Justia Internet Law Opinion Summaries
Curry v. Revolution Laboratories, LLC
Curry, the founder of “Get Diesel Nutrition,” has paid for advertising for his products, including "Diesel Test," in national fitness magazines since 2002. In 2016, the defendants began selling a sports nutritional supplement, "Diesel Test Red Series." Like Curry’s product, the defendants’ product comes in red and white packaging with right-slanted all-caps typeface bearing the words “Diesel Test.” Curry alleges that he received messages indicating that customers were confused. The defendants concocted a fake ESPN webpage touting their product and conducted all their marketing online. In about seven months, they received more than $1.6 million in gross sales. At least 767 sales were to consumers in Illinois. After Curry demanded that the defendants cease and desist, both parties filed trademark applications for "Diesel Test." The Patent Office suspended both applications. Curry filed suit, alleging violation of the Illinois Consumer Fraud and Deceptive Practices Act, violations of the Lanham Act, 15 U.S.C. 1125, violation of the Anti-Cybersquatting Consumer Protection Act, filing a fraudulent trademark application, and violation of common law trademark protections. The district court dismissed for lack of personal jurisdiction. The Seventh Circuit reversed. Revolution’s activity can be characterized as purposefully directed at Illinois, the forum state, and related to Curry's claims. Physical presence is not necessary for a defendant to have sufficient minimum contacts with a forum state. Illinois has a strong interest in providing a forum for its residents to seek redress for harms suffered within the state by an out-of-state actor. View "Curry v. Revolution Laboratories, LLC" on Justia Law
United States v. Apple Mac Pro Computer
Officers executed a search warrant at Rawls’ residence, yielding an iPhone 6 and a Mac Pro Computer with attached external hard drives, all protected with encryption software. With a warrant, forensic analysts discovered the password to decrypt the Mac Pro but could not determine the passwords for the external hard drives. The Mac Pro revealed an image of a pubescent girl in a sexually provocative position, logs showing that it had visited likely child exploitation websites and that Rawls had downloaded thousands of files known to be child pornography. Those files were stored on the external hard drives. Rawls’ sister stated that Rawls had shown her child pornography on the external hard drives. A Magistrate ordered Rawls to unencrypt the devices. Rawls cited the Fifth Amendment privilege against self-incrimination. The court denied Rawls’ motion, reasoning the act of decrypting the devices would not be testimonial. Rawls decrypted the iPhone, which contained 20 photographs that focused on the genitals of Rawls’ six-year-old niece. Rawls stated that he could not remember the passwords for the hard drives. The Third Circuit affirmed a civil contempt finding. Rawls, incarcerated since September 2015, moved for release, arguing that 28 U.S.C. 1826(a) limits the maximum confinement for civil contempt to 18 months. The Third Circuit ordered his release, rejecting the government’s argument that Rawls was not a “witness” participating in any “proceeding before or ancillary to any court or grand jury.” The proceedings to enforce the search warrant fall within the statute’s broad description of any “proceeding before or ancillary to any court or grand jury," the Decryption Order is “an order of the court to testify or provide other information,” and section 1826(a) applies to the detention of any material witness, even if that person is also a suspect in connection with other offenses. View "United States v. Apple Mac Pro Computer" on Justia Law
Normand v. Wal-Mart.com USA, LLC
The Louisiana Supreme Court granted certiorari to determine whether the lower courts correctly ruled an online marketplace was obligated as a "dealer" under La. R.S. 47:301(4)(l) and/or by contract to collect sales tax on the property sold by third party retailers through the marketplace’s website. Wal-Mart.com USA, LLC (“Wal-Mart.com”) operated an online marketplace at which website visitors could buy products from Wal-Mart.com or third party retailers. From 2009 through 2015, Wal-Mart.com reported its online sales in Jefferson Parish, Louisiana of its products and remitted the required sales tax to the Louisiana Department of Revenue and ex-officio tax collector, then Sheriff Newell Normand (Tax Collector). The reported sales amount did not include proceeds from online sales made by third party retailers through Wal-Mart.com’s marketplace. Following an attempted audit for this period, Tax Collector filed a “Rule for Taxes” alleging Wal-Mart.com “engaged in the business of selling, and sold tangible personal property at retail as a dealer in the Parish of Jefferson,” but had “failed to collect, and remit . . . local sales taxes from its customers for transactions subject to Jefferson Parish sales taxation.” In addition, Tax Collector alleged that an audit of Wal-Mart.com’s sales transactions was attempted, but Wal-Mart.com “refused to provide [Tax Collector] with complete information and records” of Jefferson Parish sales transactions, particularly, those conducted on behalf of third party retailers. In connection with online marketplace sales by third party retailers, Tax Collector sought an estimated $1,896,882.15 in unpaid sales tax, interest, penalties, audit fees, and attorney fees. The Supreme Court determined an online marketplace was not a “dealer” under La. R.S. 47:301(4)(l) for sales made by third party retailers through its website and because the online marketplace did not contractually assume the statutory obligation of the actual dealers (the third party retailers), the judgment of the trial court and the decision of the court of appeal were reversed and vacated. View "Normand v. Wal-Mart.com USA, LLC" on Justia Law
Woodhull Freedom Foundation v. United States
The DC Circuit reversed the district court's order dismissing, based on lack of subject matter jurisdiction, a pre-enforcement challenge to the Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA), brought by plaintiffs, alleging harm to their online activities. This action stemmed from Congress's continual goal of protecting minors online while promoting a free and open internet. The court held that at least two of the plaintiffs have established Article III standing to bring the pre-enforcement challenge to FOSTA. In this case, Plaintiff Andrews, an advocate for sex worker rights and a co-founder of several groups that advocate for the health, safety, and human rights of sex workers, has alleged intended conduct that is arguably proscribed by FOSTA and the threat of future enforcement is substantial. Furthermore, Plaintiff Koszyk, a licensed massage therapist and the owner of Soothing Spirit Massage, has demonstrated that a favorable decision would create a significant increase in likelihood that he would obtain relief. Accordingly, the court remanded for further proceedings. View "Woodhull Freedom Foundation v. United States" on Justia Law
Enigma Software Group USA, LLC v. Malwarebytes, Inc.
The Ninth Circuit filed an order withdrawing its prior opinion and replacing the opinion with an amended opinion, denying a petition for panel rehearing, and denying on behalf of the court a petition for rehearing en banc. The panel also filed an amended opinion reserving the district court's dismissal, as barred by section 230 of the Communications Decency Act (DCA), of claims under New York law and the Lanham Act's false advertising provision. Enigma filed suit alleging that Malwarebytes Inc. has configured its software to block users from accessing Enigma's software in order to divert Enigma's customers. The panel distinguished Zango Inc. v. Kaspersky Lab, Inc., 568 F.3d 1169, 1173 (9th Cir. 2009), from this case and held that the parties here were competitors. The panel heeded the warning in Zango against an overly expansive interpretation of section 230 that could lead to anticompetitive results. The panel held that the phrase "otherwise objectionable" does not include software that the provider finds objectionable for anticompetitive reasons. In regard to the state-law claims, the panel held that Enigma's allegations of anticompetitive animus were sufficient to withstand dismissal. In regard to the federal claim, the panel held that section 230's exception for intellectual property claims did not apply because Enigma's false advertising claim did not relate to trademarks or any other type of intellectual property. The panel remanded for further proceedings. View "Enigma Software Group USA, LLC v. Malwarebytes, Inc." on Justia Law
United States v. Bateman
The Playpen website, a message board for advertising and distributing child pornography, is within the “dark-web,” protected by the “Tor hidden service network,” rendering the website relatively inaccessible. A foreign law enforcement agency alerted FBI agents of its suspicions that a U.S.-based IP address was used to house Playpen. Agents identified the server and executed a search warrant, which allowed them to create a duplicate server at a government facility in the Eastern District of Virginia. The FBI assumed administrative control of the website, then obtained a search warrant from the Eastern District of Virginia to employ a Network Investigative Technique (NIT) to unmask anonymous users. The NIT warrant led the District Court of the Southern District of Ohio to issue a search warrant that allowed authorities to search Bateman’s residence and computer where they found over 599 illicit images of children. The Sixth Circuit affirmed the denial of motions to suppress the evidence and for a "Franks" hearing, to question Agent Macfarlane, who submitted the affidavit to obtain the NIT warrant. The search of Bateman’s home was valid under the good-faith exception. Agent Macfarlane’s affidavit provided a detailed and sufficiently specific picture of Playpen and of the NIT program; it accurately described the locations to be searched, which necessarily included locations outside of the Eastern District of Virginia, and accurately described the NIT’s operation as triggered only when an activating computer’s signals entered the Eastern District of Virginia. View "United States v. Bateman" on Justia Law
Collins et al. v. Athens Orthopedic Clinic, P.A.
Plaintiffs alleged in 2016, an anonymous hacker stole the personally identifiable information, including Social Security numbers, addresses, birth dates, and health insurance details, of at least 200,000 current and former patients of Athens Orthopedic Clinic (“the Clinic”) from the Clinic’s computer databases. The hacker demanded a ransom, but the Clinic refused to pay. The hacker offered at least some of the stolen personal data for sale on the so-called “dark web,” and some of the information was made available, at least temporarily, on Pastebin, a data-storage website. The Clinic notified plaintiffs of the breach in August 2016. Each named plaintiff alleges that she has “spent time calling a credit reporting agency and placing a fraud or credit alert on her credit report to try to contain the impact of the data breach and anticipates having to spend more time and money in the future on similar activities.” Plaintiffs sought class certification and asserted claims for negligence, breach of implied contract, and unjust enrichment, seeking damages based on costs related to credit monitoring and identity theft protection, as well as attorneys’ fees. They also sought injunctive relief under the Georgia Uniform Deceptive Trade Practices Act (“UDTPA”), and a declaratory judgment to the effect that the Clinic must take certain actions to ensure the security of class members’ personal data in the future. The Clinic filed a motion to dismiss based on both OCGA 9-11-12 (b) (1) and OCGA 9-11-12 (b)(6), which the trial court granted summarily. The Georgia Supreme Court concluded the injury plaintiffs alleged they suffered was legally cognizable. Because the Court of Appeals held otherwise in affirming dismissal of plaintiffs’ negligence claims, the Supreme Court reversed that holding. Because that error may have affected the Court of Appeals’s other holdings, the Court vacated those other holdings and remanded the case. View "Collins et al. v. Athens Orthopedic Clinic, P.A." on Justia Law
Wilson v. Huuuge, Inc.
Dancel v. Groupon, Inc.
Dancel sued, alleging Groupon had used her photograph to promote a restaurant voucher. Groupon had collected the photograph from Dancel’s public Instagram account based on data linking it to the restaurant’s location. She sought damages under the Illinois Right of Publicity Act (IRPA) on behalf of a class of Illinois residents whose Instagram photographs have appeared on a Groupon offer. The parties litigated in state court until Dancel moved to certify a class of “[a]ll persons who maintained an Instagram Account and whose photograph ... was ... acquired and used on a groupon.com webpage for an Illinois business.” The class was not defined by its members’ residency. Groupon filed a notice of removal under the Class Action Fairness Act, 28 U.S.C. 1453. The district court denied remand and denied class certification. The Seventh Circuit affirmed the denial of class certification. IRPA requires more with respect to the plaintiff’s identity than an Instagram username It demands that an attribute, even a name, serve to identify the individual whose identity is being appropriated. This individualized evidentiary burden prevents identity from being a predominating common question under Rule 23(b)(3). View "Dancel v. Groupon, Inc." on Justia Law
United States v. Grisanti
The FBI took over a child-pornography website, “Playpen,” and kept Playpen running to locate people who distributed and viewed child pornography. Playpen allowed visitors to remain anonymous. The FBI obtained a warrant authorizing the use of a “Network Investigative Technique” (NIT). When a user logged into Playpen, the NIT installed malware on the user’s computer and relayed identifying information to the FBI. The warrant application said that the property to be searched was “located in the Eastern District of Virginia” but an addendum stated that the NIT would be “deployed” on a server “located at a government facility in the Eastern District of Virginia” to obtain information from “activating computer[s]” of “any user” who logged into Playpen. Grisanti logged into Playpen from Indiana. The NIT sent identifying information. The FBI obtained Indiana search warrants and found evidence of child pornography on Grisanti’s computer. Before the FBI could complete its investigation, Grisanti destroyed the hard drive and a flash drive. The court denied a motion to suppress, concluding that the agents relied on the warrant in good faith. Convicted of destruction of evidence and child-pornography offenses, Grisanti was sentenced to 120 months' imprisonment. The court noted that Grisanti possessed more than 600 images of child pornography—some involving prepubescent children—and destroyed the evidence. He never sought treatment and blamed others when he was caught. The Seventh Circuit affirmed, noting that it had already held that the good-faith exception applies to the warrant at issue. Grisanti’s sentence was not unreasonable and the district court did not make any procedural error. View "United States v. Grisanti" on Justia Law