Blog

Are bloggers liable for defamatory third party comments to their posts?

We don’t know yet. But probably not.

The headline to this article from law.com is a bit misleading. It reads, “Judge: Bloggers Entitled to Immunity Under Communications Act.” While that is probably true, the case that the article covers did not address the defendant’s status as a blogger. Yes, the defendant Tucker Max has a blog, but the alleged defamatory comments at issue in the case were posted to a message board, not as a blog post or blog comments. The case is called Dimeo v. Max, (Slip Op.) 2006 WL 1490098 (E.D. Pa., 2006).

So the case really wasn’t much different from a lot of other cases applying 47 U.S.C. 230 to communications posted online. The leading case on Section 230 immunity, Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997) provided immunity to AOL for messages posted to a forum board. More recently, courts have found message board operators protected under Section 230 in cases such as Donato v. Moldow and Roskowski v. Corvallis Police Officers’ Association.

Section 230(c) provides, in relevant part, that “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” As far as I know, there have not yet been any reported court decisions addressing the question of whether Section 230 immunity applies to bloggers. We came pretty close to seeing the issue addressed earlier this year with the case of TrafficPower.com v. Seobook.com in a federal court in Nevada, but that case was dismissed for lack of personal jurisdiction. [Read Eric Goldman’s coverage of that case.]

Stored Communications Act not violated by viewing website readily accessible to the general public

You’ve really got to commend Michael Snow for his creative thinking. A few years ago, DirecTV sued Snow in Florida federal court, alleging that he had illegally intercepted DirecTV’s satellite signal. The case was dismissed, but Snow apparently held a grudge.

Not being satisfied with merely setting up a gripe site to air his grievances against DirecTV and so-called “corporate extortion,” Snow went a step further. He set up a “private support group” website for “individuals who have been, are being, or will be sued by any Corporate entity.” The language on the home page expressly forbade access “by DIRECTV and its agents.” To actually visit the site, you had to establish a username and password, and enter into a click-wrap agreement wherein you promised you had nothing to do with DirecTV.

Some employees of DirecTV as well as some attorneys from a couple of the firms that had represented DirecTV found Snow’s site and, notwithstanding the prohibition against their entry, signed up and went on in. After Snow discovered this “unauthorized” access, he filed suit against DirecTV and its law firms, alleging that the defendants had unlawfully accessed the stored web pages in violation of the Stored Communications Act, 18 U.S.C. §2701 et seq.

The U.S. District Court for the Middle District of Florida tossed out Snow’s suit on a motion to dismiss for failure to state a claim upon which relief could be granted. It held that the pages of the website were not “in electronic storage,” and thus could not be protected from unauthorized access under the Stored Communications Act. On appeal, the Eleventh Circuit affirmed the dismissal, but on different grounds.

The Electronic Communications Privacy Act provides that “[i]t shall not be unlawful . . . for any person – (1) to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public.”

The court held that the way Snow had set up the entry page of his site was not sufficient to take it out of the class of electronic communications that are “readily accessible to the general public.” Apparently, the mechanism Snow had established to exclude certain people was too passive.

Unlike the case of Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir. 2002), which was a case involving a site where users had to demonstrate knowledge not publicly available in order to gain access, Snow’s site employed a mere “self-screening methodology” by which “unintended users would voluntarily excuse themselves.” The court indicated that Snow needed a stronger safeguard than the honor-system method he used. “A short simple statement that the plaintiff screens the registrants before granting access may have been sufficient to infer that the website was not configured to be readily accessible to the general public.”

So the key seems to lie in the screening process. The case doesn’t provide a whole lot of guidance on what level of screening is necessary to make a site off-limits to the general public. Nonetheless, the holding of the case, along with the holding of Konop, seems to indicate that it’s easier from a legal standpoint to partition off a portion of the Internet for a specific crowd, rather than open it up to everyone while excluding just a few individuals.

Snow v. DirecTV, Inc., — F.3d —, 2006 WL 1493817 (11th Cir., June 1, 2006).

Joe Gratz has a great post on the case, and his blog (which is very interesting, by the way) is where I first learned of the decision.

Apple v. Does it mean anything?

You can almost literally hear the buzz from today’s California Court of Appeal ruling in the Apple v. Does case. The champagne is probably flowing at the EFF after the court’s holding that (for the time being) in California, web publishers (this probably includes bloggers) do not have to reveal their confidential sources when they get a news scoop.

Think back. When was the last time you got a secret e-mail from a company insider and posted it to your blog? It’s been awhile, right? So what does the case mean for the run-of-the-mill blogger or web publisher?

I say that the part of the case everyone’s all excited about really doesn’t mean that much.

There is a part of the case, however, that is quite relevant to everyday Internet users. The court gave a detailed analysis of how the federal Stored Communications Act (18 U.S.C. §§2701 – 2712) (“SCA”) requires e-mail messages saved on an ISP’s server to remain undisclosed in the face of a third party civil subpoena.

Here are the basics of the SCA analysis:

In 2004, someone at Apple Computer apparently sent a few e-mails containing confidential details of an unreleased Apple product to the publishers of some Mac enthusiast websites. The publishers of the sites posted the information about the anticipated product, thereby disclosing some of Apple’s trade secrets.

Apple filed suit, and naturally wanted to know who had leaked the information. It issued subpoenas to the e-mail service provider on whose server the surreptitious e-mails were stored, demanding to know the contents of the e-mail messages.

The web publishers asked the trial court for a protective order to prevent the disclosure of the messages, because they wanted to protect their confidential sources. The trial court denied the motion, however, because the publishers had involved themselves in the unlawful misappropriation of a trade secret.

On appeal, the publishers argued, among other things, that the e-mail service provider could not comply with the subpoena without violating the SCA. The Court of Appeal agreed, and reversed the trial court.

The SCA provides, in relevant part, that “a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service . . . .” It’s a fancy way of saying that an ISP can’t turn over server copies of e-mail messages. But like any good law enacted by Congress, there are some exceptions.

An ISP can turn over stored communications to a third party, for example, when doing so is “incidental to the protection of the rights or property of the service provider.” Apple argued that this exception should apply, and that the subpoena should be enforced, because failing to comply with the subpoena would subject the service provider to contempt proceedings, thus placing the provider’s property at risk. Read that sentence again. Yep, the court thought that was a circular argument too. And it made no effort to conceal the flaw in logic: “the antecedent assumes the consequents.”

Did you notice that I linked to Wikipedia just then? The court relied on Wikipedia as well in its opinion — no less than ten times! [More on Wikipedia and the courts.]

In any event, the court rejected Apple’s various arguments that the SCA would not prohibit disclosure of the stored e-mail messages. For example, it disagreed with Apple’s argument that there must be an implied exception in the SCA for disclosure of e-mail messages pursuant to a civil subpoena.

The court went on for several pages addressing this argument, analyzing the plain meaning of the SCA, and delving into the policy reasons for its enactment. It concluded that Congress “reasonably decide[d]” that email service providers are a “kind of data bailee to whom email is trusted for delivery and secure storage. . . .”

So at the end of the day, the case is no doubt interesting. Whether the heady First Amendment issues mean anything to the average blogger is not obvious. But the SCA part of the holding is at least refreshing, especially in light of all the other threats to personal privacy looming large recently.

There is plenty of commentary on this case out there already. Try Denise Howell, Joe Gratz, and the EFF for starters.

Court enjoins use of metatags in trademark infringement case

The recent case of Shainin II, LLC v. Allen is a straightforward metatag trademark infringement case. On May 15, 2006, Judge Pechman of the U.S. District Court for the Western District of Washington entered an order enjoining a former employee from using his former employer’s trademarks as metatags in a website promoting competing services.

Nodding to the well-known case of Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036 (9th Cir. 1999), the court addressed the possibility of “initial interest confusion” arising from the wrongful diverting of web traffic to the defendant’s site. The court acknowledged, however, that use of another’s trademark as a metatag does not automatically mean trademark infringement. As in Playboy Enters., Inc. v. Welles, 279 F.3d 796 (9th Cir. 2002), sometimes metatag trademark use is permissible “nominative use.”

But in this case, the plaintiffs had raised serious questions going to the merits of their trademark infringement claim. Moreover, the balance of the hardships weighed heavily in favor of the plaintiffs, as defendants would suffer little or no harm in being forced to remove the metatags. In fact, they had already done so by the time of the hearing. Accordingly, an injunction against further use of the trademarks in the metatags was appropriate.

Shainin II, LLC v. Allen, (Slip Op.) 2006 WL 1319405 (May 15, 2006).

Can Congress restrict minors’ access to social networking websites?

The Childrens Internet Protection Act (“CIPA”) curbs federal funding for any public library or school that will not employ software filters to prohibit minors from accessing pornographic materials. There is a bill [H.R. 5319] before Congress called the Deleting Online Predators Act (DOPA for short) that seeks to expand the scope of CIPA. The Bill calls for restricting federal funding for public libraries and schools that do not block minors’ access to chat rooms and social networking sites (such as MySpace.com).

CIPA withstood a constitutional challenge before the United States Supreme Court in 2003. [U.S. v. American Library Assn., 539 U.S. 194 (2003)] If DOPA is enacted, it will likely face First Amendment scrutiny as well. Might the analysis be different this time around?

In the American Library Association case, the Supreme Court observed that “most libraries already exclude pornography from their print collections because they deem it inappropriate for inclusion. We do not subject these decisions to heightened scrutiny; it would make little sense to treat libraries’ judgments to block online pornography any differently, when these judgments are made for just the same reason.” Accordingly, it does not violate library partrons’ First Amendment rights for there to be filters on the computers at the library.

In blocking access to chat rooms and social networking sites, aren’t libraries going a step futher, inasmuch as they are literally obstructing the “speech” of library patrons? Perhaps. But a court hearing such a challenge would once again have a ready analogy from real-world library experience: when was the last time you saw a successful constitutional challenge to a librarian enforcing the library’s quiet rule?

[News.com’s coverage]

What’s the story about the Maine blogger lawsuit?

Updated to add: The plaintiff Warren Kremer Paino Advertising has voluntarily withdrawn its lawsuit against defendant Lance Dutson. From Ronald Coleman: “They didn’t expect pushback — much less pushback from the whole ‘blogosphere,’ with lawyers lining up to defend the little guy. The handwriting was on the wall. Or the screen, I guess.” [More info here]

A number of InternetCases.com readers have e-mailed me asking about the recently-filed defamation case against Maine blogger Lance Dutson. The case is called Warren Kremer Paino Advertising, LLC v. Dutson and has been filed in the U.S. District Court for the District of Maine.

Here’s just about everything you need to know about the legal issues in the case: there is nothing new under the sun … but the defendant is a blogger.

As I emphasized a couple of weeks ago when I spoke on the topic of blogging and defamation, the traditional principles of defamation law apply with equal force in the blogosphere. Just because a defendant is a blogger does not mean he or she is held to a stricter or more lenient standard than a speaker in the brick-and-mortar world.

Under Maine law, which the Federal court hearing the case will have to apply, a successful defamation plaintiff must prove that (1) the defendant made a false and defamatory statement concerning the plaintiff, which was contained in (2) an unprivileged publication to a third party, (3) that the defendant was at least negligent in making the statement, and (4) either actionability of the statement irrespective of special harm or the existence of special harm caused by the publication. Lester v. Powers, 596 A.2d 65 (Me. 1991).

Because the subject matter of the alleged defamatory postings involves a matter of public concern (e.g., accusations of misappropriated tax revenue), the plaintiff will have to prove that the statements contained in the postings were made with “actual malice.” This heightened standard for matters of public concern has its origins in the landmark Supreme Court cases of New York Times v. Sullivan, 376 U.S. 254 (1964) and Gertz v. Robert Welch, Inc., 418 U.S. 323 (1974).

Although one should not lose sight of the fact that there really is nothing unique about the legal issues in an online defamation claim, the allure of a blogger-defendant is undeniable. The democratizing aspect of blogs as media naturally elicits all kinds of First Amendment and root-for-the-underdog sentiments. Attorney Ron Coleman, who is assisting in Dutson’s defense, observes,

“Most defamation claims are brought for the simple purpose of intimidating defendants who can’t afford lawyers. Historically, therefore, media outlets have made it their business to find a way financially to keep lawyers on retainers. That’s not true of bloggers — at least not yet. Until then, bloggers can count on the good offices of public-spirited [law] firms … and the coordinating and legal contributions of fellow bloggers at the Media Bloggers Association.”

In any event, one fact in the case could yield some entertainment value if it is the subject of a motion. You may recall that mere opinions are not actionable as defamatory. One of the allegations in the case is that Dutson defamed the plaintiff when he wrote that it was “pissing away” taxpayer money. It would be enlightening to read the court’s analysis on the question of whether that statement “communicates [a] factual proposition susceptible of proof or refutation.”

Second Life DoS attacks raise interesting damages issues under Computer Fraud and Abuse Act

News.com has run a story about this past weekend’s Denial of Service (“DoS”) attacks on the servers for Second Life, the increasingly popular virtual world. Second Life is a good example of how wildly complex some online virtual worlds have become. Far from being merely for simple entertainment, Second Life supports its own economy (based on a currency called the Linden), and facilitates sophisticated human relationships. [More on Second Life.]

Linden Lab, the purveyor of Second Life, most likely has a strong cause of action under the the Computer Fraud and Abuse Act (“CFAA”) against those responsible for the DoS attacks. What is most interesting about the situation, however, is the way in which the attacks demonstrate how immersion in a virtual world can bring the nature of damages for unlawful online conduct closer to one’s heart.

Traditionally, the nature of damages for violations of the CFAA have been rather predictable, and closely tied to a commercial context. For example, in Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 119 F.Supp.2d 1121 (W.D. Wash. 2000), the plaintiff successfully pled damage to its computers where former employees allegedly stole trade secrets and handed them over to a competitor. In EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001) the plaintiff could recover the payment of consultant fees it had to incur in order to assess the effect of the defendant’s alleged content scraping. In U.S. v. Mitra, 405 F.3d 492 (7th Cir., 2005), the court upheld a criminal conviction under the CFAA where the defendant sent out a strong radio signal that disabled police communications.

Some of the damages in the Second Life situation could be a bit more off-the-wall. The News.com article quotes Robin Harper, Linden Lab’s vice president of community development and support as saying, regarding the attacks, “It disrupts events. People have weddings planned or a party or something, and it gets in the way.”

These effects are probably not what Congress had in mind when it enacted the CFAA. As more “life” populates virtual worlds, however, the susceptibility to harm is likely to change in form. The Second Life situation could be a harbinger of a transforming aspect of damages.

H&R Block can proceed with its suit over unauthorized access to customer data

In early 2005, H&R Block noticed a strange new pattern. It began getting an unusual amount of bulk garnishment orders from defendant J&M Securities, a debt buyer, requiring H&R Block to withhold portions of some of its clients’ tax refunds. In light of the detail supporting the garnishment orders, Block believed that J&M “could not possibly have gathered Block’s clients’ income tax information … without improperly accessing and obtaining Block’s confidential information.”

Block filed suit against J&M, alleging several claims, including violations of the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. §§ 2701 and 2707. (This portion of the Wiretap Act is also commonly referred to as the Stored Communications Act.) J&M moved to dismiss, arguing, among other things, that H&R Block had failed to properly allege its claims under the ECPA. The court denied J&M’s motion to dismiss.

J&M had argued that Block should not be permitted to plead “access by inference” to the confidential stored communications. Applying the liberal pleading standards used in Federal litigation, the court held that Block had sufficiently placed J&M on notice that Block was alleging unauthorized access. The court went on to hold that “finding the fact of ‘access’ or ‘no access’ [was] a task for discovery, summary judgment, and trial.”

The court essentially instructed J&M how to argue a summary judgment motion it could file after discovery. It observed that “[J&M’s] best argument is that [Block] is not a provider of an ‘electronic communication service,’ and thus the ECPA does not regulate access to [Block’s] facility.”

In support of that observation, the court cited to the cases of In re JetBlue Airways Corp. Privacy Litigation, 379 F.Supp.2d 299 (E.D.N.Y. 2005), In re DoubleClick Inc. Privacy Litigation, 154 F.Supp.2d 497 (S.D.N.Y. 2001), and Crowley v. Cybersource Corp., 166 F.Supp.2d 1263 (N.D.Cal. 2001). Each of those cases indicated that a provider of web services is not the same as a provider of an electronic communication service.

Nonetheless, the court fell short of holding that Block was not a provider of an electronic communication service, concluding that such a holding would be “premature,” and would require “speculation about the nature of [Block’s] role in electronic communication.” The court denied the motion to dismiss as to the ECPA claim.

H&R Block Eastern Enterprises, Inc. v. J&M Securities, LLC, (Slip Op.) 2006 WL 1128744 (W.D. Mo., April 24, 2006).

Court examines conversion claim in breach of EULA case

Plaintiff Meridian Project Systems, Inc., a purveyor of construction project management software, was peeved to see that a couple of its licensees collaborated to reverse engineer Meridian’s flagship software product. Meridian filed suit, alleging numerous claims, including conversion. It claimed that the defendants converted both tangible property relating to the licensed software, as well as “concepts, logic, processes, features and functions of [the software] to the extent not covered by its copyrights.”

The defendants moved to dismiss, alleging that Meridian had failed to state a claim upon which relief could be granted. Furthermore, the defendants argued that the claim of conversion of the intangible aspects of the software was preempted by the Copyright Act. The court denied the motion in part, and granted it in part.

The court held that Meridian adequately alleged conversion of the physical components of the software. The End User License Agreement (“EULA”) provided that upon any violation of the agreement, the licensees were to either destroy or return the software’s physical components. In this case, Meridian sufficiently alleged a breach of the agreement, namely, the act of reverse engineering the software. Because the defendants did not thereupon return the “disks, files, and other documents,” such items were “unlawfully retained.” These allegations supported a claim of conversion.

There could be no conversion, however, of the intangible aspects of the software. The court held that the elements which Meridian claimed were converted fell within the general subject matter of copyright, even though they were not actually entitled to copyright protection. Meridian’s claim arising out of the alleged conversion was one seeking to assert rights equivalent to a claim for copyright infringement. Accordingly, this portion of the conversion claim was preempted by the Copyright Act.

Meridian Project Systems, Inc. v. Hardin Construction Co., (Slip Op.) 2006 WL 1062070 (E.D. Cal., April 21, 2006).

A must read: The Podcasting Legal Guide

The long-anticipated Podcasting Legal Guide is now available. Written by Colette Vogele and Mia Garlick, it lives up to its stated purpose of “[providing] you with a general roadmap of some of the legal issues specific to podcasting.” It is very interesting to see such a well thought out application of traditional legal principles to the brand new and untested issues that arise from podcasting.

What’s more, the PLG has been released under a Creative Commons license. What else would one expect from such forward-thinking authors? I enjoyed meeting Mia at last week’s Blog Law and Blogging for Lawyers Seminar, and have worked with Colette as opposing counsel in a rare matter dealing with podcasting. I assure you, they know what they’re talking about.

Scroll to top