Justia Internet Law Opinion Summaries
USA V. THOMPSON
Paige Thompson committed a significant data breach, hacking into Amazon Web Services (AWS) customers' accounts, stealing data from at least 30 entities, and causing tens of millions of dollars in damage. She also used the stolen credentials to mine cryptocurrency, further increasing the financial impact on the victims. Thompson was arrested after she revealed her activities to a cybersecurity professional, leading to an FBI investigation.The United States District Court for the Western District of Washington calculated Thompson's sentencing range under the Federal Sentencing Guidelines to be 168 to 210 months of imprisonment. However, the court granted a substantial downward variance, sentencing her to time served (approximately 100 days) and five years of probation. The court emphasized Thompson's personal history, including her transgender identity, autism, and past trauma, as significant factors in its decision.The United States Court of Appeals for the Ninth Circuit reviewed the case and found that the district court overemphasized Thompson's personal story and failed to properly weigh several of the 18 U.S.C. § 3553(a) factors. The appellate court held that the district court's findings regarding Thompson's lack of malicious intent, her remorse, and the seriousness of her actions were clearly erroneous and not supported by the record. The Ninth Circuit also noted that the district court did not adequately consider the need for general and specific deterrence or the risk of unwarranted sentencing disparities.The Ninth Circuit vacated Thompson's sentence and remanded the case for resentencing, instructing the district court to properly weigh all relevant factors and provide a more substantial justification for any variance from the Guidelines. View "USA V. THOMPSON" on Justia Law
USA V. SULLIVAN
Joseph Sullivan, the former Chief Security Officer for Uber Technologies, was convicted of obstruction of justice and misprision of a felony. The case arose from Sullivan's efforts to cover up a significant data breach at Uber while the company was under investigation by the Federal Trade Commission (FTC) for its data security practices. The breach involved hackers accessing and downloading sensitive information from Uber's servers. Sullivan and his team tracked down the hackers and had them sign a non-disclosure agreement (NDA) in exchange for a payment, recharacterizing the hack as part of Uber's Bug Bounty Program.The United States District Court for the Northern District of California presided over the trial, where a jury found Sullivan guilty. Sullivan appealed, challenging the jury instructions, the sufficiency of the evidence, and an evidentiary ruling. He argued that the district court erred in rejecting his proposed jury instructions regarding the "nexus" requirement for the obstruction charge and the "duty to disclose" instruction. He also contended that the evidence was insufficient to support his misprision conviction and that the court improperly admitted a guilty plea agreement signed by one of the hackers.The United States Court of Appeals for the Ninth Circuit reviewed the case and affirmed the district court's decisions. The court held that Ninth Circuit precedent foreclosed Sullivan's argument regarding the "nexus" instruction and that the district court did not err in rejecting it. The court also found that the omission of the "duty to disclose" instruction was proper, as the theories of liability under Section 1505 and Section 2(b) were conjunctive. The court concluded that the evidence was sufficient to support Sullivan's misprision conviction and that the district court did not abuse its discretion in admitting the hacker's guilty plea agreement. The Ninth Circuit affirmed Sullivan's conviction. View "USA V. SULLIVAN" on Justia Law
IN RE: CALIFORNIA PIZZA KITCHEN DATA BREACH LITIGATION
A cyberattack on California Pizza Kitchen, Inc. (CPK) in September 2021 compromised the personal information of over 100,000 former and current employees. This led to multiple class action lawsuits against CPK, alleging negligence and other claims. The consolidated plaintiffs reached a settlement with CPK, offering cash payments and credit monitoring services to class members, with CPK required to make payments only to those who submitted valid claims. The settlement's monetary value was estimated at around $950,000, while the attorneys sought $800,000 in fees.The United States District Court for the Central District of California approved the settlement but reserved judgment on the attorneys' fees until after the claims process concluded. The consolidated plaintiffs reported a final claims rate of 1.8%, with the maximum monetary value of the claims being around $950,000. Despite expressing concerns about the scope of attorneys' fees, the district court ultimately awarded the full $800,000 in fees and costs.The United States Court of Appeals for the Ninth Circuit reviewed the case and affirmed the district court's approval of the class settlement, finding that the district court had properly applied the heightened standard to review the settlement for collusion and had not abused its discretion in finding the settlement fair, reasonable, and adequate. However, the Ninth Circuit reversed the fee award, noting that the district court had not adequately assessed the actual value of the settlement and compared it to the fees requested. The case was remanded for the district court to determine the settlement's actual value to class members and award reasonable and proportionate attorneys' fees. View "IN RE: CALIFORNIA PIZZA KITCHEN DATA BREACH LITIGATION" on Justia Law
DOE V. GRINDR INC.
An underage user of the Grindr application, John Doe, filed a lawsuit against Grindr Inc. and Grindr LLC, alleging that the app facilitated his sexual exploitation by adult men. Doe claimed that Grindr's design and operation allowed him to be matched with adults despite being a minor, leading to his rape by four men, three of whom were later convicted. Doe's lawsuit included state law claims for defective design, defective manufacturing, negligence, failure to warn, and negligent misrepresentation, as well as a federal claim under the Trafficking Victims Protection Reauthorization Act (TVPRA).The United States District Court for the Central District of California dismissed Doe's claims, ruling that Section 230 of the Communications Decency Act (CDA) provided Grindr with immunity from liability for the state law claims. The court also found that Doe failed to state a plausible claim under the TVPRA, as he did not sufficiently allege that Grindr knowingly participated in or benefitted from sex trafficking.The United States Court of Appeals for the Ninth Circuit reviewed the case and affirmed the district court's dismissal. The Ninth Circuit held that Section 230 barred Doe's state law claims because they implicated Grindr's role as a publisher of third-party content. The court also agreed that Doe failed to state a plausible TVPRA claim, as he did not allege that Grindr had actual knowledge of or actively participated in sex trafficking. Consequently, Doe could not invoke the statutory exception to Section 230 immunity under the Allow States and Victims to Fight Online Sex Trafficking Act of 2018. The Ninth Circuit affirmed the district court's dismissal of Doe's claims in their entirety. View "DOE V. GRINDR INC." on Justia Law
Hay v. Marinkovich
The plaintiff filed a complaint against the defendant, alleging that he made and retained an unauthorized copy of her computer hard drive, which contained private and confidential data. The complaint included a claim for violation of Penal Code section 502, which prohibits unauthorized use of any computer system for an improper purpose. The plaintiff sought damages and attorney fees.In the Superior Court of San Diego County, a civil jury trial was held, and the jury found in favor of the defendant on all of the plaintiff's causes of action. The trial court entered judgment for the defendant. Subsequently, the defendant filed a motion for attorney fees and costs under section 502, subdivision (e). The trial court granted the defendant's costs but denied his request for attorney fees, concluding that section 502 does not permit an award of fees to prevailing defendants and that, even if it did, it would be unreasonable to award fees in this case because there was no evidence that the plaintiff's claim was frivolous or abusive.The defendant appealed the order to the Court of Appeal, Fourth Appellate District, Division One, State of California. The appellate court agreed with the defendant that section 502 allows the award of attorney fees to prevailing defendants. However, the court concluded that section 502 defendants may only recover attorney fees where the plaintiff's claim was objectively without foundation when brought, or the plaintiff continued to litigate after it clearly became so. The appellate court found that the trial court acted within its discretion in finding that the plaintiff's claim was not frivolous or abusive and affirmed the order denying attorney fees. View "Hay v. Marinkovich" on Justia Law
Jones v. Bloomingdales.com, LLC
Ann Jones filed lawsuits against Bloomingdales.com, LLC, and Papa John's International, Inc., alleging that their websites used "session replay" technology to record her electronic communications, including mouse movements, clicks, and keystrokes, without her knowledge. She claimed this technology invaded her privacy by creating a detailed record of her website visits, which could be used for targeted advertisements and website improvements.In the Eastern District of Missouri, the district court dismissed Jones's complaint against Bloomingdales for lack of subject-matter jurisdiction, citing a lack of concrete injury as she did not allege the capture of sensitive information. In the case against Papa John's, the district court dismissed the complaint for lack of personal jurisdiction. Jones appealed both dismissals.The United States Court of Appeals for the Eighth Circuit reviewed the cases and consolidated them for oral argument. The court held that Jones did not plausibly allege a concrete injury in either case, affirming the lower courts' judgments. The court noted that Jones's allegations did not demonstrate that the session-replay technology captured any private or sensitive information, such as social security numbers, medical history, or financial details. The court compared the situation to a security camera in a physical store, where customers do not have a reasonable expectation of privacy regarding their general movements.The Eighth Circuit concluded that Jones lacked standing to sue because her allegations did not show a concrete harm to her privacy. The court emphasized that merely asserting an invasion of privacy without supporting facts is insufficient to establish standing. Therefore, the court affirmed the dismissals of both cases. View "Jones v. Bloomingdales.com, LLC" on Justia Law
M.H., et al. v. Omegle.com LLC
C.H., an eleven-year-old, was sexually exploited by a stranger on Omegle.com, an online platform that connects users in video chatrooms. The stranger, referred to as John Doe, threatened C.H. into creating child pornography. C.H.'s parents sued Omegle.com LLC, alleging violations of 18 U.S.C. § 2255 (Masha’s Law) for knowingly possessing child pornography and the Trafficking Victims Protection Reauthorization Act for knowingly benefiting from a sex trafficking venture.The United States District Court for the Middle District of Florida dismissed the claims, citing section 230 of the Communications Decency Act, which protects providers of interactive computer services from being treated as the publisher or speaker of user-provided information. The court also found that the sex trafficking claim did not meet the Fight Online Sex Trafficking Act (FOSTA) exception to section 230 because C.H.'s parents did not allege that Omegle.com had actual knowledge of benefiting from sex trafficking.The United States Court of Appeals for the Eleventh Circuit reviewed the case. The court held that C.H.'s parents did not state a claim under Masha’s Law because they failed to allege that Omegle.com knowingly possessed or accessed child pornography. The court also held that the FOSTA exception to section 230 requires actual knowledge of sex trafficking, not just constructive knowledge. Since C.H.'s parents did not plausibly allege that Omegle.com had actual knowledge of the sex trafficking incident involving C.H., the court affirmed the district court's dismissal of the claims. View "M.H., et al. v. Omegle.com LLC" on Justia Law
Van Loon v. Department of the Treasury
The case involves six plaintiffs who are users of Tornado Cash, a cryptocurrency mixing service that uses immutable smart contracts to anonymize transactions. Tornado Cash was sanctioned by the Office of Foreign Assets Control (OFAC) under the International Emergency Economic Powers Act (IEEPA) for allegedly facilitating money laundering for malicious actors, including North Korea. The plaintiffs argued that OFAC exceeded its statutory authority by designating Tornado Cash as a Specially Designated National (SDN) and blocking its smart contracts.The United States District Court for the Western District of Texas granted summary judgment in favor of the Department of the Treasury, finding that Tornado Cash is an entity that can be sanctioned, that its smart contracts constitute property, and that the Tornado Cash DAO has an interest in these smart contracts. The plaintiffs appealed this decision.The United States Court of Appeals for the Fifth Circuit reviewed the case and focused on whether the immutable smart contracts could be considered "property" under IEEPA. The court concluded that these smart contracts are not property because they are not capable of being owned, controlled, or altered by anyone, including their creators. The court emphasized that property, by definition, must be ownable, and the immutable smart contracts do not meet this criterion. Consequently, the court held that OFAC exceeded its statutory authority by sanctioning Tornado Cash's immutable smart contracts.The Fifth Circuit reversed the district court's decision and remanded the case with instructions to grant the plaintiffs' motion for partial summary judgment based on the Administrative Procedure Act. The court did not address whether Tornado Cash qualifies as an entity or whether it has an interest in the smart contracts, as the determination that the smart contracts are not property was dispositive. View "Van Loon v. Department of the Treasury" on Justia Law
Griggs v. NHS Management, LLC
Shymikka Griggs filed a data-breach action against NHS Management, LLC, a consulting firm providing management services for nursing homes and physical-rehabilitation facilities. NHS collects sensitive personal and health information from employees, patients, and vendors. In May 2021, NHS discovered a cyberattack on its network, which lasted 80 days. NHS notified affected individuals, including Griggs, in March 2022. Griggs, a former NHS employee, claimed her personal information was found on the dark web, leading to credit issues, spam communications, and fraudulent activities.Griggs initially filed a class-action complaint in the United States District Court for the Northern District of Alabama but later dismissed it. She then filed a class-action complaint in the Jefferson Circuit Court in June 2023, alleging negligence, negligence per se, breach of contract, invasion of privacy, unjust enrichment, breach of confidence, breach of fiduciary duty, and violation of the Alabama Deceptive Trade Practices Act. NHS moved to dismiss the complaint, arguing lack of standing and failure to state a claim. The Jefferson Circuit Court dismissed Griggs's complaint with prejudice.The Supreme Court of Alabama reviewed the case and affirmed the circuit court's judgment. The court held that Griggs failed to sufficiently plead her claims. Specifically, she did not demonstrate that NHS owed her a duty under Alabama law, failed to establish proximate cause for her negligence per se claim, did not allege intentional conduct for her invasion-of-privacy claim, and did not show that she conferred a benefit on NHS for her unjust-enrichment claim. Additionally, the court found that breach of confidence is not a recognized cause of action in Alabama and that Griggs did not establish a fiduciary relationship between her and NHS. View "Griggs v. NHS Management, LLC" on Justia Law
UMG Recordings v. Grande Communications Networks, LLC
A group of major record labels sued Grande Communications Networks, LLC, an internet service provider, for contributory copyright infringement. The plaintiffs alleged that Grande knowingly provided internet services to subscribers who used them to infringe on the plaintiffs' copyrighted works. The plaintiffs presented evidence that Grande received over 1.3 million infringement notices from Rightscorp, a company that identifies infringing activity on peer-to-peer networks, but Grande did not terminate or take action against repeat infringers. Instead, Grande continued to provide internet services to these subscribers, despite knowing about their infringing activities.The United States District Court for the Western District of Texas held a three-week jury trial. The jury found Grande liable for willful contributory copyright infringement and awarded the plaintiffs $46,766,200 in statutory damages. Grande moved for judgment as a matter of law (JMOL) on the issue of liability and for a new trial on damages, but the district court denied these motions. Grande then appealed, challenging the district court's rulings on its JMOL motion, the jury instructions, and the final judgment. The plaintiffs filed a conditional cross-appeal regarding a jury instruction.The United States Court of Appeals for the Fifth Circuit reviewed the case and upheld the jury's verdict, finding that the plaintiffs had provided sufficient evidence to support the jury's finding of contributory copyright infringement. The court concluded that Grande had knowledge of its subscribers' infringing activities and materially contributed to the infringement by continuing to provide internet services without taking basic measures to prevent further damage. However, the court found that the district court erred in awarding statutory damages for each individual song rather than for each album, as the Copyright Act treats all parts of a compilation as one work for statutory damages purposes. Consequently, the court vacated the damages award and remanded the case for a new trial on damages. The plaintiffs' conditional cross-appeal was dismissed as moot. View "UMG Recordings v. Grande Communications Networks, LLC" on Justia Law