<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Adware/Spyware Archives - Technology &amp; Marketing Law Blog</title>
	<atom:link href="https://blog.ericgoldman.org/archives/category/adwarespyware/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ericgoldman.org/archives/category/adwarespyware</link>
	<description></description>
	<lastBuildDate>Wed, 29 Apr 2026 14:36:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">59487357</site>	<item>
		<title>Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</title>
		<link>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 14:36:23 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28840</guid>

					<description><![CDATA[<p>The defendant offers a browser extension that displays popup windows over e-commerce sites showing price comparison information. Enterpreneurs have been trying to make this sort of functionality happen since the late 1990s. Maybe this browser extension will succeed where thousands...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm">Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss.jpg"><img decoding="async" class="alignright size-medium wp-image-28842" src="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-300x155.jpg" alt="" width="300" height="155" srcset="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-300x155.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-768x396.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss.jpg 935w" sizes="(max-width: 300px) 100vw, 300px" /></a>The defendant offers a browser extension that displays popup windows over e-commerce sites showing price comparison information. Enterpreneurs have been trying to make this sort of functionality happen since the late 1990s. Maybe this browser extension will succeed where thousands have failed before. An online retailer objected to the popup window and sued. We saw a spate of lawsuits over third-party modifications to a web page, such as framing, 20-25 years ago, testing many legal theories. None of the lawsuits worked.</p>
<p>In an effort to avoid that graveyard of litigation, the plaintiff tried the trespass to chattels doctrine. But&#8230;.um&#8230;exactly how does a browser extension trespass any chattel controlled by the retailer? The retailer&#8217;s answer (I shit you not, I would not make up shit like this):</p>
<blockquote><p>superimposing the Price Comparison Tool over other content on the S&amp;S Site <strong>trespasses on valuable digital real estate</strong> that S&amp;S has expended time, resources, and effort to make aesthetically and functionally appealing to its customers (emphasis added)</p></blockquote>
<p>Holy mixed metaphors&#8230;.&#8221;digital real estate&#8221;!</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2026/04/friends-thats-not-a-thing.jpg"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-28844" src="https://blog.ericgoldman.org/wp-content/uploads/2026/04/friends-thats-not-a-thing.jpg" alt="" width="300" height="168" /></a></p>
<p>This lawsuit would be mockable at any time, but its mockability skyrockets in the wake of the <a href="https://blog.ericgoldman.org/archives/2024/01/web-page-framing-isnt-trespass-to-chattels-best-carpet-values-v-google.htm">Best Carpet Values v. Google</a> decision, which essentially rejected a functionally identical &#8220;trespass to web pages&#8221; argument.</p>
<p>Sticking closely to the Best Carpet Values decision, the court tells the plaintiff:</p>
<blockquote><p>the alleged “trespass” is not to any aspect of S&amp;S’s website that is in its possession. Rather, S&amp;S alleges that Defendants’ Price Comparison Tool alters the appearance of S&amp;S’s website in a consumer’s web browser on the consumer’s computer. S&amp;S does not allege that it possesses the consumer’s browser or computer. And S&amp;S cites no authority that it possesses, or has any property interest in, the appearance of its website on a third party consumer’s browser or computer.</p></blockquote>
<p>The plaintiff tried to obfuscate this issue by arguing that trespass to chattels can apply to intangible property&#8211;a slightly true but deeply problematic statement. As I&#8217;ve repeatedly explained, if the definition of &#8220;chattels&#8221; mean intangibles&#8211;i.e., the antonym of &#8220;chattels&#8221;&#8211;then trespass to chattels morphs into a doctrine of &#8220;trespass to plaintiff&#8217;s butthurt feelings,&#8221; and the law implodes on itself.</p>
<p>The court doesn&#8217;t take this bait. Instead, like the Best Carpet Values decision, the judge observes that by the time the browser extension modifies the retailer&#8217;s web page, the digital bits are no longer in the retailer&#8217;s &#8220;possession.&#8221; I would much prefer courts define chattels to categorically preclude debates over its applicability to intangibles, but the court&#8217;s logic gets the job done.</p>
<p>There&#8217;s nothing left for the retailer to complain about:</p>
<blockquote><p>Defendants are not alleged to have intercepted and altered S&amp;S’s website transmission such that it was impossible for any consumer to view S&amp;S’s website as S&amp;S intended. Rather, Defendants provided a tool that consumers could decide to use to view S&amp;S’s website in a way chosen by the consumer once the website transmission was in the consumer’s possession. S&amp;S has no property right in the consumer’s internet viewing decisions.</p>
<p>Furthermore, the alleged act of “trespass” identified by S&amp;S is an action taken by the consumer, not by the Defendants. The action S&amp;S alleges constitutes “trespass” is the appearance of Defendants’ Price Comparison Tool superimposed on S&amp;S’s website. But it is the consumer who decides whether to enable the Price Comparison Tool on their computer. To the extent enabling the Price Comparison Tool constitutes a trespass, Defendants aren’t the ones committing it.</p></blockquote>
<p>In a sense, the court&#8217;s ruling is pro-user. The plaintiff is essentially claiming that it alone determines the canonical view of the website. However, websites are viewed on a wide range of devices and browsers, all of which the user chooses, so web pages don&#8217;t have any canonical version that the law can recognize. The court&#8217;s decision seemingly lets users, not the website, choose which technologies they want to use to access a website.</p>
<p>And yet, this passage also implies that perhaps the retailer could sue the users for trespass to its valuable digital real estate for marring its beautiful and canonical web page. As stupid as that sounds, such a claim would not be materially worse than the claim rejected here.</p>
<p><em>Case Citation</em>: <a href="https://cases.justia.com/federal/district-courts/illinois/ilndce/1:2025cv11214/486370/57/0.pdf?ts=1777128973">S&amp;S Activewear LLC v. Promo Hunt, Inc.</a>, 2026 U.S. Dist. LEXIS 91156 (N.D. Ill. April 23, 2026). The <a href="https://pdfserver.amlaw.com/legalradar/pm-60179260_complaint.pdf">complaint</a>. Per the complaint, this lawsuit addressed more topics that just trespass to chattels. Still, three lawyers from Sidley &amp; Austin&#8211;traditionally, one of the most prestigious law firms in the country&#8211;signed off on the phrase &#8220;trespasses on valuable digital real estate.&#8221; Surely that will be a peak moment of their legal careers. <a href="https://personal.ericgoldman.org/reflections-on-my-experience-as-a-1992-summer-associate-in-sidley-austins-la-office/">A note about my time at Sidley &amp; Austin</a>.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm">Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28840</post-id>	</item>
		<item>
		<title>Section 230 Doesn&#8217;t Apply to &#8220;Refer-a-Friend&#8221; Text Message&#8211;Jensen v. Capital One</title>
		<link>https://blog.ericgoldman.org/archives/2025/03/section-230-doesnt-apply-to-refer-a-friend-text-message-jensen-v-capital-one.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 17:14:48 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=27469</guid>

					<description><![CDATA[<p>Capital One has a &#8220;refer-a-friend&#8221; program for its customers. Capital One provides its customers with promotional content and a customer-specific referral URL. Customers can edit the content as they see fit, then send it to their friends (or their enemies...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/03/section-230-doesnt-apply-to-refer-a-friend-text-message-jensen-v-capital-one.htm">Section 230 Doesn&#8217;t Apply to &#8220;Refer-a-Friend&#8221; Text Message&#8211;Jensen v. Capital One</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Capital One has a <a href="https://www.capitalone.com/credit-cards/refer-a-friend/">&#8220;refer-a-friend&#8221; program</a> for its customers. Capital One provides its customers with promotional content and a customer-specific referral URL. Customers can edit the content as they see fit, then send it to their friends (or their enemies or strangers&#8211;it&#8217;s all the same to Capital One). If the recipient takes the desired action at the referral URL, the promoting customer gets a bonus. The plaintiff in this case received a text message from their &#8220;friend&#8221; that incorporated the Capital One-supplied promotional content verbatim. The plaintiff brought a putative class action lawsuit against Capital One based on Washington&#8217;s anti-spam law and related claims.</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-scaled.jpg"><img decoding="async" class="alignright size-medium wp-image-20910" src="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg" alt="" width="300" height="139" srcset="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1024x474.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-768x355.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1536x711.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-2048x948.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /></a>Capital One defended on Section 230 grounds (among others). Capital One argued that the plaintiff is trying to hold Capital One liable for the text message sent by its customer to the customer&#8217;s &#8220;friend.&#8221; The plaintiff pointed out that Capital One authored and provided its customer with the exact content that the customer sent, so the content at issue wasn&#8217;t third-party content to Capital One. The district court agrees with the plaintiff.</p>
<p>It doesn&#8217;t change the 230 analysis that the promoting customer could have edited the content, because that didn&#8217;t happen in this situation. &#8220;Because Jensen alleges that Capital One is the sole author of the content of the text that she received, Capital One is not alleged to be merely the passive conduit of content created by others.&#8221; Groan. As I&#8217;ve discussed ad naseum on the blog, the &#8220;passive conduit&#8221; phrase is conceptually incoherent, and it&#8217;s inconsistent with Section 230&#8217;s protection for editorial decisions regarding third-party content.</p>
<p>The court adds: &#8220;the purpose of Section 230 immunity—to encourage Internet service providers to voluntarily monitor and edit user-generated speech in internet traffic—would not be served by protecting Capital One from liability in this case.&#8221; I disagree with the court&#8217;s characterization of Section 230&#8217;s goals, but I can see why the 230 defense vexed the court. Capital One isn&#8217;t hosting or distributing content authored by others; Capital One is trying to avoid liability for ad copy it prepared with the intent of profiting from securing new customers.</p>
<p>Still, the opinion sidesteps a key conceptual problem with this case. The court could have said that Capital One&#8217;s ad copy didn&#8217;t cause the legal violation asserted by the plaintiff. Capital One isn&#8217;t liable merely for providing promotional content to its customers; the customer could have been equally liable for violating the anti-spam law if they had written their own ad copy and sent it to their &#8220;friend&#8221;; and the promotional content wouldn&#8217;t have created liability if the sender had otherwise complied with the prerequisites of Washington&#8217;s anti-spam law. In other words, any anti-spam liability turns solely on the sender&#8217;s compliance efforts (or lack thereof), something Capital One can&#8217;t directly control. Viewed this way, the plaintiff seeks to hold Capital One liable for third-party &#8220;content,&#8221; i.e., its customers&#8217; incomplete legal compliance when disseminating messages the senders had sole editorial control over.</p>
<p>Similar allocation-of-liability issues arose during the adware and affiliate program wars of the 2000s. See <a href="https://blog.ericgoldman.org/archives/2009/02/affiliate_liabi_1.htm">this roundup</a>. Section 230 wasn&#8217;t a main issue in most of those litigation battles, and it doesn&#8217;t work here. Capital One may have tenable defenses on other grounds.</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/03/spam-friends.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-27473" src="https://blog.ericgoldman.org/wp-content/uploads/2025/03/spam-friends-300x300.jpg" alt="" width="300" height="300" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/03/spam-friends-300x300.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/03/spam-friends-150x150.jpg 150w, https://blog.ericgoldman.org/wp-content/uploads/2025/03/spam-friends.jpg 500w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>You may have noticed that I sometimes put the term &#8220;friends&#8221; in quotes. True friends don&#8217;t spam each other. That rule doesn&#8217;t change just because a marketing team labels its affiliate program &#8220;refer-a-friend.&#8221;</p>
<p><em>Case Citation</em>: <a href="https://cases.justia.com/federal/district-courts/washington/wawdce/2:2024cv00727/335472/40/0.pdf?ts=1740588780">Jensen v. Capital One Financial Corp.</a>, 2025 WL 606194 (W.D. Wash. Feb. 25, 2025)</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/03/section-230-doesnt-apply-to-refer-a-friend-text-message-jensen-v-capital-one.htm">Section 230 Doesn&#8217;t Apply to &#8220;Refer-a-Friend&#8221; Text Message&#8211;Jensen v. Capital One</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27469</post-id>	</item>
		<item>
		<title>This Case Keeps Wrecking Internet Law&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2024/06/this-case-keeps-wrecking-internet-law-enigma-v-malwarebytes.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sun, 23 Jun 2024 18:49:52 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Marketing]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=26457</guid>

					<description><![CDATA[<p>You probably know this case well, but I&#8217;ll recap it anyway. Malwarebytes makes anti-threat software. Enigma makes competitive offerings. Malwarebytes classified Enigma&#8217;s SpyHunter4 and RegHunter2 programs as malicious, a threat, and a potentially unwanted program (PUP). This screenshot shows Malwarebytes&#8217;...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2024/06/this-case-keeps-wrecking-internet-law-enigma-v-malwarebytes.htm">This Case Keeps Wrecking Internet Law&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-19201" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">Puppy chewing tennis ball. Photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>You probably know this case well, but I&#8217;ll recap it anyway. Malwarebytes makes anti-threat software. Enigma makes competitive offerings. Malwarebytes classified Enigma&#8217;s SpyHunter4 and RegHunter2 programs as malicious, a threat, and a potentially unwanted program (PUP).</p>
<p>This screenshot shows Malwarebytes&#8217; interface. The green &#8220;upgrade now&#8221; button plays a key role in the court&#8217;s latest analysis:</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2024/06/enigma-2.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26484" src="https://blog.ericgoldman.org/wp-content/uploads/2024/06/enigma-2.jpg" alt="" width="742" height="434" srcset="https://blog.ericgoldman.org/wp-content/uploads/2024/06/enigma-2.jpg 742w, https://blog.ericgoldman.org/wp-content/uploads/2024/06/enigma-2-300x175.jpg 300w" sizes="auto, (max-width: 742px) 100vw, 742px" /></a></p>
<p>Enigma sued Malwarebytes for its classifications in 2016, back when Obama was still president. This case should have been easily resolved by Section 230(c)(2)(B) <a href="https://blog.ericgoldman.org/archives/2009/06/antispyware_com.htm">per Zango v. Kaspersky</a>. Instead, it has horked Internet Law in three major ways:</p>
<ul>
<li>The <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Ninth Circuit created</a> a new Section 230 common law exception for &#8220;anti-competitive animus&#8221;&#8211;some undefined principle vaguely rooted in antitrust law. That allowed the case to survive the first motion to dismiss. The new exception has added no value to the jurisprudence. Instead, it casts a nebulous shadow over many Section 230 defenses.</li>
<li>The Supreme Court denied Malwarebyte&#8217;s appeal. Nevertheless, <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas issued a &#8220;statement&#8221;</a> in connection with that denial, which he self-admittedly wrote &#8220;without the benefit of briefing.&#8221; The statement mused about the ways Section 230 jurisprudence has gone wrong. Justice Thomas&#8217; statement is terrible, both procedurally and substantively. Despite that, Federalist Society judges treat the statement as more persuasive than, you know, actual precedent.</li>
<li>After remand, the case went back to the Ninth Circuit, which <a href="https://blog.ericgoldman.org/archives/2023/06/the-9th-circuit-keeps-trying-to-ruin-cybersecurity-enigma-v-malwarebytes.htm">held</a> that anti-threat classifications might be Lanham Act false advertising. Say what?</li>
</ul>
<p>Today I&#8217;m blogging the district court decision after that remand. The result is ugly. The court horks the law for a fourth time, reinforcing how this case is a wrecking ball to Internet Law. I really do hate this case.</p>
<p><strong>Lanham Act</strong></p>
<p><em>Commercial Advertising or Promotion</em>. The Lanham Act only applies to &#8220;commercial advertising or promotion.&#8221; This case reaches that question in an awkward fashion.</p>
<p>Malwarebytes offered try-before-you-buy software, which increases consumer demand by identifying a larger number of threats; that scares consumers into upgrading the free trial. (This need to get consumers to &#8220;act now&#8221; is one of the reasons why the D2C anti-threat software industry is dubious). In theory, Malwarebytes will boost conversions even more if it rates its competitors as threats, reducing their interest in the alternatives. Thus, if you squint, you might see how Malwarebyte&#8217;s classification of Enigma contributes to consumers&#8217; buying decisions.</p>
<p>This reasoning creates some problems, though. First, the same logic would extent to all of the threats identified in the try-before-you-buy experience, not just the threat designations of direct competitors (though non-competitors may not have Lanham Act standing). That putatively means that the court would characterize all threat identifications as &#8220;advertising.&#8221; Second, the classifications work in both the try-before-you-buy and the purchased software, so the classifications either are false advertising after the sale has been made (which makes no sense&#8211;the deal is done) or the exact same classifications have different legal statuses pre- and post-purchase. If it&#8217;s the latter, then treating editorial content offered on a try-before-you-buy basis as advertising seemingly allows false advertising plaintiffs to sue over what is clearly editorial content (which is what I think happens in this case).</p>
<p>Having been reversed twice by the Ninth Circuit in this case, the judge cautiously makes all of the inferences in favor of Enigma this time. Thus, we get statements like &#8220;there is no categorical rule that in-product statements are immune from Lanham Act claims.&#8221; That&#8217;s true, because common sense usually forecloses that question.</p>
<p>The court says Enigma&#8217;s allegations that &#8220;the challenged designations were made in a marketing context for a potential transaction&#8221; make this a &#8220;close question,&#8221; so the court uses the Bolger test for determining commercial speech.</p>
<p><em>Bolger Factor 1: Advertising</em></p>
<blockquote><p>the first Bolger factor—whether the statements are an advertisement—to fall slightly in favor of the conclusion that the challenged designations are commercial speech. Although the words at issue—“malicious” and “threat”—are not themselves advertisements, Enigma has alleged facts permitting an inference in its favor that Malwarebytes makes the speech in an advertising context. For example, Enigma alleges that the designations appear during a free trial period designed to showcase Malwarebytes’s product capabilities, so that the users experience “a marketing mechanism for Malwarebytes to entice users to ultimately purchase the Malwarebytes products.” Enigma also alleges that Malwarebytes displays the challenged speech directly alongside buttons with phrases such as “Upgrade Now.” Given these allegations, the Court finds that Malwarebytes’s labeling of Enigma’s competing anti-malware software as a “threat” or “malicious,” especially when combined with the button linking the user to a payment space, is an advertisement for purportedly superior MBAM products</p></blockquote>
<p>In support of the last sentence, the court cites <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Enigma v. Bleeping Computer</a>, where the court found that self-laudatory blog posts were ads. But this case involves the actual product itself, not promotional blog posts published independently of the product.</p>
<p>More generally: most commercially vended editorial items uses teasers/tasters as part of its marketing/advertising. Does this ruling indicate that doing so converts all of the editorial content into an ad for&#8230;the content itself? Consider an analogy: book publishers routinely give away free promotional copies of books to reviewers and others. If a book trashes a rival publisher and that part is included in a book excerpt used as marketing for the book, what result?</p>
<p><em>Bolger Factors 2 and 3: Reference to Specific Product and Economic Motivation</em>.</p>
<blockquote><p>Enigma alleges that Malwarebytes applied the challenged designations to Enigma’s SpyHunter 4 and RegHunter products within Malwarebytes’s own MBAM products, including AdwCleaner. Enigma also alleges that Malwarebytes has an economic motive to designate Enigma’s competing anti-malware products as “threats” and “malicious,” namely, to persuade users to buy MBAM products rather than Enigma’s competing anti-malware products, and thereby increase Malwarebytes’s sales, profits, and market position.</p></blockquote>
<p>These allegations are good enough to reach the counterintuitive conclusion that an anti-threat software vendor&#8217;s threat classification is a &#8220;commercial advertisement or promotion.&#8221; Mind-blowing.</p>
<p><em>Disseminated to the Public</em>.</p>
<blockquote><p>the SAC’s allegations permit an inference that Malwarebytes disseminated the challenged designations to the relevant purchasing public. First, Enigma alleges that Malwarebytes’s free version includes features such as protection from malicious websites for 14 days—after which the only function of the free version is to clean up an already-infected computer—and that Malwarebytes uses its free trial directly as a marketing mechanism for its paid MBAM products. Second, Enigma alleges that users who had already downloaded and installed its products and subsequently ran an MBAM scan would find Enigma’s products quarantined and labeled a “threat,” and that Malwarebytes users who sought to download and install Enigma products would also see the “threat” label and quarantine action.</p></blockquote>
<p><em>Falsity</em></p>
<blockquote><p>[Enigma] has sufficiently alleged that the designations of “threat” and “malicious” were materially deceptive to a substantial segment of the relevant purchasing population. Enigma alleges that it received hundreds of complaints from users of its products who had viewed Malwarebytes’s designations, and that the complaints included statements indicating that the users understood the designations to identify Enigma’s products as malware.</p></blockquote>
<p>The New York false advertising and tortious interference claims also survive the motion to dismiss.</p>
<p><strong>Implications</strong></p>
<p>Kudos, I guess, to Enigma&#8217;s lawyers. Having lost twice in the district court, they turned it around on the third try. In particular, they more compellingly won the battle over the narratives. Storytelling FTW.</p>
<p>I assume this case is headed back to the Ninth Circuit for the third time. How much money do these litigants have to fight a court battle over nearly a decade?</p>
<p>However much money they had, this case is a cautionary tale about the legal risks of anti-threat classifications. I imagine that most anti-threat software vendor will never again classify another anti-threat software vendor as malicious, a threat, or a PUP, even if those classifications are entirely appropriate and in consumers&#8217; best interests. This is how the courts&#8211;especially the Ninth Circuit&#8211;have been indirectly undermining cybersecurity.</p>
<p><em>Case Citation</em>: <a href="https://business.cch.com/ald/EnigmaSoftwareGroupUSALLCvMalwarebytesInc672024.pdf">Enigma Software Group USA, LLC v. Malwarebytes, Inc.</a>, 2024 WL 2883671 (N.D. Cal. June 6, 2024). Prof. Tushnet&#8217;s <a href="https://tushnet.blogspot.com/2024/06/is-free-trial-version-commercial-speech.html">coverage</a>.</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://business.cch.com/ald/EnigmaSoftwareGroupUSALLCvMalwarebytesInc672024.pdf">District court opinion</a> on the second Ninth Circuit remand. <a href="https://blog.ericgoldman.org/archives/2024/06/this-case-keeps-wrecking-internet-law-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="https://cdn.ca9.uscourts.gov/datastore/opinions/2023/06/02/21-16466.pdf">Ninth Circuit reversal</a>. <a href="https://blog.ericgoldman.org/archives/2023/06/the-9th-circuit-keeps-trying-to-ruin-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">District Court dismissal</a> on remand. <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">Blog post</a>.</li>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas’ statement. <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2024/06/this-case-keeps-wrecking-internet-law-enigma-v-malwarebytes.htm">This Case Keeps Wrecking Internet Law&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26457</post-id>	</item>
		<item>
		<title>Web Page Framing Isn&#8217;t Trespass to Chattels&#8211;Best Carpet Values v. Google</title>
		<link>https://blog.ericgoldman.org/archives/2024/01/web-page-framing-isnt-trespass-to-chattels-best-carpet-values-v-google.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Fri, 12 Jan 2024 18:20:06 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=25943</guid>

					<description><![CDATA[<p>This case is an old-school turn-of-the-century throwback (and not the good kind). Google&#8217;s search app framed the web pages users visit, and the frame included ads. Some screenshots depicting the framing (the first image shows Google&#8217;s superimposed frame on the...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2024/01/web-page-framing-isnt-trespass-to-chattels-best-carpet-values-v-google.htm">Web Page Framing Isn&#8217;t Trespass to Chattels&#8211;Best Carpet Values v. Google</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This case is an old-school turn-of-the-century throwback (and not the good kind). Google&#8217;s search app framed the web pages users visit, and the frame included ads. Some screenshots depicting the framing (the first image shows Google&#8217;s superimposed frame on the right; the second shows what happens if users click on the frame in the first image):</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1.jpg"><img loading="lazy" decoding="async" class="aligncenter size-medium_large wp-image-23159" src="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-768x506.jpg" alt="" width="768" height="506" srcset="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-768x506.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-300x197.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-1024x674.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1.jpg 1159w" sizes="auto, (max-width: 768px) 100vw, 768px" /></a></p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23160" src="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg" alt="" width="420" height="695" srcset="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg 420w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2-181x300.jpg 181w" sizes="auto, (max-width: 420px) 100vw, 420px" /></a></p>
<p>If this issue sounds familiar, it&#8217;s because framing generated huge discussion in Internet Law circles&#8230;.20+ years ago. The plaintiffs lost all of the framing cases then, but here we are in 2024, still litigating framing cases. #YOLO.</p>
<p>Why are we revisiting this crusty old topic? The plaintiffs in this case apparently thought they were more clever than everyone else who looked at this issue over the past quarter-century. Instead of asserting copyright and trademark claims, they tried trespass to chattels. Voila! It was an audaciously mockable pivot&#8230;and yet, the district court judge shockingly bought the argument. My <a href="https://blog.ericgoldman.org/archives/2021/10/if-trespass-to-chattels-isnt-limited-to-chattels-anarchy-ensues-best-carpet-values-v-google.htm">angst-filled blog post</a> on that ruling.</p>
<p>Fortunately, the status quo has been restored. The Ninth Circuit concludes, as everyone knew, that framing isn&#8217;t trespass to chattels.  Unfortunately, the court expresses this intuitively obvious result in a baroque, technical, and inaccessible opinion.</p>
<p><strong>Trespass to Chattels</strong></p>
<p>I teach my Internet Law students that the first step in the prima facie trespass to chattels analysis is to identify the chattel at issue. In a framing case, the plaintiffs&#8217; web servers aren&#8217;t the affected chattel because the plaintiffs&#8217; web servers delivered the web pages directly to users&#8217; devices, after which the framer (Google) superimposed its frame on the web pages once the copies were in users&#8217; RAM. Thus, the framer never interferes with the web servers.</p>
<p>The district court said the &#8220;website&#8221; was the chattel. This is the kind of ambiguous generalization I see on Internet Law final exams that get a C. By using an overly general descriptor, the analysis can sidestep key (and legally significant) technical distinctions. In this situation, the generic noun &#8220;website&#8221; collapses several different elements: the website hardware (the servers), the domain name, the web pages as electronic files, the web pages&#8217; HTML code, the web pages&#8217; substantive content, and more. In other words, the district court judge was imprecise about exactly what chattel was being trespassed.</p>
<p>The Ninth Circuit fixes that obvious error, saying the chattel in question &#8220;are the copies of Plaintiffs’ websites.&#8221; Even this correction is suboptimal. The &#8220;copies&#8221; in question are not copies in the abstract sense. They are the electronic copies of requested web pages that reside in the web user&#8217;s device RAM.</p>
<p>Once we qualify the copies as &#8220;electronic,&#8221; it becomes unmistakable that this case deals with intangible items, not traditional &#8220;chattel&#8221; that are, by definition, tangible items. For that reason, the Ninth Circuit could have easily said that electronic files categorically aren&#8217;t chattel and the trespass to chattels doctrine *never* applies to any manipulation of or interference with electronic files.</p>
<p>Instead of taking such a clean and intuitive approach, the court says that the plaintiffs don&#8217;t have any possessory interests in the electronic copies of their web pages once delivered to users&#8217; devices:</p>
<blockquote><p>Under Plaintiffs’ theory, they maintain a possessory interest in an intangible copy that (1) is created when a user visits a website via the Search App, (2) exists on the user’s device, and (3) is deleted by the user when they leave the page. Plaintiffs’ possessory interest is thus entirely dependent on actions taken by an individual user unassociated with Plaintiffs or their websites. A possessory interest does not lie under these circumstances.</p></blockquote>
<p>I guess? This is a bass-ackward way of discussing the issue. We&#8217;re talking about electronic bits zinging around the network, and it&#8217;s mostly nonsensical to talk about who &#8220;possesses&#8221; those electronic bits. Worse, it&#8217;s not clear the users have a &#8220;possessory interest&#8221; in those bits due to the possibility that copyright and contract law that may limit what users can do with those bits. What if no one has a &#8220;possessory interest&#8221; in those bits? What are we even talking about?</p>
<p>The Ninth Circuit takes this baffling approach in part due to the 20-year-old Sex.com case (Kremen v. Cohen), which held that a domain name could be &#8220;converted.&#8221; Domain names are also intangible, as are the records documenting domain name ownership, yet the court held they were capable of being converted. Accordingly, the Kremen case has long vexed the trespass to chattels jurisprudence by collapsing the distinction between intangibles and tangibles for property law purposes. However, I think there are numerous ways a court could distinguish between an electronic record that determines purported ownership and the many other types of electronic files, ranging from Word documents on my hard drive to web pages floating around the Internet.</p>
<p>Instead, to honor precedent, the Ninth Circuit applies the ill-suited three-element Kremen test to decide when intangibles qualify as chattels:</p>
<p>1) &#8220;an interest capable of precise definition.&#8221; The court says &#8220;there is no single way to display a website copy.&#8221; That&#8217;s true. In my prior blog post, I said: &#8220;Underlying this litigation is an epistemological question: what does a “canonical” version of a web page look like? Every browser software makes its own choices about how to render a page; every browser software “frames” every web page with its software features; and every browser software lets users configure the display in ways that affect website owners’ expectations.&#8221; The Ninth Circuit explains:</p>
<blockquote><p>This translation of website code into a visual appearance necessarily varies across browsers and devices. Plaintiffs respond that the lack of a fixed display does not defeat their property interest. Although in Kremen we held that updating records in a document did not defeat a finding of a property interest, Plaintiffs’ argument elides the core inquiry of the “capable of precise definition” part. California law requires that the property interest be “well-defined” and “like staking a claim to a plot of land at the title office.” A website copy possesses neither of these qualities</p></blockquote>
<p>2) &#8220;it must be capable of exclusive possession or control.&#8221; The court says:</p>
<blockquote><p>once the website copy is generated and sent to the user’s device, users have control over what to do with it—whether to click on a link on Plaintiffs’ sites, resize the page, navigate away from the page themselves, or click on one of the links provided in the results</p></blockquote>
<p>This is true as a technical matter, but is it true as a legal matter? Copyright and contract law that may restrict legally what the user may do with the &#8220;copies&#8221; that are now resident in the device RAM.</p>
<p>3) &#8220;the putative owner must have established a legitimate claim to exclusivity.&#8221; The court says &#8220;Plaintiffs themselves recognize that they do not control how their websites are displayed on different devices or web browsers.&#8221;</p>
<p>The Kremen test is so obviously ill-fitting to this inquiry, but the court gets to the right place: &#8220;there is no cognizable property interest in website copies that may serve as the basis for a trespass to chattels claim under California law.&#8221;</p>
<p><strong>Implied-in-Law Contract/Unjust Enrichment</strong></p>
<p>The court says that these state law claims are preempted by copyright law. As I&#8217;ve already indicated, copyright law casts a huge shadow over any litigation about the disposition of web pages. To reinforce the point, the court says: &#8220;a commercial website, like computer software, may qualify for copyright protection.&#8221;</p>
<p>[Notice that, like the district court, the 9th Circuit misuses the generic descriptor &#8220;commercial website&#8221; in a way that collapses the many disparate component parts. I guarantee that copyright owners will quote this statement to improperly assert ownership over uncopyrightable components of their &#8220;commercial websites.&#8221; The 9th Circuit just chided the district court for sloppy nomenclature, then it makes the exact same error. Why is this so hard??? SIGH.]</p>
<p>As for the claims&#8217; equivalency to copyright law:</p>
<blockquote><p>We need not decide whether it is more appropriate to characterize Plaintiffs’ Complaint as implicating rights to (a) display or reproduce copies or (b) prepare derivative works because the Complaint invokes both rights and both rights are recognized under federal copyright law. Plaintiffs alleged that Search App “obtains a copy of the requested website page from the host web server and delivers the copy to the user by translating the website’s codes” and then “recreat[es] the website page on the user’s . . . mobile device screen.” Displaying and reproducing a copy of a copyrighted work (Plaintiffs’ website) falls squarely within the scope of 17 U.S.C. § 106. Plaintiffs further alleged that Search App “superimpose[ed] advertisements on their websites’ homepages and other landing pages” when displayed on screens. Google’s reproductions of Plaintiffs’ websites, which necessarily vary in appearance on users’ screens, can be recognized as an act of “prepar[ing]” “derivative works.” Either way, these allegations implicate the exclusive rights to copyright holders bestowed by federal statute.</p></blockquote>
<p>The claims didn&#8217;t have the requisite &#8220;extra element&#8221; to overcome preemption because these claims were really just repackaged copyright claims.</p>
<p><strong>Implications</strong></p>
<p>Let&#8217;s start with the good news. The Ninth Circuit fixed the misguided district court ruling and reached the common-sense outcome that electronic files can&#8217;t be trespassed. This has the salutary effect of reinstating the status quo that web browser framing is legal.</p>
<p>Now, the less-good news.</p>
<p>First, this opinion requires mental gymnastics because sometimes intangible assets are legally treated as chattel (like domain name records). That outcome makes sense, but the collapse of the legal distinctions between intangibles and tangible assets ensures ongoing jurisprudential tensions.</p>
<p>Second, we desperately need more clarity on the Ninth Circuit&#8217;s positions regarding trespass to chattels in the wake of the <a href="https://blog.ericgoldman.org/archives/2022/12/as-everyone-expected-years-ago-hiqs-cfaa-wins-dont-mean-it-can-freely-scrape-hiq-v-linkedin-guest-blog-post-part-1-of-2.htm">hiQ v. LinkedIn chaos</a>. I tried to teach the topic in my Fall Internet Law course and left the students with so many unanswered questions that they loudly complained that they didn&#8217;t understand the state of the law. (In fact, the students&#8217; confusion was confirmation that they actually did understand the situation just fine, but it wasn&#8217;t satisfying to them). I&#8217;ve declared the trespass to chattels doctrine &#8220;unteachable&#8221; in its current status. Unfortunately, this opinion doesn&#8217;t do anything to clean up that doctrinal mess.</p>
<p>Third, the court&#8217;s decision also sidesteps the obvious issues with the jurisprudential line of web-browsing-as-copyright-infringement. If downloading the electronic copy implicates copyright law, could that copyright interest be weaponized to control the user&#8217;s use of framing or the framer&#8217;s activities? Under prevailing law, that question isn&#8217;t as ridiculous as it might sound.</p>
<p>Finally, I&#8217;ll note the parallels between this case and the Edible IP case in Georgia state court, where local lawyers claimed that Google&#8217;s keyword advertising program &#8220;converted&#8221; their intangible assets (their trademark/goodwill). <a href="https://blog.ericgoldman.org/archives/2022/02/georgia-supreme-court-blesses-googles-keyword-ad-sales-edible-ip-v-google.htm">That lawsuit also failed</a>. To me, it&#8217;s a sign of desperation, not cleverness, when plaintiffs&#8217; lawyers try to extrapolate offline physical-space doctrines to the intangible activities on the Internet.</p>
<p><em>Case Citation</em>: <a href="https://cdn.ca9.uscourts.gov/datastore/opinions/2024/01/11/22-15899.pdf">Best Carpet Values, Inc. v. Google LLC</a>, No. 22-15899 (9th Cir. Jan. 11, 2024)</p>
<p><em>Selected Related Blog Posts</em></p>
<p>* <a title="If “Trespass to Chattels” Isn’t Limited to “Chattels,” Anarchy Ensues–Best Carpet Values v. Google" href="https://blog.ericgoldman.org/archives/2021/10/if-trespass-to-chattels-isnt-limited-to-chattels-anarchy-ensues-best-carpet-values-v-google.htm" rel="bookmark">If “Trespass to Chattels” Isn’t Limited to “Chattels,” Anarchy Ensues–Best Carpet Values v. Google</a><br />
* <a href="https://blog.ericgoldman.org/archives/2022/02/georgia-supreme-court-blesses-googles-keyword-ad-sales-edible-ip-v-google.htm">Georgia Supreme Court Blesses Google’s Keyword Ad Sales–Edible IP v. Google</a><br />
* <a title="Creditors Can’t Seize Country Code Top Level Domains" href="https://blog.ericgoldman.org/archives/2014/11/creditors-cant-seize-country-code-top-level-domains.htm" rel="bookmark">Creditors Can’t Seize Country Code Top Level Domains</a><br />
* <a title="Ohio Appeals Court: GoDaddy can be Held Liable for Wrongly Transferring Control Over Domain Name and Email Accounts — Eysoldt v. ProScan" href="https://blog.ericgoldman.org/archives/2011/05/ohio_appeals_co_1.htm" rel="bookmark">Ohio Appeals Court: GoDaddy can be Held Liable for Wrongly Transferring Control Over Domain Name and Email Accounts — Eysoldt v. ProScan</a><br />
* <a title="Internet Rewards Program Class Action Survives Initial Motion to Dismiss — In re Easysaver Rewards" href="https://blog.ericgoldman.org/archives/2010/08/in_re_easysaver.htm" rel="bookmark">Internet Rewards Program Class Action Survives Initial Motion to Dismiss — In re Easysaver Rewards</a><br />
* <a title="Ninth Circuit Applies California law to Domain Name Ownership Dispute and Remands for Determination of Whether “Innocent Purchaser” Defense Applies — CRS Recovery, Inc. v. Laxton" href="https://blog.ericgoldman.org/archives/2010/04/ninth_circuit_c.htm" rel="bookmark">Ninth Circuit Applies California law to Domain Name Ownership Dispute and Remands for Determination of Whether “Innocent Purchaser” Defense Applies — CRS Recovery, Inc. v. Laxton</a><br />
* <a title="Ninth Circuit: Creditor Can Execute Against Domain Name Where Registry is Located — Office Depot v. Zuccarini" href="https://blog.ericgoldman.org/archives/2010/03/ninth_circuit_f.htm" rel="bookmark">Ninth Circuit: Creditor Can Execute Against Domain Name Where Registry is Located — Office Depot v. Zuccarini</a><br />
* <a title="Domain Names as Property Subject to Creditor Claims–Bosh v. Zavala" href="https://blog.ericgoldman.org/archives/2009/10/domain_names_as_1.htm" rel="bookmark">Domain Names as Property Subject to Creditor Claims–Bosh v. Zavala</a><br />
* <a title="Taking Intangible Electronic Files is Criminal Fraud–NM v. Kirby" href="https://blog.ericgoldman.org/archives/2007/08/taking_intangible.htm" rel="bookmark">Taking Intangible Electronic Files is Criminal Fraud–NM v. Kirby</a><br />
* <a title="Sex.com — An Update" href="https://blog.ericgoldman.org/archives/2006/10/sexcom_an_updat.htm" rel="bookmark">Sex.com — An Update</a></p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2024/01/web-page-framing-isnt-trespass-to-chattels-best-carpet-values-v-google.htm">Web Page Framing Isn&#8217;t Trespass to Chattels&#8211;Best Carpet Values v. Google</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25943</post-id>	</item>
		<item>
		<title>The 9th Circuit Keeps Trying to Ruin Cybersecurity&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2023/06/the-9th-circuit-keeps-trying-to-ruin-cybersecurity-enigma-v-malwarebytes.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sun, 18 Jun 2023 16:34:29 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Privacy/Security]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=25140</guid>

					<description><![CDATA[<p>This case involves two anti-threat software vendors, Enigma and Malwarebytes. In 2016, Malwarebytes classified Enigma&#8217;s software as &#8220;malicious,&#8221; a &#8220;threat,&#8221; and a &#8220;potentially unwanted program&#8221; (or PUP), because the programs allegedly were &#8220;scareware.&#8221; Enigma challenged Malwarebytes&#8217; classifications in court. Initially,...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2023/06/the-9th-circuit-keeps-trying-to-ruin-cybersecurity-enigma-v-malwarebytes.htm">The 9th Circuit Keeps Trying to Ruin Cybersecurity&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2023/06/grumpy-cat-cybersecurity.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-25199" src="https://blog.ericgoldman.org/wp-content/uploads/2023/06/grumpy-cat-cybersecurity-243x300.jpg" alt="" width="243" height="300" srcset="https://blog.ericgoldman.org/wp-content/uploads/2023/06/grumpy-cat-cybersecurity-243x300.jpg 243w, https://blog.ericgoldman.org/wp-content/uploads/2023/06/grumpy-cat-cybersecurity.jpg 500w" sizes="auto, (max-width: 243px) 100vw, 243px" /></a>This case involves two anti-threat software vendors, Enigma and Malwarebytes. In 2016, Malwarebytes classified Enigma&#8217;s software as &#8220;malicious,&#8221; a &#8220;threat,&#8221; and a &#8220;potentially unwanted program&#8221; (or PUP), because the programs allegedly were &#8220;scareware.&#8221;</p>
<p>Enigma challenged Malwarebytes&#8217; classifications in court. Initially, Malwarebytes defended on Section 230(c)(2)(B). The Ninth Circuit <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">rejected that defense</a>, in the process creating a new and totally unhelpful common law exception to Section 230 for &#8220;anti-competitive animus.&#8221;</p>
<p>Malwarebytes appealed the 9th Circuit&#8217;s ruling, first to the 9th Circuit en banc, and then to the US Supreme Court. (I helped file <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3484314">an amicus brief supporting cert</a>). Along with the cert denial, <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas issued a statement</a>, &#8220;without the benefit of briefing,&#8221; explaining his eagerness to eviscerate Section 230. Interestingly, <a href="https://blog.ericgoldman.org/archives/2023/05/the-internet-survives-scotus-review-this-time-twitter-v-taamneh-and-gonzalez-v-google.htm">the Gonzalez and Taamneh decisions</a> showed how briefing does actually benefit the justices.</p>
<p>This case already wrecked Section 230 twice, but it seemed ultimately inconsequential when the district court dismissed it on remand. And then&#8230;the Ninth Circuit got the case again&#8230;</p>
<p><em>The Majority Opinion</em></p>
<p>After the Supreme Court cert denial, the district court ruled that Malwarebytes&#8217; &#8220;malicious&#8221; and &#8220;threat&#8221; classifications were “non-actionable statements of opinion” and thus could not support a Lanham Act false advertising claim. On appeal, the majority responds:</p>
<blockquote><p>its products either contain malicious files and threaten the security of users’ computers, or they do not. These statements are not the type of general, subjective claims typically deemed non-actionable opinions</p></blockquote>
<p>Threats lie on a spectrum. It&#8217;s not binary at all.</p>
<p>The majority continues:</p>
<blockquote><p>Malwarebytes’s anti-malware program specifically labeled Enigma’s software as “malicious” and a “threat,” which a reasonable person would plausibly interpret as the identification of malware.</p></blockquote>
<p>The majority did not provide any citations for &#8220;a reasonable person&#8217;s&#8221; beliefs. How does the majority know this to be true?</p>
<p>If &#8220;malicious&#8221; and &#8220;threat&#8221; are objective statements of fact, what exactly do they mean? The majority makes a slippery and dubious rhetorical move to define &#8220;malware&#8221; instead, citing the OED:</p>
<blockquote><p>Malware, in its ordinary meaning, refers to software “written with the intent of being disruptive or damaging to (the user of) a computer or other electronic device; viruses, worms, spyware, etc., collectively.”</p></blockquote>
<p>OK, but Malwarebytes didn&#8217;t classify Enigma&#8217;s software as &#8220;malware,&#8221; so why is this relevant? The majority explains that Malwarebytes&#8217; &#8220;threat scan&#8221; referred to &#8220;malware,&#8221; but is Enigma suing over the threat scan, the classifications, or whatever scrap of public disclosures it can find? In other words, the majority didn&#8217;t have to make this rhetorical shift to debating &#8220;malware,&#8221; and it did so only to reach its desired result.</p>
<p>Also, the definition of &#8220;malware&#8221; itself includes vague terms, like &#8220;disruptive&#8221; and &#8220;damaging&#8221;&#8211;and an &#8220;etc.&#8221; Both lay people and cybersecurity experts could fiercely debate when a software program qualifies as &#8220;malware,&#8221; yet the court treats it as an easy binary yes/no classification.</p>
<p>Digging deeper, the majority says the dictionary definition of &#8220;malware&#8221; &#8220;necessarily implies that someone created software with the intent to gain unauthorized access to a computer for some nefarious purpose.&#8221; NOT HELPFUL. What constitutes &#8220;unauthorized access&#8221; is itself a jurisprudential morass (see, e.g., every CFAA ruling since <a href="https://blog.ericgoldman.org/archives/2021/06/do-we-even-need-the-computer-fraud-abuse-act-cfaa-van-buren-v-us.htm">Van Buren</a>), and it&#8217;s not credible to use any definition with the phrase &#8220;some nefarious purpose.&#8221;</p>
<p>The majority summarizes this discussion: &#8220;judges are not experts in the cybersecurity field. We should not presume that we are.&#8221; That&#8217;s true, yet the majority made confident, decisive, and empirical conclusions about &#8220;malicious,&#8221; &#8220;threats,&#8221; and &#8220;malware&#8221; that the cybersecurity community would vigorously debate.</p>
<p>In another surprise, the majority revives the tortious interference claim because allegedly &#8220;Malwarebytes induced Enigma’s customers to choose either not to install, or to delete, Enigma’s programs from their computers without any legitimate justification.&#8221;</p>
<p><em>The Dissent</em></p>
<p>The dissent says: &#8220;this should have been an easy affirm.&#8221; <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f3af.png" alt="🎯" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The dissent rejects the majority&#8217;s characterization that threat determinations are binary:</p>
<blockquote><p>A software program isn’t verifiably a “threat” or not. And a website isn’t measurably “malicious” or not. In the cybersecurity context, these terms refer to a spectrum of digital features with no verifiable line to cross to determine when they apply&#8230;</p>
<p>nowhere does Enigma offer an objective, measurable definition of the warnings&#8230;</p>
<p>Enigma’s identification of multiple meanings for “threats” by itself shows that the term represents an opinion rather than a fact.</p></blockquote>
<p><em>Implications</em></p>
<p>This case is approaching its 7 year anniversary, yet it is still only at the motion to dismiss stage. The lawsuit&#8217;s lengthy duration and high defense cost has significant substantive implications. In the face of those costs and resources, any profit-maximizing vendor will act conservatively when making classifications that could launch a multi-year litigation war; i.e., if in doubt, approve the software&#8211;especially if the software can claim to be a competitor, pretextually or not&#8211;even if it&#8217;s actually a trojan like scareware. These skewed economic incentives give more room for malicious or threatening software to bypass our anti-threat protections. That undermines cybersecurity for all of us.</p>
<p>The deleterious consequences for cybersecurity highlight the tragedy of the 9th Circuit&#8217;s prior error on Section 230(c)(2)(B). Congress statutorily told the courts that anti-threat vendors can make classifications without worrying about lengthy court battles. <a href="https://www.ericgoldman.org/Speeches/caprivacylawsdec2013.pdf?time=20230430095422">Everyone benefits from predictable safe harbors and immunities</a> that resolve meritless cases early. The 9th Circuit keeps misunderstanding that basic point:</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2023/06/lennon-give-plaintiffs-a-chance.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25200" src="https://blog.ericgoldman.org/wp-content/uploads/2023/06/lennon-give-plaintiffs-a-chance.jpg" alt="" width="500" height="500" srcset="https://blog.ericgoldman.org/wp-content/uploads/2023/06/lennon-give-plaintiffs-a-chance.jpg 500w, https://blog.ericgoldman.org/wp-content/uploads/2023/06/lennon-give-plaintiffs-a-chance-300x300.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2023/06/lennon-give-plaintiffs-a-chance-150x150.jpg 150w" sizes="auto, (max-width: 500px) 100vw, 500px" /></a></p>
<p>What&#8217;s next for this case? I assume Malwarebytes will request a rehearing en banc. A rehearing would be appropriate because the deciding vote was cast by a visiting judge, not a regular 9th Circuit judge. Also, the dissent made excellent points. Whether the 9th Circuit hears it en banc or not, I assume this case will again head to the Supreme Court. It could be years more until a final resolution.</p>
<p>If the case goes back in the district court for a third time, I expect the district court will dismiss it again. In particular, the court hasn&#8217;t ruled on whether a threat classification constitutes the kind of commercial speech that the Lanham Act governs. Based on the fundamental illogic of its litigation position, I see no way for Enigma to win here. At least, for the sake of cybersecurity, I hope not.</p>
<p><em>Case citation</em>: <a href="https://cdn.ca9.uscourts.gov/datastore/opinions/2023/06/02/21-16466.pdf">Enigma Software Group USA, LLC v. Malwarebytes, Inc.</a>, 2023 WL 3769331 (9th Cir. June 2, 2023)</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://cdn.ca9.uscourts.gov/datastore/opinions/2023/06/02/21-16466.pdf">Ninth Circuit reversal</a>. Blog post.</li>
<li><a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">District Court dismissal</a> on remand. <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">Blog post</a>.</li>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas’ statement. <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2023/06/the-9th-circuit-keeps-trying-to-ruin-cybersecurity-enigma-v-malwarebytes.htm">The 9th Circuit Keeps Trying to Ruin Cybersecurity&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25140</post-id>	</item>
		<item>
		<title>If &#8220;Trespass to Chattels&#8221; Isn&#8217;t Limited to &#8220;Chattels,&#8221; Anarchy Ensues&#8211;Best Carpet Values v. Google</title>
		<link>https://blog.ericgoldman.org/archives/2021/10/if-trespass-to-chattels-isnt-limited-to-chattels-anarchy-ensues-best-carpet-values-v-google.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Tue, 19 Oct 2021 16:50:57 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Domain Names]]></category>
		<category><![CDATA[Internet History]]></category>
		<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Trademark]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=23158</guid>

					<description><![CDATA[<p>Trigger warning: this is a terrible opinion. Let&#8217;s hope the judge corrects his errors or that the appeals court does it for him. * * * This opinion addresses a venerable issue in Internet Law: can a website control how...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2021/10/if-trespass-to-chattels-isnt-limited-to-chattels-anarchy-ensues-best-carpet-values-v-google.htm">If &#8220;Trespass to Chattels&#8221; Isn&#8217;t Limited to &#8220;Chattels,&#8221; Anarchy Ensues&#8211;Best Carpet Values v. Google</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Trigger warning: this is a terrible opinion. Let&#8217;s hope the judge corrects his errors or that the appeals court does it for him.</p>
<p style="text-align: center;">* * *</p>
<p>This opinion addresses a venerable issue in Internet Law: can a website control how visitors see its web pages? I first remember this issue flaring up in the late 1990s when <a href="https://en.wikipedia.org/wiki/Third_Voice">Third Voice</a>, a browser plug-in, let users write commentary &#8220;over&#8221; third-party websites. That sparked angst among website operators who couldn&#8217;t control what users were saying about them in the Third Voice frame. Third Voice was followed by adware vendors such as <a href="https://en.wikipedia.org/wiki/AllAdvantage">AllAdvantage</a>, which framed third-party websites, displayed ads in the frame, and shared some ad revenue with users (its tagline: &#8220;Get Paid to Surf the Web&#8221;). Gator, WhenU, and other adware vendors followed. By its nature, adware changes the screen display of the sites users are visiting. A series of lawsuits from two decades ago covered some important ground regarding the ability of website owners to block adware. Wells Fargo v. WhenU concluded that copyright was a dead-end. 1-800 Contacts v. WhenU concluded that trademarks was a dead-end. Nevertheless, because adware often provided poor consumer experiences, adware largely fizzled out by 2010. As a result, the legal issues rarely are litigated any more.</p>
<p style="text-align: center;">* * *</p>
<p>The court approaches this case like it&#8217;s an adware case, but the court never once uses the term. The issue is that Google incorporated a new feature into its Android software. You can see how it modified a website&#8217;s display in these before/after screenshots (the component at issue is the &#8220;view 15 related pages&#8221; bar on the bottom right):</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23159" src="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1.jpg" alt="" width="1159" height="763" srcset="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1.jpg 1159w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-300x197.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-1024x674.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-1-768x506.jpg 768w" sizes="auto, (max-width: 1159px) 100vw, 1159px" /></a>As you can see, the new bar covers up the &#8220;cove base&#8221; line. If a user selects the up arrow, a new screen covers up most of the web page and displays links to rival vendors:</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23160" src="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg" alt="" width="420" height="695" srcset="https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2.jpg 420w, https://blog.ericgoldman.org/wp-content/uploads/2021/10/best-carpet-2-181x300.jpg 181w" sizes="auto, (max-width: 420px) 100vw, 420px" /></a>Google has since dropped this feature.</p>
<p>The plaintiffs alleged that the prior screenshot contains ads, which turns this case into an adware case. But the screenshot doesn&#8217;t label the listings as &#8220;ads,&#8221; so either Google uncharacteristically cut that corner or these listings are organic search results, and this isn&#8217;t an adware case at all. I&#8217;m going to characterize Google&#8217;s feature as an &#8220;adware bar&#8221; because the court accepts the plaintiffs&#8217; allegations as true on a motion to dismiss, but I wonder if that characterization will withstand further scrutiny.</p>
<p>Underlying this litigation is an epistemological question: what does a &#8220;canonical&#8221; version of a web page look like? Every browser software makes its own choices about how to render a page; every browser software &#8220;frames&#8221; every web page with its software features; and every browser software lets users configure the display in ways that affect website owners&#8217; expectations. As just one example of the latter point, browser software programs let users magnify or shrink the display size, so what appears above/below the fold critically depends on user configuration, not just the website operator&#8217;s choices.</p>
<p>For this reason, if courts want to assess the veracity of the plaintiffs&#8217; claim that the &#8220;cove base&#8221; link gets covered up, judges must assume how a canonical version of a web page appears. For example, in the &#8220;before&#8221; image above, the court doesn&#8217;t explain the source of the screenshot, what technological conditions it reflects, and how often those conditions will hold in the field. Thus, a court&#8217;s hypothesis may have no grounding in reality. It also strips users of their own agency to decide what browsing tools best serve their needs and how best to configure those tools.</p>
<p style="text-align: center;">* * *</p>
<p>In this lawsuit, the plaintiffs aren&#8217;t suing Google for violating their copyrights or trademarks. With respect to copyright, the court says: &#8220;Plaintiffs do not rely on copyright protection for their websites in pleading their claim&#8230;Plaintiffs are not asserting infringement of any right to the reproduction, performance, distribution, or display of their websites. Plaintiffs want and expect Google to copy and display their websites in Chrome browser and Search App, and acknowledge that Google has license to do so.&#8221;</p>
<p>Wait, what? We need to know more about this license. If a website &#8220;permits&#8221; browser software to display them (assuming such permission is even required in the first place, and assuming that permission isn&#8217;t automatically granted by connecting the website to the web), then a website can&#8217;t control the browser software configurations. It seems like this license could be dispositive to the case, but the court doesn&#8217;t explore it more.</p>
<p><em>Trespass to Chattels</em></p>
<p>The plaintiffs instead claim that the adware bar constitutes a trespass to chattels. However, Google&#8217;s adware bar never interacts with the plaintiffs&#8217; physical servers at all. As the court says, &#8220;None of Plaintiffs’ websites, files, or data were physically altered in any way. Nor were Plaintiffs’ servers disrupted.&#8221; Instead, the adware bar&#8217;s display customization takes place solely on the user&#8217;s device, supplementing how the code renders on the device. So the &#8220;chattel&#8221; at issue here isn&#8217;t the website operator&#8217;s servers; it&#8217;s the HTML code that the website operators send to each user&#8217;s device (and gave Google permission to display).</p>
<p>If the &#8220;chattel&#8221; at issue is only the intangible HTML code, then no &#8220;chattels&#8221; are being trespassed. It&#8217;s not possible to &#8220;trespass&#8221; an intangible asset; any legal protection for the asset comes from contract law (but the plaintiffs gave a license) or IP law, such as copyright law, which the plaintiffs aren&#8217;t invoking. Thus, given that &#8220;intangible chattel&#8221; is a legal oxymoron, a lawsuit over &#8220;trespassing HTML code&#8221; should fail hard. It didn&#8217;t.</p>
<p>Citing a 2003 Ninth Circuit case, <a href="https://scholar.google.com/scholar_case?case=15611404279848499657&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr">Kremen v. Cohen</a>, the court says &#8220;a website can be the subject of a trespass to chattels claim.&#8221; This abstract statement requires more clarification. The Kremen case involved the alleged theft of the sex.com domain name by improperly modifying the electronic records evidencing ownership of the domain name. The Ninth Circuit held that the intangible asset (the domain name) could be &#8220;converted,&#8221; even though normally conversion only applies to chattel (i.e., physical property), not intangibles. We need legal doctrines to redress the improper hijacking of the monetary value of owning a domain name, just like we would redress the improper acquisition of monetary value stored in an online bank or cryptocurrency account. Thus, other cases have applied conversion law to alleged theft of domain name registrations (e.g., <a href="https://blog.ericgoldman.org/archives/2010/04/ninth_circuit_c.htm">CRS v. Laxton</a>).</p>
<p>But the Kremen case didn&#8217;t say that all of a website&#8217;s intangible assets are like tangible assets. If it had, it would have eliminated the distinctions between IP law and the law of chattels.</p>
<p>So when this court says &#8220;Plaintiffs have property rights to their websites for the same reasons a registrant has property rights to a domain name,&#8221; I have no idea what it means. A website can sometimes control access to its servers (see <a href="https://blog.ericgoldman.org/archives/2021/06/do-we-even-need-the-computer-fraud-abuse-act-cfaa-van-buren-v-us.htm">the Van Buren case</a>). A website can own the copyrights to the HTML code and the files that users download. Website owners can prevent the unauthorized reassignment of their ownership interests, such as someone trying to modify their copyright registration records. But the broad statement &#8220;property rights to their websites&#8221; is mostly wrong.</p>
<p>To find the HTML code&#8217;s physicality necessary to treat it like a chattel, the court makes this garbled statement:</p>
<blockquote><p>like a domain name, a website is a form of intangible property that has a connection to an electronic document. “A website is a digital document built with software and housed on a computer called a ‘web server,’ which is owned or controlled in part by the website’s owner.  website occupies physical space on the web server, which can host many other documents as well.” Compl. ¶ 34. Plaintiffs’ website is also connected to the DNS through its domain name, bestcarpetvalue.com, just as Kremen’s domain name was connected to the DNS.</p></blockquote>
<p>This is very, very confused. My copyrighted works may be printed on physical pages, but that doesn&#8217;t mean a third-party&#8217;s encroachment into my intangible copyrights becomes trespass to chattels. That&#8217;s the purview of copyright&#8211;or not restricted at all. And the linkage to the domain name record is nonsensical because the domain name wasn&#8217;t &#8220;taken,&#8221; and indeed the website operator gave a license to display it. The court even acknowledges that its line of logic has been rejected before:</p>
<blockquote><p>After Kremen, the California Court of Appeal, Sixth Appellate District, noted that conversion traditionally required a taking of tangible property and that “this restriction has been greatly eroded,” but not “destroyed.” Silvaco Data Sys. v. Intel Corp., 184 Cal. App. 4th 210, 239 n.21 (2010). The Silvaco court also cautioned that “the expansion of conversion law to reach intangible property should not be permitted to ‘displace other, more suitable law.’” As discussed above, however, Plaintiffs’ websites have a connection to a tangible object.</p></blockquote>
<p>Having accepted the core fallacy of the plaintiffs&#8217; claims, the court makes unhelpful statements like &#8220;trespass to chattels ought to apply to a website, and several courts have so found.&#8221; The first half of the sentence isn&#8217;t in contention; everyone agrees that trespass to chattels can protect a website&#8217;s servers (not at issue in this case). Some of the cited precedent do not involve applying trespass to chattels only to intangible code. Some courts have in fact done this (not all of which the court cited), but those cases are overwhelmed by precedent rejecting the point. The court disregards Google&#8217;s citations those cases, breezily saying &#8220;Other cases cited by Google do not discuss the distinction between tangible and intangible property and offer little guidance.&#8221; (That critique might apply to this opinion, too).</p>
<p>Having satisfied itself that &#8220;a website is a form of intangible property subject to the tort of trespass to chattels,&#8221; the court next turns to harm. The court ignores the plainly stated and impossible-to-miss holding of Intel v. Hamidi, which says that common law trespass to chattels is actionable only when electronic signals cause or threaten to cause measurable loss <em>to computer system resources</em>. The plaintiffs can&#8217;t possibly prove any harm to any computer system resources.</p>
<p>Instead, the court cites a different part of the Hamidi opinion saying that Intel didn&#8217;t show any &#8220;physical or functional harm or disruption&#8221; to its computer systems. The court proceeds: &#8220;although Plaintiffs are not alleging physical harm to their websites, they do allege functional harm or disruption.&#8221; HOLD ON. The plaintiffs may claim &#8220;functional harm or disruption,&#8221; but the <em>complete</em> test is functional harm or disruption&#8230;TO THEIR COMPUTER SYSTEMS. By omitting those words, the court dramatically and improperly expands the test. Seriously, it&#8217;s impossible to read the Intel v. Hamidi opinion and miss the majority&#8217;s point that not all intangible harms count; only harms to COMPUTER SYSTEM RESOURCES count.</p>
<p>The court says the plaintiffs sufficiently alleged &#8220;functional disruption&#8221; by claiming that Google&#8217;s ads &#8220;obscured and blocked their websites, which if true, would interfere with and impair their websites’ published output. Although Google’s ad may not have disabled or deactivated the &#8216;Cove Base&#8217; product link, it nevertheless allegedly impaired the functionality of the website: an Android phone user cannot engage a link that cannot be seen.&#8221; But &#8220;published output&#8221; isn&#8217;t a computer system resource, and an &#8220;obscured link&#8221; assumes what the hypothetical canonical website looks like.</p>
<p><em>Implied-in-Law Contract/Unjust Enrichment</em></p>
<p>Given that the plaintiffs granted a license to Google to display its site, I don&#8217;t know what this claim could possibly cover. Google responds that whatever it means, it&#8217;s preempted by copyright law. Google&#8217;s position seems reasonable given that this claim wades squarely into copyright&#8217;s realm. The adware cases from 2 decades ago rejected copyright claims in virtually identical facts; and there are the old copyright cases involving things like adding ads to pre-manufactured videos. Not surprisingly, this judge finds a way around that too.</p>
<p>The court summarizes that &#8220;Google allegedly covered up or obscured a portion of Plaintiffs’ websites from Android phone users for financial benefit, which makes their claim &#8216;qualitatively different&#8217; from a copyright claim.&#8221; No, that&#8217;s exactly what the derivative work right covers, and it&#8217;s the exact issue litigated in the old WhenU cases. To get around this, the plaintiffs argued:</p>
<blockquote><p>Google could not in the brick-and-mortar marketplace lawfully plant its logo on Plaintiffs’ storefront windows without Plaintiffs’ consent, even if Google owned their buildings. Nor could Google place ads in Plaintiffs’ marketing brochures or superimpose ads on top of Plaintiffs’ print advertisements without Plaintiffs’ permission and without paying Plaintiffs’ price. Likewise, Google cannot in the online marketplace unilaterally superimpose ads on Plaintiffs’ website without Plaintiffs’ consent and without compensation just because Google makes the software through which Android users view that website on their mobile screens&#8230;</p>
<p>a storefront business owner is injured when its window is obscured, regardless of whether that window is clear or covered with advertisements. By analogy, a website owner is injured when its website is obscured by unwanted ads, regardless of the content displayed in the website.</p></blockquote>
<p>Are we really doing this again? I agree Google can&#8217;t unilaterally stick its logos onto a physical retailer&#8217;s windows&#8230;because THAT WOULD BE REAL PROPERTY TRESPASS. I&#8217;m not sure what law prevents Google from placing ads over marketing brochures or print ads OTHER THAN COPYRIGHT LAW (or possibly trademark law&#8211;but at this point, what does any of this have to do with IMPLIED-IN-LAW CONTRACTS?). And there are many other forms of competitive marketing adjacencies that are fully permissible in the offline/physical space world, as I documented over a decade ago in <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1324822">my Brand Spillovers paper</a>.</p>
<p>Plus, let&#8217;s not lose sight of the users&#8217; agency&#8211;they are the ones responding to the marketing signals. They aren&#8217;t passive automatons in this equation. My <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=635803">Deregulating Relevancy article</a> from 15 years ago explains that principle more.</p>
<p><em>First Amendment</em></p>
<p>There is some discussion about the First Amendment, but it&#8217;s so terrible that I can&#8217;t bring myself to blog it. To summarize: the court seems to be saying that the plaintiffs can suppress truthful non-misleading advertising without relying on any intellectual property rights (and without any countervailing public policy doctrines, like fair use). That can&#8217;t possibly be right.</p>
<p><em>Implications</em></p>
<p>As you can see, the court creates a distorted pastiche of the precedent to reach an obviously wrong and wholly counterintuitive outcome.</p>
<p>In particular, the court&#8217;s mangled summaries, like &#8220;Plaintiffs have property rights to their websites&#8221; and &#8220;a website is a form of intangible property subject to the tort of trespass to chattels,&#8221; cannot survive critical scrutiny. What is the point of calling it &#8220;trespass to CHATTELS&#8221; if no actual chattels are harmed? In that circumstance, the trespass to &#8220;chattels&#8221; doctrine becomes a boundary-less &#8220;commercial trespass to intangibles&#8221; concept that both lacks any precedent and conflicts with the entire system of IP.</p>
<p>A boundary-less commercial trespass doctrine creates plenty of problematic edge cases:</p>
<ul>
<li>By design, ad blockers block portions of how websites display. (The websites can&#8217;t claim copyrights in third-party ads, but this court wasn&#8217;t considering copyright anyways). How would the court&#8217;s &#8220;commercial trespass&#8221; doctrine apply to ad blockers? Indeed, unlike Google&#8217;s browser software, many websites expressly contractually ban ad blockers.</li>
<li>What about updates of browser software? By definition, those updates change the previous website renderings to a new website rendering. If any website prefers the old rendering to the new, can it sue the browser software for commercial trespass?</li>
<li>Browser software programs allow users to resize their windows. Commercial trespass?</li>
<li>Phone manufacturers create different screen sizes. If this cuts off &#8220;cove base&#8221; from being above the fold, liability?</li>
</ul>
<p>This case brought to mind the <a href="https://blog.ericgoldman.org/archives/2021/01/selling-keyword-ads-isnt-theft-or-conversion-edible-ip-v-google.htm">Edible Arrangements v. Google</a> lawsuit in Georgia (also not cited by the court). In that case, the trademark owner claimed that Google committed theft/conversion by selling its trademark for keyword advertising purposes. Unlike this court, the Georgia appellate court rejected the theft/conversion analysis. Weirdly, though, the Georgia Supreme Court granted a petition to hear the case, so who knows anything any more?</p>
<p><em>Case citation</em>: <a href="https://scholar.google.com/scholar_case?case=10254203431950226475&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr">Best Carpet Values Inc. v. Google LLC</a>, 5:20-cv-04700 (N.D. Cal. Sept. 24, 2021)</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2021/10/if-trespass-to-chattels-isnt-limited-to-chattels-anarchy-ensues-best-carpet-values-v-google.htm">If &#8220;Trespass to Chattels&#8221; Isn&#8217;t Limited to &#8220;Chattels,&#8221; Anarchy Ensues&#8211;Best Carpet Values v. Google</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23158</post-id>	</item>
		<item>
		<title>As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</title>
		<link>https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sun, 05 Sep 2021 15:15:35 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=23038</guid>

					<description><![CDATA[<p>Malwarebytes and Enigma offer competitive anti-threat software. Malwarebytes classified Enigma&#8217;s software as a &#8220;potentially unwanted program,&#8221; or PUP, and quarantined the programs. Enigma sued Malwarebytes for that classification/quarantine. Initially, the district court dismissed the case on Section 230(c)(2)(B) grounds. In...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-19201" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>Malwarebytes and Enigma offer competitive anti-threat software. Malwarebytes classified Enigma&#8217;s software as a &#8220;potentially unwanted program,&#8221; or PUP, and quarantined the programs. Enigma sued Malwarebytes for that classification/quarantine.</p>
<p>Initially, the district court dismissed the case on Section 230(c)(2)(B) grounds. In <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">a terrible ruling</a>, the Ninth Circuit reversed on the misguided theory that Malwarebytes and Enigma are competitors and thus Malwarebytes may have made its classification decisions based on &#8220;anticompetitive animus.&#8221; On remand, after 2 more years of litigation, the district court has again dismissed the lawsuit, this time on its lack of merits.</p>
<p><em>Lanham Act False Advertising</em>. Enigma claimed it was false for Malwarebytes to call its programs “malicious,” “threats,” and PUPs. In <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Asurvio v. Malwarebytes</a>, the court held that such labels were subjective opinions, not verifiably false. The court says this case is &#8220;indistinguishable&#8221; from Asurvio. The court says &#8220;users of Malwarebytes are aware of why it opines that a given software program may be a PUP based on Malwarebytes’ disclosed criteria and can choose to quarantine or un-quarantine the detected program&#8230;.Enigma&#8217;s allegations that Malwarebytes knew the labels used to describe Enigma&#8217;s programs were false are conclusory and need not be accepted as true.&#8221;</p>
<p><em>Tortious Interference. </em>Malwarebytes gives users instructions on how to keep using PUPs, so no tortious interference.</p>
<p><em>Implications</em></p>
<p>On the surface, this looks like a decent outcome. The district court granted Malwarebytes&#8217; motion to dismiss on the grounds that Malwarebytes&#8217; classifications are its opinions, not falsifiable statements of fact. On that basis, it seems like Malwarebytes should be equally positioned to win all future disputes on the same basis. Further, the <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Asurvio case</a> also relied on Section 230(c)(2)(B) despite the plaintiff&#8217;s allegation of anticompetitive animus. So long as Malwarebytes can win these kinds of classification challenges on motions to dismiss, it may not really matter how we get here.</p>
<p>(Of course, with a trip to the 9th Circuit and Supreme Court, this particular case has taken four years and many hundreds of thousands of extra dollars due to the Ninth Circuit craziness).</p>
<p>Despite this good outcome, this case has left two lingering scars on Internet law.</p>
<p>First, the Ninth Circuit created a new workaround to Section 230 based on anticompetitive animus. This workaround is completely undefined&#8211;is it coextensive with antitrust law, or does apply when competitors have anticompetitive &#8220;intent&#8221; even if their actions don&#8217;t constitute an antitrust violation? The Ninth Circuit dodged this critical issue. As a result, plaintiffs can freely invoke the anticompetitive animus workaround and impose greater defense costs to resolve this issue. This doctrinal ambiguity is particularly pernicious in the cybersecurity context, where the court created incentives for anti-threat vendors to reduce their vigilance against cybersecurity threats that can claim (legitimately or not) competitive status.</p>
<p>Worse, this appears to be at least the fifth time that the Ninth Circuit has created doctrinal workarounds to Section 230 that appear to benefit no one. Other cases that fit this pattern:</p>
<ul>
<li><a href="https://blog.ericgoldman.org/archives/2008/04/roommatescom_de_1.htm">Fair Housing Councils v. Roommates.com</a>. Section 230 didn&#8217;t apply to housing discrimination claims, but the Ninth Circuit <a href="https://blog.ericgoldman.org/archives/2012/02/roommatescom_is.htm">ruled four years later</a> that the housing discrimination claims never applied at all.</li>
<li><a href="https://blog.ericgoldman.org/archives/2009/06/ninth_circuit_h.htm">Barnes v. Yahoo</a>. Promissory estoppel is a pleadaround to Section 230, but plaintiffs can&#8217;t win promissory estoppel cases.</li>
<li><a href="https://blog.ericgoldman.org/archives/2016/05/section-230-baffles-9th-circuit-again-doe-14-v-modelmayhem.htm">Doe v. Internet Brands</a>. Failure-to-warn claims are a pleadaround to Section 230, but plaintiffs can&#8217;t win failure-to-warn claims.</li>
<li><a href="https://blog.ericgoldman.org/archives/2021/05/the-ninth-circuits-confusing-ruling-over-snapchats-speed-filter-lemmon-v-snap.htm">Lemmon v. Snap</a>. The story is still being written about this ruling, but it seems like it will fit the pattern. The Ninth Circuit said that Section 230 doesn&#8217;t apply to design defect claims that aren&#8217;t based on third-party content, but we know that the plaintiff is likely to lose the case on its merits based on a nearly identical case that <a href="https://blog.ericgoldman.org/archives/2020/10/snapchat-isnt-liable-for-its-speed-filter-even-if-section-230-doesnt-apply-maynard-v-snapchat.htm">failed in Georgia courts</a>.</li>
</ul>
<p>Now, add Enigma v. Malwarebytes and its anticompetitive animus exception to this list. If threat classifications are opinions, then plaintiffs will always lose and the Ninth Circuit&#8217;s Section 230(c)(2)(B) workaround does nothing but mess up Section 230. Should we applaud the Ninth Circuit for so carefully policing the boundaries of Section 230&#8217;s immunities, or should we criticize them for unnecessarily swiss-cheesing Section 230?</p>
<p>Second, on appeal to the Supreme Court, Justice Thomas used the cert denial as an excuse to blog <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">his misguided free-association thoughts</a> about why he hates Section 230. This screed has perniciously inspired plaintiffs to position their Section 230 case for Supreme Court review and motivated #MAGA politicians to pursue ever-worse censorial regulatory ideas. The legacy of Justice Thomas&#8217; blogging will live on long after the Enigma case is over.</p>
<p>Enigma hasn&#8217;t yet appealed the latest ruling, but I assume this case will take another trip to the Ninth Circuit.</p>
<p><em>Case Citation</em>: <a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">Enigma Software Group USA, LLC v. Malwarebytes Inc,</a>, 2021 WL 3493764 (N.D. Cal. Aug. 9, 2021)</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">District Court dismissal</a> on the merits. <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">Blog post</a>.</li>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas’ statement. <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23038</post-id>	</item>
		<item>
		<title>Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Tue, 20 Oct 2020 15:17:40 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=21845</guid>

					<description><![CDATA[<p>Last year, the Ninth Circuit ruled that a plaintiff could plead around Section 230(c)(2)(B), the safe harbor for providing filtering instructions, by claiming that the filtering was motivated by anticompetitive animus. Last week, the Supreme Court denied certiorari. This isn&#8217;t...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-scaled.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-20910" src="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg" alt="" width="300" height="139" srcset="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1024x474.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-768x355.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1536x711.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-2048x948.jpg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Last year, the Ninth Circuit ruled that <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">a plaintiff could plead around Section 230(c)(2)(B)</a>, the safe harbor for providing filtering instructions, by claiming that the filtering was motivated by anticompetitive animus. Last week, the Supreme Court denied certiorari. This isn&#8217;t surprising&#8211;the Supreme Court takes a low percentage of cases&#8211;but it&#8217;s too bad the Ninth Circuit ruling won&#8217;t be corrected.</p>
<p>Alongside the cert denial, <a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Justice Thomas added a statement railing against Section 230</a> (starting on page 12). The statement is procedurally troubling and substantively wrong. Some lowlights in the statement:</p>
<ul>
<li>The statement repeatedly and casually flips between Section 230(c)(1) and Section 230(c)(2).</li>
<li>The statement focuses on Section 230(c)(1), even though the question presented to the court solely addressed Section 230(c)(2)(B). Because the court wasn&#8217;t briefed on most of the issues Justice Thomas nevertheless discusses, it makes me wonder where Justice Thomas got his information. What news sources is he reading?</li>
<li>Because the court wasn&#8217;t briefed on Section 230(c)(1), he does not acknowledge the many legal, factual, and policy counterarguments to his positions that surely would have been addressed by proper briefing. In other words, without hearing contrary perspectives, his statement is one-sided and under-informed (more on this later).</li>
<li> The statement says: &#8220;many courts have construed the law broadly to confer sweeping immunity on some of the largest companies in the world.&#8221; The Internet giants benefit from Section 230, but so do thousands of less-well-known companies&#8211;including the defendant in this case.</li>
<li>The statement says the Ninth Circuit decision &#8220;is one of the few where courts have relied on purpose and policy to deny immunity under §230.&#8221; Note the tension in this statement. Hundreds of decisions have denied Section 230 immunity because they relied on the statutory text. Is Justice Thomas saying they should have relied instead on the statute&#8217;s &#8220;policy and purpose&#8221;?</li>
<li>The statement calls Section 230(c)(1) &#8220;definitional.&#8221; This is an atextual and highly idiosyncratic way of characterizing the statute. Nearly two decades ago, Easterbrook took a similar position in <a href="https://scholar.google.com/scholar_case?case=9499294934141110069&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr">Doe v. GTE</a>. Virtually every other judge since has not agreed.</li>
<li>The statement says Section 230(c)(1) &#8220;ensures that a company (like an e-mail provider) can host and transmit third-party content without subjecting itself to the liability that sometimes attaches to the publisher or speaker of unlawful content.&#8221; It&#8217;s a strange move to use email service providers as the Section 230(c)(1) archetype. Email providers rely on Section 230(c)(2)(A) for their spam filters, but it&#8217;s rare to see email providers invoke Section 230(c)(1) because they don&#8217;t &#8220;host&#8221; content.</li>
<li>The statement says Section 230(c)(2) &#8220;provides direct immunity from some civil liability.&#8221; This is backwards. Section 230(c)(1) provides an immunity from suit; Section 230(c)(2) provides a safe harbor.</li>
<li>The statement says Section 230(c)(2)&#8217;s &#8220;limited protection enables companies to create community guidelines and remove harmful content without worrying about legal reprisal.&#8221; A few problems here. First, Section 230(c)(1) also necessarily permits &#8220;community guidelines&#8221; in the form of leave-up policies. Second, Section 230(c)(2)(A) does not let companies stop &#8220;worrying about legal reprisal.&#8221; They worry about the costs of defense due to the &#8220;good faith&#8221; prerequisite, which is why so few companies rely on it. Third, this case was about Section 230(c)(2)(B), which relates to the provision of filtering instructions to third parties.</li>
<li>The statement says historically &#8220;Publishers or speakers&#8230;.could be strictly liable for transmitting illegal content.&#8221; This is garbled because &#8220;publishers&#8221; don&#8217;t &#8220;transmit&#8221; (they, uh, &#8220;publish&#8221;). Publishers can be strictly liable for publishing content, and &#8220;transmitting&#8221; content is governed by different legal rules that typically negate strict liability.</li>
<li>The statement says that historically distributors &#8220;acted as a mere conduit without exercising editorial control, and they often transmitted far more content than they could be expected to review.&#8221; Once again the statement conflates different functions&#8211;this time falsely equating distributors with &#8220;conduits&#8221; and &#8220;transmitters.&#8221; To get an example of how this is wrong, consider the bookstore as a distributor. It unavoidably exercises editorial discretion about which books to stock and how to display them, but that doesn&#8217;t mean bookstores stand behind every word in every book they carry. But no one would properly call a bookstore a &#8220;conduit&#8221; or say that it &#8220;transmits&#8221; content.</li>
<li>The statement says &#8220;§230(c)(1) indicates that an Internet provider does not become the publisher of a piece of third-party content—and thus subjected to strict liability—simply by hosting or distributing that content.&#8221; Section 230(c)(1) says plainly that services won&#8217;t be treated as publishers of third-party content. On its face, the provision negates all forms of publisher liability. I don&#8217;t see how to read the language as saying or implying that it negates only the category of liability uniquely imposed on publishers. Furthermore, publisher/speaker functions should include hosting and distributing, but the statutory text doesn&#8217;t imply that it&#8217;s limited to those functions. The language covers any function where a defendant is alleged to act as a publisher or speaker.</li>
<li>The statement says &#8220;the statute suggests that if a company unknowingly leaves up illegal third-party content, it is protected from publisher liability by §230(c)(1); and if it takes down certain third-party content in good faith, it is protected by §230(c)(2)(A).&#8221; This misapprehends the nature of &#8220;publisher liability.&#8221; It is impossible to distinguish between the &#8220;leave up&#8221; and &#8220;removal&#8221; decisions because they are the result of the exact same editorial decision-making process of publishing.</li>
<li>The statement says: &#8220;Sources sometimes use language that arguably blurs the distinction between publishers and distributors.&#8221; I think the statement contains some distinction-blurring language of its own.</li>
<li>The statement notes inconsistent language between the CDA&#8217;s criminal provisions and Section 230, even though it has been repeatedly explained by many experts why the CDA criminal provisions and Section 230 had nothing to do with each other (they were alternative policy proposals smushed together in conference).</li>
<li>The statement apparently questions if Congress&#8217; goal was to overturn Stratton Oakmont because it didn&#8217;t mirror the language in the opinion. The legislative history clearly says &#8220;<strong>One of the specific purposes of this section is to overrule Stratton-Oakmont v. Prodigy</strong> and any other similar decisions which have treated such providers and users as publishers or speakers of content that is not their own because they have restricted access to objectionable material.&#8221;</li>
<li>The statement says &#8220;Courts have also departed from the most natural reading of the text by giving Internet companies immunity <strong>for their own content</strong>&#8221; (emphasis added). This is literally false. No court has ever done this.</li>
<li>The statement says &#8220;To say that editing a statement and adding commentary in this context does not &#8216;creat[e] or develo[p]&#8217; the final product, even in part, is dubious.&#8221; It&#8217;s a crafty rhetorical move to refer to the &#8220;final product&#8221; instead of the actual statutory referent &#8220;information.&#8221; Doing this invites the conclusion that every UGC service loses Section 230 because they package third-party content into a &#8220;final product.&#8221;</li>
<li>The statement argues that a broad reading of Section 230(c)(1) renders Section 230(c)(2) superfluous. <a href="https://blog.ericgoldman.org/archives/2009/06/ninth_circuit_h.htm">Barnes v. Yahoo</a> explained how Section 230(c)(2)(A) applies in circumstances where the defendant partially or wholly created or developed the content. The statement instead cites language from <a href="https://blog.ericgoldman.org/archives/2016/05/google-must-answer-lawsuit-for-manually-removing-websites-from-its-search-index-e-ventures-v-google-forbes-cross-post.htm">e-ventures v. Google</a>. But (1) Google still won the e-ventures case, so its denigration of Section 230(c)(2)(A) became inconsequential, and (2) other courts have since criticized the e-ventures language, including <a href="https://blog.ericgoldman.org/archives/2020/01/vimeo-defeats-lawsuit-for-terminating-account-that-posted-conversion-therapy-videos-domen-v-vimeo.htm">Domen v. Vimeo</a> and <a href="https://blog.ericgoldman.org/archives/2019/11/state-court-rejects-prager-universitys-lawsuit-against-youtube.htm">Prager University v. Google</a>.</li>
<li>The statement says &#8220;With no limits on an Internet company’s discretion to take down material, §230 now apparently protects companies who racially discriminate in removing content.&#8221; Characterizing the cited <a href="https://blog.ericgoldman.org/archives/2015/11/facebook-can-legally-block-pages-without-any-explanation-sikhs-for-justice-v-facebook-forbes-cross-post.htm">Sikhs for Justice ruling</a> case as a racial discrimination case is simplistic at best. The case involved advocacy content that the Indian government required to be blocked. Still, it&#8217;s true Section 230(c)(1) can protect removals even when the plaintiff claims discrimination. You might even be OK with the application of Section 230(c)(1) in the cases I&#8217;m seeing, including <a href="https://blog.ericgoldman.org/archives/2020/06/section-230-ends-demonetized-youtubers-lawsuit-lewis-v-google.htm">Lewis v. Google</a>, where the plaintiff claimed that YouTube discriminated against him for being an American; and the <a href="https://blog.ericgoldman.org/archives/2020/10/twitter-wins-another-account-suspension-case-wilson-v-twitter.htm">Wilson v Twitter cases</a>, where the plaintiff claimed Twitter discriminated against him because he&#8217;s a Christian heterosexual.</li>
<li>The statement criticizes Section 230&#8217;s application to claims involving &#8220;alleged product design flaws—that is, the defendant’s own misconduct.&#8221; But what are &#8220;product design&#8221; flaws in this context? That&#8217;s just a fancy euphemism for the editorial decisions about how to gather, organize, and publish third-party content.</li>
<li>The statement says &#8220;Paring back the sweeping immunity courts have read into §230 would not necessarily render defendants liable for online misconduct. It simply would give plaintiffs a chance to raise their claims in the first place. Plaintiffs still must prove the merits of their cases, and some claims will undoubtedly fail.&#8221; This deeply misunderstands the issues in the Malwarebytes case. By &#8220;paring back&#8221; the Section 230(c)(2)(B) safe harbor, the new liability exposure distorts the filtering services&#8217; substantive decisions by making them gun-shy; it gives plaintiffs ways to play holdup games and extract settlements for less than the defense costs; it ignores how defense costs can doom services (the death by ten thousand duckbites that Judge Kozinski addressed in the Roommates.com case); and it ignores the <a href="https://ssrn.com/abstract=3351323">other critical procedural benefits provided by Section 230</a> that enable third-party online speech where other liability schemes would not. As I keep saying, everyone benefits when unmeritorious cases lose fast and early. Giving plaintiffs more time in court doesn&#8217;t come for free, and it might be a very bad deal for all of us.</li>
</ul>
<p>The statement concludes: &#8220;Without the benefit of briefing on the merits, we need not decide today the correct interpretation of §230. But in an appropriate case, it behooves us to do so.&#8221; Just to be clear, Justice Thomas admits that he wrote the prior ten pages of criticism &#8220;without the benefit of briefing.&#8221; That undermines the credibility of the entire statement. Nevertheless, the statement tells all plaintiffs that if they appeal their Section 230 cases to the Supreme Court, they have at least one vote ready to go.</p>
<p>When we filed an amicus brief in support of Malwarebytes, one of our fears was that the Supreme Court would ignore the question presented (tightly restricted to Section 230(c)(2)(B)) and do damage to Section 230(c)(1) despite it being outside the scope of the question presented. Justice Thomas&#8217; critical remarks about Section 230(c)(1) show that these fears were well-founded, and I&#8217;m a little relieved that the court didn&#8217;t take the case. That means Malwarebytes can still win this case on remand (a likely outcome; see <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">the Asurvio ruling</a>), albeit at the cost of unnecessary time and money, and Section 230 lives for another day.</p>
<p>This statement bears some resemblance to <a href="https://www.nytimes.com/2019/02/19/us/politics/clarence-thomas-first-amendment-libel.html">Justice Thomas&#8217; statement in early 2019</a> that the Supreme Court should reconsider the actual malice standard from New York Times v. Sullivan. Like this statement, that statement was anti-media, pro-censorship, and quite unpersuasive. So far, the Supreme Court hasn&#8217;t taken up Justice Thomas&#8217; initiative against the actual malice standard. I hope this statement suffers the same fate.</p>
<p>Even if the Supreme Court never takes up Justice Thomas&#8217; arguments, this statement hurts the discourse. It represents yet another inaccurate federal government statement about Section 230 (others include the <a href="https://blog.ericgoldman.org/archives/2020/05/trumps-preventing-online-censorship-executive-order-is-pro-censorship-political-theater.htm">Trump EO from May</a> and the <a href="https://blog.ericgoldman.org/archives/2020/08/comments-on-ntias-petition-to-the-fcc-seeking-to-destroy-section-230.htm">NTIA petition to the FCC</a>). Collectively, these taxpayer-funded misstatements pollute the discourse and create FUD about Section 230. We have to spend time debating what Section 230 even says, and Section 230 critics can misportray Section 230 to spur mistargeted responses. This makes it impossible to have well-informed &#8220;debates&#8221; about Section 230 or what, if any, reforms would fix any perceived policy deficiencies.</p>
<p><em>Case Citation</em>: <a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Malwarebytes, Inc. v. Enigma Software Group USA, LLC</a>,  2020 WL 6037214 (Oct. 13, 2020)</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas&#8217; statement.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21845</post-id>	</item>
		<item>
		<title>Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</title>
		<link>https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 15 Jun 2020 16:42:25 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=21252</guid>

					<description><![CDATA[<p>On Friday, 14 cybersecurity experts filed an amicus brief with the U.S. Supreme Court, supporting Malwarebytes&#8217; certiorari petition to review the Ninth Circuit&#8217;s 2019 Enigma v. Malwarebytes ruling regarding 47 U.S.C. 230(c)(2)(B)&#8217;s application to spyware classification decisions. The Juelsgaard Intellectual...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-19201" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>On Friday, 14 cybersecurity experts filed <a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">an amicus brief</a> with the U.S. Supreme Court, supporting Malwarebytes&#8217; certiorari petition to review <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">the Ninth Circuit&#8217;s 2019 Enigma v. Malwarebytes ruling</a> regarding 47 U.S.C. 230(c)(2)(B)&#8217;s application to spyware classification decisions. The <a href="https://law.stanford.edu/juelsgaard-intellectual-property-and-innovation-clinic/">Juelsgaard Intellectual Property and Innovation Clinic</a> prepared the brief; the work was done by two Stanford Law students supervised by Phil Malone, and I supported each draft iteration of the brief.</p>
<p>The SCOTUS cybersecurity experts&#8217; brief built on <a href="https://ssrn.com/abstract=3484314">the amicus brief</a> that Venkat and I prepared to support Malwarebytes&#8217; unsuccessful en banc petition to the Ninth Circuit. The new brief expands the prior arguments and has more signatories.</p>
<p>From the brief&#8217;s argument summary:</p>
<blockquote><p>This case involves a narrow legal issue with broad and exceptionally important implications for cybersecurity. The Ninth Circuit’s ruling will expose Internet users to an array of threats that can compromise their systems and data, corrupt or extract their files, bog down their computers or smartphones, and weaponize their devices against other Internet users.</p>
<p>The decision below erodes the legal immunity provided by Section 230(c)(2)(B), which allows companies to develop robust anti-threat software to protect Internet users. In place of that immunity, the decision creates an opening for expensive and prolonged litigation. To avoid costly litigation and reduce business risk, anti-threat software vendors will opt to become overly conservative in identifying and blocking potential threats. This will leave tens of thousands of government entities, tens of millions of businesses, and hundreds of millions of Internet users more vulnerable to hazardous software.</p></blockquote>
<p><strong><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes&#8217; Petition</a></strong>. Malwarebytes described the question presented (emphasis added):</p>
<blockquote><p>Section 230(c)(2)(B) of the Communications Decency Act provides immunity from most civil liability to computer-service providers for “any action taken to enable or make available to * * * others the technical means to restrict access to material” that “the provider or user considers to be * * * objectionable.” 47 U.S.C. § 230(c)(2). The court below agreed that none of the narrow, express exceptions to that immunity in Section 230(e) apply here. The question presented is:</p>
<p><strong>Whether federal courts can derive an implied exception to Section 230(c)(2)(B) immunity for blocking or filtering decisions when they are alleged to be “driven by anticompetitive animus</strong>.”</p></blockquote>
<p>This is an appropriately narrow question presented, and it does not implicate other parts of Section 230. If the Supreme Court takes the case, let&#8217;s hope it stays that way.</p>
<p><strong>Other Filings</strong><em>. </em>A total of five amicus briefs, including the cybersecurity experts&#8217; brief, supported the certiorari petition. The same players had supported Malwarebytes&#8217; Ninth Circuit en banc petition, except for a new entry from TechFreedom.</p>
<p><em><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF Amicus Brief</a>. </em>The brief discusses how the Ninth Circuit&#8217;s ruling threatens the EFF&#8217;s Privacy Badger tool and undermines the fight against stalkerware.</p>
<p><em><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET Amicus Brief</a>. </em>From the argument summary:</p>
<blockquote><p>ESET takes the unusual step of submitting an amicus brief in support of one of its direct competitors to stress the importance of this issue. Americans are becoming increasingly reliant on the internet and interactive media for political, educational, cultural, and entertainment services. 47 U.S.C. § 230(a)(5). Yet security threats are flourishing, with hundreds of thousands of new forms of objectionable content every day. Congress determined that consumer choice and robust competition are the best way to safeguard consumers, but the Ninth Circuit’s decision frustrates both choice and competition.</p></blockquote>
<p><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf"><em>Internet Association Amicus Brief</em></a>.</p>
<blockquote><p>Congress had good reason to omit a good faith requirement from subsection (c)(2)(B). As discussed above, subsection (A) protects direct blocking or filtering by online service providers—situations where providers act unilaterally to protect themselves or their users from objectionable material. In contrast, subsection (B) only applies where service providers put blocking tools in the hands of users, who must independently and affirmatively decide to use those tools. Here, blocking does not occur unilaterally; it instead requires cooperation between a service provider and a third party&#8230;.</p>
<p>Congress logically concluded it was unnecessary to include a good faith requirement or to allow Section 230’s protection to turn on disputes about a service provider’s motives. Here, the user’s independent choice operates as a check on the provider’s decisions about what material should be filtered or blocked.</p></blockquote>
<p><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf"><em>TechFreedom Amicus Brief</em></a>. From the argument summary:</p>
<blockquote><p>Subsection 230(c)(2)(B) contains a simple command: “No provider or user of an interactive computer service shall be held liable [for] any action taken to enable or make available . . . the technical means to restrict access to [objectionable] material.” That’s it. But when the Ninth Circuit interpreted this statute, it saw something different. Speculating that a strict textual interpretation would lead to a result that “appear[ed] contrary to [the statute’s] history and purpose,” the court divined words invisible to the human eye: an exception for conduct allegedly motivated by “anticompetitive animus.” That exception is nowhere to be found in the statute that Congress enacted.</p></blockquote>
<p><strong>Case library</strong></p>
<ul>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes&#8217; petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit&#8217;s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit&#8217;s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21252</post-id>	</item>
		<item>
		<title>Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 16:10:20 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Marketing]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20972</guid>

					<description><![CDATA[<p>Section 230(c)(2)(B) says that filtering software makers aren&#8217;t liable for their classification decisions. This proposition provides the legal foundation for the anti-threat software industry. However, those expectations were disrupted by the Ninth Circuit&#8217;s 2019 in Enigma v. Malwarebytes, which held...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-19201" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>Section 230(c)(2)(B) says that filtering software makers aren&#8217;t liable for their classification decisions. This proposition provides the legal foundation for the anti-threat software industry. However, those expectations were disrupted by the Ninth Circuit&#8217;s 2019 in <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Enigma v. Malwarebytes</a>, which held that Section 230(c)(2)(B) didn&#8217;t apply when a plaintiff alleges that the filtering decision was motivated by anticompetitive animus. <a href="https://ssrn.com/abstract=3484314">This amicus brief</a> explains why the 9th Circuit&#8217;s ruling is bad for cybersecurity.</p>
<p>Today I&#8217;m blogging about what I believe is the first ruling applying Enigma to anti-threat software since the Ninth Circuit ruling. The defendant is the same (Malwarebytes); but this time the plaintiff is Asurvio, which used to be &#8220;PC Driver.&#8221; I <a href="https://blog.ericgoldman.org/archives/2019/03/filtering-software-defeats-another-lawsuit-pc-driver-v-malwarebytes.htm">blogged a prior ruling</a> in this case last year. The district court judge shuts down the Section 230(c)(2)(B) workaround.</p>
<p><em>Section 230(c)(2)(B). </em>In response to Malwarebytes&#8217; motion to dismiss, the court says Asurvio doesn&#8217;t compete with Malwarebytes:</p>
<blockquote><p>[Asurvio] is not a computer security software provider; it does not sell malware detection software designed to scan a computer and report PUPs. Rather, Asurvio sells driver update software. Asurvio’s software programs “work in real time in the background of the operating system to optimize processing and locate and install all missing and outdated software drivers.” Asurvio does not allege that its DRIVER SUPPORT or ACTIVE OPTIMIZATION programs provide any anti-spyware or anti-malware functionality as Malwarebytes does</p></blockquote>
<p>Asurvio claimed it also provided anti-malware services. The court discounts these services because they are provided only via live technical support, not as a primary service. Asurvio also argued that both parties competed to help users improve their computers&#8217; performance. The court rejects this too: &#8220;If the Court were to accept Asurvio’s argument, then any developer of performance optimizing software designed for “self-help” computer users could potentially plead around the broad immunity granted by section 230(c)(2)(B) and render the statutory immunity meaningless.&#8221;</p>
<p><em>Section 230(c)(1). </em>Asurvio complained about critical third-party messages in Malwarebytes&#8217; message boards. The court says that the complaint doesn&#8217;t connect the third parties to Malwarebytes, despite the users&#8217; titles as &#8220;trusted advisor&#8221; and &#8220;expert.&#8221; Compare <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">the Enigma v. Bleeping Computer opinion from 2016</a>.</p>
<p><em>Others</em>. The disparagement/Lanham Act claims fail because Malwarebytes&#8217; classifications are not capable of being proven false. The tortious interference claim fails because Asurvio didn&#8217;t specify which contract was being interfered with.</p>
<p><em>Implications</em></p>
<p>The Enigma ruling sent shockwaves through the anti-threat vendor community because it disrupted a decade of settled legal doctrine. Though it&#8217;s logical to fear &#8220;anticompetitive&#8221; blocking, in reality we know it&#8217;s easy to allege anticompetitive blocking and quite hard to prove. So the Enigma ruling created the risk that many previously easy cases would become expensive and time-consuming, even if they were eventually unmeritorious.</p>
<p>This ruling partially assuages those fears. On a motion to dismiss, the court circumscribed the universe of competitors and rejected tendentious attempts to portray non-competitors as competitors. Both of these conclusions bode well for future Section 230(c)(2)(B). Still, this ruling doesn&#8217;t change the fact that many existing anti-threat software vendors are in fact sketchy and deserve to be filtered; yet anti-threat vendors will be skittish about calling out their sketchy competitors. This case also contributes towards building a new jurisprudence of competition internal to Section 230(c)(2)(B), an unwanted development given that we have an entire body of law (antitrust law) dedicated to that purpose.</p>
<p><em>Case citation</em>: <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=3181&amp;context=historical">Asurvio LP v. Malwarebytes Inc.</a>, 2020 WL 1478345 (N.D. Cal. March 26, 2020)</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20972</post-id>	</item>
	</channel>
</rss>
