Possible Twitter lawsuit would dive into murky blog waters
Twitter may file suit against blogs, other Web sites that published hacked information
Computerworld - If Twitter decides to sue Web sites and bloggers that published information pilfered from its systems by hackers, the company could be diving into murky and largely untested legal waters.
Biz Stone, co-founder of the microblogging site, confirmed in a blog post yesterday that a hacker gained access to the personal e-mail account of a Twitter employee and with that was able to lift private company documents. At that point, the hacker offered the information to various blogs and online publications.
In his blog post, Stone said that Twitter is weighing its options over how to deal with the hacker and with those sites that published the hacked information.
"We are in touch with our legal counsel about what this theft means for Twitter, the hacker, and anyone who accepts and subsequently shares or publishes these stolen documents," wrote Stone. "We're not sure yet exactly what the implications are for folks who choose to get involved at this point but when we learn more and are able to share more, we will."
Stone did not respond to a request for an interview to answer questions about the incident and the company's legal plans.
In a blog post yesterday, Michael Arrington, founder and co-editor of TechCrunch, said that none of the "highly sensitive [Twitter] documents" accessed by the hackers would be published on his site. However, he did add that TechCrunch is "going to publish some of the other information that is relevant to Twitter's business, particularly product notes and financial projections."
Arrington also contended that any unethical or illegal activity weighs solely on the person who took the information and then distributed it. "On our end, it's simply news," wrote Arrington.
Scott Christie, a former federal prosecutor who now leads the information technology group at law firm McCarter & English LLP, said the hacker's legal problems are easy to see. The legal responsibilities of others who published the information are less clear, he added.
"This is all new ground," Christie said. "Whoever took the information is clearly wrong, and Twitter can and should go after them. As for the ones who published it ... it's less clear. It's sort of a quirky little case, and it largely depends on how aggressive Twitter wants to be."
Christie said the latter situation treads into First Amendment issues and journalistic privilege laws.
"Just because something has been obtained illegally doesn't prevent downstream use of it by others," said Christie. "If they can claim journalistic privilege ... it gives them a lot of different rights and privileges. [A journalist] doesn't have to give up his sources, for instance. If someone knew it was stolen when they received it and they published it anyway, a fine line is being walked."
- Twitter brings the data back in-house with Gnip buy
- Twitter crashed -- again -- on Tuesday
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
- Ahead of IPO, Twitter shines up multimedia image
- Twitter kicks off pre-IPO investor roadshow
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts