MASSACHUSETTS SCHOOL OF LAW at ANDOVER
Issues in the Internet & The Law - Syllabus
Spring 2014 - Professor Olson
Day One: Monday, January 13th, 2014
I. Why does consumer privacy matter, and why should you and your law firm worry about it?
A. Massachusetts (and other state) Materials
Holders maintaining personal data system; duties
(MA ST 66A § 2)
Security Breaches (MA ST 93H, §§ 1-6)
Code of Massachusetts Regulations Title 950, Chapter 33.00
Code of Massachusetts Regulations Title 201, Chapter 17
Data Privacy Blog: http://www.massdataprivacylaw.com/
Businesses Nationwide Continue to Grapple with Massachusetts Data Privacy Laws: https://www.privacyassociation.org/publications/2012_11_01_businesses_nationwide_continue_to_grapple_with_massachusetts
California Class Action lawsuit v. Linked-In (see pdf in course documents)
B. FTC (and other) Federal Materials
Statutes: Locate and read (skim for an understanding of the laws) the Privacy Protection Act (42 U.S.C. §2000aa, et. seq.), Federal Wiretap Act, Electronic Communications Privacy Act (18 U.S.C. §§2510-2521), & Stored Communications Act (18 U.S.C. §2701 et. seq.)
Section 3 of the 1973 HEW Report: Records, Computers and the Rights of Citizens (1973) III. Safeguards for Privacy, http://epic.org/privacy/hew1973report/c3.htm
FTC, Privacy Online – A Report to Congress (1998), Fair Information Practice Principles, III.
http://www.ftc.gov/reports/privacy3/priv-23a.pdf
Prepared Statement of the Federal Trade Commission Before the Committee on Commerce, Science, and Transportation United States Senate Washington, D.C. May 25, 2000, Privacy Online: Fair Information Practices in the Electronic Marketplace, http://www.ftc.gov/os/2000/05/testimonyprivacy.htm
White House Office of Science and Technology Policy, Feb. 24, 2012, Internet Privacy: Protecting Consumers, Building Trust, Creating Jobs | The White House, http://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting-consumers-building-trust-creating-jobs
May 24, 2001 Letter from FTC Bureau of Consumer Protection to Junkbusters Corp and Electronic Privacy Information Center
Amazon.com, http://www.ftc.gov/os/closings/staff/amazonletter.shtm
FTC Press Release, June 16, 2005, BJ’s Wholesale Club Settles FTC Charges, http://www.ftc.gov/opa/2005/06/bjswholesale.shtm
See also FTC Press Release, March 25, 2010, Dave & Buster’s Settles FTC Charges It Failed to Protect Consumers’ Information, http://www.ftc.gov/opa/2010/03/davebusters.shtm
FTC Press Release dated March 17, 2008, ValueClick to Pay $2.9 Million to Settle FTC Charges, http://www.ftc.gov/opa/2008/03/vc.shtm
Other avenues of redress for consumers include the Electronic Frontier Foundation (All EFF Legal Cases | Electronic Frontier Foundation, https://www.eff.org/cases?tid=540) and the Electronic Privacy Information Center (EPIC – Electronic Privacy Information Center, http://epic.org) These groups carefully monitor the behavior of various industries, and keep consumers informed about miscreant companies.
Day Two: Tuesday, January 14th, 2014
Locate the following cases on either the EFF web site or on Westlaw, read enough court filings to be able to discuss the procedural and substantive history of the cases, and prepare to discuss them with the class as though you are presenting them to a firm committee in charge of accepting or rejecting cases.
1. New York v. Harris: Firm A
2. Al Haramain v. Obama: Firm B
3. Authors Guild v. Google: Firm C
4. Chevron v. Donziger: Firm D
5. Echostar v. Freetech: Firm E
6. In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks Rop_G IOERROR; and BirgittaJ (Government demands Twitter records of Birgitta Jonsdottir): Firm F
7. In Re: Matter of Search Warrant (Boston College): Firm G
8. Oregon v. Nix: Firm H
9. U.S. v. Doe (In re: Grand Jury Subpoena Duces Tecum Dated March 25, 2011): Firm I
10. U.S. v. Jones: Firm J
Day Three: Wednesday, January 15th, 2014
Social Media Privacy: Is this a contradiction in terms?
State Materials
Interception of Wire and Oral Communications, Mass. Gen. Laws ch. 272, § 99
Federal Materials
Electronic Communications Privacy Act, (Refer to the law governing this field again: 18 U.S.C. 2510-2521)
COPPA: 15 U.S.C. § § 6501-6508
Accompanying Regulations: 16 C.F.R. § 312 et seq.
Service providers may sometimes be required to collect and archive user information and communications because of its industry or the type of discussions that occur: 17 CFR 240.17a-4(b)(4) (SEC retention requirements for broker-dealers)
U.S. v. Thomas, 74 F.3d 701 (6th Cir. 1996).
U.S. Dept. of Defense, Global Positioning System Standard Positioning Service Performance Standard, http://www.pnt.gov/public/docs/2008/spsps2008.pdf, page v.
Other Authorities
Julian Dibbell, A Rape in Cyberspace, http://www.juliandibbell.com/articles/a-rape-in-cyberspace/
Nick Davies, Afghanistan War Logs: Story Behind Biggest leak in Intelligence History | World News | The Guardian, http://www.guardian.co.uk/world/2010/jul/25/wikileaks-war-logs-back-story
Comedian Jon Stewart, host of The Daily Show, highlighted the weakness of Mr. Manning’s pseudonym for concealing his identity, Jon Stewart | Wikileaks | Bradass87 | Mediaite, http://www.mediaite.com/onling/best-leak-ever-jon-stewart-mocks-media-coverage-of-wikileaks-controversy/
John Borland, See Who’s Editing Wikipedia – Diebold, the CIA, a Campaign, WIRED (Aug. 14, 2007), http://www.wired.com/politics/onlinerights/news/2007/08/wiki_tracker
TOR Project: Anonymity Online, https://www.torproject.org/
Policies & Principles – Google,
http://www.google.com/intl/en/+/policy/content.html
Twitter, Twitter Help Center | FAQS about Verified Accounts, https://support.twitter.com/groups/31-twitter-basics/topics/111- features/articles/119135-about-verified-accounts#
Daniel Akst, Helsinki Incident | The Cutting Edge?: The Helsinki Incident and the Right to Anonymity – Los Angeles Times, http://articles.latimes.com/1995-02-22/business/fi-34831_1_anonymous-remailers
Douglas MacMillan, Apple Swears IPad Partners to Secrecy, Business Week, http://businessweek.com/technology/content/mar2010/tc20100318_833402.htm
Douglas MacMillan, A Twitter Code of Conduct – BusinessWeek, http://www.businessweek.com/managing/content/may2009/ca2009058_089205.htm
Eric Bangeman, Faulty IP Address Data Leads to Shaq Attack on Innocent Family, http://arstechnica.com/tech-policy/news/2006/10/8062.ars
Michael Sigman, Pennsylvania 6-5000: A Hotel, A Phone Number, and a Song, LA Progressive, http://www.laprogressive.com/pennsylvania-6-5000/
Online Number – Online Business Number with Voicemail – Skype, http://www.skype.com/intl/en-us/features/allfeatures/online-number/
Mike Godwin, Virtual Community Standards, http://w2.eff.org/legal/virtcom_standards.article.txt
Dan Jerker B. Svantesson, Geo-Location Technologies and Other Means of Placing Borders on the “Borderless” Internet, 23 J. Marshall J. Computer & Info. L. 101, 102-03 (2004).
GPS-enabled location reporting increasingly make up the backbone of social media services: https://foursquare.com/
Michael Eyal Sharon, Who, What, When, and Now . . . Where, https://www.facebook.com/blog/blog.php?post=418175202130
Dan Fletcher, Please Rob Me: Site Shoes Dangers of Foursquare, Twitter, TIME, http://www.time.com/time/business/article/0,8599,1964873,00.html
Facebook “Friend” Suspected in Burglary, CBS News, http://www.cbsnews.com/stories/2010/03/25/earlyshow/main6331796.shtml
Molly Wood, Google Buzz: Privacy Nightmare | Molly Rants – CNET News, http://news.cnet.com/8301-31322_3-10451428-256.html
FTC Press Release, FTC Charges Deceptive Privacy Practices in Google’s Rollout of its Buzz Social Network, http://www.ftc.gov/opa/2011/03/google.shtm
Press Release, CR survey: 7.5 Million Facebook Users Are Under the Age of 13, Violating the Site’s Terms?: Consumer Reports, http://Pressroom.consumerreports.org/pressroom/
http://pressroom.consumerreports.org/pressroom/2011/05/cr-survey-75-million-facebook-users-are-under-the-age-of-13-violating-the-sites-terms-.html
Day Four: Thursday, January 16th, 2014
Privacy and Surveillance: Fourth Amendment as Applied to Online Privacy & Unauthorized Access: Spam, Trespass to Chattels
Cases:
1. State v. Reid, 945 A. 2d 26 (N.J. 2008)
2. Warshak v. United States, 532 F.3d 521 (6th Cir.
2008)(en banc)
3. City of Ontario, California v. Quon, 130 S. Ct. 2619
(2010)
4. Hepping v. AT&T Corporation, 439 F. Supp. 2d 974
(N.D. Cal. 2006)
5. United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008)
6. CompuServe Incorporated v. Cyber Promotions, Inc., 962
F. Supp. 1015 (S.D. Ohio 1997)
7. Gordon v. Virtumundo, Inc., 575 F.3d 1040 (9th Cir.
2009)(I., III.A., B., IV., & VII)
8. Jaynes v. Commonwealth of Virginia, 666 S.E.2d 303
(Va. 2008)
9. Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996)
10. eBay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058
(N.D. Cal. 2000)(I., III.A., & B.)
11. Intel Corp. v. Hamidi, 71 P.3d 296 (Cal. 2003)
12. Register.com, Inc. v. Verio, Inc., 356 F.3d 393 (2d Cir.
2004)
Day Five: Saturday, January 18th, 2014
Corporate/Governmental Partnerships; What is Authority in the New Technological Age?; How Should Content be Delivered, and Who Should Pay?