Trespass to Chattels: eBay and Intel Richard Warner.

Slides:



Advertisements
Similar presentations
Warranties, Product Liability and Consumer Law
Advertisements

Engineering Ethics* What is engineering ethics?
Tutorial for Conversion Question 2 Presented by: Ruby Tong ( ) Paul Tsang ( )
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Foundations of Australian Law Fourth Edition Copyright © 2013 Tilde Publishing and Distribution Chapter 7 Defamation, nuisance & trespass.
AGREEMENT DECLARED VOID
Our today’s topic Law of Sales of Goods
Chapter 16 Lesson 1 Civil and Criminal Law.
Click Wrap Contracts Richard Warner.  Web sites typically contain an agreement defining the terms on which the web site may be used.  In many cases,
© and The Internet Copyright Law applies to materials found on the internet to the same extent it applies to materials in traditional formats.
1 Keys for Chapter 5 Keys for Chapter 5 1. Do you think the insurance company should pay the claim to the insured? Why? Yes, the insurance company should.
ISP Liability for Defamation and Copyright Violation Richard Warner.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Riverside Community School District
Trespass to Chattels Intro to IP – Prof Merges
Trademark Inringement Intro to IP – Prof Merges
Intellectual Property Boston College Law School January 31, 2007 Copyright – Indirect Liability.
Chapter 14 Legal Aspects of Sport Marketing
Acceptance Definition: The final expression of agreement (assent) to the terms of an offer.
Chapter 121 Termination of an Offer By Offeror By Offeree Revocation Prior to Acceptance* Death or Incapacity Time Limitations Placed in the Offer Rejection.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
Chapter 9 Fundamental Legal Principles
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
TOPIC – Liability for Software Failure MBA 8520 – Management and Application of Information Technology.
Hofstra University Zarb School of Business Department of Accounting, Taxation, and Legal Studies ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Assistant Professor Glen.
Legal Principles of Insurance Chapter 9. Agenda Recall topics learned in your insurance or business law class to better understand this chapter Principle.
Business Law. Your neighbor Shana is using a multipurpose woodcutting machine in her basement hobby shop. Suddenly, because of a defect in the two-year.
Trademark II Infringement. Article 57 Infringement Article 57 Any of the following conduct shall be an infringement upon the right to exclusively use.
The Case for The Right to Prevent Access Richard Warner.
Business Law Chapter 13: Business Law in the Internet Era.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Event Management & ITIL V3
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
DOE V. NORWALK COMMUNITY COLLEGE, 248 F.R.D. 372 (D. CONN. 2007) Decided July 16, 2002.
Antitrust. “Is there not a causal connection between the development of these huge, indomitable trusts and the horrible crimes now under investigation?
The Case Against eBay Richard Warner. Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
FORMATION OF CONTRACTS: OFFER AND ACCEPTANCE Used by permission. For Educational purposes only.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 13 Contracts: Offer and Acceptance Twomey Jennings Anderson’s.
CHAPTERCHAPTER McGraw-Hill/Irwin©2008 The McGraw-Hill Companies, All Rights Reserved Compensatory and Related Damages THIRTEENTHIRTEEN.
Chapter 12 Contract Discharge and Remedies for Breach.
Property Ownership Chapter 10. Motor Vehicle Ownership Real Property – land and permanent attachments. Personal Property – Anything that is not permanently.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
Trespass, Computers, and Networks. Scattered data Collected organized data Benefits at least some consumers The Generic Fact Pattern.
Legal Implications of Interconnectivity William Fisher July 4, 2002 © All rights reserved.
Legal Disclaimers Accuracy Every effort is made to provide information that is accurate. However any information contained in this website or the “article.
Lecturer: Miljen Matijašević G10, room 6, Tue 11:30-12:30 Session 4.
FABRIZIO MONCALVO Case analysis. Case Analysis  Where the services of an intermediary, such as an operator of a website, have been used by a third party.
Terms of Service Agreements What does the fine print really contain?
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
Defamation.  The act of making statements or suggestions that harm someone's reputation in the community. (Cambridge,2010) What is defamation?
GOULD’S “MCQ’s in the MORNING” Multiple Choice Program: CONTRACT LAW QUESTIONS, © 2012 GOULD’S LEGAL EDUCATION, ALL RIGHTS RESERVED.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
EBay and Intel. eBay v. Bidder’s Edge eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the.
Do we need a tort of cyber-trespass? Steve Hedley SLS Cyberlaw 8/9/2005.
Chapter 8 Strategies for Marketing, Sales, and Promotion Electronic Commerce.
Personal Injury Laws Objective: Distinguish a crime from a tort Discuss the elements of a tort Explain when a person is responsible for another’s tort.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
1 The Nature of Ethics Ethics is generally concerned with rules or guidelines for morals and/or socially approved conduct Ethical standards generally apply.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Copyright © 2017 Pearson Education, Inc. All rights reserved. Chapter 9 Fundamental Legal Principles.
Fundamental Legal Principles
Trespass in the Spam Cases
Update on the Computer Fraud and Abuse Act
Speaker: Sarah Chambers, Esq. Claims Counsel| Professional Liability
Feeling Exhausted? Patent Exhaustion after Lexmark
Intent of Torts: Trespass
Civil Law 3.5 Defenses to Torts
Presentation transcript:

Trespass to Chattels: eBay and Intel Richard Warner

Three Questions  First: to what extent does one impliedly consent to access by the general public when one connects a publicly accessible system to the Internet?  Second: can one always revoke consent by notifying third parties that their access is unauthorized?  Third: when does access by a third party impair value or harm a relevant interest?

eBay v. Bidder’s Edge  The leading case is eBay v. Bidder’s Edge.  eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the status of auctions.  eBay is by far the largest of hundreds of similar sites.

eBay v. Bidder’s Edge  The large number of sites creates a dilemma for buyers.  Should a buyer search one site, or a few sites, and settle for the best combination of price and quality the limited search reveals?  Or, is a broader search worth the extra effort?  Bidder’s Edge solves this dilemma.

The eBay Fact Pattern  Bidder’s Edge allows a buyer to perform a single search on its site, where that search yields a list of all relevant items for sale on over one hundred other auction sites.  Bidder’s Edge accomplishes this feat through software robots–often called “spiders”–that automatically search the Internet for relevant information.

Revocation of Consent  “On November 9, 1999, eBay sent BE a letter reasserting that BE's activities were unauthorized, insisting that BE cease accessing the eBay site, alleging that BE's activities constituted a civil trespass and offering to license BE's activities.”

The Court on Consent  “BE argues that it cannot trespass eBay's web site because the site is publicly accessible. BE's argument is unconvincing.”  “eBay's servers are private property, conditional access to which eBay grants the public.”

The Court on Consent  “eBay does not generally permit the type of automated access made by BE. In fact, eBay explicitly notifies automated visitors that their access is not permitted.”  “Moreover, eBay repeatedly and explicitly notified BE that its use of eBay's computer system was unauthorized.”  Bidder’s Edge continued to attempt to access the eBay site.

Like CompuServe?  This looks like the CompuServe fact pattern; we have intentional, unauthorized access.  But does the access impair the value of eBay’s computers, or harm some relevant legally protected interest?  The court holds that the access impairs value.

Bidder’s Edge’s Argument Against  “BE argues that its searches represent a negligible load on plaintiff's computer systems, and do not rise to the level of impairment to the condition or value of eBay's computer system required to constitute a trespass.”

Impairment of Value  “However, it is undisputed that eBay's server and its capacity are personal property,  and that BE's searches use a portion of this property.  Even if... its searches use only a small amount of eBay's computer system capacity, BE has nonetheless deprived eBay of the ability to use that portion of its personal property for its own purposes.  The law recognizes no such right to use another's personal property” (emphasis added).

The Breadth of the Right  Consider: Any access to a server for any purpose uses some portion of that personal property for that purpose.  Thus: any unauthorized use impairs value.  So: a system owner can turn any access into a trespass simply by informing the other party that such access is no longer authorized.

Buchanan Marine v. McCormack Sand  The defendant moored its barges to the buoy the plaintiff built and maintained for use by its tugboats. (743 F. Supp. 139 (1991)).  The court found a trespass to chattels and issued an injunction without requiring the plaintiff of show any harm other than being deprived of the use of its property.  It did not matter whether the plaintiff desired to use the buoy at the time the defendant was using them.

Private Property  It was the potential deprivation that mattered.  The buoy did not become available for use by others as soon as the owner was not using it.  To hold otherwise would be inconsistent with the fact that the buoy is private property.  An owner of private property has the right, within broad limits, to decide that no one shall use the property.

 Linking is another source of trespass to chattels claims—although creating a link is not a trespass  Mere creation involves no access; access occurs when one uses the link.  So how is trespass relevant? Linking and Trespass

 Y rents factory space from X. The space contains a machine that Y wants to use, but, X and Y cannot agree on rental terms, so X locks the switch that starts the machine.  Jones, a former employee of X, obtains the key and, without any authorization, unlocks the switch knowing that Y will use the machine, which Y does.  Jones is liable for trespass to chattels as he intentionally and foreseeably contributed to the unauthorized use of the machine. An Analogy

Linking and Trespass  Links are similar.  The linking site knowingly and intentionally facilitates access to the linked-to system.  The access uses some of the system’s computer capacity, hence, if the access is unauthorized, it impairs value (according to eBay).

Intel v. Hamidi  Hamidi, a former Intel employee, sent s to current employees criticizing Intel’s employment practices.  On each of six occasions, he sent up to 35,000 s, despite Intel’s demand that he stop.  This is intentional, unauthorized access.  Does it impair value or harm a relevant interest?

No Impairment of Value  The majority held that the s did not impair the value of Intel’s system.  The amount of was relatively small and did not slow down or shut down Intel’s system.  This holding rejects the eBay approach. The mere use of another’s computing capacity is not sufficient to impair value.

No Harm To A Relevant Interest  The majority also held that Hamidi’s access did not harm any legally protected interest appropriately related to that system.  In the spam cases, courts have counted an ISP’s loss of business reputation and customer goodwill as a relevant harm.  But in those cases, the harm arose from the number of messages; here it arises from their content. The court thinks that this means the harm is not appropriately related to the chattel.

Which Approach Is Best?  Should we follow eBay or Intel?  We can begin by seeing what influenced the Intel court.