Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Eversheds Sutherland is pleased to present REDIAL, our annual in-depth analysis of key Telephone Consumer Protection Act (TCPA) issues and trends. REDIAL reports on issues affecting the industries that face TCPA class action liability. Did you know? 2ND 100,000 3X For the fourth consecutive year, The FCC has reported that as many The TCPA imposes liability of TCPA cases are the second most as 100,000 cell phone numbers $500 per call, text or fax, trebled filed type of case in federal are reassigned every day. to $1,500 if the sender’s conduct courts nationwide. is deemed willful. Eversheds Sutherland Industry Knowledge and Focus Few industries are immune from TCPA liability. In 2016, the insurance, financial services, energy and health sectors were uniquely affected by TCPA litigation. REDIAL analyzes key legal issues affecting these industries. Eversheds Sutherland tracks daily all TCPA cases filed across the country. This allows us to spot trends and keep our clients informed. We understand the law and our clients’ businesses, allowing us to design compliance and risk management programs uniquely suited to our clients' specific needs and to spot issues before they result in litigation. When litigation is filed, Eversheds Sutherland’s TCPA team has the depth of experience necessary to zealously defend its clients’ interests in court. Why Eversheds Sutherland? STRENGTH in representing STRENGTH in knowing STRENGTH in advising STRENGTH as trial lawyers the country’s and the world’s our clients’ businesses and counseling our clients in efficiently and zealously leading companies on TCPA compliance representing our clients in class actions filed in state and federal courts across the country Redial: 2016 TCPA Year in Review The TCPA Traffic Light LANDLINE CELL PHONE MARKETING NON-MARKETING MARKETING NON-MARKETING DO NOT PRIOR CALL LIST+ PRIOR AUTODIALED EXPRESS EXPRESS WRITTEN CALLS/TEXTS CONSENT2 CONSENT1 PRIOR PRIOR PRIOR PRERECORDED EXPRESS EXPRESS EXPRESS WRITTEN WRITTEN VOICE CONSENT CONSENT CONSENT DO NOT DO NOT CALL LIST CALL LIST MANUALLY DIALED PRIOR EXPRESS PERMISSION OR FAX ESTABLISHED BUSINESS RELATIONSHIP 1 “Prior express written consent” requires a written agreement, signed by the consumer, that includes, among other things, the telephone number that specifically authorizes telemarketing by automatic dialing/texting or prerecorded voice, and that is not required as a condition of purchase. 47 C.F.R. § 64.1200(f)(8). 2 For non-marketing purposes, providing a cell number in connection with a transaction generally constitutes prior express consent to be contacted at that number with information related to the transaction. 7 F.C.C.R. 8752 ¶ 31 (1992). + Do Not Call List restrictions apply broadly to telemarketing to both cell phones and landlines, but can be overridden by written consent from the consumer. * Opt-out notice and mechanism must be provided. Specific requirements vary. This chart does not constitute legal advice. The chart provides only a general overview of TCPA rules and does not reflect all details needed for compliance. © 2017 Eversheds Sutherland (US) LLP. All Rights Reserved. This chart is for informational purposes and does not constitute legal advice. Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Contents Supreme Court Spotlight Campbell-Ewald Co. v. Gomez: Money for Nothing: Offer of Complete Relief to Named Plaintiff Does Not Moot Class Action, Supreme Court Holds in 6-3 Decision. 1 Spokeo, Inc. v. Robins: Supreme Court Explores Injury Requirement for Federal Statutory Standing . 3 Litigation Developments Dial “C” for Confusion: Courts Split on TCPA Definition of Autodialer . 5 Lewis Wiener, Wilson Barmeyer and Frank Nolan Win Dismissal of TCPA Fax Case: Applying Spokeo, Court Finds Plaintiff Incurred No Actual Harm . .8 Heads I Win, Tails You Lose: TCPA Defendants Finding Success in Striking “Fail-Safe” Class Allegations . 9 Reverse the Charges: Challengers Push Forward in Appeal of 2015 TCPA Order . 11 Dial or Push-Button: Oral Argument in Appeal of FCC Order . 13 Who’s Calling? Standards for Third-Party Liability Diverge Under TCPA . 15 Cruise Ships Miss the Boat on TCPA Compliance to the Tune of Up to $76 Million . 18 Industry Focus TCPA Litigation and the Insurance Industry . 19 TCPA Issues for Healthcare Providers: Are You Covered? . .. 22 Power Outage: Energy Utilities Come Away With Little Under FCC’s TCPA Robocall and Text Ruling . 25 Off the Grid: TCPA Class Action Settlements for Energy Utility Companies . 27 Regulatory Update TCPA Hazards Abound Following Busy Month for the FCC . 29 Voice over Internet Protocol and the TCPA: The Hidden Pothole on the Information Super Highway . 31 The Future of the TCPA TCPA RIP? . 33 Redial: 2016 TCPA Year in Review Supreme Court Spotlight Money for Nothing Campbell-Ewald Co. v. Gomez: Money for Nothing: Offer of Complete Relief to Named Plaintiff Does Not Moot Class Action, Supreme Court Holds in 6-3 Decision An unaccepted Rule 68 offer of judgment that would fully satisfy a named plaintiff’s individual claim does not moot individual or class claims opined the U.S. Supreme Court, resolving a split in the circuits. Campbell-Ewald Co. v. Gomez, No. 14-857 (January 20, 2016). The Court also held that the petitioner’s status as a government contractor does not entitle it to the protection of derivative sovereign immunity. The Campbell-Ewald case was brought under the Telephone Consumer Protection Act (TCPA), but the ruling applies to all class actions where the defendant has made (or could make) a Rule 68 offer of judgment. Left unresolved by the Court is the question of whether actual payment in some form, rather than merely offering to pay a settlement or judgment, would lead to the same result. In the underlying case, the plaintiff Rule 68 offer does not moot a plaintiff’s received a single, unsolicited recruitment individual claims or putative class claims.1 Businesses that find text from the defendant, a marketing Although the mootness ruling was themselves defending consultant hired by the United States consistent with Ninth Circuit precedent, against class actions will Navy. The plaintiff responded by filing a several other federal circuit courts of no longer have the option putative class action against the marketing appeals had held otherwise. consultant, alleging a violation of the of resolving the case TCPA. Before the plaintiff moved for On review of the mootness issue, the by offering judgment to Supreme Court held that an unaccepted class certification, the defendant the named plaintiff. The offer of judgment does not moot a marketing consultant made a Rule 68 Supreme Court held in offer of judgment to the plaintiff for plaintiff’s individual claim or the claims $1,503—$3 more than the maximum of a putative class, embracing the Campbell-Ewald Co. v. amount of treble statutory damages the reasoning of Justice Elena Kagan’s Gomez that an offer of plaintiff could recover for a single violation dissent in Genesis HealthCare Corp. judgment under Rule 68 v. Symczyk, 133 S. Ct. 1523 (2013).2 of the TCPA. The plaintiff declined the does not moot a TCPA offer. Thereafter, the defendant moved In that dissent, Justice Kagan, and now class action claim. to dismiss the plaintiff’s claim, arguing the majority of the Court in Campbell- that the claim was moot because it had Ewald, characterized the unaccepted already offered the plaintiff full and offer as a “legal nullity, with no operative never made the offer. In deciding only complete relief under the TCPA. The effect.” The rejection of a Rule 68 offer the specific issue before the Court, district court denied the motion. of judgment leaves the case as a live Justice Ruth Bader Ginsburg, writing On appeal, the U.S. Court of Appeals for controversy in the same position as it for the majority, declined to opine on the Ninth Circuit held that an unaccepted would have been had the defendant the hypothetical situation in which Telephone Consumer Protection Act: Analysis of Critical Issues and Trends 1 Supreme Court Spotlight Money for Nothing “a defendant deposits the full amount According to the Court, the Navy relied of the plaintiff’s individual claim in an on the contractor’s representation that account payable to the plaintiff, and the list of recipients for text message the court then enters judgment for solicitations included only individuals the plaintiff in that amount.” Justice who had opted in to receive them. Clarence Thomas concurred with the The Court embraced the Ninth Circuit’s judgment on that basis, agreeing that a vicarious liability determination on claims mere offer does not end the case; he against the contractor, and rejected the suggested, however, that his analysis sovereign immunity defense. may have been different had there been actual tender of the funds. Eversheds Sutherland practice point The decision limits the class action defense strategy of picking off the named plaintiff by offering complete relief on an individual basis. This ruling will have a particular impact in cases where the named plaintiff’s damages are limited and well-defined, such as in TCPA cases, because defendants will no longer be able to moot class claims simply by making an offer of individual relief. Chief Justice John Roberts, writing in dissent, advocated for a rule that a complete offer made pursuant to Rule 68 moots the action. According to Justice Roberts, “[w]hen a plaintiff files suit seeking redress for an alleged injury, and the defendant agrees to fully redress that injury, there is no longer a case or controversy for purposes of Article III.” In such circumstances, “the plaintiff cannot demonstrate an injury in need of redress by the court.” Finally, on the question of derivative sovereign immunity for federal contractors under the TCPA, the Supreme Court concluded that a contractor cannot claim this shield when the contractor’s actions are alleged to have violated both federal law and the government’s explicit instructions.
Recommended publications
  • Phoneypot: Data-Driven Understanding of Telephony Threats
    Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].
    [Show full text]
  • Landline Free Ebook
    FREELANDLINE EBOOK Rainbow Rowell | 368 pages | 30 Jul 2015 | Orion Publishing Co | 9781409152125 | English | London, United Kingdom Landline () - IMDb A landline telephone also known as Landline lineland-linemain linehome phonelandlinefixed-lineand wireline is a phone that uses a metal wire or optical fiber Landline line for transmission as distinguished Landline a mobile cellular line Landline, which uses radio waves for transmission. China had more than any other country at million and the United States was second with million. The United Kingdom had The statistics show that the total number of fixed-telephone subscribers in the Landline was about 1. A fixed phone line a line that Landline not a mobile phone line can be hard-wired or cordless and typically refers to the operation of wireless devices or systems in fixed locations such as homes. Landline wireless devices usually derive their Landline power from the utility mains electricity, unlike mobile wireless or portable wireless, which tend to be battery- powered. Although mobile and portable systems can be used in Landline locations, efficiency and bandwidth are compromised Landline with fixed systems. Mobile or portable, battery-powered Landline systems can be used as Landline backups Landline fixed Landline in case of a power blackout or natural disaster. The term landline is also used Landline describe a connection between two or more points that consists Landline a Landline physical cable, as opposed to an always-available private link that is actually implemented as a circuit in a wired switched system usually the public switched telephone network. So-called leased lines are invariably of the latter type; Landline implications of a land line in this context are security and survivability.
    [Show full text]
  • Standard Operating Procedures
    WARRANT PROCEDURES Standard Operating Procedure: #1 Approved: 1/1/09 Revised: 12/13/19 The following Standard operating Procedure (SOP) applies to Warrant arrests, abstracts, cancellations, and other related administrative tasks. Arresting a Subject on a UPD Warrant • If the subject you’ve arrested has been issued a citation for our warrant, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o Clear the warrant out of WPS via CLIPS. Use the W07-cancel wanted person screen. Print the cancellation. Using the “entered by” stamp, stamp the cancellation and sign with your initials. o Keep everything together: Original warrant, copy of warrant, your printouts, original citation, a copy of your citation, face card and warrant jacket. Leave for the dispatcher to finish clearing the warrant out of ICJIS and HTE. • If the subject you’ve arrested needs to be booked into jail, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o The original warrant will accompany you and the subject to jail. The copy will stay with your report. o Clear the warrant out of WPS via CLIPS W07- cancel wanted person screen.
    [Show full text]
  • V-2, Page 1 of 13
    Department Order V-2, Page 1 of 13 California State University, Los Angeles Department of Public Safety NUMBER: V-2 APPROVED: Joseph Curreri, Chief of Police EFFECTIVE: August 7, 2013 SUPERSEDES: March 10, 2011 Reviewed/Revised: August 7, 2013 SUBJECT: Audio, Video, and Telephone Operations I. PURPOSE: To provide a written guideline for telephone and 9-1-1 operations related to the Communications Center. II. POLICY: The Department of Public Safety shall provide for staffing in the Communications Center 24-hours a day, seven days a week, to answer emergency calls for service. III. DEFINITIONS: Refer to Department Order V-1 for appropriate definitions. IV. PROCEDURES: A. 9-1-1 and emergency telephone systems. 1. The 9-1-1 and the campus telephone systems are utilized to provide the campus community with 24-hour, toll-free telephone access for emergency calls. a. 9-1-1 is the single emergency telephone number established for emergency calls for service, with TDD capability. b. Originating point of emergency calls displayed on the Automatic Location Identification (ALI) screen are: 1) Campus pay telephones; 2) Housing telephones; 3) Emergency Operations Center telephones; 4) Campus Emergency telephones; 5) Campus elevator telephones; and, 6) Campus telephones. 2. The following resources are to be used by the dispatcher to help identify the location of the caller, particularly when the caller is unable to speak for themselves: a. An emergency cross-reference list containing campus telephone numbers and their respective locations; b. A campus directory; and, c. AT&T’s 24-hour security hotline number. Department Order V-2, Page 2 of 13 B.
    [Show full text]
  • POLICY/PROCEDURE NUMBER: 01-LEO-001 PATROL Page 1 Of
    California State University NORTHRIDGE Department of Police Services POLICY/PROCEDURE NUMBER: 07-S.O.-011 Page 1 of 42 with five Appendices SUBJECT: POLICE SERVICES COMMUNICATIONS EFFECTIVE DATE: January 7, 2015 REVIEW DATE: January 7, 2016 AMENDS/SUPERSEDES: Department Policies 100-20: Dispatch Area Security, Feb. 5, 2001; 200-10: Elevator Response, Jan. 1, 2000; 200-7: Emergency Notification System, Oct. 15, 1999; 200-6: Emergency Telephones, Jan. 1, 2000; 100-11: Patrol Beats, Jan. 24, 2000; Department Procedural Directives 2003-07: Blue Light Emergency Telephone Information, May 12, 2003; 2003-10: Dispatch and Police Response to Elevator Emergency Calls, June 25, 2003; 2003-13: Emergency Blue Light Response Procedures, Nov. 24, 2003; 2003-11: Student Health Center requests for Ambulances, Aug. 29, 2003; 2004-006: Revision of Procedural Directive Governing On-Campus Injury Notifications, Aug. 3, 2004; 2004-06: Police Notification to Environmental Health & Safety, Aug. 3, 2004; 2004-007: Log Entry onto JDIC/CLETS, Aug. 10, 2004; 2005-01: LAPD Radio Unit Designations for CSUN PD, March 12, 2005; 2005-10: Notifications in Medical Emergency Situations, Aug. 27, 2005; 2005-11: Radio Log Documentation, Aug. 31, 2005; 2005-12: Medical Calls and Assistance from Klotz Health Center, Sept. 6, 2005; 2007-02: Police Officer Call Sign Change, Feb. 16, 2007; and 2007-03: Consolidated Dispatch, March 5, 2007; 2004-015: Science 1101 Alarm (Howitzer Room), December 23, 2004; 2004-014: Blood and Infectious Materials Clean-Up, December 6, 2004; 2005-003: RIMS/Patrol Designations, May 12, 2005; 2008-003: NOAA Public Alert Radio, September 25, 2008; August 9, 2007 version entitled Public Safety Communications; January 27, 2010 version; February 16, 2011 version; January 8, 2014 version.
    [Show full text]
  • Human Factors in Telecommunications? Links in Norway, Steinar M
    Contents Feature Special Guest editorial, Knut Nordby ........................................ 1 First installations of WDM, optical ADM and optical in-line amplifiers on long-haul cable Do we need human factors in telecommunications? links in Norway, Steinar M. Svendsen ..................... 115 Knut Nordby ................................................................. 2 Consumers, not Clients – Empowering users of new technology, Frode Volden ..................................... 9 Speech quality, usability and service quality, Norman Gleiss ............................................................ 14 Status Some current issues of Human Factors in International research and standardization telecommunications, Knut Nordby ............................. 33 activities in telecommunication: Introduction, Per Hjalmar Lehne ................................................... 125 Feedback tones in public telephone networks: Human Factors work at ETSI, Donald M. Anderson .65 The ACTS Project AC215 CRABS; Cellular Radio Access for Broadband Services, The ergonomics of teleworking, John W. Bakke ........ 78 Agne Nordbotten ....................................................... 126 Human factors of videotelephony, Knut Nordby ....... 90 AC066 OPEN – Open Pan-European Network, Torodd Olsen ............................................................ 129 A tactile marker for telephone cards: – From idea to global standard, Knut Nordby ............ 98 MoMuSys, Robert Danielsen ................................... 133 The User-Interface Design
    [Show full text]
  • Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01
    Nortel Communication Server 1000 Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01 www.nortel.com .NN43001-613 Nortel Communication Server 1000 Release: 7.0 Publication: NN43001-613 Document release date: 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 9 Features 9 RLI and DMI enhancement 9 Other changes 9 How to get help 11 Contents 11 Getting help from the Nortel web site 11 Getting help over the telephone from a Nortel Solutions Center 11 Getting help from a specialist by using an Express Routing Code 12 Getting help through a Nortel distributor or reseller 12 Introduction 13 Subject 13 Applicable systems 13 Intended audience 14 Conventions 14 Related information 15 ESA Overview 17 Overview 17 ESA feature summary 18 ESA deployment options 18 Basic ESA 18 Optional internal location determination 18 Optional external location determination 18 Concepts and principles 18 Conveying information to the PSAP 19 The ALI record 19 System components 20 System Components 20 Feature operation 23 Location determination of IP phones 23 Determining that an emergency number has been dialed 23 Determining the correct PSAP responder for caller location 24 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks.
    [Show full text]
  • Minnesota Department of Commerce Telecommunications Access Minnesota
    This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp MINNESOTA DEPARTMENT OF COMMERCE TELECOMMUNICATIONS ACCESS MINNESOTA MINNESOTA RELAY AND TELEPHONE EQUIPMENT DISTRIBUTION PROGRAM 2008 ANNUAL REPORT TO THE MINNESOTA PUBLIC UTILITIES COMMISSION DOCKET NO. P999/M-09-5 JANUARY 29, 2009 Department of Commerce – Telecommunications Access Minnesota 85 7 th Place East, Suite 600 St. Paul, Minnesota 55101-3165 [email protected] 651-297-8941 / 1-800-657-3599 TABLE OF CONTENTS TABLE OF CONTENTS .......................................................................................................1 EXECUTIVE SUMMARY ....................................................................................................2 Minnesota Relay .................................................................................................................2 Telephone Equipment Distribution (TED) Program ........................................................3 TAM Fund ..........................................................................................................................3 PROGRAM HISTORY ..........................................................................................................4 TELECOMMUNICATIONS ACCESS MINNESOTA (TAM) ............................................6 TAM Administration ..........................................................................................................6
    [Show full text]
  • Voip (Voice Over Internet Protocol)
    Seminar 2004 VoIP-Voice over Internet Protocol Department of Electronics & Communication Govt Engineering College Thrissur VoIP (Voice over Internet Protocol) Submitted On Submitted by 15-10-04 Lakshmi Menon S7 ECE 630 Co-ordinator:Muneera C R Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ACKNOWLEDGEMENT First,and foremost I thank God Almighty for making this venture a success. I extend my sincere gratitude to Prof. Indiradevi, Head of Electronics and Communication Department, Govt Engineering College, Thrissur for providing me with necessary infrastructure. I would like to convey a deep sense of gratitude to the seminar co-ordinator Mrs. C R Muneera for the timely advices. I also extend my sincere thanks to my friends for their help. Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ABSTRACT The development of very fast, inexpensive microprocessors and special-purpose switching chips, coupled with highly reliable fibre-optic transmission systems, has made it possible to build economical, ubiquitous, high speed packet-based data networks. Similarly, the development of very fast, inexpensive digital signal processors (DSPs) has made it practical to digitize and compress voice and fax signals into data packets. The natural evolution of these two developments is to combine digitized voice and fax packets with packet data, creating integrated data-voice networks. The voice-over-Internet protocol (VoIP) technology allows voice information to pass over IP data networks. Primarily, the cost savings that accrue from operating a single, shared network have motivated this convergence of telecommunications and data communications. VoIP allows you to make telephone calls using a computer network, over a data network like the Internet.
    [Show full text]
  • University of Florida Thesis Or Dissertation Formatting
    ISLAND CONNECTIONS: MOBILE PHONES AND SOCIAL CHANGE IN RURAL FIJI By RYAN PESECKAS A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2014 1 © 2014 Ryan Peseckas 2 To my parents, who have given me love and unconditional support in all of my pursuits 3 ACKNOWLEDGMENTS I wish to acknowledge the assistance of a number of individuals, communities and organizations, without whose generous help and cooperation I could not have successfully completed this research. At the University of Florida I thank first and foremost my committee chair, Gerald Murray. Jerry took me on as a graduate student in 2006 despite my lack of undergraduate training in anthropology, and has offered helpful advice and encouragement at each step of the way. Peter Collings served as a committee member for both my master’s and PhD research, and likewise has provided much advice, as well as assistance with reading drafts and writing letters of recomendation. I also wish to thank the members of my committee, C.K. Shih, Abdoulaye Kane, and Michael Bannister, for agreeing to oversee my project and for providing valuable input throughout. Also at the University of Florida I am grateful to Christopher McCarty, who went out of his way to assist me with my data analysis, and Paul Richards, who supervised me as a teaching assistant and has been very supportive in my search for post-graduate employment. Finally, I thank my fellow graduate students at the University of Florida, who have been my friends and colleagues during the 7 memorable years I have spent in Gainesville.
    [Show full text]