Richmond Journal of Law and Technology

The first exclusively online law review.

Category: Blog Posts (Page 16 of 18)

Blog: Is Your Secure Online Shopping Information Really Secure?

by Spencer Mead, Associate Survey and Symposium Editor

The invention of the internet forever changed the way consumers shop. Consumers now can order an item and receive it within less than 24 hours of the order date. Some of the benefits of online shopping include ease, ability to compare prices across multiple stores, it can be cheaper, and shopping can be more efficient be eliminating the need to physically drive to a store. This has caused a massive surge in the number of people who are shopping online instead of going through a store. Most people assume it is safe to shop online as long as they stay away from phishing scams and seedier parts of the internet. But is this just a false sense of security? This explosion in internet shopping has coincided with a large increase in the number of hackers around the world attempting to get one’s personal information in order to steal their identity or their money.

 

            Any security felt with being on the internet seems to be a false one with the government’s extensive spying efforts recently coming to light.[1] Some are probably thinking the NSA’s spying program was targeted only at possible terrorists right? Well the short answer is no, the NSA has been targeting all Americans and hording vast amounts of information on these Americans.[2] Well if the government is spying on us are the big companies at least doing anything to try and protect our information? The short answer is yes they are, but how successful are they?

 

            Target recently made headlines for having over 70 million Target customer’s information stolen.[3] These 70 million customers had their personal information stolen such as their email addresses, mailing addresses, and/or phone numbers stolen.[4] In addition, 40 million target customers had all of their credit card information stolen.[5] This obviously can create problems with people using this stolen information to charge items on the credit accounts. Additionally, if a person’s social security number was tied into the credit card information these thieves would be able to open up other lines of credit in the person’s name without their knowledge. This can have a major impact on a person’s credit score.

 

            So as a consumer what can you do to protect your information? Well unfortunately not shopping online is not an option. The credit card information was stolen from consumers that used their credit cards within a physical Target store.[6] The best thing a consumer could realistically do would be to not shop online, and to make all purchases in cash. This would eliminate the possibility of a company ever obtaining one’s personal information. However, this raises other concerns such as carrying large amounts of a cash on one’s person, building a credit score by regularly using a credit card, and how to make large purchases easily.

 

            Obviously there is no way to keep one’s information perfectly safe in this day and age. However, being aware of the problems and putting pressure on large companies to better protect consumer information is a step in the right direction to better secure our personal data. Maybe one day payment methods will be tied into a person’s DNA so that they are the only ones that could possibly use it. However, any such technology is a long ways off and we are going to have to deal with the shortcomings of today’s security.


[1] Electronic Frontier Foundation, How the NSA’s Domestic Spying Program Works, https://www.eff.org/nsa-spying/how-it-works (last visited on Jan. 22, 2014).

[2] Id.

[3] Hadley Malcom, Target: Data stolen from up to 70 million customers, USA Today, Jan. 10, 2014 available at http://www.usatoday.com/story/money/business/2014/01/10/target-customers-data-breach/4404467/.

[4] Id.

[5] Id.

[6] Id.

Blog: Sniffing for Patent Infringement

by: Billy Raska, Associate Staff

Starting back in 2011, Innovatio IP Ventures, LLC (“Innovatio”) began suing various hotels, coffee shops, restaurants, supermarkets, and other commercial Wi-Fi users for infringing several patents that it had acquired from Intermec Technologies Corporation and Intermec IP Corporation, Norand Corporation, and Broadcom Corporation.[1] Most of the publicity surrounding this case has focused on the fact that Innovatio is a non-practicing entity and that the act of suing companies for merely using Wi-Fi is an abusive use of the patent system.[2] However, it is equally interesting to examine how Innovatio has gone about discovering the alleged infringement of its patents.

Innovatio sent technicians to the premises of the various hotels, coffee shops, restaurants, and supermarkets that it ultimately sued with a laptop and a Riverbed AirPcap Nx packet capture adapter[3] (or another similar device). The technicians analyzed only the headers of captured Wi-Fi packets using a modified version of Wireshark [4]. On August 22, 2012, in a preliminary ruling on the admissibility of the information that Innovatio had obtained through its Wi-Fi sniffing process, Judge Holderman held that “Innovatio may collect information from the defendants’ public-facing Wi–Fi networks according to its proposed protocol.”[5]

In reaching this conclusion, Judge Holderman examined the potential privacy concerns raised under the Federal Wiretap Act and ultimately found that “Innovatio’s proposed protocol falls into the exception to the Wiretap Act allowing a person ‘to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public.’”[6] Judge Holderman relied heavily on the fact that the Riverbed AirPcap Nx packet capture adapter is available to the public to purchase for $698 and the Wireshark software can be downloaded for free. Furthermore, Riverbed offers a more basic packet capture adapter for $198. Therefore, the information that Innovatio obtained was readily accessible because the technology used to obtain it was readily accessible to the general public.

A further analysis of the technology involved here reveals that Judge Holderman could have made an even stronger argument on this point. “[A]ll Wi–Fi devices necessarily store an entire received data packet, including the packet’s substantive communications, while the device processes the packet.”[7] These packets are then subjected to several different types of filters that are used to determine whether or not the packet is addressed to the particular Wi-Fi device. There are two types of filters that are of particular interest here: the first filter is used to determine whether or not the packet was sent on the same Wi-Fi network and the second filter is used to determine whether or not the packet is addressed to the particular Wi-Fi device.[8]

The first filter can be avoided by placing a device in “monitor mode.”[9] Some newer Linux machines have monitor mode functionality built in and for those computers that do not, devices such as the Riverbed AirPcap Nx packet capture adapter can be used.

The second filter can be avoided by placing a device in “promiscuous mode.”[10] This can be achieved by simply checking a box in the Wireshark software. Therefore, once a computer is connected to a Wi-Fi network, Wireshark can be used to capture packets on that Wi-Fi network that are not intended for that computer due to the underlying implementation of Wi-Fi.

This all goes to show that capturing Wi-Fi packets in today’s day and age is very easy to accomplish. There are several benefits to having the ability to place a device in monitor mode, but a lot can be accomplished in promiscuous mode. Innovatio targeted commercial entities that provided an open Wi-Fi network for customers. Anyone connected to one of those open Wi-Fi networks could have installed and run Wireshark in promiscuous mode in order to capture packets for FREE.

A point of concern is that Judge Holderman did not rely at all on the fact that Innovatio only collected the header information of the packets because Innovatio’s protocol fell under an exception to the Federal Wiretap Act. This raises the question: could Innovatio have also collected the personal information that was associated with the captured packets? If so, then this opens the door for companies to use the techniques employed by Innovatio to discover a much wider range of patent infringement than may have been initially anticipated.


 

[1] In re Innovatio IP Ventures, LLC Patent Litigation, 840 F.Supp.2d 1354 (Dec. 28, 2011); In re Innovatio IP Ventures, LLC Patent Litigation, 886 F.Supp.2d 888 (N.D.Ill. Aug. 22, 2012); In re Innovatio IP Ventures, LLC Patent Litigation, 921 F.Supp.2d 903 (N.D.Ill. Feb. 4, 2013); In re Innovatio IP Ventures, LLC Patent Litigation, No. 11C9308, 2013 WL 3874042 (N.D.Ill. July 26, 2013); In re Innovatio IP Ventures, LLC Patent Litigation, No. 11C9308, 2013 WL 5593609 (N.D.Ill. Oct. 3, 2013).

[2] E.g., Joe Mullin, Wi-Fi patent troll hit with racketeering suit emerges unscathed, Ars Technica (Feb. 13 2013, 10:05 AM), http://arstechnica.com/tech-policy/2013/02/wi-fi-patent-troll-hit-with-novel-anti-racketeering-charges-emerges-unscathed/.

[4] Wireshark, http://www.wireshark.org/ (last visited Oct. 26, 2013).

[5] In re Innovatio IP Ventures, 886 F.Supp.2d at 895.

[6] Id. at 892 (quoting 18 U.S.C. § 2511(2)(g)(i)).

[7] Id. at 891.

[8] WLAN (IEEE 802.11) Capture Setup, http://wiki.wireshark.org/CaptureSetup/WLAN (last visited Oct. 26, 2013).

[9] Id.

[10] Id.

Healthcare.gov "Obamacare" Website May Lead to Lawsuits

by Laura Bedson, Associate Staff

 

On October 1 of 2013 the much awaited online insurance exchanges launched under the Affordable Care Act.  With this launch millions of uninsured people were to be offered health insurance plans on Healthcare.gov.  Unfortunately the website did not run as smoothly as planned, leaving individuals with error messages and long waits to sign on to the site.  And to date, the website is still experiencing technological difficulties.  These technological errors, while embarrassing, and frustrating, have proven to be the least of the Obama administration’s worries.

Where this mess gets even messier is when you start to contemplate the lawsuits that will inevitably spring up as a result of the problems encountered on the website. Currently the extent of the legal issues seem like a good deal of finger pointing but in today’s lawsuit-happy society, it is likely that lawsuits are possible and imminent.  What we are waiting for at this point is for the tangled web of culprits to be unwoven. 

Health and Human Services Secretary KathleenSebelius is part of that web, and is one of the parties who has been the subject of much scrutiny as a result of the website’s failure.  Secretary Sebelius is convinced that by the end of November the majority of consumers will be able to successfully use the site to enroll in their insurance plans.  This does not mean however that Secretary Sebelius is off the hook.  She along with an additional 55 or so contractors reportedly involved in setting up the Obamacare federal exchanges stand to be implicated in lawsuits seeking refunds as a result of the site’s malfunctions.[1]  In fact, on Thursday, October 24, House Oversight Committee Chairman Darrell Issa threatened Secretary Sebelius with a subpoena saying that if she didn’t respond to questions about the problems with the website she could possibly face compulsory action.[2]

Action can come about in the form of the federal government suing for refunds or withholding payment to contractors.  In response to this, the contractors who feel they are entitled to payment could sue.  In addition, the contractors can sue one another.  This web of blame is undoubtedly tangled but with so many players involved it is likely that someone will be impacted.  Harv Lester, who spent 20 years litigating in the Justice Department’s Civil Division is quoted saying that “the government, to recover damages, will have to prove which contractor or contractors are responsible for any defects.”[3] 

Overall this ordeal is just beginning.  It is likely that we will have to wait until the end of November, as Secretary Sebelius has predicted to determine what the extent of the damage is.  Right now it is clear that these technological glitches carry more weight than anticipated.   We will just have to continue waiting and watching to see how the rest of the story unfolds.


[1] Id.

 

[2] Tom Cohen, Contractors Blame Government For Obamacare Website Woes, (Oct. 25, 2013, 6:41 AM), http://www.cnn.com/2013/10/24/politics/congress-obamacare-website/.

 

[3] Josh Gerstein, Next Up After Website Glitches: The Lawsuits, Politico (Oct. 23, 2013, 4:55 AM), http://www.politico.com/story/2013/10/obamacare-site-could-mean-legal-fight-affordable-care-act-enrollment-98717.html.

 

Blog: Is Your Fantasy League Technically Illegal in Virginia?

by Miles Jolley, Associate Staff

Your initial response to this question is probably, “No way bro!” But answering this question under Virginia law may not be as easy as it seems.  If your league requires an entry fee and then allocates the pot to your league’s best, you may be breaking Virginia law.

Illegal betting in Virginia is prohibited by statute.  The statute reads, in pertinent part: “‘Illegal gambling” means the making, placing or receipt of any bet or wager . . . made in exchange for a chance to win a prize . . . dependent upon the result of any game, contest or any other event the outcome of which is uncertain or a matter of chance.”[1]  Broken down, this means that if you put down money in order to win a prize (more money), and winning is dependent upon events out of your control, you are an illegal gambler in Virginia.  However, there are exceptions in the code as well.  The relevant exception to Virginia’s gambling law reads: “Nothing in this article shall be construed to prevent any contest of speed or skill between men . . . where participants may receive prizes or different percentages of a purse . . . dependent upon their position or score at the end of such contest.”[2]  This exception carves out immunity for people who involve themselves in games of skill for gain.  The big difference between these two statutes is whether the contest involves a game of chance or skill.  So the title question boils down to another question: what are fantasy sports, games of chance or games of skill? 

There are certainly elements of both involved.  On the skill side, fantasy sports require fantasy owners to evaluate hundreds of real-world players’ potentials before the draft to determine when to, if at all, draft certain players.  Additionally, players are constantly assessed during the season for trade value, starting spots, and free-agent acquisitions.  All of this seems to include some sort of skill.  Owners need to interpret a player’s past performance, future matchups, etc.  Any first-time owner will tell you this is not easy, and requires loads of skill and experience. 

On the chance side, all of that assessment hinges on the performance of a real-world player.  Everything about this aspect of fantasy sports is out of the owners’ hands.  A player’s performance depends on coaching decisions, injuries, the other team’s performance, etc.  Again, any fantasy owner can tell you how unpredictable fantasy sports can be.  This chance is the reason gambling is illegal in most states; as wagering money on unknown outcomes is seen as morally defect.  The distinction between skill and chance is what this issue hinges on, but federal law may provide a guiding light for future Virginia statutes.

Betting on fantasy sports is not illegal under federal law.  In fact, there is a special carve out for this activity.  In 2006, the Unlawful Internet Gambling Enforcement Act established widespread provisions limiting online gambling.  However, members of Congress (I wonder how contentious that fantasy league must be) made a specific exception for fantasy sports.  Betting is allowed on fantasy sports so long as rosters aren’t based entirely on the rosters of real sports teams, prizes are established at the outset of the league, outcomes are based on the skill of fantasy owners and the collective statistical performance of several individuals, and so long as outcomes aren’t based entirely on one team’s or one individual’s performance.[3]  Virginia, if it so chooses, can use this statute as an example to exempt fantasy leagues from its illegal gambling law.

 While nobody in Virginia has ever heard of fantasy sports leagues being prosecuted, it still could very well be illegal.

 


[1] 18.2 Va. Code § 325 (2011).

[2] 18.2 Va. Code § 333 (2010).

[3] 31 U.S.C. § 5362(1)(E)(ix) (2006).

Blog: Online Shopping is at a Legal Crossroads

by Spencer Mead, Associate Staff

Shopping today looks very different than it did 20 years ago. Online retailers like Amazon have forever changed the way consumers shop. A person can hop on the internet, travel to a website such as Amazon.com, and order a wide variety of items in a matter of minutes. This method saves time traveling to the store, walking around to find what you want, and in most states shopping online is cheaper. The reason for this is because most states have not enacted any form of taxation on online retail sales. Thus, making the total cost cheaper to shop online than in a local store.

In this day and age of budget cuts and deficits, should online retailers be taxed by states? The taxation would help generate revenue for states desperate for income, and remove the incentive for people to buy online instead of going to their local retail store. But it would come at a cost to the average consumer having to pay slightly more for all online purchases. Now this probably would not have a significant impact on consumers overnight, but the few dollars of tax on each purchase would add up over time. Eventually, these dollars could add up to having a significant impact on families already stretched thin from the recession.

 18 states have determined that they are allowed to tax online retailers, and these states have enacted some form of law taxing sales that take place on the internet. However, the Illinois Supreme Court invalidated a state law allowing taxation of online retailers.[1] The Court determined that the state tax was superseded by Federal Law, and therefore not valid.[2] You might be thinking to yourself, “So what? I don’t live in Illinois so this can’t possible impact me.” However, that would be looking at this issue very narrowly.

This split created by the states could lead to the Supreme Court stepping in to determine if states are allowed to tax transactions taking place on the internet. This has the potential to have an impact on online shoppers across the United States, not just Illinois. This would also have an impact on how states can or cannot generate extra income from taxes on the internet as a whole. A Supreme Court ruling could also greatly affect how retail chains approach online shopping. Even if you are not an online shopper, this can impact you in the future. Large retailers like Wal-Mart and Amazon believe the future of retail lies somewhere between in-store shopping and online shopping.[3]

Regardless of how you shop, you need to be aware of the taxation of online goods. In the future, all goods might be bought and sold online. That is not the case today, but the current decisions of the courts and lawmakers will have a significant impact on the future of retail shopping.


[1] John O’Connor, Ill. High Court Invalidates ‘Amazon tax’ for sales, Yahoo! News (Oct. 18, 2013, 6:27 PM), http://news.yahoo.com/ill-high-court-invalidates-amazon-tax-sales-214307802–finance.html.

[2] Id.

[3] Claire Cain Miller & Stephanie Clifford, To Catch Up, Walmart Moves to Amazon Turf, N.Y. Times, Oct. 19, 2013 available at http://www.nytimes.com/2013/10/20/technology/to-catch-up-walmart-moves-to-amazon-turf.html?ref=technology&_r=0.

Blog: More On Apple's Touch ID – Getting Under Our Skin and Around the Law

by Laura Bedson, Associate Staff

Consumers will stop at nothing to get their hands on the newest Apple products.  But, it appears that with the launch of the iPhone 5s those same hands will be used for something more than just coveting Apple’s newest creation.  The introduction of the 5s also meant the introduction of “Touch ID”,  Apple’s latest technological toy, which has replaced the old passcode system as the means of unlocking one’s phone.  As always, Apple has outdone itself with the release of its newest device, however lawmakers have voiced concerns over Touch ID, specifically it’s Fifth Amendment implications.

 Touch ID has been touted by many as the fingerprint scanning device on the new iPhone.  But this is not what it does.  Instead, it goes deeper to get at information under your skin.  Put (very) simply, the technology in the home button of the phone scans information from the sub-epidermal layers of the skin and uses it as one variable in a larger mathematical representation of your fingerprint to identify you as the owner of the phone and unlock it.[1]  What this means is that the biometric system is more concerned with the capacitive properties of the user’s finger than with its print.[2]

 This procedure is markedly different from the alphanumeric password that iPhone users have been used to, in that it would no longer require users to remember such passwords.  While this may seem like a great idea for those of us whose brains are already at capacity, lawmakers and scholars have approached this new advancement skeptically.

 This skepticism grows out of the possible Fifth Amendment implications of using the Touch ID, specifically the right against self incrimination.  Under this privilege, a witness in a criminal or civil proceeding is protected from revealing information that has the potential to incriminate herself.[3]  The privilege however only extends to testimonial statements, which is a statement that reveals the contents of one’s mind.  A password is something that is (ideally) stored in one’s mind, and as such, qualifies as a testimonial statement.  Based on this logic, law enforcement cannot compel a phone’s owner to incriminate herself by requiring her to enter her password and provide access to the contents of her phone.

 Where the privilege fails is when we enter the realm of biometric data, data which includes but is not limited to fingerprints, blood work, and DNA.  Courts have determined that because this evidence does not speak to what someone “knows”, it is not testimonial and therefore is not privileged. Therefore, the use of the new Touch ID technology, which focuses solely on this biometric data, may make it easier for the government to compel information without implicating the Fifth Amendment privilege against self incrimination.  Without this privilege, a phone user would be forced to use her finger to unlock her phone and reveal its contents law enforcement. 

 Over the years our phones have become an extension of our brains, storing all types of what we may consider personal, classified information.  As our reliance on our phones and the information they store increases, it is now, more than ever, crucial to be aware of how these newest advances, while exciting, can impact the right to privately store and access that information.  It will take time to know whether these advancements have constitutional implications, but until then knowledge is power and consumers need to be alerted to the possibility of infringement on their rights.


[1] Chris Davies, iPhone 5s Touch ID Prompts US Senator Security Concerns, Slash Gear (Sept. 12, 2013), http://www.slashgear.com/iphone-5s-touch-id-prompts-us-senator-security-concerns-20298620/

[2] Id.

[3] Marcia Hofmann, Apple’s Fingerprint ID May Mean You Can’t Take the Fifth, Wired (Sept. 12, 2009, 9:29 AM), http://www.wired.com/opinion/2013/09/the-unexpected-result-of-fingerprint-authentication-that-you-cant-take-the-fifth/.

Blog: Email Scanning by Gmail and Other ISPs: Should We Lose Our Privacy Rights When We Send Emails?

by Jasmine McKinney, Associate Staff

In late September, a federal judge allowed a lawsuit against Google to move forward, when ruling that Google may indeed be violating wiretap law when it scans the e-mails of users not using a Gmail account.[1]  Google utilizes automatic scanning of all e-mail that comes through its servers to work its spam filter, build user profiles, and target advertisements.[2]  The main concern is that when one reads Google’s privacy policy, there is no mention of the fact that the content of e-mails — either between Gmail users or Gmail users and users of other email service providers — are being collected.  This suit against Google has made it possible for similar lawsuits to surface against other e-mail service providers.  In early October, a class action arose claiming that Yahoo violates the Wiretap Act as well as other California laws that forbid intercepting private communications.[3]

The Electronic Communications Privacy Act serves to regulate the collection of content through wire and electronic communications.[4]  This Act was an extension to what is commonly called the “Wiretap Statute” and forbids the “intentional interception, use, or disclosure of wire and electronic communications unless a statutory exception applies.”[5]  There were two primary exceptions under the Wiretap Statute.  The provider exception grants providers the right to intercept and monitor communications in an effort to combat theft or fraud.  Additionally, there is also the exception that when information is readily accessible to public any person is permitted to intercept that electronic communication.  In 2005, the Second Circuit interpreted another exception to the Wiretap Act when it ruled in Hall v. Earthlink Network, Inc. that Earthlink’s continued reception of emails sent to plaintiff Hall’s account did not constitute an “interception” under the Wiretap Act because it was part of Earthlink’s “ordinary course of business.” [6]

Lawsuits such as the ones against Yahoo and Google have raised the question of whether e-mail users should have a reasonable expectation of privacy concerning the messages they send via a third party service providers.  The third party doctrine that was articulated in Smith v. Maryland where the Supreme Court held that once a person involves a third party in communication any legally enforceable privacy rights are lost.[7]  This is precisely the argument that e-mail service providers have attempted to make.  Regardless of which provider an individual chooses to use for their own personal e-mail, once a message is sent to a user who uses some other provider, one’s right to privacy is lost.  However, the question remains whether this doctrine should apply to email service providers like Google and Yahoo.

Aside from an expectation of privacy, there are a number of concerns raised by the use of automatic e-mail scanning.  For example, does Google use automatic scanning solely for the purposes it states or should users be concerned about something more?  Further, should users be concerned with whether the information that is scanned from the e-mails they send is stored by email service providers?  Overall, where should the line be drawn?  The fact remains that we live in a highly technology driven world.  If individuals cannot expect their communications via the Internet to be private, by what means can that expectation be met? Perhaps as this recent litigation continues to unfold, a clear answer will be given as to whether email scanning by service providers is indeed permissible under the Wiretap Act.      


[1] Judge Allows Lawsuit Against Google’s Gmail Scans to Move Forward, http://articles.washingtonpost.com/2013-09-26/business/42421388_1_gmail-users-google-s-marc-rotenberg (last visited Oct. 6, 2013).

[2] Id.

[3] Yahoo Hit with New Lawsuit over Email Scanning in Wake of Gmail Ruling http://gigaom.com/2013/10/03/yahoo-hit-with-new-lawsuit-over-email-scanning-in-wake-of-gmail-ruling/ (last visited Oct. 6, 2013).

[4] 18 U.S.C. §§ 2510-2522 (1986).

[5] Internet Law Treatise, https://ilt.eff.org/index.php/Privacy:_Wiretap_Act (last visited Oct. 6, 2013).

[6] Hall v. Earthlink Network, Inc., 396 F.3d 500 (2d Cir. 2005).

[7] Smith v. Maryland, 442 U.S. 735 (1979).

Blog: One Week, Two Big Facebook Stories

by Fiona Clancy, Associate Staff

 

On Monday, October 14, 2013, two girls, ages twelve and fourteen were arrested in Florida and charged with aggravated stalking, a third-degree felony.[1]  The charges against the two suspects stem from their cyberbullying of Rebecca Sedwick, just twelve years old, who killed herself in September.[2]  Rebecca had been targeted by the two suspects over the course of ten months, with the suspects posting harassing online messages, among them that Rebecca should kill herself.[3]  Florida Sheriff Grady Judd said the tipping point for making the arrests on Monday was one of the suspects allegedly posted a callous message about Rebecca’s death on Facebook the Saturday before, which included her acknowledging she bullied Rebecca.[4]

 

“Yes ik [I know] I bullied REBECCA nd she killed herself but IDGAF [I don’t give a (expletive)]”[5]

 

On Wednesday, October 16, 2013, two days later, Facebook announced its new privacy policy for teens.[6]  Never before were teens able to make their Facebook posts, pictures, and videos publically visible to anyone and everyone.[7]  Facebook describes the policy change for teens as “a new option to share broadly,” claiming teens “want to be heard.”[8]  While the Facebook news release features one post about a teen publicizing a food drive, and another post about a teen running in a 10k charity run as examples of this new policy in action, one can easily imagine the dark side of this new power in the wake of Rebecca Sedwick’s torment and subsequent suicide.[9]

 

Cyberbullying among teens is a recognized problem in this country, and is its effects are serious.  A 2011 study found that 16% of high school students were electronically bullied in the past year, and that kids who are cyberbullied are more likely to use alcohol and drugs, skip school, have lower self-esteem, and have more health problems.[10]  Cyberbullying is especially troubling because kids who are cyberbullied have a harder time getting away from the behavior.[11]  Before Rebecca’s suicide, she had run away from home, been hospitalized for cutting herself, and had changed schools to escape the torment, but the bullying continued online.[12]

 

So why did Facebook decide to change its teen privacy policy?  Reports speculate that Facebook’s change is motivated by a desire to increase its bottom line.[13]  Marketing and advertising companies that work with Facebook are eager to reach impressionable young consumers and target their advertisements to them.[14]  Now that teen users will be able to post information publicly, marketers and advertisers will glean more information about those teens, which they will use to personalize advertisements directed specifically to them.[15]

 

On the legal front, some say the felony charges filed in Florida may mark a turning point in how U.S. law enforcement agencies handle the problem of cyberbullying and stalking, with national ramifications for the prosecution of such cases.[16]  Sheriff Judd said he hoped the arrests would have an impact on cyberbullying, and some say Judd’s tough stance electrifies the growing movement to intensify the battle against juvenile bullying, which has increased and intensified in the era of social media.[17]  Even before the arrests, Florida took the lead nationally in 2004 when it passed a major cyberbullying amendment to its criminal code, which spurred other states to follow suit.[18]

 

Time will tell how these two events, which intersected so poignantly last week, will continue to play out for teens in this country.


[1] Doug Stanglin and William A. Welch, Two Girls Arrested on Bullying Charges After Suicide, USA TODAY (Oct. 16, 2013, 8:11 AM), http://www.usatoday.com/story/news/nation/2013/10/15/florida-bullying-arrest-lakeland-suicide/2986079/.

[2] Id.

[3] Ralph Vartabedian, Charges Against Girls In Suicide May Have National Ramifications, Los Angeles Times (Oct. 18, 2013, 12:39 PM), http://www.latimes.com/nation/la-na-bully-laws-20131018,1903818,7760714.story?page=2.

[4] Stanglin and Welch, supra note 1.

[5] Stanglin and Welch, supra note 1.

[6] Teen’s Now Start With “Friends” Privacy for New Accounts; Adding the Option to Share Publicy, Facebook Newsroom (Oct. 16, 2013), http://newsroom.fb.com/News/737/Teens-Now-Start-With-Friends-Privacy-for-New-Accounts-Adding-the-Option-to-Share-Publicly.

[7] Vindu Goel, Facebook Eases Privacy Rules for Teenagers, New York Times (Oct. 17, 2013, 9:31 AM), http://finance.yahoo.com/news/facebook-eases-privacy-rules-teenagers-200705688.html.

[8] Teen’s Now Start With “Friends”, supra note 6

[9] Teen’s Now Start With “Friends”, supra note 6

[10] What is Cyberbullying?, stopbullying.gov (last visited Oct. 20, 2013, 11:30 PM), http://www.stopbullying.gov/cyberbullying/what-is-it/index.html.

[11] Id.

[12] Stanglin and Welch, supra note 1.

[13] Eric Rosenbaum, Facebook’s ‘Don Draper’ Wants to Pitch Teens, CNBC (Oct. 19, 2013, 7:00 AM), http://finance.yahoo.com/news/facebooks-don-draper-wants-pitch-110000811.html.

[14] Id.

[15] Goel, supra note 7.

[16] Vartabedian, supra note 3.

[17] Vartabedian, supra note 3.

[18] Vartabedian, supra note 3.

Blog: Express Yourself…With Caution! – "Likes" on Facebook

by Jessica Ertel, Associate Staff

 

How many times have you subconsciously clicked the thumbs up button on Facebook?  Every time you log onto Facebook, it is inevitable that something amusing, smart, or relatable will pop up on your news feed which will warrant the social sign of approval, the “like.”  Facebook processes approximately 2.7 billion of these “likes” every day.[1] While Facebook liking simply seems to be yet another form of social interaction, it actually has greater consequences than one might realize.   

Recently, the Fourth Circuit Court of Appeals ruled that “liking” on Facebook constituted protected free speech.[2]  When a former deputy sheriff in Hampton, Virginia, pressed the thumbs up button for his boss’s opposing candidate in the Sheriff election, he suffered an adverse employment action.  By simply liking a Sheriff candidate’s Facebook page, Daniel Ray Carter was expressing his political opinions, expressions that deserve the highest Constitutional protection.  However, the Court noted that this First Amendment level of protection fluctuates depending on whether an individual who has a policymaking role is expressing opinions that intersect with or undermine that public role.  Since a certain political affiliation was not an appropriate requirement for Carter’s job, his political expression on Facebook was given significant protection.  It was improper for Carter to be fired for showing political support for a Sheriff candidate.  

Undoubtedly, every U.S. citizen has the right to freedom of speech.  Yet, it makes sense that an employer can take their employee’s political beliefs into account when that employee’s job necessarily entails policymaking.  An employer will probably not want to hire someone whose Facebook page is stamped with Hitler support groups or racist slurs.  Thus, there is a caveat to the ruling that Facebook “liking” is protected free speech.  While such speech is one’s Constitutional right, that expression is inevitably made public and thus available to whoever happens upon your Facebook page.

The same is true for one’s Twitter account.  Even though there is an option to make one’s Twitter profile private, this social media site provides in its Privacy Policy that any information that a user posts is considered publicly available information.[3]  In a New York case, the Court ruled that the defendant’s Twitter account could be subpoenaed after he participated in an Occupy Wall Street march on the Brooklyn Bridge.[4]  Presumably, the defendant’s political expressions on Twitter would be used against him to prove that he participated in this protest in which he was arrested for disorderly conduct. 

Since Facebook liking now qualifies as protected First Amendment speech, it seems that tweeting should qualify as well.  And, although these social media expressions are guaranteed Constitutional protection, that does not diminish the fact that these expressions are made public.  An employer cannot fire someone for their political expressions on Facebook or Twitter, but there is still the reminder that those opinions and views are out there for the world to see.


[1] Ashlee Vance, Facebook: The Making of 1 Billion Users, Bus. Wk., Oct. 4, 2012, at 2, available at http://www.businessweek.com/articles/2012-10-04/facebook-the-making-of-1-billion-users#p2

[2] Bland v. Roberts, 12-1671, 2013 WL 5228033 (4th Cir. Sept. 18, 2013), as amended (Sept. 23, 2013).

[4] People v. Harris, 36 Misc. 3d 613, 619, 945 N.Y.S.2d 505, 509 (Crim. Ct. 2012). 

Blog: Vindictive Exes Need to Find a New Outlet: States Consider Outlawing ‘Revenge Porn’

by Taylor Linkous, Associate Staff

Technology and pornography–one of the great love stories of our time. That’s right; technology and porn have always had an exciting, juicy, and mutually beneficial relationship.  Where technology goes, porn follows.  Take the Polaroid camera. Much of the success of the Polaroid camera is said to come from the fact that people could take explicit photos without having to go to the store to get the film developed.[1]  Now, cell phones and more specifically, camera phones have seemed to give people this same sense of privacy and promiscuity.  However, this is a false sense of privacy considering we now have the internet, an amazing, yet very scary place where your boyfriend, girlfriend, or whoever else comes across these explicit photos can post them for the world to see.  This is called revenge porn.

 Revenge porn is a nude picture or video that is publicly shared on the internet, usually by an ex-lover, for the purpose of humiliation.[2] This happened to Holly Jacobs, a Florida woman who is now a strong advocate of strengthening laws against revenge porn and who founded the website End Revenge Porn.[3] Jacobs found out from a friend that nude photos she had sent to her ex-boyfriend had been posted on her Facebook and then later to hundreds of revenge porn websites. Even more disturbing was that her name, email address, and place of business were posted along with the pictures.[4] As if finding out your body was exposed to the entire internet world was not enough, she went to the police only to discover they could do nothing for her. 

Currently, the act of posting revenge porn is a crime in only two states, New Jersey and just recently, California.  New Jersey’s Title 2C: 14-9 is an invasion of privacy law which is directed at people who secretly photograph or videotape another person while they are naked or engaged in sexual activity without their consent.[5]  Although the law was not drafted with the criminalization of revenge porn in mind, it was written broad enough to apply to revenge porn situations. 

About a month ago, the California legislature passed SB 255, a revenge porn bill introduced by Senator Cannella.  Governor Jerry Brown signed the bill into law on October 1st and it went into effect immediately.[6]  The law makes posting revenge porn a misdemeanor punishable by up to 6 months in jail and a $1,000 fine.[7]

Revenge porn has become a hot topic in recent months as a couple of other states have attempted to draft legislation specifically directed at criminalizing revenge porn.  This past year, Florida, the home state of Holly Jacobs, tried and failed to pass a revenge porn law.[8]  Also, just recently, New York Senator Joseph Griffo and Assemblyman Edward Braunstein announced they would introduce a bill criminalizing revenge porn.[9] The Wisconsin legislature is also considering a revenge porn bill.[10]

Many have voiced concerns about enacting laws that ban revenge porn. First, the failure of the Florida bill was partly due to concerns that such a law would abridge free speech in violation of the First Amendment.[11]  Similar concerns have been expressed regarding California’s newly enacted revenge porn law.  The ACLU initially opposed the bill because of First Amendment concerns, but has since changed this position and stated there are no objections to the bill.[12]  While most would agree that revenge porn is repulsive and wrong, it may be difficult to strike the right balance with a law that successfully bans the posting of revenge porn without simultaneously restricting legitimate free speech. 

Next, many people don’t see a point in criminalizing this activity as victims are already able to file civil suits against the person who posted the pictures.  However, filing a civil suit takes lots of time and money.  Moreover, the reality is that once these pictures are posted to a revenge porn website, they will spread like wildfire all over internet and are next to impossible to take down.  A civil suit won’t really remedy this issue.  Threatening criminal penalties for posting revenge porn may be a better way to deal with the problem as it will discourage people from posting the pictures in the first place.

On the flipside, there are also concerns that revenge porn laws could be written too narrow.  For example, as written, California’s new law makes revenge porn illegal only if the photo was taken by the same person who distributes it and that person must have distributed the picture with the intent to cause serious emotional distress.[13]  This means that if a girl takes the naked picture of herself and sends it to her boyfriend and then her boyfriend later posts the picture on a revenge porn website, the California law would not apply.  Moreover, showing that a person posted revenge porn with the intent to cause serious emotional distress may be difficult to prove.  People may post these pictures intending to make money rather than with an intent to cause emotional distress.  

There are still many questions to be answered about criminalizing revenge porn.  While state laws criminalizing revenge porn are a start, it may be necessary for federal law to address the issue.  It will be interesting to see how many states follow California’s lead and whether Congress decides to step in. 

Finally, in case you’re interested, a revenge porn case popped up in local news in the last month as the Albemarle County Commonwealth’s Attorney, Denise Lunsford, filed for a protective order in Missouri against her former lover, David Cosgrove, former chief legal counsel to Governor Bob Holden, for posting nude pictures of her on the Internet.[14]  Cosgrove has asked the judge to dismiss the request and sanction Lunsford for “filing an unnecessary legal complaint.”[15]

           


[7] Id.

[10] Id.

[15] Id.

 

Page 16 of 18

Powered by WordPress & Theme by Anders Norén