Lending Credence to the Benefits of Allowing Emails, Text Messages, and Social Media in a Shareholder Demand, 54 UIC J

Total Page:16

File Type:pdf, Size:1020Kb

Lending Credence to the Benefits of Allowing Emails, Text Messages, and Social Media in a Shareholder Demand, 54 UIC J UIC Law Review Volume 54 Issue 1 Article 5 2021 Expanding the World of Section 220: Lending Credence to the Benefits of Allowing Emails, extT Messages, and Social Media in a Shareholder Demand, 54 UIC J. Marshall L. Rev. 345 (2021) Drake Edward Follow this and additional works at: https://repository.law.uic.edu/lawreview Part of the Law Commons Recommended Citation Drake Edward, Expanding the World of Section 220: Lending Credence to the Benefits of Allowing Emails, Text Messages, and Social Media in a Shareholder Demand, 54 UIC J. Marshall L. Rev. 345 (2021) https://repository.law.uic.edu/lawreview/vol54/iss1/5 This Comments is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Review by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. EXPANDING THE WORLD OF SECTION 220: LENDING CREDENCE TO THE BENEFITS OF ALLOWING EMAILS, TEXT MESSAGES, AND SOCIAL MEDIA IN A SHAREHOLDER DEMAND DRAKE EDWARD* I. INTRODUCTION ............................................................... 345 II. BACKGROUND ................................................................. 348 A. The Rights of a Shareholder .................................... 348 B. Section 220 Demand ................................................ 350 C. The Traditional Meaning Of “Books and Records” .................................................................... 352 D. Corporations and The Use of Technology ............... 354 III. ANALYSIS ........................................................................ 357 A. Admissibility of Emails ........................................... 358 1. Emails in Other Areas of the Law .................... 358 2. Emails in the Context of Section 220 ............... 360 3. Comparative Analysis of Emails Inside and Outside the Context of Section 220 .................. 361 B. Admissibility of Text Messages ............................... 362 1. Text Messages in Other Areas of the Law ....... 362 2. Text Messages in The Context of Section 220 . 364 3. Comparative Analysis of Text Messages Inside and Outside the Context of Section 220 ........... 365 C. Admissibility of Social Media .................................. 366 1. Social Media in Other Areas of the Law ........... 366 a. Authentication of a Social Media Page ... 366 b. Authentication of a Social Media Message .................................................... 368 2. Comparative Analysis of Social Media to Emails and Text Messages ............................................ 369 D. Foreseeable Detriments in Expanding the Scope of Section 220 To Allow for Emails, Text Messages, and Social Media ............................................................. 369 IV. PROPOSAL ....................................................................... 370 A. Broadening the “Books and Records” Language of Section 220 ............................................................... 371 B. Preservation of Documentation .............................. 371 C. Section 220 Relevancy Standard ............................. 372 D. Adopting the New York Approach to Social Media to Section 220 ............................................................... 373 E. The Admissibility Standard .................................... 374 F. Authentication ......................................................... 375 V. CONCLUSION ................................................................... 377 I. INTRODUCTION Within corporate America, it is becoming commonplace to see a news headline or Twitter trend every day regarding an internal scandal happening in a large company.1 To illustrate, in 2016, the *Drake Edward, Juris Doctor, UIC John Marshall Law School, 2021. Thank 346 UIC John Marshall Law Review [54:1 Consumer Financial Protection Bureau (CFPB) imposed a $100 million fine on Wells Fargo Bank for opening millions of deposit and credit card accounts without the consent of the accountholders.2 Due to competitive sales targets and cash incentives, Wells Fargo employees would boost sales figures by opening accounts and secretly transferring funds from customer accounts without their knowledge.3 Because the scandal was so large and affected so many customers, Wells Fargo also had to pay fifty million dollars to the City of Los Angeles and thirty-five million dollars to the Office of Comptroller of the Currency.4 Other corporate scandals have arisen from a failure to disclose certain information, inappropriate work relationships, or a violation of fiduciary duties.5 When the shareholders of a company become aware of improper conduct and it catches the attention of the media, the shareholders seek answers.6 Often, the question is whether the Board of Directors was involved or knew of the wrongdoing.7 Shareholders will seek said answers by launching a demand you to my mom for her continued support throughout law school and the writing process of this Comment. I hope this Comment will serve to spark thought- provoking conversations surrounding the nuances of corporate law. 1. Ariel Schwartz, BP Greenwasehes Post-Deepwater Horizon CSR Report, FASTCOMPANY (Mar. 25, 2011), www.fastcompany.com/1742432/bp- greenwashes-post-deepwater-horizon-csr-report [perma.cc/2ULP-7C6J] (highlighting that the most recent and most publicized corporate scandal involved the 2010 BP oil spill in the Gulf of Mexico). 2. Consumer Financial Protection Bureau Fines Wells Fargo $ 100 Million for Widespread Illegal Practice of Secretly Opening Unauthorized Accounts, CONSUMER FIN. PROT. BUREAU (Sept. 8, 2016), www.consumerfinance.gov/ about-us/newsroom/consumer-financial-protection-bureau-fines-wells-fargo- 100-million-widespread-illegal-practice-secretly-opening-unauthorized- accounts/ [perma.cc/R4ED-Y38T]. 3. Id. 4. Id. CFPB Director Richard Cordray went on record to state that this is the largest CFPB penalty ever imposed because it wanted to put the entire banking industry on notice that if these financial incentive programs are not vigilantly monitored, the consequences will be enormous. Id. 5. See, e.g., Inter-Local Pension Fund GCC/IBT v. Calgon Carbon Corp., No. 2017-0910-MTZ, 2019 Del. Ch. LEXIS 47, at *12 (Del. Ch. Jan. 25, 2019) (stating that in response to various breaches of fiduciary duties by members of the Board, a Del. Code Ann. tit. 8, § 220 (“Section 220”) demand was launched to determine whether to pursue litigation). 6. Id. at *12 (stating that the party launching the Section 220 demand will most likely not receive the answers as to why there was some type of corporate wrongdoing or mismanagement if the court only requires disclosure of traditional documents such as meeting minutes and written correspondence); see also Hutton v. McDaniel, 264 F. Supp. 3d 996, 1006 (D. Ariz. 2017) (seeking Board of Directors “books and records” pursuant to a Section 220 demand to determine whether there was a violation of fiduciary duties). 7. Adam Bryant, The Five Most Common Mistakes of Board of Directors, FORBES (June 21, 2018), www.forbes.com/sites/adambryant/2018/06/21/the- five-most-common-mistakes-of-board-directors/?sh=4f276169e250 [perma.cc/5VCJ-9CTV]. 2021] Expanding the World of Section 220 347 pursuant to Section 220 of Delaware General Corporation Law (“Section 220”).8 Often, directors will refuse to disclose information by arguing that the information sought is too broad.9 This is problematic because it hinders transparency and does not allow shareholders access to vital information that they are entitled to.10 A shareholder’s right to information is imperative because, as a stakeholder in the company, a shareholder has a fundamental right to be fully informed in the affairs of the corporation.11 This access of information serves as a tool that the shareholders can use to ensure that directors of a corporation are acting in good faith when performing their duties.12 Information rights, such as a Section 220 demand, prevent directors from intentionally withholding material information and making decisions that can hurt the shareholders.13 In a situation where, for example, a director is involved in an inappropriate work relationship, the shareholders would be entitled to information related to this scandal because the relationship may cause an adverse impact on the corporation.14 If the shareholders are privy to this information, it protects the shareholders, directors, and integrity of the corporation.15 This Comment will discuss various ways in which the courts can broaden the type of information required in a Section 220 demand in an effort to increase transparency and preserve the director-shareholder relationship. First, Section II of this Comment will begin with a discussion of the fundamental rights of a shareholder – specifically access to 8. DEL. CODE ANN. tit. 8, § 220 (2021). Once the shareholders of record have made a demand in writing stating the information sought and a proper purpose, if the directors do not comply with the demand, the shareholders have a right to file a Section 220 proceeding seeking to compel compliance with the demand. Stephen A. Radin, The New Stage of Corporate Governance Litigation: Section 220 Demands-Reprise, 28 CARDOZO L. REV. 1287, 1310 (2006). 9. Highland Select Equity Fund, Ltd. P'ship v. Motient Corp., 906 A.2d 156 (Del. Ch. 2006) (arguing that a demand for “books, records, and correspondence . .” is unreasonably broad and burdensome). 10. Francis G.X. Pileggi, Kevin F. Brady, & Jill Agro, Inspecting Corporate "Books and Records"
Recommended publications
  • Sky High Next for NASA Digital Days Alums' Companies Plan for An
    SCHOOL OF BUSINESS ARIZONA STATE UNIVERSITY AUTUMN 2017 Sky high MBA boosts engineer’s career in space Next for NASA Lessons learned on Earth are going intergalactic Alums’ companies plan for Digital days an interstellar future Make the most of devices in business without powering down relationships The final frontier FALCONER SAM “To infinity and beyond.” — Buzz Lightyear DEAN’S LETTER WPC Dear W. P. Carey family and friends, Space and business school? opportunities for space tourism, the work on teams in space in this Really? I bet you never would or benefit from new mineral issue. What strikes me is that the have guessed how much research mining on asteroids such as space context provides even more and work relevant to space with Psyche, a NASA mission significance to the application occurs outside the labs of rocket in which ASU was awarded the of what we research, teach, and scientists. I’m extraordinarily lead role. Our first commanding learn in business schools. proud of the efforts our faculty mission, Lucy, is already sending ASU and the W. P. Carey and alumni are doing in this area. technology School of It truly reflects our belief that ASU built on “Crazy” ideas Business is the has no borders. While we are a campus into place to explore state university within a state of deep space. are only crazy these issues. the U.S., we operate in a global This takes until they work. ASU has been market for higher education, and us to a host recognized as the space — to borrow a phrase — of questions.
    [Show full text]
  • Monopoly Power and the Decline of Small Business the Case for Restoring America’S Once Robust Antitrust Policies
    Monopoly Power and the Decline of Small Business The Case for Restoring America’s Once Robust Antitrust Policies By Stacy Mitchell August 2016 About the Institute for Local Self-Reliance The Institute for Local Self-Reliance (ILSR) is a 42-year-old national nonprofit research and educational organization. ILSR’s mission is to provide innovative strategies, working models, and timely information to support strong, community rooted, environmentally sound, and equitable local economies. To this end, ILSR works with citizens, policy makers, and businesses to design systems, policies, and enterprises that meet local needs; to maximize human, material, natural, and financial resources; and to ensure that the benefits of these systems and resources accrue to all local citizens. More at www.ilsr.org. About the Author Stacy Mitchell is co-director of the Institute for Local Self-Reliance and directs its Community-Scaled Economy Initiative, which produces research and analysis, and partners with a range of allies to design and implement policies that curb economic consolidation and strengthen community- rooted enterprise. She has produced numerous reports and written articles for a variety of publications, including Business Week, The Nation, and Wall Street Journal. She is the author of Big-Box Swindle: The True Cost of Mega-Retailers and the Fight for America’s Independent Businesses, which Booklist named a top-ten business book of the year in 2007. An engaging speaker, Stacy has been a featured presenter at many national conferences. In October 2012, she gave a provocative TEDx talk on Why We Can’t Shop Our Way to a Better Economy.
    [Show full text]
  • The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code
    American University Washington College of Law Digital Commons @ American University Washington College of Law Articles in Law Reviews & Other Academic Journals Scholarship & Research 1997 The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code Walter Effross Follow this and additional works at: https://digitalcommons.wcl.american.edu/facsch_lawrev Part of the Commercial Law Commons, Computer Law Commons, and the Internet Law Commons The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code WALTER A. EFFROSS* TABLE OF CONTENTS I. INTRODUCTION ....................................... 1266 II. JUST BROWSING: VISITING A COMMERCIAL WEB SITE ........... 1289 A. Reaching the Home Page ............................ 1290 B. "DrillingDown" to a Product ........................ 1294 1. Browsing .................................... 1295 a. Profiling ................................. 1296 2. Searching ................................... 1297 3. Index Scanning ................................ 1298 III. THE ON-LINE DEFINITION OF "MERCHANT...................... 1298 A. "Business Practices" Merchants ....................... 1301 1. Answering Electronic Mail (E-mail) ................. 1304 2. PeriodicallyReviewing the Site's Integrity and Operation ................................ 1305 3. "Backing Up" Information ....................... 1307 * © 1998 Walter A. Effross. Associate Professor, Washington College of Law, American University, and Chair, American Bar Association Subcommittee
    [Show full text]
  • America's Digital Goddess® KIM IS NOW AVAILABLE
    America’s Digital Goddess® KIM IS NOW AVAILABLE FOR LIVE INTERVIEWS! AVAILABILITY: WEEKDAYS – Live Hits for East Coast and All Time Zones WEEKENDS – Live Hits for East Coast and All Time Zones LAST-MINUTE reaction to major tech-related events and stories Q & A’s or panel discussions with hosts Kim Komando is host of America’s number one talk show on digital/tech lifestyle. The Kim Komando Show is celebrating its 21st Anniversary. It is heard on more than 430 radio stations in the United States, and another 177 stations around the world through Armed Forces Radio Network. Komando reaches more than 40 million subscribers through daily digital newsletters. Her Consumer Tech Update airs Monday through Friday on more than 380 radio stations. Komando has appeared as a tech expert on CNN, CBS, MSNBC, ABC, BBC, Inside Edition and FoxNews. She writes two weekly columns for USA Today and FoxNews.com. Komando’s specialty is combining technology with everyday lifestyle, and offers advice on gadgets, websites, smartphone apps, and Internet security. AWARDS / RECOGNITION: • Keynote Speaker – NAB 2016 • National Radio Hall of Fame Nominee - 2016 • Member of the ‘Heavy Hundred’ – Talkers Magazine 2016 • Forbes Magazine Most Powerful Woman of the Year – 2009 • Outstanding Program Host – Gracie Award 2007 TRANSMISSION: • LTN Network • Skype • ISDN FOR BOOKING, CONTACT: Joanna Martens, Director Affiliate Relations [email protected] 602-381-8200 x211 @kimkomando @kimkomando @kimkomando @kimkomando 6135 North 7th Street • Phoenix, Arizona 85014 • www.komando.com.
    [Show full text]
  • Hardik Gandhi, Note, Active Cyber Defense Certainty
    ACTIVE CYBER DEFENSE CERTAINTY: A DIGITAL SELF-DEFENSE IN THE MODERN AGE Hardik Gandhi* I. INTRODUCTION Imagine a world where your personal information can be accessed for any reason. Well unfortunately, this is the reality. It is the reality because cybersecurity (the measures that can be taken to protect a computer or computer system from unauthorized access or attack) is in a state of disarray. Currently, hackers are seldom prosecuted while major corporations frequently bear the burden for failing to secure data in an arms-race environment.1 Equifax, HBO, and Yahoo fell victim to some of the largest breaches in history.2 Certain actors use the internet as a cloak for their identity to evade tracking.3 The current law is outdated, limits entities in their defensive measures, and presents far more issues than it resolves.4 As a result, we are now entering an age many refer to as the “Code War,” where the agents of chaos, using digital means, can destabilize the real world.5 * Hardik Gandhi graduated in May 2019 with his Juris Doctor degree. He thanks his late mother for the gift of grit. And to Toronto, the city that raised him, for teaching him to value people by the depth of their actions and not the color of their skin or the mistakes of their forefathers. 1. Roger A. Grimes, Why It’s So Hard to Prosecute Cybercriminals?, CSO (DEC. 6, 2016), https://www.csoonline.com/article/3147398/why-its-so-hard-to-prosecute-cyber- criminals.html [https://perma.cc/F7NH-MAAZ]. 2. See generally, Tom Kemp, What Do Equifax, HBO, Uber and Yahoo All Have in Common?, CENTRIFY (Feb.
    [Show full text]
  • And Cut the Cable By: Kim Komando, National Talk Radio Host & USA Today Columnist Komando.Com How to Get FREE HDTV and Cut the Cable
    How to get FREE HDTV and Cut the Cable By: Kim Komando, National Talk Radio Host & USA Today Columnist komando.com How to get FREE HDTV and Cut the Cable Contents Introduction ...............................1 Cable Alternatives ..................2 Picking an Online Video Service ..........................6 What Hardware Do You Need? ...................... 12 Conclusion ............................. 19 INTRODUCTION Why cut the cord? Sometimes it seems like your mailbox is nothing but a printing machine for an endless series of bills. Just when you think you’ve seen them all, another one pops out like a little gremlin and steals a bit more money from your bank account. You want to stop them, but everything you’re buying seems so essential. Well, there’s one “essential” that I guarantee you can do without. Unless I miss my guess, one of the biggest bills you get each month is the cable bill. You easily spend more than $100 a month to watch your favorite shows, sports and movies. That’s money you’re taking away from essentials like food, clothes, medical bills or fuel. It’s even worse when you see studies showing that even with 180+ channels available, most people only watch 17. That’s 150+ channels and thousands of shows you really shouldn’t need to pay for, but good luck getting cable companies to let you to pick and choose channels, much less individual shows. I’m happy to tell you that there is a way to save a bundle of money every month and still enjoy your can’t- miss shows, sports, news and movies.
    [Show full text]
  • The Legal Architecture of Virtual Stories: World Wide Web Sites and the Uniform Commercial Code
    The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code WALTER A. EFFRoss· TABLE OF CONTENTS I. INTRODUCTION • • • • • • • • • • • . • • • . • • • . • . • . • • • • • • • • • • • • 1266 II. JUST BROWSING: VISITING A COMMERCIAL WEB SITE • • • . • • . • • • • 1289 A. Reaching the Home Page • • • • . • . • . • . • . • . 1290 B. "Drilling Down" to a Product . • . • . • . • . 1294 J. Browsing • . • . • . • . • • . • . • . • 1295 a. Profiling • . • . • . • • • • . • • • • • • • 1296 2. Searching • . • • . • . • • . • • . • • . • . • 1297 3. Index Scanning . • . • . • . • . • 1298 III. THE ON-LINE DEFINI110N OF "MERCHANT" • • • • . • • • . • • . • • . • 1298 A. "Business Practices" Merchants . • . • • . • 1301 J. Answering Electronic Mail (E-mail) . • . • • . • • . 1304 2. Periodically Reviewing the Site~ Integrity and Operation • • . • • . • • • • . • • • . • . 1305 3. "Backing Up" Information • • • • . • • • . • • • • • . • • . 1307 " © 1998 Walter A. Effross. Associate Professor, Washington College of Law, American University, and Chair, American Bar Association Subcommittee on Electronic Commerce. The author appreciates the helpful comments of Professor Egon Guttman and the research grants provided by the Washington College of Law. This Article reflects developments through December 31, 1997. The information in this Article is not offered as legal advice, nor does the author endorse or recommend any of the products or sites referred to. 1263 4. Protecting Customer Information in Transit and in Storage
    [Show full text]
  • Windows Secrets Everyone Needs to Know
    Windows Secrets Everyone Needs to Know By KIM KOMANDO, national radio host, USA Today columnist, Fox News contributor and best-selling author 10 WINDOWS SECRETS EVERYONE NEEDS TO KNOW Introduction Windows 10 first hit the scene in the summer of 2015. Today, nearly a billion computers around the world are running Microsoft’s latest operating system. It’s estimated to dominate nearly 51% of the desktop OS market, surpassing even the popularity of Windows 7. (Because who remembers Windows 8, anyway?) Critics have praised Windows 10 over the past few years, but everyday users are harder to please. Some love it, while others hate it. Either way, Microsoft has described Windows 10 as its “final” version. That means instead of replacing the operating system every few years, Windows 10 pushes out a fairly consistent stream of free updates. With the return of the Start menu and advent of Microsoft Edge, Windows 10 is arguably the best version ever produced. Thanks to all those updates, new features are continuously added to Windows 10 — but keeping track of it all can be a chore. You don’t have to know everything this operating system can do, but it’s definitely in your favor to know more than just the basics. That includes features that aren’t as well known, like these 10 Windows 10 secrets you should be familiar with to get the most out of your machine. KOMANDO.COM 1 10 WINDOWS SECRETS EVERYONE NEEDS TO KNOW Quickly open 01 taskbar programs Windows 10 introduced a slew of new and convenient keyboard shortcuts.
    [Show full text]
  • It's Smart, but Is It Ethical? Confidentiality in an Environment
    VIRGINIA JOURNAL OF LAW & TECHNOLOGY SPRING 2021 UNIVERSITY OF VIRGINIA VOL. 24, NOTE 2 It’s Smart, but Is It Ethical? Confidentiality in an Environment That Is Listening ARMINA MANNING† © 2021 Virginia Journal of Law & Technology, at http://www.vjolt.org/. † J.D., University of Virginia School of Law (2021); B.A., College of WilliaM & Mary (2012). AcknowledgMents and gratitude to Professor George Cohen for his guidance through the early stages of this paper, and to Professor Gregory Mitchell for his notes and advice. Vol. 24 VIRGINIA JOURNAL OF LAW & Note 2 TECHNOLOGY 2021 Manning, It’s Smart, but Is It Ethical? 2 ABSTRACT This paper examines the confidentiality implications of cloud- connected voice-computing technology. The ubiquity of this technology results in the possibility of being under surveillance at any given time by a device known to transmit audio from its environment to be saved on cloud servers. Part I describes the risks and benefits presented by this technology, Part II examines existing guidance on what the duty of confidentiality requires, Part III A offers examples of reasonable measures that lawyers may take to safeguard client confidentiality around cloud-connected voice-computing devices, and Part III B pulls everything together through the analysis of four hypothetical situations. In Part IV, a brief conclusion outlines the need for more specific guidance on how the presence of cloud-connected voice-computing technology must modify the behavior of modern lawyers. Vol. 24 VIRGINIA JOURNAL OF LAW & Note 2 TECHNOLOGY 2021 Manning, It’s Smart, but Is It Ethical? 3 TABLE OF CONTENTS Introduction .............................................................................
    [Show full text]
  • Conservative Media's Influence on the Republican
    Shorenstein Center on Media, Politics and Public Policy Discussion Paper Series #D-96, July 2015 “They Don’t Give a Damn about Governing” Conservative Media’s Influence on the Republican Party by Jackie Calmes Joan Shorenstein Fellow, Spring 2015 National Correspondent, The New York Times 1 Table of Contents 1. Overview 3 2. Media Pioneers of the Right 13 3. The Second Generation 18 4. “Conservative-Industrial Complex” 24 5. Messengers of the Left 29 6. Setting the Agenda: “Ugly” Debut of the Republican Congress 33 7. Setting the Agenda: Common Core 40 8. Agenda Setter – Steve Deace 45 9. Diagnosis: “Epistemic Closure” – “Untethered from Reality”? 50 10. Endnotes 54 11. Appendix A: Conservative Internet Sites 60 12. Appendix B: Political Slant of Top Talk Radio Hosts 63 13. Appendix C: Common Core Coverage and Commentary 66 14. Acknowledgements 68 2 Overview Republicans should still have been celebrating in late January 2015. Only weeks earlier they had opened the 114th Congress with a Senate majority for the first time in eight years, as well as a fattened majority in the House, where they had ruled since 2011 – full control of the legislative branch for the first time in Barack Obama’s presidency. Yet in reality, Republicans were out of control. They only had themselves to blame, and many did. So unhappy was Representative Charlie Dent, a six-term Pennsylvanian and one of the few surviving Republican moderates, he emerged from a private party caucus in January to share with reporters waiting outside the complaint he had made to colleagues behind closed doors: “Week one, we had a speaker election that did not go as well as a lot of us would have liked.
    [Show full text]
  • Women in the Media
    THE STATUS OF WOMEN IN THE U.S. MEDIA 2015 WOMEN’S MEDIA CENTER ABOUT THE WOMEN’S MEDIA CENTER In 2005, Jane Fonda, Robin Morgan and Gloria Steinem founded the Women’s Media Center (WMC), a progressive, non-partisan, nonprof- it organization endeavoring to raise the visibility, viability and deci- sion-making power of women and girls in media and, thereby, ensur- ing that their stories get told and their voices are heard. To reach those necessary goals, we strategically use an array of in- terconnected channels and platforms to transform not only the me- dia landscape but also a culture in which women’s and girls’ voices, stories, experiences and images are neither suf!ciently ampli!ed nor placed on par with the voices, stories, experiences and images of men and boys. Our strategic tools include monitoring the media; commissioning re- search; and undertaking other special initiatives to spotlight gender and racial bias in news coverage, entertainment !lm and television, social media and other key sectors. Our publications include the book, “Unspinning the Spin: The Women’s Media Center Guide to Fair and Accurate Language”;” The Women’s Media Center’s Media Guide to Gender Neutral Coverage of Women Candidates + Politicians”; “The Women’s Media Center Guide to Cov- ering Reproductive Health Issues” and this essential, annual Women’s Media Center’s “The Status of Women in U.S. Media Report.” Our WMC Women Under Siege project investigates sexualized violence. Our original content channels—WMC Features, WMC FBomb and “Women’s Media Center Live with Robin Morgan” radio program— provide women’s perspectives on both headline stories and timely events that either are ignored, not wholly captured or misrepresented in the mainstream media.
    [Show full text]
  • Women in Radio: a (Her)Story
    Elizabethtown College JayScholar Communications: Student Scholarship & Communications: Student Scholarship & Creative Works Creative Works Spring 2019 Women in Radio: A (Her)Story Shaye Lynn DiPasquale Elizabethtown College, [email protected] Follow this and additional works at: https://jayscholar.etown.edu/commstu Part of the Mass Communication Commons Recommended Citation DiPasquale, Shaye Lynn, "Women in Radio: A (Her)Story" (2019). Communications: Student Scholarship & Creative Works. 3. https://jayscholar.etown.edu/commstu/3 This Student Research Paper is brought to you for free and open access by the Communications: Student Scholarship & Creative Works at JayScholar. It has been accepted for inclusion in Communications: Student Scholarship & Creative Works by an authorized administrator of JayScholar. For more information, please contact [email protected]. Running Head: WOMEN IN RADIO: A (HER)STORY 1 Women in Radio: A (Her)Story Shaye DiPasquale Elizabethtown College WOMEN IN RADIO: A (HER)STORY 2 Abstract Since the 1920s, women have been an integral part of the radio industry both as originators and as consumers, yet they have experienced near exclusion from histories and analyses on the subject. This thesis project explores the intersection of gender, sound and history through a cultural and historical analysis of female voices in American radio. The analysis includes an examination of the history of silencing women in the public sphere, the on-going conversation surrounding the suitability of female voices for broadcast and
    [Show full text]