By: Nathan Geronimo

I have written several articles about litigants running into trouble when their testimony is contradicted by their own postings on social media websites.  A recent case from Sacramento illustrates a unique twist on the interplay between social media and court proceedings: the effect of juror posts on a defendant’s right to a fair trial.

Juror Number One v. Superior Court involved a juror posting comments on his Facebook wall about evidence presented at trial while the trial was in progress.  Following the trial and conviction on assault charges, the Court became aware of the Facebook activity, and held a subsequent juror misconduct hearing based on Juror One’s trial posts.  Juror One admitted posting comments on Facebook during the trial, but denied that the posts were about the trial or any evidence presented.  For example, Juror One admitted to posting that he was so bored one day during trial that he almost fell asleep.  He also invited a female juror to be his Facebook “friend.”  At the conclusion of the misconduct hearing, the Court was satisfied that there had been clear misconduct, but had further questions about the degree of misconduct, and whether it had been prejudicial to the trial.  Counsel for the real party in interest then issued a subpoena to Juror One for all postings by Juror One during the trial, including all emails and other electronic communications.  Juror One moved to quash the subpoena as overbroad.  The Court agreed that the subpoena was overbroad, but issued an order requiring Juror One to turn over all of his Facebook postings during trial to the Court for in camera review.

Continue Reading Social Media Impacts: Jury Trials

By: Lisa Y. Wang

The internet is about to change dramatically. Since Al Gore “invented” the world wide web, users have been used to using a limited number of top-level domains (“TLD”). A top level domain is the end portion of a web address (e.g. .com, .net, .org, .biz, and .gov). A second level domain name consists of the words in between www. and the TLD (e.g. apple in Currently, there are 22 top level domains (such as .org, .edu, and, .com) and over 200 country based domains (such as .us, .de, or .eu). But, by this time next year there may over a thousand in multiple categories such as place domains (e.g. .nyc, .taipei), keyword domains (e.g. .hotel, .watch, .apparel) or even brand domains (e.g. .apple, .gap, .walmart). It is important to protect your business from potential consumer confusion and infringement when these new TLDs go live next year.

The Internet Corporation for Assigned Names and Numbers (“ICANN”), a non-profit corporation, manages most TLDs, internet protocol addresses, and basically anything that involves the URL itself. Last year, ICANN approved the creation of new TLDs called generic top-level domains (“gTLD”) to increase competition and choice in the world wide web. Any legal entity may apply to create and manage a gTLD.

Continue Reading The Upcoming Internet Shift

By: Jeff Pietsch and Michael Robinson

It is Monday morning and you are recovering from a bachelor party in Sin City. Thankfully, your privacy settings on Facebook allow you to share pictures of your shenanigans in Vegas with only your friends. But what happens when your boss asks a friend and coworker to show him your embarrassing and private photos? Should a status update intended for a select few be protected from the prying eyes of your employer?

At an age when over 900 million people use Facebook, it is no surprise employers increasingly use social media in evaluating current and prospective employees. For example, last week the Federal Trade Commission (FTC) approved a process allowing a background check company to screen job applicants’ Internet photos and postings. The FTC determined that such actions were in compliance with the Fair Credit Reporting Act. This means a search of what you have said or posted to Facebook, Twitter, Flickr, blogs, and the Internet may become a standard part of background checks when you apply for a job.  

Continue Reading Shoulder Surfing: Can Employers Access Your Facebook Account

By: Nathan Geronimo

We have all participated in practical jokes.  If good-natured, executed correctly, and within the bounds of civility, practical jokes can be a fun way to get closer to people.  However, sometimes jokes can be anything but funny, and in the worst cases can constitute a crime.  In a recent case involving social media sites, California’s Fifth District Court of Appeal found that a minor’s conduct on Facebook constituted identity theft, which can be a misdemeanor or a felony.  In In re Rolando S., a juvenile obtained a classmate’s Facebook login information and accessed her Facebook page.  The minor was able to access the victim’s Facebook page because he received an unsolicited text message with the victim’s email password.  Armed with the email account information and password, he used this information to log into the victim’s Facebook account.  Once in the account, he made obscene changes to the victim’s profile, and posted lewd messages on two of the victim’s male friends’ pages purportedly as the victim. 

The minor was charged with willfully obtaining personal identifying information (which includes unique electronic data) and using it for an unlawful purpose, a violation of California Penal Code section 530.5.  The minor admitted to accessing the victim’s Facebook page and making the offending posts and changes, and he was convicted of identity theft.  On appeal, the minor argued that because he received the victim’s login information via unsolicited text message, that he did not “willfully” obtain the personal identifying information.  The Court disagreed, finding that the minor willfully obtained the information when he chose to remember the password from the text, and used the password to access the victim’s Facebook account.  Essentially, the Court found that the minor demonstrated a willingness to commit the act. 

Continue Reading Facebook Hijinks No Joking Matter

By: David Muradyan

Online service providers and operators of such sites should take careful note of the Second Circuit Court of Appeals’ recent decision in Viacom Int’l, Inc. v. YouTube, Inc., Case No. 10-3342-cv (“Viacom”), where the court held that service providers and operators will not be protected from the safe harbor provisions of the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 512(c), if they have “actual knowledge or awareness of facts or circumstances that indicate specific and identifiable instances of infringement.”

For background, “[t]he DMCA was enacted in 1998 to implement the World Intellectual Property Organization Copyright Treaty,” Universal City Studios, Inc. v. Corley, 273 F.3d 429, 440 (2d Cir. 2001), and to update domestic copyright law for the digital age. Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004). In particular, the DMCA established a series of four “safe harbors” that allow qualifying service providers to limit their liability for claims of copyright infringement based on (a) “transitory digital network communications,” (b) “system caching,” (c) “information residing on systems or networks at [the] direction of users,” and (d) “information location tools.” 17 U.S.C. §§ 512(a)-(d). The safe harbor at issue in Viacom was § 512(c), which covers infringement claims that arise “by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider.” 17 U.S.C. § 512(c)(1). To qualify for protection under any of the safe harbors, a party must: (1) be a “service provider,” which is defined as “a provider of online services or network access, or the operator of facilities therefor,” Id. § 512(k)(1)(B); (2) satisfy certain “conditions of eligibility,” including the adoption and reasonable implementation of a “repeat infringer” policy that “provides for the termination in appropriate circumstances of subscribers and account holders of the service provider’s system or network,” Id. § 512(i)(1)(A), and (3) accommodate “standard technical measures” that are “used by copyright owners to identify or protect copyrighted works.” Id. §§ 512(i)(1)(B), (i)(2). The § 512(c) safe harbor will apply only if the service provider: 

Continue Reading Second Circuit Holds that YouTube Is Not Protected by the “Safe Harbor” Provisions of the Digital Millennium Copyright Act