Cases Flashcards

1
Q

State v. Decker

A

Internet can be considered “present” without being “in the same place as someone” Near simultaneous conversation with minor and used tech to enter the minor’s private room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Voyeur Dorm v. City of Tampa

A

Zoning in residential areas prohibiting sexual entertainment does not apply to a fully-indoors livestream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Robles v. Domino’s Pizza

A

Blind plaintiff - website not made accessible for blind people; ADA rules provide “elimination of discrimination against individuals with disabilities” 42 USC 12101(b)(1)

Established precedent for applying ADA to online platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

United States v. Aurnheimer (3rd Cir. 2014)

A

Venue Problem - Guy hacks servers, revealing emails of iPad users. Sued in New Jersey, whereas D lived in a different state, and the servers he accessed were also in different states. The court ruled the venue was improper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

United States v. Yucel (SDNY 2015)

A

“Knowingly causing the transmission of a program, intentionally causing damage without authorization to a protected computer” 18 USC 1030(a)(5)(A). He made malware that would track keystrokes and find personal data on an infected computer.

Protected computer definition under Computer Fraud and Abuse Act (CFAA) - “‘which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.”

“affecting interstate or foreign commerce” invokes full reach of commerce clause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dormant (Negative) Commerce Clause

A

Constitutionally implied by Commerce Clause giving Federal Government the right to govern interstate commerce.

Prevents states from passing regulations or legislation benefiting their businesses at the expense of out-of-state business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In re Facebook Biometric Information Privacy Litigation (ND Cal 2016 & 2018)

A

BIPA requires companies to obtain informed consent before collecting, storing, or using individuals’ biometric data.
Facebook was collecting biometric data to identify who people were in different photos. Illinois law prevented this. Class action ensued, settling for $650 million dollars. (one of the largest privacy settlements in history)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protected Computer

A

18 USC 1030(e)(2)(B) - includes a computer used in or affecting “interstate or foreign commerce or communication.” In most cases, demonstrating that a computer was connected to the internet will satisfy this reuqirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extraterritoriality

A

Laws of the US are not presumed to have extraterritorial application absent contrary intent.

Intent to cause effects within the United States makes it reasonable to apply to persons outside US territory a statute which is not extraterritorial in scope.

Person may be charged in the place where the evil results, though he is beyond the jurisdiction when he starts the train of events of which that evil is the fruit.

International Cooperation - Council of Europe’s Convention on Cybercrime. Extradition - governed by Treaty.

National Jurisdiction - if server is in the US, likely would have jdx.
Extradition between states is governed by the extradition clause. (Art. IV Sec. 2, Clause 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packingham v. North Carolina

A

The court held that the North Carolina law preventing Registered Sex Offender from using social media.

Law was a content-based restriction that was not narrowly tailored to serve a significant government interest.

While the govt had a legitimate interest in protecting children from sexual predators, the law swept too broadly and was not tailored to the specific risked posed by social media use.

Social media is vital for speech and communication, not just for contacting minors. Less alternative means, such as using software to block access to certain sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Texas v. Johnson

A

Flag burning is protected speech under 1A
Symbolic speech is allowed. Govt could not prohibit the expression of an idea simply because society finds it offensive or disagreeable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bland v. Roberts

A

Liking a Facebook Post is not enough to merit constitutional protection.

The nature of liking something is substantive, showing that a user approves the post.

Liking the campaign was pure speech and symbolic expression.

Spence Test - conveys a message that is understood by those who viewed it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How the Law Responds when Emoji’s are the Weapon of Choice

A

The law needs to adapt to the evolving nature of communication and develop appropriate methods for interpreting emojis in a legal context. Emojis should be considered a form of speech and analyzed under 1A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sarah Jeong, The Internet of Garbage (2015) (32–34)

A

Current state of internet moderation is inadequate, and platforms must invest more resources in developing better systems and stratgegies to address online harassment. By doing so, they can help create a safer online environment for all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Restrictions

Prior Restraints

Viewpoint Based

Content Based

Content Neutral

Commercial Speech Restrictions

Incidental Speech Restrictions.

A

Prior Restraints are presumptively unconstitutional.
Viewpoint-Based Restrictions are presumptively unconstitutional.
Content-Based Restrictions must be narrowly tailored to serve a compelling
interest and be the least restrictive means of serving that interest.
Content-Neutral Restrictions must be narrowly tailored to serve a significant
interest and leave open ample alternative channels of communication.
Commercial-Speech Restrictions must directly serve a substantial interest
and be no more extensive than necessary to serve that interest.
Incidental Restrictions on Speech must serve a substantial interest unrelated to the
suppression of speech and be no greater than essential to serve that interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What constitutes a threat under federal criminal law?

What constitutes extortion under criminal law?

A
  1. What constitutes a threat under federal criminal law?
    A threat to kidnap or physically injure another person.
    The threat must be unequivocal, unconditional, and specific. The defendant must
    subjectively intend to communicate the threat, know it would be interpreted as a
    threat, or (perhaps) disregard the known risk that it would be interpreted as a threat.
  2. What constitutes extortion under federal criminal law?
    A threat to injure a person’s property or reputation or accuse them of a crime, with
    intent to extort a thing of value.