-
1
-
-
58849148765
-
Malwebolence
-
Aug. 3, 26
-
Mattathias Schwartz, Malwebolence, N.Y. TIMES MAG., Aug. 3, 2008, at 24, 26.
-
(2008)
N.Y. Times Mag.
, pp. 24
-
-
Schwartz, M.1
-
2
-
-
79952929014
-
-
Id.
-
Id.
-
-
-
-
3
-
-
79952929866
-
-
Id.
-
Id.
-
-
-
-
4
-
-
79952934034
-
-
Id.
-
Id.
-
-
-
-
5
-
-
79952965953
-
-
Id.
-
Id.
-
-
-
-
6
-
-
79952955372
-
-
Id.
-
Id. ("In the late 1980s, Internet users adopted the world 'troll' to denote someone who intentionally disrupts online communities."). Fortuny is part of an Internet group called Anonymous. Id.; see also infra note 154 and accompanying text.
-
-
-
-
7
-
-
79952977833
-
-
Schwartz, supra note 1, at 26
-
Schwartz, supra note 1, at 26.
-
-
-
-
8
-
-
79952973240
-
-
CITIZEN MEDIA LAW PROJECT Aug. 8
-
See Doe v. Fortuny, CITIZEN MEDIA LAW PROJECT (Aug. 8, 2008), http://www.citmedialaw.org/threats/doe-v-fortuny.
-
(2008)
Doe V. Fortuny
-
-
-
9
-
-
79952941295
-
-
the interest of these men's privacy, no source will be given
-
In the interest of these men's privacy, no source will be given.
-
-
-
-
10
-
-
79952962382
-
-
Facebook: Facts & Figures for 2010, Mar. 22, Currently, approximately 100 million North Americans are members of Facebook
-
Facebook: Facts & Figures for 2010, DIGITALBUZZ BLOG (Mar. 22, 2010), http://www.digitalbuzzblog.com/facebook-statistics-facts-figures-for-2010/. Currently, approximately 100 million North Americans are members of Facebook.
-
(2010)
Digitalbuzz Blog
-
-
-
11
-
-
79952929436
-
-
Id.
-
Id.
-
-
-
-
12
-
-
71949096865
-
Law's expressive value in combating cyber gender harassment
-
See generally Danielle Keats Citron, Law's Expressive Value in Combating Cyber Gender Harassment, 108 MICH. L. REV. 373 (2009).
-
(2009)
Mich. L. Rev.
, vol.108
, pp. 373
-
-
Citron, D.K.1
-
13
-
-
79952929865
-
World Internet Usage & Population Statistics
-
last updated June 30
-
Much of the rest of the world can too. World Internet Usage & Population Statistics, INTERNET WORLD STATS, http://www.internetworldstete.com/ stats.htm (last updated June 30, 2010).
-
(2010)
Internet World Stats
-
-
-
14
-
-
3042815772
-
The online disinhibition effect
-
available at explaining why offline social controls fail online
-
See generally John Suler, The Online Disinhibition Effect, 7 CYBERPSYCHOL. & BEHAV. 321, available at http://www-usr.rider.edu/-suler/ psycyber/disinhibit.html (explaining why offline social controls fail online).
-
Cyberpsychol. & Behav.
, vol.7
, pp. 321
-
-
Suler, J.1
-
15
-
-
77955678300
-
A declaration of the independence of cyberspace
-
Feb. 8
-
See, e.g., John Perry Barlow, A Declaration of the Independence of Cyberspace, ELECTRONIC FRONTIER FOUNDATION (Feb. 8, 1996), http://homes.eff.org/ -barlow/ Declaration-Final.html;
-
(1996)
Electronic Frontier Foundation
-
-
Barlow, J.P.1
-
16
-
-
4544297848
-
Western frontier or feudal society?: Metaphors and perceptions of cyberspace
-
1216-31 discussing and critiquing the analogy between the Internet and the Wild West
-
see also Alfred C. Yen, Western Frontier or Feudal Society?: Metaphors and Perceptions of Cyberspace, 17 BERKELEY TECH. L.J. 1207, 1216-31 (2002) (discussing and critiquing the analogy between the Internet and the Wild West).
-
(2002)
Berkeley Tech. L.J.
, vol.17
, pp. 1207
-
-
Yen, A.C.1
-
17
-
-
61349084302
-
Cyber civil rights
-
62
-
Summarizing the double-edged nature of the Internet, one commentator has said, "New technologies generate economic progress by reducing the costs of socially productive activities. Unfortunately, those same technologies often reduce the costs of socially destructive activities." Danielle Keats Citron, Cyber Civil Rights, 89 B.U. L. REV. 61, 62 (2009).
-
(2009)
B.U. L. Rev.
, vol.89
, pp. 61
-
-
Citron, D.K.1
-
19
-
-
79952912844
-
-
id.
-
See id.
-
-
-
-
20
-
-
79952915894
-
-
infra notes 34-39
-
See infra notes 34-39.
-
-
-
-
21
-
-
79952981825
-
-
Schwartz, supra note 1, at 26. Fortuny, after getting death threats because of the Craigslist ad, purged his real address and phone number from the Internet
-
Schwartz, supra note 1, at 26. Fortuny, after getting death threats because of the Craigslist ad, purged his real address and phone number from the Internet.
-
-
-
-
22
-
-
79952922263
-
-
Id.
-
Id.
-
-
-
-
23
-
-
79952927758
-
Cyber warfare operations: Development and use under international law
-
137 Alternatively some websites may actively avoid tracking or collecting IP addresses; indeed, this obfuscation may be part of their allure
-
Other trolls completely wipe out their offline identities. Id. Internet Protocol ("IP") addresses can be used to identify users' locations, but they can be "spoofed" to hide the location of a user or to impersonate a different network. See Major Arie J. Schaap, Cyber Warfare Operations: Development and Use Under International Law, 64 A.F. L. REV. 121, 137 (2009). Alternatively some websites may actively avoid tracking or collecting IP addresses; indeed, this obfuscation may be part of their allure.
-
(2009)
A.F. L. Rev.
, vol.64
, pp. 121
-
-
Schaap, M.A.J.1
-
24
-
-
79952918030
-
-
Citron, supra note 14, at 118
-
See Citron, supra note 14, at 118 ("Generally, the operators of destructive websites either have information that could identify abusive posters or have made a conscious decision not to obtain or retain that information. Some website operators function as crowd leaders, influencing the mobs' destructiveness.").
-
-
-
-
25
-
-
79952949270
-
-
Id.
-
If it is possible to trace someone, such a trace is only temporary; ISPs routinely flush their data. Id.
-
-
-
-
26
-
-
79952925094
-
Web site proprietorship and online harassment
-
1008-09
-
See Nancy S. Kim, Web Site Proprietorship and Online Harassment, 2009 UTAH L. REV. 993, 1008-09 (2009).
-
(2009)
Utah L. Rev.
, vol.2009
, pp. 993
-
-
Kim, N.S.1
-
27
-
-
79952922687
-
-
Kim, supra note 19, at 1008-9
-
See Kim, supra note 19, at 1008-9;
-
-
-
-
28
-
-
79952960261
-
-
Citron, supra note 14, at 119
-
see also Citron, supra note 14, at 119.
-
-
-
-
29
-
-
79952914119
-
-
Citron, supra note 14, at 122-25
-
See Citron, supra note 14, at 122-25.
-
-
-
-
30
-
-
79952953191
-
-
The Communications Act of 1996, Pub. L. 104-104, 110 Stat. 137
-
The Communications Act of 1996, Pub. L. 104-104, 110 Stat. 137.
-
-
-
-
31
-
-
79952973659
-
-
infra Part 1V.A (describing some of the academic literature that has taken issue with the CDA)
-
See infra Part 1V.A (describing some of the academic literature that has taken issue with the CDA).
-
-
-
-
32
-
-
79952952354
-
-
note
-
In its legislative findings, Congress recognized the growing prominence of the Internet. 47 U.S.C. § 230(a)(1) (2006) ("The rapidly developing array of Internet and other interactive computer services available to individual Americans represent an extraordinary advance in the availability of educational and informational resources to our citizens."). Congress additionally acknowledged that the Internet provided an excellent forum for discussion and cultural development. § 230(a)(3). But Congress noted that legislation in this area need tread carefully, the Internet had flourished with a "minimum of government regulation." § 230(a)(4).
-
-
-
-
34
-
-
33748665804
-
-
Pub. L. No. 104-104, 110 Stat. 56
-
superseded by statute, Communications Decency Act of 1996, Pub. L. No. 104-104, 110 Stat. 56,
-
Communications Decency Act of 1996
-
-
-
35
-
-
79952928609
-
-
129 F.3d 327 4th CLr.
-
as recognized in Zeran v. America Online, Inc., 129 F.3d 327 (4th CLr. 1997).
-
(1997)
Zeran V. America Online, Inc.
-
-
-
36
-
-
79952927759
-
-
Id.; cf. 47 U.S.C. § 230(c)(1)
-
In Stratton Oakmont, plaintiff, a securities investment firm, sued Prodigy, an early Internet service provider, over allegedly libelous statements Prodigy users had made on a Prodigy-provided, financially themed message board. Id. at *1. The case hinged on whether Prodigy could be considered the "publisher" of this third-party content. Id.; cf. 47 U.S.C. § 230(c)(1).
-
-
-
-
37
-
-
79952924673
-
-
WL 323710. The case turned on Prodigy's actions and statements regarding the content of its message boards
-
Stratton Oakmont, 1995 WL 323710. The case turned on Prodigy's actions and statements regarding the content of its message boards.
-
(1995)
Stratton Oakmont
-
-
-
38
-
-
79952948414
-
-
Id. at *3
-
Id. at *3 ("[T]he critical issue to be determined by this Court is whether the ... evidence establishes a prima facie case that PRODIGY exercised sufficient editorial control over its computer bulletin boards to render it a publisher with the same responsibilities as a newspaper.").
-
-
-
-
39
-
-
79952950928
-
-
Id. at *2
-
Prodigy had previously portrayed itself as a service that "exercised editorial control over the content of messages posted on its computer bulletin boards" and likened itself to a newspaper. Id. at *2.
-
-
-
-
40
-
-
79952954503
-
-
Id. at *5
-
The court held that these express statements indicated that Prodigy exercised sufficient editorial control over the content of its message board to render it as liable as a normal newspaper would be. Id. at *5.
-
-
-
-
41
-
-
79952968859
-
-
Id.
-
The deciding factors were that Prodigy (i) held itself out to control the content of its message boards and (ii) that it implemented control over the same boards with screening software. Id.
-
-
-
-
42
-
-
79952916764
-
-
Id. at *4-5
-
Prodigy was making decisions over content, which amounted to editorial control and thus justified finding liability. Id. at *4-5.
-
-
-
-
43
-
-
79952923080
-
-
Id. at *3
-
Id. at *3.
-
-
-
-
44
-
-
62549158357
-
The legislative history of senator exon's communications decency act: Regulating barbarians on the information superhighway
-
57 explaining that the main purpose of the act was to criminalize the communication of pornographic material to minors
-
Robert Cannon, The Legislative History of Senator Exon's Communications Decency Act: Regulating Barbarians on the Information Superhighway, 49 FED. COMM. L.J. 51, 57 (1996) (explaining that the main purpose of the act was to criminalize the communication of pornographic material to minors).
-
(1996)
Fed. Comm. L.J.
, vol.49
, pp. 51
-
-
Cannon, R.1
-
45
-
-
79952945980
-
-
Id. at 59-62
-
Id. at 59-62.
-
-
-
-
46
-
-
79952907890
-
-
Id. at 59-60
-
The first defense was a "mere access" defense. Id. at 59-60.
-
-
-
-
47
-
-
79952919655
-
-
Id. at 60
-
An Internet service provider ("ISP") would not be liable as long as the provider did not create the content provided; there would be no liability without control. Id. at 60.
-
-
-
-
48
-
-
79952962795
-
-
Id. at 61-62
-
The second defense was the "good faith defense," prompted by the decision in Stratton Oakmont. Id. at 61-62.
-
-
-
-
49
-
-
79952977383
-
-
Id. at 62
-
This defense was intended to eliminate the "''Hobson's choice' between creating 'child safe' areas that expose the ISP to liability as an editor ... or publisher, and doing nothing in order to protect the ISP from liability." Id. at 62
-
-
-
-
51
-
-
79952935245
-
-
Cannon, supra note 28, at 59-62
-
Cannon, supra note 28, at 59-62.
-
-
-
-
52
-
-
79952972041
-
-
47 U.S.C. §230bXD, (3), (4) (2006)
-
Congress also articulated the policy behind these defenses: the desire to promote the continued development of the Internet, to encourage the development of technology that encourages user control over content received by users, and to incentivize the development of filtering and blocking technologies to help users choose which content they receive. 47 U.S.C. §230(bXD, (3), (4) (2006).
-
-
-
-
53
-
-
79952928610
-
-
§ 230(c)(1)
-
§ 230(c)(1).
-
-
-
-
54
-
-
79952945137
-
-
§230(c)(2)(A). These two subsections are respectively, the "mere access" and "good faith" defenses. See supra note 29
-
§230(c)(2)(A). These two subsections are respectively, the "mere access" and "good faith" defenses. See supra note 29.
-
-
-
-
55
-
-
79952927229
-
-
129 F.3d 327 (4th Cir. 1997)
-
129 F.3d 327 (4th Cir. 1997).
-
-
-
-
56
-
-
79952907451
-
-
Id. at 329
-
Zeran concerned posts on one of AOL's message boards, which claimed that Zeran was selling paraphernalia that made light of the thenrecent Oklahoma City bombing. Id. at 329.
-
-
-
-
57
-
-
79952958995
-
-
Id.
-
The poster gave Zeran's phone number; he received threatening phone calls -sometimes as many as one every two minutes -but could not disconnect his phone because he relied on it for work. Id.
-
-
-
-
58
-
-
79952957864
-
-
Id. at 330
-
Id. at 330.
-
-
-
-
59
-
-
79952960647
-
-
Id. at 330
-
The court first noted that any lawsuit seeking to hold a service provider liable for exercising a "publisher's traditional editorial functions -such as deciding whether to publish, withdraw, postpone, or alter content" would be barred. Id. at 330.
-
-
-
-
60
-
-
79952944717
-
-
Id. at 331
-
Zeran attempted to argue around this statutorily imposed stance by suggesting that AOL be considered a "distributor," who could be liable for defamatory statements of which it had "specific knowledge." Id. at 331.
-
-
-
-
61
-
-
79952947139
-
-
Id. at 332-33
-
The court rejected this argument: first, it held that, for the purposes of defamation, AOL was ultimately a publisher, even if it was also a distributor. Id. at 332-33
-
-
-
-
62
-
-
79952928195
-
-
Id. at 332
-
("[B]ecause the publication of a statement is a necessary element in a defamation action, only one who publishes can be subject to this form of tort liability." Id. at 332.).
-
-
-
-
63
-
-
79952903548
-
-
Id. at 330
-
If AOL was a publisher, then, under the plain language of the CDA, it could not be held liable for third-party content. Id. at 330 ("Specifically, § 230 precludes courts from entertaining claims that would place a computer service provider in a publisher's role.").
-
-
-
-
64
-
-
79952906620
-
-
Id. at 330-31
-
Finally, the court cited two Congressional policy considerations regarding ISP immunity: the threat tort suits would pose to the growth of free speech on the Internet and Congress's desire -in light of the decision in Stratton Oakmont -to encourage good-faith self-regulation. Id. at 330-31.
-
-
-
-
65
-
-
79952947547
-
-
Id. at 333
-
Id. at 333.
-
-
-
-
66
-
-
79952920087
-
-
Id. at 331-32
-
Zeran was attempting to flesh out his claim that AOL should be liable as a distributor for allegedly defamatory comments of which it had specific knowledge, i.e., comments whose defamatory nature he had given notice of. Id. at 331-32.
-
-
-
-
67
-
-
79952921453
-
-
Id. at 332-33
-
The court rejected this argument because, first, AOL could not be a distributor only for purposes of a defamation action, and, second, predicating Internet publisher liability on notice would frustrate First Amendment interests and discourage the good-faith self-regulation that the CDA favors. Id. at 332-33.
-
-
-
-
69
-
-
79952958288
-
-
Id. at 1121
-
The case featured a dating website on which an unknown third party had posted a fake profile, pictures, and telephone number of a well-known actress. Id. at 1121.
-
-
-
-
70
-
-
79952932824
-
-
Id. at 1124-25
-
The court held that although some of the allegedly defamatory material was created in response to a questionnaire created by the website, this prompting did not make the website an "information content provider," as the website did not actively create or develop the content. Id. at 1124-25.
-
-
-
-
71
-
-
79952946696
-
-
Id. at 1122
-
The court additionally emphasized the policy behind CDA immunity: "to promote the free exchange of information and ideas over the Internet and to encourage voluntary monitoring for offensive or obscene material." Id. at 1122.
-
-
-
-
72
-
-
79952976361
-
-
318 F.3d 465 3d Cir.
-
See also Green v. America Online, 318 F.3d 465 (3d Cir. 2003).
-
(2003)
Green V. America Online
-
-
-
73
-
-
79952907017
-
-
Id. at 471
-
The court there held that the plaintiffs tort claim - that AOL was negligent in not removing harmful content from its network -treated the defendant as a publisher as it attempted to hold "AOL liable for decisions relating to the monitoring, screening, and deletion of content from its network." Id. at 471.
-
-
-
-
74
-
-
67849090172
-
-
121 Cal. Rptr. 2d 703 Ct. App.
-
See Gentry v. eBay, Inc., 121 Cal. Rptr. 2d 703 (Ct. App. 2002).
-
(2002)
Gentry V. EBay, Inc.
-
-
-
75
-
-
79952975095
-
-
Id. at 707-08
-
In this case, eBay was sued for its role in the sale of sports merchandise marked with forged autographs. Id. at 707-08.
-
-
-
-
76
-
-
79952954504
-
-
Id. at 714-15
-
The court held that eBay was only a disseminator of representations made by third parties that the merchandise was authentic. Id. at 714-15.
-
-
-
-
77
-
-
79952940872
-
-
Id.
-
Thus, eBay was being sued as a publisher and through Section 230 defenses was not liable. Id.
-
-
-
-
78
-
-
79952923079
-
-
206 F.3d 980, 986 10th Cir. holding AOL not liable for false stock information available on its network because that information was developed by a third party and because attempting to hold AOL liable would treat it as a "publisher" of the information
-
See also Ben Ezra, Weinstein & Co. v. America Online Inc., 206 F.3d 980, 986 (10th Cir. 2000) (holding AOL not liable for false stock information available on its network because that information was developed by a third party and because attempting to hold AOL liable would treat it as a "publisher" of the information);
-
(2000)
Ben Ezra, Weinstein & Co. V. America Online Inc.
-
-
-
79
-
-
67649086631
-
-
528 F.3d 413 (5th Cir.), cert, denied, 129 S. Ct. 600 holding MySpace not liable for its failure to create basic safety measures to protect minors
-
Doe v. MySpace, Inc., 528 F.3d 413 (5th Cir.), cert, denied, 129 S. Ct. 600 (2008) (holding MySpace not liable for its failure to create basic safety measures to protect minors).
-
(2008)
Doe V. MySpace, Inc.
-
-
-
80
-
-
79952925495
-
-
Id. at 416
-
In MySpace, the plaintiff circumvented the website's age restrictions by lying about her age, which allowed her profile to be viewed by other users -one of whom ended up sexually assaulting her. Id. at 416.
-
-
-
-
81
-
-
79952943861
-
-
Id. at 419-20
-
The court stated that it was obvious that the plaintiff was attempting to hold MySpace liable for the content it displayed but that was actually created by the plaintiff: her profile. Id. at 419-20.
-
-
-
-
82
-
-
79952955692
-
-
supra notes 34-39
-
See supra notes 34-39.
-
-
-
-
84
-
-
79952920932
-
-
Id.
-
Id.
-
-
-
-
85
-
-
79952909698
-
-
Id. at 1162
-
Id. at 1162.
-
-
-
-
86
-
-
79952908696
-
-
Id. (quoting 47 U.S.C. § 230(f)(3) (2006))
-
Id. (quoting 47 U.S.C. § 230(f)(3) (2006)).
-
-
-
-
87
-
-
79952966384
-
-
Id. (quoting §230(f)(3))
-
Id. (quoting §230(f)(3)).
-
-
-
-
88
-
-
79952927228
-
-
Id. at 1162-63
-
Id. at 1162-63.
-
-
-
-
89
-
-
79952936569
-
-
Id. at 1163-65
-
Id. at 1163-65.
-
-
-
-
90
-
-
79952965501
-
-
Id. at 1161
-
Id. at 1161.
-
-
-
-
91
-
-
79952914951
-
-
Id.
-
Id.
-
-
-
-
92
-
-
79952961062
-
-
Id.
-
Id.
-
-
-
-
93
-
-
79952906619
-
-
d. at 1166
-
Id. at 1166.
-
-
-
-
94
-
-
79952959395
-
-
Id. at 1165
-
Id. at 1165 ("[T]he fact that users are information content providers does not preclude Roommate from also being an information content provider by helping 'develop' at least 'in part' the information in the profiles.... [T]he party responsible for putting information online may be subject to liability, even if the information originated with a user.").
-
-
-
-
95
-
-
79952967645
-
-
Id. at 1167
-
Roommates.com used drop-down menus that limited users to certain answers and thus induced users' discriminatory preferences. Id. Roommates.com was also stripped of CDA immunity for its search engine, which allowed users to perform searches based on discriminatory criteria identified in user profiles. Id. at 1167.
-
-
-
-
96
-
-
79952940452
-
-
Id. at 1167-68
-
This liability, however, would not extend to similar searches on neutral search engines, such as Google, as they are not designed to make use of unlawful criteria; finding liability in these instances would stretch the term "develop" too far because all search engines "develop" search results. Id. at 1167-68.
-
-
-
-
97
-
-
79952980966
-
-
Id. at 1166-68
-
Id. at 1166-68.
-
-
-
-
98
-
-
79952982687
-
-
Id. at 1167-68
-
Id. at 1167-68.
-
-
-
-
99
-
-
79952904918
-
-
Id. at 1169
-
Id. at 1169.
-
-
-
-
100
-
-
79952923486
-
-
Id.
-
Id.
-
-
-
-
101
-
-
77951962857
-
-
339 F.3d 1119 9th Cir.
-
The court believed this definition of development would be too broad; additionally, the court worked to distinguish the instant facts from a previous case, Carafano v. Metrosplash. com, Inc., 339 F.3d 1119 (9th Cir. 2003).
-
(2003)
Carafano V. Metrosplash. Com, Inc.
-
-
-
102
-
-
79952977832
-
-
521 F.3d
-
The Roommates.com court differentiated this earlier case, which concerned a defamatory profile posted on a dating website, by noting that, in Metrosplash. com, the allegedly libelous website was created with "neutral tools" and thus Metrosplas. com did not encourage the allegedly defamatory profile. Roommates.com, 521 F.3d at 1171.
-
-
-
-
103
-
-
79952953190
-
-
Id. at 1172
-
To become a developer, a service provider needs to make the illegal content easier to create, enhance its sting, or encourage illegality. Id. at 1172.
-
-
-
-
105
-
-
79952924674
-
-
521 F.3d at 1169 & n.23
-
See Roommates.com, 521 F.3d at 1169 & n.23.
-
-
-
-
106
-
-
79952965952
-
-
Id.
-
Id.
-
-
-
-
107
-
-
79952980490
-
-
Id. at 1169
-
Id. at 1169.
-
-
-
-
108
-
-
79952958994
-
-
Id.
-
Id.
-
-
-
-
109
-
-
79952918381
-
-
Id. at 1173
-
Id. at 1173.
-
-
-
-
110
-
-
79952915454
-
-
Id. at 1174
-
Id. at 1174.
-
-
-
-
111
-
-
79952913244
-
-
Id.
-
Id.
-
-
-
-
112
-
-
79952957863
-
-
F.3d
-
see also Chi. Lawyers' Comm., 519 F.3d at 666.
-
Chi. Lawyers' Comm.
, vol.519
, pp. 666
-
-
-
113
-
-
79952952226
-
-
Id. at 668
-
This case was very similar to Roommates.com, the main difference being that Craigslist never prompted the user with questions whereas Roomates.com used open-ended essay questions. Id. at 668.
-
-
-
-
114
-
-
79952920494
-
-
521 F.3d. at 1172 n.33
-
Roommates. com, 521 F.3d. at 1172 n.33.
-
-
-
-
115
-
-
78649811871
-
-
570 F.3d 1096, 1101-02 9th Cir.
-
See Barnes v. Yahoo!, Inc., 570 F.3d 1096, 1101-02 (9th Cir. 2009) ("[W]hat matters is whether the cause of action inherently requires the court to treat the defendant as the 'publisher or speaker" of content provided by another.").
-
(2009)
Barnes V. Yahoo!, Inc.
-
-
-
116
-
-
77951947024
-
-
333 F.3d 1018, 1037 9th Cir. Gould, J., concurring in part, dissenting in part
-
See Batzel v. Smith, 333 F.3d 1018, 1037 (9th Cir. 2003) (Gould, J., concurring in part, dissenting in part) ("Congress believed this special treatment would 'promote the continued development of the Internet and other interactive computer services'... 'largely unfettered by Federal or State regulation.'"
-
(2003)
Batzel V. Smith
-
-
-
117
-
-
79952968858
-
-
quoting 47 U.S.C. § 230(b)(1)-(2) (1996)
-
(quoting 47 U.S.C. § 230(b)(1)-(2) (1996))).
-
-
-
-
118
-
-
0040294938
-
Intentional infliction of mental suffering: A new tort
-
See generally William L. Prosser, Intentional Infliction of Mental Suffering: A New Tort, 37 MICH. L. REV. 874 (1939).
-
(1939)
Mich. L. Rev.
, vol.37
, pp. 874
-
-
Prosser, W.L.1
-
119
-
-
79952916763
-
-
Id. at 876
-
Id. at 876.
-
-
-
-
120
-
-
79952903995
-
-
Id. at 875
-
Id. at 875;
-
-
-
-
122
-
-
79952946279
-
-
Prosser, supra note 68, at 877
-
Prosser, supra note 68, at 877 (arguing that the law should not allow recovery for every hurt feeling).
-
-
-
-
123
-
-
79952968431
-
-
id.
-
See id.
-
-
-
-
124
-
-
79952976359
-
The right to minimum social decency and the limits of evenhandedness: Intentional infliction of emotional distress by outrageous conduct
-
43-44 describing the history of the tort
-
See Daniel Givelber, The Right to Minimum Social Decency and the Limits of Evenhandedness: Intentional Infliction of Emotional Distress by Outrageous Conduct, 82 COLUM. L. REV. 42, 43-44 (1982) (describing the history of the tort).
-
(1982)
Colum. L. Rev.
, vol.82
, pp. 42
-
-
Givelber, D.1
-
126
-
-
79952910925
-
-
Givelber, supra note 73 at 44-45
-
Givelber, supra note 73 at 44-45.
-
-
-
-
127
-
-
79952983091
-
-
Prosser, supra note 68, at 877-78
-
See Prosser, supra note 68, at 877-78.
-
-
-
-
128
-
-
79952972040
-
-
Id. at 878
-
Id. at 878 ("[I]n such intentional misconduct [that gives rise to liability] there is an element of outrage, which in itself is an important guarantee that the mental disturbance which follows is serious, and that it is not feigned.");
-
-
-
-
130
-
-
79952950506
-
-
Prosser, supra note 68, at 879
-
See Prosser, supra note 68, at 879.
-
-
-
-
131
-
-
79952966383
-
-
Id.
-
The emphasis here is on outrageous conduct: while the threshold for liability is quite high, the tortfeasor does not need to subjectively intend to cause harm for his conduct to be outrageous. Id.;
-
-
-
-
132
-
-
79952931131
-
-
Givelber, supra note 73, at 46
-
see also Givelber, supra note 73, at 46 ("[I]ntending to inflict serious emotional distress on another does not establish liability in the absence of outrageous conduct, [and] similarly, when the defendant behaves outrageously, the plaintiff will not usually be required to show either intention to cause distress or even a deliberate disregard of a high degree of probability that it will result.")
-
-
-
-
133
-
-
79952972443
-
-
Prosser, supra note 68, at 879
-
Outrageous conduct is an objective standard. See Prosser, supra note 68, at 879;
-
-
-
-
134
-
-
79952961482
-
-
see also Givelber, supra note 73, at 46-47
-
see also Givelber, supra note 73, at 46-47.
-
-
-
-
135
-
-
79952951783
-
-
Prosser, supra note 68, at 887
-
Prosser, supra note 68, at 887.
-
-
-
-
136
-
-
79952934033
-
-
Id.
-
Id.
-
-
-
-
137
-
-
79952908695
-
Emotional distress in tort law: Themes of constraint
-
1200-02
-
Professor Rabin has emphasized that this tort has a special policy concern for "crushing liability." Robert L. Rabin, Emotional Distress in Tort Law: Themes of Constraint, 44 WAKE FOREST L. REV. 1197, 1200-02 (2009).
-
(2009)
Wake Forest L. Rev.
, vol.44
, pp. 1197
-
-
Rabin, R.L.1
-
138
-
-
79952945978
-
Common law intentional infliction of emotional distress, assault, and battery
-
March 30
-
Jacqueline Becerra et al., Common Law Intentional Infliction of Emotional Distress, Assault, and Battery, PRAC. LITIGATOR, March 2009, at 29, 30 (noting that courts are first to decide whether a course of conduct could reasonably be interpreted as outrageous).
-
(2009)
Prac. Litigator
, pp. 29
-
-
Becerra, J.1
-
139
-
-
79952922686
-
-
HARPER ET AL., supra note 77, § § 9.1, 9.2
-
See HARPER ET AL., supra note 77, § § 9.1, 9.2 (describing several contexts and actions likely to give rise to a cause of action under the tort).
-
-
-
-
140
-
-
79952921452
-
-
Prosser, supra note 68, at 882-83
-
Prosser, supra note 68, at 882-83;
-
-
-
-
141
-
-
79952910926
-
-
HARPER ET AL., supra note 77, §9.1
-
see also HARPER ET AL., supra note 77, §9.1 ("Common carriers, telegraph companies, and other public utilities became especially vulnerable for emotional distress intentionally caused by their employees.").
-
-
-
-
142
-
-
79952979582
-
-
Id.
-
The acts of any defendant, who was in a special position to harm or harass the plaintiff, especially when such harm was likely to be particularly oppressive, are more carefully scrutinized by courts. Id.
-
-
-
-
143
-
-
79952980965
-
-
Prosser, supra note 68, at 883
-
Prosser, supra note 68, at 883.
-
-
-
-
144
-
-
79952954949
-
-
Givelber, supra note 73, at 62-63
-
Givelber, supra note 73, at 62-63.
-
-
-
-
145
-
-
79952913242
-
-
DOBBS, supra note 70, §304
-
See DOBBS, supra note 70, §304.
-
-
-
-
146
-
-
79952948413
-
-
Id.
-
Id.
-
-
-
-
147
-
-
79952907450
-
-
Givelber, supra note 73, at 46
-
Givelber, supra note 73, at 46.
-
-
-
-
148
-
-
79952969316
-
-
id. at 62-63
-
See id. at 62-63.
-
-
-
-
149
-
-
79952922262
-
-
HARPER ET AL., supra note 77, § 9.1
-
HARPER ET AL., supra note 77, § 9.1.
-
-
-
-
150
-
-
0038260135
-
-
§46 cmt. d
-
The Restatement defines "outrageous conduct" as conduct "so outrageous in character, and so extreme in degree, as to go beyond all possible bounds of decency, and to be regarded as atrocious, and utterly intolerable in a civilized community." RESTATEMENT (SECOND) OF TORTS §46 cmt. d (1965).
-
(1965)
Restatement (Second) Of Torts
-
-
-
151
-
-
79952976360
-
-
Rabin, supra note 80, at 1205-06
-
See Rabin, supra note 80, at 1205-06
-
-
-
-
152
-
-
84937179493
-
Tort law and the communitarian foundations of privacy
-
Winter 26
-
(quoting Robert C. Post, Tort Law and the Communitarian Foundations of Privacy, RESPONSIVE COMMUNITY, Winter 1999/2000, at 19, 26).
-
(1999)
Responsive Community
, pp. 19
-
-
Post, R.C.1
-
153
-
-
79952925093
-
-
id.
-
See id.;
-
-
-
-
154
-
-
79952907016
-
-
Givelber, supra note 73, at 52-53
-
see also Givelber, supra note 73, at 52-53.
-
-
-
-
155
-
-
79952941745
-
-
Rabin, supra note 80, at 1205 (asserting that LIED polices "the boundary between tolerable and unacceptable behavior")
-
See Rabin, supra note 80, at 1205 (asserting that LIED polices "the boundary between tolerable and unacceptable behavior").
-
-
-
-
156
-
-
79952963240
-
-
Id. at 1206
-
The common law has an interest in punishing only egregious breaches of social norms; otherwise, courts would be inundated with trivial lawsuits. Id. at 1206.
-
-
-
-
157
-
-
79952957444
-
-
Givelber, supra note 73
-
See generally Givelber, supra note 73.
-
-
-
-
158
-
-
79952977831
-
-
Id. at 54
-
Givelber argues that HED is unique in that it is intended to punish outrageous behavior, rather than compensate the individual harmed. Id. at 54.
-
-
-
-
159
-
-
79952946695
-
-
Rabin, supra note 80, at 1205-07
-
The tort is used as a tool for social regulation and helps signal social norms. See Rabin, supra note 80, at 1205-07.
-
-
-
-
160
-
-
79952965500
-
-
Givelber, supra note 73, at 43
-
Givelber, supra note 73, at 43.
-
-
-
-
161
-
-
79952966831
-
-
Becerra et al., supra note 81, at 30-31. The existence of this pattern of relationships reinforces the idea that the tort is used to help signal social norms
-
Some examples of these relationships are creditordebtor, insurer-insured, employer-employee. Id. For more examples of such relationships, see Becerra et al., supra note 81, at 30-31. The existence of this pattern of relationships reinforces the idea that the tort is used to help signal social norms.
-
-
-
-
162
-
-
0037644859
-
Intentional infliction of emotional distress: An old arrow targets the new head of the hate hydra
-
33 [IIED] is still developing and is sufficiently flexible to address new situations that evolve from Internet activity.... [T] he central component of the tort, determining whether the defendant's conduct is extreme and outrageous, requires a contextual analysis."
-
Catherine E. Smith, Intentional Infliction of Emotional Distress: An Old Arrow Targets the New Head of the Hate Hydra, 80 DENV. U. L. REV. 1, 33 (2002) ("[IIED] is still developing and is sufficiently flexible to address new situations that evolve from Internet activity.... [T] he central component of the tort, determining whether the defendant's conduct is extreme and outrageous, requires a contextual analysis.").
-
(2002)
Denv. U. L. Rev.
, vol.80
, pp. 1
-
-
Smith, C.E.1
-
163
-
-
79952953652
-
-
infra Part III.D
-
See infra Part III.D.
-
-
-
-
164
-
-
79952933245
-
-
See Givelber, supra note 73, at 62-75
-
See Givelber, supra note 73, at 62-75.
-
-
-
-
165
-
-
79952947138
-
-
This Note focuses on speech, as it is most relevant to this Note's discussion
-
This Note focuses on speech, as it is most relevant to this Note's discussion.
-
-
-
-
166
-
-
79952949269
-
-
HARPER ET AL., supra note 77, §9.2
-
HARPER ET AL., supra note 77, §9.2.
-
-
-
-
167
-
-
79952912843
-
-
Id.
-
Id.
-
-
-
-
168
-
-
1842624318
-
Domestic Violence and the per Se Standard of Outrage
-
183, 200, chronicling the various relationship structures that are more likely to yield outrage
-
See Merle H. Weiner, Domestic Violence and the Per Se Standard of Outrage, 54 MD. L. REV. 183, 200, 209-11 (1995) (chronicling the various relationship structures that are more likely to yield outrage).
-
(1995)
Md. L. Rev.
, vol.54
, pp. 209-211
-
-
Weiner, M.H.1
-
169
-
-
79952913243
-
-
note
-
Id. at 209-11. The difference between the public and private sphere is the expectation of peace and tranquility in one's home and with one's family -the private sphere - and the lack of this expectation in locations within the public sphere -such as at the workplace.
-
-
-
-
170
-
-
79952965090
-
-
Id.. Sometimes certain levels of abuse may even be expected or even valued at work
-
Id. Sometimes certain levels of abuse may even be expected or even valued at work.
-
-
-
-
171
-
-
0024114079
-
Employer abuse, worker resistance, and the tort of intentional infliction of intentional infliction of emotional distress
-
Id.. at 210 quoting 1
-
Id. at 210 (quoting Regina Austin, Employer Abuse, Worker Resistance, and the Tort of Intentional Infliction of Intentional Infliction of Emotional Distress, 41 STAN. L. REV. 1, 1 (1988)).
-
(1988)
Stan. L. Rev.
, vol.41
, pp. 1
-
-
Austin, R.1
-
172
-
-
79952940451
-
-
Id.. at 209
-
Id. at 209.
-
-
-
-
173
-
-
79952971614
-
-
Id.
-
Id.
-
-
-
-
174
-
-
79952978659
-
-
HARPER ET AL., supra note 77, § 9.2
-
HARPER ET AL., supra note 77, § 9.2.
-
-
-
-
175
-
-
79952912007
-
-
Id.. § 9.3. Common carriers are more akin to the private sphere than the public sphere and thus create different expectations of tolerable conduct. See Weiner, supra note 103, at 209-10
-
Id. § 9.3. Common carriers are more akin to the private sphere than the public sphere and thus create different expectations of tolerable conduct. See Weiner, supra note 103, at 209-10.
-
-
-
-
176
-
-
79952974236
-
-
HARPER ET AL., supra note 77, § 9.3
-
HARPER ET AL., supra note 77, § 9.3.
-
-
-
-
177
-
-
79952954950
-
-
Id.
-
Id.
-
-
-
-
178
-
-
79952966382
-
-
Rabin, supra note 80, at 1208
-
Rabin, supra note 80, at 1208.
-
-
-
-
179
-
-
79952903994
-
-
Id.
-
Id.
-
-
-
-
180
-
-
79952903993
-
-
Id.. Rabin argues that there is a longitudinal element to both the damages requLred and whether there is liability in the first place
-
See Id. Rabin argues that there is a longitudinal element to both the damages requLred and whether there is liability in the first place.
-
-
-
-
181
-
-
79952938254
-
-
Id.. at 1208-09
-
See Id. at 1208-09.
-
-
-
-
182
-
-
79952953189
-
-
Id.
-
Id.
-
-
-
-
183
-
-
79952977830
-
-
Givelber, supra note 73, at 74 (noting the unassuming way in which the tort developed)
-
Givelber, supra note 73, at 74 (noting the unassuming way in which the tort developed).
-
-
-
-
184
-
-
45749108247
-
Reformulating outrage: A critical analysis of the problematic tort of IIED
-
Although some have noticed that IIED is a sometimes-disfavored cause of action. See generally Note
-
Although some have noticed that IIED is a sometimes-disfavored cause of action. See generally Russell Fraker, Note, Reformulating Outrage: A Critical Analysis of the Problematic Tort of IIED, 61VAND. L. REV. 983 (2008).
-
(2008)
Vand. L. Rev.
, vol.61
, pp. 983
-
-
Fraker, R.1
-
185
-
-
79952935244
-
-
The issue of cyber-bullying has garnered its own research center. See CYBERBULLYING RESEARCH CENTER, last visited Sept. 27
-
The issue of cyber-bullying has garnered its own research center. See CYBERBULLYING RESEARCH CENTER, http://www.cyberbullying.us/ (last visited Sept. 27, 2010).
-
(2010)
-
-
-
186
-
-
79952934836
-
-
Rabin, supra note 80, at 1205
-
See Rabin, supra note 80, at 1205.
-
-
-
-
187
-
-
79952955371
-
-
570 F.3d 1096, 9th Cir
-
See Barnes v. Yahoo!, Inc., 570 F.3d 1096, 1102 (9th Cir. 2009).
-
(2009)
Barnes V. Yahoo!, Inc.
, pp. 1102
-
-
-
188
-
-
79952945977
-
Unwilling avatars: Idealism and discrimination in cyberspace
-
forthcoming manuscript at 8-10
-
See Mary Anne Franks, Unwilling Avatars: Idealism and Discrimination in Cyberspace, 19 COLUM. J. GENDER & L. (forthcoming 2011) (manuscript at 8-10), available at http://papers.ssrn.OTm/sol3/papers.cfm7abstract-id=1374533.
-
(2011)
Colum. J. Gender & L.
, vol.19
-
-
Franks, M.A.1
-
189
-
-
79952903107
-
-
generally Id. Professor Franks notes that cyberspace idealists resist regulation of the Internet -especially of speech -because any regulation can only deprive users of liberty; this argument assumes that the natural state of the Internet maximizes liberty
-
See generally Id. Professor Franks notes that cyberspace idealists resist regulation of the Internet -especially of speech -because any regulation can only deprive users of liberty; this argument assumes that the natural state of the Internet maximizes liberty.
-
-
-
-
190
-
-
79952962381
-
-
Id.. at 11-13. Franks then argues that only some enjoy the unrestrained freedom of the Internet and that others, mostly women, experience "a loss of liberty and a reentrenchment of physical restraints already unequally imposed upon them in the offline world."
-
Id. at 11-13. Franks then argues that only some enjoy the unrestrained freedom of the Internet and that others, mostly women, experience "a loss of liberty and a reentrenchment of physical restraints already unequally imposed upon them in the offline world."
-
-
-
-
191
-
-
79952972442
-
-
Id.. at 19. Thus cyberspace has never equally offered liberty to all, and legal regulation is desirable
-
Id. at 19. Thus cyberspace has never equally offered liberty to all, and legal regulation is desirable.
-
-
-
-
192
-
-
79952939109
-
-
Id.. at 21
-
Id. at 21.
-
-
-
-
193
-
-
77951943787
-
Internet Defamation as Profit Center: The Monetization of Online Harassment
-
supra Part ILA Many Internet users have been victims of, or have witnessed acts of, online harm or cyber harassment. 383
-
See supra Part ILA Many Internet users have been victims of, or have witnessed acts of, online harm or cyber harassment. See Ann Bartow, Internet Defamation as Profit Center: The Monetization of Online Harassment, 32 HARV. J.L. & GENDER 383, 392 (2009).
-
(2009)
Harv. J.L. & Gender
, vol.32
, pp. 392
-
-
Bartow, A.1
-
194
-
-
79952937406
-
-
Smith, supra note 97, at 6-7
-
Smith, supra note 97, at 6-7.
-
-
-
-
195
-
-
11344273822
-
Tort liability for abusive and insulting language
-
63
-
John W. Wade, Tort Liability for Abusive and Insulting Language, 4 VAND. L. REV. 63, 63 (1950).
-
(1950)
Vand. L. Rev.
, vol.4
, pp. 63
-
-
Wade, J.W.1
-
196
-
-
79952967644
-
-
Creator liability limits liability to the person that created the content
-
Creator liability limits liability to the person that created the content.
-
-
-
-
197
-
-
79952962794
-
-
Citron, supra note 14, at 69 (chronicling the different forms of online harm that the author and others have identified)
-
See Citron, supra note 14, at 69 (chronicling the different forms of online harm that the author and others have identified).
-
-
-
-
198
-
-
79952922685
-
-
Id.. at 70. The invasion and publication of personal information is described as a longer-termed harm
-
Id. at 70. The invasion and publication of personal information is described as a longer-termed harm.
-
-
-
-
199
-
-
79952938253
-
-
Id.. ("Victims feel a sustained loss of personal security and regularly dismantle their online presence to avoid further devastation of their privacy.")
-
Id. ("Victims feel a sustained loss of personal security and regularly dismantle their online presence to avoid further devastation of their privacy.").
-
-
-
-
200
-
-
79952973239
-
-
Id.. at 71. This harm is akin to "digital 'scarlet letters' that destroy reputations."
-
Id. at 71. This harm is akin to "digital 'scarlet letters' that destroy reputations."
-
-
-
-
201
-
-
79952957019
-
-
Id.
-
Id.
-
-
-
-
202
-
-
79952975907
-
-
Id.. at 70
-
Id. at 70.
-
-
-
-
203
-
-
79952950086
-
-
last visited Nov. 2
-
For more examples, see Richard Morgan, Revenge Porn, DETAILS, http://www.details.com/sex-relationships/porn-and-perversions/200809/ revenge-porn (last visited Nov. 2, 2010);
-
(2010)
Revenge Porn, DETAILS
-
-
Morgan, R.1
-
204
-
-
79952966830
-
OSU student faces blackmail charge
-
Sept. 28
-
Patti Weaver, OSU Student Faces Blackmail Charge, TULSA WORLD, Sept. 28, 2007, at A8.
-
(2007)
Tulsa World
-
-
Weaver, P.1
-
205
-
-
79952914557
-
-
First, victims may be dissuaded from going online. See Citron, supra note 11, at 385. Second, victims may begin to change their behavior offline for fear that online harm will manifest itself offline
-
First, victims may be dissuaded from going online. See Citron, supra note 11, at 385. Second, victims may begin to change their behavior offline for fear that online harm will manifest itself offline.
-
-
-
-
206
-
-
79952917614
-
-
Id.. Third, victims can be emotionally distressed for long periods of time Feb. 11, Finally, any of the previously discussed harms may begin to affect victims' professional reputations and their future ability to find work
-
Id. Third, victims can be emotionally distressed for long periods of time. See David Margolick, Slimed Online, PORTFOLIO (Feb. 11, 2009), http://portfolio.com/news-markets/national-news/portfolio/2009/02/11/ Two-Lawyers-Fight-Cyber-Bullying. Finally, any of the previously discussed harms may begin to affect victims' professional reputations and their future ability to find work. See
-
(2009)
Slimed Online, PORTFOLIO
-
-
Margolick, D.1
-
207
-
-
79952903105
-
Law students feel lasting effects of capricious remarks
-
Mar. 7
-
Ellen Nakashima, Law Students Feel Lasting Effects of Capricious Remarks, WASH. POST, Mar. 7, 2007, at A1.
-
(2007)
Wash. Post
-
-
Nakashima, E.1
-
208
-
-
79952921868
-
-
Citron, supra note 11, at 381-82
-
Citron, supra note 11, at 381-82.
-
-
-
-
209
-
-
79952906202
-
-
Margolick, supra note 131
-
See Margolick, supra note 131.
-
-
-
-
210
-
-
79952938252
-
-
Id.
-
Id.
-
-
-
-
211
-
-
79952940871
-
-
Id.
-
Id.
-
-
-
-
212
-
-
79952923924
-
-
Id.
-
Id.
-
-
-
-
213
-
-
79952978238
-
-
Prosser, supra note 68, at 887
-
See Prosser, supra note 68, at 887.
-
-
-
-
214
-
-
79952971613
-
-
supra Part II.B.2 (explaining the nature of outrage)
-
See supra Part II.B.2 (explaining the nature of outrage).
-
-
-
-
215
-
-
79952958593
-
-
See Wade, supra note 124, at 66-67
-
See Wade, supra note 124, at 66-67;
-
-
-
-
216
-
-
0012815237
-
Words that wound: A tort action for racial insults, epithets, and name-calling
-
discussing the development of liability for racial insults. There have even been calls to create a specific tort for abusive words
-
see also Richard Delgado, Words That Wound: A Tort Action for Racial Insults, Epithets, and Name-Calling, 17 HARV. C.R.-C.L. L. REV. 133 (1982) (discussing the development of liability for racial insults). There have even been calls to create a specific tort for abusive words.
-
(1982)
Harv. C.R.-C.L. L. Rev.
, vol.17
, pp. 133
-
-
Delgado, R.1
-
217
-
-
79952927227
-
Banning Words: A Comment on "Words that Wound,"
-
Id.. These proposals have been met with resistance, however, on First Amendment grounds exploring potential First Amendment problems with the cause of action that Professor Delgado proposes
-
See generally Id. These proposals have been met with resistance, however, on First Amendment grounds. See generally Marjorie Heins, Banning Words: A Comment on "Words that Wound," 18 HARV. C.R.-C.L. L. REV. 585 (1983) (exploring potential First Amendment problems with the cause of action that Professor Delgado proposes);
-
(1983)
Harv. C.R.-C.L. L. Rev.
, vol.18
, pp. 585
-
-
Heins, M.1
-
218
-
-
0347315060
-
Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking about You
-
A specific tort for words is unnecessary; the expansion and wider acceptance of IIED can provide the liability needed
-
see also Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You, 52 STAN. L. REV. 1049 (2000). A specific tort for words is unnecessary; the expansion and wider acceptance of IIED can provide the liability needed.
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1049
-
-
Volokh, E.1
-
219
-
-
79952965951
-
-
Wade, supra note 124, at 66-71. This logic has also extended to hotels, theaters, innkeepers, and elevators in general officer buildings
-
Wade, supra note 124, at 66-71. This logic has also extended to hotels, theaters, innkeepers, and elevators in general officer buildings.
-
-
-
-
220
-
-
79952959807
-
-
Id.. at 69
-
Id. at 69.
-
-
-
-
221
-
-
79952980489
-
-
Id.. at 66-67
-
Id. at 66-67.
-
-
-
-
222
-
-
79952960260
-
-
HARPER ET AL., supra note 77, §§9.2. 9.3 (discussing why words accompanying a trespass are more likely to be actionable and citing the right to be free of insults from those unwelcome in one's home)
-
See HARPER ET AL., supra note 77, §§9.2. 9.3 (discussing why words accompanying a trespass are more likely to be actionable and citing the right to be free of insults from those unwelcome in one's home).
-
-
-
-
223
-
-
79952930295
-
-
Id.. §9.3
-
Id. §9.3.
-
-
-
-
224
-
-
79952924666
-
-
supra notes 104-106 and accompanying text (explaining that outrage usually hinges on where the conduct was performed and that outrage is more easily found when wrongful conduct invades the private sphere)
-
See supra notes 104-106 and accompanying text (explaining that outrage usually hinges on where the conduct was performed and that outrage is more easily found when wrongful conduct invades the private sphere).
-
-
-
-
225
-
-
79952956132
-
-
Suler, supra note 12
-
See Suler, supra note 12.
-
-
-
-
226
-
-
79952933244
-
-
Id.
-
See Id.
-
-
-
-
227
-
-
79952980044
-
-
Smith, supra note 97, at 21
-
Smith, supra note 97, at 21.
-
-
-
-
228
-
-
79952915891
-
-
Suler, supra note 12
-
See Suler, supra note 12.
-
-
-
-
229
-
-
79952928194
-
-
Id.
-
See generally Id.
-
-
-
-
230
-
-
79952926800
-
-
Professor John Suler gives several reasons for these behavioral changes. Id
-
Professor John Suler gives several reasons for these behavioral changes. Id.
-
-
-
-
231
-
-
79952957441
-
-
note
-
Internet users may experience dissociate anonymity, in which they no longer feel they are themselves; invisibility; "asynchronicity" or not having to witness a counter party's immediate reaction to something; solipsistic interjection, or feeling that the social interaction is taking place solely in one's mind; dissociate imagination, a divergence between what is real and what is online; and minimizing authority, or feeling that, online, everyone is on a level playing field.
-
-
-
-
232
-
-
79952955691
-
-
Id.
-
Id.
-
-
-
-
233
-
-
79952911740
-
-
Id.
-
Id.
-
-
-
-
234
-
-
79952916315
-
-
Id.
-
Id.
-
-
-
-
235
-
-
79952936970
-
-
supra note 149
-
See supra note 149.
-
-
-
-
236
-
-
79952922261
-
-
Id.
-
Id.
-
-
-
-
237
-
-
79952923078
-
-
Citron, supra note 14, at 81-84. Professor Danielle Keats Citron argues that the Web, especially Web 2.0 platforms "create a feeling of closeness among like-minded individuals," which makes these individuals exceptionally aggressive and bold in their actions
-
Citron, supra note 14, at 81-84. Professor Danielle Keats Citron argues that the Web, especially Web 2.0 platforms "create a feeling of closeness among like-minded individuals," which makes these individuals exceptionally aggressive and bold in their actions.
-
-
-
-
238
-
-
79952937405
-
-
Id.. at 83
-
Id. at 83.
-
-
-
-
239
-
-
79952924672
-
-
Suler, supra note 12
-
See Suler, supra note 12.
-
-
-
-
240
-
-
79952969314
-
-
See SOLOVE, supra note 15, at 32-38 (describing the role that access to new, anonymous social circles plays in allowing online harm to spread)
-
See SOLOVE, supra note 15, at 32-38 (describing the role that access to new, anonymous social circles plays in allowing online harm to spread).
-
-
-
-
241
-
-
79952953188
-
-
Franks, supra note 120, at 8-10 (describing the Internet's attractive potential to shed the body)
-
See Franks, supra note 120, at 8-10 (describing the Internet's attractive potential to shed the body).
-
-
-
-
242
-
-
79952905763
-
-
Smith, supra note 97, at 25
-
Smith, supra note 97, at 25.
-
-
-
-
243
-
-
79952968857
-
-
Id.
-
Id.
-
-
-
-
244
-
-
79952912420
-
-
Id.. With the near-ubiquitous prevalence of Completely Automated Public Turing Test to Tell Computers and Humans Apart ("CAPTCHA") technology on websites, it is fair to say that false information is a continuous and, for now, intractable problem for Internet service providers. John C. Abell, Google Does Captcha One Better, WIRED Apr. 17, Identity anonymity is advantageous in that it allows people to speak more freely. Smith, supra note 97, at 25. Such anonymity, however, can also encourage increasingly outrageous conduct undeterred by the threat of identification or exposure
-
Id. With the near-ubiquitous prevalence of Completely Automated Public Turing Test to Tell Computers and Humans Apart ("CAPTCHA") technology on websites, it is fair to say that false information is a continuous and, for now, intractable problem for Internet service providers. John C. Abell, Google Does Captcha One Better, WIRED (Apr. 17, 2009), http://www.wired.com/epicenter/ 2009/04/google-goes-cap/. Identity anonymity is advantageous in that it allows people to speak more freely. Smith, supra note 97, at 25. Such anonymity, however, can also encourage increasingly outrageous conduct undeterred by the threat of identification or exposure.
-
(2009)
-
-
-
245
-
-
79952934835
-
-
Id.. at 26
-
Id. at 26.
-
-
-
-
246
-
-
79952947137
-
-
See supra note 18 and accompanying text (explaining how individuals, with extensive effort, may be able to hide who they are online)
-
See supra note 18 and accompanying text (explaining how individuals, with extensive effort, may be able to hide who they are online).
-
-
-
-
247
-
-
79952972840
-
-
Smith, supra note 97, at 26-27
-
Smith, supra note 97, at 26-27.
-
-
-
-
248
-
-
79952942615
-
-
Id.. at 27. Again, this anonymity has both positive and negative repercussions
-
Id. at 27. Again, this anonymity has both positive and negative repercussions.
-
-
-
-
249
-
-
79952943425
-
-
Id.
-
Id.
-
-
-
-
250
-
-
79952965498
-
-
note
-
Id. at 25-27. Anonymity may have other perverse results, too. Anonymity can make deception easier. Citron, supra note 14, at 124. It may allow people to say things they deeply regret later on. See Margolick, supra note 131 (reporting that the AutoAdmit posters eventually admitted remorse). Professor Daniel J. Solove has noted that anonymous posts make it more difficult to "know what information to trust and what not to trust." SOLOVE, supra note 15, at 145.
-
-
-
-
251
-
-
79952922683
-
-
Smith, supra note 97, at 42. The author argues that anonymity may leave a victim particularly terrified of and helpless to oppose content posted about them
-
Smith, supra note 97, at 42. The author argues that anonymity may leave a victim particularly terrified of and helpless to oppose content posted about them.
-
-
-
-
252
-
-
79952968430
-
-
Id.. at 44
-
Id. at 44.
-
-
-
-
253
-
-
79952960257
-
-
note
-
Id. Some have argued that anonymity may also reduce the likelihood that users can resolve conflicts over posted content through nonlegal means. Kim, supra note 19, at 1010 ("If the victim of a post is unable to identify the poster, he or she is unable to resolve any conflicts or clarify an issues in a nonlegal manner.").
-
-
-
-
254
-
-
79952912841
-
-
See supra note 160
-
See supra note 160.
-
-
-
-
255
-
-
79952969312
-
-
See SOLOVE, supra note 15, at 144, 147 (explaining that traceable anonymity already exists on the Internet)
-
See SOLOVE, supra note 15, at 144, 147 (explaining that traceable anonymity already exists on the Internet).
-
-
-
-
256
-
-
79952935243
-
-
Id.
-
Id.
-
-
-
-
257
-
-
79952965950
-
-
See Franks, supra note 120, at 8-10
-
See Franks, supra note 120, at 8-10.
-
-
-
-
258
-
-
79952953187
-
-
See SOLOVE, supra note 15, at 61. Professor Solove describes linking as one of the fastest ways that information grows on the Internet
-
See SOLOVE, supra note 15, at 61. Professor Solove describes linking as one of the fastest ways that information grows on the Internet.
-
-
-
-
259
-
-
79952924343
-
-
Id.. at 50-54
-
See Id. at 50-54.
-
-
-
-
260
-
-
79952934032
-
-
487 F.3d 701, 9th Cir., amended by 508 F.3d 1146 9th Cir
-
Perfect 10, Inc. v. Amazon.com, Inc., 487 F.3d 701, 712 (9th Cir.), amended by 508 F.3d 1146 (9th Cir. 2007).
-
(2007)
Perfect 10, Inc. V. Amazon.com, Inc.
, pp. 712
-
-
-
261
-
-
79952981394
-
-
Id.
-
Id.
-
-
-
-
262
-
-
79952932823
-
-
Id.
-
Id.
-
-
-
-
263
-
-
79952908296
-
-
Id.
-
Id.
-
-
-
-
264
-
-
79952957862
-
-
See SOLOVE, supra note 15, at 42 ("[I]n today's world, foolish deeds are preserved for eternity on the Internet.")
-
See SOLOVE, supra note 15, at 42 ("[I]n today's world, foolish deeds are preserved for eternity on the Internet.").
-
-
-
-
265
-
-
79952954948
-
-
See Part II.A
-
See Part II.A.
-
-
-
-
266
-
-
79952916762
-
-
See Franks, supra note 120, at 27
-
See Franks, supra note 120, at 27.
-
-
-
-
267
-
-
79952908295
-
-
Smith, supra note 97, at 21-24 "Unlike any other medium, the Internet permits anyone with ideas, information, or a message to reach vast numbers of people." Id. at 21.. Professor Smith notes that, in the past, the costs of distributing content increased with the size of the audience desired;
-
Smith, supra note 97, at 21-24 ("Unlike any other medium, the Internet permits anyone with ideas, information, or a message to reach vast numbers of people." Id. at 21.). Professor Smith notes that, in the past, the costs of distributing content increased with the size of the audience desired;
-
-
-
-
268
-
-
79952905762
-
-
the Internet largely eliminates this Limitation. Id. at 21-22
-
the Internet largely eliminates this Limitation. Id. at 21-22.
-
-
-
-
269
-
-
79952979128
-
-
Id.. Though the ability to reach a large group of people may be advantageous, this ability can also be used to make harassment and humiliation of others easier
-
Id. Though the ability to reach a large group of people may be advantageous, this ability can also be used to make harassment and humiliation of others easier.
-
-
-
-
270
-
-
79952924670
-
-
Id.. at 22
-
Id. at 22.
-
-
-
-
271
-
-
79952911739
-
-
Id.
-
See Id.;
-
-
-
-
272
-
-
79952948878
-
-
Part II.B.2 (noting that common carriers were often held liable for the emotional distress that passengers inflicted upon one another and for the distress their employees inflicted upon the passengers)
-
see also Part II.B.2 (noting that common carriers were often held liable for the emotional distress that passengers inflicted upon one another and for the distress their employees inflicted upon the passengers).
-
-
-
-
273
-
-
79952979129
-
-
Entities capable of controlling content include message board administrators and website proprietors
-
Entities capable of controlling content include message board administrators and website proprietors.
-
-
-
-
274
-
-
79952983090
-
-
See SOLOVE, supra note 15, at 66. The more people know about others, the argument goes, the more accurately they can gauge one another, and the more frictionless interactions will become
-
See SOLOVE, supra note 15, at 66. The more people know about others, the argument goes, the more accurately they can gauge one another, and the more frictionless interactions will become.
-
-
-
-
275
-
-
79952921451
-
-
Id.. The counter-argument is that learning out-of-context facts about another person can lead to inaccurate judgments
-
Id. The counter-argument is that learning out-of-context facts about another person can lead to inaccurate judgments.
-
-
-
-
276
-
-
79952967213
-
-
Id.. at 67. Out-of-context facts can also lead to judgments based on social stigma and other potentially irrational reasons
-
Id. at 67. Out-of-context facts can also lead to judgments based on social stigma and other potentially irrational reasons.
-
-
-
-
277
-
-
79952923077
-
-
Id.. at 70-71. Professor Solove proceeds to discuss the shaming phenomenon that can accompany online content and the potential value of such shaming
-
Id. at 70-71. Professor Solove proceeds to discuss the shaming phenomenon that can accompany online content and the potential value of such shaming.
-
-
-
-
278
-
-
79952940450
-
-
Id.. at 77-81. He argues that shaming helps enforce social norms, which are much more useful than law in keeping people in check
-
See Id. at 77-81. He argues that shaming helps enforce social norms, which are much more useful than law in keeping people in check.
-
-
-
-
279
-
-
79952908905
-
-
Id.. at 83-87. Online shaming, however, can be disproportionate to the harm, or performed for vengeance
-
Id. at 83-87. Online shaming, however, can be disproportionate to the harm, or performed for vengeance.
-
-
-
-
280
-
-
79952976771
-
-
Id.. at 94-99
-
Id. at 94-99.
-
-
-
-
281
-
-
0028367350
-
The legal regulation of genetic discrimination: Old responses to new technology
-
1
-
Richard A. Epstein, The Legal Regulation of Genetic Discrimination: Old Responses to New Technology, 74 B.U. L. REV. 1, 12 (1994).
-
(1994)
B.U. L. Rev.
, vol.74
, pp. 12
-
-
Epstein, R.A.1
-
282
-
-
79952972441
-
-
See SOLOVE, supra note 15, at 101
-
See SOLOVE, supra note 15, at 101.
-
-
-
-
283
-
-
79952926350
-
-
Id.. at 33. In addition, attacks on reputations that introduce irrelevant -e.g. medical history -or untrue considerations have little value
-
See Id. at 33. In addition, attacks on reputations that introduce irrelevant -e.g. medical history -or untrue considerations have little value.
-
-
-
-
284
-
-
79952960646
-
-
supra Part ILB (discussing the tort of IIED)
-
See supra Part ILB (discussing the tort of IIED).
-
-
-
-
285
-
-
0037483158
-
Cyberspace and the law of the horse
-
See Kim, supra note 19, at 1010-12. This Note does not discuss the argument surrounding whether non-Internet derived law should be applied to the Internet. For a discussion on that argument 1996
-
See Kim, supra note 19, at 1010-12. This Note does not discuss the argument surrounding whether non-Internet derived law should be applied to the Internet. For a discussion on that argument, see generally Frank H. Easterbrook, Cyberspace and the Law of the Horse, 1996 U. CHI. LEGAL F. 207 (1996).
-
(1996)
U. Chi. Legal F.
, vol.207
-
-
Easterbrook, F.H.1
-
286
-
-
70449468323
-
Social networking websites -A concatenation of impersonation, denigration, sexual aggressive solicitation, cyber-bullying or happy slapping videos
-
252, Social networks' reliance upon voluntary submission of user-submitted content may mean that anonymity is less of a problem on sites like Facebook, which require registration, but access anonymity will still exist, and fake profiles can still be created
-
Bruce L. Mann, Social Networking Websites -A Concatenation of Impersonation, Denigration, Sexual Aggressive Solicitation, Cyber-Bullying or Happy Slapping Videos, 17 INT'L J.L. & INFO. TECH. 252, 253 (2009). Social networks' reliance upon voluntary submission of user-submitted content may mean that anonymity is less of a problem on sites like Facebook, which require registration, but access anonymity will still exist, and fake profiles can still be created.
-
(2009)
Int'l J.L. & Info. Tech.
, vol.17
, pp. 253
-
-
Mann, B.L.1
-
287
-
-
79952945135
-
-
Man Libelled Ex-Pal on Facebook, SKYNEWS (July 24, 2008)
-
See, e.g., Man Libelled Ex-Pal on Facebook, SKYNEWS (July 24, 2008), http://news.sky.com/skynews/Home/Technology/Facebook-Libel-Case-Won-InHigh- Court-By-Mathew-Firsht-Against-His-Former-Friend-Grant-Raphael/Article/ 200807415052473.
-
-
-
-
288
-
-
79952905761
-
-
SOLOVE, supra note 15, at 4
-
SOLOVE, supra note 15, at 4;
-
-
-
-
289
-
-
79952938249
-
-
Citron, supra note 11, at 386
-
see also Citron, supra note 11, at 386.
-
-
-
-
290
-
-
79952968006
-
-
note
-
See SOLOVE, supra note 15, at 76-83. This loss of control is a result of the inability to classify other social network users as anything other than friends or not friends; the author argues that human relationships are more complex than such a simple binary opposition.
-
-
-
-
291
-
-
79952907449
-
-
Id.. at 26-27
-
Id. at 26-27.
-
-
-
-
292
-
-
79952980964
-
-
Id.. at 100
-
Id. at 100.
-
-
-
-
293
-
-
79952916761
-
Defusing a Google Bomb
-
note Supp
-
People do not fear what is written about them in a dark corner of the Internet; they fear what appears when someone Googles their names or looks up their Facebook profiles. See Steven J. Horowitz, Defusing a Google Bomb, 117 YALE L.J. 37 (Supp. 2007).
-
(2007)
Yale L.J.
, vol.117
, pp. 37
-
-
Horowitz, S.J.1
-
294
-
-
79952944716
-
-
See supra notes 103-106 and accompanying text
-
See supra notes 103-106 and accompanying text.
-
-
-
-
295
-
-
79952934030
-
-
See supro notes 164-165 and accompanying text
-
See supro notes 164-165 and accompanying text.
-
-
-
-
296
-
-
79952929433
-
Responding to internet harassment, of legal rights and moral wrongs: A case study of internet defamation
-
279, arguing that what is written online may be laughable and unrealistic and yet still powerfully harmful
-
See Brittan Heller, Responding to Internet Harassment, Of Legal Rights and Moral Wrongs: A Case Study of Internet Defamation, 19 YALE J.L. & FEMINISM 279, 280 (2007) (arguing that what is written online may be laughable and unrealistic and yet still powerfully harmful).
-
(2007)
Yale J.L. & Feminism
, vol.19
, pp. 280
-
-
Heller, B.1
-
297
-
-
79952935663
-
-
See supra Part ILA
-
See supra Part ILA;
-
-
-
-
298
-
-
21344487971
-
Compensation and commensurability
-
56
-
see also Margaret Jane Radin, Compensation and Commensurability, 43 DUKEL.J. 56, 67-69 (1993).
-
(1993)
Dukel.J.
, vol.43
, pp. 67-69
-
-
Radin, M.J.1
-
299
-
-
77955345191
-
The google dilemma
-
supra Part III.B.3 (describing how content spreads uncontrollably on the Internet). Google and other search engines can be manipulated Large scale versions of this phenomenon are called "Google-bombs."
-
See supra Part III.B.3 (describing how content spreads uncontrollably on the Internet). Google and other search engines can be manipulated. See generally James Grimmelmann, The Google Dilemma, 53 N.Y.L. SCH. L. REV. 939 (2009). Large scale versions of this phenomenon are called "Google-bombs."
-
(2009)
N.Y.L. Sch. L. Rev.
, vol.53
, pp. 939
-
-
Grimmelmann, J.1
-
300
-
-
79952956574
-
-
Id.
-
Id.
-
-
-
-
301
-
-
79952905335
-
-
A "Google-bomb" is a way of manipulating Google's search algorithm to push certain websites to the top of the search results list
-
A "Google-bomb" is a way of manipulating Google's search algorithm to push certain websites to the top of the search results list.
-
-
-
-
302
-
-
79952962793
-
-
Id.. at 941-43. These bombs can be quite pernicious
-
Id. at 941-43. These bombs can be quite pernicious.
-
-
-
-
303
-
-
79952931130
-
-
Id.. at 943. Google is generally unwilling to "defuse" a Google bomb
-
Id. at 943. Google is generally unwilling to "defuse" a Google bomb.
-
-
-
-
304
-
-
79952970518
-
-
Citron, supra note 14, at 74 n.82 (stating the Google is usually unwilling to "fix" search results that have been altered, except in a few well known cases)
-
See Citron, supra note 14, at 74 n.82 (stating the Google is usually unwilling to "fix" search results that have been altered, except in a few well known cases).
-
-
-
-
305
-
-
79952902700
-
-
supra Part II.B.2 (analyzing the importance of context in evaluating outrage)
-
See supra Part II.B.2 (analyzing the importance of context in evaluating outrage).
-
-
-
-
306
-
-
79952980488
-
-
Id.
-
See Id.;
-
-
-
-
307
-
-
79952952353
-
-
Weiner, supra note 103, at 207-13 (contrasting the difficulty of finding outrage in the workplace with the ease of finding outrage in the home)
-
see also Weiner, supra note 103, at 207-13 (contrasting the difficulty of finding outrage in the workplace with the ease of finding outrage in the home).
-
-
-
-
308
-
-
79952935662
-
-
519 F.3d. 666, 7th Cir. (likening some online services to classifieds in newspapers and some to common carriers)
-
See Chi. Lawyers' Comm. for Civil Rights Under Law, Inc. v. Craigslist, Inc., 519 F.3d. 666, 668 (7th Cir. 2008) (likening some online services to classifieds in newspapers and some to common carriers).
-
(2008)
Comm. for Civil Rights under Law, Inc. V. Craigslist, Inc.
, pp. 668
-
-
Lawyers, Chi.1
-
309
-
-
79952944715
-
Autoadmit updates: "Two subpoenas away,"
-
Nov. 6, 3:20 PM, Another example is 4chan.org. See Schwartz, supra note 1, at 24-26
-
See Brian Leiter, Autoadmit Updates: "Two Subpoenas Away," BRIAN LEITER'S LAW SCHOOL REPORTS (Nov. 6, 2008, 3:20 PM), http:// leiterlawschool.typepad.com/leiter/ 2008/11/autoadmit-updat.html. Another example is 4chan.org. See Schwartz, supra note 1, at 24-26.
-
(2008)
Brian Leiter's Law School Reports
-
-
Leiter, B.1
-
310
-
-
79952943860
-
-
Margolick, supra note 131
-
Margolick, supra note 131.
-
-
-
-
311
-
-
79952960258
-
-
Id.
-
Id.
-
-
-
-
312
-
-
79952971194
-
-
Id.
-
Id.
-
-
-
-
313
-
-
79952930665
-
-
Id.
-
Id.
-
-
-
-
314
-
-
79952959394
-
-
supra note 120 and accompanying text
-
See supra note 120 and accompanying text.
-
-
-
-
315
-
-
79952909697
-
-
Givelber, supra note 73, at 57
-
See Givelber, supra note 73, at 57.
-
-
-
-
316
-
-
79952915453
-
-
Franks, supra note 120
-
See Franks, supra note 120;
-
-
-
-
317
-
-
79952931128
-
-
611 F. Supp. 2d 216 (D. Conn. 2009) (No. 3:07-CV-909 (CFD)) (listing the actual harm the two plaintiffs suffered). Both plaintiffs sought counseling, did worse in school, and incurred substantial costs
-
see also Complaint, Doe v. Ciolli, 611 F. Supp. 2d 216 (D. Conn. 2009) (No. 3:07-CV-909 (CFD)) (listing the actual harm the two plaintiffs suffered). Both plaintiffs sought counseling, did worse in school, and incurred substantial costs.
-
Complaint, Doe V. Ciolli
-
-
-
318
-
-
79952969706
-
-
Id.. at paras. 39, 61. In addition, they experienced difficulty finding jobs
-
Id. at paras. 39, 61. In addition, they experienced difficulty finding jobs.
-
-
-
-
319
-
-
79952913690
-
-
Id.
-
Id.
-
-
-
-
320
-
-
79952982686
-
-
See supra Part III.B.3 (describing how quickly and easily content spreads on the Internet)
-
See supra Part III.B.3 (describing how quickly and easily content spreads on the Internet).
-
-
-
-
321
-
-
79952940870
-
-
note
-
Realizing there can be different contexts on the Internet may help the law perform its teaching function. See Weiner, supra note 103, at 195 ("Tort law generally, and the tort of intentional infliction of emotional distress in particular, frames what interests we value as a society and prescribes how human beings should treat each other.").
-
-
-
-
322
-
-
79952934414
-
-
See supra Part II.B.2
-
See supra Part II.B.2.
-
-
-
-
323
-
-
79952951366
-
-
Weiner, supra note 103, at 209-10
-
See Weiner, supra note 103, at 209-10.
-
-
-
-
324
-
-
79952982278
-
-
supra Part II.B.2 (noting that words said on a common carrier can be actionable as outrageous specifically because they were said in the context of being on a common carrier)
-
See supra Part II.B.2 (noting that words said on a common carrier can be actionable as outrageous specifically because they were said in the context of being on a common carrier).
-
-
-
-
325
-
-
79952958287
-
-
See SOLOVE, supra note 15, at 35-40 (discussing several examples of content that was harmless when private but debilitating to the victim when spread)
-
See SOLOVE, supra note 15, at 35-40 (discussing several examples of content that was harmless when private but debilitating to the victim when spread).
-
-
-
-
326
-
-
79952983513
-
Have you been cyberbullied?
-
Jan. 16, noting that nearly a third of teens report being cyberbullied and that cyberbullying has been linked to some suicides
-
See Emily Bazelon, Have You Been Cyberbullied?, SLATE (Jan. 16, 2010), http://www.slate.com/id/2242666/ (noting that nearly a third of teens report being cyberbullied and that cyberbullying has been linked to some suicides).
-
(2010)
Slate
-
-
Bazelon, E.1
-
327
-
-
77951750792
-
Screening out cyberbullies: Remedies for victims on the internet playground
-
Note
-
See Shira Auerbach, Note, Screening out Cyberbullies: Remedies for Victims on the Internet Playground, 30 CARDOZO L. REV. 1641 (2009)
-
(2009)
Cardozo L. Rev.
, vol.30
, pp. 1641
-
-
Auerbach, S.1
-
328
-
-
79952958286
-
Minor" online sexual harassment and the CDA
-
Comment, sect;230 Defense: New Directions for Internet Service Provider Liability, For a discussion of how cyberbullying might be regulated by schools -and First Amendment problems with such government action
-
KrisAnn Norby-Jahner, Comment, "Minor" Online Sexual Harassment and the CDA §230 Defense: New Directions for Internet Service Provider Liability, 32 HAMLINE L. REV. 207 (2009). For a discussion of how cyberbullying might be regulated by schools -and First Amendment problems with such government action
-
(2009)
Hamline L. Rev.
, vol.32
, pp. 207
-
-
Norby-Jahner, K.1
-
329
-
-
77951739305
-
The new playground bullies of cyberspace: Online peer sexual harassment
-
Comment
-
-see Stacy M. Chaffin, Comment, The New Playground Bullies of Cyberspace: Online Peer Sexual Harassment, 51 How. L.J. 773 (2008)
-
(2008)
How. L.J.
, vol.51
, pp. 773
-
-
Chaffin, S.M.1
-
330
-
-
79952603905
-
Faceless bullies: Legislative and judicial responses to cyberbullying
-
Note, For a brief discussion of how social networks respond to threats, sexual solicitation, and other illegal activities within the networks
-
Kevin Turbert, Note, Faceless Bullies: Legislative and Judicial Responses to Cyberbullying, 33 SETON HALL LEGIS. J. 651 (2009). For a brief discussion of how social networks respond to threats, sexual solicitation, and other illegal activities within the networks,
-
(2009)
Seton Hall Legis. J.
, vol.33
, pp. 651
-
-
Turbert, K.1
-
331
-
-
79952928607
-
Social networking and sexual predators: The case for selfregulation
-
Note
-
see Sander J.C. van der Heide, Note, Social Networking and Sexual Predators: The Case for SelfRegulation, 31 HASTINGS COMM. & ENT. L.J. 173 (2008).
-
(2008)
Hastings Comm. & Ent. L.J.
, vol.31
, pp. 173
-
-
Van Der Heide, S.J.C.1
-
332
-
-
78649937604
-
-
Mar. 28, unpublished manuscript (on file with author)
-
See generally Mary Anne Franks, Sexual Harassment 2.0 (Mar. 28, 2010) (unpublished manuscript) (on file with author).
-
(2010)
Sexual Harassment 2.0
-
-
Franks, M.A.1
-
333
-
-
79952903547
-
-
Franks, supra note 218, at 12
-
Franks, supra note 218, at 12.
-
-
-
-
334
-
-
79952980045
-
-
See Citron, supra note 11, at 378-90. The article notes that most often women are harassed and that the harassment is generally exclusively sexual in
-
See Citron, supra note 11, at 378-90. The article notes that most often women are harassed and that the harassment is generally exclusively sexual in nature. Id. at 378-84. Some of the most infamous cases are those affecting women: Kathy Sierra, the online blogger who was pushed offline by threats, id. at 380-81;
-
-
-
-
335
-
-
79952903106
-
-
Jill Filipovic, the NYU Law student harassed on AutoAdmit, id. at 381-82
-
Jill Filipovic, the NYU Law student harassed on AutoAdmit, id. at 381-82;
-
-
-
-
336
-
-
79952925494
-
-
and Alyssa Royse, another blogger who was terrorized, id. at 382-83. For more examples, see id. at 383-84.
-
and Alyssa Royse, another blogger who was terrorized, id. at 382-83. For more examples, see id. at 383-84.
-
-
-
-
337
-
-
79952957443
-
-
See generally Kim, supra note 19. Professor Nancy Kim's proposal is quite complex. She argues that anonymity should be made more difficult for posters of content -to help reduce the costs of litigation -and suggests policies that will slowly make nonanonymity the default rule online. Id. at 1019-23.
-
See generally Kim, supra note 19. Professor Nancy Kim's proposal is quite complex. She argues that anonymity should be made more difficult for posters of content -to help reduce the costs of litigation -and suggests policies that will slowly make nonanonymity the default rule online. Id. at 1019-23.
-
-
-
-
338
-
-
79952934411
-
-
Professor Kim also argues that websites should be enticed to police themselves through various carrot-like measures and that proprietorship liability should be imposed upon website sponsors. Id. at 1026-47.
-
Professor Kim also argues that websites should be enticed to police themselves through various carrot-like measures and that proprietorship liability should be imposed upon website sponsors. Id. at 1026-47.
-
-
-
-
339
-
-
79952923485
-
-
She would have all websites that might be used as businesses -in effect all websites -be held to the same standards as those usually applied to possessors of land. Id. at 1038. Such liability, she argues, would encourage websites to prevent and deter future online harm. Id. at 1042-43.
-
She would have all websites that might be used as businesses -in effect all websites -be held to the same standards as those usually applied to possessors of land. Id. at 1038. Such liability, she argues, would encourage websites to prevent and deter future online harm. Id. at 1042-43.
-
-
-
-
340
-
-
79952910924
-
-
See Bartow, supra note 122, at 421, 423-28.
-
See Bartow, supra note 122, at 421, 423-28.
-
-
-
-
341
-
-
79952939108
-
-
ReputationDefender is an online service used by some victims of online harm. Id. at 391-92. Professor Ann Bartow argues that such services exploit and stand to profit from online misery. Id. at 419.
-
ReputationDefender is an online service used by some victims of online harm. Id. at 391-92. Professor Ann Bartow argues that such services exploit and stand to profit from online misery. Id. at 419.
-
-
-
-
342
-
-
79952974235
-
-
They may also attempt to destroy legitimate information. Id. at 425.
-
They may also attempt to destroy legitimate information. Id. at 425.
-
-
-
-
343
-
-
79952939542
-
-
Finally, she argues that such firms' business models rely on continual Internet harm, which incentivizes them to "perpetuate the conditions" that initially made their services useful. Id. at 429.
-
Finally, she argues that such firms' business models rely on continual Internet harm, which incentivizes them to "perpetuate the conditions" that initially made their services useful. Id. at 429.
-
-
-
-
344
-
-
79952950927
-
-
Id. at 399; see also Citron, supra note 11, at 399-400.
-
Id. at 399; see also Citron, supra note 11, at 399-400.
-
-
-
-
345
-
-
79952904452
-
-
Citron, supra note 14, at 103-06 (arguing that interpersonal solutions are ludicrously ineffective, especially for the lay individual).
-
Citron, supra note 14, at 103-06 (arguing that interpersonal solutions are ludicrously ineffective, especially for the lay individual).
-
-
-
-
346
-
-
79952934031
-
-
Id. at 104.
-
Id. at 104.
-
-
-
-
347
-
-
79952934833
-
-
F. 3d 1096, 9th Cir.
-
See Barnes v. Yahoo!, Inc., 570 F. 3d 1096, 1106-09 (9th Cir. 2009).
-
(2009)
Barnes V. Yahoo!, Inc.
, vol.570
, pp. 1106-1109
-
-
-
348
-
-
79952948412
-
-
Id. The court briefly limns the issue and makes no definite pronouncement. There has been no academic writing on this possibility.
-
Id. The court briefly limns the issue and makes no definite pronouncement. There has been no academic writing on this possibility.
-
-
-
-
349
-
-
79952911340
-
-
See generally KLm, supra note 19.
-
See generally KLm, supra note 19.
-
-
-
-
350
-
-
79952981393
-
-
See Suler, supra note 12 (discussing the characteristics of the Internet that make its users crueler to one another). Moreover, disposing of anonymity could greatly chill free expression.
-
See Suler, supra note 12 (discussing the characteristics of the Internet that make its users crueler to one another). Moreover, disposing of anonymity could greatly chill free expression.
-
-
-
-
351
-
-
79952929864
-
-
See generally Volokh, supra note 139.
-
See generally Volokh, supra note 139.
-
-
-
-
352
-
-
79952955690
-
-
See Kim, supra note 19, at 1016-17.
-
See Kim, supra note 19, at 1016-17.
-
-
-
-
353
-
-
79952926349
-
-
See supra Part III.B.2.
-
See supra Part III.B.2.
-
-
-
-
354
-
-
79952940052
-
-
See supra Part III.D.
-
See supra Part III.D.
-
-
-
-
355
-
-
79952972039
-
-
See supra notes 102-106.
-
See supra notes 102-106.
-
-
-
-
356
-
-
79952974684
-
-
Kim, supra note 19, at 1045
-
Kim, supra note 19, at 1045;
-
-
-
-
357
-
-
79952922684
-
-
see also Margolick, supra note 131 (detailing what made AutoAdmit so attractive to its users).
-
see also Margolick, supra note 131 (detailing what made AutoAdmit so attractive to its users).
-
-
-
-
358
-
-
79952970517
-
-
See supra Parts II.B.2, III.A.2 (describing the need for a social steam vent).
-
See supra Parts II.B.2, III.A.2 (describing the need for a social steam vent).
-
-
-
-
359
-
-
79952976358
-
-
Heller, supra note 196, at 280.
-
Heller, supra note 196, at 280.
-
-
-
-
360
-
-
79952902704
-
-
Id. She also claimed that the AutoAdmit board is "laced with sexist, racist, homophobic, and threatening content." Id. at 281.
-
Id. She also claimed that the AutoAdmit board is "laced with sexist, racist, homophobic, and threatening content." Id. at 281.
-
-
-
-
361
-
-
79952902702
-
-
See Citron, supra note 11, at 411 (discussing the teaching function of the law in the context of her proposal for cyber civil rights). Professor Citron argues that the law can (1) help the public to understand the problem of online sexual harassment and the scope of damage that it inflicts upon women; (2) validate the harm in the eyes of those who suffered it; (3) change the way law enforcement and courts respond to online harm; and (4) legitimize and solidify current private efforts to eliminate online harm. Id. at 410-12.
-
See Citron, supra note 11, at 411 (discussing the teaching function of the law in the context of her proposal for cyber civil rights). Professor Citron argues that the law can (1) help the public to understand the problem of online sexual harassment and the scope of damage that it inflicts upon women; (2) validate the harm in the eyes of those who suffered it; (3) change the way law enforcement and courts respond to online harm; and (4) legitimize and solidify current private efforts to eliminate online harm. Id. at 410-12.
-
-
-
-
362
-
-
79952966829
-
-
Others who have written on this issue wish to hold content creators liable as they are the best cost-avoiders. See generally Kim, supra note 19.
-
Others who have written on this issue wish to hold content creators liable as they are the best cost-avoiders. See generally Kim, supra note 19.
-
-
-
-
363
-
-
79952976770
-
-
See SOLOVE, supra note 15, at 37 (arguing that taking control of content is essential to continued freedom on the Internet).
-
See SOLOVE, supra note 15, at 37 (arguing that taking control of content is essential to continued freedom on the Internet).
-
-
-
-
364
-
-
79952949702
-
-
As noted, the problem is often compounded by mob behavior. See Citron, supra note 14. In addition it is difficult to tell what content will become popular and what content will not. The AutoAdmit case was not, at first, a concentrated effort to harass the victims. See Margolick, supra note 131. The harm was real, but no one person caused it.
-
As noted, the problem is often compounded by mob behavior. See Citron, supra note 14. In addition it is difficult to tell what content will become popular and what content will not. The AutoAdmit case was not, at first, a concentrated effort to harass the victims. See Margolick, supra note 131. The harm was real, but no one person caused it.
-
-
-
-
365
-
-
79952928608
-
-
See supra Part H.A.
-
See supra Part H.A.
-
-
-
-
366
-
-
79952907889
-
-
Id.
-
Id.
-
-
-
-
367
-
-
79952970097
-
-
See SOLOVE, supra note 15, at 35-38 (detailing how some content can be very harmful if widely distributed though harmless if seen by only a few).
-
See SOLOVE, supra note 15, at 35-38 (detailing how some content can be very harmful if widely distributed though harmless if seen by only a few).
-
-
-
-
368
-
-
79952942617
-
-
See supra Parts II.B, III.C.
-
See supra Parts II.B, III.C.
-
-
-
-
369
-
-
79952943426
-
-
See supra Part III.D (arguing that the Internet is made up of different types of contexts).
-
See supra Part III.D (arguing that the Internet is made up of different types of contexts).
-
-
-
-
370
-
-
79952903991
-
-
See also Delgado, supra note 139 (describing the teaching power of the law). The notion is that places that generate outrageous content are also places that solicit such content and thus often should not be supposed to be striving for truth.
-
See also Delgado, supra note 139 (describing the teaching power of the law). The notion is that places that generate outrageous content are also places that solicit such content and thus often should not be supposed to be striving for truth.
-
-
-
-
371
-
-
79952962380
-
-
See Givelber, supra note 73, at 74-75 ("[A] court can believe that any given decision represents a response to particularly egregious facts and not a general statement respecting legal rights.").
-
See Givelber, supra note 73, at 74-75 ("[A] court can believe that any given decision represents a response to particularly egregious facts and not a general statement respecting legal rights.").
-
-
-
-
372
-
-
79952921867
-
-
Id. at 75 ("The doctrine has typically been invoked, and is likely to continue to be invoked, on behalf of the noninstitutional, nonprofessional party to a variety of significant economic and commercial relations."). Professor Givelber's theory is that the tort should right wrongs that are otherwise intractable. This approach is applicable to online harm.
-
Id. at 75 ("The doctrine has typically been invoked, and is likely to continue to be invoked, on behalf of the noninstitutional, nonprofessional party to a variety of significant economic and commercial relations."). Professor Givelber's theory is that the tort should right wrongs that are otherwise intractable. This approach is applicable to online harm.
-
-
-
-
373
-
-
79952923076
-
-
See supra notes 96 and 103-104.
-
See supra notes 96 and 103-104.
-
-
-
-
374
-
-
79952939540
-
-
See supra note 146 and accompanying text (arguing that online harm is less costly to the creator and more costly to the victim). In a way, the power imbalance between attacker, distributor, and victim is similar to the kind of power dynamics that the tort has traditionally been concerned with policing.
-
See supra note 146 and accompanying text (arguing that online harm is less costly to the creator and more costly to the victim). In a way, the power imbalance between attacker, distributor, and victim is similar to the kind of power dynamics that the tort has traditionally been concerned with policing.
-
-
-
-
375
-
-
79952966828
-
-
See supra Parts III.B.1-2 (describing the anonymous nature of most online harm). Such harm is often mob inflicted and creates natural power imbalances between victim and aggressor.
-
See supra Parts III.B.1-2 (describing the anonymous nature of most online harm). Such harm is often mob inflicted and creates natural power imbalances between victim and aggressor.
-
-
-
-
376
-
-
79952951365
-
-
See Kim, supra note 19, at 1006-07, 1055-56.
-
See Kim, supra note 19, at 1006-07, 1055-56.
-
-
-
-
377
-
-
0000320829
-
The right to privacy
-
For a discussion of the tort of privacy, see generally Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4. HARV. L. REV. 193 (1890).
-
(1890)
Harv. L. Rev.
, vol.4
, pp. 193
-
-
Warren, S.D.1
Brandeis, L.D.2
-
378
-
-
79952965949
-
-
Newsworthiness is a common law defense and has proved crippling to this tort, which has thus "floundered." Rabin, supra note 80, at 1204.
-
Newsworthiness is a common law defense and has proved crippling to this tort, which has thus "floundered." Rabin, supra note 80, at 1204.
-
-
-
-
379
-
-
79952974683
-
-
See Kim, supra note 19, at 1007.
-
See Kim, supra note 19, at 1007.
-
-
-
-
380
-
-
79952923484
-
-
Defamation is also problematic because the truth of a statement is a defense, and therefore assertions that are true, though outrageous, would not be actionable. See Kim, supra note 19, at 1007.
-
Defamation is also problematic because the truth of a statement is a defense, and therefore assertions that are true, though outrageous, would not be actionable. See Kim, supra note 19, at 1007.
-
-
-
-
381
-
-
79952917611
-
-
See supra notes 34-39 (principal alternative tort employed in CDA cases has been defamation).
-
See supra notes 34-39 (principal alternative tort employed in CDA cases has been defamation).
-
-
-
-
382
-
-
19844378026
-
Enabling torts
-
See generally Robert L. Rabin, Enabling Torts, 49 DEPAUL L. REV. 435 (1999)
-
(1999)
Depaul L. Rev.
, vol.49
, pp. 435
-
-
Rabin, R.L.1
-
383
-
-
79952950505
-
-
Id. at 437-38.
-
Id. at 437-38.
-
-
-
-
384
-
-
79952936110
-
-
See generally Rabin, supra note 80.
-
See generally Rabin, supra note 80.
-
-
-
-
385
-
-
79952935661
-
-
See supra notes 83-84 and 107-110. Enabler liability is not a new idea. Rabin, supra note 255, at 438.
-
See supra notes 83-84 and 107-110. Enabler liability is not a new idea. Rabin, supra note 255, at 438.
-
-
-
-
386
-
-
79952913688
-
-
Rabin discusses several examples of enabler liability in the context of negligent entrustment. A hallmark case was one in which a great-aunt was held liable for the grand-nephew's harm because she provided him with the money to buy a car and "paved the way for a truly reckless individual to be imposing serious risks of injury on the public at large." Id. at 439.
-
Rabin discusses several examples of enabler liability in the context of negligent entrustment. A hallmark case was one in which a great-aunt was held liable for the grand-nephew's harm because she provided him with the money to buy a car and "paved the way for a truly reckless individual to be imposing serious risks of injury on the public at large." Id. at 439.
-
-
-
-
387
-
-
79952968429
-
-
The author views this case under the lens of "risk facilitation" and likens it to several older cases: Hines v. Garrett, 108 S.E. 690 (Va. 1921), and Cruz v. Middlekauf Lincoln-Mercury, Inc., 909 P.2d 1252 (Utah 1996). The former case involved a railroad conductor who forced a woman to deboard the train at a point after her stop; he was held liable for her subsequent rapes because he exposed her to the risk of walking in an unsafe area. Rabin, supra note 255, at 439.
-
The author views this case under the lens of "risk facilitation" and likens it to several older cases: Hines v. Garrett, 108 S.E. 690 (Va. 1921), and Cruz v. Middlekauf Lincoln-Mercury, Inc., 909 P.2d 1252 (Utah 1996). The former case involved a railroad conductor who forced a woman to deboard the train at a point after her stop; he was held liable for her subsequent rapes because he exposed her to the risk of walking in an unsafe area. Rabin, supra note 255, at 439.
-
-
-
-
388
-
-
79952944269
-
-
The latter case involved a car
-
The latter case involved a car
-
-
-
-
389
-
-
79952945560
-
-
dealership that left the key to a car in its ignition; the car was later stolen and used to harm others. Id. at 440-41.
-
dealership that left the key to a car in its ignition; the car was later stolen and used to harm others. Id. at 440-41.
-
-
-
-
390
-
-
79952931940
-
-
Id. at 451
-
Id. at 451;
-
-
-
-
391
-
-
79952947546
-
A declaration of the dependence of cyberspace
-
(discussing some aspects of enabler liability with regard to online harm).
-
see also Alex Kozinski & Josh Goldfoot, A Declaration of the Dependence of Cyberspace, 32 COLUM. J.L. & ARTS 365 (2009) (discussing some aspects of enabler liability with regard to online harm).
-
(2009)
Colum. J.L. & Arts
, vol.32
, pp. 365
-
-
Kozinski, A.1
Goldfoot, J.2
-
392
-
-
79952927224
-
-
Enabler liability often focuses on situations in which a third party, usually one with deeper pockets, affirmatively enhanced the risk of the conduct. Rabin, supra note 255, at 449-50.
-
Enabler liability often focuses on situations in which a third party, usually one with deeper pockets, affirmatively enhanced the risk of the conduct. Rabin, supra note 255, at 449-50.
-
-
-
-
393
-
-
79952904917
-
-
Another example, somewhat more relevant to this discussion, is Kline v. 1500 Massachusetts Avenue Apartment Corp., 439 F.2d 477 (D.C. CLr. 1970). Rabin argues that the main thrust of the opinion is to "emphasize a deterrence rationale for creating a duty to protect against third-party violence."
-
Another example, somewhat more relevant to this discussion, is Kline v. 1500 Massachusetts Avenue Apartment Corp., 439 F.2d 477 (D.C. CLr. 1970). Rabin argues that the main thrust of the opinion is to "emphasize a deterrence rationale for creating a duty to protect against third-party violence."
-
-
-
-
394
-
-
79952902701
-
-
Rabin, supra note 255, at 444. Rabin notes that "[n]ot only is the renter in a better position than the tenant to adopt precautionary measures, but the renter is better situated than the police to diminish the risk of criminal assault on the premises." Id. A similar case concerning an attack in a parking lot of a shopping center found the shopping center liable even though there had been no prior similar incidents on the premises. Id. at 445-46.
-
Rabin, supra note 255, at 444. Rabin notes that "[n]ot only is the renter in a better position than the tenant to adopt precautionary measures, but the renter is better situated than the police to diminish the risk of criminal assault on the premises." Id. A similar case concerning an attack in a parking lot of a shopping center found the shopping center liable even though there had been no prior similar incidents on the premises. Id. at 445-46.
-
-
-
-
395
-
-
79952972842
-
-
See Rabin, supra note 255, at 444-46.
-
See Rabin, supra note 255, at 444-46.
-
-
-
-
396
-
-
79952975499
-
-
LLC, 521 F.3d 1157, 9th Cir. (internal quotation marks omitted).
-
Fair Hous. Council v. Roommates.com, LLC, 521 F.3d 1157, 1169-68 (9th Cir. 2008) (internal quotation marks omitted).
-
(2008)
Fair Hous. Council V. Roommates.com
, pp. 1169-1268
-
-
-
397
-
-
79952980963
-
-
Id. at 1168-69 (noting that an overly narrow definition of "develop" would not take into account the "swift and disorderly changes that are the hallmark of growth on the Internet").
-
Id. at 1168-69 (noting that an overly narrow definition of "develop" would not take into account the "swift and disorderly changes that are the hallmark of growth on the Internet").
-
-
-
-
398
-
-
79952927755
-
-
Id. (internal quotation marks omitted).
-
Id. (internal quotation marks omitted).
-
-
-
-
399
-
-
79952911737
-
-
Id. at 1169 ("A website operator who edits user-created content -such as by correcting spelling, removing obscenity or trimming for length -retains his immunity for any illegality in the user-created content, provided that the edits are unrelated to the illegality. However, a website operator who edits in a manner that contributes to the alleged illegality -such as by removing the word 'not' from a user's message reading '[Name] did not steal the artwork' in order to transform an innocent message into a libelous one -is directly involved in the alleged illegality and thus not immune." (modification in original)).
-
Id. at 1169 ("A website operator who edits user-created content -such as by correcting spelling, removing obscenity or trimming for length -retains his immunity for any illegality in the user-created content, provided that the edits are unrelated to the illegality. However, a website operator who edits in a manner that contributes to the alleged illegality -such as by removing the word 'not' from a user's message reading '[Name] did not steal the artwork' in order to transform an innocent message into a libelous one -is directly involved in the alleged illegality and thus not immune." (modification in original)).
-
-
-
-
400
-
-
79952972841
-
-
See id. at 1162.
-
See id. at 1162.
-
-
-
-
401
-
-
79952969313
-
-
Id. at 1164 n.13.
-
Id. at 1164 n.13.
-
-
-
-
402
-
-
79952925493
-
-
Id. at 1170 n.26.
-
Id. at 1170 n.26.
-
-
-
-
403
-
-
79952906199
-
-
See supra Parts III.B.3, III.C (explaining that the true cause of online harm is the spread of injurious information).
-
See supra Parts III.B.3, III.C (explaining that the true cause of online harm is the spread of injurious information).
-
-
-
-
404
-
-
79952978656
-
-
Roommates.com, 521 F.3d at 1167.
-
Roommates.com, 521 F.3d at 1167.
-
-
-
-
405
-
-
79952925092
-
-
Id. at 1169.
-
Id. at 1169.
-
-
-
-
406
-
-
79952976355
-
-
Id. The court also explained that Roommates.com was being held liable for "the predictable consequences of creating a website designed to solicit and enforce housing preferences that are alleged to be illegal." Id. at 1170.
-
Id. The court also explained that Roommates.com was being held liable for "the predictable consequences of creating a website designed to solicit and enforce housing preferences that are alleged to be illegal." Id. at 1170.
-
-
-
-
407
-
-
79952906618
-
-
Id. at 1171 ("[E]ven if the data are supplied by third parties, a website operator may still contribute to the content's illegality and thus be liable as a developer.").
-
Id. at 1171 ("[E]ven if the data are supplied by third parties, a website operator may still contribute to the content's illegality and thus be liable as a developer.").
-
-
-
-
408
-
-
79952948877
-
-
Id.
-
Id.
-
-
-
-
409
-
-
79952916316
-
-
Id. at 1169.
-
Id. at 1169.
-
-
-
-
410
-
-
79952936568
-
-
See supra Parts III.A, D.
-
See supra Parts III.A, D.
-
-
-
-
411
-
-
79952977382
-
-
Roommates.com, 521 F.3d at 1168 (internal quotation marks omitted).
-
Roommates.com, 521 F.3d at 1168 (internal quotation marks omitted).
-
-
-
-
412
-
-
79952949268
-
-
See supra notes 202-207 and accompanying text, (explaining the nature of sites like AutoAdmit.com).
-
See supra notes 202-207 and accompanying text, (explaining the nature of sites like AutoAdmit.com).
-
-
-
-
413
-
-
79952960259
-
-
See Margolick, supra note 131.
-
See Margolick, supra note 131.
-
-
-
-
414
-
-
79952980487
-
-
Such an approach parallels the Roommates.com court's own litany of factors that would help it determine whether the ISP had developed content. Roommates.com, 521 F.3d at 1172.
-
Such an approach parallels the Roommates.com court's own litany of factors that would help it determine whether the ISP had developed content. Roommates.com, 521 F.3d at 1172.
-
-
-
-
415
-
-
79952919652
-
-
Similarly, in Roommates.com, the court argued that Roommates.com "elicits the allegedly illegal content and makes aggressive use of it in conducting its business." Id. at 1172;
-
Similarly, in Roommates.com, the court argued that Roommates.com "elicits the allegedly illegal content and makes aggressive use of it in conducting its business." Id. at 1172;
-
-
-
-
416
-
-
79952905333
-
Note, defamation in the internet age: Why roommates.com isn't enough to change the rules for anonymous gossip websites
-
(arguing that Roommates.com can be extended to sites that solicit gossip).
-
see also Skyler McDonald, Note, Defamation in the Internet Age: Why Roommates.com Isn't Enough to Change the Rules for Anonymous Gossip Websites, 62 FLA. L. REV. 259 (2010) (arguing that Roommates.com can be extended to sites that solicit gossip).
-
(2010)
Fla. L. Rev.
, vol.62
, pp. 259
-
-
McDonald, S.1
-
417
-
-
79952908293
-
-
Roommates.com, 521 F.3d at 1174.
-
Roommates.com, 521 F.3d at 1174.
-
-
-
-
418
-
-
79952912006
-
-
See Givelber, supra note 73, at 46.
-
See Givelber, supra note 73, at 46.
-
-
-
-
419
-
-
79952918380
-
-
Monitoring is much easier to do with popular content than with all posts.
-
Monitoring is much easier to do with popular content than with all posts.
-
-
-
|