Possible Twitter lawsuit would dive into murky blog waters
Twitter may file suit against blogs, other Web sites that published hacked information
Computerworld - If Twitter decides to sue Web sites and bloggers that published information pilfered from its systems by hackers, the company could be diving into murky and largely untested legal waters.
Biz Stone, co-founder of the microblogging site, confirmed in a blog post yesterday that a hacker gained access to the personal e-mail account of a Twitter employee and with that was able to lift private company documents. At that point, the hacker offered the information to various blogs and online publications.
In his blog post, Stone said that Twitter is weighing its options over how to deal with the hacker and with those sites that published the hacked information.
"We are in touch with our legal counsel about what this theft means for Twitter, the hacker, and anyone who accepts and subsequently shares or publishes these stolen documents," wrote Stone. "We're not sure yet exactly what the implications are for folks who choose to get involved at this point but when we learn more and are able to share more, we will."
Stone did not respond to a request for an interview to answer questions about the incident and the company's legal plans.
In a blog post yesterday, Michael Arrington, founder and co-editor of TechCrunch, said that none of the "highly sensitive [Twitter] documents" accessed by the hackers would be published on his site. However, he did add that TechCrunch is "going to publish some of the other information that is relevant to Twitter's business, particularly product notes and financial projections."
Arrington also contended that any unethical or illegal activity weighs solely on the person who took the information and then distributed it. "On our end, it's simply news," wrote Arrington.
Scott Christie, a former federal prosecutor who now leads the information technology group at law firm McCarter & English LLP, said the hacker's legal problems are easy to see. The legal responsibilities of others who published the information are less clear, he added.
"This is all new ground," Christie said. "Whoever took the information is clearly wrong, and Twitter can and should go after them. As for the ones who published it ... it's less clear. It's sort of a quirky little case, and it largely depends on how aggressive Twitter wants to be."
Christie said the latter situation treads into First Amendment issues and journalistic privilege laws.
"Just because something has been obtained illegally doesn't prevent downstream use of it by others," said Christie. "If they can claim journalistic privilege ... it gives them a lot of different rights and privileges. [A journalist] doesn't have to give up his sources, for instance. If someone knew it was stolen when they received it and they published it anyway, a fine line is being walked."
- 5 Twitter clients for Linux
- Twitter brings the data back in-house with Gnip buy
- Twitter crashed -- again -- on Tuesday
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
- Ahead of IPO, Twitter shines up multimedia image
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!