Blog

News, insights and more…

Subpoenas, Court Orders and the ‘Cable Privacy Act’: Identifying Anonymous Online Posters

We have written about subpoenaing internet service providers (ISPs) for identifying information relating to internet protocol (IP) addresses used by their subscribers.  In that post, we mentioned that securing identifying information from cable operator ISPs generally requires obtaining a court order authorizing disclosure of the subscriber information. To briefly illustrate,...

Actor Can Proceed With Twitter Defamation Lawsuit, Likely to Unmask Anonymous Twitter User

Actor James Woods is one step closer to unmasking the identity of the unknown Twitter user he sued for $10 million last summer. Last Monday, Judge Mel Recana of the Los Angeles County Superior Court denied the defendant’s Special Motion to Strike. This allows Woods to proceed with his case against...

Online Comments, Free Speech and Internet Defamation: News Outlets Challenged by Internet Commenters

On Nov. 12, 2015, The Montana Standard published an online editorial about forthcoming changes to its online commenting policy.  This might seem trivial outside of the readership for this newspaper from the fifth largest city in the 44th most populated U.S. state.  But beginning in late November, The Montana Standard’s...

Video: How to Identify Anonymous Internet Posters

Many, if not most, online attacks — including defamation — are carried out anonymously or pseudonymously.  Bad actors typically conceal their identities, whether using aliases and providing fake information to websites or taking greater measures such as masking IP addresses. What many do not realize, in particular those who merely provide...

Court: Defamation Plaintiff Must Provide Evidence to Unmask Unknown Avvo.com Poster

A Washington appellate court offered defamation plaintiffs a friendly reminder last week: if you want to unmask the identity of an unknown internet poster, you better present evidence to back up your defamation claims. In a July 6 opinion, the Court of Appeals of Washington ruled that a Florida attorney...

How to Remove False, Defamatory Glassdoor Reviews

Founded in 2007, Glassdoor.com is an online “career community” with a database consisting of several million company reviews, CEO ratings, salary reports, job interview reports and more.  But as both the Associated Press and the Wall Street Journal have phrased things – in articles published nearly three years apart –...

In-House Counsel Guidebook on Handling Internet Defamation, Reputation Attacks (digital version)

We recently published a digital version of the In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks, which is accessible here. The In-House Counsel Guidebook provides insights for in-house counsel on internet defamation and online reputation matters.  The Guidebook, which was authored by Whitney Gibson, is based on...

White Paper (PDF) – In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks

Businesses and professionals are frequently the victims of online reputation attacks, including instances of internet defamation. Given that a legal analysis is often involved when determining how to handle these online attacks, in-house legal counsel will often be asked for input. The In-House Counsel Guidebook provides insights for in-house counsel,...

Federal Judge: Company May Unmask Anonymous Internet Posters Via Subpoenas

On July 11, 2014, tech news website Ars Technica published a short post about a federal district court judge in Washington who recently granted a company’s request to “unmask” anonymous Amazon.com reviewers and Craigslist posters. Ubervita, LLC is “one of the top sellers of nutritional supplements on Amazon.com,” at least...

White Paper (PDF): Subpoena Guide for Identifying Anonymous Internet Posters

Online reputation attacks have become one of the easiest and most impactful ways for persons to damage businesses and individuals.  These attacks, such as defamatory online reviews, can originate from many sources and on various platforms.  Such internet attacks are frequently carried out anonymously, through the use of pseudonyms or other...