Judge orders Web site to unmask anonymous posters in libel case
Topix: We take privacy seriously
Topix CEO Chris Tolles said that his company had received the subpoena and was currently figuring out what exactly it needed to do. "We are not there yet, since it was a large request with lots of detail," Tolles said in an e-mail. "We prefer to make sure requests are clear and specific and not overly broad."
Tolles said that Topix takes privacy issues very seriously and that his firm would not "simply hand over all of our records" without a review of the demand by its lawyers and a discussion of the issue with the court.
At the same time, though, Tolles said libel was a legitimate concern, and that Topix will cooperate with the courts when a valid request for information was made. Topix is reviewing the subpoena to make sure the request is "above a reasonable threshold," he said.
Reminder: Anonymity is not immunity
The lawsuit serves as reminder that online anonymity does not automatically provide immunity against libel charges, said Eugene Volokh, professor of law at the University of California at Los Angeles' School of Law.
While the First Amendment provides protections for free speech, "not all categories of speech are protected, libel for instance," Volokh said.
"While people have the right to say things anonymously, if someone sues them of libel, then a court may order others to turn over information about them," Volokh said. "The First Amendment does not prevent the use of judicial processes to uncover the identities of speakers" in cases where libel is suspected.
It is not the first time a court has ordered a Web site or service provider to hand over identifying information on anonymous posters.
The most high-profile example involves two female Yale Law School students who were the targets of a similar flood of highly personal anonymous attacks posted on the AutoAdmit college bulletin board in 2005.
In January 2008, the students got a Connecticut district court judge to issue a subpoena asking the operator of AutoAdmit to hand over any information it had to help reveal the true identities of 39 posters who used pseudonyms on the board.
The subpoena resulted in the lawyers for the two students unmasking the identities of several of the anonymous users behind the postings.
In a blog post related to the case, Volokh noted that while some of the comments against the two students may well have been libelous, some of the statements could also be interpreted as threats of rape and other physical harm against the two.
In similar cases, such comments, whether anonymous or not, "may be constitutionally unprotected, and there would be no bar to tort liability for them," Volokh noted in the blog post.
Read more about Internet in Computerworld's Internet Topic Center.
- The 20 Best iPhone/iPad Games of 2013 So Far
- 9 Steps to Build Your Personal Brand (and Your Career)
- 7 Consumer Technologies Coming to an Enterprise Near You
- 11 Signs Your IT Project is Doomed
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Harness IT -- An Introduction to Business Intelligence Solutions
- Learn the key selection criteria required to provide your organization with the capability to address structured data, unstructured data and mobile demands so...
- Business Intelligence Shows its Smarts
- Today's Business Intelligence (BI) tools provide a new way to think about data with self-service capabilities and user-friendly analytics that can be used...
- Proactive Planning for Big Data
- Big data is less about the terabytes and more about the query tools and business intelligence needed to make sense of massive amounts...
- Inquiry Spotlight: Consumer-Facing Identity
- The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. All Government IT White Papers
- Becoming An Analytics Driven Organization
- Join us on Tuesday, June 18, 2013, 11:00 AM EDT and learn how your agency can create an analytics culture that will enable...
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity. All Government IT Webcasts