Justia Internet Law Opinion Summaries

by
Soliman entered a California Subway sandwich shop. An employee showed her an in-store, hard-copy advertisement, on which Subway offered to send special offers if she texted a keyword. Soliman sent a text message to Subway. Subway began sending her, via text message, hyperlinks to electronic coupons. Soliman alleges that she later requested by text that Subway stop sending her messages, but her request was ignored. She filed suit under the Telephone Consumer Protection Act. Subway moved to compel arbitration, arguing that a contract was formed because the in-store advertisement, from which Soliman got the keyword and shortcode, included a reference to terms and conditions, including an arbitration requirement, located on Subway’s website and provided the URL.The Second Circuit affirmed the denial of the motion to compel arbitration. Under California law, Soliman was not bound by the arbitration provision because Subway did not provide reasonably conspicuous notice that she was agreeing to the terms on the website. Because of barriers relating to the design and content of the print advertisement, and the accessibility and language of the website itself, the terms and conditions were not reasonably conspicuous under the totality of the circumstances; a reasonable consumer would not realize she was being bound to such terms by sending a text message to Subway in order to receive promotional offers. View "Soliman v. Subway Franchisee Advert. Fund Trust, Ltd." on Justia Law

by
Former Georgia police sergeant Van Buren used his credentials on a patrol-car computer to access a law enforcement database to retrieve license plate information in exchange for money. His conduct violated a department policy against obtaining database information for non-law-enforcement purposes. The Eleventh Circuit upheld Van Buren's conviction for a felony violation of the Computer Fraud and Abuse Act of 1986 (CFAA), which covers anyone who “intentionally accesses a computer without authorization or exceeds authorized access,” 18 U.S.C. 1030(a)(2), defined to mean “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.”The Supreme Court reversed. An individual “exceeds authorized access” when he accesses a computer with authorization but then obtains information located in particular areas of the computer (files, folders, databases) that are off-limits to him. Van Buren “access[ed] a computer with authorization” and “obtain[ed] . . . information in the computer.” The phrase “is not entitled so to obtain” refers to information one is not allowed to obtain by using a computer that he is authorized to access.“Without authorization” protects computers themselves from outside hackers; the “exceeds authorized access” clause protects certain information within computers from "inside hackers." One either can or cannot access a computer system, and one either can or cannot access certain areas within the system. The Act’s precursor to the “exceeds authorized access” language covered any person who, “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend.” Congress removed any reference to “purpose” in the CFAA. On the government’s reading, an employee who sends a personal e-mail or reads the news using a work computer may have violated the CFAA. View "Van Buren v. United States" on Justia Law

by
Lund was convicted of possession of more than 600 images of child pornography, at least 10 of which involved a prepubescent minor or a minor under 12 years old (Penal Code 311.11(c)(1)) and was sentenced to five years' imprisonment.One of the tools used in the investigation was CPS (Child Protection System), a privately-developed web interface for viewing results from a suite of several software tools that each search for child pornography on a specific peer-to-peer network. CPS compares the files listed in response to keyword searches against CPS’s database of hash values, which contains the hash values of files that law enforcement officers somewhere in the world have previously tagged as child pornography.The court of appeal affirmed, rejecting arguments that the trial court should have excluded some of the CPS data because the data was case-specific, testimonial hearsay and that the prosecution failed to establish that CPS was reliable and generally accepted in the scientific community. The CPS hash values were not hearsay in this case because they were not admitted for their truth. Lund also unsuccessfully argued that the prosecutor committed repeated, pervasive misconduct and that the trial court abused its discretion in allowing the prosecution to play for the jury several child pornography videos. View "People v. Lund" on Justia Law

by
The issue before the Washington Supreme Court’s in this case was whether an individual’s YouTube channel qualified as “news media” for requests for certain records under the Washington Public Records Act (PRA). In 2014, Brian Green and Peter Auvil went to the County-City Building in Tacoma to file a document and pay a parking ticket. As they went through security, the guard asked to search Auvil’s bag. Auvil refused. A Pierce County deputy sheriff came to assist, and Auvil began to record a video of the interaction on his phone. Auvil continued to refuse to allow the security guard to search the bag, arguing that the security checkpoint was a violation of his privacy rights. The conversation escalated, and the deputy asked the men to leave. When Green stood too close to him, the deputy shoved Green and caused him to fall backward onto the floor. The deputy arrested Green for criminal obstruction and took him to jail. He was released approximately 24 hours later. The prosecuting attorney’s office dismissed the charge. In December 2017, Green e-mailed a PRA request to the Pierce County Sheriff’s public records office requesting “[a]ny and all records of official photos and/or birth date and/or rank and/or position and/or badge number and/or date hired and/or ID Badge for all detention center and/or jail personnel and/or deputies on duty November 26 & 27 2014.” A representative of the Sheriff’s “Public Disclosure Unit” sent 11 pages of records, but did not include photographs or dates of birth as requested, explaining that the information was exempt under the PRA. Green said he was “working on a story concerning the Pierce County Jail” and again signed his e-mail with the title, “Investigative Journalist.” Green claimed his 6,000-subscriber YouTube channel met the definition of “news media” under the PRA. The Supreme Court concluded the statutory definition of “news media” required an entity with a legal identity separate from the individual. Green did not prove that he or the Libertys Champion YouTube channel met the statutory definition of “news media,” and, thus, he was not entitled to the exempt records. Therefore, the trial court was reversed in part. The Court affirmed the trial court’s denial of Pierce County’s motion to compel discovery. View "Green v. Pierce County" on Justia Law

by
Pillar hired Epiphyte to convert its cryptocurrency into Euros. Epiphyte informed Pillar that it used Payward’s online exchange to convert its clients’ cryptocurrencies. Pillar transferred its cryptocurrency into Epiphyte’s account on Payward’s platform. After Epiphyte converted the currency but before the exchanged funds were transferred to Pillar’s bank account, four million Euros belonging to Pillar were stolen from Epiphyte’s account.Pillar sued Payward, alleging Payward knew or should have known that Epiphyte was using its Payward account on Pillar's behalf, failed to use standard security measures that would have prevented the theft, and falsely advertised that it provided the best security in the business. Payward moved to compel arbitration, claiming that Epiphyte agreed to Payward’s “Terms of Service” when it created an account, as required for all users, that those Terms included an arbitration agreement, and that Pillar was bound by that agreement.The court of appeal affirmed the denial of Payward’s motion. There is no evidence Epiphyte was acting as Pillar’s agent when it agreed to the Terms two years before Pillar hired it or that the agency relationship automatically bound the principal to the agent’s prior acts. There is no evidence Pillar knew the arbitration agreements existed or had a right to rescind them. No ratification occurred. There was no intent to benefit Pillar or similar parties. Pillar’s claims are not inextricably intertwined with the Terms. View "Pillar Project AG v. Payward Ventures, Inc." on Justia Law

by
The Ninth Circuit reversed the district court's judgment dismissing an amended complaint against Snap based on immunity under the Communications Decency Act (CDA), 47 U.S.C. 230(c)(1). Plaintiffs, the surviving parents of two boys who died in a high-speed accident, alleged that Snap encouraged their sons to drive at dangerous speeds and caused the boys' deaths through its negligent design of its smartphone application Snapchat. Specifically, plaintiffs claimed that Snapchat allegedly knew or should have known, before the accident, that its users believed that a reward system existed and that the Speed Filter was therefore incentivizing young drivers to drive at dangerous speeds.The panel applied the Barnes factors and concluded that, because plaintiffs' claim neither treats Snap as a "publisher or speaker" nor relies on "information provided by another information content provider," Snap does not enjoy immunity from this suit under section 230(c)(1). In this case, Snap is being used for the predictable consequences of designing Snapchat in such a way that it allegedly encourages dangerous behavior, and the CDA does not shield Snap from liability for such claims. The panel declined to affirm the district court's decision on the alternative ground that plaintiffs have failed to plead adequately in their amended complaint the causation element of their negligent design claim. Accordingly, the panel remanded for further proceedings. View "Lemmon v. Snap, Inc." on Justia Law

by
During the COVID-19 pandemic, Kentucky’s Attorney General opened civil price-gouging investigations into Kentucky-based merchants, including at least one member of the Guild that was selling goods to Kentuckians through Amazon’s online marketplace. The Guild challenged the constitutionality of Kentucky’s price-gouging laws as applied to sellers on Amazon, invoking the extraterritoriality doctrine of the dormant commerce clause. Accepting that the Attorney General sought only to enforce the Commonwealth’s price-gouging laws against Kentucky-based sellers in connection with sales to Kentucky consumers through Amazon’s platform, the district court nevertheless granted the Guild a preliminary injunction, concluding that enforcing the laws in connection with Amazon sales would have impermissible extraterritorial effects.The Sixth Circuit vacated, first holding that the Guild is likely to establish direct organizational standing and standing on behalf of its members. This enforcement of Kentucky’s price-gouging laws is unlikely to run afoul of the dormant commerce clause’s extraterritoriality doctrine, which invalidates state laws as per se unconstitutional in the narrow instances where a state expressly or inevitably exceeds its authority and seeks to control wholly out-of-state commerce. The effect on out-of-state commerce of Kentucky’s price-gouging laws depends entirely upon Amazon’s independent decision-making with regard to the structure of its online marketplace, so the application of those laws to Kentucky-based third-party sellers on Amazon in connection with sales to Kentucky consumers is unlikely to offend the extraterritoriality doctrine. View "Online Merchants Guild v. Cameron" on Justia Law

by
Plaintiff filed suit against Amazon for injuries she suffered from an allegedly defective hoverboard she purchased from a third party seller named TurnUpUp on Amazon's website. The trial court granted summary judgment in favor of Amazon.The Fourth District recently addressed this issue as a matter of first impression in Bolger v. Amazon.com, LLC (2020) 53 Cal.App.5th 431 (Bolger), review denied November 18, 2020, holding that Amazon is an integral part of the overall producing and marketing enterprise that should bear the cost of injuries resulting from defective products.The Court of Appeal reversed the trial court's judgment and concluded that Bolger properly applied a well-established strict liability law to the facts of its case and was correctly decided. Based on the court's review of Amazon's third-party business model under the Business Solutions Agreement (BSA), the court is persuaded that Amazon's own business practices make it a direct link in the vertical chain of distribution under California's strict liability doctrine. Although the court concluded that Amazon is a link in the vertical chain of distribution, the court nevertheless recognizes that e-commerce may not neatly fit into a traditional sales structure. Viewing the evidence in the light most favorable to plaintiff, the court concluded that there exists a triable issue of material fact as to liability under the stream of commerce approach and thus the trial court erroneously granted summary adjudication on the strict liability claim. The court rejected Amazon's contention that it was merely a service provider and thus not strictly liable for plaintiff's injuries. Furthermore, the court was not persuaded by Amazon's reliance on those decisions that restrict strict liability to sellers or manufacturers by applying out-of-state law. The court also concluded that policy considerations underlying the doctrine are furthered by imposing strict products liability in this case. Finally, summary adjudication was improperly granted as to the negligent products liability claim where Amazon provides no legal support for its argument that negligent products liability may only be imposed on manufacturers and sellers. View "Loomis v. Amazon.com LLC" on Justia Law

by
In the year leading up to the Mississippi Legislature’s statutory creation of a lottery, Jonathan Carr registered more than fifty domain names with some iteration of the name Mississippi Lottery. The newly created Mississippi Lottery Corporation accused Carr of cybersquatting. Carr countered with a claim of reverse domain-name hijacking, asserting the Lottery had violated his ownership rights to the domain names, which he contended he registered in good faith to promote his religious opposition to gambling and to provide resources to those with gambling addictions. Carr and the Lottery filed competing motions for preliminary injunction aimed at gaining the right to five domain names; the trial court granted the Lottery's motion, issuing a permanent injunction against Carr, and ordering that he immediately transfer the five domain names to the Lottery. Carr appealed, arguing the Lottery failed to prove he committed cybersquatting. But the Mississippi Supreme Court concluded it could not address the merits of Carr’s claim because the order Carr appealed was not final and thus not appealable. View "Carr v. Mississippi Lottery Corporation" on Justia Law

by
The Telephone Consumer Protection Act of 1991 (TCPA) restricts communications made with an “automatic telephone dialing system,” defined as equipment with the capacity both “to store or produce telephone numbers to be called, using a random or sequential number generator,” and to dial those numbers, 47 U.S.C. 227(a)(1). Facebook’s social media platform allows users to elect to receive text messages when someone attempts to log in to the user’s account from a new device. Facebook sent such texts to Duguid, alerting him to login activity on a Facebook account linked to his telephone number, but Duguid never created any Facebook account. Duguid tried, unsuccessfully, to stop the unwanted messages. He brought a putative class action, alleging that Facebook violated the TCPA by maintaining a database that stored phone numbers and programming its equipment to send automated text messages. The Ninth Circuit ruled in Duguid’s favor.The Supreme Court reversed: To qualify as an “automatic telephone dialing system” under the TCPA, a device must have the capacity either to store a telephone number using a random or sequential number generator or to produce a telephone number using a random or sequential number generator. The statutory context confirms that the TCPA’s autodialer definition excludes equipment that does not use a random or sequential number generator. Congress found autodialer technology harmful because autodialers can dial emergency lines randomly or tie up all of an entity's sequentially numbered phone lines. Duguid’s interpretation would encompass any equipment that stores and dials telephone numbers. View "Facebook, Inc. v. Duguid" on Justia Law