In light of the circumstances, numerous states have enacted “cyberstalking” or “cyberharassment” laws or currently possess laws that specifically include electronic forms of communication within more traditional stalking or harassment laws. In addition, many states have enacted “cyberbullying” laws in reaction to issues related to protecting minors from online bullying or harassment.

Cyberstalking constitutes use of the world-wide-web (i.e., the Internet), electronic mail or other electronic communications to stalk. It generally refers to a pattern of threatening or malicious behaviors. It may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm. Penalties range from misdemeanor to felony. See Cal. Civil Code § 1708.7, Cal. Penal Code § 646.9.

Cyberharassment is different from cyberstalking since it may not involve a credible threat. It usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting a person. Some state legislatures have dealt with this issue by inserting provisions which address electronic communications in general harassment statutes, while others have created stand-alone cyberharassment statutes. See Cal. Penal Code §§ 422, 653.2, and 653m.

Samsung Electronics, the second largest maker of mobile phones, claims that Apple Inc. has infringed upon its patents since entering the mobile-phone market with the iPhone 3G, a lawyer for Samsung told a Dutch court as the Korean company seeks a ban on some Apple products in the Netherlands.

“Apple just entered the market in 2008 without taking care of the licenses,” Bas Berghuis van Woortman, a lawyer for Simmons & Simmons LLP who represents Samsung, said in The Hague court. “Apple is consciously, structurally infringing the 3G patents.”

The parties will be discussing settlement soon as this is yet another legal battle between two technology giants over intellectual property rights.

In the recent years, numerous Internet forums (aka “online message boards”) have provided a place for Internet users to discuss issues, entities/companies, and persons or individuals, who are often disguised in some form of anonymity. Sometimes, the targets of disparaging comments react by filing lawsuits in state or federal courts against unidentified (“John Doe”) defendants for claims such as violation of securities laws, breach of confidentiality agreement, and libel. Generally, in such disputes subpoenas are submitted to the message board hosts so to identify the authors. Notwithstanding the various challenges, the courts differ in their treatment of such subpoenas.

For example, see Jon Hart & Michael Rothberg, Anonymous Internet Postings Pit Free Speech Against Accountability, WSJ.com (March 6, 2002).

In Mobilisa, Inc. v. Doe, 170 P.3d 712 (Ariz. Ct. App. 2007) Mobilisa, a communications company, filed a complaint against numerous “John Doe” defendants who had submitted an anonymous e-mail to Mobilisa’s management team about the company’s founder and CFO’s conducts. Thereafter, Mobilisa attempted to compel The Suggestion Box, which was the service provider through which the e-mail was submitted, so to obtain the person’s identity who had submitted the e-mail. The trial court granted Mobilisa’s request and ordered The Suggestion Box to reveal the identities of the anonymous senders. Thereafter, The Suggestion Box and the senders of the e-mail appealed the trial court’s decision.

Pursuant to Section 230 of the Communications Decency Act, no provider of an interactive computer service may be treated as the publisher of information provided by another information content provider. See 47 U.S.C. § 230(c)(1). The term “interactive computer service” means any information service, system, or access software provider that provides or enables computer access by multiple users to a computer server, including specifically a service or system that provides access to the Internet and such systems operated or services offered by libraries or educational institutions.

Generally, holding a website operator as the publisher of an allegedly libelous statement by a third party violates the Act. See Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997), cert. denied, 524 U.S. 937 (1998). Accordingly, the standard pursuant to Zeran is that when an online service provider receives a retraction demand regarding statements the service provider did not write, the demanding party should be re-directed to the third-party originator (i.e., the person who originally wrote the defamatory statement).

California’s Retraction Statute under Cal. Civ. Code § 48a states that:

A defamatory statement is one that injures the reputation of another. The common-law torts of libel and slander punish the publication of statements that are both defamatory and false. Generally, a libelous statement is a false and defamatory statement published in writing. A slanderous statement is a false and defamatory statement expressed orally. False and defamatory oral statements broadcasted over the radio or television are now widely considered libel, rather than slander. In some cases, money damages may be awarded to compensate the victim of libel or slander for the reputational injury caused by publication of the false and defamatory statement.

However, in recent years there has been significant tension between the common-law protections of reputation and the mandate of the First Amendment to the Constitution that “Congress shall make no law . . . abridging the freedom of speech, or of the press. . . .”

To ensure that debate on public issues remains “uninhibited, robust and wide-open,” New York Times v. Sullivan, 376 U.S. 254, 270 (1964), the United States Supreme Court has found that the First Amendment limits the circumstances under which a speaker or publisher may be punished for making false and defamatory statements: “Neither lies nor false communications serve the ends of the First Amendment . . . [b]ut to insure the ascertainment and publication of the truth about public affairs, it is essential that the First Amendment protect some erroneous publications as well as true ones.” St. Amant v. Thompson, 390 U.S. 727, 732 (1968).

The issue of online service provider liability comes up often in today’s high-tech world. In order to promote free discussion and private investment in the Internet, the United States Congress immunized providers of “interactive computer service[s]” against liability arising out of content provided for publication by any other “information content provider.” See Section 230 of the Communications Decency Act of 1996, 47 U.S.C. § 230. This section does not limit the application of intellectual property laws or criminal laws, but it protects Internet service providers and website operators against a broad range of tort, contract, and other claims arising out of content created by third parties.

Section 230(c)(2)(A) states that “[n]o provider or user of an interactive computer service shall be held liable on account of…any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected.”

Section 230(c)(2)(B), provides immunity for “any action taken to enable or make available to information content providers or others the technical means to restrict access to [such material].” The immunity offered under Section 230(c)(2) is also referred to as the “Good Samaritan” protection.

In New York Times Co. v. Sullivan, 376 U.S. 254 (1964), the United States Supreme Court ruled that the First Amendment limits common-law defamation claims brought by public officials. The Court held that to recover for publication of a defamatory falsehood, a public official must prove that the challenged statement was “of and concerning” the public official plaintiff, that the statement was false, and that the defendant acted with “actual malice.” The Court defined “actual malice” as publication with knowledge that the statement was false or with reckless disregard of whether the statement was false or not.

Later, the Supreme Court extended the standard announced in New York Times Co. v. Sullivan to defamation cases brought by “public figures.” Public figures include individuals who voluntarily inject themselves into public controversy, as well as those who are involuntarily thrust into the limelight, even if only with respect to a particular activity or incident.

A private-figure defamation plaintiff can recover damages based on the defendant’s negligence (or a more speech-protective standard, under the law of some states). In no instance, however, can a private-figure plaintiff recover damages for defamation without a showing of fault amounting to, at least, negligence. Any lesser standard, the Supreme Court concluded, would unduly burden free speech. Gertz v. Robert Welch, Inc., 418 U.S. 323, 347 (1974). And, at least when the speech relates to an issue of public concern, a private-figure plaintiff must bear the burden of proving falsity; the defendant speaker is not obligated to prove the truth of the challenged statements. Philadelphia Newspapers, Inc. v. Hepps, 475 U.S. 767, 768 (1986).

In the recent years, politically-motivated hackers have made sensitive information available to bloggers and mainstream media at unprecedented rates. For example, Wikileaks released leaked Afghan war logs and government diplomatic cables. Anonymous individual hacked and released emails from the computer security firm HBGary. A college student gained access to and released emails from Sarah Palin’s Yahoo account. LulzSec hacked into and publicly released confidential data belonging to Sony and others. Most recently, the Antisec movement hacked into over 70 police departments and released confidential emails and other files.

A this time, some important questions to ask ourselves would be as follows:

1. What are some applicable legal issues when publishing information obtained by hackers?

The United States government recently filed suit against 17 financial companies, including, but not limited to, the largest domestic banks, for selling Fannie Mae and Freddie Mac mortgage-backed securities worth billions of dollars that turned bad when the housing market collapsed.

Bank of America Corp., Citigroup Inc., JP Morgan Chase & Co., and Goldman Sachs Group Inc. were some of the financial firms which were targeted by the lawsuits. Also, European banks including the Royal Bank of Scotland, Barclays Bank, and Credit Suisse were also included in the recent lawsuit.

These complaints were filed by the Federal Housing Finance Agency. This agency oversees Fannie and Freddie which purchase mortgage loans and securities issued by lenders. The total price of the mortgage-backed securities sold to Fannie and Freddie equals $196 billion.

Facebook Inc., which is currently considered the world’s largest social network, plans more acquisitions so to improve its site design, keep services more reliable and advance its mobile features to compete with Twitter and Google which are active in the same arenas.

Facebook’s director of corporate development, Vaughan Smith stated that, the company aims to make approximately 20 purchases in year 2011 which is up from 10 last year and one in 2009.

It is important for our blog readers to know that Facebook obtains income from advertising and takes certain commission when software developers sell virtual goods on its website. As we know, Facebook is a closely-held company and it does not disclose its financials. Based on my research, the company is seeking to generate $2 billion or more in earnings before interest, taxes, depreciation and amortization in 2011.