The first exclusively online law review.

Author: JOLT Page 47 of 50

Blog: Should Search Engines be Responsible for Personal Information on the Internet?

by Spencer Mead, Associate Staff

Should Search Engines be Responsible for Personal Information on the Internet?

 

            Advances in technology and the Internet have revolutionized how human beings interact. 20 years ago, embarrassing moments were rarely caught on camera. However, those recorded gems started one of the most popular television shows in recent history, America’s Funniest Home Videos. People knew that their embarrassing moments had a possibility of making it on TV to be viewed by hundreds of thousands of Americans. Thankfully, video recorders were fairly large and recognizable so people generally knew when they were being recorded.

 

Fast forward to today. The widespread availability of the Internet, vast improvements in video recording capabilities, the advent of YouTube, and the explosion of smart phone usage allows videos to be recorded at any time, without someone being aware they are being recorded, and accessible to the entire world in a matter of minutes. Now, an embarrassing moment can be seen by millions in a few weeks’ time. There are even TV shows that get all of their material strictly from YouTube. Information spreads so quickly across the internet that it can be almost impossible to fully remove something from the public realm. But what if you want one of your embarrassing or personal moments, that should not have been placed in the public realm to begin with, wiped from the Internet for good? Is it even possible to do?

 

Internet Search Engines, such as Google, are extremely complex and modifying the search algorithm is not easily done. Therefore, making it difficult to permanently remove items from the search engine’s databases. However, most Internet search engines have mechanisms in place to remove unwanted items from their search results.[1] But this does not mean the information is actually removed from the search engine. People can still find this information. Sometimes just changing the search terms is all it takes to find the information through a different search on the same search engine.

 

One man thinks the solution is permanently altering the search engines to remove the information from their databases.[2] However, this raises several public policy concerns. This would be a very expensive process, and it might not be economically feasible for search engines to accomplish this without the services offered to the public suffering. Also, it raises concerns about free speech under the First Amendment. Where should the line be drawn between the public having full access to as much information as possible and protecting an individual’s private rights? A French Court will decide where this balance lies on October 12.[3]

 

This ruling might not be on U.S. soil, but it raises many concerns that could have worldwide implications. If Syria does not like all the negative press it is receiving, should it be able to force Google to remove the articles from its database? Should only individuals have the ability to make such a request? Should the First Amendment right to freedom of speech trump all requests for personal information to be removed? The answer is not known, but we as Americans need to be aware of these concerns to make sure the right balance is struck.


[1] Remove a Page or Site from Google’s Search Results, Google, https://support.google.com/webmasters/answer/164734?hl=en (last visited Sept. 8, 2013).

[2] Google in Fight Over Content That Appears in Search Results, The New York Times, http://www.nytimes.com/2013/09/09/technology/google-in-fight-over-content-that-appears-in-search-results.html?ref=technology (last visited Sept. 8, 2013).

[3] Id.

Blog: NCAA Getting Out of the Video Game Business?

By Kevin Conneran, Associate Staff

 

With the beginning of a new football season, every college football fan is acutely aware of the challenges that his or her school will face this season. However, more pressing than your school’s mid-October game against its in-state rival is the issue of player compensation.

 

The debate over compensation is nothing new in college sports. For years, there have been calls to more fairly compensate student-athletes. Is tuition, room, board, and books fair compensation for athletes who generate millions of dollars for their schools? South Carolina head football coach Steve Spurrier has been outspoken in his support for player compensation, stating that he wished he could give players a “piece of the pie” that they help create.[1]

 

The latest development that has reignited this debate is the 2009 lawsuit filed against the NCAA by former college basketball player Ed O’Bannon that has been joined by current and former football and basketball players. Detailed information on that lawsuit can be found here. The O’Bannon lawsuit takes aim at two major revenue sources for the NCAA and its member institutions both tied to player’s images and likeness: television revenue and video game licensing.[2]

 

In July, the NCAA announced that they would not renew its licensing agreement with EA Sports, maker of the NCAA College Football video game franchise.[3] The Pac-12, Big Ten, and the SEC have followed suit and announced that they will not be a part of the franchise moving forward.[4] While this may sound like a win for those championing reform in college athletics, the practical effect of these moves seems to be minimal. While the NCAA and major conferences have severed their ties with EA Sports, each university still has its own licensing agreements with EA Sports. According to industry sources, only one team that appeared in this year’s version of NCAA College Football will not appear in next year’s.[5]

 

It seems NCAA College Football has at least a few more years left in it. At the end of the day, colleges will continue to use players’ likeness without paying compensation until the threat of litigation becomes too onerous. Until then, college athletes will continue to play for tuition, room, board, and books. I’m sure Johnny Manziel is thrilled.

Blog: NSA Surveillance, the Boston Bombing, and Political Incentives

 

by Walton Milam, Associate Staff

 

The National Security Agency’s surveillance of domestic electronic communication has garnered much attention in recent months.  The NSA apparently has access to immense databases that the government claims will protect Americans from international and domestic terrorist threats.  While the extent of the NSA’s surveillance remains a mystery, the government clearly has the capability to collect data regarding personal communications.  Many opposed to the surveillance fear a slippery slope through which the NSA will eventually monitor individual electronic activity without end.  Some including the ACLU suggest monitoring phone calls, text messages, and email violates first amendment rights.  Supporters of the surveillance claim the data collection will be directed only at identifying and monitoring potential threats to United States.  These supporters include President Obama who claims the surveillance is “circumscribed, narrow system, directed at us being able to protect our people, and all of it is done under the oversight of the courts.”[1]

 

Regardless of the merits of those arguing for or against surveillance, it is likely that NSA surveillance is here to stay as public opinion and as a result politicians will favor homeland security above all else.  Homeland security, for better or worse, has emerged as a dogma in American politics that few politicians seeking reelection dare speak against.  In the wake of the Boston Bombing, where surveillance technology proved particularly helpful in catching the culprits, American sentiment is likely particularly favorable to increased surveillance.  Any politician who opposed NSA surveillance will almost assuredly be met with fear-mongering from opponents who will claim opposition to surveillance equals opposition to homeland security, a cardinal political sin.  At this point, all American voters will have lived through 9/11, the Boston Bombings, the Virginia Tech massacre, and the Sandy Hook school shooting. The vast majority is old enough to remember the Oklahoma City Bombing in 1995.  Thus, National Security remains at the forefront in voters’ minds. 

 

To wage successful campaigns, politicians must meet the demands of their constituents.  With national security such a prominent issue that politicians can ill-afford to oppose, it is unlikely that any substantial group of politicians will gain enough clout to create legislation ending the NSA’s surveillance.  Opponents of NSA surveillance thus likely stand the best chance of ending or limiting the surveillance in the courtroom.  A number of cases have already been filed.[2]  Major telecommunications companies have a dog in the hunt as their consumers may be upset with having data about their communications parlayed to the government.  These companies will likely be primary sponsors of lawsuits against the government seeking an injunction against the NSA’s continued surveillance.

 

While those opposing NSA surveillance have shout loudly and frequently make headlines on NPR, Fox, CNN, and NBC, it is likely these shouts will not be heard in the Capitol where politicians face major incentives to act like they care more about national security than individual rights that may or may not be infringed by NSA surveillance.


[1] http://www.theguardian.com/world/2013/jun/19/barack-obama-nsa-people-emails

[2] http://www.theguardian.com/world/2013/jul/17/nsa-court-challenges-tech-firms

Blog: I Just (Don’t) Want My MTV: VMA Performances Spark Movement for A La Carte Cable

 By:  Catherine Gray, Associate Staff 

 

            I admit it. I love the MTV Video Music Awards (VMAs). From Lil’ Kim’s seashell pasty in 1999 to Beyoncé announcing her pregnancy with Blue Ivy in 2011, the VMA’s always deliver just the right combination of crazy, ridiculous, and pure celebrity trash I’m looking for. Unfortunately this year, the event that should have taken the cake—the reunion of *NSYNC and the subsequent restoration of all my middle school hopes and dreams—was overshadowed by Miley Cyrus and her dancing teddy bears. In what can only be described as one of the most bizarre performances in VMA history, Hannah Montana twerked her way into homes across the country wearing nothing more than a spandex bikini.

            While I found this horrific and embarrassing display highly entertaining, I realize that others, particularly those individuals with young and impressionable children, might not find this to be quality broadcast. Moreover, I recognize that these parents might not want their children to have access to networks that offer this kind of programming. Indeed, in the aftermath of Miley’s attempt to prove to the world she’s a big girl now, the Parents Television Council pointed to her display of ‘creativity’ as a reason for Congress to pass the proposed Television Consumer Freedom Act.[1] The bill, introduced by Arizona Senator John McCain, would allow multi-channel distributors to provide video programming to subscribers on an individual, per channel basis.[2]

            Despite the somewhat suspect source of this movement—the Parents Television Council has a history of criticizing MTV programming for failing to adhere to family values—the appeal of the Television Consumer Freedom Act extends beyond parents who want to protect their children from the likes of Miley Cyrus’ foam finger.[3] Even those of us who gleefully tune in to the VMAs, Jersey Shore, and Teen Mom stand to benefit from being able to purchase programming on a per-channel basis. Cost-conscious consumers, instead of paying roughly $70, $80, or $90 a month for a Verizon FiOS package of assorted channels, would be able to select each channel they wish to subscribe to individually, creating a substantial reduction in cost.[4] Gone would be the days of subscribing to a bundled package, paying for channels you’d never watch to have access to ones you want. This option already exists with regard to premium channels such as HBO and Showtime, so why not extend individual subscriptions to basic network channels?[5]

The Television Consumer Freedom Act was referred to the Committee on Commerce, Science, and Transportation on May 9, 2013. [6] Although it has a slim chance of becoming enacted, the idea of a la carte cable has mainstream consumer appeal.[7] Lastly, just in case you’re interested, you can catch all the highlights from the 2013 VMAs here.


[1] Parents Television Council Blasts VMAs as Serving Sex to Teens, The Hollywood Reporter (Aug. 26, 2013), http://www.hollywoodreporter.com/live-feed/parents-television-council-blasts-mtvs-614448.

[2] Television Consumer Freedom Act of 2013, S. 912, 113th Cong. (2013).

[3] Parents watchdog group assailts [sic] content of MTV’s ‘Jersey Shore’ and other shows, NY Daily News (Dec. 7, 2011), http://www.nydailynews.com/entertainment/tv-movies/parents-watchdog-group-assailts-content-mtv-jersey-shore-shows-article-1.988095#ixzz2drd5h9Vc.

[4] TV PackagesFiOS TV Packages, Verizon, http://www.verizon.com/home/fiostv/tv-packages/ (last visited Sept. 3, 2013).

[5] Premium TV Channels – FiOS TV, Verizon, http://www.verizon.com/home/fiostv/tv-packages/#premiumchannels (last visited Sept. 3, 2013).

[6] Television Consumer Freedom Act of 2013 (S. 912), GovTrack.us, http://www.govtrack.us/congress/bills/113/s912 (last visited Sept. 3, 2013).

[7] Id.

Blog: Welcoming our Volume XX Associate Staff

by Benjamin Fox, Editor-in-Chief, Volume XX
 
It is my distinct honor to introduce the incoming staff members of Volume XX of the Richmond Journal of Law and Technology.  These students worked extremely hard during the journal competition, and we look forward to working with them during the upcoming school year!
 
Congratulations to the following students:

Billy Raska
Brittani Lemonds
Catherine Gray
Danielle Bringard
Dimitri Karles
Dylan Denslow
Emma Buck
Fiona Clancy
Jasmine McKinney
Jessica Ertel
Kevin Conneran
Kit Mathers
Laura Bedson
Matt Miller
Miles Jolley
Silvia Lee
Spencer Mead
Taylor Linkous
Walton Milam

Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials

pdf_iconDownload PDF

Cite as: Nicole A. Poltash, Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials, 19 Rich. J.L. & Tech. 14 (2013), available at http://jolt.richmond.edu/v19i4/article14.pdf. 

by Nicole A. Poltash*

 

I.  Introduction

[1]        The usurpation of personal pictures posted on social media websites is not uncommon.  Cheryl Smith was unknowingly made the face of a dating website.[1]  A headshot of popular blogger Sara Pinnix was used “to promote an overseas Tarot card reader named Cristal.”[2]  And eighteen-year-old Arielle Goldfinch’s pictures were used on Tagged, a website “aimed at meeting people for sexual relationships.”[3]  

[2]        Such potential for misuse is particularly unsettling in light of the fact that three hundred million photos are uploaded to Facebook every day.[4]  Yet a careful reading of Facebook’s privacy policy dispels any notion that information a person chooses to share will not be disclosed to anybody else—even if shared with only one friend.[5]  Communications can be disseminated “by the friends with whom [users] share it, or even by Facebook at its discretion.”[6]  Indeed, Facebook recently sent its users notice of a pending class action which claims that “Facebook unlawfully used the names, profile pictures, photographs, likenesses, and identities of Facebook users in the United States to advertise or sell products and services . . . without obtaining those users’ consent.”[7]

[3]        Enter Snapchat, a mobile phone application that sends self-destructing messages.[8]  The company touts: “[S]imply set the timer up to ten seconds and send.  [Recipients will] have that long to view your message and then it disappears forever.”[9]  And disappear it does.  “[T]he company deletes any videos or photos off its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for [it].”[10]  Unsurprisingly, this has led to the use of Snapchat for sexting[11] since its launch in September 2011.[12]      

[4]        This comment explores sexting between minors and its inseparable link to Snapchat.  Part II provides background information on the practice and prevalence of sexting.  Part III explains the Snapchat application and its various uses.  Part IV discusses the implications of sexting, legal and otherwise.  Part V examines how Snapchat directly conflicts with current law.[13]  Lastly, Part VI proposes possible solutions.

 

II.  Background

[5]        Sexting has been defined as “[t]he practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular phones . . . or over the Internet.”[14]  Typically, a person takes a digital photo of himself or herself and sends it via mobile phone as a text message.[15]  Children as young as twelve years old have engaged in the practice.[16]

 [6]       Between 2004 and 2009 the portion of teenagers[17] who owned cell phones increased from forty-five to seventy-five percent.[18]  Of those teens, four percent admitted to having sent a sext to another person and fifteen percent said they had received a sext of someone they know.[19]  Those figures nearly parallel the percentage of adults who have sent and received sexts,[20] and have increased significantly since 2009.[21]

[7]        A 2012 survey of over six hundred private high school students revealed that nearly twenty percent of students had sent a sext via cell phone, and nearly twice as many had received a sext.[22]  Over a third of those who had sent a sext had done so “despite believing that there could be serious consequences.”[23]  More than a quarter had forwarded a sext that they had received to others.[24]

[8]        The National Campaign to Prevent Teen and Unplanned Pregnancy sponsored a similar survey of 1,280 teenagers and young adults, which largely uncovered the same figures.[25]  Nearly twenty percent of teenagers found nothing wrong with text messages containing images of full nudity, while forty percent considered being topless acceptable.[26]  In addition, “[s]ending and posting nude or semi-nude photos or videos starts at a young age and becomes even more frequent as teens become young adults.”[27]

[9]        Sexting itself is strongly linked to sexual behavior.[28]  According to the Archives of Pediatrics and Adolescent Medicine, “[a]bout 77% of girls aged 14 to 19 who had sent a sext reported having had intercourse, compared with 42% of those who hadn’t sexted.  For boys, 82% of those who had sexted had had sex, while 46% of non-sexters had done so.”[29]  Finally, girls who sext are also more likely to engage in unsafe sex.[30] 

 

III.  Snapchat

A.  Application, Terms, and Loopholes

[10]      Snapchat was born in the spring of 2011 in a Kappa Sigma fraternity house.[31]  Stanford alum Bobby Murphy and Stanford dropout Evan Spiegel created the picture and video messaging application as a project for a product design class.[32]  The company’s description of the application, which is rated for users twelve and older, is short:

Snapchat is the fastest way to share a moment with friends.  You control how long your friends can view your message—simply set the timer up to ten seconds and send.  They’ll have that long to view your message and then it disappears forever.  We’ll let you know if they take a screenshot!  Build relationships, collect points, and view your best friends.  Snapchat is instantly fun and insanely playful.  Show your friends how clever you can be and enjoy the lightness of being![33]

[11]      Once Snapchat is downloaded from Apple’s iTunes or Google Play, a user must register a username and set a password.[34]  Snapchat then “accesses your contacts on your cell phone to load friends to the application, or you can add other friends beyond your contact list.”[35]  After two users approve each other, they can begin messaging.[36]

[12]      Pictures and videos are sent the same way: “by taking the picture or video, setting a timer from 1-10 seconds for the content to disappear after the user opens it, and sending it to another user.”[37]  Messages can be sent to one or more persons at a time.[38]  But with pictures, there are  additional options; they can be edited with captions or doodles, saved to a user’s phone, or uploaded directly to Instagram.[39]  Snapchat also tracks who each person messages, creating a “best friends” group for those messaged most,[40] with the top three people listed in order on each user’s public Snapchat profile.[41]

[13]      What makes the application so unique, however, is what happens to messages after they are viewed.  Pictures and videos sent via Snapchat are not just deleted from the recipient’s phone, but also from Snapchat’s network.[42]  “[T]he company deletes any videos or photos off of its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for the information.”[43] 

[14]      But Snapchat does not and cannot entirely live up to this claim, giving users a false sense of security.  Indeed, the company’s privacy policy acknowledges a
s much:

Although we attempt to delete image data as soon as possible after the message is received and opened by the recipient . . . we cannot guarantee that the message contents will be deleted in every case. . . . Messages, therefore, are sent at the risk of the user.[44]          

[15]      There are additional loopholes.  For example, recipients can simply take a screenshot of the message, although this will notify the sender.[45]  Alternatively, recipients can take a picture of their phone, thereby circumventing the screenshot notification.  Even then, a more complicated approach exists.  “Snapchat saves [videos] on the phone’s local memory, which you can then recall by installing a file browser, such as iFunBox, and plugging the phone into a computer.  You then search through the file browser, copy and save the content to a computer, and you’re done.”[46]

[16]      Nevertheless, Snapchat has risen rapidly in popularity since its launch in September 2011.[47]  By the end of December 2012, the application was being used fifty million times a day,[48] up from thirty million in November and ten million in October.[49]  In 2012 alone, more than five billion messages were sent through Snapchat.[50]  In February 2013, the application “was the second-most popular free photo and video app for the iPhone . . . just behind YouTube and ahead of Instagram.”[51]  Snapchat is especially popular among individuals under twenty-five, and in December 2012 the company received eight million dollars from Benchmark Capital, the financial backer behind Instagram.[52] 

[17]      The application’s success has led other companies to copy the concept.[53]  In December 2012, for example, Facebook created the Poke app, which allows users to “send self-destructing photos, videos, and Facebook messages.”[54]  Unlike Snapchat, however, Facebook “keeps data you’ve deleted for a certain amount of time on its servers.”[55]  The new Facebook application has been largely unsuccessful, even being derided as “an obvious ripoff,” and appears to have launched Snapchat to new heights.[56]

 

 B.  Uses

[18]      Snapchat is meant to bring fun and spontaneity back into the digital world.  “People are living with this massive burden of managing a digital version of themselves,” co-founder Evan Spiegel explained.[57]  “It’s taken all of the fun out of communicating.”[58]  The application gives users a strong sense of inconsequentiality to their actions, enabling them to take “the ugliest, silliest, most compromising photos they want.”[59]  But emphasis should be placed on compromising.  The company’s deletion of messages from its servers has led to a widespread alternative use for Snapchat: sexting.[60]

[19]      Snapchat has been recognized as a sexting application since its inception.[61]  Because messages are ultimately deleted from the company’s servers, Snapchat has even been dubbed “the greatest tool for sexting since the front-facing camera.”[62]  The New York Times put it aptly: “All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”[63] 

[20]      Spiegel is unpersuaded, saying, “I’m not convinced that the whole sexting thing is as big as the media makes it out to be. . . . I just don’t know people who do that.  It doesn’t seem that fun when you can have real sex.”[64]  Yet the application is rated for users twelve years of age and older due, in part, to “suggestive themes” and “mild sexual content or nudity.”[65]

[21]      Proof of Snapchat’s use for sexting is found in “Snapchat Sluts,” a website featuring photos of naked women that were taken using Snapchat.[66]  The website was created in early December 2012 by party photographer Kirill Bichutsky and was “born from an open call for submissions posted on Bichutsky’s Twitter account.”[67]  All participants submitted pictures willingly and were over eighteen.[68]  The photos have since been removed, but the website clearly demonstrates that Snapchat “is being used in ways not intended by its creators.”[69]

[22]      Snapchat is also used for other improper purposes, such as for “crude drawings” and “to flaunt underage drinking.”[70]  In addition, “a growing number of teens [are] using Snapchat for cheating on tests.”[71] 

 

IV.  Implications of Sexting

A.  Legal Implications

[23]      In New York v. Ferber, the Supreme Court held that “[s]tates are entitled to greater leeway in the regulation of pornographic depictions of children.”[72]  Because the child pornography laws of most states classify a child as someone under the age of eighteen, a teenager who sexts may commit four different crimes: solicitation, production, distribution, and possession of child pornography.[73]  In effect, such laws criminalize a large fraction of American teenagers’ behavior.

[24]      The nature of sexting, however, makes “typical legal questions about the action, the actors, and the consequences difficult if not impossible to answer.”[74]  Thus state legislatures, while not ignoring the problem, have been slow to make progress.[75]  States have taken a variety of approaches to regulating teenagers who sext.[76]  Vermont, for example, created a total exception for consensual sexting between teenagers of specific ages.[77]  Vermont Senate Bill 125 amended child pornography laws to exclude persons “less than 19 years old, [when] the child is at least 13 years old, and the child knowingly and voluntarily and without threat of coercion used an electronic communication device to transmit an image of himself or herself to the person.”[78]

[25]      Other states established entirely new sex offender laws in response to sexting.  In February 2012, South Dakota criminalized a minor’s intentional creation, transmission, possession, or distribution of “any visual depiction of a minor in any condition of nudity . . . or involved in any prohibited sexual act.”[79]  With the exception of two affirmative defenses, any violation constitutes the offense of juvenile sexting, which is a class one misdemeanor.[80]

[26]      Diversionary programs are an alternative approach.  New York Assembly Bill 8131 “[d]irects the attorney general to establish a 2 year juvenile sexting and cyberbullying education demonstration program in not less than 3 counties as a diversionary program for persons under 16 who have engaged in cyberbullying or sexting, in lieu of juvenile delinquency or criminal proceedings.”[81]

[27]      Many state laws, however, do not adequately address the problem of sexting and how to punish it.  Illinois’ sexting law, for example, does not punish persons who repeatedly request sexts nor does it provide persons who receive unwanted sexts with a means to stop the sender.[82]  Further, the law fails to “go far enough to punish minors who recklessly send sext images on to unintended third parties and . . . to prevent the images from being created in the first place.”[83]  

[28]      In those states without  sexting laws, prosecutors are left to follow the laws already in place.  These laws are “mainly child pornography or obscenity laws, and some legislators have followed in turn with sex offender punishment guidelines. . . . [A] conviction . . . could result in teens being labeled sex offenders and subject to lifetime registration and reporting requirements.”[84]

[29]      Section 2256(8) of the Protection of Children Against Sexual Exploitation Act of 1977, for example, provides that child pornography “is any visual depiction of sexually explicit conduct when the visu
al depiction is a digital image, computer image, or computer-generated image of a minor engaging in sexually explicit conduct.”[85]  Although many sexts do not fall within the purview of “sexually explicit,”[86] teenagers across the United States have been charged with child pornography offenses.[87]  Such teenagers may face a difficult choice: “either mount a case-by-case ‘as applied’ challenge to a prima facie valid law (and risk decades in jail) or plead guilty to a lesser charge.”[88]

 

B.  Non-Legal Implications

[30]      Sexting also has non-legal implications, such as damaging careers and future job prospects.[89]  “According to a recent survey by Microsoft, 75 percent of U.S. recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants—including. . . photo- and video-sharing sites.”[90]  Further, “[s]eventy percent of U.S. recruiters report that they have rejected candidates because of information found online.”[91]

[31]      More importantly, the distribution of pictures and videos depicting juveniles engaged in sexual activity is “intrinsically related to the sexual abuse of children” in two notable ways.[92]  “First, the materials produced are a permanent record of the children’s participation and the harm to the child is exacerbated by their circulation.  Second, the distribution network for child pornography must be closed if the production of [such] material   . . . is to be effectively controlled.”[93]

[32]      Sexting may also lead to bullying.[94]  Eighteen-year-old Jessica Logan of Cincinnati, for example, was harassed after an ex-boyfriend forwarded nude pictures of her to other high school girls.[95]  A few months later, Logan took her own life.[96]

 

V.  Conflicts with the Law

[33]      With all the risks associated with the application’s improper use, Snapchat has added limited liability and indemnification clauses.[97]  Its limitation of liability states, in relevant part, that the company will not be held liable for any damages resulting from “the conduct of other users of the application, even if Snapchat has been advised of the possibility of such damages.  You assume total responsibility for your use of the application.”[98]

[34]      Damages aside, Snapchat itself may be illegal because it functions as a distribution network for child pornography.  The Supreme Court has held that a state’s interest in “safeguarding the physical and psychological well-being of a minor” is “compelling.”[99]  “A democratic society rests, for its continuance, upon the healthy, well-rounded growth of young people into full maturity as citizens . . . .”[100]  Accordingly, the Court has “sustained legislation aimed at protecting the physical and emotional well-being of youth even when the laws have operated in the sensitive area of constitutionally protected rights.”[101]

[35]      One concern articulated in Ferber applies directly to teen sexting: the creation of a “permanent record.”[102]  As explained in Osbourne v. Ohio, “pornography’s continued existence causes the child victims continuing harm by haunting the children in years to come.”[103]  This “haunting” presupposes underlying sexual abuse, but abuse is not required:

[P]ornography poses an even greater threat to the child victim than does sexual abuse or prostitution.  Because the child’s actions are reduced to a recording, the pornography may haunt him in future years . . . . A child who has posed for a camera must go through life knowing that the recording is [or could be] circulate[ed] . . . .[104]

[36]      Similarly, “it is the fear of exposure and the tension of keeping the act secret that seems to have the most profound emotional repercussions.”[105]  Sexting itself is also harmful to teenagers.[106]  These harms justify the suppression of self-made pornography, even if it interferes with teenagers’ interest in expressing themselves as they wish. 

[37]      In practice, however, courts treat sexting differently than traditional child pornography.  Between 2008 and 2009, for example:

nearly 3,500 cases of sexual images produced by teens came to the attention of law enforcement agencies in the U.S. . . . . Two-thirds of these cases, however, had “aggravating” factors — such as involvement of an adult or use of the images by a teen to harass, bully or intimidate the victim.  Teens were arrested in 18% of cases where there was no aggravating factor, and registration as a sex offender occurred in only 10 cases, nine of which involved actual sexual assault . . . .[107] 

Forty-five-year-old Randy T. Davis Jr., by contrast, was sentenced to almost fourteen years in federal prison for downloading traditional child pornography from the Internet. [108]

[38]      Even if sexting by minors is distinguishable from traditional child pornography,[109] it is still illegal under prima facie valid law.[110]  Snapchat’s self-destructing messages make users feel immune from repercussions.  This has encouraged and led directly to the application’s widespread use for sexting.  Thus, Snapchat is “directed to inciting or producing imminent lawless action and is likely to incite or produce such action.”[111] 

[39]      But the application adds an additional layer of complexity.  Because Snapchat deletes photos and videos from senders’ phones, recipients’ phones, and its servers,[112] there is no “permanent record of the children’s participation.”[113]  On the one hand, Snapchat functions like contraception, protecting teenagers who are going to sext regardless of the consequences.[114]  On the other hand, it is used to both distribute child pornography and destroy the evidence.

[40]      Once deleted from Snapchat’s network, messages cannot be recovered, putting them beyond the reach of any subsequent investigation.[115]  Thus, short of real-time interception by law enforcement, Snapchat’s use deprives victims of recourse, even when aggravating factors are present.[116] 

[41]      Such aggravating factors are becoming increasingly common.  One reason is trends like “revenge porn,” in which males post naked pictures of their ex-girlfriends online to websites such as PinkMeth.[117]  Again, these harms greatly outweigh the benefits of freely taking “the ugliest, silliest, most compromising photos.”[118]

 

VI.  Conclusion

[42]      All states should create educational programs for teenagers about sexting.[119]  These programs should be taught using “gist”-based reasoning because “teens who are taught to focus on potential catastrophic, negative outcomes, rather than the odds, make fewer risky [ ] decisions.”[120]  These outcomes should include, among other things, bullying and career implications.  The curriculum can be incorporated into both Family Life Education and rehabilitation programs.

[43]      In addition, applications such as Snapchat must be made less readily available to minors.  Accordingly, Snapchat should be restricted to adults age eighteen and older, and the application’s content rating should be changed on Apple’s iTunes and Google Play.  As to the former, Snapchat should implement a customer protection block until a user confirms that he or she is eighteen years of age or older.[121]  As to the latter, a changed rating will put parents on alert on the front end, decreasing the need to look through their children’s phone records to unearth red flags. 

[44]      States should also pass legislation imposing fines on minors who use Snapchat.[122]  Authorities can uncover the age and identity of many Snapchat users simply through their usernames: “[s]ince Sn
apchat presents itself as private—basically offline—many people use the same username as they use for other social media accounts. . . . [A] quick Google search of [people’s] usernames pulled their Instagram and Twitter accounts right up.”[123]  A user’s operation of the application can then be monitored in part through his or her public Snapchat profile.[124]  Over time, such fines would reduce Snapchat’s network effect and use amongst minors.[125]

[45]      Alternatively, Snapchat could be ordered to implement nudity detection software such as Snitch[126] or PORNsweeper.[127]  Such software searches files “for the color of human pigmentation in the pixels, since nude or pornographic images contain more skin pixels than other images where skin is present.”[128]  This would detect most sexts, though the software may also flag “[b]aby pictures and pictures of people on vacation at the beach . . . because they contain large amounts of skin.”[129]

[46]      Once a message is flagged as containing nudity, Snapchat can do one of three things: delete the message, pixelate the message, or forward the message to authorities.[130]  Of these three options, deletion is the most practical.[131]  Moreover, deletion would allow teenagers to continue to use Snapchat while simultaneously reducing its ability to be used for sexting.[132]

[47]      In conclusion, many legislatures are failing to keep pace with sexting amongst minors.  The legal implications are problematic, and are only compounded by applications like Snapchat.  The above steps to prevent the baring of one’s bare essentials via Snapchat are not exclusive or exhaustive.  But they are steps in the right direction.


* B.S. Commerce and B.A. German Language and Literature, University of Virginia, J.D. Candidate, University of Richmond School of Law.  I would like to thank Michael Poltash, Spencer Martin, and Tina Hoellerer for the invaluable roles they played in the publishing of this comment.

 

[1] Riva Richmond, Can You Protect Your Image While on Facebook?, N.Y. Times (July 24, 2009, 7:17 PM), http://gadgetwise.blogs.nytimes.com/2009/07/24/can-you-protect-your-image-while-on-facebook/; Lee Mathews, Facebook Sez, “Don’t Mind Us, We’re Just Whoring Out Your Photos”, Huffington Post Tech (July 16, 2009, 9:00 PM), http://downloadsquad.switched.com/2009/07/16/facebook-sez-dont-mind-us-were-just-whoring-out-your-photos?icid=sphere_blogsmith_inpage_downloadsquad.

[2] David Griner, Mom Blogger Shocked to See Her Photo in Ad for Spanish Psychic, Adweek (Nov. 12, 2012, 9:23 AM), http://www.adweek.com/adfreak/mom-blogger-shocked-see-her-photo-ad-spanish-psychic-145134.

[3] Chloe Johnson, Teen’s Pictures Stolen for Site, New Zealand Herald (Dec. 8, 2012, 5:30 AM), http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10852809.

[4] Casey Chan, What Facebook Deals with Everyday: 2.7 Billion Likes, 300 Million Photos Uploaded and 500 Terabytes of Data, Gizmodo (Aug. 22, 2012, 10:30 PM), http://gizmodo.com/5937143/what-facebook-deals-with-everyday-27-billion-likes-300-million-photos-uploaded-and-500-terabytes-of-data.

[5] Data Use Policy, Facebook (Dec. 11, 2012), http://www.facebook.com/full_data_use_policy (“[I]nformation you share on Facebook can be re-shared.  This means that if you share something on Facebook, anyone who can see it can share it with others.”).

[6] McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 Pa. Dist. & Cnty. Dec. LEXIS 270, at *7  (Pa. Cnty. Ct. 2010).

[7] Christina Warren, Facebook Starts Sending Out Notices for Sponsored Stories Settlement, Mashable (Jan. 3, 2013), http://mashable.com/2013/01/03/facebook-settlement-email/; Kashmir Hill, Yes, That Legal Notice You Got From Facebook Is Real, Yahoo Fin. (Jan. 28, 2013), http://finance.yahoo.com/news/yes–that-legal-notice-you-got-from-facebook-is-real-190343914.html.

[8] See generally Snapchat, Inc., Snapchat: Description, Google Play (Dec. 17, 2012), https://play.google.com/store/apps/details?id=com.snapchat.android.

[9] Id.

[10] Meghan Kelly, Sorry, Guys—Snapchat Videos Can be Saved (Updated), Venture Beat (Dec. 28, 2012, 7:52 AM), http://venturebeat.com/2012/12/28/save-snapchat-content/.

[11] See Nick Bilton, Disruptions: Indiscreet Photos, Glimpsed Then Gone, N.Y. Times (May 6, 2012, 5:24 PM), http://bits.blogs.nytimes.com/2012/05/06/disruptions-indiscreet-photos-glimpsed-then-gone/ (“All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”); see also Kate Knibbs, What’s So Special (and So Dangerous) About Snapchat, Digital Trends (Dec. 12, 2012), http://www.digitaltrends.com/mobile/whats-so-special-and-so-dangerous-about-snapchat/ (noting Snapchat is “the greatest tool for sexting since the front-facing camera”).

[12] See, e.g., J.J. Colao, Snapchat: The Biggest No-Revenue Mobile App Since Instagram, Forbes (Nov. 27, 2012), http://www.forbes.com/sites/jjcolao/2012/11/27/snapchat-the-biggest-no-revenue-mobile-app-since-instagram/.

[13] Snapchat touches many areas of law, including intellectual property, contract, tort, and constitutional law.  The scope of this Comment is limited to Snapchat’s relationship to sexting.

[14] Complaint 7, Miller v. Skumanick, 605 F. Supp. 2d 634 (M.D. Pa. 2009) (No. 3:09cv540).

[15] See id. ¶¶ 8-9.

[16] Sexting Occurring as Young as 5th Grade (CBS television broadcast Aug. 1, 2012), available at http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[17] A teenager has been defined as a person between the ages of twelve and seventeen.  See Amanda Lenhart et al., Teens, Adults & Sexting: Data on Sending & Receipt of Sexually Suggestive Nude or Nearly Nude Images by American Adolescents & Adults, Pew Internet & Am. Life Project 1, 2 (Oct. 23, 2010), available at http://www.pewinternet.org/Presentations/2010/Oct/Teens-Adults-and-Sexting.aspx.

[18] Id. at 3.

[19] Id. at 6.

[20] Six percent of adults have sent a sext and fifteen percent of adults have received a sext.  Id. at 7.

[21] Cf. id. at 3.

[22] Donald Strassburg & Valoree Dowell, U Study Finds ‘Sexting’ More Common Among Teens Than You Might Think, U News Center: The U. of Utah (June 14, 2012), http://unews.utah.edu/news_releases/u-study-finds-sending-sexually-explicit-photos-by-cell-phone-more-common-among-teen-than-you-might-think/.

 

[23] Id.

[24] Id.

[25] See Cosmogirl.com & The Nat’l Campaign to Prevent Teen and Unplanned Pregnancy, Sex and Tech, Results from a Survey of Teens and Young Adults 1-2 (2008), available at http://www.thenationalcampaign.org/sextech/pdf/sextech_summary.pdf [hereinafter Cosmogirl Survey].  This survey defines a teenager and young adult as ages 13-19 and 20-26, respectively.  Id. at 1.

[26] Glenda Cooper, Sexting: A New Teen Cyber-Bullying ‘Epidemic’, The Telegraph  (Apr. 12, 2012), http://www.telegraph.co.uk/technology/facebook/9199126/Sexting-a-new-teen-cyber-bullying-epidemic.html.

[27] Cosmogirl Survey, supra note 25, at 1.

[28] Laura McMullen, Health Buzz: Sexting Teens More Likely to H
ave Risky Sex
, U.S. News & World Rep. Health (Sept. 17. 2012), http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[29] Maia Szalavitz, Nearly 1 in 3 Teens Sext, Study Says. Is This Cause for Worry?, Time (July 2, 2012), http://healthland.time.com/2012/07/02/nearly-1-in-3-teens-sext-study-says-is-this-cause-for-worry/?.

[30] See id. (including unprotected sex, more sexual partners, and using drugs or alcohol before sex); see also McMullen, supra note 28. 

[31] Felix Gillette, Snapchat and the Erasable Future of Social Media, Bus. Wk. (Feb. 7, 2013), available at http://www.businessweek.com/articles/2013-02-07/snapchat-and-the-erasable-future-of-social-media.

[32] Colao, supra note 12.

[33] Snapchat Inc., supra note 8; iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[34] Wayne Parker, Snapchat – A Popular App for Teens but with a Dark Side, About.com, http://fatherhood.about.com/od/fathers-social-media/p/Snapchat.htm (last visited Mar. 26, 2013).

[35] Id.

[36] J.J. Colao, Snapchat Adds Video, Now Seeing 50 Million Photos a Day, Forbes (Dec. 14, 2012), available at http://www.forbes.com/sites/jjcolao/2012/12/14/snapchat-adds-video-now-seeing-50-million-photos-a-day/ (“The update introduces a new ‘friending’ process that requires users to approve each other before exchanging photos.”) .

[37] Billy Gallagher, Snapchat Releases Video Sharing, Is Prototyping Monetization Features (Oh, and It’s Still Not for Sexting), TechCrunch (Dec. 14, 2012), http://techcrunch.com/2012/12/14/snapchat-does-video/. 

[38] Joey Creighton, What Is Snapchat?, Infospace (Nov. 29, 2012), http://infospace.ischool.syr.edu/2012/11/29/what-is-snapchat/.

[39] Id.

[40] Id.

[41] Katie Notopoulos, The Snapchat Feature That Will Ruin Your Life, BuzzFeed  (Dec. 2012), http://www.buzzfeed.com/katienotopoulos/the-snapchat-feature-that-will-ruin-your-life.

[42] Kelly, supra note 10.

[43] Id; see also How Snaps Are Stored and Deleted, Snapchat (May 9, 2013, 7:23 P.M.), blog.snapchat.com (“When a snap is viewed and the timer runs out, the app notifies our servers, which in turn notify the sender that the snap has been opened.  Once we’ve been notified that a snap has been opened by all of its recipients, it is deleted from our servers.  If a snap is still unopened after 30 days, it too is deleted from our servers.”).

[44] Privacy Policy, Snapchat, http://www.snapchat.com/privacy (last updated Feb. 20, 2013).

[45] Id.

[46] Kelly, supra note 10 (“A hole in its iPhone version . . . lets you grab video content before it’s viewed.”); see also Katie Notopoulos, How Anybody Can Secretly Save Your Snapchat Videos Forever, BuzzFeed (Dec. 27, 2012, 6:22 PM), http://www.buzzfeed.com/katienotopoulos/how-anybody-can-secretly-save-your-snapchat-videos (providing the exact steps on how to save Snapchat videos).

[47] Colao, supra note 12.

[48] Our Biggest Update Yet: v4.0 Phantom!, Snapchat (Dec. 14, 2012: 12:54 PM), blog.snapchat.com/post/37898594536/our-biggest-update-yet-v4-0-phantom; Laurie Segall, Snapchat’s ‘Disappearing’ Videos Don’t Actually Vanish, CNN Money (Dec. 28, 2012, 3:27 PM),  http://money.cnn.com/2012/12/28/technology/security/snapchat-security-flaw/index.html.

[49] Colao, supra note 12.

[50] Willard Foxton, Revenge Porn and Snapchat: How Young Women Are Being Lured into Sharing Naked Photos and Videos With Strangers, The Telegraph (Feb. 13, 2013), http://blogs.telegraph.co.uk/technology/willardfoxton2/100008808/revenge-porn-and-snapchat-how-young-women-are-being-lured-into-sharing-naked-photos-and-videos-with-strangers/.

[51] Gillette, supra note 31.

[52] Knibbs, supra note 11.

[53] Jared Keller, Facebook’s Poke Is a Wild Success—for Rival Snapchat, Bus. Wk. (Dec. 28, 2012), available at http://www.businessweek.com/articles/2012-12-28/facebooks-poke-is-a-wild-success-for-rival-snapchat.

[54] Id.

[55] Meghan Kelly, This Snapchat Video Will Destruct in 5… 4… 3… 2… Haha Took a Screenshot, VentureBeat (Dec. 14, 2012, 2:53 PM), http://venturebeat.com/2012/12/14/snapchat-video/.

[56] Keller, supra note 53.

[57] Colao, supra note 12.

[58] Id.

[59] Id.

[60] See generally Billy Gallagher, No, Snapchat Isn’t About Sexting, Says Co-Founder Evan Spiegel, Tech Crunch (May 12, 2012), http://techcrunch.com/2012/05/12/snapchat-not-sexting/.

[61] See, e.g., Kashmir Hill, ‘This Sext Message Will Self Destruct in Five Seconds, Forbes (May 7, 2012, 12:51 PM), http://www.forbes.com/sites/kashmirhill/2012/05/07/

fantastic-theres-a-quick-erase-app-for-sending-your-nude-photos/; Katie Heaney, Snapchat Adding Video To Allow Longer Sexts, BuzzFeed (Dec. 14, 2012, 12:54 PM), http://www.buzzfeed.com/katieheaney/snapchat-adding-video-to-allow-longer-sexts.

[62] Knibbs, supra note 11.

[63] See, e.g., Bilton, supra note 11.

[64] Gallagher, supra note 60 (internal citations omitted).

[65] iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[66] See Max Read, ‘Snapchat Sluts’ Shows Why Snapchat Isn’t the Consequence-Free Sexting App We’d All Hoped For, Gawker (Dec. 10, 2012, 6:30PM), http://gawker.com/5967303/snap

chat-sluts-shows-why-snapchat-isnt-the-consequence+free-sexting-app-wed-all-hoped-for (describing Snapchat as “a new way for teens to send each other nudes”); Andrew Couts, Terms & Conditions: Snapchat’s Privacy Policy Has Too Many Secrets, Digital Trends (Dec. 16, 2012), http://www.digitaltrends.com/mobile/terms-conditions-snapchat/.

[67] ‘Snapchat Sluts’ Hit the Internet on New Website, The Inquisitr (Dec. 11, 2012), http://www.inquisitr.com/433154/snapchat-sluts-hit-the-internet-on-new-website/.

[68] Id.

[69] Id.; see also Couts, supra note 66.

[70] Grace Jensen, Snapchat Screenshots Reveal Teens Acting Like Teens, BuzzFeed (Dec. 3, 2012, 5:02PM), http://www.buzzfeed.com/googlegracie/snapchat-screenshots-reveal-teens-acting-like-teen-7d2i.

[71] Snapchat: Online Photos that Self-Destruct, Your Teen for Parents (Mar. 25, 2013), http://yourteenmag.com/2013/snapchat-teens-photos/ (“Students quickly take pictures of their test answers and snapchat it to other students in the class.”).  On the extreme end, Snapchat could also be used in the commission of crimes and terrorism.

[72] 458 U.S. 747, 756 (1982).

[73] Carrie L. M. Thompson, Let’s Talk About Sext: Illinois’ Legislative Response to Sexting, 24 DCBA Brief 22, 22-23 (2011); see, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009).

[74] Thompson, supra note 73, at 23.

[75] Cf. 2012 Sexting Legislation, Nat’l Conf. of St. Legislatures (Dec. 14, 2012), http://ncsl.org/issues-research/telecom/sexting-legislation-2012.aspx.

[76] See generally id.

[77] S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.

[78] Id.

[79] S. 183, 2012 Leg., 87th Sess. (S.D. 2012), available at http://legis.state.sd.us/sessions/2012/Bill.aspx?File=SB183P.htm.

[80] Id.  (“It is an affirmative defense to the offense of juvenile sexting that the minor has not solicited the visual depiction, that the minor does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction, and that the minor deletes or destroys the visual depiction upon receipt.  It is an affirmative defense . . . that the visual depiction is of a single minor, created by that minor, who does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction.”).

[81] See Assemb. B. No. A08131, 2011 Leg., Reg. Sess. (N.Y. 2012), available at http://assembly.state.ny.us/leg/?default_fld=&bn=A08131&term=2011&Summary=Y&Text=Y.

[82] See Thompson, supra note 73, at 25.

[83] Id.

[84] Id. at 22-23.

[85] Isaac A. McBeth, Prosecute the Cheerleader, Save the World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through “Sexting”, 44 U. Rich. L. Rev. 1327, 1330 (2012).

[86] “Sexually explicit conduct includes (1) all forms of sexual intercourse (including oral or anal) where the genitals, breasts, or pubic area of any person is exhibited; (2) bestiality; (3) masturbation; (4) sadistic or masochistic abuse; and (5) lascivious exhibition of the genitals or pubic area.”  Id.

[87] See, e.g., John A. Humbach, ‘Sexting’ and the First Amendment, 37 Hastings Const. L.Q. 433, 433-35 (2010) (“Two Florida teenagers took over one hundred photographs of themselves engaging in unspecified but lawful ‘sexual behavior.’  The two were subsequently charged with ‘promoting a sexual performance of a child,’ a second degree felony under Florida law . . . . In Ohio, a fifteen-year-old girl used her cell phone to send nude photos of herself and was charged with ‘illegal use of a minor in nudity-oriented material.’ . . . Factual situations like these are not isolated.”).

[88] Id. at 451.

[89] See Jeffrey Rosen, The Web Means the Ending of Forgetting, N.Y. Times (July 21, 2010), http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all&_r=0.

[90] Id.

[91] Id.

[92] New York v. Ferber, 458 U.S. 747, 759 (1982).

[93] Id.

[94] See Cooper, supra note 26.

 [95] Mike Celizic, Her Teen Committed Suicide Over ‘Sexting’, Today (Mar. 6, 2009, 9:26 AM), http://today.msnbc.msn.com/id/29546030/ns/today-parenting_and_family/t/her-teen-committed-suicide-over-sexting/#.UN8jHInjn_V; Phuong Ly, The Lowdown on Sexting, GreatSchools, http://www.greatschools.org/parenting/behavior-discipline/2079-sexting.gs (last visited June 3, 2013).

[96] Id.

[97] See Terms of Use, snapchat, www.snapchat.com/# (last updated Feb. 20, 2013) (under the “Terms” tab).

[98] Id.

[99] Globe Newspaper Co. v. Superior Court, 457 U.S. 596, 607 (1982).

[100] Prince v. Massachusetts, 321 U.S. 158, 168 (1944).

[101] New York v. Ferber, 458 U.S. 747, 757 (1982) (denying child pornography films constitutional protection); see also FCC v. Pacifica Found., 438 U.S. 726, 749-50 (1978) (holding that the government’s interest in the youths’ well-being justified special treatment of indecent broadcasting received by both adults and children); Prince, 321 U.S. at 167-70 (holding valid a statute prohibiting the use of a child to distribute literature on the street despite its effect on a First Amendment activity).

[102] 458 U.S. at 759; see also Ashcroft v. Free Speech Coal., 535 U.S. 234, 249 (2002).

[103] 495 U.S. 103, 111 (1990).

[104] Ferber, 458 U.S. at 759 n.10 (quoting David P. Shouvlin, Preventing the Sexual Exploitation of Children: A Model Act, 17 Wake Forest L. Rev. 535, 545 (1981)).

[105] Ulrich C. Schoettle, Child Exploitation: A Study of Child Pornography, 19 J. Am. Acad. Child Psychiatry 289, 292 (1980)).

[106] See supra Part IV.B.

[107] Szalavitz, supra note 29.

[108] Man Gets Nearly 14 Years for Downloading Child Porn, Journal Star (Jan. 10, 2013, 9:30 PM), http://www.pjstar.com/news/x1671799911/Man-gets-nearly-14-years-for-downloading-child-porn.

[109] See Szalavitz, supra note 29 (“In an adolescent period characterized by identity development and formation, sexting should not be considered equivalent to childhood sexual assault, molestation and date rape.”).  See generally, Humbach, supra note 87 (arguing that sexting and autopornography should not be categorically excluded from First Amendment protection).

[110] See, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009);

S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.  As noted previously, sexting may induce four different crimes: solicitation, production, distribution, and possession of child pornography. 

[111] Ashcroft v. Free Speech Coal., 535 U.S. 234, 253 (2002) (citing Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (per curiam)).

[112] Kelly, supra note 10.

[113] New York v. Ferber, 458 U.S. 747, 759 (1982).

[114] See Nicholas Carlson, Sexting with Snapchat, Teenagers Prove They Aren’t as Dumb as We Thought, Bus. Insider (Dec. 31, 2012, 8:25 AM), http://www.businessinsider.com/sexting-with-snapchat-teenagers-prove-they-arent-as-dumb-as-we-thought-2012-12.

[115] Kelly, supra note 10.

[116] Szalavitz, supra note 29.  This is also true in cases involving an adult who sexually exploits a minor.  For example, someone can set up a group to which persons subscribe via their Snapchat username.  These users are then sent multiple, short child pornography videos. 

[117] Foxton, supra note 50 (“[H]osted in the US, [sites like PinkMeth] are protected by laws which state that companies cannot be prosecuted for user-generated content. Only the (usually anonymous) individual who posted the pictures can be fined.  So, if the woman wanted her pictures removed from the site, she would have to work out who shared her pictures, then prosecute them. The site owners won’t lift a finger—and they are making millions of dollars from young women’s pain.”).

[118] Colao, supra note 12.

[119] The primary purpose of this comment is to draw attention to the legal issues Snapchat poses.  This section introduces possible solutions to the sexting problem, but is not intended to be exclusive or exhaustive.

[120] Maia Szalavitz , Why the Teen Brain Is Drawn to Risk, Time (Oct. 2, 2012), http://healthland.time.com/2012/10/02/why-the-teen-brain-is-drawn-to-risk/.

[121] Practically speaking, a customer protection block is unlikely to have a great impact on restricting Snapchat’s use by minors.

[122] The fines should be significant enough to act as a deterrent, but not so substantial that parents must come to their child’s assistance in paying them (i.e., minors will pay the fines using their own money).  

[123] Notopoulos,
supra
note 41.

[124] This also eliminates the need for real-time interception and monitoring of the messages.

[125] Network Effect, Investopedia, http://www.investopedia.com/terms/n/network-effect.asp#axzz2IHv0IokI (last visited Mar. 29, 2013) (network effect is “a phenomenon whereby a good or service becomes more valuable when more people use it”).

[126] Snitch, Hyperdyne Software, http://www.hyperdynesoftware.com (last visited Mar. 20, 2013).

[127] Software Blocks Nudity: Content Technologies’ Software Detects Nude Photos on E-Mails, Blocks E-Mails, CNN Money (Sept. 20, 2000, 12:41 PM), http://money.cnn.com/2000/09/20/technology/porn_sweep/.

[128] Id.

[129] Id.

[130] Only one of the alternatives should be implemented, and once implemented should be automatic. 

[131] Notifying authorities would have the most profound impact, but also carries the risk of tying up valuable executive and judicial resources.  Pixilation is similar to deletion, but pixilated messages may still possess an allure similar to sexts.

[132] The implementing of nudity detection software would interfere with adults’ right to use Snapchat for sexting, but this comment does not address that issue.

No Implied Effect: The “Safe” FCC Cell Phone Radiation Standard and Tort Immunity by Implied Conflict Preemption

Information Governance: It's a Duty and It's Smart Business

Blog: Social Media Files and the Stored Communications Act

By:  Adam Young, Associate Survey and Symposium Editor

 

            We, as a society, have entered into an era in which electronic communications has become the preferred way of communicating with friends, co-workers and loved ones.  A recent study has shown that Americans spend over 20% of their online time on social networking sites alone.[1]  Although the majority of social networking sites originated as those where you could find friends, they have exploded into increasingly complex sites.  Most social networking sites, today, allow users to upload photographs and videos, post status updates, comment on friends’ posts, play games, send messages to other users and even tag themselves at specific places where they have been.  As these sites have become more popular, the number of users and the amount of content shared has increased significantly.  For example, Facebook has one billion active users as of October 2012.[2]  604 million of those monthly users use Facebook mobile products, making social networking even more convenient for, and pervasive in, people’s lives. [3]

 

            As technology advances over time, it forces all professional fields, specifically that of the law, to keep up with it.  One way in which the law is struggling to understand the changes in technology is the discoverability of social media files.  As Americans share more personal information on social networking sites, lawyers are increasingly turning to these social networks as resources when confronted with litigation.  Social media are not just limited to certain types of litigation – they can be found in various litigated issues.

 

            Social media differ from other media outlets and websites that one might mistake them for being.  Unlike traditional media outlets like newspapers, television, or books, social media’s distinctive characteristic is ease of access.  While it takes significant effort to publish a magazine or broadcast a television program, social media allow users to publish content for wide distribution at little to no cost.  Additionally, social media are different from typical websites.  Unlike a website that can be accessed simply by entering a URL, the information on social networks is not always public because users have power to control access to the content that they publish.  This notion of privacy is not only present in the mind of a social media user.  The companies that own social networking sites are concerned about the privacy of the user as well, which creates the problems lawyers face in the discovery process of social media files.  Many social media providers, as well as other holders of electronic communications, refuse to produce the content of electronic communications of their users based upon the SCA.

 

            The SCA was enacted as Title II of the Electronic Communications Privacy Act (“ECPA”).[4]  Part of the reason why the act was adopted was to address privacy concerns created by the rise of new technologies that the Fourth Amendment might not be able to adequately address.  In passing the SCA, Congress hoped to “protect privacy interests in personal and proprietary information” that may be stored online.[5]  At the time in which the SCA was passed, internet users were very limited to what they could do.  Therefore, the language of the SCA does not take into account advanced technology due to the very limited version of the internet that existed in 1986.  Since there have been no updates to this piece of legislation, courts have struggled on how to apply it as the internet continues to grow.

 

            There is a mixture of cases supporting the protection of social media sites under the SCA and those that choose to ignore the SCA completely.  The prominent case that supports protection under the SCA comes from the U.S. District Court for the Central District of California.[6]  The Crispin court walked through the language of the SCA and considered what could be protected (putting emphasis on security settings) with regards to each aspect of social media information that was to be discovered (wall posts, private messages, etc.)  The other line cases, that disregard the SCA, allow overbroad discovery requests and subsequently fail to explain why the SCA does not protect any of the information contained in the requests.

 

            With some viewing the currently unrevised SCA as falling into antiquity, many questions remain as to how to apply it to cases involving technologically advanced companies.  Social networking sites present one of the largest challenges for courts to tackle when it comes to apply the SCA.  Because social media providers continue to raise the SCA as a defense to third party subpoenas, courts cannot ignore the SCA forever.  In coming years, many courts will have to address whether the SCA actually offers protection to social media providers from third party subpoenas.


[1] What Americans Do Online:  Social Media and Games Dominate Activity, Neilson Wire (Aug. 2, 2010), http://blog.nielsen.com/nielsenwire/online_ mobile/what-americans-do-online-social-media-and-games-dominate-activity.

[2] Statistics, Facebook, http://www.facebook.com/press/info.php? statistics (last visited Jan. 20, 2013).

[3] Id.

[4] Pub. L. No. 99-508, 100 Stat. 1848 (1986).

[5] S. Rep. No. 99-541, at 3 (1986).

[6] Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965 (C.D. Cal. 2010).

Page 47 of 50

Powered by WordPress & Theme by Anders Norén