October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Defamation and the Communications Decency Act Jennifer.

Slides:



Advertisements
Similar presentations
ITS BETTER TO BE AN OUTLAW THAN AN IN- LAW. AT LEAST OUTLAWS ARE WANTED. Media Law.
Advertisements

Torts True or False Torts Defined Torts Completion.
The Law of Torts Chapter 4. The Corner Cafe Characters: Jamila ………………….Ms. Walton Thai …………………….Jacoy Daniel …………………. Peggy ………………….Kerisha.
I’ll sue!! TORT LAW Introduction TortTort is the French word for a “wrong.” Tort law protects a variety of injuries and provides remedies for them.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Business Law Tort Law.
Legal Liability under the Digital Millennium Copyright Act and the Communications Decency Act Presented by Daliah Saper Saper Law Offices, LLC.
Law I Chapter 18.
Social Media: Battling the Modern Day Medusa Chad Ray Donnahoo Campbell Shatley, PLLC 674 Merrimon Ave., Suite 210 Asheville, NC 28804
Chapter 3 Tort Law.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
2 Crimes & Torts Crimes Intentional Torts
ISP Liability for Defamation and Copyright Violation Richard Warner.
Tort Liability in New Media Steve Baron Nov. 2, 2010.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Defamation and Civil Libel JOUR3060 Communication Law & Regulation.
First Amendment to the Constitution Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 9 Torts Twomey Jennings Anderson’s Business Law and the Legal.
Chapter 4- The Law of Torts
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 4 Torts and Cyber Torts.
Chapter 4 Torts and Cyber Torts
What is a tort? What is a tort? What is the purpose of tort law? What are the two basic categories of torts? What is the purpose of tort law? What are.
Social Media: Marketing and the Legal Risks Training Session One: The Social Media Playbook Matthew Spanovich & Eric Wiechman December 2, 2011 Spanovich.
TORTS Chapter 6.
Defamation: Written or verbal statements that lower a person’s good reputation in the eyes of the community.
Best Practices for Online Service Providers The Communications Decency Act and Accusations of Defamation and Other Bad Behavior Marcia Hofmann, Staff Attorney.
Tort Liability in New Media Steve Baron April 2, 2009.
Defamation and defences Chapter 8.3 Sticks and stones may break your bones, but names can never harm you.’ What does this children’s chant mean and why.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 6 School Personnel.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Traffic Control & Tort Liability
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
2 TORT Means“Wrong” 3 TORT A violation of a duty imposed by civil law.
By Kelly Marken CIVIL LAW & LAWSUITS. WHEN YOU TURN 18 YOU CAN SUE AND BE SUED IN A CIVIL COURT.
Internet Content Liability David S. Bralow CUNY October 15, 2012.
LS 500 Unit Nine Town Hall Saturday, February 11, 2012 John Gray Welcome! Are there any questions about the material.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
The Law of Torts.
Media Law. Media law You are the online editor of your campus newspaper. A person using a pseudonym has posted a message on your website that could be.
LAW OF TORTS QUESTION ONE (a)State the difference between intentional and unintentional tort. Illustrate your answer with examples. (b)Explain briefly.
 Crime – _______________________________ _______________________________________  Elements of a Crime: › A duty to do or not to do a certain thing ›
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Libel Different types, how to avoid it This is how you keep your job.
Chapter 4 The Law of Torts. Tort One person’s interference with another’s rights, either through intent, negligence, or strict liability. Tortfeasor:
Terms of Service Agreements What does the fine print really contain?
Document Number© 2015 GARFUNKEL WILD, P.C. Protecting Online Reputations: Surviving and Prospering in the Online World October 15,
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
Torts: A Civil Wrong Chapter 18. The Idea of Liability Under criminal law, wrongs committed are called crimes. Under civil law, wrongs committed are called.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
TORTS: A CIVIL WRONG Chapter 18. TORTS: A CIVIL WRONG Under criminal law, wrongs committed are called crimes. Under civil law, wrongs committed are called.
Damage to Reputation: Defamation, slander and libel.
Agents of Harm or Agents of Grace The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World By Thomas A. Lipinski,
By: John G. Kruchko, Esq. September 12, 2011 Kruchko & Fries © 2011 Privileged and Confidential 1.
Defamation: Common-Law Defenses and Privileges 1. The Truth Defense 2. Absolute Privileges a. Judicial Proceedings b. Legislative Business c. Executive.
Chapter 9: Internet Law, Social Media, and Privacy
The Law of Torts I’m going to sue you!.
Civil Law An overview of Tort Law – the largest branch of civil law
Kathy Olson Lehigh University
Legal & Ethical Issues in News
Tort Liability in New Media
Law For Personal And Business Use
Media Law.
Nuisance – Elements Nuisance is the cause of action you use when someone is interfering with your right to enjoy your property; but trespass is not applicable.
Presentation transcript:

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Defamation and the Communications Decency Act Jennifer Lloyd Kelly, Fenwick & West, LLP Marcia Hofmann, EFF

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Presenters Jennifer Lloyd Kelly, Litigation Associate, Fenwick & West LLP –Practice focuses on intellectual property and commercial disputes, primarily for local technology companies. Marcia Hofmann, Staff Attorney, EFF –Practice focuses on information-related policy and litigation.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Overview What kinds of problems arise when your website has user-generated content? Basics of defamation law – which kinds of statements could subject the user (and potentially your company) to liability? Communications Decency Act Section 230 – what steps you can take to protect yourself from liability.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #1 User posts nasty or inflammatory statements about another person, company, or product on your website. Examples: eBay seller reviews, Amazon product reviews, statements on blogs, message boards, and discussion forums. Risk: subject of statements is offended and threatens to or actually sues for defamation.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem # 1 Example

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #2 User posts another person’s private information – personally identifying information (name, address, SSN), saucy photographs, pornographic or otherwise private videos.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #2 Example Barnes v. Yahoo: –Woman’s ex-boyfriend created and posted unauthorized “profiles” about her on Yahoo’s website that contained nude photographs and contact information, and, while impersonating her, solicited men for sex in chat rooms. –Woman contacted Yahoo and demanded the offending materials be removed. Yahoo agreed to do so, but did not actually remove them until after she filed lawsuit. –Lawsuit premised on this failed promise.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #3 User solicits in a discriminatory manner. Examples: –Person posts housing ad on Craig’s List that allegedly violates the federal Fair Housing Act. –Company runs roommate matching service that allows users to advertise openings for roommates, which provides structured data fields with pull down menus.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #3 Example

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 User-Generated Content – Common Problem #4 Employee uses company /computer/network to send s and post information that threatens or harasses others. Example: Delfino v. Agilent (using his work computer, employee of Agilent sent s and posted information that harassed plaintiff).

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Defamation Elements of claim: –A statement about a person to someone other than that person –That is a false statement of fact –Which tends to harm the reputation of the person

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Defamation Per se defamation: harm to reputation is presumed– –Attacks on a person’s professional character or standing –Allegations that an unmarried person is unchaste –Allegations that a person has an STD –Allegations that a person has committed a crime of moral turpitude (murder, adultery)

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Defamation Important limitations/defenses: –Statement must actually be false. –Statement must be of a verifiable fact, not an opinion (“George stole the painting” vs. “That painting is hideous” or “George is a fool”). –Public figures must prove “actual malice.” –Privilege for certain types of statements made in official proceedings or public meetings

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Defamation Republication: –Absent immunity, anyone who repeats or republishes a defamatory statement made by another can be held liable for defamation if they knew or had reason to know the statement was defamatory.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Content From Third Parties Can your company be held liable for unlawful material that users post on its website? Do you have any obligation to police user- generated content? Can you alter content that users post on your site? If so, how much?

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Communications Decency Act Section 230 “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Communications Decency Act Section 230 “No cause of action may be brought and no liability may be imposed under any State or local law that is inconsistent with this section.”

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 History of Section 230 Much of the Communications Decency Act has been found unconstitutional, but Section 230 still survives. Congress passed Section 230 to encourage the growth of the Internet and keep government interference to a minimum.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Elements Section 230 immunity requires that: –the defendant be a provider or user of an interactive computer service, –the cause of action treat the defendant as a publisher or speaker of information, and –the information be provided by another information content provider.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 What’s a “provider or user of an interactive computer service”? A broad variety of online publishers. Examples: –Traditional ISPs –Website operators (including bloggers) –Listserv operators –Users of online services

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 What kinds of suits does Section 230 protect against? A wide range of legal claims. Examples: –Defamation –Unfair competition –Invasion of privacy –Breach of contract –State intellectual property claims –Federal civil rights claims

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Limitations Section 230 doesn't apply to federal criminal claims, intellectual property claims, or electronic communications privacy laws. You can select, withdraw, or edit user content, but immunity may not apply if you significantly change the meaning of the content.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Other Things to Know Efforts to police content are irrelevant for purposes of § 230 immunity. If a situation is a close call, you should check with a lawyer.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices If someone threatens to sue your company for publishing content protected by Section 230, you can send a letter asserting that you have immunity. You might work with an attorney to develop a form letter for such situations.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 To Sum Up Section 230 protects OSPs from a wide range of claims based on content provided by others (though does not extend to federal criminal, IP, or electronic communications claims). You won’t lose immunity for selecting and editing user content, but you can’t significantly change the meaning of it.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 To Sum Up Immunity may apply regardless of whether you choose to police content on your site. Work with a lawyer to develop a form letter for Section 230 situations. If you have questions about the law or are unsure whether it protects you in a certain situation, consult an attorney.

October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Questions? Jennifer Lloyd Kelly, Associate Fenwick & West LLP Marcia Hofmann, Staff Attorney Electronic Frontier Foundation