Best Practices for Online Service Providers The Communications Decency Act and Accusations of Defamation and Other Bad Behavior Marcia Hofmann, Staff Attorney.

Slides:



Advertisements
Similar presentations
Legal Issues Involved in Blogging Jonathan D. Frieden, Esq. ODIN, FELDMAN & PITTLEMAN, P.C.
Advertisements

What Every Business Owner Needs to Know About the Legal Risks of Blogging November 17, oclock Seminar, NAWBO Silicon Valley Chapter By Kristie Prinz,
What You’ll Learn How to define negligence (p. 88)
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
4. Intellectual Property and Ethics on the Web 59.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Business Law Tort Law.
Legal Liability under the Digital Millennium Copyright Act and the Communications Decency Act Presented by Daliah Saper Saper Law Offices, LLC.
Social Media: Battling the Modern Day Medusa Chad Ray Donnahoo Campbell Shatley, PLLC 674 Merrimon Ave., Suite 210 Asheville, NC 28804
Chapter 4 Legal Liability
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
CIVIL & CRIMINAL LIABILITY Staff Development Emergency Operations Volunteer Training Legal Issues:
ISP Liability for Defamation and Copyright Violation Richard Warner.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Facebook: teaching, communicating and collaborating Tony Brett Head of IT Support Staff Services OUCS Tuesday 6 November 2007.
Tort Liability in New Media Steve Baron Nov. 2, 2010.
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
Standards and Guidelines for Web Page Publishing December 9, 2009.
By : Lillie Gray 1 st period Business Law Exam.  Crime- an offense against the public at large, which is therefore punishable by the government.  Tort-
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
10 Privacy Settings Every Facebook User Should Know.
Contract Services to Google/Microsoft James L. Turk CAUT Council November 27, 2011.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Defamation and the Communications Decency Act Jennifer.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
Chapter 4- The Law of Torts
Law and Community Journalism Recent Issues March 12, 2009.
Tort Liability in New Media Steve Baron April 2, 2009.
Intermediary Liability: to block or not to block? Ashley Hurst.
Social Media, Libraries, and the Law Thursday, March 17, 2011 Time: 12:00pm to 1:00pm Speaker: Mary Minow.
Chapter 17 E-Commerce and Digital Law
Social Networking Law.
Traffic Control & Tort Liability
2 TORT Means“Wrong” 3 TORT A violation of a duty imposed by civil law.
Internet Content Liability David S. Bralow CUNY October 15, 2012.
Against: The Liberal Definition and use of Litigation Holds Team 9.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
PREVENTIVE LAW WORKSHOP Managing Difficult Personnel Situations Mary Elizabeth Kurz, Vice Chancellor and General Counsel Dianne Sortini, Director, Employee.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Cyber law AMAZON NOT LIABLE FOR POSTING NEGATIVE COMMENTS ABOUT BOOK AUTHOR By R. Higgins, N. Woodman & B. Byard.
Tort Cases in New Media From steve baron’s notes.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
Promotion & Enforcement FDA’s Social Media Guidance.
Legal Disclaimers Accuracy Every effort is made to provide information that is accurate. However any information contained in this website or the “article.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Libel Different types, how to avoid it This is how you keep your job.
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Terms of Service Agreements What does the fine print really contain?
PA 401 Advanced Legal Writing.  Two discussion boards  Read chapter 7  Office hours are Friday from 1pm – 3pm EST  Last seminar: Wednesday, February.
The Internet and freedom of expression law Training workshop on media and freedom of expression law.
Data protection—training materials [Name and details of speaker]
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Agents of Harm or Agents of Grace The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World By Thomas A. Lipinski,
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 6-1 Lesson Objectives
Bullying and Harassment
Kathy Olson Lehigh University
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Liability Under CERCLA
Legal & Ethical Issues in News
Chapter 6-1 Lesson Objectives
Tort Liability in New Media
Defensive Medicine Debate
Presentation transcript:

Best Practices for Online Service Providers The Communications Decency Act and Accusations of Defamation and Other Bad Behavior Marcia Hofmann, Staff Attorney EFF Bootcamp May 11, 2009

So you’re hosting content from third parties… oWhat kinds of legal problems arise when your web site hosts user – generated content?

So you’re hosting content from third parties… oWhat kinds of legal problems arise when your web site hosts user – generated content? oCan your company be held liable for unlawful material that others post on your site?

So you’re hosting content from third parties… oWhat kinds of legal problems arise when your web site hosts user – generated content? oCan your company be held liable for unlawful material that others post on your site? oDo you have any obligation to police user–generated content?

So you’re hosting content from third parties… oWhat kinds of legal problems arise when your web site hosts user– generated content? oCan your company be held liable for unlawful material that others post on your site? oDo you have any obligation to police user–generated content? oCan you alter content that users post on your site? If so, how much?

Common user – generated content problem (1) User posts nasty or inflammatory statements about another person, company or product on your site.  Yelp restaurant reviews, Amazon product reviews, comments in response to blog postings. Risk: target of comments threatens to or actually sues the user and/or your company for defamation.

Common user – generated content problem (2) User posts another person’s private information on your site.  Personally identifying information (name, address, SSN), pornographic or otherwise private photos or videos. Risk: subject threatens to or actually sues the user and/or your company for invasion of privacy.

Common user – generated content problem (3) User solicits in a discriminatory manner on your site.  Craigslist ad for a roommate that says people of a certain religion need not apply. Risk: subject threatens to or actually sues the user and/or your company for discrimination, e.g., under the federal Fair Housing Act.

Communications Decency Act 47 U.S.C. § 230 “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”

Communications Decency Act 47 U.S.C. § 230 “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” “ No cause of action may be brought and no liability may be imposed under any State or local law that is inconsistent with this section. ”

Elements Section 230 immunity requires that: othe defendant be a provider or user of an interactive computer service, othe cause of action treat the defendant as a publisher or speaker of information, and othe information be provided by another information content provider.

What’s a “provider or user of an interactive computer service”?  Traditional ISPs  Web site operators (including bloggers)  Listserv operators  Social networking services  Search engine operators  Users of online services A broad variety of online publishers.

What kinds of claims can Section 230 protect against?  Defamation  Unfair competition  Invasion of privacy  Negligence  Breach of contract  Federal civil rights claims  State criminal claims  Infliction of emotional distress A wide range.

Limitations Section 230 doesn't protect against: oFederal criminal laws oState or federal electronic communications privacy laws oIntellectual property claims (split of authority) oDoesn’t apply to federal claims, but immunizes against state claims. Perfect 10, Inc. v. CCBill LLC, 488 F.3d 1102, 1119 (9th Cir. 2007). oDoesn’t apply to state or federal claims. Doe v. Friendfinder Network, Inc., 540 F. Supp. 2d 288, 302 (D. N.H. 2008); Atlantic Recording Corp. v. Project Playlist, Inc., No. 08–3922, 2009 U.S. Dist. LEXIS 24912, at *35 (S.D.N.Y. March 25, 2009).

Limitations You can select, withdraw, or edit user content, but immunity may not apply if you significantly change or contribute to the meaning of the content. Keep in mind Fair Housing Council of San Fernando Valley v. Roommates.com, 521 F.3d 1157 (9th Cir. 2008), in which county fair housing councils sued operator of roommate matching web site, alleging violations of housing discrimination laws.

Roommates.com oNo immunity for requiring users to answer allegedly unlawful questionnaire during registration process. Site found to be information content provider of questions. oNo immunity for requiring users to answer allegedly unlawful profile questions by selecting allegedly unlawful answers provided in a pull–down menu. Site found to develop content. oNo immunity for providing search and notification systems to direct content according to discriminatory criteria. oHowever, immunity for “additional comments” text box.

Policing content Efforts to police content are irrelevant for purposes of Section 230 immunity. However, if your company represents that it handles content a certain way, be sure to follow through. See Barnes v. Yahoo!, No. 05–00926(9th Cir. May 7, 2009).

Best practices oIt’s OK to edit user content, but be careful not to “develop” it. oIf someone threatens to sue your company for publishing content protected by Section 230, send a letter explaining that your company has immunity, which may help avoid suit. A company should work with an attorney to develop a form letter for such situations.

Best practices oEven when you’re not legally required to police or remove disputed content, you should adopt internal policies for addressing complaints. oDon’t promise to take down content if you don’t intend to do so. Follow any promises you make in your privacy policy or terms of service.

For more information EFF’s Legal Guide For Bloggers Marcia Hofmann, Staff Attorney Electronic Frontier Foundation