Bulletin Board Pix
Online Harassment, Defamation, and Hateful Speech: A Primer
of the Legal Landscape
Fordham
Law School
FLASH: The Fordham Law Archive of Scholarship and History
Center on Law and Information Policy Centers and Institutes
6-10-2014
Online Harassment, Defamation, and Hateful
Speech: A Primer of the Legal Landscape
Alice E. Marwick
Fordham University,
amarwick@fordham.edu Ross
Miller
Fordham University School of Law,
rmiller44@law.fordham.edu
Follow this and additional works at:
http://ir.lawnet.fordham.edu/clip Part
of the Privacy Law Commons
Recommended Citation
Marwick, Alice E. and Miller, Ross W., Online Harassment,
Defamation, and Hateful Speech: A Primer of the Legal
Landscape ( June
10, 2014). Fordham Center on Law and Information Policy
Report. This
Book is brought to you for free and open access by the
Centers and Institutes at FLASH: The Fordham Law Archive of
Scholarship and History. It
has been accepted for inclusion in Center on Law and
Information Policy by an authorized administrator of FLASH:
The Fordham Law Archive of
Scholarship and History. For more information, please
contact
tmelnick@law.fordham.edu.
Online Harassment, Defamation, and Hateful Speech:
A Primer of the Legal Landscape June
10, 2014
Study Authors
Alice Marwick
Assistant Professor, Communication and Media
Studies, Fordham University
Academic Affiliate, Fordham CLIP Ross
Miller
Project Fellow, Fordham CLIP CLIP
Study Advisors Joel
R. Reidenberg
Microsoft Visiting Professor of Information
Technology Policy, Princeton
Academic Study Director, Fordham CLIP N.
Cameron Russell
Executive Director, Fordham CLIP
Jordan Kovnot
Interim Director and Privacy Fellow, Fordham CLIP
(through July 2013) Any
views and opinions expressed in this study are those of the
authors and are not presented as those
of Fordham University, Fordham University School of Law or
the Fordham Center on Law and
Information Policy. (c)
2014. Alice Marwick and Fordham CLIP. This study may be
reproduced, in whole or in part, for
educational and non-commercial purposes. I.
Executive Summary
-
Although online harassment and hateful speech is a
significant problem, there are few
legal remedies for victims.
-
Section 230 of the Communications Decency Act provides
internet service providers
(including social media sites, blog hosting companies,
etc.) with broad immunity from
liability for user-generated content.
-
Given limited resources, law enforcement personnel
prioritize other cases over
prosecuting internet-related issues.
-
Similarly, there are often state jurisdictional issues
which make successful prosecution
difficult, as victim and perpetrator are often in
different states, if not different countries.
-
Internet speech is protected under the First Amendment.
Thus, state laws regarding online
speech are written to comply with First Amendment
protections, requiring fighting
words, true threats, or obscene speech (which are not
protected). This generally means
that most offensive or obnoxious online comments are
protected speech.
-
For
an online statement to be defamatory, it must be
provably false rather than a matter of
opinion. This means that the specifics of language used
in the case are extremely
important.
-
While there are state laws for harassment and
defamation, few cases have resulted in
successful prosecution. The most successful legal tactic
from a practical standpoint has
been using a defamation or harassment lawsuit to reveal
the identities of anonymous
perpetrators through a subpoena to ISPs then settling.
During the course of our research,
we were unable to find many published opinions in which
perpetrators have faced
criminal penalties, which suggests that the cases are
not prosecuted, they are not appealed
when they are prosecuted, or that the victim settles out
of court with the perpetrator and
stops pressing charges. As such, our case law research
was effectively limited to civil
cases.
-
In
offline contexts, hate speech laws seem to only be
applied by courts as penalty
enhancements; we could locate no online-specific hate
speech laws.
-
Given this landscape, the problem of online harassment
and hateful speech is unlikely to
be solved solely by victims using existing laws; law
should be utilized in combination
with other practical solutions.
II.
Introduction
Background Lori
Stewart is a middle-aged Midwestern woman and personal
blogger. Her blog, This
Just In, shares gentle stories of gardening, her military
family, vacation snapshots, and other
aspects of her life. In 2006, Stewart founded Toys for
Troops, a non-profit organization which
sends Beanie Babies and soccer balls to soldiers stationed
overseas, so they can distribute them
to local children. Shortly after, she attracted the
attention of a troll. “JoeBob” left comments like
the following:
So
you enabled comments again, eh?
Good! You liberal fuc#$!* cun@. [1] Hope
your inbred half-retarded son takes a bayonet to the gut
by a Palestinian
warrior. I love to see useful idiots serving the jew get
disemboweled!
For
seven years, JoeBob left profane, aggressive comments on
Stewart’s weekly blog. In
response, she disabled comments and instead used a private
Facebook account to communicate
with readers. JoeBob escalated. He created a fake email
address, purporting to be Stewart, and
sent emails to her friends and family full of homophobic
slurs and anti-Semitic remarks. He
signed Stewart up for hundreds of newsletters and commented
on other blogs using her name.
Frustrated, Stewart went to the police, who told her
"there's really not going to be much you can
do about this. You have a public blog, there is such a thing
as freedom of speech." [2] She
persuaded the officer to file a report anyway, so at least
she could have a case number to work
with.
Luckily for Stewart, a local police investigator became
interested in her case. He
subpoenaed JoeBob’s ISP, and was able to reveal the troll’s
identity—including his name,
workplace, and location. Stewart decided not to publicize
JoeBob’s real identity, but opened her
blog up to comments, hoping that the mere threat of exposure
would keep the harasser at bay.
This seemed to be the best she could hope for.
Unfortunately, JoeBob continued to harass
Stewart, and she revealed his name. Robin B. King was
arrested by the county sheriff on four
counts of harassment by electronic communication. [3] He has
pled not guilty and a jury trial is set
for this year. [4]
Online harassment is a significant online problem,
particularly for women. In the last
decade, several high-profile incidents, including the online
harassment of tech blogger Kathy
Sierra, the backlash against Anita Sarkeesian’s Feminist
Frequency Kickstarter project
examining sexism in video games, and the targeted harassment
of several female Yale Law
students on the AutoAdmit message boards have raised
questions around the limits of online free
speech and the prevalence of explicitly sexist commentary on
the internet. [5] Several feminist legal
scholars have systemically analyzed the content and
prevalence of such speech, particularly the
long-term and individual impacts. [6] Obviously, online
harassment is not limited to gender. [7]
Recent studies have investigated people who deliberately
engage in provocative, aggressive
internet behavior, primarily with regard to cyberbullying
and “trolling.” [8] However, research
suggests that those most likely to be the victims of hateful
online speech are women, sexual
minorities, and people of color—in other words, harassment
breaks down along traditional lines
of power. [9]
While there are many descriptive studies of online hate
speech, harassment, defamation,
and so forth, we decided to research these issues from a
legal perspective. [10] We were primarily
interested in (i) what legal remedies, if any, are available
for victims of such acts, and (ii) if such
legal remedies and procedures exist, whether practical
hurdles stand in the way of victims’
abilities to stop harassing or defamatory behavior and
obtain legal relief. Every US state and the
District of Columbia has a law covering cyberstalking or
cyberharassment, and a majority of
states have laws covering both. [11] Defamation law has been
used to pursue offensive online
speech in a few well-documented cases; [12] and, in some
instances, laws around hate speech may
be germane. However, prosecuting such cases is very
difficult. Not only are there issues with
jurisdiction, local police are often too busy, unwilling or
not technically savvy enough to target
perpetrators, making criminal proceedings impractical. And
as Stewart’s case suggests, internet
speech is protected under the First Amendment, making the
ability to regulate hateful, defaming,
or harassing speech problematic. [13] In many cases, the
best victims can hope for is that, in
unmasking the perpetrator, a loss of anonymity will be
enough to stop online harassment.
Project Scope The
goal of this research project is to better understand the
legal remedies available to
victims of online harassment, hate speech, and defamation,
as well as the current legal
protections afforded to this type of speech under the First
Amendment within the US. The
project examines long-standing and new treatments for online
harassment, and seeks to provide a
resource for victims of offensive comments online,
practitioners, academics and the public atlarge.
For context, we begin with an introductory summary of
Section 230 of the
Communications Decency Act, which provides broad immunity to
internet service providers, and
is thus crucial to the current legal landscape. [14] Given
that online speech may be protected under
the First Amendment, understanding legal remedies requires
examining the limits of First
Amendment protections, specifically the unprotected
categories of fighting words, defamation,
obscenity, and true threats. Thus, legal remedies can be
placed into three categories: (1)
cyberharassment and cyberstalking; (2) defamation; and (3)
hate speech and hate crime laws. [15] In
each section, we summarize state laws, examine significant
case law, and discuss complications
and drawbacks to each potential remedy. Again, we hope that
this document can serve as a
resource for researchers, legal practitioners, internet
community moderators, and victims of
harassment and hateful speech. III.
Summary
While online harassment and hateful speech is a significant
problem online, the current
legal landscape is, generally, of little help to victims.
Section 230 of the Communications
Decency Act provides internet service providers (including
social media sites, blog hosting
companies, and so forth) with broad immunity from liability
for user-generated content. Since
hosting sites are not legally liable for user content, and
although victims can appeal to site
proprietors under Terms of Service or community standards,
there is no obligation on the part of
the host to remove content, delete user accounts, or
discipline harassers. When
victims contact local law enforcement for help, it seems
that they are rarely taken
seriously. Many law enforcement personnel face limited
resources and lack technical expertise.
Issues with state jurisdiction also make successful
prosecution difficult, as victim and perpetrator
are often in different states, if not different countries.
[16] While there are state laws for harassment
and defamation, few cases have resulted in successful
prosecution. The most successful legal
tactic from a practical standpoint has been using a
defamation or harassment lawsuit to reveal the
identities of anonymous perpetrators by subpoenaing ISPs
then settling. (During the course of
our research, we were unable to find many published opinions
in which perpetrators have faced
criminal penalties, which suggests that the cases are not
prosecuted, they are not appealed when
they are prosecuted, or that the victim settles out of court
with the perpetrator and stops pressing
charges. As such, our case law research was effectively
limited to civil cases.) Victims may hope
that the fear of unmasking will cause online harassers to
stop their activities, but this is by no
means guaranteed.
Complicating matters further, internet speech is protected
under the First Amendment.
Thus, state laws regarding online speech will be held
unconstitutional if they interfere with
speech protected by the First Amendment. While the First
Amendment’s guarantee of freedom of
speech covers most situations, there do exist several
categories of speech are not protected,
including fighting words, threats, and obscene speech. In
other words, unless an offensive or
obnoxious online comment falls into one of these three
categories, it is generally protected
speech. For instance, for a statement to be defamatory, it
must be a false statement of fact rather
than a matter of opinion. This means that the specifics of
language used in the case are extremely
important—calling someone a “rapist” is a verifiable
statement (has the person been convicted of
rape?), [17] but calling someone a “bitch” is a matter of
opinion, and therefore protected speech. [18] We
also investigated hate speech laws. However, we found that
hate speech and hate
crime laws are limited by the First Amendment and are
generally only applied by courts as
penalty enhancements for other crimes; there are no hate
speech laws specific to the online
context. The
only cases in which online speech seems to be aggressively
prosecuted is when it
involves minors. If minors are public school students
defaming school personnel, or
“cyberbullying” their classmates, they may administered
disciplinary action from the school, and
may not be protected by the First Amendment. However, the
landscape around this area is a
moving target and laws seem to be changing very rapidly.
Given this landscape, the problem of online harassment and
hateful speech is unlikely to
be solved solely using existing laws. These laws may be
augmented with other solutions, such as
community moderation or enforcing terms of service. However,
this report focuses only on
existing laws and available legal remedies, and does not
advocate for or review any proposals for
new laws. This
document covers three areas: hate speech, defamation, and
online or “cyber”
harassment. To assist in understanding the US legal
landscape in these areas, we provide an
overview of current US laws, key cases, and their relevance
to online harassment and hateful
speech. IV.
The First Amendment, Unprotected Speech, and the Right to
Anonymity
Since the First Amendment provides for the right to free
speech, it places limits on laws
that attempt to govern online speech. In order to access
most information online, a person must
take several affirmative steps—sitting at a computer,
opening a web browser, typing terms into a
search engine, and so forth. [19] Because of these
affirmative steps required to access information
online and the availability of parental control software,
the Supreme Court has ruled that
protecting minors from indecent online materials is not an
adequate justification for limiting
most online content, as such limits risk suppressing adult
speech as well. [20] As a result, laws that
regulate online harassment, defamation and so on face a
delicate balancing act. They must be
written narrowly to avoid encroaching on speech protected by
the First Amendment while still
restricting the undesirable conduct in practice. As a
result, several states have very narrow
cyberharassment laws that exclusively target the categories
of speech that have been held by the
Supreme Court to be unprotected under the First Amendment.
[21] These categories include
“certain well-defined and narrowly limited classes of
speech, the prevention and punishment of
which have never been thought to raise any Constitutional
problem,” such as obscenity,
defamation, and fighting words. [22]
Obscenity To
determine whether content qualifies as obscene, and is
therefore constitutionally
unprotected, the Supreme Court created the Miller test. [23]
Under the Miller test, speech is obscene
if it meets three conditions: (1) "the average person,
applying contemporary community
standards," would find that the work, taken as a whole,
appeals to the prurient interest, (2) the
work depicts or describes, in a patently offensive way,
sexual conduct specifically defined by
applicable state law, and (3) the work, taken as a whole,
lacks serious literary, artistic, political,
or scientific value. [24] Several states have
cyberharassment laws that criminalize certain obscene
speech using this definition (discussed in Section VII). In
practice, there is a high threshold for
obscenity. [25]
Defamation
Defamation is the communication of a false statement of fact
that harms the reputation of
a victim, and includes libel, which covers written published
statements, and slander, which
covers spoken statements. [26] Since the ratification of the
First Amendment, the Supreme Court
has consistently ruled that laws against defamation are not
unconstitutional. [27] However, the First
Amendment does limit how defamation laws may be applied.
[28] For example, if someone makes a
defamatory statement about the official conduct of a public
figure, the figure can only prevail in
a lawsuit if the speaker knew that his or her statement was
false. [29] Defamatory statements which
are labeled as opinion are not protected by the First
Amendment if they serve only to harm the
victim’s reputation. [30] (Defamation will be discussed in
more detail in Section VI.)
Fighting Words A
state cannot pass laws that “forbid or proscribe advocacy of
the use of force” or make
it illegal to advocate breaking the law, except where the
speech is “directed to inciting imminent
lawless action and is likely to incite or produce such
action.” [31] This is called the “fighting
words” doctrine. Fighting words, such as calling a police
officer a “white racist motherf@#ker”
and telling him that you wish his mother would die, [32] are
exempted from First Amendment
protections because “their content embodies a particularly
intolerable (and socially unnecessary)
mode of expressing whatever idea the speaker wishes to
convey” and not because of the content
of the message. [33] There is, however, inconsistency and
disagreement among various courts as to
what qualifies as fighting words. [34] In the online
context, it is difficult for speech to meet the
“imminent lawless action” requirement. [35] As such, most
online speech, even if it promotes
violence against an individual, will be protected and the
victim will not have legal recourse. True
Threats
Another category of unprotected speech is “true threats.” A
statement is considered a true
threat if the speaker “means to communicate a serious
expression of an intent to commit an act of
unlawful violence to a particular individual or group of
individuals.” [36] The speaker need not
actually intend to carry out the threat. [37] The U.S.
Supreme Court has determined that true threats
are not protected under the U.S. Constitution for three
reasons: preventing fear, preventing the
disruption that follows from that fear, and diminishing the
likelihood that the threatened violence
will occur. [38] In
practice, it can be quite difficult for internet speech to
pass the “true threat” test. For
example, in United States v. Alkhabaz, the defendant, who
went by the name Jake Baker, had
posted several stories to the Usenet group alt.sex.stories
which involved the rape, torture, and
murder of young women. [39] One such story involved one of
his classmates at the University of
Michigan; he described in detail the acts of violence he
would perform, and the enjoyment he
would gain from such acts. [40] These stories were brought
to the attention of the university, who,
with Baker’s consent, searched Baker’s dormitory room,
personal papers, e-mail account and
computer files. [41] Upon seizing Baker’s computer, the
investigators discovered a series of emails
in which Baker and a Canadian man outlined a plan to kidnap
the young woman and carry out
the fantasies detailed in Baker’s stories. [42] The police
believed Baker and his correspondent
represented a threat to their potential victims, and so
referred Baker to the FBI, who arrested him
pursuant to a warrant from a U.S. magistrate judge for
violating 18 U.S.C. § 875(c), which
prohibits interstate communications containing threats to
kidnap or injure another person. [43]
Baker was indicted in a jury trial, and appealed to the
district court, which dismissed the charges;
the government appealed to the Sixth Circuit Court of
Appeals. [44] The Sixth Circuit upheld the
dismissal and found that Baker’s stories did not constitute
a true threat, and were therefore
protected speech. [45] Baker apparently never intended his
classmate to see the emails, and he was
not emailing his correspondent to threaten his classmate or
to attempt to intimidate her. As a
result, Baker’s emails and stories did not, to the Sixth
Circuit, constitute a threat. [46] Alkhabaz
demonstrates that the burden to determine a “true threat” is
quite high, and presumably most
hostile online speech would fail to meet the standard
determined by the Sixth Circuit.
Despite this high standard, it is still possible for online
speech to meet the true threat
criteria. In State v. Locke, a man appealed his conviction
for threatening the then-governor of
Washington State, Christine Gregoire. [47] Locke sent a
series of threatening messages to Gregoire
via her website. [48] His first email, which read, “I hope
you have the opportunity to see one of
your family members raped and murdered by a sexual predator.
Thank you for putting this state
in the toilet. Do us a favor and pull the lever to send us
down before you leave Olympia,” [49] was
determined to be hyperbolic political speech rather than a
true threat. [50] While the second called
Gregoire a “c#nt” and said “you should be burned at the
stake like any heretic,” [51] the court
determined that this was also not a true threat, as “the
ancient political or religious pedigree of
burning at the stake” is not realistically threatening. [52]
However, Locke’s third correspondence
was an event request, titled “Gregoire's public execution,”
to be held at the Governor’s
mansion. [53] These messages constituted a practical threat,
especially as they were sent only 17
days after Arizona congresswoman Gabrielle Giffords was shot
in the head by a disgruntled
constituent. [54] For the threat contained in the third
email, Locke’s conviction was upheld by the
appeals court. [55]
Unmasking Many
obnoxious and hateful online comments are posted anonymously
or
pseudonymously, meaning that one of the first steps in
prosecuting such comments is often
identifying the perpetrator. [56] To identify the
perpetrator, the plaintiff will generally need as much
information as possible about the poster of these comments,
such as the IP addresses which were
used to post the messages and any personal information
associated with the account used to post
the messages. However, this information may not be publicly
available, and if so the poster will
have to get the information from the ISP. But most ISPs will
not voluntarily disclose a user’s
confidential information, whether to protect the user or to
comply with data privacy laws, [57] so
the plaintiff (the party bringing the complaint) will
generally need a court order forcing the ISP
to disclose such information. [58] However, there is a
well-documented First Amendment right to
anonymous speech that the court must consider before issuing
a court order. [59] As a result, federal
and state courts use different court-created tests to
determine if the court will order the
unmasking of the anonymous speaker, as discussed below.
These tests balance the speaker’s
right to anonymity against the rights of the victim. [60]
While various tests exist, most of them include the same
elements. First, the court may
require that the plaintiff take reasonable steps to alert
the defendant that he or she may be subject
to a court order. [61] These might include sending a private
message to the poster’s account, and
publicly posting notices to the internet service where the
allegedly defaming comments were
made. For example, if the allegedly defamatory statements
were originally posted to a message
board, the plaintiff may need to post a public notice to the
same message board alerting the
defendant to the potential lawsuit. [62] Afterwards, the
court may require that the defendant be
given a reasonable amount of time to respond. [63] This step
allows the defendant time to hire
counsel and take the necessary steps to formally oppose the
motion in court. [64]
Courts will then consider whether the plaintiff has provided
enough evidence to support
each of the individual elements of a defamation claim. [65]
In doing so, the court will consider how
strong the plaintiff’s claim is, typically by comparing it
to existing procedural standards, such as
whether the case would be strong enough to survive a motion
for summary judgment or a motion
to dismiss. [66] (A motion for summary judgment is a
procedure where one party requests that the
court decide a case without a full trial, while a motion to
dismiss is a procedure where one party
requests that the court dismiss a lawsuit because the claim
has no legal remedy.) [67] A motion for
summary judgment will only be granted, meaning the court
will only decide the case without a
trial, if the significant facts of the case are undisputed
and the only issues involve interpreting or
applying the law to the facts. [68] In other words, during
an unmasking proceeding the court will
apply the law to the facts that the plaintiff has presented
and determine whether or not the
alleged statements are or may be considered defamatory. [69] For
example, in Doe v. Cahill, the court examined each of the
elements of a libel claim
under Delaware law: 1) the defendant made a defamatory
statement; 2) concerning the plaintiff;
3) the statement was published; and 4) a third party would
understand the character of the
communication as defamatory. [70] The court began by
considering whether the allegedly
defamatory statements are assertions of fact or opinion.
[71] In reviewing these statements, the court
determined that all of the statements at issue were purely
statements of opinion or otherwise not
defamatory, so the court found that the case would not
survive a motion for summary
judgment. [72] However, if the court had determined that the
statements at issue are capable of
being defamatory, the court would have proceeded to examine
the remaining elements of a
defamation claim in turn. [73] If, after reviewing each
element of the claim, the court had
determined that the case was strong enough to survive a
motion for summary judgment, the court
would have granted the unmasking order. [74]
Finally, some courts may also consider the First Amendment
implications in unmasking
the defendant. [75] For example, the Ninth Circuit Court of
Appeals suggested that “the nature of
the speech should be a driving force in choosing a standard
by which to balance the rights of
anonymous speakers in discovery disputes.” [76] Under this
standard, the type of speech is relevant
to the level of protection that such speech receives, with
anonymous political, religious, or
literary speech receiving more protection than certain other
types of speech. [77] Other courts,
however, hold that the summary judgment test, as discussed
above, is the only balancing
required in determining if the speaker should be unmasked.
[78] Some courts take a middle ground
approach and try to balance the anonymous poster’s First
Amendment right of free speech
against the strength of the plaintiff’s defamation claim and
the necessity for disclosure of the
anonymous defendant’s identity, prior to ordering
disclosure.” [79] CDA
230
Section 230 of the Communications Decency Act [80] (“CDA”)
provides broad immunity to
any “interactive computer service” for third party content
that is posted onto its service, as long
as the service did not provide substantive or editorial
contributions. “Interactive computer
service” is defined broadly in the statute to include
websites, message boards, instant messenger
services, blog hosting services, and other internet based
services including Facebook, MySpace,
YouTube, Google, Yahoo, Tumblr, Flickr, Twitter, and even
Revenge Porn. Section 230
immunizes these services from lawsuits for defamation,
negligence, gross negligence, unfair
competition and false advertising. [81] However, Section 230
expressly states that it has no impact
on certain other areas of law, including federal criminal
law, [82] federal intellectual property law, [83]
communications privacy law, [84] and certain other state
claims. [85] As such, interactive computer
services may still be sued for hosting copyrighted materials
under the DMCA and may be
prosecuted for violating federal criminal laws.
Given CDA 230, victims of online harassment or hateful
speech most often cannot hold
the ISP liable, [86] whether the ISP is a blog hosting
service, a web forum, a social media site like
Facebook or Twitter, or an email provider such as Hotmail or
Gmail. (These providers can,
however, be subpoenaed to reveal the identity of an
anonymous harasser, as shown in the cases
discussed in Section VI, Defamation). Service providers do
not have a legal responsibility to
moderate or take down content that is harassing or
offensive, even if such content violates the
site’s terms of service. [87] For example, Facebook
encountered protests from feminist groups who
objected to a number of user-created Facebook pages in which
rape and domestic violence were
treated humorously. [88] More than 40 women’s groups wrote
an open letter to Facebook arguing
that pages like “Fly Kicking Sluts in the Uterus” should be
considered hate speech and
threatening content, and as such, violated Facebook’s own
terms of service. [89] While Facebook
has been quick to remove homophobic and Islamophobic content
from the sites, feminist
activists criticized Facebook for failing to take sexism
seriously. In response, Facebook promised
to remove the offending pages, and take affirmative steps to
screen the site for sexist and violent
content in the future. [90] In this case, Facebook was under
no legal obligation to remove the
offending pages. They chose to do so for public relations
and business reasons due to the large
and successful activist campaign, which also targeted
Facebook’s advertisers. In such cases, the
site in question may decide that removing content is
appropriate; however, this is by no means
guaranteed. V.
Hate Speech and Hate Crimes
While obnoxious and offensive comments of all kind are in
abundance on the internet,
sexist, racist, and homophobic speech seems to be
particularly prevalent. [91] Studies of YouTube,
for instance, have found that words like “n*****” and
“f*****” are common, and that women
are disproportionately subject to negative comments. [92]
Statistics gathered by the nonprofit
organization Working to Halt Online Abuse shows that of
almost 4000 cyberharassment and
cyberstalking cases, 72% of the victims were female and 48%
of the perpetrators male. [93]
Danielle Citron, in her study of internet speech, suggests
that while women are often subjected to
hateful comments, this is more likely for women of color or
women who identify as sexual
minorities. [94] Moreover, in the last few years there have
been a plethora of cases where women
were subject to internet harassment, particularly those
involved in activism or male-dominated
fields such as technology. [95] Together, these statistics
and anecdotal evidence suggest that some
online harassment may be motivated by bias, particularly
along lines of gender, race, sexual
orientation, and the like. Given this possibility, we
investigated laws around hate speech and hate
crimes to see if victims of such online comments could use
these laws to prosecute perpetrators.
Defining Hate Speech Hate
speech is a difficult concept to define, but it may be
broadly defined as speech that
carries no meaning other than hatred towards a particular
minority, typically a historically
disadvantaged minority. [96] After reviewing legal
literature and statutes relating to hate crimes and
hate speech laws, there appear to be three distinct elements
that legislatures and commentators
use to identify or define hate speech: a content-based
element, an intent-based element, and a
harms-based element. It is important to understand that hate
speech may be defined by an author
or legislature to require one, two, or all three elements to
qualify. The
content-based element involves the use of certain symbols
and iconography, such as
the noose, swastika or burning cross, or words or phrases
generally considered to be offensive to
a particular minority and objectively offensive to society.
[97] For example, the Bias Motivated
Crimes Ordinance at issue in R.A.V. v. City of St. Paul
stated "[w]hoever places on public or
private property a symbol, object, appellation,
characterization or graffiti, including, but not
limited to, a burning cross or Nazi swastika, which one
knows or has reasonable grounds to
know arouses anger, alarm or resentment in others on the
basis of race, color, creed, religion or
gender commits disorderly conduct and shall be guilty of a
misdemeanor." [98] In R.A.V., the
Supreme Court determined that the ordinance was
unconstitutional under the First Amendment
because it “it prohibits otherwise permitted speech solely
on the basis of the subjects the speech
addresses.” [99] (Note that the Court did not explicitly
rule that the act of burning a cross was legal,
but only that punishing a person for expressing their views
on a disfavored subject, rather than
their actions, was unconstitutional. [100]) The
intent-based element of a hate speech definition requires
the speaker’s message to
intend only to promote hatred, violence or resentment
against a particular minority, member of a
minority, or person associated with a minority, without
communicating any legitimate
message. [101] This requires subjective intent on the part
of the speaker to target an individual,
group, or person associating with a minority merely because
of the status of the minority.
Harms-based hate speech is speech which causes the victim
harm, such as “loss of selfesteem,
economic and social subordination, physical and mental
stress, silencing of the victim,
and effective exclusion from the political arena.” [102]
This element requires that the target of the
hate speech be subjectively harmed by the hate speech in any
of the ways described above. This
element may generally be easier to prove on behalf of an
individual than a larger group.
Significant Cases In
Brandenburg v. Ohio, the Supreme Court considered an Ohio
statute that criminalized
"advocat[ing] . . . the duty, necessity, or propriety of
crime, sabotage, violence, or unlawful
methods of terrorism as a means of accomplishing industrial
or political reform" and "voluntarily
assembl[ing] with any society, group or assemblage of
persons formed to teach or advocate the
doctrines of criminal syndicalism." The statute was not
limited in scope to only imminent lawless
action. The Supreme Court noted that this statute punished
the mere advocacy of violence, and
forbade the assembly of individuals which promoted this type
of criminal, violent, and otherwise
subversive advocacy. As a result, the Court ruled that the
statute unconstitutionally violated the
First Amendment rights of citizens to advocate for the use
of force or violence. Freedom of
speech does not allow a state to forbid these activities,
unless this speech is aimed at inciting or
producing imminent lawless action, and is likely to do so.
As such, the Court distinguished
between “fighting words,” which are not protected by the
First Amendment, and subversive
advocacy, which is protected. Under this distinction,
websites, blog posts, and comments to
social networks that support violence and promote hate
speech are afforded constitutional
protection as long as they do not constitute fighting words
or true threats. Because subversive
advocacy is protected, laws that attempt to prohibit acts
which some might consider hate crimes,
such as the burning of crosses, must be limited in scope to
either target specific harmful actions
or the incitement to imminent lawless action. For example,
the city ordinance from R.A.V., as
discussed above, criminalized all use of the burning cross
rather than just uses that fall outside
First Amendment protections.
Despite the First Amendment limitations of hate crime laws
targeting specific speech or
conduct, in Wisconsin v. Mitchell, the Supreme Court
reviewed the constitutionality of a state
law that allowed the court to consider during sentencing
whether the perpetrators of a crime
targeted a victim due to his membership in a protected
class. [103] The Court held that hate
motivations, which include perpetrating a crime against an
individual based on the individuals
membership in a particular minority group, can be considered
when sentencing a perpetrator for
a crime. [104] While we were unable to find any cases where
a sentence enhancement for hate
motivation was applied to an online crime, it appears to
remain a possibility in the future. VI.
Defamation A
great deal of attention has been paid to online reputation
in the last decade. [105] Sites like
Yelp, TripAdvisor, and Angie’s List, which aggregate reviews
of restaurants, hotels, and
services, can have enormous impacts on business
profitability. The same logic applies to
individuals. Google is used by employers, landlords, and
romantic interests to gather data about
potential employees, tenants, or partners. (Companies like
RapLeaf and Spokeo will do this
search for you, for a fee.) ReputationDefender offers
individuals the chance to scrub negative
online commentary about them. Given this landscape, harsh
online comments can have deep
impact. Since defamatory speech is not protected by the
First Amendment, defamation law offers
some solace to victims of hateful online comments.
Defamation is both a criminal and a civil, or private,
action, but for the purposes of this
document we are exclusively focusing on defamation as a
civil action. [106] Civil actions, as
opposed to criminal actions, have both advantages and
disadvantages. First, an individual may
bring a civil action at any time within the statute of
limitations. [107] In contrast, a criminal action
would require the cooperation of law enforcement, who may
not be interested in taking the case,
and could take several years before an arrest is made. [108]
Civil actions are also likely to be
significantly more expensive, as the plaintiffs will need to
pay for both the court fees and any
legal counsel they hire.
Defamation is an issue of state law, so the definition
varies from state to state. However,
most states define defamation in a similar manner. The
Restatement (Second) of Torts has
defined defamation as requiring the following elements: (a)
a false and defamatory statement
concerning another; (b) an unprivileged publication to a
third party; (c) fault amounting at least
to negligence on the part of the publisher; and (d) either
actionability of the statement
irrespective of special harm or the existence of special
harm caused by the publication. [109] In
addition to these requirements, the plaintiff will also need
to show that the defendant acted with
actual malice if the plaintiff is a public figure. [110]
Public figures are those who are “intimately
involved in the resolution of important public questions or,
by reason of their fame, shape events
in areas of concern to society at large.” [111] An
individual may become a limited public figure if he
or she “voluntarily injects himself [sic] or is drawn into a
particular public controversy and
thereby becomes a public figure for a limited range of
issues.” Given this, statements that relate
to this limited range of issues for which the subject is a
public figure require actual malice in
addition to the other elements to be defamatory. [112] To
establish the publication element, the plaintiff would
merely need to show that the
defendant’s online statement was accessible to others. For
example, a private email sent only to
the plaintiff would not meet this criterion, but a posting
on a blog, comment on a message board,
or YouTube video would satisfy this element. To
satisfy all elements of a defamation claim, the plaintiff
would need to show that the
statement is false, which means it cannot just be an
opinion—it must be capable of being proven
false. A statement which expresses purely opinion, such as a
comment claiming that someone is
a “dumb ass,” [113] is not defamation. A statement which
claims another person has an infectious
disease is a classic example of a defamatory statement which
may be proven true or false. [114]
Publishing a statement of fact and claiming that it is an
opinion is not a defense to an action for
defamation, so a defendant may be found liable even if he or
she does this. [115] Whether or not a
specific claim is provable may be a judgment by the court,
which may consider all of the
definitions of a word of phrase. [116] If a plaintiff brings
a defamation lawsuit, the defendant may
make a motion for summary judgment to dismiss the lawsuit.
If this happens, the court will
review each element of the plaintiff’s claims as discussed
in Section IV, and will rule as a matter
of law that the statement is not falsifiable and thereby
grant that plaintiff may not recover. To
establish the fourth element, the plaintiff would have to
both prove that he or she was
at the center of the statements and that the statements
harmed his or her reputation. To prove that
he or she was at the center of a statement does not require
that the plaintiff be identified by name,
only that he or she could be reasonably identified through
context or other information provided.
For example, a comment on a blog post directed at the author
would almost always satisfy this
element. In order for the plaintiff to show that his or her
reputation was damaged by the
comments, he or she would need to prove to the fact finder
that the statements cast him or her in
a bad light. The
additional requirement for public figures and limited public
figures to show “actual
malice,” requires the plaintiff to show that the defendant
posted the statement knowing that it
was false, or making the claim with reckless disregard for
the truth. [117] A person may be a limited
public figure if he or she has “voluntarily inject[ed]
himself or [was] draw[n] into a particular
public controversy.” [118] As such, comments relating to the
work of a blogger which relate to his
or her work will require this element. However, comments
about a blogger that are completely
unrelated to the blogging may not require this element.
After the enactment of Section 230 of the CDA, websites,
social networking sites, blog
hosting services, or other internet service providers that
hosts defamatory comment will
generally have no legal responsibility to victims. As
previously discussed, this limits the ability
of the victim to seek redress, as the victim can generally
only sue the original creator of the
defamatory statement for statements made online.
Significant Cases
Arguably, the two most widely publicized cases dealing with
online defamation have
been Cohen v. Google and Doe v. Ciolli. In Matter of Cohen
v. Google, Cohen, a fashion model,
was suing Google and Google’s subsidiary blog-hosting
platform Blogger.com to unmask a user
who had anonymously created a blog called “Skanks in NYC.”
[119] The “Skanks in NYC” blog
featured pictures of Cohen, captions, and text, which
referred to Cohen as a “skank bitch” and
accused her of being a “psychotic, lying, whoring . . .
skank.” [120] Google did not have any
substantive objections to the motion, but “refused to
provide Petitioner with any information or
documents with respect to the Blog unless it is required to
do so pursuant to applicable law,
regulation, legal process or enforceable governmental
request.” [121] In reviewing the case for
unmasking, the court determined that the use of the word
“skank” was actionable, as skank refers
to a person with poor hygiene, as well as the use of “ho”
and “whoring,” which refer to a person
exchanging sex for money. [122] The court decided that these
phrases, in the context of the blog
where they were used as captions to photos of Cohen,
conveyed facts which were capable of
being proven true or false. [123] In this manner, the court
applied a New York procedural test which
reflects the common law summary judgment test described in
Section IV of this report. As a
result, the court ordered Google to provide the plaintiff
with the identity of the anonymous
blogger, and Google provided Cohen with the anonymous
blogger’s email address, among other
identifying information. Cohen recognized the anonymous
blogger as Rosemary Port, whom
Cohen knew socially. After learning Port was the anonymous
blogger, Cohen decided to drop her
defamation lawsuit. [124] In
Doe v. Ciolli, Brittan Heller and Heidi Iravani, two law
students from Yale, sued the
online forum AutoAdmit, [125] Anthony Ciolli, an AutoAdmit
administrator, and several
pseudonymous defendants under their AutoAdmit usernames,
including “The Ayatollah of Rockn-
Rollah,” “pauliewalnuts,” and “hitlerhitlerhitler.” [126]
Heller and Iravani had each been the
subject of numerous defamatory posts on the AutoAdmit
message boards. These posts included a
variety of claims and statements about the plaintiffs, such
as accusations that they had herpes or
gonorrhea. [127] After starting the lawsuit, the plaintiffs
successfully won orders to unmask the
defendants. However, several of the defendants could not be
identified after the unmasking order
was placed. For those defendants that were identified, the
majority settled “somewhere in the low
to mid four figures in exchange for promises from the
plaintiffs not to publicize who they
were.” [128] One notable exception was Ryan Mariner, a law
student, who revealed his identity to
allegedly remove the leverage that the plaintiffs were
trying to use to force a settlement. [129] VII.
Cyberharassment
State Statutes
Cyberharassment law provides specific protections to victims
of hateful online speech.
Thirty-seven states have laws governing cyberharassment in
various ways, and forty-one states
have laws governing cyberstalking. [130] Cyberstalking laws
generally require that the victim fear
for his or her personal safety, the safety of a family
member, or the destruction of property. [131]
Cyberharassment laws are generally broader in scope and
cover a range of behavior, which does
not necessarily include a credible threat against another
person. [132] These behaviors may include
threats that may be credible, profane and lewd acts, and
other actions which may seriously alarm,
annoy, torment, or terrorize someone, and that serve no
legitimate purpose. Given that
cyberharassment law is specific to internet speech, and that
there are several significant cases
where harassers have been convicted, it may be one of the
more successful strategies for
prosecuting hateful or aggressive online speech, presuming
that speech meets the definition of
cyberharassment according to the controlling state law.
However, many of the cyberharassment
laws are new and it is unclear at this time when and how
some states will enforce them.
While there is significant variation in the language and
conduct covered by
cyberharassment laws, there are several recurring themes
throughout the various statutes. First,
fourteen state statutes in whole or in part require that the
communication have no legitimate
purpose. [133] (This language attempts to avoid
unconstitutionally limiting protected speech.) Other
states avoided infringing on protected speech with other
language, such as “[t]his section does
not apply to constitutionally protected speech or activity
or to any other activity authorized by
law.” [134] Several other states have also avoided creating
unconstitutional limits on free speech by
limiting their cyberharassment laws to only apply to speech
that falls within defined categories of
unprotected speech, such as obscenity or true threats. Most
states require that the target of harassment must feel
harassed, annoyed, alarmed or
otherwise be harmed for the conduct to qualify as
cyberharassment. In this way, the government
is attempting to protect those who are actually victims by
requiring that the victim is subjectively
harmed. For example, Rhode Island’s statute is limited to
conduct “which seriously alarms,
annoys, or bothers” the target of the communication. [135]
Several states added an objective element
to their cyberharassment definitions by requiring that the
harassing conduct cause a reasonable
person to feel emotional distress or be harmed. Rhode Island
requires that the conduct “would
cause a reasonable person to suffer substantial emotional
distress, or be in fear of bodily
injury.” [136] In addition, 30 state statutes require that
the harassing communication be made with
intent, such as intent to harass, alarm, annoy, or threaten
the victim. [137]
Several states require conduct or communication to be
repeated for it to constitute
cyberharassment. For example, Nebraska’s course of conduct
is defined as “pattern of conduct
composed of a series of acts over a period of time, however
short, evidencing a continuity of
purpose, including a series of acts of following, detaining,
restraining the personal liberty of, or
stalking the person or telephoning, contacting, or otherwise
communicating with the person.” [138]
Such requirements limit the scope of these laws and protect
speakers from being prosecuted for a
single or few communications that otherwise violate the
statute.
Additionally, several statutes determine where a person may
be prosecuted for violating
the statute. Michigan provides a representative example of
such a provision, which allows a
person to be prosecuted in Michigan:
“for
violating or attempting to violate this section only if
1 of the following
applies: (a) The person posts the message while in this
state. (b) Conduct arising
from posting the message occurs in this state. (c) The
victim is present in this state
at the time the offense or any element of the offense
occurs. (d) The person
posting the message knows that the victim resides in
this state. [139]
Of
this type of provision, Mississippi has the most defined, as
follows:
Any
person violating this section may be prosecuted in the
county where
the telephone call, conversation or language originates
in case such call,
conversation or language originates in the State of
Mississippi. In case the
call, conversation or language originates outside of the
State of
Mississippi then such person shall be prosecuted in the
county to which it
is transmitted. [140]
Despite the common themes in state cyberharassment statutes,
they vary substantially
when it comes to the conduct in question. For example,
Virginia limits its cyber-harassment law
to the use of “obscene or lewd language” or the suggestion
of “a lewd or lascivious act.” [141] In
Barson v. Commonwealth, [142] the Virginia Supreme Court
reviewed a cyberharassment
conviction of Barson for a series of emails he sent to his
estranged wife and her friends and
family. These emails contained statements calling his wife a
“coke whore baby killing prostitute”
and claiming that she has “risky gutter sex” and “sex with
anonymous strangers” from
Craigslist. [143] On appeal, the Supreme Court determined
that the emails, “as offensive, vulgar,
and disgusting as their language may have been,” did not
meet the statutory definition of
obscenity, which the court interpreted to follow the
definition of obscenity from the Miller test,
as the emails did not appeal to the prurient interest in
sex. [144] In contrast, an appeals court
interpreted the word obscene, as used in the Illinois
statute, under a broader dictionary definition
to mean "disgusting to the senses" or "abhorrent to morality
or virtue." [145] As such, the full
breadth of these cyberharassment laws may not be clear until
they have been interpreted by their
state’s highest court. In
Polito v. AOL Time Warner, Inc., Polito was suing AOL to
unmask several users who
were responsible for sending her "harassing… pornographic,
embarrassing, insulting, annoying
and… confidential" emails and instant messages from a
frequently changing set of user names
that she was unable to identify. [146] Polito even changed
her user name, but she continued to
receive such communications afterwards. The court found that
the conduct of the anonymous
users was proscribed by the Pennsylvania cyberharassment
statute, which covers
communications including “lewd, lascivious, threatening or
obscene words, language, drawings
or caricatures” and repeated anonymous communications. The
court thereafter ordered that AOL
unmask the users.
Online Harassment: The Case of Minors
Minors are a special case when it comes to online
harassment. First, students in public
schools are frequently disciplined for speech acts that are
considered protected under the First
Amendment. Courts have inconsistently included online speech
in this category. Second, new
“cyberbullying” laws may criminalize peer-to-peer
harassment, but many of the laws are quite
recent, and as a result, there is little consensus in this
area. Given these two differences, minors
may be subject to penalties and disciplinary actions by both
courts and schools that would not
apply to the same speech if done by adults.
While First Amendment protections typically limit how
harassment law can be used to
limit online speech, this does not apply in the public
school context. Although the law is often
inconsistently applied, courts have generally supported the
efforts of administrators to discipline
public school students when they use social media to
satirize, defame, or harass school
personnel. While the Supreme Court determined in Tinker v.
Des Moines Independent
Community School District that students do not “shed their
constitutional rights to freedom of
speech or expression at the schoolhouse gate,” the court
also argued that this must be balanced
against schools’ ability to educate without disruption.
[147] As a result, the courts apply three
separate tests to determine whether student speech, whether
on or offline, is constitutionally
protected.
First, the on-campus/off-campus test asks whether the speech
took place on school
grounds. [148] This becomes quite convoluted when
considering postings on social networking
sites. If the speech was created using school computers,
accessed using school computers, or
even accessed on a student’s personal computer or mobile
phone while the student is at school,
courts have generally determined that this constitutes
on-campus speech. For example, in J.S. v.
Bethlehem School District, a student created a website
called “Teacher Sux,” which included
lewd commentary about two teachers at his school. One page
called “Why Should She Die?[,]”
aimed at an algebra teacher, included the statement “F@#k
You Mrs. Fulmer, You are a B@#ch.
You Are A Stupid B@#ch” repeated 136 times, along with a
drawing of the decapitated teacher
with blood running from her neck. [149] The student had
created the website at home, but used a
school computer to access it at school; news of the website
quickly traveled through the school.
The court concluded that even if the student had not
accessed the website while at school, a
“sufficient nexus” existed between the school campus and the
website for it to be considered on-campus
speech. [150] Subsequent cases have used this “nexus test,”
which holds that if speech is
“reasonably likely to reach the school and cause a
substantial disturbance there,” it can be
considered on-campus speech even if it is never viewed by
the student on school grounds. [151]
Speech is considered reasonably foreseeable that it will
come to the attention of the school if it
pertains to school events, and school community members are
likely to read it. [152] If
the court decides that the speech is considered “on-campus,”
then the courts usually
attempt to determine whether the speech in question
“materially disrupts classwork or involves
substantial disorder or invasion of the rights of others.”
[153] This disruption must be more than
“mild distraction or curiosity,” but does not need to be
sheer chaos; it can include the reaction of
students/teachers, time taken from school activities, and
administrative response.
However, sometimes this test is applied even in cases that
fail the on/off-campus test. For
example, in Wisniewski vs. Board of Education, a student was
disciplined for having an Instant
Messenger icon that depicted a person being shot in the head
with the label “Kill Mr.
VanderMolen.” [154] For three weeks, this icon appeared in
all the messages that the student sent to
his friends, all of which were private, accessed only at
home, and sent from the student’s
personal home computer. [155] One of the student’s friends
became concerned, and showed the icon
to the local police, the student’s parents, and the district
superintendent. [156] While the speech
clearly took place off-campus, the court determined that if
the speech “poses a reasonably
foreseeable risk of coming to the attention of school
authorities and materially and substantially
disrupting the work and discipline of the school,” then
disciplinary action is justified. [157] There is
clear confusion over how and why schools can regulate online
speech that does not occur oncampus;
cases with strikingly similar details have had quite
different outcomes depending on the
court. [158] The lack of consensus around such issues
demonstrates the difficulty in applying
standards that were created in offline contexts to
face-to-face speech.
Cyberbullying is another area in which the courts are
actively involved in determining the
limits of online speech for minors. As of January 2012, 48
states had passed anti-bullying laws,
38 of which include definitions of cyberbullying or include
electronic speech in the definition of
bullying. [159] While most of these laws involve school
responsibilities for preventing bullying,
reporting bullying, and so forth, a few criminalize student
behavior (for example, Idaho’s law
creates the crime of student harassment, intimidation, or
bullying, while Louisiana and North
Carolina’s law create the crime of cyberbullying). [160] As
of yet, there is no consensus on whether
or not speech that constitutes “cyberbullying” is protected
by the First Amendment. [161] Given the
rapidly-changing nature of these laws, it remains to be seen
whether or not minors who engage in
harassing or offensive speech against their peers can be
criminally prosecuted, as opposed to
school disciplinary action.
VIII. Conclusion A
significant number of people deal with hateful and
aggressive messages sent to them
via the internet. While most of these instances are most
likely one-off comments or emails, there
are situations where victims are targeted by perpetrators
repeatedly, across platforms, which may
wreak havoc on their peace of mind, online reputation, or
ability to participate in social media.
This primer suggests that while legal remedies may be
appropriate in very specific cases—such
as defamatory speech or harassment that constitutes a “true
threat”—the laws are written
specifically to take into account First Amendment protection
of most online speech. Moreover,
online anonymity can make it quite difficult to identify a
perpetrator, and issues of jurisdiction
complicate which police department, court, or state is most
appropriate to handle the complaint.
Add to this limited resources and computer literacy, and
legal remedies begin to look like a last
resort.
While victims may want to explore other remedies, such as
appealing to content hosting
platforms, there is no legal requirement for sites like
Facebook or Twitter to aggressively
monitor their content, remove offending messages, suspend
the accounts of perpetrators, or
enforce terms of service. Some sites may choose to do so,
but others, such as the AutoAdmit
board proprietors or the hosts of so-called “revenge porn”
sites, may actively resist such efforts.
However, community moderation, collective norm-setting,
aggressive algorithmic filtering of
online comments, or other social or technical efforts may
help to quell these problems.
Although this landscape may seem dismal, it is important for
the First Amendment
protections of internet speech to continue. New laws around
“cyberbullying” demonstrate the
dangers of creating new criminal behaviors online; we do not
yet know how such laws will hold
up to First Amendment challenges, or how they will be used
in practice. It may also be unclear
who is “wrong” or “right” in such disputes; while some cases
of online harassment or hateful
speech seem obvious, others are far less black and white.
People from all sides of the political,
social, and economic spectrum use “internet vigilantism” to
target and shame those they disagree
with, from Men’s Rights activists shaming feminist
filmmakers to feminists shaming writers they
believe to be sexist. Criminalizing such behaviors is a
tricky task, and laws that inhibit free
expression on the internet are likely to be used in ways
that even the most well-intentioned
individuals would balk at. It
seems clear that more information and research should be
available to potential victims
at this time given the rapidly changing legal landscape and
the increasing use of online
technologies to target and harass individuals. We hope that
this report provides a good start
toward this objective.
Appendix A: Methodology
Methodology Our
research into the remedies for victims of online harassment,
hate speech, and
defamation began with a review of the legal literature
surrounding Section 230 of the
Communications Decency Act of 1996. [162] We undertook this
review to understand the
protections afforded to websites, social networks, blog
hosts, and other internet services, and the
limits these protections place on the ability of victims to
act. We began with a reading of the
statute [163] and the Fordham CLIP report Section 230 of the
Communications Decency Act: A
Survey of the Legal Literature and Reform Proposals, which
summarizes the major case law
interpreting Section 230, as well as a review of other legal
literature discussing Section 230. We
then reviewed legal literature related to online hate speech
and harassment. We
conducted a search of legal databases for articles using the
following search term:
“hate speech” and (internet or online) The
results of this search included a significant number of
articles discussing the
constitutionality of efforts by state and federal
governments to regulate online hate speech, [164] as
well as the potential global impact of hate websites created
in the United States. [165] Some articles
focused on the limitations of technological and legal means
of regulating online hate speech. [166]
Much of this literature proposed that a unilateral effort by
the government, without help from
ISPs or the public, would be insufficient. [167] To
understand the limitations of the First Amendment and what
categories of speech fall
outside its protection, we reviewed the cases discussed in
the “hate speech and internet or online”
search results, and ran a search of U.S. Supreme Court and
federal circuit court cases using the
following search terms:
“First Amendment” and “Unprotected Speech”
“First Amendment” and “Hate Speech” or “Hate Crime”
“First Amendment” and “Fighting Words”
“First Amendment” and Defamation
“First Amendment” and “True Threats”
Turning to hate speech, as described in Sections I and IV,
we searched for internet hate
speech and the First Amendment, hate speech, and hate
crimes. Next, we ran searches in legal
literature and case law to identify definitions of hate
speech used by organizations by using the
following search term on Lexis Advance:
“Hate Speech” /p defin* [168]
We
reviewed results from this search as well as articles,
statutes, treaties, and other text
referenced or cited by the relevant resulting cases and
legal literature. After running these initial
searches, we also reviewed a LexisNexis 50-state survey on
hate crime statutes. To
review state cyberstalking and cyberharassment laws, we
began with “State
Cyberstalking and Cyberharassment Laws,” a survey of all
states with cyberharassment and
cyberstalking laws, by the National Conference of State
Legislatures. [169] Every cyberharassment
statute from this list was examined and has been included in
relevant part in Appendix B. Next,
searches were conducted for each state for the statute
number of each cyberharassment statute,
with results limited to the highest court of the particular
state for the statute number. For
example, the Arkansas cyberharassment law is Ark. Code Ann.
§ 5-41-108, so we searched for
all cases including “5-41-108” in the Arkansas Supreme
Court. If no relevant cases were found
from a state’s highest court, the search was then expanded
to include the state’s appellate level
courts. In
addition, many of these statutes include both online and
offline harassment, so to
understand how the online component of these statutes have
been treated in court and how often
they are reviewed by appellate courts, a search was run with
the jurisdiction limited to each state
and the overlying federal trial and appeals courts using the
following search query:
atl2(computer or internet or online or cybe* or myspace
or facebook or twitter or
digital or electronic or message board or web* or blog
or computer or smartphone or
“social network” or “Social media” or email or 4chan or
reddit or craigslist or
newsgroup* or ISP).
The
results were then narrowed to cases citing the relevant
state statute. The search required
multiple mentions of any one of the terms above in order to
remove cases that mentioned online
harassment, but did not discuss it in depth. The word
“forum” was originally included to account
for “web forums”, a synonym for “message boards”, but was
removed from the search terms to
omit the significant number of cases that concerned the
correct legal forum for a lawsuit. Our
review of online defamation cases began with a review of
secondary materials that
appeared using the following search on Lexis Advance:
atl2(computer or internet or online or cybe* or myspace
or facebook or twitter or
digital or electronic or message board or web* or blog
or computer or smartphone or
“social network” or “Social media” or email or 4chan or
reddit or craigslist or
newsgroup* or ISP) and defamation.
As
discussed above, ‘forum’ was excluded from this search as it
resulted in a significant number
of unrelated cases. After reviewing these secondary
materials, we conducted additional searches
for the following search terms on Lexis Advance:
"anonymous speech" and unmasking.
In
addition, we examined the dockets, including motions, for
the Matter of Cohen v. Google [170]
and Doe v. Ciolli [171] cases. We also conducted general
internet searches for news media sources
about these cases.
Appendix B: State Laws on Online Harassment
Alabama
Ala.
Code § 13A-11-8 Harassment – Harassing Communications (a)
Harassment. -- (1)
A person commits the crime of harassment if, with intent
to harass, annoy, or
alarm another person, he or she either: a.
Strikes, shoves, kicks, or otherwise touches a person or
subjects him or
her to physical contact. b.
Directs abusive or obscene language or makes an obscene
gesture
towards another person. (2)
For purposes of this section, harassment shall include a
threat, verbal or
nonverbal, made with the intent to carry out the threat,
that would cause a reasonable
person who is the target of the threat to fear for his
or her safety. (3)
Harassment is a Class C misdemeanor. (b)
Harassing communications. -- (1)
A person commits the crime of harassing communications
if, with intent to
harass or alarm another person, he or she does any of
the following: * *
*
Nothing in this section shall apply to legitimate
business telephone
communications. (2)
Harassing communications is a Class C misdemeanor.
Alaska
Alaska Stat. § 11.61.120 Harassment in the Second Degree (a)
A person commits the crime of harassment in the second
degree if, with intent to
harass or annoy another person, that person * *
* (4)
makes an anonymous or obscene telephone call, an obscene
electronic
communication, or a telephone call or electronic
communication that threatens physical
injury or sexual contact; * *
* (6)
except as provided in AS 11.61.116, publishes or
distributes electronic or
printed photographs, pictures, or films that show the
genitals, anus, or female breast of
the other person or show that person engaged in a sexual
act.
(b) Harassment in the second degree is a class B
misdemeanor.
Arizona
Ariz. Rev. Stat. Ann. § 13-2916 Use of an Electronic
Communication to Terrify, Intimidate,
Threaten or Harass; Applicability; Classification;
Definition A.
It is unlawful for any person, with intent to terrify,
intimidate, threaten or harass a
specific person or persons, to do any of the following: 1.
Direct any obscene, lewd or profane language or suggest
any lewd or lascivious
act to the person in an electronic communication. 2.
Threaten to inflict physical harm to any person or
property in any electronic
communication. 3.
Otherwise disturb by repeated anonymous, unwanted or
unsolicited electronic
communications the peace, quiet or right of privacy of
the person at the place where the
communications were received. B.
Any offense committed by use of an electronic
communication as set forth in this
section is deemed to have been committed at either the
place where the communications
originated or at the place where the communications were
received. C.
This section does not apply to constitutionally
protected speech or activity or to any
other activity authorized by law. D.
Any person who violates this section is guilty of a
class 1 misdemeanor. E.
For the purposes of this section, "electronic
communication" means a wire line, cable,
wireless or cellular telephone call, a text message, an
instant message or electronic mail.
Ariz. Rev. Stat. Ann. § 13-2921 Harassment;
Classification; Definition A. A
person commits harassment if, with intent to harass or
with knowledge that the
person is harassing another person, the person: 1.
Anonymously or otherwise contacts, communicates or
causes a communication
with another person by verbal, electronic, mechanical,
telegraphic, telephonic or written
means in a manner that harasses. * *
* 3.
Repeatedly commits an act or acts that harass another
person. * *
* C.
Harassment under subsection A is a class 1 misdemeanor.
Harassment under
subsection B is a class 5 felony. D.
This section does not apply to an otherwise lawful
demonstration, assembly or
picketing. E.
For the purposes of this section, "harassment" means
conduct that is directed at a
specific person and that would cause a reasonable person
to be seriously alarmed, annoyed or
harassed and the conduct in fact seriously alarms,
annoys or harasses the person.
Arkansas
Ark.
Code Ann. § 5-41-108 Unlawful Computerized
Communications (a)
A person commits the offense of unlawful computerized
communications if, with the
purpose to frighten, intimidate, threaten, abuse, or
harass another person, the person sends a
message: (1)
To the other person on an electronic mail or other
computerized
communication system and in that message threatens to
cause physical injury to any
person or damage to the property of any person; (2)
On an electronic mail or other computerized
communication system with the
reasonable expectation that the other person will
receive the message and in that message
threatens to cause physical injury to any person or
damage to the property of any person; (3)
To another person on an electronic mail or other
computerized communication
system and in that message uses any obscene, lewd, or
profane language; or (4)
On an electronic mail or other computerized
communication system with the
reasonable expectation that the other person will
receive the message and in that message
uses any obscene, lewd, or profane language. (b)
Unlawful computerized communications is a Class A
misdemeanor. (c) (1)
The judicial officer in a court of competent
jurisdiction shall upon pretrial
release of the defendant enter an order consistent with
Rules 9.3 and 9.4 of the Arkansas
Rules of Criminal Procedure and shall give notice to the
defendant of penalties contained
in Rule 9.5 of the Arkansas Rules of Criminal Procedure. (2)
A protective order under subdivision (c)(1) of this
section remains in effect
during the pendency of any appeal of a conviction under
this section.
California
Cal.
Penal Code § 422 Punishment for Threats (a)
Any person who willfully threatens to commit a crime
which will result in death or
great bodily injury to another person, with the specific
intent that the statement, made verbally,
in writing, or by means of an electronic communication
device, is to be taken as a threat, even if
there is no intent of actually carrying it out, which,
on its face and under the circumstances in
which it is made, is so unequivocal, unconditional,
immediate, and specific as to convey to the
person threatened, a gravity of purpose and an immediate
prospect of execution of the threat, and
thereby causes that person reasonably to be in sustained
fear for his or her own safety or for his
or her immediate family's safety, shall be punished by
imprisonment in the county jail not to
exceed one year, or by imprisonment in the state prison. (b)
For purposes of this section, "immediate family" means
any spouse, whether by
marriage or not, parent, child, any person related by
consanguinity or affinity within the second
degree, or any other person who regularly resides in the
household, or who, within the prior six
months, regularly resided in the household. (c)
"Electronic communication device" includes, but is not
limited to, telephones, cellular
telephones, computers, video recorders, fax machines, or
pagers. "Electronic communication"
has the same meaning as the term defined in Subsection
12 of Section 2510 of Title 18 of the
United States Code. Cal.
Penal Code § 653.2 Use of Electronic Communication to
Instill Fear or to Harass;
Misdemeanor (a)
Every person who, with intent to place another person in
reasonable fear for his or her
safety, or the safety of the other person's immediate
family, by means of an electronic
communication device, and without consent of the other
person, and for the purpose of
imminently causing that other person unwanted physical
contact, injury, or harassment, by a
third party, electronically distributes, publishes,
e-mails, hyperlinks, or makes available for
downloading, personal identifying information,
including, but not limited to, a digital image of
another person, or an electronic message of a harassing
nature about another person, which
would be likely to incite or produce that unlawful
action, is guilty of a misdemeanor punishable
by up to one year in a county jail, by a fine of not
more than one thousand dollars ($1,000), or by
both that fine and imprisonment. (b)
For purposes of this section, "electronic communication
device" includes, but is not
limited to, telephones, cell phones, computers, Internet
Web pages or sites, Internet phones,
hybrid cellular/Internet/wireless devices, personal
digital assistants (PDAs), video recorders, fax
machines, or pagers. "Electronic communication" has the
same meaning as the term is defined in
Section 2510(12) of Title 18 of the United States Code. (c)
For purposes of this section, the following terms apply: (1)
"Harassment" means a knowing and willful course of
conduct directed at a
specific person that a reasonable person would consider
as seriously alarming, seriously
annoying, seriously tormenting, or seriously terrorizing
the person and that serves no
legitimate purpose. (2)
"Of a harassing nature" means of a nature that a
reasonable person would
consider as seriously alarming, seriously annoying,
seriously tormenting, or seriously
terrorizing of the person and that serves no legitimate
purpose. Cal.
Penal Code § 653m Telephone Calls or Contact by
Electronic Communication Device with
Intent to Annoy (a)
Every person who, with intent to annoy, telephones or
makes contact by means of an
electronic communication device with another and
addresses to or about the other person any
obscene language or addresses to the other person any
threat to inflict injury to the person or
property of the person addressed or any member of his or
her family, is guilty of a misdemeanor.
Nothing in this subdivision shall apply to telephone
calls or electronic contacts made in good
faith. (b)
Every person who, with intent to annoy or harass, makes
repeated telephone calls or
makes repeated contact by means of an electronic
communication device, or makes any
combination of calls or contact, to another person is,
whether or not conversation ensues from
making the telephone call or contact by means of an
electronic communication device, guilty of a
misdemeanor. Nothing in this subdivision shall apply to
telephone calls or electronic contacts
made in good faith or during the ordinary course and
scope of business. (c)
Any offense committed by use of a telephone may be
deemed to have been committed
when and where the telephone call or calls were made or
received. Any offense committed by
use of an electronic communication device or medium,
including the Internet, may be deemed to
have been committed when and where the electronic
communication or communications were
originally sent or first viewed by the recipient. (d)
Subdivision (a) or (b) is violated when the person
acting with intent to annoy makes a
telephone call or contact by means of an electronic
communication device requesting a return
call and performs the acts prohibited under subdivision
(a) or (b) upon receiving the return call. (e)
Subdivision (a) or (b) is violated when a person
knowingly permits any telephone or
electronic communication under the person's control to
be used for the purposes prohibited by
those subdivisions. (f)
If probation is granted, or the execution or imposition
of sentence is suspended, for
any person convicted under this section, the court may
order as a condition of probation that the
person participate in counseling. (g)
For purposes of this section, the term "electronic
communication device" includes, but
is not limited to, telephones, cellular phones,
computers, video recorders, facsimile machines,
pagers, personal digital assistants, smartphones, and
any other device that transfers signs, signals,
writing, images, sounds, or data. "Electronic
communication device" also includes, but is not
limited to, videophones, TTY/TDD devices, and all other
devices used to aid or assist
communication to or from deaf or disabled persons.
"Electronic communication" has the same
meaning as the term defined in Subsection 12 of Section
2510 of Title 18 of the United States
Code.
Colorado
Colo. Rev. Stat. § 18-9-111 Harassment (1)
A person commits harassment if, with intent to harass,
annoy, or alarm another
person, he or she: * *
* (e)
Initiates communication with a person, anonymously or
otherwise, by
telephone, telephone network, data network, text
message, instant message, computer,
computer network, or computer system in a manner
intended to harass or threaten bodily
injury or property damage, or makes any comment,
request, suggestion, or proposal by
telephone, computer, computer network, or computer
system that is obscene; or * *
* (h)
Repeatedly insults, taunts, challenges, or makes
communications in
offensively coarse language to, another in a manner
likely to provoke a violent or
disorderly response.
(1.5) As used in this section, unless the context
otherwise requires, "obscene" means a
patently offensive description of ultimate sexual acts
or solicitation to commit ultimate sexual
acts, whether or not said ultimate sexual acts are
normal or perverted, actual or simulated,
including masturbation, cunnilingus, fellatio, anilingus,
or excretory functions. (2)
Harassment pursuant to subsection (1) of this section is
a class 3 misdemeanor; except
that harassment is a class 1 misdemeanor if the offender
commits harassment pursuant to
subsection (1) of this section with the intent to
intimidate or harass another person because of
that person's actual or perceived race, color, religion,
ancestry, or national origin. (3)
Any act prohibited by paragraph (e) of subsection (1) of
this section may be deemed
to have occurred or to have been committed at the place
at which the telephone call, electronic
mail, or other electronic communication was either made
or received. (4)
to (6) Repealed.
Connecticut
Conn. Gen. Stat. § 53a-182b Harassment in the First
Degree: Class D Felony (a)
A person is guilty of harassment in the first degree
when, with the intent to harass,
annoy, alarm or terrorize another person, he threatens
to kill or physically injure that person or
any other person, and communicates such threat by
telephone, or by telegraph, mail, computer
network, as defined in section 53a-250, or any other
form of written communication, in a manner
likely to cause annoyance or alarm and has been
convicted of a capital felony under the
provisions of section 53a-54b in effect prior to April
25, 2012, a class A felony, a class B felony,
except a conviction under section 53a-86 or 53a-122, a
class C felony, except a conviction under
section 53a-87, 53a-152 or 53a-153, or a class D felony
under sections 53a-60 to 53a-60c,
inclusive, 53a-72a, 53a-72b, 53a-95, 53a-103, 53a-103a,
53a-114, 53a-136 or 53a-216. For the
purposes of this section, “convicted” means having a
judgment of conviction entered by a court
of competent jurisdiction. (b)
For purposes of this section, such offense may be deemed
to have been committed
either at the place where the telephone call was made or
where it was received. (c)
The court may order any person convicted under this
section to be examined by one or
more psychiatrists. (d)
Harassment in the first degree is a class D felony.
Conn. Gen. Stat. § 53a-183 Harassment in the Second
Degree: Class C Misdemeanor (a)
A person is guilty of harassment in the second degree
when: (1) By telephone, he
addresses another in or uses indecent or obscene
language; or (2) with intent to harass, annoy or
alarm another person, he communicates with a person by
telegraph or mail, by electronically
transmitting a facsimile through connection with a
telephone network, by computer network, as
defined in section 53a-250, or by any other form of
written communication, in a manner likely to
cause annoyance or alarm; or (3) with intent to harass,
annoy or alarm another person, he makes
a telephone call, whether or not a conversation ensues,
in a manner likely to cause annoyance or
alarm. [172] (b)
For the purposes of this section, such offense may be
deemed to have been committed
either at the place where the communication originated
or at the place where it was received. (c)
The court may order any person convicted under this
section to be examined by one or
more psychiatrists. (d)
Harassment in the second degree is a class C
misdemeanor.
Delaware
Del.
Code Ann. tit. 11, § 1311 Harassment; Class A
Misdemeanor (a)
A person is guilty of harassment when, with intent to
harass, annoy or alarm another
person: (1)
That person insults, taunts or challenges another person
or engages in any
other course of alarming or distressing conduct which
serves no legitimate purpose and is
in a manner which the person knows is likely to provoke
a violent or disorderly response
or cause a reasonable person to suffer fear, alarm, or
distress; (2)
Communicates with a person by telephone, telegraph, mail
or any other form
of written or electronic communication in a manner which
the person knows is likely to
cause annoyance or alarm including, but not limited to,
intrastate telephone calls initiated
by vendors for the purpose of selling goods or services; (3)
Knowingly permits any telephone under that person's
control to be used for a
purpose prohibited by this section; (4)
In the course of a telephone call that person uses
obscene language or
language suggesting that the recipient of the call
engage with that person or another
person in sexual relations of any sort, knowing that the
person is thereby likely to cause
annoyance or alarm to the recipient of the call; or (5)
Makes repeated or anonymous telephone calls to another
person whether or
not conversation ensues, knowing that person is thereby
likely to cause annoyance or
alarm. (b)
Harassment is a class A misdemeanor.
Florida
Fla.
Stat. § 784.048 Stalking; Definitions; Penalties (1)
As used in this section, the term: (a)
"Harass" means to engage in a course of conduct directed
at a specific person
which causes substantial emotional distress to that
person and serves no legitimate
purpose. (b)
"Course of conduct" means a pattern of conduct composed
of a series of acts
over a period of time, however short, which evidences a
continuity of purpose. The term
does not include constitutionally protected activity
such as picketing or other organized
protests. (c)
"Credible threat" means a verbal or nonverbal threat, or
a combination of the
two, including threats delivered by electronic
communication or implied by a pattern of
conduct, which places the person who is the target of
the threat in reasonable fear for his
or her safety or the safety of his or her family members
or individuals closely associated
with the person, and which is made with the apparent
ability to carry out the threat to
cause such harm. It is not necessary to prove that the
person making the threat had the
intent to actually carry out the threat. The present
incarceration of the person making the
threat is not a bar to prosecution under this section. (d)
"Cyberstalk" means to engage in a course of conduct to
communicate, or to
cause to be communicated, words, images, or language by
or through the use of
electronic mail or electronic communication, directed at
a specific person, causing
substantial emotional distress to that person and
serving no legitimate purpose. (2)
A person who willfully, maliciously, and repeatedly
follows, harasses, or cyberstalks
another person commits the offense of stalking, a
misdemeanor of the first degree, punishable as
provided in s. 775.082 or s. 775.083. (3)
A person who willfully, maliciously, and repeatedly
follows, harasses, or cyberstalks
another person and makes a credible threat to that
person commits the offense of aggravated
stalking, a felony of the third degree, punishable as
provided in s. 775.082, s. 775.083, or s.
775.084. (4)
A person who, after an injunction for protection against
repeat violence, sexual
violence, or dating violence pursuant to s. 784.046, or
an injunction for protection against
domestic violence pursuant to s. 741.30, or after any
other court-imposed prohibition of conduct
toward the subject person or that person's property,
knowingly, willfully, maliciously, and
repeatedly follows, harasses, or cyberstalks another
person commits the offense of aggravated
stalking, a felony of the third degree, punishable as
provided in s. 775.082, s. 775.083, or s.
775.084. (5)
A person who willfully, maliciously, and repeatedly
follows, harasses, or cyberstalks
a child under 16 years of age commits the offense of
aggravated stalking, a felony of the third
degree, punishable as provided in s. 775.082, s.
775.083, or s. 775.084. (6)
A law enforcement officer may arrest, without a warrant,
any person that he or she
has probable cause to believe has violated this section. (7)
A person who, after having been sentenced for a
violation of s. 794.011, s. 800.04, or
s. 847.0135(5) and prohibited from contacting the victim
of the offense under s. 921.244,
willfully, maliciously, and repeatedly follows,
harasses, or cyberstalks the victim commits the
offense of aggravated stalking, a felony of the third
degree, punishable as provided in s. 775.082,
s. 775.083, or s. 775.084. (8)
The punishment imposed under this section shall run
consecutive to any former
sentence imposed for a conviction for any offense under
s. 794.011, s. 800.04, or s. 847.0135(5). (9) (a)
The sentencing court shall consider, as a part of any
sentence, issuing an order
restraining the defendant from any contact with the
victim, which may be valid for up to
10 years, as determined by the court. It is the intent
of the Legislature that the length of
any such order be based upon the seriousness of the
facts before the court, the probability
of future violations by the perpetrator, and the safety
of the victim and his or her family
members or individuals closely associated with the
victim. (b)
The order may be issued by the court even if the
defendant is sentenced to a
state prison or a county jail or even if the imposition
of the sentence is suspended and the
defendant is placed on probation.
Georgia
There is no cyberharassment statute in this state.
Hawaii
Haw.
Rev. Stat. § 711-1106 Harassment (1)
A person commits the offense of harassment if, with
intent to harass, annoy, or alarm
any other person, that person: (a)
Strikes, shoves, kicks, or otherwise touches another
person in an offensive
manner or subjects the other person to offensive
physical contact; (b)
Insults, taunts, or challenges another person in a
manner likely to provoke an
immediate violent response or that would cause the other
person to reasonably believe
that the actor intends to cause bodily injury to the
recipient or another or damage to the
property of the recipient or another; (c)
Repeatedly makes telephone calls, facsimile
transmissions, or any form of
electronic communication as defined in section
711-1111(2), including electronic mail
transmissions, without purpose of legitimate
communication; (d)
Repeatedly makes a communication anonymously or at an
extremely
inconvenient hour; (e)
Repeatedly makes communications, after being advised by
the person to
whom the communication is directed that further
communication is unwelcome; or (f)
Makes a communication using offensively coarse language
that would cause
the recipient to reasonably believe that the actor
intends to cause bodily injury to the
recipient or another or damage to the property of the
recipient or another. (2)
Harassment is a petty misdemeanor. Haw.
Rev. Stat. § 711-1106.5 Harassment by Stalking (1)
A person commits the offense of harassment by stalking
if, with intent to harass,
annoy, or alarm another person, or in reckless disregard
of the risk thereof, that person engages
in a course of conduct involving pursuit, surveillance,
or non-consensual contact upon the other
person on more than one occasion without legitimate
purpose. (2)
A person convicted under this section may be required to
undergo a counseling
program as ordered by the court. (3)
For purposes of this section, "nonconsensual contact"
means any contact that occurs
without that individual's consent or in disregard of
that person's express desire that the contact be
avoided or discontinued. Nonconsensual contact includes
direct personal visual or oral contact
and contact via telephone, facsimile, or any form of
electronic communication, as defined in
section 711-1111(2), including electronic mail
transmission. (4)
Harassment by stalking is a misdemeanor. Haw.
Rev. Stat. § 708-893 Use of a Computer in the Commission
of a Separate Crime
(1) A person commits the offense of use of a computer in
the commission of a separate
crime if the person: * *
* (b)
Knowingly uses a computer to identify, select, solicit,
persuade, coerce,
entice, induce, procure, pursue, surveil, contact,
harass, annoy, or alarm the victim or
intended victim of the following offenses: * *
*
(vii) Section 711-1106, relating to harassment;
(viii) Section 711-1106.5, relating to harassment by
stalking; or * *
* (2)
Use of a computer in the commission of a separate crime
is an offense one class or
grade, as the case may be, greater than the offense
facilitated. Notwithstanding any other law to
the contrary, a conviction under this section shall not
merge with a conviction for the separate
crime.
Idaho
There is no cyberharassment statute in this state.
Illinois
720
Ill. Comp. Stat. 5/26.5-0.1 Definitions
"Electronic communication" means any transfer of signs,
signals, writings, images,
sounds, data or intelligence of any nature transmitted
in whole or in part by a wire, radio,
electromagnetic, photoelectric or photo-optical system.
"Electronic communication" includes
transmissions through an electronic device including,
but not limited to, a telephone, cellular
phone, computer, or pager, which communication includes,
but is not limited to, e-mail, instant
message, text message, or voice mail.
"Family or household member" includes spouses, former
spouses, parents, children,
stepchildren and other persons related by blood or by
present or prior marriage, persons who
share or formerly shared a common dwelling, persons who
have or allegedly share a blood
relationship through a child, persons who have or have
had a dating or engagement relationship,
and persons with disabilities and their personal
assistants. For purposes of this Article, neither a
casual acquaintanceship nor ordinary fraternization
between 2 individuals in business or social
contexts shall be deemed to constitute a dating
relationship.
"Harass" or "harassing" means knowing conduct which is
not necessary to accomplish a
purpose that is reasonable under the circumstances, that
would cause a reasonable person
emotional distress and does cause emotional distress to
another. 720
Ill. Comp. Stat. 5/26.5-1 Transmission of Obscene
Messages (a)
A person commits transmission of obscene messages when
he or she sends messages
or uses language or terms which are obscene, lewd or
immoral with the intent to offend by means
of or while using a telephone or telegraph facilities,
equipment or wires of any person, firm or
corporation engaged in the transmission of news or
messages between states or within the State
of Illinois. (b)
The trier of fact may infer intent to offend from the
use of language or terms which
are obscene, lewd or immoral. 720
Ill. Comp. Stat. 5/26.5-3 Harassment through Electronic
Communications (a)
A person commits harassment through electronic
communications when he or she
uses electronic communication for any of the following
purposes: (1)
Making any comment, request, suggestion or proposal
which is obscene with
an intent to offend; (2)
Interrupting, with the intent to harass, the telephone
service or the electronic
communication service of any person; (3)
Transmitting to any person, with the intent to harass
and regardless of whether
the communication is read in its entirety or at all, any
file, document, or other
communication which prevents that person from using his
or her telephone service or
electronic communications device; (4)
Transmitting an electronic communication or knowingly
inducing a person to
transmit an electronic communication for the purpose of
harassing another person who is
under 13 years of age, regardless of whether the person
under 13 years of age consents to
the harassment, if the defendant is at least 16 years of
age at the time of the commission
of the offense; (5)
Threatening injury to the person or to the property of
the person to whom an
electronic communication is directed or to any of his or
her family or household
members; or (6)
Knowingly permitting any electronic communications
device to be used for
any of the purposes mentioned in this subsection (a). (b)
Telecommunications carriers, commercial mobile service
providers, and providers of
information services, including, but not limited to,
Internet service providers and hosting service
providers, are not liable under this Section, except for
willful and wanton misconduct, by virtue
of the transmission, storage, or caching of electronic
communications or messages of others or
by virtue of the provision of other related
telecommunications, commercial mobile services, or
information services used by others in violation of this
Section.
Indiana
Ind.
Code § 35-45-2-2 Harassment; “Obscene Message” Defined (a)
A person who, with intent to harass, annoy, or alarm
another person but with no intent
of legitimate communication: (1)
makes a telephone call, whether or not a conversation
ensues; (2)
communicates with a person by telegraph, mail, or other
form of written
communication; (3)
transmits an obscene message, or indecent or profane
words, on a Citizens
Radio Service channel; or (4)
uses a computer network (as defined in IC 35-43-2-3(a))
or other form of
electronic communication to: (A)
communicate with a person; or (B)
transmit an obscene message or indecent or profane words
to a person;
commits harassment, a Class B misdemeanor. (b)
A message is obscene if: (1)
the average person, applying contemporary community
standards, finds that
the dominant theme of the message, taken as a whole,
appeals to the prurient interest in
sex; (2)
the message refers to sexual conduct in a patently
offensive way; and (3)
the message, taken as a whole, lacks serious artistic,
literary, political, or
scientific value.
Iowa
Iowa
Code § 708.7 Harassment 1. a. A
person commits harassment when, with intent to
intimidate, annoy, or alarm
another person, the person does any of the following: (1)
Communicates with another by telephone, telegraph,
writing, or via
electronic communication without legitimate purpose and
in a manner likely to
cause the other person annoyance or harm. * *
* 2. a. A
person commits harassment in the first degree when the
person commits
harassment involving a threat to commit a forcible
felony, or commits harassment and
has previously been convicted of harassment three or
more times under this section or
any similar statute during the preceding ten years. b.
Harassment in the first degree is an aggravated
misdemeanor. 3. a. A
person commits harassment in the second degree when the
person commits
harassment involving a threat to commit bodily injury,
or commits harassment and has
previously been convicted of harassment two times under
this section or any similar
statute during the preceding ten years. b.
Harassment in the second degree is a serious
misdemeanor. 4. a.
Any other act of harassment is harassment in the third
degree. b.
Harassment in the third degree is a simple misdemeanor. 5.
For purposes of determining whether or not the person
should register as a sex offender
pursuant to the provisions of chapter 692A, the fact
finder shall make a determination as
provided in section 692A.126.
Kansas
Kan.
Stat. Ann. § 21-6206 Harassment by Telecommunication
Device (a)
Harassment by telecommunication device is the use of: (1)
A telecommunications device to: (A)
Knowingly make or transmit any comment, request,
suggestion,
proposal, image or text which is obscene, lewd,
lascivious or indecent; (B)
make or transmit a call, whether or not conversation
ensues, with
intent to abuse, threaten or harass any person at the
receiving end; (C)
make or transmit any comment, request, suggestion,
proposal, image
or text with intent to abuse, threaten or harass any
person at the receiving end; (D)
make or cause a telecommunications device to repeatedly
ring or
activate with intent to harass any person at the
receiving end; (E)
knowingly play any recording on a telephone, except
recordings such
as weather information or sports information when the
number thereof is dialed,
unless the person or group playing the recording shall
be identified and state that
it is a recording; or (F)
knowingly permit any telecommunications device under
one's control
to be used in violation of this paragraph. * *
* (b)
Harassment by telecommunication device is a class A
nonperson misdemeanor. * *
* (d)
As used in this section, "telecommunications device"
includes telephones, cellular
telephones, telefacsimile machines and any other
electronic device which makes use of an
electronic communication service, as defined in K.S.A.
22-2514, and amendments thereto. (e)
An offender who violates the provisions of this section
may also be prosecuted for,
convicted of, and punished for any other offense in
K.S.A. 2012 Supp. 21-5508, 21-5509, 21-
5510 or 21-6401.
Kentucky
There is no cyberharassment statute in this state.
(Note: Ky. Rev. Stat. Ann. § 525.080(1)(c)
Harassing Communications is limited in scope to
cyberbullying by students)
Louisiana
There is no cyberharassment statute in this state.
Maine
Me.
Rev. Stat. tit. 17-A § 506 Harassment by Telephone or by
Electronic Communication
Device 1. A
person is guilty of harassment by telephone or by
electronic communication device
if: A.
By means of telephone or electronic communication device
the person makes
any comment, request, suggestion or proposal that is, in
fact, offensively coarse or
obscene, without the consent of the person called or
contacted; B.
The person makes a telephone call or makes a call or
contact by means of an
electronic communication device, whether or not oral or
written conversation ensues,
without disclosing the person's identity and with the
intent to annoy, abuse, threaten or
harass any person at the called or contacted number or
account; C.
The person makes or causes the telephone or electronic
communication device
of another repeatedly or continuously to ring or
activate or receive data, with the intent to
harass any person at the called or contacted number or
account; D.
The person makes repeated telephone calls or repeated
calls or contacts by
means of an electronic communication device, during
which oral or written conversation
ensues, with the intent to harass any person at the
called or contacted number or account;
or E.
The person knowingly permits any telephone or electronic
communication
device under the person's control to be used for any
purpose prohibited by this section. 2.
The crime defined in this section may be prosecuted and
punished in the county in
which the defendant was located when the defendant used
the telephone or electronic
communication device, or in the county in which the
telephone called or made to ring or the
electronic communication device called or made to ring
or be activated or receive data by the
defendant was located. 2-A.
As used in this section, "electronic communication
device" means any electronic or
digital product that communicates at a distance by
electronic transmission impulses or by fiber
optics, including any software capable of sending and
receiving communication, allowing a
person to electronically engage in the conduct
prohibited under this section. 3.
Harassment by telephone or by electronic communication
device is a Class E crime.
Maryland
Md.
Code Ann., Crim. Law § 3-805 Misuse of Electronic
Communication or Interactive
Computer Service (a)
Definitions. -- (1)
In this section the following words have the meanings
indicated. (2)
"Electronic communication" means the transmission of
information, data, or a
communication by the use of a computer or any other
electronic means that is sent to a
person and that is received by the person. (3)
"Interactive computer service" means an information
service, system, or
access software provider that provides or enables
computer access by multiple users to a
computer server, including a system that provides access
to the Internet and cellular
phones. (b)
Prohibited. -- (1)
A person may not maliciously engage in a course of
conduct, through the use
of electronic communication, that alarms or seriously
annoys another: (i)
with the intent to harass, alarm, or annoy the other; (ii)
after receiving a reasonable warning or request to stop
by or on behalf
of the other; and
(iii) without a legal purpose. (2)
A person may not use an interactive computer service to
maliciously engage in
a course of conduct that inflicts serious emotional
distress on a minor or places a minor in
reasonable fear of death or serious bodily injury with
the intent: (i)
to kill, injure, harass, or cause serious emotional
distress to the minor;
or (ii)
to place the minor in reasonable fear of death or
serious bodily injury. (c)
Construction of section. -- It is not a violation of
this section for any of the following
persons to provide information, facilities, or technical
assistance to another who is authorized by
federal or State law to intercept or provide electronic
communication or to conduct surveillance
of electronic communication, if a court order directs
the person to provide the information,
facilities, or technical assistance: (1)
a provider of electronic communication; (2)
an officer, employee, agent, landlord, or custodian of a
provider of electronic
communication; or (3)
a person specified in a court order directing the
provision of information,
facilities, or technical assistance to another who is
authorized by federal or State law to
intercept or provide electronic communication or to
conduct surveillance of electronic
communication. (d)
Exception. -- Subsection (b)(1) of this section does not
apply to a peaceable activity
intended to express a political view or provide
information to others. (e)
Penalty. -- A person who violates this section is guilty
of a misdemeanor and on
conviction is subject to imprisonment not exceeding 1
year or a fine not exceeding $ 500 or both.
Massachusetts
Mass. Gen. Laws ch. 265, § 43A Criminal Harassment;
Punishment (a)
Whoever willfully and maliciously engages in a knowing
pattern of conduct or series
of acts over a period of time directed at a specific
person, which seriously alarms that person and
would cause a reasonable person to suffer substantial
emotional distress, shall be guilty of the
crime of criminal harassment and shall be punished by
imprisonment in a house of correction for
not more than 21/2 years or by a fine of not more than
$1,000, or by both such fine and
imprisonment. The conduct or acts described in this
paragraph shall include, but not be limited
to, conduct or acts conducted by mail or by use of a
telephonic or telecommunication device or
electronic communication device including, but not
limited to, any device that transfers signs,
signals, writing, images, sounds, data or intelligence
of any nature transmitted in whole or in part
by a wire, radio, electromagnetic, photo-electronic or
photo-optical system, including, but not
limited to, electronic mail, internet communications,
instant messages or facsimile
communications. (b)
Whoever, after having been convicted of the crime of
criminal harassment, commits a
second or subsequent such crime, or whoever commits the
crime of criminal harassment having
previously been convicted of a violation of section 43,
shall be punished by imprisonment in a
house of correction for not more than two and one-half
years or by imprisonment in the state
prison for not more than ten years.
Michigan
Mich. Comp. Laws § 750.411s Posting Message through
Electronic Medium; Prohibition;
Penalty; Exceptions; Definitions (1)
A person shall not post a message through the use of any
medium of communication,
including the internet or a computer, computer program,
computer system, or computer network,
or other electronic medium of communication, without the
victim's consent, if all of the
following apply: (a)
The person knows or has reason to know that posting the
message could cause
2 or more separate noncontinuous acts of unconsented
contact with the victim. (b)
Posting the message is intended to cause conduct that
would make the victim
feel terrorized, frightened, intimidated, threatened,
harassed, or molested. (c)
Conduct arising from posting the message would cause a
reasonable person to
suffer emotional distress and to feel terrorized,
frightened, intimidated, threatened,
harassed, or molested. (d)
Conduct arising from posting the message causes the
victim to suffer
emotional distress and to feel terrorized, frightened,
intimidated, threatened, harassed, or
molested. (2)
A person who violates subsection (1) is guilty of a
crime as follows: (a)
Except as provided in subdivision (b), the person is
guilty of a felony
punishable by imprisonment for not more than 2 years or
a fine of not more than $
5,000.00, or both. (b)
If any of the following apply, the person is guilty of a
felony punishable by
imprisonment for not more than 5 years or a fine of not
more than $ 10,000.00, or both: (i)
Posting the message is in violation of a restraining
order and the person
has received actual notice of that restraining order or
posting the message is in
violation of an injunction or preliminary injunction. (ii)
Posting the message is in violation of a condition of
probation, a
condition of parole, a condition of pretrial release, or
a condition of release on
bond pending appeal.
(iii) Posting the message results in a credible threat
being communicated
to the victim, a member of the victim's family, or
another individual living in the
same household as the victim. (iv)
The person has been previously convicted of violating
this section or
section 145d, 411h, or 411i, or section 6 of 1979 PA 53,
MCL 752.796, or a
substantially similar law of another state, a political
subdivision of another state,
or of the United States. (v)
The victim is less than 18 years of age when the
violation is committed
and the person committing the violation is 5 or more
years older than the victim. (3)
This section does not apply to an internet or computer
network service provider who
in good faith, and without knowledge of the specific
nature of the message posted, provides the
medium for disseminating information or communication
between persons. (4)
The court may order a person convicted of violating this
section to reimburse this
state or a local unit of government of this state for
the expenses incurred in relation to the
violation in the same manner that expenses may be
ordered to be reimbursed under section 1f of
chapter IX of the code of criminal procedure, 1927 PA
175, MCL 769.1f. (5)
This section does not prohibit a person from being
charged with, convicted of, or
punished for any other violation of law committed by
that person while violating or attempting to
violate this section. (6)
This section does not prohibit constitutionally
protected speech or activity. (7)
A person may be prosecuted in this state for violating
or attempting to violate this
section only if 1 of the following applies: (a)
The person posts the message while in this state. (b)
Conduct arising from posting the message occurs in this
state. (c)
The victim is present in this state at the time the
offense or any element of the
offense occurs. (d)
The person posting the message knows that the victim
resides in this state. (8)
As used in this section: (a)
"Computer" means any connected, directly interoperable
or interactive device,
equipment, or facility that uses a computer program or
other instructions to perform
specific operations including logical, arithmetic, or
memory functions with or on
computer data or a computer program and that can store,
retrieve, alter, or communicate
the results of the operations to a person, computer
program, computer, computer system,
or computer network. (b)
"Computer network" means the interconnection of hardwire
or wireless
communication lines with a computer through remote
terminals, or a complex consisting
of 2 or more interconnected computers. (c)
"Computer program" means a series of internal or
external instructions
communicated in a form acceptable to a computer that
directs the functioning of a
computer, computer system, or computer network in a
manner designed to provide or
produce products or results from the computer, computer
system, or computer network. (d)
"Computer system" means a set of related, connected or
unconnected,
computer equipment, devices, software, or hardware. (e)
"Credible threat" means a threat to kill another
individual or a threat to inflict
physical injury upon another individual that is made in
any manner or in any context that
causes the individual hearing or receiving the threat to
reasonably fear for his or her
safety or the safety of another individual. (f)
"Device" includes, but is not limited to, an electronic,
magnetic,
electrochemical, biochemical, hydraulic, optical, or
organic object that performs input,
output, or storage functions by the manipulation of
electronic, magnetic, or other
impulses. (g)
"Emotional distress" means significant mental suffering
or distress that may,
but does not necessarily, require medical or other
professional treatment or counseling. (h)
"Internet" means that term as defined in section 230 of
title II of the
communications act of 1934, chapter 652, 110 Stat. 137,
47 U.S.C. 230. (i)
"Post a message" means transferring, sending, posting,
publishing,
disseminating, or otherwise communicating or attempting
to transfer, send, post, publish,
disseminate, or otherwise communicate information,
whether truthful or untruthful, about
the victim. (j)
"Unconsented contact" means any contact with another
individual that is
initiated or continued without that individual's consent
or in disregard of that individual's
expressed desire that the contact be avoided or
discontinued. Unconsented contact
includes any of the following: (i)
Following or appearing within sight of the victim. (ii)
Approaching or confronting the victim in a public place
or on private
property.
(iii) Appearing at the victim's workplace or residence. (iv)
Entering onto or remaining on property owned, leased, or
occupied by
the victim. (v)
Contacting the victim by telephone. (vi)
Sending mail or electronic communications to the victim
through the
use of any medium, including the internet or a computer,
computer program,
computer system, or computer network.
(vii) Placing an object on, or delivering or having
delivered an object to,
property owned, leased, or occupied by the victim. (k)
"Victim" means the individual who is the target of the
conduct elicited by the
posted message or a member of that individual's
immediate family.
Minnesota
Minn. Stat. § 609.795 Letter, Telegram, or Package;
Opening; Harassment
Subdivision 1. Misdemeanors. -- Whoever does any of the
following is guilty of a
misdemeanor: * *
* (3)
with the intent to abuse, disturb, or cause distress,
repeatedly mails or delivers
or causes the delivery by any means, including
electronically, of letters, telegrams, or
packages. Subd.
2. [Repealed] Subd.
3. Venue. -- The offense may be prosecuted either at the
place where the letter,
telegram, or package is sent or received or,
alternatively in the case of wireless electronic
communication, where the sender or receiver resides.
Mississippi
Miss. Code Ann. § 97-29-45 Obscene Electronic
Communications (1)
It shall be unlawful for any person or persons: (a)
To make any comment, request, suggestion or proposal by
means of
telecommunication or electronic communication which is
obscene, lewd or lascivious
with intent to abuse, threaten or harass any party to a
telephone conversation,
telecommunication or electronic communication; (b)
To make a telecommunication or electronic communication
with intent to
terrify, intimidate or harass, and threaten to inflict
injury or physical harm to any person
or to his property; (c)
To make a telephone call, whether or not conversation
ensues, without
disclosing his identity and with intent to annoy, abuse,
threaten or harass any person at
the called number; (d)
To make or cause the telephone of another repeatedly or
continuously to ring,
with intent to harass any person at the called number; (e)
To make repeated telephone calls, during which
conversation ensues, solely to
harass any person at the called number; or (f)
Knowingly to permit a computer or a telephone of any
type under his control
to be used for any purpose prohibited by this section. (2)
Upon conviction of any person for the first offense of
violating subsection (1) of this
section, such person shall be fined not more than Five
Hundred Dollars ($ 500.00) or imprisoned
in the county jail for not more than six (6) months, or
both. (3)
Upon conviction of any person for the second offense of
violating subsection (1) of
this section, the offenses being committed within a
period of five (5) years, such person shall be
fined not more than One Thousand Dollars ($ 1,000.00) or
imprisoned in the county jail for not
more than one (1) year, or both. (4)
For any third or subsequent conviction of any person
violating subsection (1) of this
section, the offenses being committed within a period of
five (5) years, such person shall be
guilty of a felony and fined not more than Two Thousand
Dollars ($ 2,000.00) and/or imprisoned
in the State Penitentiary for not more than two (2)
years, or both. (5)
The provisions of this section do not apply to a person
or persons who make a
telephone call that would be covered by the provisions
of the federal Fair Debt Collection
Practices Act, 15 USCS Section 1692 et seq. (6)
Any person violating this section may be prosecuted in
the county where the
telephone call, conversation or language originates in
case such call, conversation or language
originates in the State of Mississippi. In case the
call, conversation or language originates outside
of the State of Mississippi then such person shall be
prosecuted in the county to which it is
transmitted. (7)
For the purposes of this section, telecommunication and
electronic communication
mean and include any type of telephonic, electronic or
radio communications, or transmission of
signs, signals, data, writings, images and sounds or
intelligence of any nature by telephone,
including cellular telephones, wire, cable, radio,
electromagnetic, photoelectronic or photooptical
system or the creation, display, management, storage,
processing, transmission or
distribution of images, text, voice, video or data by
wire, cable or wireless means, including the
Internet. (8)
No person shall be held to have violated this section
solely for providing access or
connection to telecommunications or electronic
communications services where the services do
not include the creation of the content of the
communication. Companies organized to do
business as commercial broadcast radio stations,
television stations, telecommunications service
providers, Internet service providers, cable service
providers or news organizations shall not be
criminally liable under this section.
Missouri
Mo.
Rev. Stat. § 565.090 Harassment 1. A
person commits the crime of harassment if he or she: (1)
Knowingly communicates a threat to commit any felony to
another person and
in so doing frightens, intimidates, or causes emotional
distress to such other person; or (2)
When communicating with another person, knowingly uses
coarse language
offensive to one of average sensibility and thereby puts
such person in reasonable
apprehension of offensive physical contact or harm; or (3)
Knowingly frightens, intimidates, or causes emotional
distress to another
person by anonymously making a telephone call or any
electronic communication; or (4)
Knowingly communicates with another person who is, or
who purports to be,
seventeen years of age or younger and in so doing and
without good cause recklessly
frightens, intimidates, or causes emotional distress to
such other person; or (5)
Knowingly makes repeated unwanted communication to
another person; or [173] (6)
Without good cause engages in any other act with the
purpose to frighten,
intimidate, or cause emotional distress to another
person, cause such person to be
frightened, intimidated, or emotionally distressed, and
such person's response to the act is
one of a person of average sensibilities considering the
age of such person. 2.
Harassment is a class A misdemeanor unless: (1)
Committed by a person twenty-one years of age or older
against a person
seventeen years of age or younger; or (2)
The person has previously pleaded guilty to or been
found guilty of a violation
of this section, or of any offense committed in
violation of any county or municipal
ordinance in any state, any state law, any federal law,
or any military law which, if
committed in this state, would be chargeable or
indictable as a violation of any offense
listed in this subsection. In
such cases, harassment shall be a class D felony. 3.
This section shall not apply to activities of federal,
state, county, or municipal law
enforcement officers conducting investigations of
violation of federal, state, county, or municipal
law.
Montana
Mont. Code Ann. § 45-8-213 Privacy in Communications (1)
Except as provided in 69-6-104, a person commits the
offense of violating privacy in
communications if the person knowingly or purposely: (a)
with the purpose to terrify, intimidate, threaten,
harass, annoy, or offend,
communicates with a person by electronic communication
and uses obscene, lewd, or
profane language, suggests a lewd or lascivious act, or
threatens to inflict injury or
physical harm to the person or property of the person.
The use of obscene, lewd, or
profane language or the making of a threat or lewd or
lascivious suggestions is prima
facie evidence of an intent to terrify, intimidate,
threaten, harass, annoy, or offend. [174] (b)
uses an electronic communication to attempt to extort
money or any other
thing of value from a person or to disturb by repeated
communications the peace, quiet,
or right of privacy of a person at the place where the
communications are received; (c)
records or causes to be recorded a conversation by use
of a hidden electronic
or mechanical device that reproduces a human
conversation without the knowledge of all
parties to the conversation. This subsection (1)(c) does
not apply to: (i)
elected or appointed public officials or to public
employees when the
transcription or recording is done in the performance of
official duty; (ii)
persons speaking at public meetings;
(iii) persons given warning of the transcription or
recording, and if one
person provides the warning, either party may record; or (iv)
a health care facility, as defined in 50-5-101, or a
government agency
that deals with health care if the recording is of a
health care emergency telephone
communication made to the facility or agency. (2)
Except as provided in 69-6-104, a person commits the
offense of violating privacy in
communications if the person purposely intercepts an
electronic communication. This subsection
does not apply to elected or appointed public officials
or to public employees when the
interception is done in the performance of official duty
or to persons given warning of the
interception. (3) (a)
A person convicted of the offense of violating privacy
in communications
shall be fined an amount not to exceed $ 500 or be
imprisoned in the county jail for a
term not to exceed 6 months, or both. (b)
On a second conviction of subsection (1)(a) or (1)(b), a
person shall be
imprisoned in the county jail for a term not to exceed 1
year or be fined an amount not to
exceed $ 1,000, or both. (c)
On a third or subsequent conviction of subsection (1)(a)
or (1)(b), a person
shall be imprisoned in the state prison for a term not
to exceed 5 years or be fined an
amount not to exceed $ 10,000, or both. (4)
"Electronic communication" means any transfer between
persons of signs, signals,
writing, images, sounds, data, or intelligence of any
nature transmitted in whole or in part by a
wire, radio, electromagnetic, photoelectronic, or
photo-optical system.
Nebraska
Neb.
Rev. Stat. § 28-311.02 Stalking and Harassment;
Legislative Intent; Terms, Defined (1)
It is the intent of the Legislature to enact laws
dealing with stalking offenses which
will protect victims from being willfully harassed,
intentionally terrified, threatened, or
intimidated by individuals who intentionally follow,
detain, stalk, or harass them or impose any
restraint on their personal liberty and which will not
prohibit constitutionally protected activities. (2)
For purposes of sections 28-311.02 to 28-311.05,
28-311.09, and 28-311.10: (a)
Harass means to engage in a knowing and willful course
of conduct directed at
a specific person which seriously terrifies, threatens,
or intimidates the person and which
serves no legitimate purpose; (b)
Course of conduct means a pattern of conduct composed of
a series of acts
over a period of time, however short, evidencing a
continuity of purpose, including a
series of acts of following, detaining, restraining the
personal liberty of, or stalking the
person or telephoning, contacting, or otherwise
communicating with the person; (c)
Family or household member means a spouse or former
spouse of the victim,
children of the victim, a person presently residing with
the victim or who has resided with
the victim in the past, a person who had a child in
common with the victim, other persons
related to the victim by consanguinity or affinity, or
any person presently involved in a
dating relationship with the victim or who has been
involved in a dating relationship with
the victim. For purposes of this subdivision, dating
relationship means frequent, intimate
associations primarily characterized by the expectation
of affectional or sexual
involvement but does not include a casual relationship
or an ordinary association between
persons in a business or social context; and (d)
Substantially conforming criminal violation means a
guilty plea, a nolo
contendere plea, or a conviction for a violation of any
federal law or law of another state
or any county, city, or village ordinance of this state
or another state substantially similar
to section 28-311.03. Substantially conforming is a
question of law to be determined by
the court.
Nevada
There is no cyberharassment statute in this state.
New
Hampshire
N.H.
Rev. Stat. Ann. § 644:4 Harassment I. A
person is guilty of a misdemeanor, and subject to
prosecution in the jurisdiction
where the communication originated or was received, if
such person: (a)
Makes a telephone call, whether or not a conversation
ensues, with no
legitimate communicative purpose or without disclosing
his or her identity and with a
purpose to annoy, abuse, threaten, or alarm another; or (b)
Makes repeated communications at extremely inconvenient
hours or in
offensively coarse language with a purpose to annoy or
alarm another; or (c)
Insults, taunts, or challenges another in a manner
likely to provoke a violent or
disorderly response; or (d)
Knowingly communicates any matter of a character tending
to incite murder,
assault, or arson; or (e)
With the purpose to annoy or alarm another, communicates
any matter
containing any threat to kidnap any person or to commit
a violation of RSA 633:4; or a
threat to the life or safety of another; or (f)
With the purpose to annoy or alarm another, having been
previously notified
that the recipient does not desire further
communication, communicates with such person,
when the communication is not for a lawful purpose or
constitutionally protected. [175] II.
As used in paragraph I, "communicates" means to impart a
message by any method of
transmission, including but not limited to telephoning
or personally delivering or sending or
having delivered any information or material by written
or printed note or letter, package, mail,
courier service or electronic transmission, including
electronic transmissions generated or
communicated via a computer. For purposes of this
section, "computer" means a programmable,
electronic device capable of accepting and processing
data. III.
In any complaint or information brought for the
enforcement of RSA 644:4, I(f), it
shall not be necessary for the state to negate any
exception, excuse, proviso, or exemption
contained therein and the burden of proof of any
exception, excuse, proviso, or exemption shall
be upon the defendant. IV.
A person shall be guilty of a class B felony if the
person violates RSA 644:4, I(a)
under circumstances involving making telephone calls to
a telephone number that he or she
knows is being used, at the time of the calls, to
facilitate the transportation of voters to polling
places or otherwise to support voting or registering to
vote.
New
Jersey
There is no express cyberharassment statute in New
Jersey, however N.J. Rev. Stat. § 2C:33-4
criminalizes the act of making, or causing to be made,
“a communication or communications
anonymously or at extremely inconvenient hours, or in
offensively coarse language, or any other
manner likely to cause annoyance or alarm” when done
with the purpose to harass another. It
also criminalizes engaging “in any other course of
alarming conduct or of repeatedly committed
acts with purpose to alarm or seriously annoy such other
person.” It is unclear as to what extent
and how this statute may be applied to cyberharassment.
New
Mexico
There is no express cyberharassment statute in New
Mexico; however N.M. Stat. Ann. § 30-3A-
2 makes “knowingly pursuing a pattern of conduct that is
intended to annoy, seriously alarm or
terrorize another person and that serves no lawful
purpose” a misdemeanor if the conduct “would
cause a reasonable person to suffer substantial
emotional distress.”
New
York
N.Y.
Penal Law § 240.30 Aggravated Harassment in the Second
Degree A
person is guilty of aggravated harassment in the second
degree when, with intent to
harass, annoy, threaten or alarm another person, he or
she: 1.
Either (a)
communicates with a person, anonymously or otherwise, by
telephone,
by telegraph, or by mail, or by transmitting or
delivering any other form of written
communication, in a manner likely to cause annoyance or
alarm; or (b)
causes a communication to be initiated by mechanical or
electronic
means or otherwise with a person, anonymously or
otherwise, by telephone, by
telegraph, or by mail, or by transmitting or delivering
any other form of written
communication, in a manner likely to cause annoyance or
alarm; or * *
* 5.
Commits the crime of harassment in the first degree and
has previously been
convicted of the crime of harassment in the first degree
as defined by section 240.25 of
this article within the preceding ten years. 6.
For the purposes of subdivision one of this section,
"form of written
communication" shall include, but not be limited to, a
recording as defined in subdivision
six of section 275.00 of this part.
Aggravated harassment in the second degree is a class A
misdemeanor. N.Y.
Penal Law § 275.00 Definitions The
following definitions are applicable to this article: * *
* 6.
"Recording" means an original phonograph record, disc,
tape, audio or video
cassette, wire, film, hard drive, flash drive, memory
card or other data storage device or
any other medium on which such sounds, images, or both
sounds and images are or can
be recorded or otherwise stored, or a copy or
reproduction that duplicates in whole or in
part the original.
North Carolina
N.C.
Gen. Stat. § 14-196 Using Profane, Indecent, or
Threatening Language to any Person over
Telephone; Annoying or Harassing by Repeated Telephoning
or Making False Statements over
Telephone (a)
It shall be unlawful for any person: (1)
To use in telephonic communications any words or
language of a profane,
vulgar, lewd, lascivious or indecent character, nature
or connotation; (2)
To use in telephonic communications any words or
language threatening to
inflict bodily harm to any person or to that person's
child, sibling, spouse, or dependent or
physical injury to the property of any person, or for
the purpose of extorting money or
other things of value from any person; * *
* (b)
Any of the above offenses may be deemed to have been
committed at either the place
at which the telephone call or calls were made or at the
place where the telephone call or calls
were received. For purposes of this section, the term
"telephonic communications" shall include
communications made or received by way of a telephone
answering machine or recorder,
telefacsimile machine, or computer modem. (c)
Anyone violating the provisions of this section shall be
guilty of a Class 2
misdemeanor.
North Dakota
N.D.
Cent. Code § 12.1-17-07 Harassment 1. A
person is guilty of an offense if, with intent to
frighten or harass another, the person: a.
Communicates in writing or by electronic communication a
threat to inflict
injury on any person, to any person's reputation, or to
any property; b.
Makes a telephone call anonymously or in offensively
coarse language; c.
Makes repeated telephone calls or other electronic
communication, whether or
not a conversation ensues, with no purpose of legitimate
communication; or d.
Communicates a falsehood in writing or by electronic
communication and
causes mental anguish. 2.
The offense is a class A misdemeanor if it is under
subdivision a of subsection 1 or
subsection 4. Otherwise it is a class B misdemeanor. 3.
Any offense defined herein and committed by use of
electronic communication may be
deemed to have been committed at either the place at
which the electronic communication was
made or at the place where the electronic communication
was received. * *
* 5.
Any offense defined herein is deemed communicated in
writing if it is transmitted
electronically, by electronic mail, facsimile, or other
similar means. Electronic communication
means transfer of signs, signals, writing, images,
sounds, data, or intelligence of any nature
transmitted in whole or in part by a wire, radio,
electromagnetic, photo-electronic, or photooptical
system.
Ohio
Ohio
Rev. Code Ann. § 2917.21 Telecommunications Harassment (A)
No person shall knowingly make or cause to be made a
telecommunication, or
knowingly permit a telecommunication to be made from a
telecommunications device under the
person's control, to another, if the caller does any of
the following: (1)
Fails to identify the caller to the recipient of the
telecommunication and makes
the telecommunication with purpose to harass or abuse
any person at the premises to
which the telecommunication is made, whether or not
actual communication takes place
between the caller and a recipient; (2)
Describes, suggests, requests, or proposes that the
caller, the recipient of the
telecommunication, or any other person engage in sexual
activity, and the recipient or
another person at the premises to which the
telecommunication is made has requested, in
a previous telecommunication or in the immediate
telecommunication, that the caller not
make a telecommunication to the recipient or to the
premises to which the
telecommunication is made; (3)
During the telecommunication, violates section 2903.21
of the Revised Code; (4)
Knowingly states to the recipient of the
telecommunication that the caller
intends to cause damage to or destroy public or private
property, and the recipient, any
member of the recipient's family, or any other person
who resides at the premises to
which the telecommunication is made owns, leases,
resides, or works in, will at the time
of the destruction or damaging be near or in, has the
responsibility of protecting, or
insures the property that will be destroyed or damaged; (5)
Knowingly makes the telecommunication to the recipient
of the
telecommunication, to another person at the premises to
which the telecommunication is
made, or to those premises, and the recipient or another
person at those premises
previously has told the caller not to make a
telecommunication to those premises or to
any persons at those premises. (B)
No person shall make or cause to be made a
telecommunication, or permit a
telecommunication to be made from a telecommunications
device under the person's control,
with purpose to abuse, threaten, or harass another
person. (C) (1)
Whoever violates this section is guilty of
telecommunications harassment. (2)
A violation of division (A)(1), (2), (3), or (5) or (B)
of this section is a
misdemeanor of the first degree on a first offense and a
felony of the fifth degree on each
subsequent offense. (3)
Except as otherwise provided in division (C)(3) of this
section, a violation of
division (A)(4) of this section is a misdemeanor of the
first degree on a first offense and a
felony of the fifth degree on each subsequent offense.
If a violation of division (A)(4) of
this section results in economic harm of one thousand
dollars or more but less than seven
thousand five hundred dollars, telecommunications
harassment is a felony of the fifth
degree. If a violation of division (A)(4) of this
section results in economic harm of seven
thousand five hundred dollars or more but less than one
hundred fifty thousand dollars,
telecommunications harassment is a felony of the fourth
degree. If a violation of division
(A)(4) of this section results in economic harm of one
hundred fifty thousand dollars or
more, telecommunications harassment is a felony of the
third degree. (D)
No cause of action may be asserted in any court of this
state against any provider of a
telecommunications service or information service, or
against any officer, employee, or agent of
a telecommunication service or information service, for
any injury, death, or loss to person or
property that allegedly arises out of the provider's,
officer's, employee's, or agent's provision of
information, facilities, or assistance in accordance
with the terms of a court order that is issued in
relation to the investigation or prosecution of an
alleged violation of this section. A provider of a
telecommunications service or information service, or an
officer, employee, or agent of a
telecommunications service or information service, is
immune from any civil or criminal liability
for injury, death, or loss to person or property that
allegedly arises out of the provider's, officer's,
employee's, or agent's provision of information,
facilities, or assistance in accordance with the
terms of a court order that is issued in relation to the
investigation or prosecution of an alleged
violation of this section. (E)
As used in this section: (1)
"Economic harm" means all direct, incidental, and
consequential pecuniary
harm suffered by a victim as a result of criminal
conduct. "Economic harm" includes, but
is not limited to, all of the following: (a)
All wages, salaries, or other compensation lost as a
result of the
criminal conduct; (b)
The cost of all wages, salaries, or other compensation
paid to
employees for time those employees are prevented from
working as a result of the
criminal conduct; (c)
The overhead costs incurred for the time that a business
is shut down
as a result of the criminal conduct; (d)
The loss of value to tangible or intangible property
that was damaged
as a result of the criminal conduct. (2)
"Caller" means the person described in division (A) of
this section who makes
or causes to be made a telecommunication or who permits
a telecommunication to be
made from a telecommunications device under that
person's control. (3)
"Telecommunication" and "telecommunications device" have
the same
meanings as in section 2913.01 of the Revised Code. (4)
"Sexual activity" has the same meaning as in section
2907.01 of the Revised
Code. (F)
Nothing in this section prohibits a person from making a
telecommunication to a
debtor that is in compliance with the "Fair Debt
Collection Practices Act," 91 Stat. 874 (1977),
15 U.S.C. 1692, as amended, or the "Telephone Consumer
Protection Act," 105 Stat. 2395
(1991), 47 U.S.C. 227, as amended. ORC
Ann. 2913.01 Definitions As
used in this chapter, unless the context requires that a
term be given a different meaning: * *
* (Y)
"Telecommunications device" means any instrument,
equipment, machine, or other
device that facilitates telecommunication, including,
but not limited to, a computer, computer
network, computer chip, computer circuit, scanner,
telephone, cellular telephone, pager, personal
communications device, transponder, receiver, radio,
modem, or device that enables the use of a
modem.
Oklahoma
Okla. Stat. tit. 21, § 1172 Obscene, Threatening or
Harassing Telecommunication or Other
Electronic Communications – Penalty A.
It shall be unlawful for a person who, by means of a
telecommunication or other
electronic communication device, willfully either: 1.
Makes any comment, request, suggestion, or proposal
which is obscene, lewd,
lascivious, filthy, or indecent; 2.
Makes a telecommunication or other electronic
communication with intent to
terrify, intimidate or harass, or threaten to inflict
injury or physical harm to any person or
property of that person; 3.
Makes a telecommunication or other electronic
communication, whether or not
conversation ensues, with intent to put the party called
in fear of physical harm or death; 4.
Makes a telecommunication or other electronic
communication, whether or not
conversation ensues, without disclosing the identity of
the person making the call or
communication and with intent to annoy, abuse, threaten,
or harass any person at the
called number; 5.
Knowingly permits any telecommunication or other
electronic communication
under the control of the person to be used for any
purpose prohibited by this section; and 6.
In conspiracy or concerted action with other persons,
makes repeated calls or
electronic communications or simultaneous calls or
electronic communications solely to
harass any person at the called number(s). B.
As used in this section, "telecommunication" and
"electronic communication" mean
any type of telephonic, electronic or radio
communications, or transmission of signs, signals,
data, writings, images and sounds or intelligence of any
nature by telephone, including cellular
telephones, wire, cable, radio, electromagnetic,
photoelectronic or photo-optical system or the
creation, display, management, storage, processing,
transmission or distribution of images, text,
voice, video or data by wire, cable or wireless means,
including the Internet. The term includes: 1. A
communication initiated by electronic mail, instant
message, network call, or
facsimile machine; and 2. A
communication made to a pager. C.
Use of a telephone or other electronic communications
facility under this section shall
include all use made of such a facility between the
points of origin and reception. Any offense
under this section is a continuing offense and shall be
deemed to have been committed at either
the place of origin or the place of reception. D.
Except as provided in subsection E of this section, any
person who is convicted of the
provisions of subsection A of this section, shall be
guilty of a misdemeanor. E.
Any person who is convicted of a second offense under
this section shall be guilty of a
felony.
Oregon
Or.
Rev. Stat. § 166.065 Harassment (1)
A person commits the crime of harassment if the person
intentionally: (a)
Harasses or annoys another person by: (A)
Subjecting such other person to offensive physical
contact; or (B)
Publicly insulting such other person by abusive words or
gestures in a
manner intended and likely to provoke a violent
response; (b)
Subjects another to alarm by conveying a false report,
known by the conveyor
to be false, concerning death or serious physical injury
to a person, which report
reasonably would be expected to cause alarm; or (c)
Subjects another to alarm by conveying a telephonic,
electronic or written
threat to inflict serious physical injury on that person
or to commit a felony involving the
person or property of that person or any member of that
person's family, which threat
reasonably would be expected to cause alarm. (2) (a)
A person is criminally liable for harassment if the
person knowingly permits
any telephone or electronic device under the person's
control to be used in violation of
subsection (1) of this section. (b)
Harassment that is committed under the circumstances
described in subsection
(1)(c) of this section is committed in either the county
in which the communication
originated or the county in which the communication was
received. (3)
Harassment is a Class B misdemeanor. (4)
Notwithstanding subsection (3) of this section,
harassment is a Class A misdemeanor
if a person violates: (a)
Subsection (1)(a)(A) of this section by subjecting
another person to offensive
physical contact and the offensive physical contact
consists of touching the sexual or
other intimate parts of the other person; or (b)
Subsection (1)(c) of this section and: (A)
The person has a previous conviction under subsection
(1)(c) of this
section and the victim of the current offense was the
victim or a member of the
family of the victim of the previous offense; (B)
At the time the offense was committed, the victim was
protected by a
stalking protective order, a restraining order as
defined in ORS 24.190 or any
other court order prohibiting the person from contacting
the victim; (C)
At the time the offense was committed, the person
reasonably believed
the victim to be under 18 years of age and more than
three years younger than the
person; or (D) (i)
The person conveyed a threat to kill the other person or
any
member of the family of the other person; (ii)
The person expressed the intent to carry out the threat;
and
(iii) A reasonable person would believe that the threat
was likely to
be followed by action. (5)
As used in this section, "electronic threat" means a
threat conveyed by electronic
mail, the Internet, a telephone text message or any
other transmission of information by wire,
radio, optical cable, cellular system, electromagnetic
system or other similar means.
Pennsylvania
18
Pa. Cons. Stat. § 2709 Harassment (a)
Offense defined. -- A person commits the crime of
harassment when, with intent to
harass, annoy or alarm another, the person: * *
* (3)
engages in a course of conduct or repeatedly commits
acts which serve no
legitimate purpose; (4)
communicates to or about such other person any lewd,
lascivious, threatening
or obscene words, language, drawings or caricatures; (5)
communicates repeatedly in an anonymous manner; (6)
communicates repeatedly at extremely inconvenient hours;
or (7)
communicates repeatedly in a manner other than specified
in paragraphs (4),
(5) and (6). (b)
Stalking. -- (Deleted by amendment).
(b.1) Venue. (1)
An offense committed under this section may be deemed to
have been
committed at either the place at which the communication
or communications were made
or at the place where the communication or
communications were received. (2)
Acts indicating a course of conduct which occur in more
than one jurisdiction
may be used by any other jurisdiction in which an act
occurred as evidence of a
continuing pattern of conduct or a course of conduct. (c)
Grading. (1)
Except as provided under paragraph (3), an offense under
subsection (a)(1),
(2) or (3) shall constitute a summary offense. (2)
An offense under subsection (a)(4), (5), (6) or (7)
shall constitute a
misdemeanor of the third degree. (3)
The grading of an offense under subsection (a)(1), (2)
or (3) shall be enhanced
one degree if the person has previously violated an
order issued under 23 Pa.C.S. § 6108
(relating to relief) involving the same victim, family
or household member. (d)
False reports. -- A person who knowingly gives false
information to any law
enforcement officer with the intent to implicate another
under this section commits an
offense under section 4906 (relating to false reports to
law enforcement authorities). (e)
Application of section. -- This section shall not apply
to conduct by a party to a labor
dispute as defined in the act of June 2, 1937 (P.L.1198,
No.308), known as the Labor Anti-
Injunction Act, or to any constitutionally protected
activity.
(e.1) Course of conduct. -- (Deleted by amendment). (f)
Definitions. -- As used in this section, the following
words and phrases shall have the
meanings given to them in this subsection:
"Communicates." --Conveys a message without intent of
legitimate
communication or address by oral, nonverbal, written or
electronic means,
including telephone, electronic mail, Internet,
facsimile, telex, wireless
communication or similar transmission.
"Course of conduct." --A pattern of actions composed of
more than one
act over a period of time, however short, evidencing a
continuity of conduct. Acts
indicating a course of conduct which occur in more than
one jurisdiction may be
used by any other jurisdiction in which an act occurred
as evidence of a
continuing pattern of conduct or a course of conduct.
"Emotional distress." --(Deleted by amendment).
"Family or household member." --Spouses or persons who
have been
spouses, persons living as spouses or who lived as
spouses, parents and children,
other persons related by consanguinity or affinity,
current or former sexual or
intimate partners or persons who share biological
parenthood.
Rhode Island
R.I.
Gen. Laws § 11-52-4.2 Cyberstalking and Cyberharassment
Prohibited (a)
Whoever transmits any communication by computer or other
electronic device to any
person or causes any person to be contacted for the sole
purpose of harassing that person or his
or her family is guilty of a misdemeanor, and shall be
punished by a fine of not more than five
hundred dollars ($ 500), by imprisonment for not more
than one year, or both. For the purpose of
this section, "harassing" means any knowing and willful
course of conduct directed at a specific
person which seriously alarms, annoys, or bothers the
person, and which serves no legitimate
purpose. The course of conduct must be of a kind that
would cause a reasonable person to suffer
substantial emotional distress, or be in fear of bodily
injury. "Course of conduct" means a pattern
of conduct composed of a series of acts over a period of
time, evidencing a continuity of
purpose. Constitutionally protected activity is not
included within the meaning of "course of
conduct." (b)
A second or subsequent conviction under subsection (a)
of this section shall be
deemed a felony punishable by imprisonment for not more
than two (2) years, by a fine of not
more than six thousand dollars ($ 6,000), or both.
South Carolina
S.C.
Code Ann. § 16-3-1700 Definitions * *
* (B)
"Harassment in the second degree" means a pattern of
intentional, substantial, and
unreasonable intrusion into the private life of a
targeted person that serves no legitimate purpose
and causes the person and would cause a reasonable
person in his position to suffer mental or
emotional distress. Harassment in the second degree may
include, but is not limited to, verbal,
written, or electronic contact that is initiated,
maintained, or repeated. * *
* (D)
"Pattern" means two or more acts occurring over a period
of time, however short,
evidencing a continuity of purpose. * *
* (F)
"Electronic contact" means any transfer of signs,
signals, writings, images, sounds,
data, intelligence, or information of any nature
transmitted in whole or in part by any device,
system, or mechanism including, but not limited to, a
wire, radio, computer, electromagnetic,
photoelectric, or photo-optical system. (G)
This section does not apply to words or conduct
protected by the Constitution of this
State or the United States, a law enforcement officer or
a process server performing official
duties, or a licensed private investigator performing
services or an investigation as described in
detail in a contract signed by the client and the
private investigator pursuant to Section 40-18-70.
S.C. Code Ann. § 16-17-430 Unlawful Communication (A)
It is unlawful for a person to: (1)
use in a telephonic communication or any other
electronic means, any words
or language of a profane, vulgar, lewd, lascivious, or
an indecent nature, or to
communicate or convey by telephonic or other electronic
means an obscene, vulgar,
indecent, profane, suggestive, or immoral message to
another person; (2)
threaten in a telephonic communication or any other
electronic means an
unlawful act with the intent to coerce, intimidate, or
harass another person; (3)
telephone or electronically contact another repeatedly,
whether or not
conversation ensues, for the purpose of annoying or
harassing another person or his
family; * *
* (5)
telephone or contact by electronic means another and
make false statements
concerning either the death or injury of a member of the
family of the person who is
telephoned or electronically contacted, with the intent
to annoy, frighten, or terrify that
person; or * *
* (B)
A person who violates any provision of subsection (A) is
guilty of a misdemeanor
and, upon conviction, must be fined not less than one
hundred dollars nor more than five hundred
dollars or imprisoned not more than thirty days.
South Dakota
S.D.
Codified Laws § 49-31-31 Threatening or Harassing
Telephone Calls as Misdemenaor
It is a Class 1 misdemeanor for a person to use a
telephone or other electronic
communication device for any of the following purposes: (1)
To contact another person with intent to terrorize,
intimidate, threaten, harass,
or annoy such person by using obscene or lewd language
or by suggesting a lewd or
lascivious act; (2)
To contact another person with intent to threaten to
inflict physical harm or
injury to any person or property; (3)
To contact another person with intent to extort money or
other things of value; (4)
To contact another person with intent to disturb that
person by repeated
anonymous telephone calls or intentionally failing to
replace the receiver or disengage the
telephone connection. It
is a Class 1 misdemeanor for a person to knowingly
permit a telephone or other
electronic communication device under his or her control
to be used for a purpose prohibited by
this section. S.D.
Codified Laws § 49-31-31.1 Electronic Communication
Device Defined For
the purposes of §§ 49-31-31 and 49-31-33, an electronic
communication device is
any electronic device capable of transmitting signs,
signals, writing, images, sounds, messages,
data, or other information by wire, radio, light waves,
electromagnetic means, or other similar
means, including telephones, cellular phones, and
computers.
Tennessee
Tenn. Code Ann. § 39-17-308 Harassment (a)
A person commits an offense who intentionally: (1)
Threatens, by telephone, in writing or by electronic
communication, including,
but not limited to, text messaging, facsimile
transmissions, electronic mail or Internet
services, to take action known to be unlawful against
any person and by this action
knowingly annoys or alarms the recipient; (2)
Places one (1) or more telephone calls anonymously, or
at an hour or hours
known to be inconvenient to the victim, or in an
offensively repetitious manner, or
without a legitimate purpose of communication, and by
this action knowingly annoys or
alarms the recipient; (3)
Communicates by telephone to another that a relative or
other person has been
injured, killed or is ill when the communication is
known to be false; or (4)
Communicates with another person or transmits or
displays an image without
legitimate purpose with the intent that the image is
viewed by the victim by any method
described in subdivision (a)(1) and the person: (A)
Maliciously intends the communication to be a threat of
harm to the
victim; and (B)
A reasonable person would perceive the communication to
be a threat
of harm. * *
* (c)
Except as provided in subsection (d), a violation of
subsection (a) is a Class A
misdemeanor. A violation of subsection (b) is a Class E
felony. (d) (1)
A violation by a minor of subdivision (a)(4) is a
delinquent act and shall be
punishable only by up to thirty (30) hours of community
service, without compensation,
for charitable or governmental agencies as determined by
the court. (2)
The offense described in subdivision (a)(4) shall not
apply to an entity
providing an electronic communications service to the
public acting in the normal course
of providing that service. (3) (A)
The service providers described in subdivision (d)(2)
shall not be
required to maintain any record not otherwise kept in
the ordinary course of that
service provider's business; provided, however, that if
any electronic
communications service provider operates a web site that
offers a social network
service and the electronic communications service
provider provides services to
consumers in this state, any log files and images or
communications that have
been sent, posted or displayed on the social network
service's web site and
maintained by the electronic communications service
provider shall be disclosed
to any governmental entity responsible for enforcing
subdivision (a)(4) only if the
governmental entity: (i)
Obtains a warrant issued using this state's warrant
procedures
by a court of competent jurisdiction; (ii)
Obtains a court order for the disclosure under
subdivision
(d)(3)(C); or
(iii) Has the consent of the person who sent, posted or
displayed
any log files and images or communications on the social
network
service's web site maintained by the electronic
communications service
provider. (B)
No cause of action shall lie in any court against any
provider of an
electronic communications service, its officers,
employees, agents, or other
specified persons for providing information, facilities,
or assistance in accordance
with the terms of a court order or warrant. (C)
A court order for disclosure under subdivision (d)(3)(A)(ii)
may be
issued by any court that is a court of competent
jurisdiction and shall issue only if
the governmental entity offers specific and articulable
facts showing that there are
reasonable grounds to believe that the contents of an
electronic communication, or
the records or other information sought, are relevant
and material to an ongoing
criminal investigation. A court order shall not issue if
prohibited by the law of this
state. A court issuing an order pursuant to this
section, on a motion made
promptly by the service provider, may quash or modify
the order, if the
information or records requested are unusually
voluminous in nature or
compliance with the order otherwise would cause an undue
burden on the
provider. (e)
As used in this section: (1)
"Electronic communications service" means any transfer
of signs, signals,
writing, images, sounds, data, or intelligence of any
nature transmitted in whole or in part
by a wire, radio, electromagnetic, photoelectronic or
photooptical system; (2)
"Image" includes, but is not limited to, a visual
depiction, video clip or
photograph of another person; (3)
"Log files" mean computer-generated lists that contain
various types of
information regarding the activities of a computer,
including, but not limited to, time of
access to certain records, processes running on a
computer or the usage of certain
computer resources; and (4)
"Social network" means any online community of people
who share interests
and activities, or who are interested in exploring the
interests and activities of others, and
which provides ways for users to interact.
Texas
Tex.
Penal Code Ann. § 33.07 Online Impersonation (a)
A person commits an offense if the person, without
obtaining the other person's
consent and with the intent to harm, defraud,
intimidate, or threaten any person, uses the name or
persona of another person to: (1)
create a web page on a commercial social networking site
or other Internet
website; or (2)
post or send one or more messages on or through a
commercial social
networking site or other Internet website, other than on
or through an electronic mail
program or message board program. (b)
A person commits an offense if the person sends an
electronic mail, instant message,
text message, or similar communication that references a
name, domain address, phone number,
or other item of identifying information belonging to
any person: (1)
without obtaining the other person's consent; (2)
with the intent to cause a recipient of the
communication to reasonably believe
that the other person authorized or transmitted the
communication; and (3)
with the intent to harm or defraud any person. (c)
An offense under Subsection (a) is a felony of the third
degree. An offense under
Subsection (b) is a Class A misdemeanor, except that the
offense is a felony of the third degree if
the actor commits the offense with the intent to solicit
a response by emergency personnel. (d)
If conduct that constitutes an offense under this
section also constitutes an offense
under any other law, the actor may be prosecuted under
this section, the other law, or both. (e)
It is a defense to prosecution under this section that
the actor is any of the following
entities or that the actor's conduct consisted solely of
action taken as an employee of any of the
following entities: (1)
a commercial social networking site; (2)
an Internet service provider; (3)
an interactive computer service, as defined by 47 U.S.C.
Section 230; (4)
a telecommunications provider, as defined by Section
51.002, Utilities Code;
or (5)
a video service provider or cable service provider, as
defined by Section
66.002, Utilities Code. (f)
In this section: (1)
"Commercial social networking site" means any business,
organization, or
other similar entity operating a website that permits
persons to become registered users
for the purpose of establishing personal relationships
with other users through direct or
real-time communication with other users or the creation
of web pages or profiles
available to the public or to other users. The term does
not include an electronic mail
program or a message board program. (2)
"Identifying information" has the meaning assigned by
Section 32.51. Tex.
Penal Code Ann. § 42.07 Harassment (a)
A person commits an offense if, with intent to harass,
annoy, alarm, abuse, torment, or
embarrass another, the person: (1)
initiates communication and in the course of the
communication makes a
comment, request, suggestion, or proposal that is
obscene; (2)
threatens, in a manner reasonably likely to alarm the
person receiving the
threat, to inflict bodily injury on the person or to
commit a felony against the person, a
member of the person's family or household, or the
person's property; (3)
conveys, in a manner reasonably likely to alarm the
person receiving the
report, a false report, which is known by the conveyor
to be false, that another person has
suffered death or serious bodily injury; * *
* (7)
sends repeated electronic communications in a manner
reasonably likely to
harass, annoy, alarm, abuse, torment, embarrass, or
offend another. (b)
In this section: (1)
"Electronic communication" means a transfer of signs,
signals, writing,
images, sounds, data, or intelligence of any nature
transmitted in whole or in part by a
wire, radio, electromagnetic, photoelectronic, or
photo-optical system. The term includes: (A)
a communication initiated by electronic mail, instant
message,
network call, or facsimile machine; and (B)
a communication made to a pager. (2)
"Family" and "household" have the meaning assigned by
Chapter 71, Family
Code. (3)
"Obscene" means containing a patently offensive
description of or a
solicitation to commit an ultimate sex act, including
sexual intercourse, masturbation,
cunnilingus, fellatio, or anilingus, or a description of
an excretory function. (c)
An offense under this section is a Class B misdemeanor,
except that the offense is a
Class A misdemeanor if the actor has previously been
convicted under this section.
Utah
Utah
Code Ann. § 76-9-201 Electronic Communication Harassment (1)
As used in this section: (a)
"Adult" means a person 18 years of age or older. (b)
"Electronic communication" means any communication by
electronic, electromechanical,
or electro-optical communication device for the
transmission and reception
of audio, image, or text but does not include broadcast
transmissions or similar
communications that are not targeted at any specific
individual. (c)
"Electronic communication device" includes telephone,
facsimile, electronic
mail, or pager. (d)
"Minor" means a person who is younger than 18 years of
age. (2)
A person is guilty of electronic communication
harassment and subject to prosecution
in the jurisdiction where the communication originated
or was received if with intent to annoy,
alarm, intimidate, offend, abuse, threaten, harass,
frighten, or disrupt the electronic
communications of another, the person: (a) (i)
makes repeated contact by means of electronic
communications,
whether or not a conversation ensues; or (ii)
after the recipient has requested or informed the person
not to contact
the recipient, and the person repeatedly or
continuously: (A)
contacts the electronic communication device of the
recipient;
or (B)
causes an electronic communication device of the
recipient to
ring or to receive other notification of attempted
contact by means of
electronic communication; (b)
makes contact by means of electronic communication and
insults, taunts, or
challenges the recipient of the communication or any
person at the receiving location in a
manner likely to provoke a violent or disorderly
response; (c)
makes contact by means of electronic communication and
threatens to inflict
injury, physical harm, or damage to any person or the
property of any person; or (d)
causes disruption, jamming, or overload of an electronic
communication
system through excessive message traffic or other means
utilizing an electronic
communication device. (3) (a) (i)
Electronic communication harassment committed against an
adult is a
class B misdemeanor, except under Subsection (3)(a)(ii). (ii)
A second or subsequent offense under Subsection (3)(a)(i)
is a: (A)
class A misdemeanor if all prior violations of this
section were
committed against adults; and (B)
a third degree felony if any prior violation of this
section was
committed against a minor. (b) (i)
Electronic communication harassment committed against a
minor is a
class A misdemeanor, except under Subsection (3)(b)(ii). (ii)
A second or subsequent offense under Subsection (3)(b)(i)
is a third
degree felony, regardless of whether any prior violation
of this section was
committed against a minor or an adult. (4) (a)
Except under Subsection (4)(b), criminal prosecution
under this section does
not affect an individual's right to bring a civil action
for damages suffered as a result of
the commission of any of the offenses under this
section. (b)
This section does not create any civil cause of action
based on electronic
communications made for legitimate business purposes.
Vermont
Vt.
Stat. Ann. tit. 13, § 1027 Distrubing Peace by Use of
Telephone or Other Electronic
Communications (a)
A person who, with intent to terrify, intimidate,
threaten, harass or annoy, makes
contact by means of a telephonic or other electronic
communication with another and (i) makes
any request, suggestion or proposal which is obscene,
lewd, lascivious or indecent; (ii) threatens
to inflict injury or physical harm to the person or
property of any person; or (iii) disturbs, or
attempts to disturb, by repeated anonymous telephone
calls or other electronic communications,
whether or not conversation ensues, the peace, quiet or
right of privacy of any person at the place
where the communication or communications are received
shall be fined not more than $ 250.00
or be imprisoned not more than three months or both. If
the defendant has previously been
convicted of a violation of this section or of an
offense under the laws of another state or of the
United States which would have been an offense under
this act if committed in this state, the
defendant shall be fined not more than $ 500.00 or
imprisoned for not more than six months, or
both. (b)
An intent to terrify, threaten, harass or annoy may be
inferred by the trier of fact from
the use of obscene, lewd, lascivious or indecent
language or the making of a threat or statement
or repeated anonymous telephone calls or other
electronic communications as set forth in this
section and any trial court may in its discretion
include a statement to this effect in its jury
charge. (c)
An offense committed by use of a telephone or other
electronic communication device
as set forth in this section shall be considered to have
been committed at either the place where
the telephone call or calls originated or at the place
where the communication or communications
or calls were received.
Virginia
Va.
Code Ann. § 18.2-152.7:1 Harassment by Computer; Penalty If
any person, with the intent to coerce, intimidate, or
harass any person, shall use a
computer or computer network to communicate obscene,
vulgar, profane, lewd, lascivious, or
indecent language, or make any suggestion or proposal of
an obscene nature, or threaten any
illegal or immoral act, he shall be guilty of a Class 1
misdemeanor.
Washington
Wash. Rev. Code § 9A.46.020 Definition – Penalties (1)
A person is guilty of harassment if: (a)
Without lawful authority, the person knowingly
threatens: (i)
To cause bodily injury immediately or in the future to
the person
threatened or to any other person; or (ii)
To cause physical damage to the property of a person
other than the
actor; or
(iii) To subject the person threatened or any other
person to physical
confinement or restraint; or (iv)
Maliciously to do any other act which is intended to
substantially
harm the person threatened or another with respect to
his or her physical or mental
health or safety; and (b)
The person by words or conduct places the person
threatened in reasonable
fear that the threat will be carried out. "Words or
conduct" includes, in addition to any
other form of communication or conduct, the sending of
an electronic communication. (2) (a)
Except as provided in (b) of this subsection, a person
who harasses another is
guilty of a gross misdemeanor. (b)
A person who harasses another is guilty of a class C
felony if any of the
following apply: (i) The person has previously been
convicted in this or any other state of
any crime of harassment, as defined in RCW 9A.46.060, of
the same victim or members
of the victim's family or household or any person
specifically named in a no-contact or
no-harassment order; (ii) the person harasses another
person under subsection (1)(a)(i) of
this section by threatening to kill the person
threatened or any other person; (iii) the
person harasses a criminal justice participant who is
performing his or her official duties
at the time the threat is made; or (iv) the person
harasses a criminal justice participant
because of an action taken or decision made by the
criminal justice participant during the
performance of his or her official duties. For the
purposes of (b)(iii) and (iv) of this
subsection, the fear from the threat must be a fear that
a reasonable criminal justice
participant would have under all the circumstances.
Threatening words do not constitute
harassment if it is apparent to the criminal justice
participant that the person does not
have the present and future ability to carry out the
threat. (3)
Any criminal justice participant who is a target for
threats or harassment prohibited
under subsection (2)(b)(iii) or (iv) of this section,
and any family members residing with him or
her, shall be eligible for the address confidentiality
program created under RCW 40.24.030. (4)
For purposes of this section, a criminal justice
participant includes any (a) federal,
state, or local law enforcement agency employee; (b)
federal, state, or local prosecuting attorney
or deputy prosecuting attorney; (c) staff member of any
adult corrections institution or local adult
detention facility; (d) staff member of any juvenile
corrections institution or local juvenile
detention facility; (e) community corrections officer,
probation, or parole officer; (f) member of
the indeterminate sentence review board; (g) advocate
from a crime victim/witness program; or
(h) defense attorney. (5)
The penalties provided in this section for harassment do
not preclude the victim from
seeking any other remedy otherwise available under law.
Wash. Rev. Code § 10.14.020 Definitions
Unless the context clearly requires otherwise, the
definitions in this section apply
throughout this chapter. (1)
"Course of conduct" means a pattern of conduct composed
of a series of acts
over a period of time, however short, evidencing a
continuity of purpose. "Course of
conduct" includes, in addition to any other form of
communication, contact, or conduct,
the sending of an electronic communication, but does not
include constitutionally
protected free speech. Constitutionally protected
activity is not included within the
meaning of "course of conduct." (2)
"Unlawful harassment" means a knowing and willful course
of conduct
directed at a specific person which seriously alarms,
annoys, harasses, or is detrimental to
such person, and which serves no legitimate or lawful
purpose. The course of conduct
shall be such as would cause a reasonable person to
suffer substantial emotional distress,
and shall actually cause substantial emotional distress
to the petitioner, or, when the
course of conduct would cause a reasonable parent to
fear for the well-being of their
child.
West
Virginia
W.
Va. Code § 61-3C-14a Obscene, Anonymous, Harassing and
Threatening Communications
by Computer, Cell Phones and Electronic Communication
Devices; Penalty (a)
It is unlawful for any person, with the intent to harass
or abuse another person, to use
a computer, mobile phone, personal digital assistant or
other electronic communication device to: (1)
Make contact with another without disclosing his or her
identity with the
intent to harass or abuse; (2)
Make contact with a person after being requested by the
person to desist from
contacting them; (3)
Threaten to commit a crime against any person or
property; or (4)
Cause obscene material to be delivered or transmitted to
a specific person after
being requested to desist from sending such material. (b)
For purposes of this section: (1)
“Electronic communication device” means and includes a
telephone, wireless
phone, computer, pager or any other electronic or
wireless device which is capable of
transmitting a document, image, voice, e-mail or text
message using such device in an
electronic, digital or analog form from one person or
location so it may be viewed or
received by another person or persons at other
locations. (2)
“Use of a computer, mobile phone, personal digital
assistant or other
electronic communication device” includes, but is not
limited to, the transmission of text
messages, electronic mail, photographs, videos, images
or other nonvoice data by means
of an electronic communication system, and includes the
transmission of such data,
documents, messages and images to another's computer,
e-mail account, mobile phone,
personal digital assistant or other electronic
communication device. (3)
“Obscene material” means material that: (A)
An average person, applying contemporary adult community
standards, would find, taken as a whole, appeals to the
prurient interest, is
intended to appeal to the prurient interest, or is
pandered to a prurient interest; (B)
An average person, applying contemporary adult community
standards, would find, depicts or describes, in a
patently offensive way, sexually
explicit conduct consisting of an ultimate sexual act,
normal or perverted, actual
or simulated, an excretory function, masturbation, lewd
exhibition of the genitals,
or sadomasochistic sexual abuse; and (C)
A reasonable person would find, taken as a whole, lacks
literary,
artistic, political or scientific value. (c)
It is unlawful for any person to knowingly permit a
computer, mobile phone or
personal digital assistant or other electronic
communication device under his or her control to be
used for any purpose prohibited by this section. (d)
Any offense committed under this section may be
determined to have occurred at the
place at which the contact originated or the place at
which the contact was received or intended
to be received. (e)
Any person who violates a provision of this section is
guilty of a misdemeanor and,
upon conviction thereof, shall be fined not more than
$500 or confined in jail not more than six
months, or both fined and confined. For a second or
subsequent offense, the person is guilty of a
misdemeanor and, upon conviction thereof, shall be fined
not more than $1,000 or confined in
jail for not more than one year, or both fined and
confined.
Wisconsin
Wis.
Stat. § 947.0125 Unlawful Use of Computerized
Communication Systems (1)
In this section, "message" means any transfer of signs,
signals, writing, images,
sounds, data or intelligence of any nature, or any
transfer of a computer program, as defined in s.
943.70 (1) (c). (2)
Whoever does any of the following is guilty of a Class B
misdemeanor: (a)
With intent to frighten, intimidate, threaten, abuse or
harass another person,
sends a message to the person on an electronic mail or
other computerized
communication system and in that message threatens to
inflict injury or physical harm to
any person or the property of any person. (b)
With intent to frighten, intimidate, threaten, abuse or
harass another person,
sends a message on an electronic mail or other
computerized communication system with
the reasonable expectation that the person will receive
the message and in that message
threatens to inflict injury or physical harm to any
person or the property of any person. (c)
With intent to frighten, intimidate, threaten or abuse
another person, sends a
message to the person on an electronic mail or other
computerized communication
system and in that message uses any obscene, lewd or
profane language or suggests any
lewd or lascivious act. (d)
With intent to frighten, intimidate, threaten or abuse
another person, sends a
message on an electronic mail or other computerized
communication system with the
reasonable expectation that the person will receive the
message and in that message uses
any obscene, lewd or profane language or suggests any
lewd or lascivious act. (e)
With intent to frighten, intimidate, threaten or abuse
another person, sends a
message to the person on an electronic mail or other
computerized communication
system while intentionally preventing or attempting to
prevent the disclosure of his or her
own identity. (f)
While intentionally preventing or attempting to prevent
the disclosure of his or
her identity and with intent to frighten, intimidate,
threaten or abuse another person,
sends a message on an electronic mail or other
computerized communication system with
the reasonable expectation that the person will receive
the message. (3)
Whoever does any of the following is subject to a Class
B forfeiture: (a)
With intent to harass, annoy or offend another person,
sends a message to the
person on an electronic mail or other computerized
communication system and in that
message uses any obscene, lewd or profane language or
suggests any lewd or lascivious
act. (b)
With intent to harass, annoy or offend another person,
sends a message on an
electronic mail or other computerized communication
system with the reasonable
expectation that the person will receive the message and
in that message uses any
obscene, lewd or profane language or suggests any lewd
or lascivious act. (c)
With intent solely to harass another person, sends
repeated messages to the
person on an electronic mail or other computerized
communication system. (d)
With intent solely to harass another person, sends
repeated messages on an
electronic mail or other computerized communication
system with the reasonable
expectation that the person will receive the messages. (e)
With intent to harass or annoy another person, sends a
message to the person
on an electronic mail or other computerized
communication system while intentionally
preventing or attempting to prevent the disclosure of
his or her own identity. (f)
While intentionally preventing or attempting to prevent
the disclosure of his or
her identity and with intent to harass or annoy another
person, sends a message on an
electronic mail or other computerized communication
system with the reasonable
expectation that the person will receive the message. (g)
Knowingly permits or directs another person to send a
message prohibited by
this section from any computer terminal or other device
that is used to send messages on
an electronic mail or other computerized communication
system and that is under his or
her control.
Wyoming
Wyo.
Stat. Ann. § 6-2-506 Stalking; Penalty (a)
As used in this section: (i)
“Course of conduct” means a pattern of conduct composed
of a series of acts
over any period of time evidencing a continuity of
purpose; (ii)
“Harass” means to engage in a course of conduct,
including but not limited to
verbal threats, written threats, lewd or obscene
statements or images, vandalism or
nonconsensual physical contact, directed at a specific
person or the family of a specific
person, which the defendant knew or should have known
would cause a reasonable
person to suffer substantial emotional distress, and
which does in fact seriously alarm the
person toward whom it is directed. (b)
Unless otherwise provided by law, a person commits the
crime of stalking if, with
intent to harass another person, the person engages in a
course of conduct reasonably likely to
harass that person, including but not limited to any
combination of the following: (i)
Communicating, anonymously or otherwise, or causing a
communication with
another person by verbal, electronic, mechanical,
telegraphic, telephonic or written means
in a manner that harasses; * *
* (iv)
Otherwise engaging in a course of conduct that harasses
another person. (c)
This section does not apply to an otherwise lawful
demonstration, assembly or
picketing. (d)
Except as provided under subsection (e) of this section,
stalking is a misdemeanor
punishable by imprisonment for not more than six (6)
months, a fine of not more than seven
hundred fifty dollars ($750.00), or both. (e)
A person convicted of stalking under subsection (b) of
this section is guilty of felony
stalking punishable by imprisonment for not more than
ten (10) years, if: (i)
The act or acts leading to the conviction occurred
within five (5) years of a
prior conviction under this subsection, or under
subsection (b) of this section, or under a
substantially similar law of another jurisdiction; (ii)
The defendant caused serious bodily harm to the victim
or another person in
conjunction with committing the offense of stalking;
(iii) The defendant committed the offense of stalking in
violation of any condition
of probation, parole or bail; or (iv)
The defendant committed the offense of stalking in
violation of a temporary
or permanent order of protection issued pursuant to W.S.
7-3-508 or 7-3-509, or pursuant
to a substantially similar law of another jurisdiction.
Works Cited
Banks, James. “Regulating Hate Speech Online.” International
Review of Law, Computers &
Technology 24, no. 3 (2010): 233–39.
doi:10.1080/13600869.2010.522323.
Bartow, Ann. “Internet Defamation as Profit Center: The
Monetization of Online Harassment.”
Harvard Journal of Law and Gender 32, no. 2 (August 11,
2009).
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1447472. ———.
“Portrait of the Internet as a Young Man.” Michigan Law
Review 108, no. 6 (2008):
1079–1106.
Baumrin, Julian. “Internet Hate Speech and the First
Amendment, Revisited.” Rutgers Computer
& Tech. LJ 37 (2011): 223.
Bennett-Smith, Meredith. “Facebook Vows To Crack Down On
Rape Joke Pages After
Successful Protest, Boycott.” Huffington Post. Accessed
August 21, 2013.
http://www.huffingtonpost.com/2013/05/29/facebook-rape-jokesprotest_
n_3349319.html.
Brenner, Susan. “CYB3RCRIM3: Fantasy.” CYB3RCRIM3, March 15,
2006.
http://cyb3rcrim3.blogspot.com/2006/03/fantasy_15.html. ———.
“The Governor, the Emails and True Threats.” CYB3RCRIM3,
August 19, 2013.
http://cyb3rcrim3.blogspot.com/2013/08/the-governor-emails-and-true-threats.html.
Burgess, Jean Elizabeth, and Joshua Benjamin Green. YouTube:
Online Video and Participatory
Culture. Digital Media and Society. Malden, MA: Polity,
2009.
Carter, Edward L. “Outlaw Speech on the Internet: Examining
the Link Between Unique
Characteristics of Online Media and Criminal Libel
Prosecutions.” Santa Clara
Computer & High Tech. LJ 21 (2004): 289.
Citron, Danielle. “Cyber Civil Rights.” Boston University
Law Review 89 (2009): 61–125. ———.
Hate Crimes in Cyberspace. Cambridge, MA: Harvard University
Press, 2014.
Ekstrand, Victoria Smith. “Unmasking Jane and John Doe:
Online Anonymity and the First
Amendment.” Communication Law and Policy 8, no. 4 (2003):
405–27.
Franks, Mary Anne. “Unwilling Avatars: Idealism and
Discrimination in Cyberspace.” Columbia
Journal of Gender and Law 20 (2011): 224. Geek
Feminism Wiki. “Timeline of Incidents.” Geek Feminism Wiki,
2013.
http://geekfeminism.wikia.com/wiki/Timeline_of_incidents.
Madden, Mary, and Aaron Smith. Reputation Management and
Social Media. Washington, DC:
Pew Internet & American Life Project, May 26, 2010.
http://pewinternet.org/Reports/2010/Reputation-Management.aspx?r=1.
Margolick, David. “Slimed Online.” Upstart Business Journal,
February 11, 2009.
http://upstart.bizjournals.com/news-markets/national-news/portfolio/2009/02/11/Two-
Lawyers-Fight-Cyber-Bullying.html?page=all.
Mazzotta, Matthew. “Balancing Act: Finding Consensus on
Standards for Unmasking
Anonymous Internet Speakers.” Boston College Law Review 51,
no. 3 (2010): 833. Moy,
Jessica. “Beyond the Schoolhouse Gates and into the Virtual
Playground: Moderating
Student Cyberbullying and Cyberharassment after Morse v.
Frederick.” Hastings Const.
LQ 37 (2009): 565.
Nakashima, Ellen. “Harsh Words Die Hard on the Web.” The
Washington Post, March 7, 2007,
sec. Education. http://www.washingtonpost.com/wpdyn/
content/article/2007/03/06/AR2007030602705.html.
National Conference of State Legislatures. “State
Cyberstalking and Cyberharassment Laws.”
NCSL.org, 2013. http://www.ncsl.org/issues-research/telecom/cyberstalking-andcyberharassment-
laws.aspx.
Nycyk, Michael. “Tensions in Enforcing YouTube Community
Guidelines: The Challenge of
Regulating Users’ Flaming Comments,” 2012.
http://www.academia.edu/download/30187109/Thesis_2012_YouTube_Flaming.pdf.
O’Leary, Amy. “Sexual Harassment in Online Gaming Stirs
Anger.” The New York Times,
August 1, 2012, sec. U.S. http://www.nytimes.com/2012/08/02/us/sexual-harassment-inonline-
gaming-stirs-anger.html. Ohm,
Paul. “How to Regulate? - Breaking Felten’s Third Law: How
Not to Fix the Internet.”
DURL Online: The Online Supplement to the Denver Law Review,
Cyber Civil Rights,
2010. http://www.denverlawreview.org/how-to-regulate/2010/2/22/breaking-feltensthird-
law-how-not-to-fix-the-internet.html.
Pagett, Matthew. “Sticks, Stones, and Cyberspace: On
Cyberbullying and the Limits of Student
Speech.” UNC School of Government-School Law Bulletin 2
(2012).
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2191141.
Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls,
Memorial Pages and Resistance to
Grief Online.” First Monday 16, no. 12 (December 5, 2011).
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3168/3115.
Reidenberg, Joel, Jamela Debelak, Jordan Kovnot, Megan
Bright, N. Cameron Russell, Daniela
Alvarado, Emily Seiderman, and Andrew Rosen. Internet
Jurisdiction: A Survey of Legal
Scholarship Published in English and United States Case Law.
Fordham Law Legal
Studies Research Paper. New York, NY, USA: Center on Law and
Information Policy at
Fordham Law School, June 30, 2013.
http://papers.ssrn.com/abstract=2309526.
Reidenberg, Joel, Jamela Debelak, Jordan Kovnot, and Tiffany
Miao. Section 230 of the
Communications Decency Act: A Survey of the Legal Literature
and Reform Proposals.
Fordham Law School, New York: Center on Law and Information
Policy, 2012.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2046230.
Resnick, P., K. Kuwabara, R. Zeckhauser, and E. Friedman.
“Reputation Systems.”
Communications of the ACM 43, no. 12 (2000): 45–48.
Rush, George. “Outed Blogger Rosemary Port Blames Model
Liskula Cohen for ‘Skank’ Stink.”
New York Daily News, August 23, 2009.
http://www.nydailynews.com/entertainment/gossip/outed-blogger-rosemary-port-blamesmodel-
liskula-cohen-skank-stink-article-1.400409.
Sacco, Dena, Katharine Silbaugh, Felipe Corredor, June
Casey, and Davis Doherty. An Overview
of State Anti-Bullying Legislation and Other Related Laws.
The Kinder & Braver World
Project: Research Series. Cambridge, MA: Berkman Center for
Internet and Society at
Harvard University, February 2012.
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/State_Anti_bullying_Legisl
ation_Overview_0.pdf.
Schenk, Mary. “Missouri Man Arrested over Online Comments.”
The News-Gazette. September
24, 2013. http://www.news-gazette.com/news/local/2013-09-24/missouri-man-arrestedover-
online-comments.html.
Schroeder, Jared C. “Electronically Transmitted Threats and
Higher Education: Oppression, Free
Speech, and Jake Baker.” The Review of Higher Education 36,
no. 3 (2013): 295–313.
doi:10.1353/rhe.2013.0017.
“Sexism Protests Target Facebook.” BBC, May 28, 2013, sec.
Technology.
http://www.bbc.co.uk/news/technology-22689522.
Shepard, Jason M., and Genelle Belmas. “Anonymity,
Disclosure and First Amendment
Balancing in the Internet Era: Developments in Libel,
Copyright, and Election Speech.”
Yale JL & Tech. 15 (2012): 92–139.
Solove, D. J. The Future of Reputation: Gossip, Rumor, and
Privacy on the Internet. Yale
University Press, 2007.
Stewart, Lori. “This Just In: Blog Troll Reveal, Part I.”
This Just In, July 23, 2013.
http://www.gnightgirl.blogspot.com/2013/07/blog-troll-reveal-part-i.html.
Taylor, Charlotte H. “Hate Speech and Government Speech.” U.
Pa. J. Const. L. 12 (2010):
1115–1479.
Tortorich, Philip. “E-Mail Stories Detailing the Rape and
Murder of a Young Woman Do Not
Constitute a True Threat.” Loy. Consumer L. Rep. 9 (1996):
227.
Tsesis, Alexander. “Hate in Cyberspace: Regulating Hate
Speech on the Internet.” San Diego L.
Rev. 38 (2001): 817.
Waldman, Emily Gold. “Badmouthing Authority: Hostile Speech
About School Officials and the
Limits of School Restrictions.” Wm. & Mary Bill Rts. J. 19
(2010): 591.
Working to Halt Online Abuse. WHOA (Haltabuse.org)
Comparison Statistics 2000-2012, 2013.
http://www.haltabuse.org/resources/stats/Cumulative2000-2012.pdf.
Ybarra, Michele L, and Kimberly J Mitchell. “Youth Engaging
in Online Harassment:
Associations with Caregiver–child Relationships, Internet
Use, and Personal
Characteristics.” Journal of Adolescence 27, no. 3 (June
2004): 319–36.
doi:10.1016/j.adolescence.2004.03.007.
Yellin, Sruli. “Resetting One of the Longest Running
Cyberbullying Cases--DC v. RR.”
Technology & Marketing Law Blog, February 27, 2013.
http://blog.ericgoldman.org/archives/2013/02/resetting_one_o.htm.
Zetter, Kim. “Court: Cyberbullying Threats Are Not Protected
Speech.” Threat Level, March 18,
2010.
http://www.wired.com/threatlevel/2010/03/cyberbullying-not-protected/.
_______________
Notes: 1
While we have chosen to obscure profanity throughout this
document, we hope to convey the harsh realities of
online harassment. In addition, the precise wording and
context of such comments may substantially affect the
treatment of these comments under the law. 2
Lori Stewart, “This Just In: Blog Troll Reveal, Part I,”
This Just In, July 23, 2013,
http://www.gnightgirl.blogspot.com/2013/07/blog-troll-reveal-part-i.html. 3
Mary Schenk, “Missouri Man Arrested over Online Comments,”
The News-Gazette, September 24, 2013,
http://www.news-gazette.com/news/local/2013-09-24/missouri-man-arrested-over-online-comments.html. 4
People v. King, No. 13CF001563 (Ill. Cir. Ct. filed Sept.
20, 2013). 5
Ellen Nakashima, “Harsh Words Die Hard on the Web,” The
Washington Post, March 7, 2007, sec. Education,
http://www.washingtonpost.com/wp-dyn/content/article/2007/03/06/AR2007030602705.html;
Amy O’Leary,
“Sexual Harassment in Online Gaming Stirs Anger,” The New
York Times, August 1, 2012, sec. U.S.,
http://www.nytimes.com/2012/08/02/us/sexual-harassment-in-online-gaming-stirs-anger.html. 6
Mary Anne Franks, “Unwilling Avatars: Idealism and
Discrimination in Cyberspace,” Columbia Journal of
Gender and Law 20 (2011): 224; Danielle Citron, Hate Crimes
in Cyberspace (Cambridge, MA: Harvard University
Press, 2014). 7
See Abraham H. Foxman and Christopher Wolf, Viral Hate:
Containing its Spread on the Internet (New York,
NY: Palgrave MacMillan, 2013) 8
Whitney Phillips, “LOLing at Tragedy: Facebook Trolls,
Memorial Pages and Resistance to Grief Online,” First
Monday 16, no. 12 (December 5, 2011),
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3168/3115;
Michele L Ybarra and Kimberly
J Mitchell, “Youth Engaging in Online Harassment:
Associations with Caregiver–child Relationships, Internet
Use,
and Personal Characteristics,” Journal of Adolescence 27,
no. 3 (June 2004): 319–336. 9
Citron, Hate Crimes in Cyberspace. 10
However, this document is non-exhaustive and covers only
United States law. 11 A
total of 37 states have cyberstalking laws, while 41 have
cyberharassment laws. There is also a federal stalking
statute which covers cyberstalking. See Appendix B, State
Laws on CyberHarassment for more details. 12
See, for example, Matter of Cohen v. Google, 25 Misc. 3d
945, 946, n. 1 (N.Y. Sup. Ct. 2009). 13
Paul Ohm, “How to Regulate? - Breaking Felten’s Third Law:
How Not to Fix the Internet,” DURL Online: The
Online Supplement to the Denver Law Review, Cyber Civil
Rights, 2010, http://www.denverlawreview.org/how-toregulate/
2010/2/22/breaking-feltens-third-law-how-not-to-fix-the-internet.html;
Danielle Citron, “Cyber Civil
Rights,” Boston University Law Review 89 (2009): 61–125. 14
For a more extensive review, see CLIP’s report devoted to
Section 230, which surveys the legal literature in great
more depth. Joel Reidenberg et al., Section 230 of the
Communications Decency Act: A Survey of the Legal
Literature and Reform Proposals (Fordham Law School, New
York: Center on Law and Information Policy, 2012),
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2046230.
The protection afforded under Section 230 is
important because it essentially limits the ability of
victims to recover damages from only the original author of
the
defaming, harassing, or hateful comments, blog posts,
messages, or other online content. 15
As discussed in Section VII, cyberharassment and
cyberstalking laws are almost exclusively criminal remedies,
meaning the enforcement of these laws requires the
cooperation of law enforcement and the prosecutor. In
contrast,
defamation is a civil remedy, as discussed in Section VI,
which allows any private citizen that has been defamed to
sue the defamer to enforce the law. Additionally, hate
speech laws, as discussed in Section V, are limited by the
First Amendment and generally are only relevant in that they
may enhance the prison sentence for a person
convicted of a crime where the victim was chosen because he
or she belonged to a protected class. 16
Joel Reidenberg et al., Internet Jurisdiction: A Survey of
Legal Scholarship Published in English and United
States Case Law, Fordham Law Legal Studies Research Paper
(New York, NY, USA: Center on Law and
Information Policy at Fordham Law School, June 30, 2013),
http://papers.ssrn.com/abstract=2309526. 17
See Restatement (Second) of Torts §571 and comments (1971). 18
Robel v. Roundup Corp., 148 Wash. 2d 35, 55-56 (2002) (en
banc); see also Restatement (Second) of Torts § 566
and comment e (1997) (noting “some statements ... cannot
reasonably be understood to be meant literally and
seriously and are obviously mere vituperation and abuse”). 19
Reno v. ACLU, 521 U.S. 844 (1997) (quoting.Reno v. ACLU, 929
F. Supp. 824 (E.D. Pa 1996)). 20
Ibid., 875 21
See Section VII for a discussion of states that have such
limited definitions. 22
Chaplinsky v. New Hampshire, 315 U.S. 568, 571-72 (1942).
Note that this list of categories of unprotected
speech is not exhaustive and there remain other categories
of unprotected speech, including child pornography. 23
See Miller v. California, 413 U.S. 15 (1973). 24
Ibid., 24. 25
See discussion in Section VII. 26
It is unclear at this time as to whether or not courts will
treat internet speech as libel or slander. However, the
differences between the two subcategories do not
substantively affect the analysis in this document. 27
United States v. Stevens, 559 U.S. 460, 468 (2010) (citing
Beauharnais v. Illinois, 343 U.S. 250, 254–255 (1952)). 28
Milkovich v. Lorain Journal Co., 497 U.S. 1, 14 (1990). 29
New York Times Co. v. Sullivan, 376 U.S. 254, 283–284
(1964). 30
See Milkovich, 497 U.S. at 20-21. 31
Brandenberg v. Ohio, 395 U.S. 444, 447 (1969). 32
See State v. Clay, 1999 Minn. App. LEXIS 1059 (Minn. Ct.
App. Sept. 14, 1999). 33
R.A.V. v. City of St. Paul, 505 U.S. 377 (1992). 34
See Stephen W. Gard, “Fighting Words as Free Speech,”
Washington University Law Review 58 (1980): 531;. 35
See discussion in Section V. 36
Virginia v. Black, 538 U.S. 343, 360 (2000). 37
Ibid., 359-60. 38
Ibid., 360 (citing R.A.V. v. City of St. Paul, 505 U.S. 377,
388 (1992)). 39
United States v. Alkhabaz, 104 F.3rd 1492 (1997). 40
Ibid., 1493. 41
Ibid., 1498. 42
Susan Brenner, “CYB3RCRIM3: Fantasy,” CYB3RCRIM3, March 15,
2006,
http://cyb3rcrim3.blogspot.com/2006/03/fantasy_15.html;
Philip Tortorich, “E-Mail Stories Detailing the Rape and
Murder of a Young Woman Do Not Constitute a True Threat,”
Loyola Consumer Law Review 9 (1997): 227. 43
Alkhabaz, 104 F.3rd at 1493. 44
Ibid. 45
Ibid., 1496. 46
Jared C. Schroeder, “Electronically Transmitted Threats and
Higher Education: Oppression, Free Speech, and
Jake Baker,” The Review of Higher Education 36, no. 3
(2013): 295–313, doi:10.1353/rhe.2013.0017. 47
State v. Locke, 307 P.3d 771 (Wash. Ct. App. 2013). See also
Susan Brenner, “The Governor, the Emails and
True Threats,” CYB3RCRIM3, August 19, 2013,
http://cyb3rcrim3.blogspot.com/2013/08/the-governor-emails-andtrue-
threats.html. 48
Ibid., 785. 49
Ibid. 50
Ibid., 791. 51
Ibid., 785. 52
Ibid., 791-92. 53
Ibid., 786. 54
Ibid., 792. 55
Ibid. 56
Victoria Smith Ekstrand, “Unmasking Jane and John Doe:
Online Anonymity and the First Amendment,”
Communication Law and Policy 8, no. 4 (2003): 405–27;
Matthew Mazzotta, “Balancing Act: Finding Consensus on
Standards for Unmasking Anonymous Internet Speakers,” Boston
College Law Review 51, no. 3 (2010): 833. 57
See 47 U.S.C. § 551(c), which requires a cable service
provider, which includes several ISPs, to “not disclose
personally identifiable information concerning any
subscriber without the prior written or electronic consent
of the
subscriber concerned” and to “take such actions as are
necessary to prevent unauthorized access to such information
by a person other than the subscriber or cable operator”
unless the disclosure of the information is, inter alia,
“made
pursuant to a court order authorizing such disclosure, if
the subscriber is notified of such order by the person to
whom the order is directed . . . .” In addition, the
Electronic Privacy Communications Act, 18 U.S.C. § 2703
provides users protection against disclosure to the
government of wire or electronic communications held in
electronic storage. See also David L. Sobel, “The Process
That ‘John Doe’ Is Due: Addressing the Legal Challenge
to Internet Anonymity,” Va. JL & Tech. 5 (2000): 3–15. 58
Some ISPs will not substantially oppose a motion that would
compel them to identify a user but still refuse to
identify the user without a court order. See, e.g., Matter
of Cohen v. Google, 25 Misc. 3d 945, 946, n. 1 (N.Y. Sup.
Ct. 2009), 25:946, n. 1 (noting that Google did not have a
“substantive opposition” to revealing the anonymous
blogger’s identity). In contrast, others may more
aggressively oppose such an action to unmask a user. 59
McIntyre v. Ohio Elections Committee, 514 U.S. 334 (1995). 60
Jason M. Shepard and Genelle Belmas, “Anonymity, Disclosure
and First Amendment Balancing in the Internet
Era: Developments in Libel, Copyright, and Election Speech,”
Yale Journal of Law & Technology 15 (2012): 92–
139. 61
Doe. v. Cahill, 884 A.2d 451, 461 (Del. 2005); Independent
Newspapers, Inc. v. Brodie, 966 A.2d 432, 456–457
(Md. 2009). 62
See, e.g., Doe. V. Cahill, 884 A.2d 451, 461 (Del. 2005). 63
Ibid.; Independent Newspapers, Inc. v. Brodie, 966 A.2d 432,
457 (Md. 2009), 966:457; Solers, Inc. v. John Doe,
977 A.2d 941, 954 (D.C. 2009). 64
The defendant, through council, may appear anonymously in
such a proceeding and thereby not risk revealing his
or her identity yet. 65
Dendrite International, Inc. v. Doe, 775 A.2d 756, 760 (N.J.
Supr. Ct. App. Div. 2001); Doe. V. Cahill, 884 A.2d
451, 463 (Del. 2005); Independent Newspapers, Inc. v. Brodie,
966 A.2d 432, 457 (Md. 2009), 966:457; Solers, Inc.
v. John Doe, 977 A.2d 941, 954 (D.C. 2009), 977:954. 66
Cahill, 884 A.2d at 463 (motion for summary judgment
standard); Dendrite, 775 A.2d at 760 (motion to dismiss
standard); see also Brodie, 966 A.2d at 449-457 (discussing
various standards adopted by various courts and the
implications of adopting too low or too high of a standard). 67
Motions for summary judgment are only available in civil
trials. 68
See Fed. R. Civ. P. 56(a). 69
See, e.g., Dendite, 775 A.2d at 769-72 (“[T]he discovery of
[the poster’s] identity largely turns on whether his
statements were defamatory or not.”); Cahill, 884 A.2d at
466. 70
Doe. V. Cahill, 884 A.2d 451, 461 (Del. 2005), 884:461. 71
Ibid., 463. 72
Ibid. 73
Ibid. 74
Ibid. 75
Anonymous Online Speakers v. United States Dist. Court (In
re Anonymous Online Speakers), 661 F.3d 1168,
1177 (9th Cir. 2011). 76
Ibid. 77
Ibid. 78
Solers, Inc. v. John Doe, 977 A.2d 941, 954 (D.C. 2009). 79
Independent Newspapers, Inc. v. Brodie, 966 A.2d 432, 457
(Md. 2009). 80
Codified at 47 USC § 230. 81
See Doe v. MySpace, 528 F.3d 413 (5th Cir. 2008) (negligence
and gross negligence); Perfect 10 v. CCBill, 448
F.3d. 1102 (9th Cir. 2007) (unfair competition and false
advertising). 82
47 U.S.C. § 230(e)(1) states “Nothing in this section shall
be construed to impair the enforcement of section 223
or 231 of this title, chapter 71 (relating to obscenity) or
110 (relating to sexual exploitation of children) of title
18, or
any other Federal criminal statute.” 83
47 U.S.C. § 230(e)(2) states “Nothing in this section shall
be construed to limit or expand any law pertaining to
intellectual property.” Note that there is currently a split
of authority as to whether or not interactive computer
services may be liable for state intellectual property
claims such as the right to publicity. Compare Perfect 10
(they
are immune from state IP claims) and Doe v. Friendfinder,
540 F.Supp.2d 288 (D. New Hamp. 2008) (they are not
immune from state IP claims). 84
47 USC § 230(e)(4) states “Nothing in this section shall be
construed to limit the application of the Electronic
Communications Privacy Act of 1986 or any of the amendments
made by such Act, or any similar State law.” 85
47 USC § 230(e)(3) states “Nothing in this section shall be
construed to prevent any State from enforcing any
State law that is consistent with this section. No cause of
action may be brought and no liability may be imposed
under any State or local law that is inconsistent with this
section.” As discussed in Note 37, there is a split of
authority as to whether or not this state intellectual
property claims, such as right to publicity, are exempted
from
Section 230. 86
As a result of CDA 230 protections, a victim is generally
limited to seeking redress from the individual user
responsible for posting the content at issue. 87
It is still possible for service providers to be
contractually liable to customers for promises they have
made. See
Barnes v. Yahoo, 570 F.2d 1096 (9th Cir. 2009). 88
Meredith Bennett-Smith, “Facebook Vows To Crack Down On Rape
Joke Pages After Successful Protest,
Boycott,” Huffington Post, accessed August 21, 2013, http://www.huffingtonpost.com/2013/05/29/facebook-rapejokes-
protest_n_3349319.html. 89
“Sexism Protests Target Facebook,” BBC, May 28, 2013, sec.
Technology,
http://www.bbc.co.uk/news/technology-22689522. 90
Bennett-Smith, “Facebook Vows To Crack Down On Rape Joke
Pages After Successful Protest, Boycott.” 91
Citron, Hate Crimes in Cyberspace; Ann Bartow, “Internet
Defamation as Profit Center: The Monetization of
Online Harassment,” Harvard Journal of Law and Gender 32,
no. 2 (August 11, 2009),
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1447472;
Ann Bartow, “Portrait of the Internet as a Young
Man,” Michigan Law Review 108, no. 6 (2008): 1079–1106. 92
Michael Nycyk, “Tensions in Enforcing YouTube Community
Guidelines: The Challenge of Regulating Users’
Flaming Comments,” 2012, http://www.academia.edu/download/30187109/Thesis_2012_YouTube_Flaming.pdf;
Jean Elizabeth Burgess and Joshua Benjamin Green, YouTube:
Online Video and Participatory Culture, Digital
Media and Society (Malden, MA: Polity, 2009). 93
Working to Halt Online Abuse, WHOA (Haltabuse.org)
Comparison Statistics 2000-2012, 2013,
http://www.haltabuse.org/resources/stats/Cumulative2000-2012.pdf. 94
Citron, Hate Crimes in Cyberspace. 95
Geek Feminism Wiki, “Timeline of Incidents,” Geek Feminism
Wiki, 2013,
http://geekfeminism.wikia.com/wiki/Timeline_of_incidents. 96
See Mayo Moran, “Talking About Hate Speech,” Wisconsin Law
Review 1994: 1425. 97
See Charlotte H. Taylor, “Hate Speech and Government
Speech,” University of Pennsylvania Journal of
Constitutional Law 12 (2010): 1115–1479 for a discussion on
the use of the noose as a type of hate speech. 98
St. Paul, Minn., Legis. Code § 292.02 (1990). 99
R.A.V., 505 U.S. at 381. 100
Ibid., 391. 101
See Kenneth D. Ward, “Free Speech and the Development of
Liberal Virtues: An Examination of the
Controversies Involving Flag-Burning and Hate Speech,”
University of Miami Law Review 52 (1998): 765. 102
Calvin R. Massey, “Hate Speech, Cultural Diversity, and the
Foundational Paradigms of Free Expression,”
UCLA Law Review 40 (1992): 104 n.2. 103
Wisconsin v. Mitchell, 508 U.S. 476 (1993). 104
Ibid. 105
D. J. Solove, The Future of Reputation: Gossip, Rumor, and
Privacy on the Internet (Yale University Press,
2007); Mary Madden and Aaron Smith, Reputation Management
and Social Media (Washington, DC: Pew Internet
& American Life Project, May 26, 2010), http://pewinternet.org/Reports/2010/Reputation-Management.aspx?r=1;
P.
Resnick et al., “Reputation Systems,” Communications of the
ACM 43, no. 12 (2000): 45–48. 106
Many states have repealed their criminal defamation laws and
most others have stopped prosecuting them;
however there has been a recent revival of using criminal
defamation laws to prosecute people for their conduct
online. See Edward L. Carter, “Outlaw Speech on the
Internet: Examining the Link Between Unique Characteristics
of Online Media and Criminal Libel Prosecutions,” Santa
Clara High Technology Law Journal 21 (2004): 289. 107
A statute of limitations is a time limit that the government
sets for bringing a lawsuit, after which the victim may
no longer bring a lawsuit. The statute of limitations may be
waived or extended in certain circumstances. 108
For example, Lori Stewart was cyberstalked for about six
years before her stalker was arrested. See Mary
Schenk, “Warrant Issued Over Online Comments,” News-Gazette,
September 21, 2013, http://www.newsgazette.
com/news/local/2013-09-21/warrant-issued-over-online-comments.html. 109
Restatement (Second) of Torts § 558. 110
Hustler Magazine v. Falwell, 485 U.S. 46 (1987). 111
Associated Press v. Walker, decided with Curtis Publishing
Co. v. Butts, 388 U.S. 130, 164 (1967) (Warren, C.J.,
concurring in result). 112
Gertz. v. Robert Welch, Inc., 418 U.S. 323, 351 (1974). 113
See Vogel v. Felice, 127 Cal. App. 4th 1006 (2005). 114
See Matheson v. Stork, 239 Neb. 547, 553 (1991). 115
Milkovich v. Lorain Journal Co., 497 U.S. 1, 20-21 (1990). 116
See Matter of Cohen v. Google, 25 Misc. 3d 945 (N.Y. Sup.
Ct. 2009). In this case, the court considered the use
of the word “skank” and determined it referred to a person
with poor hygiene, and also examined the use of the
words “ho” and “whoring” and determined that they referred
to a promiscuous person or one who exchanges of sex
for money. Here, the court found that all of these terms
were falsifiable and therefore grounds for a defamation
action. 117
Hustler Magazine v. Falwell, 485 U.S. 46 (1987). 118
Gertz. v. Robert Welch, Inc., 418 U.S. 323, 351 (1974). 119
Matter of Cohen v. Google, 25 Misc. 3d 945 (N.Y. Sup. Ct.
2009). 120
Ibid., 950. 121
Ibid., 946 n1. 122
Ibid., 950. 123
Ibid., 951–2. 124
George Rush, “Outed Blogger Rosemary Port Blames Model
Liskula Cohen for ‘Skank’ Stink,” New York Daily
News, August 23, 2009, http://www.nydailynews.com/entertainment/gossip/outed-blogger-rosemary-port-blamesmodel-
liskula-cohen-skank-stink-article-1.400409. 125
AutoAdmit was found to be protected by Section 230 of the
Communications Decency Act and therefore dropped
from the suit. 126
Doe v. Ciolli, 611 F. Supp. 2d 216 (D. Conn. 2009). 127
Complaint, Doe v. Ciolli, 2007 WL 1988159, ¶¶ 27, 58 (D.Conn.). 128
David Margolick, “Slimed Online,” Upstart Business Journal,
February 11, 2009,
http://upstart.bizjournals.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-
Bullying.html?page=all. 129
Ibid. 130
See National Conference of State Legislatures, “State
Cyberstalking and Cyberharassment Laws,” NCSL.org,
2013,
http://www.ncsl.org/issues-research/telecom/cyberstalking-and-cyberharassment-laws.aspx. 131
Ibid. 132
Ibid. 133
These states are California (Cal. Penal Code §
653.2(c)(1)-(2)), Delaware (Del. Code Ann. Tit. 11, §
1311(a)(1)),
Florida (Fla. Stat. § 784.048(1)(a), (d)), Hawaii (Haw. Rev.
Stat. § 711-1106(1)(c), § 711-1106.5(1)), Indiana (Ind.
Code § 35-45-2-2(a)), Iowa (Iowa Code § 708.7(1)(a)(1)),
Nebraska (Neb. Rev. Stat. § 28-311.02(2)(a)), New
Hampshire (N.H. Rev. Stat. Ann. § 644:4(I)(a)), North Dakota
(N.D. Cent. Code § 12.1-17-07(1)(c), (4)(a),
Pennsylvania (18 Pa. Cons. Stat. § 2709(a)(3), (f)), Rhode
Island (R.I. Gen. Laws § 11-52-4.2(a)), South Carolina
(S.C. Code Ann. § 16-3-1700(B), Tennessee (Tenn. Code Ann. §
39-17-308(a)(4)), and Washington (Wash. Rev.
Code § 10.14.020(2)). 134
See the cyberharassment statutes from Arizona(Ariz. Rev.
Stat. Ann. § 13-2916(C)), Florida (Fla. Stat. §
784.048(1)(b)), Michigan (Mich. Comp. Laws § 750.411s(6)),
New Hampshire (N.H. Rev. Stat. Ann. § 644:4(I)(f)),
Pennsylvania (18 Pa. Cons. Stat. § 2709(e)), Rhode Island
(R.I. Gen. Laws § 11-52-4.2(a)), South Carolina (S.C.
Code Ann. § 16-3-1700(G)), and Washington (Wash. Rev. Code §
10.14.020(1)). 135
R.I. Gen. Laws § 11-52-4.2. 136
Ibid. 137
These states are Alabama (Ala. Code § 13A-11-8), Alaska
(Alaska Stat. § 11.61.120(a)), Arizona (Ariz. Rev.
Stat. Ann. § 13-2916(A), § 13-2921(A)), California (Cal.
Penal Code § 422(a), § 653.2(a), § 653m(a)-(d), Colorado
(Colo. Rev. Stat. § 18-9-111(1), (2)), Connecticut (Conn.
Gen. Stat. § 53a-182b(a), § 53a-183(a)), Delaware (Del.
Code Ann. tit. 11, § 1311(a)), Hawaii (Haw. Rev. Stat. §
711-1106(1), § 711-1106.5(1)), Illinois (720 Ill. Comp.
Stat. 5/26.5-1(a), 5/26.5-3(a)(1)-(3)), Indiana (Ind. Code §
35-45-2-2(a)), Iowa (Iowa Code § 708.7(a)), Kansas
(Kan. Stat. Ann. § 21-6206(a)(1)(B)-(D)), Maine (Me. Rev.
Stat. tit. 17-A § 506(1)(B)-(D)), Maryland (Md. Code
Ann., Crim. Law § 3-805(b)(1)(i)), Minnesota (Minn. Stat. §
609.795 subdiv. 1(3)), Mississippi (Miss. Code Ann. §
97-29-45(1)(a)-(d)), New York (N.Y. Penal Law § 240.30),
North Dakota (N.D. Cent. Code § 12.1-17-07(1)),
Oklahoma (Okla. Stat. tit. 21, § 1172(A)(2)-(4), Oregon (Or.
Rev. Stat. § 166.065(1)), Pennsylvania (18 Pa. Cons.
Stat. § 2709(a)), South Carolina (S.C. Code Ann. §
16-3-1700(B), § 16-17-430(A)(2),(5)), South Dakota (S.D.
Codified Laws § 49-31-31(1)-(4)), Tennessee (Tenn. Code Ann.
§ 39-17-308(a)), Texas (Tex. Penal Code Ann. §
33.07(a)-(c)), Utah (Utah Code Ann. § 76-9-201(2)), Vermont
(Vt. Stat. Ann. tit. 13, § 1027(a),(b)), Virginia (Va.
Code Ann. § 18.2-152.7:1), West Virginia (W. Va. Code §
61-3C-14a(a)), and Wisconsin (Wis. Stat. §
947.0125(2)(a)-(f)). 138
Neb. Rev. Stat.§ 28-311.02. 139
Mich. Comp. Laws § 750.411s. 140
Miss. Code § 97-29-45. 141
Va. Code Ann. § 18.2-152.7:1. 142
284 Va. 67 (2012). 143
Ibid., 70. 144
Ibid., 72, 77, 79; Miller v. California, 413 U.S. 15 (1973).
See Section IV for additional information regarding the
Miller test. 145
People v. Kucharski, 987 N.E.2d 906 (Ill. App. Ct. 2013). 146
Polito v. Time Warner, 78 Pa.D. & C.4th 328 (Lackawanna Ct.
2004). Note that Polito also sued the defendants
for Intentional Infliction of Emotional Distress. 147
Tinker v. Des Moines Independent Community School District,
393 U.S. 503 (1969). 148
Jessica Moy, “Beyond the Schoolhouse Gates and into the
Virtual Playground: Moderating Student
Cyberbullying and Cyberharassment after Morse v. Frederick,”
Hastings Constitutional Law Quarterly 37 (2009):
577. 149
J.S. v. Bethlehem School District, 807 A.2d 847 (Pa. 2002);
Emily Gold Waldman, “Badmouthing Authority:
Hostile Speech About School Officials and the Limits of
School Restrictions,” William & Mary Bill of Rights
Journal 19 (2010): 620–621. 150
Waldman, “Badmouthing Authority,” 621. 151
Matthew Pagett, “Sticks, Stones, and Cyberspace: On
Cyberbullying and the Limits of Student Speech,” UNC
School of Government-School Law Bulletin 2 (2012), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2191141;
Waldman, “Badmouthing Authority,” 623. 152
Moy, “Beyond the Schoolhouse Gates and into the Virtual
Playground,” 580–581. 153
Tinker v. Des Moines Independent Community School District,
393 U.S. 503, 513 (1969), 393:513. 154
Wisniewski v. Board of Education, 494 F.3d 34, 36 (2d Cir.
2007). 155
Moy, “Beyond the Schoolhouse Gates and into the Virtual
Playground,” 580. 156
Pagett, “Sticks, Stones, and Cyberspace,” 9. 157
Ibid. 158
Ibid., 13; Waldman, “Badmouthing Authority,” 627–629. 159
Dena Sacco et al., An Overview of State Anti-Bullying
Legislation and Other Related Laws, The Kinder & Braver
World Project: Research Series (Cambridge, MA: Berkman
Center for Internet and Society at Harvard University,
February 2012),
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/State_Anti_bullying_Legislation_Overview_0.pdf. 160
Ibid. 161
Kim Zetter, “Court: Cyberbullying Threats Are Not Protected
Speech,” Threat Level, March 18, 2010,
http://www.wired.com/threatlevel/2010/03/cyberbullying-not-protected/;
Sruli Yellin, “Resetting One of the Longest
Running Cyberbullying Cases--DC v. RR,” Technology &
Marketing Law Blog, February 27, 2013,
http://blog.ericgoldman.org/archives/2013/02/resetting_one_o.htm. 162
Communications Decency Act §230, 47 U.S.C. § 230. 163
Ibid. 164
Julian Baumrin, “Internet Hate Speech and the First
Amendment, Revisited,” Rutgers Computer & Technology
Law Journal 37 (2011): 223. 165
Alexander Tsesis, “Hate in Cyberspace: Regulating Hate
Speech on the Internet,” San Diego Law Review 38
(2001): 817. James Banks, “Regulating Hate Speech Online,”
International Review of Law, Computers &
Technology 24, no. 3 (2010): 236–237. 166
Banks, “Regulating Hate Speech Online,”233-39. 167
See, for example, ibid.; Tsesis, “Hate in Cyberspace:
Regulating Hate Speech on the Internet,”, 863-74. 168
As used in this section, the asterisk is a root expander
that searches for all version of a word containing the
connected letters. Here this would include definition,
defining, defined, define, definitions, etc. 169
National Conference of State Legislatures, “State
Cyberstalking and Cyberharassment Laws.” 170
25 Misc. 3d 945 (N.Y. Sup. Ct. 2009). 171
Doe v. Ciolli, 307CV00909 CFD (D. Conn. June 11, 2007). 172
Provision (3) of this section was been held unconstitutional
as applied in State v. LaFontaine, 16 A.3d 1281
(Conn. App. Ct. 2011). 173
This provision was held unconstitutional in State v. Vaughn,
366 S.W.3d 513 (Mo. 2012). 174
The prima facie provision of this section was held to be
unconstitutionally overbroad in State v. Dugan, 303 P.3d
755 (Mont. 2013). 175
This provision was held to violate the State Constitution in
State v. Pierce, 887 A.2d 132 (N.H. 2005). Return to Table of Contents
|