Possible Twitter lawsuit would dive into murky blog waters
Twitter may file suit against blogs, other Web sites that published hacked information
Computerworld - If Twitter decides to sue Web sites and bloggers that published information pilfered from its systems by hackers, the company could be diving into murky and largely untested legal waters.
Biz Stone, co-founder of the microblogging site, confirmed in a blog post yesterday that a hacker gained access to the personal e-mail account of a Twitter employee and with that was able to lift private company documents. At that point, the hacker offered the information to various blogs and online publications.
In his blog post, Stone said that Twitter is weighing its options over how to deal with the hacker and with those sites that published the hacked information.
"We are in touch with our legal counsel about what this theft means for Twitter, the hacker, and anyone who accepts and subsequently shares or publishes these stolen documents," wrote Stone. "We're not sure yet exactly what the implications are for folks who choose to get involved at this point but when we learn more and are able to share more, we will."
Stone did not respond to a request for an interview to answer questions about the incident and the company's legal plans.
In a blog post yesterday, Michael Arrington, founder and co-editor of TechCrunch, said that none of the "highly sensitive [Twitter] documents" accessed by the hackers would be published on his site. However, he did add that TechCrunch is "going to publish some of the other information that is relevant to Twitter's business, particularly product notes and financial projections."
Arrington also contended that any unethical or illegal activity weighs solely on the person who took the information and then distributed it. "On our end, it's simply news," wrote Arrington.
Scott Christie, a former federal prosecutor who now leads the information technology group at law firm McCarter & English LLP, said the hacker's legal problems are easy to see. The legal responsibilities of others who published the information are less clear, he added.
"This is all new ground," Christie said. "Whoever took the information is clearly wrong, and Twitter can and should go after them. As for the ones who published it ... it's less clear. It's sort of a quirky little case, and it largely depends on how aggressive Twitter wants to be."
Christie said the latter situation treads into First Amendment issues and journalistic privilege laws.
"Just because something has been obtained illegally doesn't prevent downstream use of it by others," said Christie. "If they can claim journalistic privilege ... it gives them a lot of different rights and privileges. [A journalist] doesn't have to give up his sources, for instance. If someone knew it was stolen when they received it and they published it anyway, a fine line is being walked."
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
- Ahead of IPO, Twitter shines up multimedia image
- Twitter kicks off pre-IPO investor roadshow
- As its IPO looms, Twitter faces investor grilling
- Twitter experiments with 'Event Parrot' -- a news delivery service
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts