Justia Communications Law Opinion Summaries
Articles Posted in Internet Law
Van Buren v. United States
Former Georgia police sergeant Van Buren used his credentials on a patrol-car computer to access a law enforcement database to retrieve license plate information in exchange for money. His conduct violated a department policy against obtaining database information for non-law-enforcement purposes. The Eleventh Circuit upheld Van Buren's conviction for a felony violation of the Computer Fraud and Abuse Act of 1986 (CFAA), which covers anyone who “intentionally accesses a computer without authorization or exceeds authorized access,” 18 U.S.C. 1030(a)(2), defined to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”The Supreme Court reversed. An individual “exceeds authorized access” when he accesses a computer with authorization but then obtains information located in particular areas of the computer (files, folders, databases) that are off-limits to him. Van Buren “access[ed] a computer with authorization” and “obtain[ed] . . . information in the computer.” The phrase “is not entitled so to obtain” refers to information one is not allowed to obtain by using a computer that he is authorized to access.“Without authorization” protects computers themselves from outside hackers; the “exceeds authorized access” clause protects certain information within computers from "inside hackers." One either can or cannot access a computer system, and one either can or cannot access certain areas within the system. The Act’s precursor to the “exceeds authorized access” language covered any person who, “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend.” Congress removed any reference to “purpose” in the CFAA. On the government’s reading, an employee who sends a personal e-mail or reads the news using a work computer may have violated the CFAA. View "Van Buren v. United States" on Justia Law
Green v. Pierce County
The issue before the Washington Supreme Court’s in this case was whether an individual’s YouTube channel qualified as “news media” for requests for certain records under the Washington Public Records Act (PRA). In 2014, Brian Green and Peter Auvil went to the County-City Building in Tacoma to file a document and pay a parking ticket. As they went through security, the guard asked to search Auvil’s bag. Auvil refused. A Pierce County deputy sheriff came to assist, and Auvil began to record a video of the interaction on his phone. Auvil continued to refuse to allow the security guard to search the bag, arguing that the security checkpoint was a violation of his privacy rights. The conversation escalated, and the deputy asked the men to leave. When Green stood too close to him, the deputy shoved Green and caused him to fall backward onto the floor. The deputy arrested Green for criminal obstruction and took him to jail. He was released approximately 24 hours later. The prosecuting attorney’s office dismissed the charge. In December 2017, Green e-mailed a PRA request to the Pierce County Sheriff’s public records office requesting “[a]ny and all records of official photos and/or birth date and/or rank and/or position and/or badge number and/or date hired and/or ID Badge for all detention center and/or jail personnel and/or deputies on duty November 26 & 27 2014.” A representative of the Sheriff’s “Public Disclosure Unit” sent 11 pages of records, but did not include photographs or dates of birth as requested, explaining that the information was exempt under the PRA. Green said he was “working on a story concerning the Pierce County Jail” and again signed his e-mail with the title, “Investigative Journalist.” Green claimed his 6,000-subscriber YouTube channel met the definition of “news media” under the PRA. The Supreme Court concluded the statutory definition of “news media” required an entity with a legal identity separate from the individual. Green did not prove that he or the Libertys Champion YouTube channel met the statutory definition of “news media,” and, thus, he was not entitled to the exempt records. Therefore, the trial court was reversed in part. The Court affirmed the trial court’s denial of Pierce County’s motion to compel discovery. View "Green v. Pierce County" on Justia Law
Lemmon v. Snap, Inc.
The Ninth Circuit reversed the district court's judgment dismissing an amended complaint against Snap based on immunity under the Communications Decency Act (CDA), 47 U.S.C. 230(c)(1). Plaintiffs, the surviving parents of two boys who died in a high-speed accident, alleged that Snap encouraged their sons to drive at dangerous speeds and caused the boys' deaths through its negligent design of its smartphone application Snapchat. Specifically, plaintiffs claimed that Snapchat allegedly knew or should have known, before the accident, that its users believed that a reward system existed and that the Speed Filter was therefore incentivizing young drivers to drive at dangerous speeds.The panel applied the Barnes factors and concluded that, because plaintiffs' claim neither treats Snap as a "publisher or speaker" nor relies on "information provided by another information content provider," Snap does not enjoy immunity from this suit under section 230(c)(1). In this case, Snap is being used for the predictable consequences of designing Snapchat in such a way that it allegedly encourages dangerous behavior, and the CDA does not shield Snap from liability for such claims. The panel declined to affirm the district court's decision on the alternative ground that plaintiffs have failed to plead adequately in their amended complaint the causation element of their negligent design claim. Accordingly, the panel remanded for further proceedings. View "Lemmon v. Snap, Inc." on Justia Law
Facebook, Inc. v. Duguid
The Telephone Consumer Protection Act of 1991 (TCPA) restricts communications made with an “automatic telephone dialing system,” defined as equipment with the capacity both “to store or produce telephone numbers to be called, using a random or sequential number generator,” and to dial those numbers, 47 U.S.C. 227(a)(1). Facebook’s social media platform allows users to elect to receive text messages when someone attempts to log in to the user’s account from a new device. Facebook sent such texts to Duguid, alerting him to login activity on a Facebook account linked to his telephone number, but Duguid never created any Facebook account. Duguid tried, unsuccessfully, to stop the unwanted messages. He brought a putative class action, alleging that Facebook violated the TCPA by maintaining a database that stored phone numbers and programming its equipment to send automated text messages. The Ninth Circuit ruled in Duguid’s favor.The Supreme Court reversed: To qualify as an “automatic telephone dialing system” under the TCPA, a device must have the capacity either to store a telephone number using a random or sequential number generator or to produce a telephone number using a random or sequential number generator. The statutory context confirms that the TCPA’s autodialer definition excludes equipment that does not use a random or sequential number generator. Congress found autodialer technology harmful because autodialers can dial emergency lines randomly or tie up all of an entity's sequentially numbered phone lines. Duguid’s interpretation would encompass any equipment that stores and dials telephone numbers. View "Facebook, Inc. v. Duguid" on Justia Law
Next Technologies, Inc. v. Beyond the Office Door LLC
Next makes office equipment and refers potential customers to reviews that rate its products highly. Next's competitor, Beyond, published reviews critiquing Next’s standing desks. Instead of pursuing a claim under the Lanham Act, 15 U.S.C. 1125, Next sued in federal court under diversity jurisdiction, relying on Wisconsin’s common law of defamation. The district judge treated product reviews and political commentary as equivalent and cited the Constitution, holding that because Next is a “limited-purpose public figure”—made so by its own efforts to sell its wares—all criticism by a competitor is constitutionally protected unless the statements are knowingly false or made with reckless indifference to their truth. The court concluded that the standard was not met.
The Seventh Circuit affirmed on other grounds, stating that it was “skeptical” about the trial court’s use of the Constitution. On the district court’s approach, few claims under the Lanham Act ever could succeed, and commercial advertising would be treated just like political campaigning. Next failed to state a claim under Wisconsin law. “Whatever one can say about whether both gray paint and polished metal should be called ‘silver,’ or whether two circuit boards are as good as one, these are not ‘false assertions of specific unfavorable facts.’” View "Next Technologies, Inc. v. Beyond the Office Door LLC" on Justia Law
Domen v. Vimeo, Inc.
Plaintiff and Church United filed suit against Vimeo, alleging that the company discriminated against them by deleting Church United’s account from its online video hosting platform. Plaintiffs claimed that Vimeo discriminated against them based on sexual orientation and religion under federal and state law. The district court concluded that Vimeo deleted Church United's account because of its violation of one of Vimeo's content policies barring the promotion of sexual orientation change efforts (SOCE) on its platform.The Second Circuit affirmed the district court's dismissal of plaintiffs' claims, agreeing with the district court that Section 230(c)(2) of the Communications Decency Act provides Vimeo with immunity from suit. The court concluded that, under Section 230(c)(2), Vimeo is free to restrict access to material that, in good faith, it finds objectionable. In this case, plaintiffs' conclusory allegations of bad faith do not survive the pleadings stage, especially when examined in the context of Section 230(c)(2). The court explained that Section 230(c)(2) does not require interactive service providers to use a particular method of content restriction, nor does it mandate perfect enforcement of a platform's content policies. Indeed, the fundamental purpose of Section 230(c)(2) is to provide platforms like Vimeo with the discretion to identify and remove what they consider objectionable content from their platforms without incurring liability for each decision. View "Domen v. Vimeo, Inc." on Justia Law
Murphy v. Twitter, Inc.
Murphy, a journalist with approximately Twitter 25,000 followers, had a Twitter “verification badge,” which “lets people know that an account of public interest is authentic.” Murphy “writes primarily on feminist issues, including the Me Too movement, the sex industry, sex education, third-wave feminism, and gender identity politics.” Murphy argues “that there is a difference between acknowledging that transgender women see themselves as female and counting them as women in a legal or social sense.” Murphy posted several tweets critical of transgender women. Twitter removed her posts and informed her she had violated its hateful conduct rules. After she posted additional similar messages, Twitter permanently suspended her account.Murphy filed suit, alleging breach of contract, promissory estoppel, and violation of the unfair competition law. The trial court dismissed the complaint, concluding Murphy’s suit was barred by the Communications Decency Act of 1996, 47 U.S.C. 230, under which interactive computer service providers have broad immunity from liability for traditional editorial functions undertaken by publishers—such as decisions whether to publish, withdraw, postpone or alter content created by third parties. The court of appeal affirmed. Each of Murphy’s causes of action seeks to hold Twitter liable for its editorial decisions. Murphy also failed to state a cognizable claim under California law. The Hateful Conduct Policy was in place when Murphy began posting her deleted tweets; Twitter expressly reserved the right to remove content, and suspend or terminate accounts “for any or no reason.” View "Murphy v. Twitter, Inc." on Justia Law
Rad v. Attorney General United States
In 2012, Rad and others were charged with acquiring penny stocks, “pumping” the prices of those stocks by bombarding investors with misleading spam emails, and then “dumping” their shares at a profit. Rad was convicted of conspiring to commit false header spamming and false domain name spamming under the Controlling the Assault of Non-Solicited Pornography And Marketing Act (CAN-SPAM), 15 U.S.C. 7701(a)(2), which addresses unsolicited commercial email. The PSR recommended raising Rad’s offense level to reflect the losses inflicted on investors, estimating that Rad realized about $2.9 million in “illicit gains” while acknowledging that because “countless victims” purchased stocks, the losses stemming from Rad’s conduct could not “reasonabl[y] be determined.” Rad emphasized the absence of evidence that any person lost anything. Rad was sentenced to 71 months’ imprisonment. The record is silent as to how the court analyzed the victim loss issue. The Third Circuit affirmed. DHS initiated removal proceedings under 8 U.S.C. 1227(a)(2)(A)(iii), which renders an alien removable for any crime that “involves fraud or deceit” “in which the loss to the victim or victims exceeds $10,000.” The IJ and the BIA found Rad removable.The Third Circuit remanded. Rad’s convictions for CAN-SPAM conspiracy necessarily entail deceit under 8 U.S.C. 1101(a)(43)(M)(i). The second element, requiring victim losses over $10,000, however, was not adequately addressed. The court noted that intended losses, not just actual ones, may meet the requirement. View "Rad v. Attorney General United States" on Justia Law
United States v. Miller
When a Google employee views a digital file and confirms that it is child pornography, Google assigns the file a hash value (digital fingerprint). It then scans Gmail for files with the same value. Google learned that a Gmail account had uploaded files with hash values matching child pornography and sent a report to the National Center for Missing and Exploited Children (NCMEC). NCMEC’s systems traced the IP address to Kentucky. A local detective connected Miller to the Gmail account.The Sixth Circuit affirmed Miller’s convictions. The Fourth Amendment restricts government, not private, action. A private party who searches a physical space and hands over paper files to the government has not violated the Fourth Amendment. Rejecting Miller’s argument that the detective conducted an “unreasonable search” when he later opened and viewed the files sent by Google, the court reasoned that the government does not conduct a Fourth Amendment search when there is a “virtual certainty” that its search will disclose nothing more than what a private party’s earlier search revealed. A hash-value match has near-perfect accuracy, creating a “virtual certainty” that the files in the Gmail account were the known child-pornography files that a Google employee had viewed. The admission of NCMEC’s report at trial did not violate Miller’s Sixth Amendment right to confront “witnesses.” The rule applies to statements by people. NCMEC’s automated systems, not a person, entered the information into the report. View "United States v. Miller" on Justia Law
Royal Truck & Trailer Sales & Service, Inc. v. Kraft
Royal employed Kraft and Matthews (Defendants) in its sales team. Royal’s employee handbook prohibited using company equipment for personal activities; unauthorized use, retention, or disclosure of any of Royal’s resources or property; and sending or posting trade secrets or proprietary information outside the organization. Royal’s “GPS Tracking Policy” stated, “[e]mployees may not disable or interfere with the GPS (or any other) functions on a company-issued cell phone,” nor may employees “remove any software, functions or apps.” The Defendants resigned to become employed with one of Royal’s competitors. Royal discovered that, shortly before his resignation, Kraft forwarded from his Royal email account to his personal one quotes for Royal customers and Royal paystubs; contacted a Royal customer through Royal’s email server to ask the customer to send “all the new vendor info” to Kraft’s personal email account; then deleted and reinstalled the operating system on his company-issued laptop, rendering its data unrecoverable. Matthews did much the same and announced her resignation on social media, sharing a link to the song, “You Can Take This Job and Shove It.”Royal sued, citing the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which refers to one who “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer.” The district court concluded that the Defendants did not “exceed[]” their “authorized access,” under CFAA. The Sixth Circuit affirmed. While their conduct might violate company policy, state law, perhaps another federal law, the employees were authorized to access the information in question. View "Royal Truck & Trailer Sales & Service, Inc. v. Kraft" on Justia Law