Blog

Stored Communications Act protects Yahoo email account from subpoena

Chasten v. Franklin, 2010 WL 4065606 (N.D.Cal. October 14, 2010)

Plaintiff sued some corrections officers at the prison where her inmate son was killed. She learned in a deposition that one of the defendants had a Yahoo email account. So she sent a subpoena to Yahoo seeking all the email messages sent from that account during a period of more than two years.

Defendant moved to quash the subpoena, arguing that disclosure of the email messages would violate his rights under the Stored Communications Act (SCA). The court granted the motion to quash.

Subject to certain specifically-enumerated exceptions, the SCA (at 18 U.S.C. 2702(a) and (b)) essentially prohibits providers of electronic communication or remote computing services to the public from knowingly divulging the contents of their customers’ electronic communications or the records relating to their customers. The court found that no such exception applied in this case. Citing to Theofel v. Farey-Jones, it held that compliance with the subpoena would be an invasion of the specific interests that the SCA seeks to protect.

Debt collector broke the law by using MySpace photo to intimidate consumer

Sohns v. Bramacint, 2010 WL 3926264 (D.Minn. October 1, 2010)

Plaintiff fell behind on her car payments. The lender turned the debt over to a collection agency that used technology and some remarkably poor judgment in an attempt to get paid.

The first bad decision was to use a caller-ID spoofer to make it look like the collection call was coming from plaintiff’s mother in law. The next not-smart use of technology was to access plaintiff’s MySpace page, learn that plaintiff had a daughter, and to use that fact to intimidate plaintiff. There was evidence in the record to suggest that the collection agency’s “investigator” said to plaintiff, after mentioning plaintiff’s “beautiful daughter,” something to the effect of “wouldn’t it be terrible if something happened to your kids while the sheriff’s department was taking you away?”

Plaintiff sued the debt collection agency under the Fair Debt Collection Practices Act. The FDCPA sets some restrictions on how debt collectors can go about their business. Plaintiff moved for summary judgment. The court granted the motion.

It held that the collection agency engaged in conduct the natural consequence of which was to harass, oppress, or abuse in connection with the collection of the debt; used false, deceptive, or misleading representations or means in connection with the collection of the debt; and used unfair or unconscionable means to collect or attempt to collect the debt.

Enhanced by Zemanta

Blog post violated nonsolicitation clause in Amway agreement

Amway Global v. Woodward, 2010 WL 3927661 (E.D.Mich. September 30, 2010)

Amway Global went after some of its former distributors in arbitration for, among other things, violating the “Rules of Conduct” which serve as an agreement as to how the distributors (formally known as Independent Business Owners or “IBOs”) operate. Amway claimed that the IBOs violated the Rules of Conduct by soliciting others to leave Amway and join competing enterprises.

The arbitrator found in Amway’s favor, and Amway filed a motion with the court to confirm the award. The court granted the motion.

One of the factual questions was whether one of the IBOs violated the rules against solicitation by blogging about his decision to leave Amway and join another company. One of his posts said “[i]f you knew what I knew, you would do what I do.”

The IBOs argued that this statement did not constitute actionable solicitation because the communication was passive and untargeted, and because there was no evidence that anyone responded to the solicitation by leaving Amway.

The court rejected these arguments. As to the “passive and untargeted” argument, the court observed that:

[C]ommon sense dictates that it is the substance of the message conveyed, and not the medium through which it is transmitted, that determines whether a communication qualifies as a solicitation. The [statement] is readily characterized as an invitation for the reader to follow his lead and join [Amway’s competitor], and this is true despite the diffuse and uncertain readership of the site.

As to the argument based on the fact that no one responded, the court found that the express language of the nonsolicitation clause which prohibited “encourag[ing], solicit[ing], or otherwise attempt[ing] to recruit or persuade any other IBO to compete with” Amway did not turn on the success of those prohibited efforts.

Bipolar disorder no excuse for email hacker

Leor Exploration v. Aguiar, 2010 WL 3782195 (S.D. Fla. September 28, 2010)

Plaintiffs claimed that defendant hacked into one of the plaintiffs’ email accounts during the litigation to get an advantage in the case. The court entered severe sanctions against defendant for doing this — it struck his answer. In litigation, that is like declaring plaintiffs the winners.

Defendant had argued to the magistrate judge that his mental illness (bipolar disorder) caused him to hack plaintiff’s email account out of fear for his security. Defendant even presented expert testimony from a psychiatrist to support the claim that he lacked the mental state to act in bad faith.

In adopting the magistrate’s findings, the district judge found defendant’s psychiatric expert’s testimony unmoving. (Mainly because defendant’s lawyers limited what the expert could say.) So the court relied on other evidence that showed defendant’s bad faith intent in accessing the email. The novel theory of “not guilty of email hacking by reason of insanity” failed in this case.

Emails on laptop not protected by the Stored Communications Act

Thompson v. Ross, 2010 WL 3896533 (W.D. Pa. September 30, 2010)

Messages from Yahoo and AOL email accounts saved on laptop computer were not in “electronic storage” as defined by Stored Communications Act.

Plaintiff’s ex-girlfriend kept his laptop computer after the two of them broke up. The ex-girlfriend let two of her co-workers access some email messages stored on the computer. Plaintiff filed suit under the Stored Communications Act. Defendants moved to dismiss. The court granted the motion.

Under the Stored Communications Act (at 18 U.S.C. 2701), one is liable if he or she accesses without authorization a facility through which an electronic communication service is provided and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system.

The court held that the Stored Communications Act did not cover the email messages because they were not in “electronic storage” as defined at 18 U.S.C. 2510(17)(B). In relevant part, that section defines “electronic storage” as “any storage of such communication by an electronic communication service for purposes of backup protection of such communication.”

The court looked to the plain language of the statute, finding that the definition was not met because the messages were not stored by an electronic communication service. It rejected plaintiff’s arguments that the fact the messages were in “backup storage” extended the scope of the definition.

Enhanced by Zemanta

Personal name in web search results did not support Lanham Act claim

Stayart v. Yahoo, — F.3d —, 2010 WL 3785147 (September 30, 2010)

Plaintiff performed a vanity search of her own name on Yahoo and found some results on porn and pharmaceutical sites. When Yahoo would not remove the search results upon plaintiff’s request, plaintiff sued under Section 43(a) of the Lanham Act. She claimed that the results showed a false endorsement by her of the pornographic and pharmaceutical sites.

Yahoo moved to dismiss, arguing that plaintiff was without standing to challenge this use of her personal name under Section 43(a). The district court granted the motion. Plaintiff sought review with the Seventh Circuit. On appeal, the court affirmed.

It held that plaintiff had failed to show she had a commercial interest in her name. Such interests are the only ones protectible under Section 43(a). Attempting to overcome this hurdle, plaintiff urged the court to consider her online activities such as writing “scholarly articles” and some poetry to be commercial services.

The court rejected this argument, noting that while those goals may be passionate and well intentioned, they are not commercial. Absent commercial activity, plaintiff lacked standing under the Lanham Act.

Other coverage of this case:

Deliberate exploitation of market subjects GoDaddy to personal jurisdiction in Illinois

uBid v. GoDaddy, — F.3d —, 2010 WL 3768075 (7th Cir. September 29, 2010)

uBid sued GoDaddy in federal court in Illinois, alleging cybersquatting. uBid claimed that GoDaddy — an Arizona-based company — intended to profit in bad faith by registering on behalf of its customers certain domain names that were similar to uBid’s trademarks. uBid alleged that GoDaddy would set up parked pages at those domains, displaying sponsored links to sites run by uBid’s competitors.

The district court dismissed the case, finding that the court lacked personal jurisdiction over GoDaddy. uBid sought review with the Seventh Circuit. On appeal, the court reversed, holding that the exercise of personal jurisdiction over GoDaddy would not violate due process.

Contact with the forum state

The court held that GoDaddy’s activities in Illinois were not continuous or systematic enough for the exercise of general jurisdiction. But applying the standards set forth in Keeton v. Hustler, the court found that GoDaddy’s efforts to exploit the Illinois marketplace were done so thoroughly, deliberately and successfully that it would not be unfair for GoDaddy to appear in court in Illinois.

After all, in part through its ads at Wrigley Field, the United Center and Joliet Speedway, not to mention the numerous Super Bowl ads seen in Illinois, GoDaddy had acquired hundreds of thousands of customers in the state.

Relatedness of claims

In finding that GoDaddy’s contacts with Illinois were sufficiently related to the claims in the case, the court similarly looked to the extent and nature of GoDaddy’s advertising and marketing. The court couched the relatedness in terms of a quid pro quo:

[O]ut-of-state residents may avail themselves of the benefits and protections of doing business in a forum state, but they do so in exchange for submitting to jurisdiction in that state for claims arising from or relating to those activities.

In this case, GoDaddy’s connection with Illinois and uBid’s claims made the relatedness quid pro quo “balanced and reasonable.” GoDaddy’s contacts with Illinois alleged in the complaint and the alleged wrongs committed were so “intimately related” that GoDaddy should not have been surprised to find itself sued in Illinois.

Fair play and substantial justice

Finally, the court examined the question of whether the exercise of personal jurisdiction would comport with traditional notions of fair play and substantial justice. Again, the court’s finding relied on the thoroughness with which GoDaddy had exploited the Illinois marketplace.

Race car image courtesy Flickr user Jr 88 Rules under this Creative Commons license.

Enhanced by Zemanta

Palin email hacker conviction survives motion for acquittal

U.S. v. Kernell, No. 08-CR-142 (E.D. Tenn. September 23, 2010)

A federal jury convicted defendant for a number of crimes related to his hacking into Sarah Palin’s Yahoo email account in September 2008. One of the crimes the jury convicted him of was the “destruction or alteration of a record or document with the intent to obstruct an investigation” (a violation of 18 USC 1519).

After hacking into Palin’s account, but before the formal FBI investigation began, defendant deleted some Palin family pictures he had downloaded from the account, uninstalled his web browser, and defragmented his hard drive.

Defendant moved for a “judgment of acquittal”, arguing that the evidence was insufficent to support his convictions. The court denied the motion.

The court found that the Government offered sufficient proof to support the conviction. Even though defendant preserved (did not destroy) his computer, spoke with an FBI agent investigating the matter and advised his friends to be truthful in what they said about the case, the court looked to the totality of the evidence as supporting defendant’s guilt.

Given that defendant deleted images from his computer that he had downloaded from Palin’s account, and had run web searches on “legalities email” and “soppenaing [sic.] ip addresses”, a rational jury could find him guilty. So the jury verdit stood.

Section 230 shields Google from liability for anonymous defamation

Black v. Google Inc., 2010 WL 3746474 (N.D.Cal. September 20, 2010)

Back in August, the U.S. District Court for the Northern District of California dismissed a lawsuit against Google brought by two pro se plaintiffs, holding that the action was barred under the immunity provisions of 47 USC 230. That section says that “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Plaintiffs had complained about a comment on Google (probably a review) disparaging their roofing business.

Plaintiffs filed and “objection” to the dismissal, which the court read as a motion to alter or amend under Fed. R. Civ. P. 59. The court denied plaintiffs’ motion.

In their “objection,” plaintiffs claimed — apparently without much support — that Congress did not intend Section 230 to apply in situations involving anonymous speech. The court did not buy this argument.

The court looked to the Ninth Circuit case of Carafano v. Metrosplash as an example of a website operator protected under Section 230 from liability for anonymous content: “To be sure, the website [in Carafano] provided neutral tools, which the anonymous dastard used to publish the libel, but the website did absolutely nothing to encourage the posting of defamatory content.” As in Carafano, Google was a passive conduit and could not be liable for failing to detect and remove the allegedly defamatory content.

Hiring subscribers to access competitor’s database gives rise to misappropriation claim

Reed Construction Data v. McGraw Hill Companies, No. 09-8578 (S.D.N.Y. September 14, 2010)

Court refuses to dismiss lawsuit in which plaintiff accused its competitor of paying others to subscribe to plaintiff’s proprietary database to get confidential information.

Plaintiff and defendant are fierce competitors that provide project news and information to the construction industry. (Really the parties are the only nationwide providers in this market space.) The companies sell subscriptions to their respective databases. Plaintiff requires its subscribers to sign a nondisclosure agreement, making them promise not to share information obtained from the database with others outside the subscriber’s company.

After plaintiff figured out that a copule of its subcribers worked for sham enterprises, it got wise to the notion that defendant had hired those subscribers to access the database. Plaintiff sued, claiming, among other things, misappropriation of confidential information under New York law.

Defendant moved to dismiss for failure to state a claim. The court denied the motion.

To state a claim for misappropriation of confidential information, plaintiff had to allege that defendant used plaintiff’s confidential information for the purpose of securing a competitive advantage. Defendant argued that a tort action for misappropriation was not proper because all that had happened was a use of information in violation of the nondisclosure agreements with the individuals allegedly hired by defendant to access plaintiff’s database.

The court rejected this argument for two reasons. First, plaintiff had not alleged that defendant was a party to the contract. So the liability could not be constrained to just breach of contract. Moreover, the court found, that the tortious conduct of misappropriation had a separate and additional existence apart from any contractual relationship, even if such a relationship did exist. The misappropriation sprang from circumstances extraneous to, and not constituting elements of, the subscription agreements with the parties defendant allegedly hired to access plaintiff’s information.

Scroll to top