MySpace drinkin’ photos causing real life problems again

Last time it was probation being revoked. This time it’s children being taken away. A recent Texas case shows how irresponsible social media use can have some unpleasant consequences.

Mann v. Department of Family and Protective Services, 2009 WL 2961396 (Tex. App. September 17, 2009)

Appellant had her baby taken away by state protective services. She sought review with the court claiming, among other things, that the state had presented “no evidence that [Appellant] engaged in endangering conduct.”

Woo hoo

The court found otherwise, agreeing with the lower court that Appellant had endangered the child. Among the evidence it considered were photos from Appellant’s MySpace account with the following captions, unedited to preserve their original ebullience:

 

  • At Ashley House Dranking it Up
  • Me Helping Ashley Stand Up, Were Both Drunk
  • Me Dancing my ass off, I can dance when I drunk
  • Yall see how much we Dranked plus the one’s that droped on the floor
  • We were all fucked up

Oh, by the way, Appellant was under 21.

The court held that “[t]his evidence could lead a reasonable factfinder to firmly believe that appellant engaged in underage drinking on these two occasions, despite knowing that she was under the legal drinking age.”

Photo courtesy Flickr user Mercury98 under this Creative Commons license.

Conviction for sending intimidating MySpace message overturned

Marshall v. State, 2009 WL 2243467 (Ind. App. July 28, 2009)

Gotta love the facts of this case from my home state of Indiana.

Marshall and Goodman traded cars with one another, but that deal went sour. Marshall then got into an altercation with Goodman’s mother (named Lee) and Marshall was arrested. She was also ordered to have no contact with either Goodman or Lee. Three days after her arrest, Marshall sent the following (redacted) private message through MySpace to Goodman:

Dont think that you are gonna get away from this s***. you can’t hide forever and one of these days when you are out and about … you know thy aint going to pin nothing on me. Cant prove s***. aint gonna and I am just waiting for that day. You want a war? ? ? Your gonna get it now f*****. I don’t know YET who told you the s*** in my blogs or was feedin you info on me but you can rest assured that I am gonna f*** them uptoo when I found out. And I WILL find out. The s*** aint done and you better know that. Its only a matter of time.

The b**** you know I can be.

(Ed. note: stay classy, Ms. Marshall!)

Based on this message, Marshall was convicted of felony intimidation against Lee. The prosecution had argued that Marshall committed this crime by communicating a threat to knowingly injure Lee, with the intent that Lee be placed in fear of retaliation for calling the police.

Marshall sought review of her conviction with the Indiana Court of Appeals. On appeal, the court reversed the conviction.

The court held that the prosecution failed to prove its allegations of intimidation against Lee, because the message was sent to Goodman’s ( and not Lee’s) MySpace account. Even though an intimidating communication may be indirect, the state had to prove that Marshall must have known or had reason to know that her communication would reach Lee. In this case, there was no such proof.

The MySpace message was not addressed to Lee, nor was she mentioned by name. Accordingly, there was no evidence that Marshall knew or had reason to know that Goodman would show the message to his mother.

Photo courtesy Flickr user subewl under this Creative Commons license.

Slamming Wikipedia’s reliability not enough in immigration case

Badasa v. Mukasey, — F.3d —, 2008 WL 3981817 (8th Cir. Aug. 29, 2008)

Illegal alien Badasa sought asylum in the United States. To establish her identity, she submitted to the Immigration Judge a “laissez-passer” issued by the Ethiopian government. Opposing the application for asylum, the Department of Homeland Security submitted a number of items, including a Wikipedia article, to show that a laissez-passer is merely a document issued for a one-time purpose based on information provided by the applicant. The Immigration Judge was not convinced that the laissez-passer established Badasa’s identity, and denied the application for asylum.

Badasa appealed to the Board of Immigration Appeals, which agreed that asylum should be denied. It soundly criticized Wikipedia’s reliability to establish the meaning of the document at issue, but found there was enough other evidence to support the Immigration Judge’s conclusion that Badasa had failed to establish her identity. But the Board of Immigration Appeals failed to discuss this other evidence, therefore running afoul of the administrative law textbook case of SEC v. Chenery, 318 U.S. 80 (1943).

So the Eighth Circuit sent the case back to the Board of Immigration Appeals to make additional findings. The court observed that the Board of Immigration Appeals found that “Badasa was not prejudiced by the [Immigration Judge’s] reliance on Wikipedia, but [the Board of Immigration Appeals] made no independent determination that Badasa failed to establish her identity.” In short, the Board of Immigration Appeals had focused only on why the use of Wikipedia made the case less “solid,” and did not address the lack of solidity found in any of the other evidence connected with the laissez-passer used to establish identity.

Company’s own website provided evidence of claimed trademark’s genericness

Boston Duck Tours LP v. Super Duck Tours LLC, —F.3d—, 2008 WL 2444480 (1st Cir. June 18, 2008)

Boston Duck Tours has been providing tours of Boston in amphibian vehicles (called “ducks” but spelled DUKWs) since 1993. After a competitor moved into town in 2007 calling itself Super Duck Tours, Boston Duck Tours filed suit for trademark infringement. The district court enjoined Super Duck from using its mark and logo. Super Duck sought review with the First Circuit Court of Appeals. On appeal, the court reversed.

It held that the lower court erred in finding that the term “duck tour” was not a generic term outside the protection of trademark law. In reaching this decision, the appellate court reviewed evidence of Boston Duck’s own use of the term in a generic sense, including on its website. For example, a sentence read, “[c]ontrary to local belief, the unique idea of a [d]uck [t]our did not originate in Boston.”

The case should serve as a warning to brand owners to ensure (apart from not selecting a generic term in the first place) that they use their marks in a manner that avoids “genericide”.

Emails held sufficient to amend employment contracts in NY

[Brian Beckham is a contributor to Internet Cases and can be contacted at brian.beckham [at] gmail dot com.]

The New York Court of Appeals, 1st Division recently upheld a lower court ruling that a series of “signed” emails is a sufficient writing to modify a contract.

Plaintiff Stevens sold his business (L-S) to Defendant Publicis under two contracts: a stock-purchase agreement including an initial up-front payment, and an employment contract whereby Plaintiff would continue as Chairman and CEO of the new company (PDNY) for three years with additional contingent fees based on earnings. Shortly after the acquisition, problems arose, including loss of a major client and failure to meet revenue and profit targets. Approximately halfway into the three-year term, Plaintiff was removed as CEO and presented 3 options for continued employment. The then-acting CEO of PDNY (Bloom) exchanged a series of emails with Plaintiff. The culmination of this exchange was an email from Bloom on behalf of PDNY describing his understanding of the parties’ terms regarding Plaintiff’s new role at PDNY that Plaintiff’s time would be allocated 70% towards new business development, 20% in maintaining former L-S clients, and 10% devoted to management/operations of PDNY.

Plaintiff responded the next day by email stating: “…I want to thank you again for helping me…That being said, I accept your proposal with total enthusiasm and excitement…” Bloom for PDNY replied the same day: “I am thrilled with your decision…all of us will continue to work in the spirit of partnership to achieve our mutual goal.”

The bottom of each email had the typed name of the sender.

The lower court held, and the Court of Appeals sustained that the parties had agreed in writing (by their emails) to modify Plaintiff’s duties under his employment contract, specifically because both sides expressed their unqualified acceptance of the modification to the contract. (Bloom’s email set forth the terms of the proposed contractual modification, Plaintiff accepted those terms by his email, and Bloom’s reply memorialized that acceptance). Plaintiff also confirmed his acceptance of the modified contract terms in another email to PDNY’s COO.

The Court of Appeals held that Plaintiff’s (and Bloom’s) emails “constitute ‘signed writings’ within the meaning of the statute of frauds, since plaintiff’s name at the end of his e-mail signified his intent to authenticate the contents.” Moreover, the signed writings (the emails) satisfied a requirement of the original employment contract that any modifications must be signed by all parties, i.e., the several emails served as counter-signatures. The same result may not have been reached in a different state, but at least in NY, “signed” emails can be valid for contract purposes.

Case is: Stevens v. Publicis, S.A., 602716/03.

Social networking evidence presents challenge in prosectuion over alleged threats made after Virgina Tech shootings

U.S. v. Voneida, 2008 WL 189667 (M.D. Pa. January 18, 2008)

Professor Goldman kindly emailed me a copy of the U.S. District Court for the Middle District of Pennsylvania’s decision in the case of U.S. v. Voneida. This criminal prosecution arose out of some postings that defendant Voneida is alleged to have made on his MySpace page about last April’s Virginia Tech shootings.

The court approached the case with all the awe for the Internet suitable for 1994:

[Voneida’s statements] did not occur in a moment, like words being spoken; nor were they sent from one place to another once and only once, like mailing a letter, broadcasting a message over television or radio, or even sending an email. Rather, Defendant’s comments were communicated, and had the potential to reach an audience, for at least nine days. This is one of the ways in which speech on the internet, and on social networking sites in particular, challenges existing methods of legal analysis.

In this case, the feds claimed that Voneida’s postings ran afoul of 18 U.S.C. 875(c), which prohibits the transmitting in interstate commerce of “any threat to injure the person of another.” Voneida filed a motion in limine requesting that several pieces of evidence be excluded at trial.

One of the pieces of evidence that Voneida wanted kept out was an email message that a student in Pennsylvania sent to university authorities to report the postings. The court denied Voneida’s request on this point.

The court held that in determining whether Voneida’s statements were “true threats,” it would be instructive for the jury to consider the effect of the statements on their audience. Addressing this point, the court observed the following about an online “audience”:

Even if [the student who reported the postings] was an unintended viewer, the context of the internet and social networking sites like Myspace.com may make her part of Defendant’s audience regardless of his intent to reach her as opposed to others. As a part of his audience, her response to his comments is relevant and properly considered when evaluating whether they are “true threats.”

A few more facts would be interesting. What if a social network participant adjusts his profile settings to allow only “friends” see the content? Would the so-called “audience” still be the world at large? To what extent can a publisher technologically constrain his or her audience?

Parties must use neutral forensics examiner in file-sharing case

Case highlights important privacy interests in electronic discovery dispute.

From Ray Beckerman, we learn of the U.S. District Court for the Eastern District of Texas’s decision on a motion to compel discovery filed by the recording industry against an accused file-sharer. While the defendant will have to submit her hard drive for forensic examination to see whether she had any copyrighted sound recordings stored on it, she will not have to turn it over to the recording industry’s forensic expert.

Instead, seeking to “balance the legitimate interests of both sides,” the court ordered the parties to select a neutral computer forensics expert to conduct the inspection. Such an approach, the court found, would protect the disclosure of the defendant’s personal information, such as personal correspondence, household financial matters, school homework, and perhaps attorney-client privileged information.

Although in theory this sounds like a reasonable approach to protect the confidentiality of the defendant’s information, one could be troubled by a particular part of the court’s decision. The order states that “the Plaintiffs shall have the right to suggest hard drive search methodologies to the neutral expert and the expert shall make every effort to utilize those methodologies.”

But there is nothing in the order giving the defendant the right or opportunity to object to those methodologies. With an obligation to “make every effort” to comply with the suggestions of the plaintiffs, just how neutral is that forensic examiner really going to be?

Sony BMG Music Entertainment et al. v. Arellanes, No. 05-CV-328 (E.D. Tex., October 27, 2006).

Kansas Supreme Court overturns conviction because hard drive was searched without valid warrant

Agents of the Kansas State Gaming Agency visited Zeke Rupnick in his office, and questioned him about allegations that he was illegally in possession of confidential business information. The agents seized his laptop computer, and a magistrate in a different county issued a warrant authorizing the search of the hard drive’s contents. Rupnick was convicted of felony computer crime based on the evidence obtained from the laptop.

Before trial, Rupnick sought to suppress the evidence contained on the computer, claiming violation of his Fourth Amendment rights. The trial court denied the motion to suppress. Rupnick sought review with the Kansas Supreme Court, which overturned the conviction.

The court held that the initial seizure of the laptop computer from Rupnick’s office without a warrant was justified, on the basis of probable cause plus the exigent circumstances presented by the possibility that Rupnick could easily delete the relevant data. The later warrant and search of the laptop, however, provided the basis for the reversal of the conviction.

The court began its analysis of the legality of the search by answering the question, which was one of first impression before the court, of whether a warrant must be obtained before the government may search the contents of a personal computer. In answering the question in the affirmative, the court looked to the Tenth Circuit cases of U.S. v. Carey, 172 F.3d 1268 (10th Cir. 1999) and U.S. v. Walser, 275 F.3d 981 (10th Cir. 2001).

In this case, the agents had indeed obtained a warrant before searching the contents of the laptop’s hard drive. However, the warrant failed to comply with the relevant Kansas statute (K.S.A. 22-2503), which requires that the search warrant be executed in the judicial district in which the magistrate judge resides. Because the magistrate that issued the warrant did not reside in the county in which the warrant was executed (i.e., where the search of the hard drive was made), the warrant was invalid, and the search was unlawful.

Despite the government’s argument that the defect in the warrant was a mere “technical irregularity,” the court strictly enforced the statute. The felony conviction was reversed and remanded for further proceedings.

State v. Rupnick, — P.3d —, 2005 WL 3439897 (Kan., December 16, 2005).

[Text of opinion]

Pennsylvania court addresses authentication of instant messages

(This was a juvenile delinquency proceeding, thus the names of the parties involved are abbreviated with initials.)

F.P. suspected that Z.G. had stolen a DVD from him. One day in September 2003, as Z.G. was getting off the school bus, F.P. approached Z.G. and “struck him numerous times about the head and face.” F.P. was adjudicated a delinquent, and sought review.

On appeal, F.P. challenged the introduction of printed transcripts of instant messages purportedly sent back and forth between F.P. and Z.G. before the attack. In these messages, the boys discussed the alleged theft of the DVD, and F.P. threatened Z.G. with violence.

F.P. argued that in order for the instant messages to have been admitted into evidence, the prosecution should have introduced information regarding their source with an ISP, or testimony from a computer forensics expert. The “inherent unreliability” of e-mail and instant messaging communications, F.P. argued, made the authentication of the documents through circumstantial evidence improper.

The court rejected F.P.’s arguments, and held that the trial court did not abuse its discretion in admitting the communications. It found that there was sufficient evidence to support the conclusion that F.P. had sent them. In the messages, F.P. had referred to himself by his first name. He accused Z.G. of stealing from him, which mirrored other testimony in the case. Furthermore, he referenced the fact that Z.G. had involved school authorities regarding the dispute between the two, which is a fact that few others would have known.

The court concluded that the applicable Pennsylvania rule of evidence (901) provided a sufficient framework for the analysis. The court held that there “was no justification for constructing unique rules for admissibility of electronic communications such as instant messages; they are to be evaluated on a case-by-case basis as any other document to determine whether or not there has been an adequate foundational showing of their relevance and authenticity.”

In the Interest of F.P., — A.2d —, 2005 WL 1399264 (Pa.Super., June 15, 2005).

Even the courts know the Internet is the first place to turn for information

One of the issues in the recent Indiana case of Munster v. Groce was whether the plaintiff had exercised due diligence in locating the missing defendant. In concluding that the plaintiff hadn’t done his part, the court noted that the plaintiff had neither conducted a public records search nor hired a skip-trace service.

Moreover (and perhaps more shockingly), the plaintiff hadn’t even done a Google search. The court seemed to chastise this failure: “[W]e discovered, upon entering “Joe Groce Indiana” into the Google search engine, an address for Groce that differed from either address used in this case, as well as an apparent obituary for Groce’s mother that listed numerous surviving relatives who might have known his whereabouts.”

Munster v. Groce, — N.E.2d —-, 2005 WL 1364662, at n. 3 (Ind.App., June 8, 2005).

Scroll to top