully defend invasion of privacy claims with a compelling interest. California Privacy Law In California, an employee has three primary theories for bringing an invasion of privacy claim: (i) The California Constitution; (ii) California's Privacy Act; and (iii) the common law tort of intrusion. California Constitution: Privacy is a specifically referenced right under Article 1, 1 of the California Constitution, and it applies to both governmental and private entities. A plaintiff must establish the following for a claim: (i) a "reasonable expectation of privacy" under the circumstances; (ii) a legally protected privacy interest (which is fundamental to personal autonomy); and (iii) conduct by the defendant that constitutes a "serious" invasion of privacy. Defendants can escape liability if they show they had a legitimate interest and used the least intrusive means given the circumstances. (See  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=85%20Cal.%20App.%204th%20345,at%20353&countryCode=USA" \t "_parent" Jeffrey H. v. Imai, Tadlock & Keeney (2000) 85 Cal.App.4th 345, 353.) California Privacy Act: The Privacy Act (enacted 1967) provides civil and criminal penalties for anyone who engages in unauthorized wiretapping or eavesdropping with an electronic amplifying or recording device. (See  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20PEN%20631&countryCode=USA" \t "_parent" Penal Code 631 and  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20PEN%20632&countryCode=USA" \t "_parent" 632 (criminal) and 637 (civil)). The Act covers all "confidential" communications provided that the parties being listened to or recorded did not consent (consent can be implied where people should have reasonably expected their conversation to be recorded or overheard, such as with customer help-line calls or employees openly conversing in company lunch rooms). Common Law Tort of Intrusion: Intrusion requires a reasonable expectation of privacy (objective standard) and a "highly offensive" invasion thereof (reasonable person standard). This tort includes unwarranted physical intrusions into one's home or hospital room, as well as sensory intrusions like eavesdropping, wiretapping, and visual or photographic spying into one's personal life. (See  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=18%20Cal.%204th%20200&countryCode=USA" \t "_parent" Shulman v. Group W Productions, Inc. (1988) 18 Cal.4th 200). Employer Use of "Spy" Technologies Thanks to rapid technological advances, employers now have greater opportunities than ever to invade employees' privacy. To what extent is it legal for employers to utilize such spy technologies? Spy-Cams: Some laptops and computer monitors now come with tiny cameras embedded in the frame of the computer screen. Company cars can also be easily equipped with spy-cams, as well as almost every object in an office from a plant to a lamp. Some employers see this as a magnificent new opportunity to monitor employees at any time. Most employees, on the other hand, would be less than enthusiastic about possibly being watched every second -- particularly those who work outside of the traditional office. Imagine an un-showered home-office employee working on a computer in his or her underwear, or an employee using a company van for extra-marital trysts, or a traveling salesman catching up on e-mails from a hotel bar, all being watched without their knowledge. . . not a pretty sight. A recent case,  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=2005%20Cal.%20App.%20Unpub.%20LEXIS%208699&countryCode=USA" \t "_parent" Crist et al v. Alpine Union School District ((2005) 2005 Cal. App. Unpub. Lexis 8699), provides new guidance. In Crist, the District installed a concealed video surveillance system in an enclosed, albeit unlocked, office where two female employees worked and often changed or performed "hygiene" functions. The [*19] primary significance of Crist is the court's statement: "Employees can expect that an office provided for their use, to which they may retreat and close the door while performing their work duties, would not normally be subject to secret video surveillance by their employer." If the office has a door lock, the expectation for privacy increases. But if it has a window through which others can see, the privacy expectation is diminished. Certainly, then, a home office would be completely off limits from visual snooping. The only instances where spy-cams would be legal is if the employer (i) has a policy of notifying its new hires of such visual monitoring (preferably obtaining the employee's written consent) and (ii) has a demonstrable compelling interest that is tightly tailored to that interest (e.g., a defense contracting firm where employees are working on issues of national security or an Arizona-border company with a fleet of vans used to prevent the smuggling of illegal drugs or immigrants). It follows, then, that most uses of spy technologies to watch employees would be illegal, such as a boss who installs an eraser-head-sized camera in a worker's office clock simply out of paranoia, curiosity, or lust (e.g., knowing that a certain female employee changes clothes after work in her office). Also, the California Labor Code provides that cameras in employee bathrooms, locker-rooms, and changing rooms are illegal. Finally, a justification for visual spying does not necessarily grant an employer the right to aurally snoop. Vocal "Bugging": Employers are now able to listen to, and record, employees' conversations, including in corporate cars, outside the office building, and even inside home offices (since laptops and cell phones can easily be equipped with remote listening capability). In general, employees have a reasonable expectation of privacy whenever they reasonably perceive that their conversations are being conducted in private. Even where a conversation isn't entirely private, there may still be a reasonable expectation of privacy against employer intrusion. In Crist, for example, the court stated that "an employee might expect that workplace conversations may be overheard by other nearby employees, while not expecting that conversations will be electronically intercepted and overheard by a supervisor in another part of the building." (See also  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=20%20Cal.%204th%20907,at%20918&countryCode=USA" \t "_parent" Sanders v. American Broadcasting Companies (1999) 20 Cal. 4th 907, 918-919).) Another recent case,  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=2005%20Cal.%20App.%20Unpub.%20LEXIS%201495&countryCode=USA" \t "_parent" Fischl v. New Horizons Computer Learning Centers, Inc. ((2005) 2005 Cal. App. Unpub. Lexis 1495, *, *22-23), makes it clear that an employer violates employee privacy by monitoring personal phone calls absent a compelling justification. In Fischl, Fischl's boss knowingly upset Fischl by telling him to report every day at 7:30 a.m. This directive directly conflicted with Fischl's need to take his son to school. The boss thereafter listened in on a personal phone call during which Fischl referred to company management as "Nazis." Fischl was immediately fired. The key implication of Fischl is that employers may monitor calls where employees are informed and consent to it, and a legitimate business purpose for doing so exists (as with call center employees). An employer has no right, however, to listen in on calls of a personal nature or to randomly tap employee conversations -- in fact, doing so is a crime in California (the Penal Code states that such conduct "cannot be tolerated in a free and civilized society"). Thus, listening in on the private conversations of an employee through spy technologies is an illegal invasion of the employee's privacy. A boss cannot, for example, "accidentally" leave her cell phone in another person's office so she can listen into the employee's office remotely. Also prohibited are sound-enhancement devices used to listen to employee parking-lot conversations or listening devices installed in company automobiles. Even where the monitoring of business conversations might otherwise be legal, once an employer hears that the conversation is of a personal nature, he or she must immediately stop listening. Some employers use voice-stress analyzers without an employee's knowledge. Typically this is done during an investigative interview by a human resources department to help determine if an employee is lying. This spy-tech tactic clearly violates an employee's privacy rights. In addition, use of a lie detector is specifically prohibited by  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20LAB%20432.2&countryCode=USA" \t "_parent" Labor Code 432.2. Tracking Employee Movements: It has been clearly established that there is no privacy violation where an employer tracks its employees through GPS systems in company cars provided that the company properly informs employees of its tracking policy and limits the actual monitoring to business purposes. The rationale is that companies have a legitimate business interest in knowing where their cars are at all times and where their employees are during work hours (particularly employees whose job functions are mainly outside of the office, such as traveling salespeople or service [*20] techs). The same reasoning would likely apply to cell phones with GPS tracking. Employers should, however, resist the urge to track an employee's off-hours activity. The employee ID card has also undergone drastic technological advances. Now, ID cards using infrared technology can track an employee's location at any time. Thus, a company can watch the movements of every employee, no matter where they are in the office, like a 3-D video game. Some companies, like CityWatcher.com, have gone even further by implanting chips into the flesh of their employees. These chips can track employees wherever they go -- even outside of the office. While no company can require such a bodily invasion after a person is already employed, employers can require it as a condition of employment if a serious and legitimate business purpose is being served (for example, a high-tech company that makes such chips for the CIA needs to ensure security). There are endless tracking device possibilities. For example, biometric thumb-print scanners can be installed on bathroom stall doors before opening, so that employers can monitor how long or frequently employees use the bathroom each day. For some employers, such detailed tracking may be an irresistible means of increasing efficiency. If an employee spends 35 minutes a day in the bathroom, fire them and get someone who only spends 10 minutes! Scanning People and Their Personal Possessions: As a society, we are well used to passing our bodies and possessions through airport or court house security devices. Metal detectors are even used in some high schools to prevent carrying weapons onto school property. But what if these types of devices become commonplace in the office? Most likely, people--and the law--would accept the notion of scanners in the corporate world if the masses were convinced that they were needed for a legitimate safety purpose. But what about the newest wave of scanners, such as "naked x-ray" machines which provide a virtual outline of a person's body beneath their clothes--fat wrinkles, body piercings, the dimensions of one's privates, all in plain view, and potentially recorded for all time? While this technology is now being pushed for in airline security, how long before this technology is used in the corporate environment, ostensibly to prevent employees from stealing or from bringing in drugs or weapons? It is quite plausible that certain companies (like defense contractors) could employ such technologies on the grounds of [*22] national security, but how long before society accepts the idea of being routinely scanned just to enter the office? Big Brother PC: By now, employees are well used to the idea that employers can legally view employees' Internet usage, read their e-mails, or view their phone-call log. A recent case,  HYPERLINK "http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=131%20Cal.%20App.%204th%201027&countryCode=USA" \t "_parent" People v. Jiang ((2005) 131 Cal. App. 4th 1027), demonstrates that the extent of an employee's expectation of privacy largely depends on the wording of the employer's policy. If the policy doesn't specifically state that the employee has no expectation of privacy in personal computer files, then the employer may be violating privacy by snooping into any files marked "personal". In general, however, employees have no expectation of privacy on their employer-provided computers -- even if those computers sit in home offices (as in Jiang). More advanced technology is rapidly being deployed in offices, such as software which tracks an employee's computer keyboard usage through "key strokes" or "key words" (which can be used to see how much work can employee does). Employers are also more frequently reviewing the personal e-mails and instant messaging of their employees. If an employee is instant-messaging friends or writing personal e-mails on their personal Yahoo! account, the boss has the effortless ability to watch and read the communication as it happens and even trace the employee's personal passwords through the key stroke technology. Once an employer realizes she is poking into an employee's private communications, the law dictates she should immediately cease. This is true even if the employer issued a policy stating that company equipment may be monitored at any time and that the employee should have no expectation of privacy. The problem, of course, is that employees usually never know they're being monitored. "Big Brother's" Insidious Invasion As demonstrated above, an employee's privacy rights depend on a reasonable expectation of privacy given the facts. This "expectation" is dependent on ever-changing societal norms. Thus, the more that monitoring technologies invade our lives, and the more we get used to them, the less we "expect" to have privacy. Privacy thereby erodes until it ceases to exist. Compelling reasons can always be bandied about as justification for the "need" to monitor people. The most compelling reason is to tell us that monitoring is needed for our own safety (to [*23] protect us from killers, rapists, pedophiles, kidnappers, drug gangs), or better yet, that it's a matter of "national security," or protection from terrorists. Instilling a fear of harm, and then offering corporate or government protection to save us all from such harm, is a highly efficient tactic for getting people to enthusiastically give up their rights. And once given up, those rights are irretrievably lost in the graveyard of legal precedent. Think that people aren't getting used to being monitored or even coming to desire it? In Philadelphia, a city councilman has proposed a massive build-out of cameras to help "prevent crime" and plans to obtain voter approval (if voters approve it, legally there can be no "expectation" of privacy in that community). In Baltimore, hundreds of high-tech street cameras have recently been installed. Chicago's nickname could well change from the Windy City to the Surveillance City as the mayor is virtually forcing thousands of businesses to install cameras. Houston is now requiring security cameras as a condition for certain building permits. In fact, millions of dollars in Homeland Security grants are being used, not to fight "terrorists," but to blanket towns across America with an arsenal of spy cameras built by the same companies that build our jets, bombs, and submarines. The federal government even actively targets children to get them used to the idea of being spied on; the National Security Agency, for example, has cartoon characters known as the "CrytoKids" to make a surveillance-society seem cool. Grade schools have tagged children with Radio Frequency Identification tags in California and employed iris-scanning technology in New Jersey on the grounds of keeping our kids "safe" -- and getting them used to being monitored. Parents who refuse to submit are barred from school property. London's Heathrow airport has begun to use eye-scanners to identify travelers (for now, it's "voluntary," but signing up gets you VIP treatment). Also, London has begun to scan all cars and their occupants entering the city and use facial-feature recognition technology (like Las Vegas casinos) to track people randomly on streets. London is not only the most heavily-surveilled city in the world, but the only one with talking cameras which publicly reprimand people for certain behavior ("step away from the curb," "your car is illegally parked," "pick up the tissue you dropped and place it in the receptacle on the Northeast corner"). Anyone who has read Orwell's 1984 will immediately see the eerie, ominous comparison to the ever-watchful telescreen of Big Brother keeping citizens in a fog of fear. In London, as in American cities, the effect of having a network of cameras will ultimately result in the chilling, omnipresent atmosphere of being watched. And once we all have the "expectation" of being constantly watched in an all-pervading web of mass surveillance, by legal definition there can be no "expectation" of privacy. The right of privacy will simply wither away and die. The only way to stop this nightmare from happening is to enact statutes which specifically prohibit the spy activities before they become a societal norm. Otherwise, will there be any legal justification for privacy in the workplace once society is fully conditioned to being monitored, tracked, and recorded 24/7? Only time and technology will tell. . .   ./02STUWxyz|ӿӘq^J7$jhh6Q<CJ U^JaJ 'jͧJ hh6QCJ UV^JaJ $j2hh6Q<CJ U^JaJ 'jΧJ hh6QCJ UV^JaJ $jhh6Q<CJ U^JaJ 'jϧJ hh6QCJ UV^JaJ $jhh6Q<CJ U^JaJ 'jЧJ hh6QCJ UV^JaJ hh6QCJ ^JaJ !jhh6QCJ U^JaJ hh6Q<CJ ^JaJ    7 PYKq $&T((h*I-X24 dd[$\$gd6Q$a$gd6Qgd6Q$&dPa$gd6Q qrjk|}Z[^_RS12no t!u!!!,,,,G-H-^-_-R.S...!6"66677ǺǺǧǺǺǧǺǺǧǺǺǧǺǺǧǺǺǧǺǺǧǺǺǧǺǺǧhh6Q5CJ \^JaJ $hh6Q>*B*CJ ^JaJ phhh6QCJ ^JaJ !jhh6QCJ U^JaJ $jhh6Q<CJ U^JaJ 'j̧J hh6QCJ UV^JaJ ;47:; =>@ACWDnGIzKLnOTXYZ dd[$\$gd6Q7fDgDNEOEEEZ$hh6Q>*B*CJ ^JaJ ph!jhh6QCJ U^JaJ hh6QCJ ^JaJ ,1h/ =!"#$% Dd hb  c $A? ?3"`?2eİ^p3 AD `!9İ^p3 ` |xmJAƿ]B*ZY)&y  ADe,}|"*Jaf;6-s|77'h~` 'м,2ju1 6j@tqD^^I>?W$ܳ#@"?+%ܰڔݴ$铺U#<o@8\՞Y'*3Zi+3 znXs>țGӇn&w-;{)f ֿasX"{`݃~ zؑ}mt6NDd hb  c $A? ?3"`?2a #>b=?!j{=_ `!5 #>b=?!j{` |xmJA\Lr6*R'0oa1 lR'ЀoZH*9@埝fV;֡_`xYa䮇<&<Y1wY)NaeV/Ϗ)k$!T[EסG)yb%y{s^>) 1-}UtsURVl1yAcq?-V<]]S^ͣS7fŬ7lUsGf{mKޚ _5!Dd hb  c $A? ?3"`?2Z`{Zu[>UJv `!Z`{Zu[>UJr` |xmP91$K HTTPX(>P)ARHcOf0 @n6@w]<}7_BDү Yo'*0>cYIu^/gf_e2:ZJK㞜.sNׅa阜>M3°%n@0Ʌ4"gf$As.-mc"Dd hb  c $A? ?3"`?2gP{pQП=n CB `!;P{pQП=n ` | xmJAƿ]/&*bBE++E}i"& "(&`K@74H*9؀͟ ꀟX 4/􁦃euqOfb;l .FIDucEJR1 Z*r^.kFkSԢ%9Hԭ) }UtsURfly=CΠ汈OzwW7yd䁶7eb`6NJ ؿhPQn[b_6%Dd hb  c $A? ?3"`?2oLulHdIf[K_ `!CLulHdIf[` |xuJ@ٍ6CAۃJXn ]00xffx_:YPKMԤ |7$kE^_֤ | )a6Q3-y=gXbi&|+ݜ\R^$CO;Fڛl5~`F6p?5h5q~$$7  !"#$%&'()*+,-./012356789:;>BVACDEFGHIKJMLONPQRTSUjWXYd[\]^_`abcefghimnopqrstuvwxyz{|}~Root Entry# Fh@,Data 4WordDocument".fObjectPool `Hh_1250338768U\g`H`HPRINTCompObjqObjInfo   !"$'*+,-./02589:;<=>@CDGHIJKLNOPQRSTUVWXZ[\]^_`abcdefghijklmnopqrstvwxyz{|}~ {   `- !_ !_- ! !^- !^ !]qod- ! !\  `I. 2 ^@Arialj Xww 0w f-  2  118' U\gForms.HTML:Hidden.1Embedded ControlForms.HTML:Hidden.19q2U\g<INPUT TYPE="hidden" NAME="totalHits" VALUE="118">DefaultOcxName {   `- !_ !_OCXDATA tOCXNAME _1250338767 U\g`H`HPRINT- ! !^- !^ !]qod- ! !\  `I. 2 ^@Arialj Xww 0wf-  2  1' U\gForms.HTML:Hidden.1Embedded ControlForms.HTML:Hidden.19qCompObj qObjInfoOCXDATA rOCXNAME"2U\g<INPUT TYPE="hidden" NAME="currentHit" VALUE="1">DefaultOcxName1 {    `- !_ !_- ! !^- !^ !]qod-_1250338766U\g`H`HPRINTCompObj#qObjInfo% ! !\  `I. 2 ^' U\gForms.HTML:Hidden.1Embedded ControlForms.HTML:Hidden.19q2U\g<INPUT TYPE="hidden" NAME="scrollTo">OCXDATA&ZOCXNAME("_1250338765U\g`H`HPRINT)DefaultOcxName2 {   `- !_ !_- ! !^- !^ !]qod- ! !\  `I. 2 ^@Arialj Xww 0wfr- 2  HIT_1' U\gForms.HTML:Hidden.1Embedded ControlForms.HTML:Hidden.19q2U\g<INPUT TYPE="hidden" NAME="hitNo" VALUE="HIT_1">DefaultOcxName3 {   `CompObj1qObjInfo3OCXDATA4pOCXNAME6"_1250338764U\g`H`HPRINT7CompObj ?qObjInfoA- !_ !_- ! !^- !^ !]qod- ! !\  `I. 2 ^@Arialj Xww 0w^ f,-  2  21' U\gForms.HTML:Hidden.1Embedded ControlForms.HTML:Hidden.19q2U\g<INPUT TYPE="hidden" NAME="docIdentifier" VALUE="21_T198880437122GNBFI">DefaultOcxName4Oh+'0p OCXDATA!BOCXNAMEE"1Table-l;SummaryInformation($F  , 8 DPX`h Ken NugerNormal Ken Nuger3Microsoft Office Word@{4@@: b F0* pHdProjectQ(@= l VH< J< rstdole>stdoleP h%^*\G{00020430-C 0046}#2.0#0#C:\WINDOWS\System32\e2.tlbDocumentSummaryInformation8Z Macros*`H`HVBA(`H`HdirM#OLE Automation`ENormalENCrmaQF  * \C VH!OfficgOficg!G{2DF8D04C-5BFA-101@B-BDE5gAjAe42ggram Files\CommonMicrosoft Shared\@10\MSO.DLL# 10.0 Ob Library%xMSF!As>MSFBs3@dD452EE1-E08F0A-8-02608C4D0BB4dFM20L'BF p&/;"1?D|~ C00}#@8@# 5h0 A1C8C6967-A96B-4FB4-9BFF-6F1814E2A1FɚDOCUME~1\KENNUGLOCALSTemp\W`ord8.c8.xexdd=".E .`M A"dThisDocumentG Tis"Dlcuen 2` H1By",)""+pp.%d)x*DefaultOcxName4, 5, 5, MSForms, HTMLHidden*DefaultOcxName3, 6, 6, MSForms, HTMLHidden*DefaultOcxName2, 7, 7, MSForms, HTMLHidden*DefaultOcxName1, 8, 8, MSForms, HTMLHidden)DefaultOcxName, 9, 9, MSForms, HTMLHiddenMEThisDocument')Y_VBA_PROJECTu PROJECT&+PROJECTlk,6PS"SS"s<<<<(1Normal.ThisDocument0(%* 0* `*! *# *%  %*'X  %*)P %*+ %*- %*/ (*\R8005*#83xAttribute VB_Name = "ThisDocument" Bas1Normal.VGlobal!SpaclFalse CreatablPre declaIdTru BExposeTemplateDeriv$Custom izC1ControlDefa@ultOcxm4, 5MSFs, HTMLH`idden"3, 69"2, 79"1, 819, 9String=as  *\G{000204EF-0000-0000-C000-000000000046}#4.0#9#C:\PROGRA~1\COMMON~1\MICROS~1\VBA\VBA6\VBE6.DLL#Visual Basic For Applications*\G{00020905-0000-0000-C000-000000000046}#8.2#0#C:\Program Files\Microsoft Office\Office10\MSWORD.OLB#Microsoft Word 10.0 Object Library*\G{00020430-0000-0000-C000-000000000046}#2.0#0#C:\WINDOWS\՜.+,D՜.+,, hp|  *R  Title 8@ _PID_HLINKSA<6*http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=131%20Cal.%20App.%204th%201027&countryCode=USA 9T'http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20LAB%20432.2&countryCode=USA $$http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=2005%20Cal.%20App.%20Unpub.%20LEXIS%201495&countryCode=USA Y-!http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=20%20Cal.%204th%20907,at%20918&countryCode=USA *http://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=2005%20Cal.%20App.%20Unpub.%20LEXIS%208699&countryCode=USA kWhttp://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=18%20Cal.%204th%20200&countryCode=USA thttp://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20PEN%20632&countryCode=USA whttp://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=CA%20PEN%20631&countryCode=USA 5Nhttp://www.lexisnexis.com.libaccess.sjlibrary.org/us/lnacademic/mungo/lexseestat.do?bct=A&risb=21_T1988804371&homeCsi=156111&A=0.6038149799553917&&citeString=85%20Cal.%20App.%204th%20345,at%20353&countryCode=USA :!mailto:MichaelBaroni@hotmail.com System32\stdole2.tlb#OLE Automation*\CNormal*\CNormalVH(*\G{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}#2.2#0#C:\Program Files\Common Files\Microsoft Shared\Office10\MSO.DLL#Microsoft Office 10.0 Object Library*\G{0D452EE1-E08F-101A-852E-02608C4D0BB4}#2.0#0#C:\WINDOWS\System32\FM20.DLL#Microsoft Forms 2.0 Object Library*\G{1C8C6967-A96B-4FB4-9BFF-6F1814E2A1F6}#2.0#0#C:\DOCUME~1\KENNUG~1\LOCALS~1\Temp\Word8.0\MSForms.exd#Microsoft Forms 2.0 Object Library.E .`M  VH<dThisDocument1T48568714ThisDocument) SBebc`'WordkVBAWin16~Win32MacVBA6#Project1 stdole`Project- ThisDocument< _EvaluateNormalOfficeuMSFormsCDefaultOcxName9+DefaultOcxName8*DefaultOcxName7)DefaultOcxName6(DefaultOcxName5'DefaultOcxName4&DefaultOcxName3%DefaultOcxName2$DefaultOcxName1#DefaultOcxNameDocumentj`  ID="{B3920676-736D-4614-A76D-FFB2260E0EC4}" Document=ThisDocument/&H00000000 Name="Project" HelpContextID="0" VersionCompatible32="393222000" CMG="ECEE2154FF4703470347034703" DPB="DBD91649044A044A04" GC="CAC8077AF77BF77B08" [Host Extender Info] &H00000001={3832D640-CF90-11CF-8E43-00A0C911005A};VBE;&H00000000 &H00000002={000209F2-0000-0000-C000-000000000046};Word8.0;&H00000000 U\gU\gThisDocumentThisDocument  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qPROJECTwm)CompObj%y^ 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH H`H Normal CJOJQJ_HaJmH sH tH DA D Default Paragraph FontRiR  Table Normal4 l4a (k (No List ^\^6Q z-Top of Form$&dPa$<CJ^JaJ&& 6Qverdana 6Qhit4U!4 6Q Hyperlink >*ph 1 6Qbold<B< 6Qloosedd[$\$OJQJ$Q$ 6Qitalica 6Ql3b*Wq* 6QStrong5\ 6Ql3d 6Ql4bd]d6Qz-Bottom of Form$$dNa$<CJ^JaJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] R f7Z.024Z/1 .01SUVxz{ q j|Z^R1nt$$G%^%R&&!../f<N==R[[[[[XXXXXXXXXX    8@0(  B S  ?top ORIGHIT_2HIT_2 ORIGHIT_3HIT_3 ORIGHIT_5HIT_5 PAGE_18_9672 ORIGHIT_6HIT_6 ORIGHIT_7HIT_7 ORIGHIT_8HIT_8 ORIGHIT_9HIT_9 ORIGHIT_10HIT_10 ORIGHIT_11HIT_11 ORIGHIT_13HIT_13 ORIGHIT_14HIT_14 ORIGHIT_15HIT_15 ORIGHIT_16HIT_16 ORIGHIT_17HIT_17 ORIGHIT_18HIT_18 ORIGHIT_19HIT_19 ORIGHIT_20HIT_20 ORIGHIT_21HIT_21 ORIGHIT_22HIT_22 ORIGHIT_23HIT_23 ORIGHIT_24HIT_24 ORIGHIT_25HIT_25 ORIGHIT_26HIT_26 ORIGHIT_27HIT_27 ORIGHIT_28HIT_28 ORIGHIT_29HIT_29 ORIGHIT_30HIT_30 ORIGHIT_31HIT_31 ORIGHIT_32HIT_32 ORIGHIT_33HIT_33 ORIGHIT_35HIT_35 ORIGHIT_36HIT_36 ORIGHIT_37HIT_37 ORIGHIT_38HIT_38 ORIGHIT_39HIT_39 ORIGHIT_40HIT_40 PAGE_19_9672 ORIGHIT_41HIT_41 ORIGHIT_42HIT_42 ORIGHIT_43HIT_43 ORIGHIT_44HIT_44 ORIGHIT_45HIT_45 ORIGHIT_46HIT_46 ORIGHIT_47HIT_47 ORIGHIT_48HIT_48 ORIGHIT_49HIT_49 ORIGHIT_50HIT_50 ORIGHIT_51HIT_51 ORIGHIT_52HIT_52 ORIGHIT_53HIT_53 ORIGHIT_54HIT_54 ORIGHIT_55HIT_55 ORIGHIT_56HIT_56 ORIGHIT_57HIT_57 ORIGHIT_59HIT_59 ORIGHIT_60HIT_60 ORIGHIT_61HIT_61 ORIGHIT_62HIT_62 ORIGHIT_63HIT_63 ORIGHIT_64HIT_64 ORIGHIT_65HIT_65 ORIGHIT_67HIT_67 ORIGHIT_68HIT_68 ORIGHIT_69HIT_69 ORIGHIT_70HIT_70 ORIGHIT_71HIT_71 ORIGHIT_72HIT_72 ORIGHIT_74HIT_74 ORIGHIT_75HIT_75 ORIGHIT_76HIT_76 ORIGHIT_77HIT_77 ORIGHIT_78HIT_78 ORIGHIT_79HIT_79 ORIGHIT_80HIT_80 PAGE_20_9672 ORIGHIT_81HIT_81 ORIGHIT_82HIT_82 ORIGHIT_83HIT_83 ORIGHIT_84HIT_84 ORIGHIT_85HIT_85 ORIGHIT_86HIT_86 ORIGHIT_87HIT_87 ORIGHIT_88HIT_88 ORIGHIT_89HIT_89 ORIGHIT_90HIT_90 ORIGHIT_91HIT_91 ORIGHIT_92HIT_92 ORIGHIT_93HIT_93 ORIGHIT_94HIT_94 PAGE_22_9672 ORIGHIT_95HIT_95 ORIGHIT_96HIT_96 ORIGHIT_97HIT_97 ORIGHIT_98HIT_98 ORIGHIT_99HIT_99 ORIGHIT_100HIT_100 ORIGHIT_101HIT_101 ORIGHIT_102HIT_102 ORIGHIT_103HIT_103 ORIGHIT_104HIT_104 ORIGHIT_105HIT_105 ORIGHIT_106HIT_106 ORIGHIT_107HIT_107 ORIGHIT_109HIT_109 ORIGHIT_110HIT_110 ORIGHIT_111HIT_111 ORIGHIT_112HIT_112 ORIGHIT_113HIT_113 ORIGHIT_114HIT_114 ORIGHIT_115HIT_115 ORIGHIT_117HIT_117 ORIGHIT_118HIT_118 ORIGHIT_120HIT_120 ORIGHIT_122HIT_122 PAGE_23_9672 ORIGHIT_123HIT_123 ORIGHIT_124HIT_124 ORIGHIT_125HIT_125 ORIGHIT_126HIT_126 ORIGHIT_127HIT_127 ORIGHIT_128HIT_128 ORIGHIT_129HIT_129AA%%\\99 D D b b 6 6 ' ' b b KKxxddII??dd  !!!!""""##r#r#&&&&((E)E)))******X+X+++,,------//_/_/////000000W111 2 25252j2j22222333355c6c6993:3:z:z:;;1;;; < <====1>1>P>P>>>>>??|?|???B@B@@@AAAABBBBBBCCCCCCBDBDDDuEuEEHHALALMMXQXQnQnQgRgRRRR  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~AA%%\\99 D D b b 6 6 ' ' b b KKxxddII??dd  !!!!""""##r#r#&&&&((E)E)))******X+X+++,,------//_/_/////000000W111 2 25252j2j22222333355c6c6993:3:z:z:;;1;;; < <====1>1>P>P>>>>>??|?|???B@B@@@AAAABBBBBBCCCCCCBDBDDDuEuEEHHALALMMXQXQnQnQgRgRRRRu{   29uz""S&Y&&&D'J'L'T'j'p'''8(>(j(p(((KK_NiNOOR-3 !JKi MnNXq$G%I%\&]&&/>0.;3;EEFFGMKMR3333333333333333R#l(6Q{S RR@//X)//RH@UnknownG* Times New Roman5Symbol3. * ArialA BCambria Math"qh*&+&tb F *b F *!24RRm2HP ?6Q2!xx Ken Nuger Ken Nuger