MORANDYM OF~~S ~ FUTHORITIES in SUPPORT O~ 15 ~ND:A.Ntts MOTION to QUASH V

Total Page:16

File Type:pdf, Size:1020Kb

MORANDYM OF~~S ~ FUTHORITIES in SUPPORT O~ 15 ~ND:A.Ntts MOTION to QUASH V 9 f:EO FfLEC: 1 Cindy A. Cohn, Bsq. (StateBar No. 145997) Gwen A. fflDZo, Esq. (StateBar No. 209562) ., ".", ',I t n ',I "i\:" 1 PH a.: 2 ELECTRONIC fRONTIER FOUNDA nON 454 Shotwell Street ,: I,'. .' ,'..',.,;---:;:; 't' LI 3 SanFrancisoo, CA 94110 - . ., 1 I..' _1"11. , " ".",:('~ 01:' -' Tel~honc: (415) 436-9333xlO8 1'.::'""' ' ,-" ..1,,'I " , '.'T '. ,. ~ . \ ~ ' $~!."( FacsImile: (415) 436-9993 CC~:.: ~. ",I, \, 4 "~t'l~ 'i ' : 5 David Greene (SUte BarNo. 160107) ~.. FIRST AMENDMENT PROJECT (,' 6 1736 Franklin St, Ninth Floor Oakland, CA 94612 7 Telephone:(.510) 208-7744 facsimile: (510) 208-4562 8 Attomeysfor Defendant 9 JOHNDOE 10 SUPERIORCOURT OF THE STATE OF CALIFORNIA 11 IN AND FOR mE COUNTY OF SANTA CLAM 12 UNLIMITED JURISDICTION 13 E . v AN CULLENS . No. CV 814664 14 Plaintiff, ~MORANDYM OF~~S ~ FUTHORITIES IN SUPPORT_O~ 15 ~ND:A.NTts MOTION TO QUASH v. ! 1~ §UBPOENA JOHN DOE, C.C.P. §418.10 17 Defendant. ! Date: A~117. 2003 18 Time: 9:00Lm. Dept: 2, Hon.William]. Blf\li]1g 19 ~ 20 21 .22 23 2. 2S 26 27 s 28 ~~ - - NBtI4O~M OFPOINTS AND AUTHO~ I!'l SurPOJ.TOF ' \~ DBIIeIt)ANT'S MO'nON TO QUASH Su.POlNA \&.. - PAGE.a? ~.d £666~tvt Ol 9S89L~ ~J.5 ~I~;:! ~;:! 9S:91 ~ l.1 ~ 1 TABLE OF CONTENTS 2 I. INTRODUcnON ..1 3 II. FACIUAL BACKGROUND 4 A. The Parties 1 5 B. Yahoo's Message Boards on the Internet 2 6 c. The Westell and ADCT MessageBoards 3 7 D. Doe'sParticipation In The Public DiscussionOn The Westell and ADCT MessageBoards 4 8 ill. LEGAL BACKGROUND ...5 9 A The First Amendment Establishes The Right To Speak Anonymously In Chat Rooms And On Message Boards On The Internet 5 10 B. Does' Motion to Quash Should Be Granted Because there Is No Compelling Need for 11 Defendant's Identity that Outweighs Defendant's First Amendment Rights 6 12 c. Cullens Cannot Demonstrate That He Has A Compelling Interest in Obtaining Doe's Identity That Outweighs Doe's First Amendment Right to Speak Anonymously 8 13 1. Libel Actions Under lllinois Law are Strictly Limited by the First Amendment and the 14 lllinois Constitution 8 IS 2. Cullens's Lawsuit is Obviously Without Merit becausethe Statementwas not "of and Concerning" Cullens and May Reasonablybe Given an Innocent, Nondefamatory 16 Construction 8 17 3. Cullens's Lawsuit Against Doe is Obviously Without Merit BecauseDoe's Statements Are Privilegedunder illinois Law 11 18 4. Cullens's Lawsuit Against Doe is Obviously Without Merit BecauseDoe's Statements 19 Are Rhetoricaland Do Not Imply the Existenceof a Provably FalseFact 11 20 IV. CONCLUSION. 15 21 22 23 24 25 26 27 28 TABLE OF AUTHORITIES 2 Cases 3 Archibald v. Belleville News Democrat,54111.App.2d 38 (1964) 9 4 Aroonsakul v. Shannon, 279 lli.App.3d 345 (1996) , 9 5 Barry Harlem Com. v. Kraff. 273 ill.App.3d 388 (1995) ,..10 6 BioSDherics. Inc. v. Forbes. Inc., 151 F.3d 180 (4th Cir. 1998) 13 7 Bryson v. News America Publications,174 Dl.2d 77 (1996) 8,9 8 Buckley Y. American Constitutional Law Found.. Inc.. 525 U.S. 182 (1999) 5 Q Cartwri2ht v. Garrison. 113 Dl.App.3d 536 (1983) , 10 10 Catalano v. Pechous, 83 1ll.3d 146 (1980) 1 ChaDski v. CoDle~ Press. 92 m.2d 344 (1982) 9 12 Columbia InsuranceComnanv v. Seescand~.com.185 F.R.D. 573 (N.D. Ca!. 1999) 1,6 13 Dendrite International.Inc. v. Doe. No.3. 775 A.2d 756 (N.J. App. 2001) 1 14 Dodds v. ABC. Inc., 145 F.3d 1053 (9th Cir. 1998) 12 IS Dollens v. Vukovich and Zionts. No. OlC2826(N.D. Dl, 4 16 Dubinskv v. United Arlines MasterExecutive Council, 303 Dl.App.3d 317 (1999) ...13 17 Greenbelt PublishinQ:Association v. Bresler. 398 U.S. 6 (1970) 13 18 Grisanziov. Rockford Newsnapers.132 Dl.App.3d914 (1985) 10 19 Homerin v. Mid-Illinois Newsnmers, 245 lli.App.3d 402 (1993) ... , 9,10 20 HoDewell v. Vitullo, 299 1ll.App.3d 513 (1998) 12 21 Immunomedics.lnc.v. Doe, 775 A2d 773 (N.J. Sup. Ct App. Div. 2001) 6 22 Canada,case no. 02-0151-MISC-WHA 8,13 23 In re Yagman,Westell Technolo~es. 55 F.3d 1430Inc.. (9th Cir. Securities 1995)Lit No. 00C6735 (N.D.ll1.) ..4 24 12 25 JeffersonCounty School District v. Moodys Investor'sServices. Inc., 988 F. Supp. 1341(D. Colo. 26 1997) 15 27 McIntvre v. Ohio Elections Comm'n. 514 U.S. 334 (1995) 5 28 Milkovich v. Lorain JournalCo.. 497 U.S. (1990) 11 n MOTION TO QUASH SUBPOENA 1 Mittleman v. Witous, 135 Dl.2d 220 (1989) 10 2 Moriartv v. Greene. 315 1ll.App.3d 225 (2000) , 11 3 Momin2star. Inc. v. SuDerior Court, 23 Cal.App.4th 676 (1994) 13 4 NAACP v. Alabama ex reI. Patterson, 357 U.S. 449 (1958) 5 5 New York Times v. Sullivan. 376 U.S. 254 (1964) 8,9 6 Newell v. Field Ent~rises, 91 1ll.3d 735 (1980) 11 7 PhantomTourine:. Inc. v. Affiliated Productions,953 F.2d 724 (1stCir. 1992), , 12 8 Reno v. American Civil Liberties Union, 521 U.S. 844 (1997) 2 9 Richards of Rockford. Inc. v. Pacific Gas & Electric Co.. 71 F.R.D. 388 (N.D. Ca!. 1976).. 13 10 Schaffer v. Zekm~ 196 lli.App.3d 727 (1990) 9 11 Schivarelli v. CBS. Inc., 333 lll.App.3d 755 (2002) , 9, 13 12 Statev. DiGui~ 152 Dl.2d 104 (1992) 8 13 Talley y. Califomi~ 362 U.S. 60 (1960) 5 14 TeDDer v. CoRley Press. 308 lll.App.3d 718 (1999) 1 15 Watchtower Bible and Tract Society y. Village of Staton, 122 S.Ct. 2080 (2002) 5 16 Other Authorities 17 Restatement (Second) of Torts §611 , 11 18 Law Review Articles and Treatises 19 Joshua R. Funnan, C bersmearor C er-SLAPP: Anal in Defamation Suits A ainst Online John Doesas Strate~c LawsuitsA2ainst Public Particination,25 SeattleU. L. Rev. 213 (2001) 6 20 21 22 23 24 25 26 27 28 1 I. INTRODUCTION 2 Peopleshould be able to participateonline without fear that someonewho wishesto harassor embarrassthem can file a frivolous lawsuit and thereby gain the power of 3 the court'sorder to discovertheir identities. 4 Columbia Insurance ComDanv v. Seescandy.com,185 F.R.D. 573, 578 (N.D. Ca!. 1999) 5 (discussingFirst Amendmentlimitations on allowing discovery to reveal an anonymous 6 defendant'sidentity). Movant John Doe! is an anonymousposter to two Internet messageboards 7 who madetwo statementscritical of a publicly-traded companycurrently run by Plaintiff Cullens. 8 In an effort to prevent Doe from further posting his opinions about the company on the Internet, 9 Cullens has filed a manifestly meritless libel suit against Doe in lllinois and now asks this 10 California court to force disclosureof his identity. 11 Doe brings two motions in response,one to quash the subpoenaand a second,a special 12 motion to strike under California's Anti-SLAPP statute. Both seek to protect Doe's First 13 Amendment right to speak anonymouslyon the Internet. Since both motions draw on the same 14 factual and legal backgroundsand the same portions of lllinois defamation law, we will only 15 provide them once in this Motion to Quash (and not in the Motion to Strike) in order to avoid 16 repetition and savepaper. 17 II. FACTUALBACKGROUND 18 A. The Parties 19 Plaintiff Cullens is Presidentand Chief Executive Officer of Westell, an lllinois company. 20 Cullens has sued Doe in lllinois state court alleging one causeof action for libel per se. E. Van 21 Cullens v. John Doe. No. 2003LOOOlll (18thJudicial Circuit, Du Page County, lllinois). A b"ue 22 and correct copy of the Complaint is attachedto the Declarationof Cindy A. Cohn file herewith as 23 Exhibit A (Cohn. Decl.)? Cullens has issued a California subpoenato online service provider 24 Yahoo! Inc. ("Yahoo") seekingto have Yahoo reveal the identity and all other information Yahoo 25 1 Plaintiff refers to Defendant as John Doe. Doe here adopts that moniker but this is not intended 26 to be a representation of Defendant's actual gender. 2 On March 17,2003, the lllinois Court issued an extension of time until May 12, 2003, for Doe to 27 respond to the lllinois lawsuit in order to allow this Court time to consider this Motion to Quash 28 and for Cullens to substantiate his claim of $50,000 in damages. MOTION 10 QUASH SUBPOENA 1 has aboutJohn Doe. Cohn. Decl.t Exh. B.3 The lawsuit arisesfrom two postings Doe madein two 2 discussionsheld on Yahoo messageboards. 3 B. Yahoo's Messa2eBoards on the Internet 4 The United States SupremeCourt has repeatedly recognized the Internet's potential to 5 support democraticinstitutions and serve as the ideal "town square." The Internet allows people 6 otherwise without accessto significant resourcesto voice their opinions - profound, profane, or '7 proselytizing though they may be - to all who wish to readthem. As the SupremeCourt explained 8 in Reno v. American Civil Liberties Union. 521 U.S. 844, 853 (1997), "[t]rom the publisher'spoint 9 of view, [the Internet] constitutesa vast platfonn from which to addressand hear from a worldwide 10 audienceof millions of readers,viewers, researchers,and buyers." "Through the use of chat 11 rooms, any person with a phone line can becomea town crier with a voice that resonatesfarther 12 than it could from any soapbox.Through the use of Web pages, the same individual can 13 becomea pamphleteer.tlM.at 870. 14 So that these town criers and pamphleteersand their interestedaudiences can find each 15 other, Yahoo! has createdelectronic bulletin boards, or "MessageBoards," covering a variety of 16 topics.
Recommended publications
  • The Need for a New Subpoena Power That Targets Illegal Bitcoin Transactions, 56 B.C.L
    Boston College Law Review Volume 56 | Issue 5 Article 10 12-1-2015 Reaching Within Silk Road: The eedN for a New Subpoena Power That Targets Illegal Bitcoin Transactions Alice Huang Boston College Law School, [email protected] Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Criminal Law Commons, Criminal Procedure Commons, Internet Law Commons, and the Privacy Law Commons Recommended Citation Alice Huang, Reaching Within Silk Road: The Need for a New Subpoena Power That Targets Illegal Bitcoin Transactions, 56 B.C.L. Rev. 2093 (2015), http://lawdigitalcommons.bc.edu/bclr/vol56/iss5/10 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. REACHING WITHIN SILK ROAD: THE NEED FOR A NEW SUBPOENA POWER THAT TARGETS ILLEGAL BITCOIN TRANSACTIONS Abstract: With the rise of Bitcoin and other virtual currencies, it has become crucial for government regulatory bodies to catch up. Black market sites like the now-defunct Silk Road have continued to exploit the anonymity of Bitcoin to engage in illegal transactions. In order to identify criminal Bitcoin users, the government must respond with an updated criminal subpoena standard that addresses virtual currencies. This Note argues that the gap should be filled by combining current e-discovery standards from Rule 26 of the Federal Rules of Civil Procedure with elements of the Digital Millennium Copyright Act’s subpoena powers.
    [Show full text]
  • First Cash Opening SLAPP Brief
    1 MARK GOLDOWITZ, # 96418 CALIFORNIA ANTI SLAPP-PROJECT 2 2903 Sacramento Street Berkeley, CA 94702 3 Phone: (510) 486-9123 x 301 Fax: (510) 486-9708 4 Special Counsel for Defendant 5 JOHN DOE A/K/A KNOWFCFS 6 7 8 SUPERIOR COURT OF THE STATE OF CALIFORNIA 9 COUNTY OF SANTA CLARA 10 FIRST CASH FINANCIAL SERVICES, ) CASE NO.: 1-03-CV002135 INC., ) 11 ) DEFENDANT JOHN DOE A/K/A Plaintiff, ) KNOWFCFS’S NOTICE OF MOTION AND 12 ) SPECIAL MOTION TO STRIKE, v. ) PURSUANT TO C.C.P. § 425.16; 13 ) MEMORANDUM OF POINTS AND JOHN DOE A/K/A KNOWFCFS, ) AUTHORITIES IN SUPPORT THEREOF; 14 et al., ) DECLARATION OF MARK GOLDOWITZ ) 15 Defendants. ) BY FAX ) 16 Date: October 9, 2003 Time: 9 a.m. 17 Dept.: 2 Judge: Hon. William J. Elfving 18 19 20 21 22 23 24 25 26 27 28 DEFENDANT’S SPECIAL MOTION TO STRIKE 1 TABLE OF CONTENTS 2 DEFENDANT JOHN DOE’S NOTICE OF MOTION AND SPECIAL MOTION TO STRIKE, PURSUANT TO C.C.P. § 425.16 ......................... iv 3 MEMORANDUM OF POINTS & AUTHORITIES IN SUPPORT OF 4 DEFENDANT’S SPECIAL MOTION TO STRIKE .........................................1 5 INTRODUCTION....................................................................1 6 I. FACTUAL BACKGROUND AND PROCEDURAL HISTORY .........................2 7 A. Factual Background. .....................................................2 8 B. Procedural History. ......................................................3 9 II. THE ALLEGATIONS OF THE DEPOSITION SUBPOENA AND THE UNDERLYING PETITION ARE COVERED BY C.C.P. § 425.16, BECAUSE THEY ARISE FROM 10 DEFENDANT’S ACTS IN FURTHERANCE OF THE FIRST AMENDMENT RIGHT TO SPEAK OUT ON A PUBLIC ISSUE. .............................................4 11 A. The California Anti-SLAPP Law Was Enacted to Protect the Fundamental Constitutional 12 Rights of Petition and Speech and Is to Be Construed Broadly.
    [Show full text]
  • Who Should Be Liable for Online Anonymous Defamtion
    Perry and Zarsky: Who Should Be Liable for Online Anonymous Defamtion Who Should Be Liable for Online Anonymous Defamation? Ronen Perryt and Tal Z. Zarskytt INTRODUCTION The advent of Web 2.0 technologies and applications has en- abled average people-who were previously mere consumers of online content-to publish their own content on various websites, such as blogs, consumer-evaluation platforms (such as Amazon, eflay, and TripAdvisor), news websites (through reader com- ments), social networking services (such as Facebook, Twitter, and Linkedln), media-sharing websites (such as Instagram and YouTube), and collaborative-writing projects (such as Wikipedia). Some of these user contributions may be defamatory, and one of the most complex and intriguing legal questions in this context is: Who should be liable for defamatory statements made online by anonymous (or pseudonymous) users? This Essay critically eval- uates the answers given in various Western jurisdictions and ar- gues that economic analysis supports a revolutionary liability re- gime, which we call "residual indirect liability."1 Our main theoretical contribution lies in recognizing that the legal response to online anonymous defamation should be viewed and analyzed as a combination of two components. The first is the ability (or inability) to bring an action against the content pro- vider-the platform that enables the defamatory statement. Such an action may require modification of substantive law-the recog- nition of some sort of indirect liability.2 The second component is the ability (or inability) to bring an action against the speaker- the anonymous user. Such an action does not require modification t Academic Visitor, Faculty of Law and Centre for Socio-Legal Studies, University of Oxford; Professor of Law and Director of the Aptowitzer Center for Risk, Liability, and Insurance, University of Haifa.
    [Show full text]
  • Copyright& New Media
    Copyright & New Media Law Volume 19, Issue 2 • summer 2015 Making complex legal issues make sense The 21st Century Federalist Papers Anonymous Online Speech, John Doe Lawsuits, and the First Amendment By margaret e. KrawIec, Partner, and thomas Parnham, assocIate An author’s decision to remain anonymous, Among the cherished freedoms protected Today, the right to speak anonymously is like other decisions concerning omissions by the First Amendment is the right to most frequently exercised via the Internet, or additions to the content of a publication, speak anonymously. Indeed, anonymous including through email, message boards, is an aspect of the freedom of speech speech has played an important role and social media websites. As the U.S. protected by the First Amendment. throughout this nation’s history: colonial Supreme Court recognized nearly twenty patriots writing against the abuses of the years ago, at the dawn of the information McIntyre v. Ohio Elections Commission, English crown “frequently had to conceal age, anyone with an Internet connection 514 U.S. 334, 342 (1995) their authorship or distribution of literature,” “can become a pamphleteer” or a “town and even “the Federalist Papers, written in crier with a voice that resonates farther [The Internet] provides relatively unlimited, 4 favor of the adoption of our Constitution, than it could from any soapbox.” In 1997, low-cost capacity for communication of all 1 were published under fictitious names.” the year Reno was decided, the U.S. Census kinds. This dynamic, multifaceted “The decision in favor of anonymity may be Bureau reported that approximately 18% of category of communication includes not motivated by fear of economic or official households had Internet access; as of 2011, only traditional print and news services, retaliation, by concern about social ostracism, that number had jumped to 72%.
    [Show full text]
  • A Blogger, Google, and a "Skank": an Analysis of Whether Google Has a Fiduciary Obligation to Its Bloggers
    Volume 113 Issue 3 Article 10 April 2011 A Blogger, Google, and a "Skank": An Analysis of Whether Google Has a Fiduciary Obligation to Its Bloggers Michael W. Taylor West Virginia University College of Law Follow this and additional works at: https://researchrepository.wvu.edu/wvlr Part of the Entertainment, Arts, and Sports Law Commons, Internet Law Commons, and the Privacy Law Commons Recommended Citation Michael W. Taylor, A Blogger, Google, and a "Skank": An Analysis of Whether Google Has a Fiduciary Obligation to Its Bloggers, 113 W. Va. L. Rev. (2011). Available at: https://researchrepository.wvu.edu/wvlr/vol113/iss3/10 This Student Work is brought to you for free and open access by the WVU College of Law at The Research Repository @ WVU. It has been accepted for inclusion in West Virginia Law Review by an authorized editor of The Research Repository @ WVU. For more information, please contact [email protected]. Taylor: A Blogger, Google, and a "Skank": An Analysis of Whether Google H A BLOGGER, GOOGLE, AND A "SKANK": AN ANALYSIS OF WHETHER GOOGLE HAS A FIDUCIARY OBLIGATION TO ITS BLOGGERS I. INTRODUCTION ..................................... 1002 II. BACKGROUND............................................1004 A. Bloggers' Expectation of Privacy and How to Unmask the Anonymous Blogger. ...................... ...... 1004 1. Constitutional Protection for Anonymous Speech ..................................... 1004 2. The Process to Unmask an Anonymous Blogger.... 1006 3. Applicable Legal Standards to Evaluate Whether to Unmask a Blogger.............................1006 a. The Motion to Dismiss Standard ..... ..... 1007 b. The Summary Judgment Standard....................1008 c. The Good Faith Basis Standard........................1009 d. Other Factors Considered By Courts................1010 B.
    [Show full text]
  • John Doe Subpoenas: Toward a Consistent Legal Standard
    NATHANIEL GLEICHER John Doe Subpoenas: Toward a Consistent Legal Standard A BST RACT. This Note considers the rising trend of anonymous online harassment and the use of John Doe subpoenas to unmask anonymous speakers. Although anonymity often serves as an important shield for valuable speech, it also protects online harassment that can chill or completely silence the speech of its targets. This Note argues that the public figure doctrine should be adapted to John Doe subpoenas to distinguish between online harassment and more valued anonymous speech. It then divides John Doe subpoena standards into six constituent factors, evaluates each one, and proposes a final standard that consistently balances the needs of plaintiffs and defendants and helps judges to distinguish online harassment from other forms of anonymous speech. A U T H O R. Yale Law School, J.D. 2009; University of Chicago, B.S. 2003. I am especially grateful to Professor Jack Balkin for his guidance and advice in developing this piece, and to Professor Danielle Citron for her extensive comments and edits. I am also indebted to Professor Robert Post for his helpful comments on composing my standard. Thanks also to Kyle Glover, Brittan Heller, and my family for their advice and unwavering support. NOTE CONTENTS INTRODUCTION 323 1. WHAT IS A JOHN DOE SUBPOENA? 326 A. The Qualified Privilege of Anonymous Speech 326 B. From John Doe Pleading to John Doe Subpoenas 327 C. The Unique Features of John Doe Subpoenas 329 II. DISTINGUISHING ONLINE HARASSMENT FROM TRADITIONAL ANONYMOUS ONLINE SPEECH 330 A. Public Figure Doctrine 332 B.
    [Show full text]
  • Defamation Or Discourse ?: Rethinking the Public Figure Doctrine on the Internet
    DEFAMATION OR DISCOURSE?: RETHINKING THE PUBLIC FIGURE DOCTRINE ON THE INTERNET† INTRODUCTION Freedom of speech is one of the core liberties guaranteed to our citizens, immortalized in the Constitution and fiercely defended throughout history. This freedom has traditionally included expression through print, speech and even conduct. However, technological ad- vancements, coupled with a substantial increase in access to the Inter- net, have created an unprecedented medium of expression with vir- tually no limits on the dissemination of ideas. In its early stages the Internet provided users with limited functions like access to email, messaging with friends and chat room dialogues, but this landscape has changed dramatically with the introduction of thread messaging, blogging and social networking sites. Virtually every person with a computer has the opportunity to engage in some form of online dis- course—whether it be reconnecting with friends, making social com- mentary or engaging in politically volatile debates. The expansive accessibility provided by the Internet has undoub- tedly increased the ability of users to disseminate their ideas and opi- nions to wider audiences.1 Further, many users rely on the anonymity that the Internet easily provides to express controversial, yet impor- tant, ideas that would otherwise bring disrepute. While online ano- nymity is valuable as it encourages the speaker to distribute his ideas freely, it is also dangerous as it widens the potential for cognizable legal harm to individuals in the form of online defamation. Thus, a † Awarded Journal of Law, Technology & the Internet Note of the Year, as selected by the Volume 1 Editorial Board. 1 See Lyrissa Barnett Lidsky, Silencing John Doe: Defamation & Discourse in Cyberspace, 49 DUKE L.J.
    [Show full text]
  • Anonymity As a Legal Right: Where and Why It Matters Jason A
    NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY Volume 16 | Issue 2 Article 3 1-1-2015 Anonymity as a Legal Right: Where and Why It Matters Jason A. Martin Anthony L. Fargo Follow this and additional works at: http://scholarship.law.unc.edu/ncjolt Part of the Law Commons Recommended Citation Jason A. Martin & Anthony L. Fargo, Anonymity as a Legal Right: Where and Why It Matters, 16 N.C. J.L. & Tech. 311 (2015). Available at: http://scholarship.law.unc.edu/ncjolt/vol16/iss2/3 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of Law & Technology by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY VOLUME 16, ISSUE 2: JANUARY 2015 ANONYMITY AS A LEGAL RIGHT: WHERE AND WHY IT MATTERS By Jason A. Martin* and Anthony L. Fargo- This Article examines the legal status of the right to communicate politicaland social ideas and criticism anonymously online. As an inherently borderlessplatform for communication, the Internet has generated new methods for sharing information on issues ofpublic importance among citizens who may be thousands of miles apart. Yet governments around the world continue to take markedly different approaches toward the regulation of anonymous online expression and the identification of online users, which has resulted in a patchwork approach. This Article provides a more comprehensive understanding of the differences in internationallegal standards surrounding such communication and what should be done to resolve those discrepancies.
    [Show full text]
  • John Doe Subpoenas: Toward a Consistent Legal Standard Abstract
    320.GLEICHER.368.DOC 11/25/2008 2:22:35 PM Nathaniel Gleicher John Doe Subpoenas: Toward a Consistent Legal Standard abstract. This Note considers the rising trend of anonymous online harassment and the use of John Doe subpoenas to unmask anonymous speakers. Although anonymity often serves as an important shield for valuable speech, it also protects online harassment that can chill or completely silence the speech of its targets. This Note argues that the public figure doctrine should be adapted to John Doe subpoenas to distinguish between online harassment and more valued anonymous speech. It then divides John Doe subpoena standards into six constituent factors, evaluates each one, and proposes a final standard that consistently balances the needs of plaintiffs and defendants and helps judges to distinguish online harassment from other forms of anonymous speech. author. Yale Law School, J.D. 2009; University of Chicago, B.S. 2003. I am especially grateful to Professor Jack Balkin for his guidance and advice in developing this piece, and to Professor Danielle Citron for her extensive comments and edits. I am also indebted to Professor Robert Post for his helpful comments on composing my standard. Thanks also to Kyle Glover, Brittan Heller, and my family for their advice and unwavering support. 320 320.GLEICHER.368.DOC 11/25/2008 2:22:35 PM john doe subpoenas note contents introduction 323 i. what is a john doe subpoena? 326 A. The Qualified Privilege of Anonymous Speech 326 B. From John Doe Pleading to John Doe Subpoenas 327 C. The Unique Features of John Doe Subpoenas 329 ii.
    [Show full text]
  • 62 • the FEDERAL LAWYER • May 2015 Unmasking “John Doe” Leaks by John Fraser
    62 • THE FEDERAL LAWYER • MAY 2015 Unmasking “John Doe” Leaks By John Fraser he federal government leaks secrets publicize such suits, and educate the federal workforce as to to a shocking extent, and yet there is the use of this tool. Frequent and well-publicized use of John Doe lawsuits by the government will help to erode the culture Tat least one commonly available liti- that has developed within the federal government that tolerates gation tool that the government has failed leaks or regards them as unstoppable. John Doe lawsuits should be used to supplement criminal law to deploy to combat leaks. In the world processes that were not specifically designed to identify anony- outside the government, the right to control mous sources of leaks. In any event, few defendants are identi- fied through criminal processes, and very few are punished.2 confidential information, to protect trade Because John Doe lawsuits and subpoenas are civil proceed- secrets, and to maintain the confidence of ings, and because business corporations may not assert Fifth business allies, is protected by use of “John Amendment rights, John Doe lawsuits are effective in unmask- ing anonymous actors in the private sector. Accordingly, John 1 Doe” lawsuits. These civil lawsuits name Doe lawsuits are crucial in identifying the heretofore unknown an unknown John Doe defendant and seek actors. Civil discovery procedures allow for broader discovery immediate discovery from nonparty busi- than do criminal procedures. Obtaining evidence from media nesses to unmask the defendant and seek corporations via search warrants in a criminal case is lim- civil remedies for unauthorized uses of ited under the Privacy Protection Act, whereas a subpoena of media corporation records in the civil context is not so information.
    [Show full text]
  • Cyberslapp Suits and John Doe Subpoenas: Balancing Anonymity and Accountability in Cyberspace, 19 J
    The John Marshall Journal of Information Technology & Privacy Law Volume 19 Issue 3 Journal of Computer & Information Law - Article 3 Spring 2001 Spring 2001 Cyberslapp Suits and John Doe Subpoenas: Balancing Anonymity and Accountability in Cyberspace, 19 J. Marshall J. Computer & Info. L. 493 (2001) Shaun B. Spencer Follow this and additional works at: http://repository.jmls.edu/jitpl Part of the Computer Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Shaun B. Spencer, Cyberslapp Suits and John Doe Subpoenas: Balancing Anonymity and Accountability in Cyberspace, 19 J. Marshall J. Computer & Info. L. 493 (2001) http://repository.jmls.edu/jitpl/vol19/iss3/3 This Article is brought to you for free and open access by The oJ hn Marshall Institutional Repository. It has been accepted for inclusion in The oJ hn Marshall Journal of Information Technology & Privacy Law by an authorized administrator of The oJ hn Marshall Institutional Repository. CYBERSLAPP SUITS AND JOHN DOE SUBPOENAS: BALANCING ANONYMITY AND ACCOUNTABILITY IN CYBERSPACE by SHAuN B. SPENCERt Lawyers in so-called "cyberSLAPP"' lawsuits frequently subpoena Internet Service Provider ("ISP") records to expose the authors of anony- mous Internet postings. This trend pits two legitimate interests against one another. 2 The anonymous poster-John Doe3-claims a First Amendment right to participate anonymously in public debate. On the other hand, companies want John Doe held accountable when his post- ings harm them. Current law favors accountability at the expense of anonymity. John Doe often receives no meaningful notice before his ISP discloses his identity to the very company from whom he wanted to remain anony- mous.
    [Show full text]
  • Copyright's Public-Private Distinction
    Case Western Reserve Law Review Volume 55 Issue 4 Article 10 2005 Comment: Copyright's Public-Private Distinction Juliet E. Cohen Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation Juliet E. Cohen, Comment: Copyright's Public-Private Distinction, 55 Case W. Rsrv. L. Rev. 963 (2005) Available at: https://scholarlycommons.law.case.edu/caselrev/vol55/iss4/10 This Symposium is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. COMMENT: COPYRIGHT'S PUBLIC- PRIVATE DISTINCTION Julie E. Cohent I would like to focus my remarks on the question of user privacy. In her fascinating paper for this Symposium, Professor Litman ex- presses a guarded optimism that in its forthcoming decision in MGM v. Grokster,' the Court will retain the staple article of commerce doc- trine that it first articulated in Sony.2 She opines, however, that the user privacy strand of the Sony decision is a lost cause. I don't be- lieve that it's possible to retain the staple article of commerce doctrine while abandoning user privacy. At least in the realm of networked digital technologies, the two concepts are inextricably linked. To explain why, I would like to begin by examining a concept that I'll call copyright's public-private distinction. This distinction does not concern the presence or absence of state action, but rather the pres- ence or absence of conduct triggering legal accountability.
    [Show full text]