Recently in Social Media Category
Nia Chung, MJLST Staff
Cyberbullying comes in varying forms. Online outlets with user identification features such as Facebook and MySpace give third party attackers a platform to target individuals but remain identifiable to the victim. The transparency of identification provided on these websites allows victims the ability of possible redress without involving the Internet Service Providers (ISPs).
In February 2014, Bryan Morben published an article on cyberbullying in volume 15.1 of the Minnesota Journal of Law, Science and Technology. In that article Mr. Morben wrote that Minnesota's new anti-cyberbullying statute, the "Safe and Supportive Minnesota Schools Act" H.F. 826 would "reconstruct the Minnesota bullying statute and would provide much more guidance and instruction to local schools that want to create a safer learning environment for all." Mr. Morben's article analyzes the culture of cyberbullying and the importance of finding a solution to such actions.
Another form of cyberbullying has been emerging, however, and state initiatives such as the Safe and Supportive Minnesota Schools Act may prompt Congress to revisit current, outdated, federal law. This form of cyberbullying occurs on websites that provide third parties the ability to hide behind the cloak of anonymity to escape liability for improper actions, like 4chan and AOL.
On September 22, 2014, British actress Emma Watson delivered a powerful U.N. speech about women's rights. Less than 24 hours later, a webpage titled "Emma You Are Next" appeared, displaying the actress's face next to a countdown, suggesting that Ms. Watson would be targeted this Friday. The webpage was stamped with the 4chan logo, the same entity that is said to have recently leaked celebrity photos of actresses including Jennifer Lawrence, this past summer. On the same website, one anonymous member responded to Ms. Watson's speech by stating "[s]he makes stupid feminist speeches at UN, and now her nudes will be online." Problematically, the law provides no incentive for such ISPs to remove such defamatory content because they are barred from liability by a federal statute. The Communications Decency Act, 47 U.S.C. § 230, provides, "[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." Essentially, this provision provides ISPs immunity from tort liability for content or information generated on a user-generated website. Codified in 1996, initially to regulate pornographic material, the statute added sweeping protection for ISPs. However, 20 years ago, the internet was relatively untouched and had yet to realize its full potential.
Courts historically have applied Section 230 broadly and have prevented ISPs from being held liable for cyberbullying actions brought from victims of cyberbullying on its forum. For example, the Ninth Circuit upheld CDA immunity for an ISP for distributing an email to a listserv who posted an allegedly defamatory email authored by a third party. The Fourth Circuit immunized ISPs even when they acknowledged that the content was tortious. The Third Circuit upheld immunity for AOL against allegations of negligence because punishing the ISP for its third party's role would be "actions quintessentially related to a publisher's role." Understandably, the First Amendment provides the right to free exchange of information and ideas, which gives private individuals the right to anonymous speech. We must ask, however, where the line must be drawn when anonymity serves not as a tool to communicate with others in a public forum but merely as a tool to bring harm to individuals, their reputations and their images.
In early April of this year, the "Safe and Supportive Minnesota Schools Act was approved and officially went into effect. Currently, http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf have anti-cyberbullying statutes in place, demonstrating positive reform in keeping our users safe in a rapidly changing and hostile online environment. Opinions from both critics and advocates of the bill were voiced through the course of the bill's passing, and how effectively Minnesota will apply its cyberbullying statute remains to be seen. A closer look at the culture of cyberbullying, as is discussed in Mr. Morben's article, and the increasing numbers of anti-cyberbullying state statutes, however, may prompt Congress to revisit Section 230 of the Communications Decency Act, to at least modestly reform ISP immunity and give cyber-attacks victims some form of meaningful redress.
by Shishira Kothur, UMN Law Student, MJLST Staff
Social networking has become a prominent form of communication and expression for society. Many people continue to post and blog about their personal lives, believing that they are hidden by separate account names. This supposed anonymity gives a false sense of security, as members of society post and upload incriminating and even embarrassing information about themselves and others. This information, while generally viewed by an individual's 200 closest friends, is has also become a part of the courtroom.
This unique issue is further explained in Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-
Networking Evidence, Volume 13, Issue 1 of the Minnesota Journal of Law, Science and Technology. Professor Ira P. Robbins emphasizes that since social media provides an easy outlet for wrongful behavior, it will inevitably find its way as evidence in litigation. Her article focuses on the courts' efforts to authenticate the evidence that is produced from Facebook, Twitter and other social media. Very few people take care to set appropriate privacy settings. The result from this practice is an easy way for anyone to find important, personal information, which they can use to hack accounts, submit their own postings under a different name, and incriminate others. Similarly, the creation of fake accounts is a prominent tool to harass and bully individuals to the point of disastrous and suicidal effects. With results such as untimely deaths and inappropriate convictions, the method of proving the authorship of such postings becomes a critical step when collecting evidence.
Professor Robbins comments that currently a person can be connected to and subsequently lawfully responsible for a posting without appropriate proof that the posting is, in fact, theirs. The article critiques the current method the court applies to identifying these individuals, claiming that there is too much emphasis on testimonials of current access, potential outside access, and other various factors. It proposes a new method of assigning authorship to the specific item instead of the account holder. She suggests a specific focus on the type of evidence when applying Federal Rule of Evidence 901(b)(4), which will raise appropriate questions such as the account ownership, security, and the overall posting that is related to the suit. The analysis thoroughly explains how this new method will provide sufficient support between the claims and the actual author. As social media continues to grow, so do the opportunities to hack, mislead, and ultimately cause harm. This influx of information needs to be filtered well in order for the courts to find the truth and serve justice to the right person.
by Alex Vlisides, UMN Law Student, MJLST Staff
Cyberbullying. It seems every few weeks or months, another story surfaces in the media with the same tragic narrative. A teenager was bullied, both at school and over the internet. The quiet young kid was the target of some impossibly cruel torment by their peers. Tragically, the child felt they had nowhere to turn, and took their own life.
Most recently, a 12 year old girl from Lakeland, FL, named Rebecca Ann Sedwick jumped to her death from the roof of a factory after being bullied online for months by a group of 15 girls. The tragedy has spurred the same news narrative as the many before, and the same calls for inadequate action. Prosecute the bullies or their parents. Blame the victim's parents for not caring enough. Blame the school for not stepping in.
News media's institutional bias is to cover the shocking story. The problem is that when considering policy changes to help the huge number of kids who are bullied online, these tragic stories may be the exact wrong cases to consider. Cyberbullying is not an issue that tragically surfaces every few months like a hurricane or a forest fire. It goes on every day, in virtually every middle school and high school in the country. Schools need policies crafted not just to prevent the worst, but to make things better each day.
It is incredibly important to remember students like Sedwick. But to address cyberbullying, it may be just as important to remember the more common effects of bullying: the student who stops raising their hand in class or quits a sports team or fears even going on social media sites. These things should be thought of not as potential warning signs of a tragedy, but as small tragedies themselves.
The media will never run headlines on this side of bullying. This means that policy makers and those advocating for change must correct for this bias, changing the narrative and agenda of cyberbullying to include the common tragedies. The issue is complex, emotional and ever-changing. Though it may not make for breaking news, meaningful change will honor students like Rebecca Ann Sedwick, while protecting students who continue to face cyberbullying every day.
by Elliot Ferrell, UMN Law Student, MJLST Staff
The average law student incurs $125,000 of debt and pays almost twice as much in tuition as a student did in 2001. Law students are understandably concerned with the legal market's job prospects, and many are vocal about. Students are not the only ones voicing their concerns, as a lawyers (employed and unemployed), professors, employers, and business people add their opinions and observations to the discourse as well. A common theme is to decry the rise of tuition costs and debt and the fall of enrollment and job openings.
by Eric Maloney, UMN Law Student, MJLST Staff
Facebook has become a part of everyday life for people around the world. According to Mark Zuckerberg and Co., over one billion people (yes, with a "B") are active on Facebook every month, with an average of more than 600 million active users every day in December 2012. Disregarding bogus or duplicate accounts, that means roughly one-seventh of the entire human population is active on Facebook every month (with the world population currently sitting somewhere in the neighborhood of seven billion people).
Apparently, Facebook has become so commonplace and ingrained in the daily routine of some that they feel the need to use the social networking service from the privacy of their prison cells.
by Ian Birrell
Since at least 1999 when Napster was originally launched, internet piracy, or downloading copyrighted materials (especially songs, videos, and games,) has been a contentious activity. The Recording Industry Association of America (RIAA) has historically taken a very public and aggressive stance by finding individuals associated with IP addresses matching those where this "file sharing" is coming from. After finding such a target, the RIAA would send a letter demanding a settlement for thousands of dollars or threatening litigation, risky and expensive to the target, despite a potentially very small monetary value of downloaded material. The RIAA suits, which have continued for a number of years, include a number of well publicized absurd claims.
by Sabrina Ly
Evidence from social networking websites is increasingly involved in a litany of litigation. Although the widespread use of social media can lead to increased litigation, as well as increasing the cost of litigation, use of social media has assisted lawyers and police officers in proving cases and solving crimes. In New Jersey, for example, two teenage brothers were arrested and charged with murder of a twelve year-old girl. What led to the two teenagers' arrest was evidence left behind in their homes along with a Facebook post that made their mother suspicious enough to call the police. In another case, Antonio Frasion Jenkins Jr. had charges brought against him by an officer for making terroristic threats to benefit his gang. Jenkins posted a description of his tattoo on Facebook which stated: "My tattoo iz a pig get'n his brains blew out." Pig is considered a derogatory term for a police officer.The tattoo also had the officer's misspelled name and his badge number. The officer who is a part of the gang investigation team saw the Facebook post and immediately filed charges against Jenkins as he interpreted the tattoo as a direct threat against him and his family. These are two of the many situations in which social networking websites have been used as evidence to bring charges against or locate an individual.
by Jeremy So, UMN Law Student, MJLST Managing Editor
As China's Communist party prepares for its once-a-decade leadership transition, the news has instead been dominated by the fall from power of Bo Xilai, the former head of the Chongching Communist Party and formerly one of the party's potential leaders. While such a fall itself is unusual, the dialogue surrounding Bo's fall is also remarkable--Chinese commentators have been able to express their views while facing only light censorship.
by Sarvesh Desai, UMN Law Student, MJLSTStaff
Google glasses . . . like a wearable smartphone, but "weighing a few ounces, the sleek electronic device has a tiny embedded camera. The glasses also deploy what's known as a 'heads-up display,' in which data are projected into the user's field of vision on a small screen above the right eye."
The glasses are designed to provide an augmented reality experience in which (hopefully useful) information can be displayed to the wearer based on what the wearer is observing in the world at that particular moment. The result could be a stunning and useful achievement, but as one commentator pointed out, Google is an advertising company. The result of Google glasses, or as Google prefers to call them "Google Glass"(since they actually have no lenses) is that advertisements following you around and continuously updating as you move through the world may soon be a reality.
by Rebecca Boxhorn, Consortium Research Associate, Former MJLST Staff & Editor
Helen of Troy's face launched a thousand ships, but yours might provide probable cause. The FBI is developing a nationwide facial recognition database that has privacy experts fretting about the definition of privacy in a technologically advanced society. The $1 billion Next Generation Identification initiative seeks to harness the power of biometric data in the fight against crime. Part of the initiative is the creation of a facial photograph database that will allow officials to match pictures to mug shots, electronically identify suspects in crowds, or even find fugitives on Facebook. The use of biometrics in law enforcement is nothing new, of course. Fingerprint and DNA evidence have led to the successful incarceration of thousands. What privacy gurus worry about is the power of facial recognition technology and the potential destruction of anonymity.