Justia Internet Law Opinion Summaries

by
Under the Facebook account name “Billy Button,” Browne began exchanging messages with 18-year-old Nicole. They met in person and exchanged sexually explicit photographs of themselves through Facebook chats. Browne threatened to publish the photos online unless Nicole engaged in oral sex and promised to delete the photos only if she provided him the password to her Facebook account. Using that account, Browne made contact with four minors and solicited explicit photos. Once he had their photos, he repeated the pattern, threatening to publish their images unless they engaged sexual acts. Alerted by the Virgin Islands Police Department, Department of Homeland Security (DHS) agents investigated, arrested Browne, executed a search warrant on his residence, and seized a cell phone from which text messages and photos of the minors were recovered. Browne admitted ownership of the phone and Facebook account. Facebook provided five sets of chats and a certificate of authenticity executed by its records custodian, which were admitted at trial. The Third Circuit affirmed his convictions for child pornography and sexual offenses with minors. While rejecting the government’s assertion that, under Rule 902(11), the contents of the communications were “self-authenticating” as business records accompanied by a certificate from the records custodian, the court found that the record reflected sufficient extrinsic evidence to link Browne to the chats and satisfy the prosecution’s authentication burden under a conventional Rule 901 analysis. View "United States v. Browne" on Justia Law

by
Someone used the email address gslabs@hotmail.com to contact a Vietnamese website in an attempt to buy sassafras oil, a chemical that can be used to make the illegal drug known as ecstasy. The website was being monitored by the Drug Enforcement Administration, which began an investigation that culminated in Caira being convicted on drug charges. A key step in the investigation was learning that Caira was the person behind the gslabs@hotmail.com address. The DEA made that discovery by issuing administrative subpoenas to technology companies, without getting a warrant. The district court denied a motion to suppress and the Seventh Circuit affirmed, rejecting an argument that the DEA conducted an “unreasonable search” in violation of the Fourth Amendment, Because Caira voluntarily shared the relevant information with technology companies, he did not have a reasonable expectation of privacy in the information, so his Fourth Amendment rights were not violated. The court characterized as “harmless” the district court’s errors imposing conditions of supervised release without justifying them on the record. Caira is serving a life sentence for another conviction. He is not expected to be released from prison so the conditions are not expected to be imposed. View "United States v. Caira" on Justia Law

by
Plaintiff, individually and purportedly on behalf of others similarly situated, filed suit against GameStop for breach of contract, unjust enrichment, money had and received, and violation of Minnesota’s Consumer Fraud Act (CFA), Minn. Stat. 325F.68, et seq. Plaintiff alleged that GameStop's disclosure of personally identifiable information (PII) to a third party (Facebook) violated an express agreement not to do so. The district court granted GameStop's motion to dismiss based on plaintiff's lack of standing. The court concluded that plaintiff provided sufficient facts alleging that he is party to a binding contract with GameStop, and GameStop does not dispute this contractual relationship; GameStop has violated that policy; and plaintiff has suffered damages as a result of GameStop's breach. The court also concluded that plaintiff has standing to bring his breach-of-contract claim and to bring his other claims. The court concluded, however, that the privacy policy unambiguously does not include those pieces of information among the protected PII. Therefore, the protection plaintiff argues GameStop failed to provide was not among the protections for which he bargained by agreeing to the terms of service, and GameStop thus could not have breached its contract with plaintiff. Plaintiff's Minnesota CFA claims fail for similar reasons. Finally, plaintiff has not alleged a claim for unjust enrichment or the related claim of money had and received. View "Carlsen v. GameStop, Inc." on Justia Law

by
Luis, a resident of Florida, developed an online personal relationship with Ohio resident, Catherine. The relationship was apparently platonic, but Catherine’s husband, Joseph, was suspicious and secretly installed WebWatcher on Catherine’s computer to monitor her communications. According to Luis, WebWatcher and its manufacturer, Awareness, surreptitiously intercepted the emails, instant messages, and other communications between Luis and Catherine and disclosed the communications to Joseph, who used them as leverage to divorce Catherine on favorable terms. Luis filed suit and eventually settled his claims against all defendants except Awareness, against which he alleged violations of the federal Wiretap Act, 18 U.S.C. 2511-2512, the Ohio Wiretap Act, and Ohio common law. The district court dismissed, reasoning that concluded that Awareness did not “intercept” Luis’s communications because it was Joseph—not Awareness—that installed the WebWatcher program. The Sixth Circuit reversed, stating that the lower court failed to take into account the extent to which Awareness itself was allegedly engaged in the asserted violations, noting Awareness’s continued operation of the WebWatcher program, even after that program is sold to a user. Luis’s complaint sufficiently alleged that Awareness​ (via WebWatcher) acquires communications in a manner that is contemporaneous with their transmission. View "Luis v. Zang" on Justia Law

by
Tennessee and North Carolina municipalities that provide broadband service would like to expand their networks beyond their current territorial boundaries to underserved nearby areas. State laws either forbid or put onerous restrictions on such expansion by municipal telecommunications providers. The Federal Communications Commission (FCC), citing its statutory mandates to remove barriers to broadband service and to promote competition in the telecommunications market, issued an order purporting to preempt these state statutory provisions. The Sixth Circuit reversed the order, which “essentially serves to re-allocate decision-making power between the states and their municipalities.” No federal statute or FCC regulation requires the municipalities to expand or otherwise to act in contravention of the preempted state statutory provisions. This preemption by the FCC of the allocation of power between a state and its subdivisions requires at least a clear statement in the authorizing federal legislation. Section 706 of the Telecommunications Act of 1996, cited by the FCC, states that the FCC “shall” take action to promote broadband deployment, but “falls far short of such a clear statement.” View "State of Tenn. v. Fed. Commc'n Comm'n" on Justia Law

by
Plaintiffs are victims of terrorist attacks and their family members who hold substantial unsatisfied money judgments against defendants Iran, North Korea, and Syria. The money judgments arise out of claims brought under the Foreign Sovereign Immunities Act (FSIA), 28 U.S.C. 1605. In order to satisfy the judgments, plaintiffs seek to attach Internet data managed by the Internet Corporation for Assigned Names and Numbers (ICANN) and, accordingly, served writs of attachment on ICANN. The district court quashed the writs because it found that the data was unattachable under D.C. law. The court rejected ICANN’s challenge to the district court’s subject matter jurisdiction, and assumed without deciding that local law applies to the determination of the “attachability” of the defendant sovereigns’ country-code top level domain names (ccTLDs), and without so holding that local law does not operate to bar attachment of the defendant sovereigns’ ccTLDs. The court concluded that those plaintiffs seeking to attach the underlying judgments in Haim I, Weinstein and Stern have forfeited their claims in toto. Those plaintiffs seeking to attach the underlying judgments in Haim II, Rubin, Wyatt and Calderon-Cardona have forfeited all but their claim grounded in the terrorist activity exception to attachment immunity. Finally, because of the enormous third-party interests at stake - and because there is no way to execute on plaintiffs’ judgments without impairing those interests - the court cannot permit attachment. Accordingly, the court affirmed the judgment. View "Weinstein v. Islamic Republic of Iran" on Justia Law

by
Wi-LAN’s patents result from advances proposed for the WiMAX wireless network standard. In a typical wireless network, a base station connects directly to the user devices that it serves. The patents to add intermediary nodes between the base station and the user devices. Communications from the base station to a user device pass from the base station through an intermediary node to the user device; communications from a user device to the base station take the reverse path. This network architecture allowed for efficiency gains, primarily because the base station could offload some of its more resource-intensive tasks to the intermediary nodes. Wi-LAN claimed infringement by Apple’s iPhone operating on a 4G network. Based on several claim constructions, the district court granted Apple summary judgment of noninfringement. The Federal Circuit affirmed, upholding the court’s construction of the term “specified connection” and the term “UL connections.” View "WI-LAN USA, Inc. v. Apple Inc." on Justia Law

by
O’Kroley googled himself and found “Texas Advance Sheet,” followed by “indecency with a child in Trial Court Cause N . . . Colin O’Kroley v Pringle.” O’Kroley was never involved in an indecency case; his case was listed immediately after such a case, on a service that summarizes judicial opinions. If users clicked the link they would see that the cases were unrelated. Claiming “severe mental anguish,” O’Kroley sued Google for $19,200,000,000,000, asserting “libel,” “invasion of privacy,” “failure to provide due process,” “cruel and unusual punishment,” “cyber-bullying,” and “psychological torture.” The court dismissed, citing the Communications Decency Act, which insulates interactive computer services from certain lawsuits, 47 U.S.C. 230. The Sixth Circuit affirmed. Google is an interactive computer service, providing “access by multiple users to a computer server,” not the publisher or speaker of the allegedly defamatory content. A separate “entity [was] responsible . . . for the [content’s] creation.” Google cannot be held liable for merely providing access to, and reproducing, the allegedly defamatory text. “ Google performed some automated editorial acts on the content, such as removing spaces and altering font, and kept the search result up even after O’Kroley complained; these acts come within “a publisher’s traditional editorial functions.” View "O'Kroley v. Fastcase, Inc" on Justia Law

by
Microsoft appealed from the district court's order denying its motion to quash a warrant issued under section 2703 of the Stored Communications Act (SCA), 18 U.S.C. 2701 et seq., and holding Microsoft in contempt of court for refusing to execute the warrant on the government’s behalf. The warrant directed Microsoft to seize and produce the contents of an e‐mail account - an account believed to be used in furtherance of narcotics trafficking - that it maintains for a customer who uses the company’s electronic communications services. Microsoft produced its customer’s non‐content information to the government, as directed. That data was stored in the United States. But Microsoft ascertained that, to comply fully with the warrant, it would need to access customer content that it stores and maintains in Ireland and to import that data into the United States for delivery to federal authorities. The court concluded that Congress did not intend the SCA’s warrant provisions to apply extraterritorially. The focus of those provisions is protection of a user’s privacy interests. Accordingly, the SCA does not authorize a United States court to issue and enforce an SCA warrant against a United States‐based service provider for the contents of a customer’s electronic communications stored on servers located outside the United States. Therefore, the court concluded that the district court lacked authority to enforce the warrant against Microsoft. The court reversed the denial of the motion to quash because Microsoft has complied with the warrant’s domestic directives and resisted only its extraterritorial aspect; vacated the finding of civil contempt; and remanded with instructions to the district court to quash the warrant insofar as it directs Microsoft to collect, import, and produce to the government customer content stored outside the United States. View "Microsoft v. United States" on Justia Law

by
Facebook filed suit against Power over a promotional campaign where Power accessed Facebook users’ data and initiated form emails and other electronic messages promoting its website. The court concluded that Power did not violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM), 15 U.S.C. 7706(g)(1), because neither e-mails nor internal messages sent through Power’s promotional campaign were materially misleading. Therefore, the court reversed the district court's judgment as to this claim and remanded for entry of judgment for defendants. The court held that a defendant can run afoul of the Computer Fraud and Abuse Act of 1986 (CFAA), 18 U.S.C. 1030(a)(2)(C), when he or she has no permission to access a computer or when such permission has been revoked explicitly. The court also held that a violation of the terms of use of a website - without more - cannot be the basis for liability under the CFAA. In this case, after receiving the cease and desist letter from Facebook, Power intentionally accessed Facebook’s computers knowing that it was not authorized to do so, making Power liable under the CFAA. Therefore, the court affirmed in part the holding of the district court with respect to the CFAA. The court also affirmed in part the district court’s holding that Power violated California Penal Code section 502 where Power knowingly accessed and without permission took, copied, and made use of Facebook’s data; affirmed the district court’s holding that Power's CEO, Steven Vachani, is personally liable for Power’s actions; and affirmed the discovery sanctions imposed against Power for non-compliance during a Rule 30(b)(6) deposition. However, the court vacated the injunction and the award of damages, remanding the case to the district court to reconsider appropriate remedies. View "Facebook, Inc. v. Vachani" on Justia Law