<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Adware/Spyware &#8211; Technology &amp; Marketing Law Blog</title>
	<atom:link href="https://blog.ericgoldman.org/archives/category/adwarespyware/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ericgoldman.org</link>
	<description></description>
	<lastBuildDate>Sun, 05 Sep 2021 15:25:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</title>
		<link>https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm#respond</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sun, 05 Sep 2021 15:15:35 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=23038</guid>

					<description><![CDATA[<p>Malwarebytes and Enigma offer competitive anti-threat software. Malwarebytes classified Enigma&#8217;s software as a &#8220;potentially unwanted program,&#8221; or PUP, and quarantined the programs. Enigma sued Malwarebytes for that classification/quarantine. Initially, the district court dismissed the case on Section 230(c)(2)(B) grounds. In...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>Malwarebytes and Enigma offer competitive anti-threat software. Malwarebytes classified Enigma&#8217;s software as a &#8220;potentially unwanted program,&#8221; or PUP, and quarantined the programs. Enigma sued Malwarebytes for that classification/quarantine.</p>
<p>Initially, the district court dismissed the case on Section 230(c)(2)(B) grounds. In <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">a terrible ruling</a>, the Ninth Circuit reversed on the misguided theory that Malwarebytes and Enigma are competitors and thus Malwarebytes may have made its classification decisions based on &#8220;anticompetitive animus.&#8221; On remand, after 2 more years of litigation, the district court has again dismissed the lawsuit, this time on its lack of merits.</p>
<p><em>Lanham Act False Advertising</em>. Enigma claimed it was false for Malwarebytes to call its programs “malicious,” “threats,” and PUPs. In <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Asurvio v. Malwarebytes</a>, the court held that such labels were subjective opinions, not verifiably false. The court says this case is &#8220;indistinguishable&#8221; from Asurvio. The court says &#8220;users of Malwarebytes are aware of why it opines that a given software program may be a PUP based on Malwarebytes’ disclosed criteria and can choose to quarantine or un-quarantine the detected program&#8230;.Enigma&#8217;s allegations that Malwarebytes knew the labels used to describe Enigma&#8217;s programs were false are conclusory and need not be accepted as true.&#8221;</p>
<p><em>Tortious Interference. </em>Malwarebytes gives users instructions on how to keep using PUPs, so no tortious interference.</p>
<p><em>Implications</em></p>
<p>On the surface, this looks like a decent outcome. The district court granted Malwarebytes&#8217; motion to dismiss on the grounds that Malwarebytes&#8217; classifications are its opinions, not falsifiable statements of fact. On that basis, it seems like Malwarebytes should be equally positioned to win all future disputes on the same basis. Further, the <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Asurvio case</a> also relied on Section 230(c)(2)(B) despite the plaintiff&#8217;s allegation of anticompetitive animus. So long as Malwarebytes can win these kinds of classification challenges on motions to dismiss, it may not really matter how we get here.</p>
<p>(Of course, with a trip to the 9th Circuit and Supreme Court, this particular case has taken four years and many hundreds of thousands of extra dollars due to the Ninth Circuit craziness).</p>
<p>Despite this good outcome, this case has left two lingering scars on Internet law.</p>
<p>First, the Ninth Circuit created a new workaround to Section 230 based on anticompetitive animus. This workaround is completely undefined&#8211;is it coextensive with antitrust law, or does apply when competitors have anticompetitive &#8220;intent&#8221; even if their actions don&#8217;t constitute an antitrust violation? The Ninth Circuit dodged this critical issue. As a result, plaintiffs can freely invoke the anticompetitive animus workaround and impose greater defense costs to resolve this issue. This doctrinal ambiguity is particularly pernicious in the cybersecurity context, where the court created incentives for anti-threat vendors to reduce their vigilance against cybersecurity threats that can claim (legitimately or not) competitive status.</p>
<p>Worse, this appears to be at least the fifth time that the Ninth Circuit has created doctrinal workarounds to Section 230 that appear to benefit no one. Other cases that fit this pattern:</p>
<ul>
<li><a href="https://blog.ericgoldman.org/archives/2008/04/roommatescom_de_1.htm">Fair Housing Councils v. Roommates.com</a>. Section 230 didn&#8217;t apply to housing discrimination claims, but the Ninth Circuit <a href="https://blog.ericgoldman.org/archives/2012/02/roommatescom_is.htm">ruled four years later</a> that the housing discrimination claims never applied at all.</li>
<li><a href="https://blog.ericgoldman.org/archives/2009/06/ninth_circuit_h.htm">Barnes v. Yahoo</a>. Promissory estoppel is a pleadaround to Section 230, but plaintiffs can&#8217;t win promissory estoppel cases.</li>
<li><a href="https://blog.ericgoldman.org/archives/2016/05/section-230-baffles-9th-circuit-again-doe-14-v-modelmayhem.htm">Doe v. Internet Brands</a>. Failure-to-warn claims are a pleadaround to Section 230, but plaintiffs can&#8217;t win failure-to-warn claims.</li>
<li><a href="https://blog.ericgoldman.org/archives/2021/05/the-ninth-circuits-confusing-ruling-over-snapchats-speed-filter-lemmon-v-snap.htm">Lemmon v. Snap</a>. The story is still being written about this ruling, but it seems like it will fit the pattern. The Ninth Circuit said that Section 230 doesn&#8217;t apply to design defect claims that aren&#8217;t based on third-party content, but we know that the plaintiff is likely to lose the case on its merits based on a nearly identical case that <a href="https://blog.ericgoldman.org/archives/2020/10/snapchat-isnt-liable-for-its-speed-filter-even-if-section-230-doesnt-apply-maynard-v-snapchat.htm">failed in Georgia courts</a>.</li>
</ul>
<p>Now, add Enigma v. Malwarebytes and its anticompetitive animus exception to this list. If threat classifications are opinions, then plaintiffs will always lose and the Ninth Circuit&#8217;s Section 230(c)(2)(B) workaround does nothing but mess up Section 230. Should we applaud the Ninth Circuit for so carefully policing the boundaries of Section 230&#8217;s immunities, or should we criticize them for unnecessarily swiss-cheesing Section 230?</p>
<p>Second, on appeal to the Supreme Court, Justice Thomas used the cert denial as an excuse to blog <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">his misguided free-association thoughts</a> about why he hates Section 230. This screed has perniciously inspired plaintiffs to position their Section 230 case for Supreme Court review and motivated #MAGA politicians to pursue ever-worse censorial regulatory ideas. The legacy of Justice Thomas&#8217; blogging will live on long after the Enigma case is over.</p>
<p>Enigma hasn&#8217;t yet appealed the latest ruling, but I assume this case will take another trip to the Ninth Circuit.</p>
<p><em>Case Citation</em>: <a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">Enigma Software Group USA, LLC v. Malwarebytes Inc,</a>, 2021 WL 3493764 (N.D. Cal. Aug. 9, 2021)</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://www.govinfo.gov/content/pkg/USCOURTS-cand-5_17-cv-02915/pdf/USCOURTS-cand-5_17-cv-02915-4.pdf">District Court dismissal</a> on the merits. <a href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">Blog post</a>.</li>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas’ statement. <a href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Blog post</a>.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm">As Expected, Malwarebytes Defeats Enigma&#8217;s Lawsuit Without Section 230&#8217;s Help</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2021/09/as-expected-malwarebytes-defeats-enigmas-lawsuit-without-section-230s-help.htm/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Tue, 20 Oct 2020 15:17:40 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=21845</guid>

					<description><![CDATA[<p>Last year, the Ninth Circuit ruled that a plaintiff could plead around Section 230(c)(2)(B), the safe harbor for providing filtering instructions, by claiming that the filtering was motivated by anticompetitive animus. Last week, the Supreme Court denied certiorari. This isn&#8217;t...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-scaled.jpg"><img loading="lazy" class="alignright size-medium wp-image-20910" src="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg" alt="" width="300" height="139" srcset="https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-300x139.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1024x474.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-768x355.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-1536x711.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2020/03/IMG_8558-2048x948.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Last year, the Ninth Circuit ruled that <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">a plaintiff could plead around Section 230(c)(2)(B)</a>, the safe harbor for providing filtering instructions, by claiming that the filtering was motivated by anticompetitive animus. Last week, the Supreme Court denied certiorari. This isn&#8217;t surprising&#8211;the Supreme Court takes a low percentage of cases&#8211;but it&#8217;s too bad the Ninth Circuit ruling won&#8217;t be corrected.</p>
<p>Alongside the cert denial, <a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Justice Thomas added a statement railing against Section 230</a> (starting on page 12). The statement is procedurally troubling and substantively wrong. Some lowlights in the statement:</p>
<ul>
<li>The statement repeatedly and casually flips between Section 230(c)(1) and Section 230(c)(2).</li>
<li>The statement focuses on Section 230(c)(1), even though the question presented to the court solely addressed Section 230(c)(2)(B). Because the court wasn&#8217;t briefed on most of the issues Justice Thomas nevertheless discusses, it makes me wonder where Justice Thomas got his information. What news sources is he reading?</li>
<li>Because the court wasn&#8217;t briefed on Section 230(c)(1), he does not acknowledge the many legal, factual, and policy counterarguments to his positions that surely would have been addressed by proper briefing. In other words, without hearing contrary perspectives, his statement is one-sided and under-informed (more on this later).</li>
<li> The statement says: &#8220;many courts have construed the law broadly to confer sweeping immunity on some of the largest companies in the world.&#8221; The Internet giants benefit from Section 230, but so do thousands of less-well-known companies&#8211;including the defendant in this case.</li>
<li>The statement says the Ninth Circuit decision &#8220;is one of the few where courts have relied on purpose and policy to deny immunity under §230.&#8221; Note the tension in this statement. Hundreds of decisions have denied Section 230 immunity because they relied on the statutory text. Is Justice Thomas saying they should have relied instead on the statute&#8217;s &#8220;policy and purpose&#8221;?</li>
<li>The statement calls Section 230(c)(1) &#8220;definitional.&#8221; This is an atextual and highly idiosyncratic way of characterizing the statute. Nearly two decades ago, Easterbrook took a similar position in <a href="https://scholar.google.com/scholar_case?case=9499294934141110069&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr">Doe v. GTE</a>. Virtually every other judge since has not agreed.</li>
<li>The statement says Section 230(c)(1) &#8220;ensures that a company (like an e-mail provider) can host and transmit third-party content without subjecting itself to the liability that sometimes attaches to the publisher or speaker of unlawful content.&#8221; It&#8217;s a strange move to use email service providers as the Section 230(c)(1) archetype. Email providers rely on Section 230(c)(2)(A) for their spam filters, but it&#8217;s rare to see email providers invoke Section 230(c)(1) because they don&#8217;t &#8220;host&#8221; content.</li>
<li>The statement says Section 230(c)(2) &#8220;provides direct immunity from some civil liability.&#8221; This is backwards. Section 230(c)(1) provides an immunity from suit; Section 230(c)(2) provides a safe harbor.</li>
<li>The statement says Section 230(c)(2)&#8217;s &#8220;limited protection enables companies to create community guidelines and remove harmful content without worrying about legal reprisal.&#8221; A few problems here. First, Section 230(c)(1) also necessarily permits &#8220;community guidelines&#8221; in the form of leave-up policies. Second, Section 230(c)(2)(A) does not let companies stop &#8220;worrying about legal reprisal.&#8221; They worry about the costs of defense due to the &#8220;good faith&#8221; prerequisite, which is why so few companies rely on it. Third, this case was about Section 230(c)(2)(B), which relates to the provision of filtering instructions to third parties.</li>
<li>The statement says historically &#8220;Publishers or speakers&#8230;.could be strictly liable for transmitting illegal content.&#8221; This is garbled because &#8220;publishers&#8221; don&#8217;t &#8220;transmit&#8221; (they, uh, &#8220;publish&#8221;). Publishers can be strictly liable for publishing content, and &#8220;transmitting&#8221; content is governed by different legal rules that typically negate strict liability.</li>
<li>The statement says that historically distributors &#8220;acted as a mere conduit without exercising editorial control, and they often transmitted far more content than they could be expected to review.&#8221; Once again the statement conflates different functions&#8211;this time falsely equating distributors with &#8220;conduits&#8221; and &#8220;transmitters.&#8221; To get an example of how this is wrong, consider the bookstore as a distributor. It unavoidably exercises editorial discretion about which books to stock and how to display them, but that doesn&#8217;t mean bookstores stand behind every word in every book they carry. But no one would properly call a bookstore a &#8220;conduit&#8221; or say that it &#8220;transmits&#8221; content.</li>
<li>The statement says &#8220;§230(c)(1) indicates that an Internet provider does not become the publisher of a piece of third-party content—and thus subjected to strict liability—simply by hosting or distributing that content.&#8221; Section 230(c)(1) says plainly that services won&#8217;t be treated as publishers of third-party content. On its face, the provision negates all forms of publisher liability. I don&#8217;t see how to read the language as saying or implying that it negates only the category of liability uniquely imposed on publishers. Furthermore, publisher/speaker functions should include hosting and distributing, but the statutory text doesn&#8217;t imply that it&#8217;s limited to those functions. The language covers any function where a defendant is alleged to act as a publisher or speaker.</li>
<li>The statement says &#8220;the statute suggests that if a company unknowingly leaves up illegal third-party content, it is protected from publisher liability by §230(c)(1); and if it takes down certain third-party content in good faith, it is protected by §230(c)(2)(A).&#8221; This misapprehends the nature of &#8220;publisher liability.&#8221; It is impossible to distinguish between the &#8220;leave up&#8221; and &#8220;removal&#8221; decisions because they are the result of the exact same editorial decision-making process of publishing.</li>
<li>The statement says: &#8220;Sources sometimes use language that arguably blurs the distinction between publishers and distributors.&#8221; I think the statement contains some distinction-blurring language of its own.</li>
<li>The statement notes inconsistent language between the CDA&#8217;s criminal provisions and Section 230, even though it has been repeatedly explained by many experts why the CDA criminal provisions and Section 230 had nothing to do with each other (they were alternative policy proposals smushed together in conference).</li>
<li>The statement apparently questions if Congress&#8217; goal was to overturn Stratton Oakmont because it didn&#8217;t mirror the language in the opinion. The legislative history clearly says &#8220;<strong>One of the specific purposes of this section is to overrule Stratton-Oakmont v. Prodigy</strong> and any other similar decisions which have treated such providers and users as publishers or speakers of content that is not their own because they have restricted access to objectionable material.&#8221;</li>
<li>The statement says &#8220;Courts have also departed from the most natural reading of the text by giving Internet companies immunity <strong>for their own content</strong>&#8221; (emphasis added). This is literally false. No court has ever done this.</li>
<li>The statement says &#8220;To say that editing a statement and adding commentary in this context does not &#8216;creat[e] or develo[p]&#8217; the final product, even in part, is dubious.&#8221; It&#8217;s a crafty rhetorical move to refer to the &#8220;final product&#8221; instead of the actual statutory referent &#8220;information.&#8221; Doing this invites the conclusion that every UGC service loses Section 230 because they package third-party content into a &#8220;final product.&#8221;</li>
<li>The statement argues that a broad reading of Section 230(c)(1) renders Section 230(c)(2) superfluous. <a href="https://blog.ericgoldman.org/archives/2009/06/ninth_circuit_h.htm">Barnes v. Yahoo</a> explained how Section 230(c)(2)(A) applies in circumstances where the defendant partially or wholly created or developed the content. The statement instead cites language from <a href="https://blog.ericgoldman.org/archives/2016/05/google-must-answer-lawsuit-for-manually-removing-websites-from-its-search-index-e-ventures-v-google-forbes-cross-post.htm">e-ventures v. Google</a>. But (1) Google still won the e-ventures case, so its denigration of Section 230(c)(2)(A) became inconsequential, and (2) other courts have since criticized the e-ventures language, including <a href="https://blog.ericgoldman.org/archives/2020/01/vimeo-defeats-lawsuit-for-terminating-account-that-posted-conversion-therapy-videos-domen-v-vimeo.htm">Domen v. Vimeo</a> and <a href="https://blog.ericgoldman.org/archives/2019/11/state-court-rejects-prager-universitys-lawsuit-against-youtube.htm">Prager University v. Google</a>.</li>
<li>The statement says &#8220;With no limits on an Internet company’s discretion to take down material, §230 now apparently protects companies who racially discriminate in removing content.&#8221; Characterizing the cited <a href="https://blog.ericgoldman.org/archives/2015/11/facebook-can-legally-block-pages-without-any-explanation-sikhs-for-justice-v-facebook-forbes-cross-post.htm">Sikhs for Justice ruling</a> case as a racial discrimination case is simplistic at best. The case involved advocacy content that the Indian government required to be blocked. Still, it&#8217;s true Section 230(c)(1) can protect removals even when the plaintiff claims discrimination. You might even be OK with the application of Section 230(c)(1) in the cases I&#8217;m seeing, including <a href="https://blog.ericgoldman.org/archives/2020/06/section-230-ends-demonetized-youtubers-lawsuit-lewis-v-google.htm">Lewis v. Google</a>, where the plaintiff claimed that YouTube discriminated against him for being an American; and the <a href="https://blog.ericgoldman.org/archives/2020/10/twitter-wins-another-account-suspension-case-wilson-v-twitter.htm">Wilson v Twitter cases</a>, where the plaintiff claimed Twitter discriminated against him because he&#8217;s a Christian heterosexual.</li>
<li>The statement criticizes Section 230&#8217;s application to claims involving &#8220;alleged product design flaws—that is, the defendant’s own misconduct.&#8221; But what are &#8220;product design&#8221; flaws in this context? That&#8217;s just a fancy euphemism for the editorial decisions about how to gather, organize, and publish third-party content.</li>
<li>The statement says &#8220;Paring back the sweeping immunity courts have read into §230 would not necessarily render defendants liable for online misconduct. It simply would give plaintiffs a chance to raise their claims in the first place. Plaintiffs still must prove the merits of their cases, and some claims will undoubtedly fail.&#8221; This deeply misunderstands the issues in the Malwarebytes case. By &#8220;paring back&#8221; the Section 230(c)(2)(B) safe harbor, the new liability exposure distorts the filtering services&#8217; substantive decisions by making them gun-shy; it gives plaintiffs ways to play holdup games and extract settlements for less than the defense costs; it ignores how defense costs can doom services (the death by ten thousand duckbites that Judge Kozinski addressed in the Roommates.com case); and it ignores the <a href="https://ssrn.com/abstract=3351323">other critical procedural benefits provided by Section 230</a> that enable third-party online speech where other liability schemes would not. As I keep saying, everyone benefits when unmeritorious cases lose fast and early. Giving plaintiffs more time in court doesn&#8217;t come for free, and it might be a very bad deal for all of us.</li>
</ul>
<p>The statement concludes: &#8220;Without the benefit of briefing on the merits, we need not decide today the correct interpretation of §230. But in an appropriate case, it behooves us to do so.&#8221; Just to be clear, Justice Thomas admits that he wrote the prior ten pages of criticism &#8220;without the benefit of briefing.&#8221; That undermines the credibility of the entire statement. Nevertheless, the statement tells all plaintiffs that if they appeal their Section 230 cases to the Supreme Court, they have at least one vote ready to go.</p>
<p>When we filed an amicus brief in support of Malwarebytes, one of our fears was that the Supreme Court would ignore the question presented (tightly restricted to Section 230(c)(2)(B)) and do damage to Section 230(c)(1) despite it being outside the scope of the question presented. Justice Thomas&#8217; critical remarks about Section 230(c)(1) show that these fears were well-founded, and I&#8217;m a little relieved that the court didn&#8217;t take the case. That means Malwarebytes can still win this case on remand (a likely outcome; see <a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">the Asurvio ruling</a>), albeit at the cost of unnecessary time and money, and Section 230 lives for another day.</p>
<p>This statement bears some resemblance to <a href="https://www.nytimes.com/2019/02/19/us/politics/clarence-thomas-first-amendment-libel.html">Justice Thomas&#8217; statement in early 2019</a> that the Supreme Court should reconsider the actual malice standard from New York Times v. Sullivan. Like this statement, that statement was anti-media, pro-censorship, and quite unpersuasive. So far, the Supreme Court hasn&#8217;t taken up Justice Thomas&#8217; initiative against the actual malice standard. I hope this statement suffers the same fate.</p>
<p>Even if the Supreme Court never takes up Justice Thomas&#8217; arguments, this statement hurts the discourse. It represents yet another inaccurate federal government statement about Section 230 (others include the <a href="https://blog.ericgoldman.org/archives/2020/05/trumps-preventing-online-censorship-executive-order-is-pro-censorship-political-theater.htm">Trump EO from May</a> and the <a href="https://blog.ericgoldman.org/archives/2020/08/comments-on-ntias-petition-to-the-fcc-seeking-to-destroy-section-230.htm">NTIA petition to the FCC</a>). Collectively, these taxpayer-funded misstatements pollute the discourse and create FUD about Section 230. We have to spend time debating what Section 230 even says, and Section 230 critics can misportray Section 230 to spur mistargeted responses. This makes it impossible to have well-informed &#8220;debates&#8221; about Section 230 or what, if any, reforms would fix any perceived policy deficiencies.</p>
<p><em>Case Citation</em>: <a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Malwarebytes, Inc. v. Enigma Software Group USA, LLC</a>,  2020 WL 6037214 (Oct. 13, 2020)</p>
<p><strong>Enigma v. Malwarebytes Case Library</strong></p>
<ul>
<li><a href="https://www.supremecourt.gov/orders/courtorders/101320zor_8m58.pdf">Denial of certiorari</a>, including Justice Thomas&#8217; statement.</li>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes’ petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>. <a href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Blog post on amicus briefs</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit’s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit’s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm">Justice Thomas Writes a Misguided Anti-Section 230 Statement &#8220;Without the Benefit of Briefing&#8221;&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2020/10/justice-thomas-writes-a-misguided-anti-section-230-statement-without-the-benefit-of-briefing-enigma-v-malwarebytes.htm/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</title>
		<link>https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 15 Jun 2020 16:42:25 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=21252</guid>

					<description><![CDATA[<p>On Friday, 14 cybersecurity experts filed an amicus brief with the U.S. Supreme Court, supporting Malwarebytes&#8217; certiorari petition to review the Ninth Circuit&#8217;s 2019 Enigma v. Malwarebytes ruling regarding 47 U.S.C. 230(c)(2)(B)&#8217;s application to spyware classification decisions. The Juelsgaard Intellectual...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>On Friday, 14 cybersecurity experts filed <a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">an amicus brief</a> with the U.S. Supreme Court, supporting Malwarebytes&#8217; certiorari petition to review <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">the Ninth Circuit&#8217;s 2019 Enigma v. Malwarebytes ruling</a> regarding 47 U.S.C. 230(c)(2)(B)&#8217;s application to spyware classification decisions. The <a href="https://law.stanford.edu/juelsgaard-intellectual-property-and-innovation-clinic/">Juelsgaard Intellectual Property and Innovation Clinic</a> prepared the brief; the work was done by two Stanford Law students supervised by Phil Malone, and I supported each draft iteration of the brief.</p>
<p>The SCOTUS cybersecurity experts&#8217; brief built on <a href="https://ssrn.com/abstract=3484314">the amicus brief</a> that Venkat and I prepared to support Malwarebytes&#8217; unsuccessful en banc petition to the Ninth Circuit. The new brief expands the prior arguments and has more signatories.</p>
<p>From the brief&#8217;s argument summary:</p>
<blockquote><p>This case involves a narrow legal issue with broad and exceptionally important implications for cybersecurity. The Ninth Circuit’s ruling will expose Internet users to an array of threats that can compromise their systems and data, corrupt or extract their files, bog down their computers or smartphones, and weaponize their devices against other Internet users.</p>
<p>The decision below erodes the legal immunity provided by Section 230(c)(2)(B), which allows companies to develop robust anti-threat software to protect Internet users. In place of that immunity, the decision creates an opening for expensive and prolonged litigation. To avoid costly litigation and reduce business risk, anti-threat software vendors will opt to become overly conservative in identifying and blocking potential threats. This will leave tens of thousands of government entities, tens of millions of businesses, and hundreds of millions of Internet users more vulnerable to hazardous software.</p></blockquote>
<p><strong><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes&#8217; Petition</a></strong>. Malwarebytes described the question presented (emphasis added):</p>
<blockquote><p>Section 230(c)(2)(B) of the Communications Decency Act provides immunity from most civil liability to computer-service providers for “any action taken to enable or make available to * * * others the technical means to restrict access to material” that “the provider or user considers to be * * * objectionable.” 47 U.S.C. § 230(c)(2). The court below agreed that none of the narrow, express exceptions to that immunity in Section 230(e) apply here. The question presented is:</p>
<p><strong>Whether federal courts can derive an implied exception to Section 230(c)(2)(B) immunity for blocking or filtering decisions when they are alleged to be “driven by anticompetitive animus</strong>.”</p></blockquote>
<p>This is an appropriately narrow question presented, and it does not implicate other parts of Section 230. If the Supreme Court takes the case, let&#8217;s hope it stays that way.</p>
<p><strong>Other Filings</strong><em>. </em>A total of five amicus briefs, including the cybersecurity experts&#8217; brief, supported the certiorari petition. The same players had supported Malwarebytes&#8217; Ninth Circuit en banc petition, except for a new entry from TechFreedom.</p>
<p><em><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF Amicus Brief</a>. </em>The brief discusses how the Ninth Circuit&#8217;s ruling threatens the EFF&#8217;s Privacy Badger tool and undermines the fight against stalkerware.</p>
<p><em><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET Amicus Brief</a>. </em>From the argument summary:</p>
<blockquote><p>ESET takes the unusual step of submitting an amicus brief in support of one of its direct competitors to stress the importance of this issue. Americans are becoming increasingly reliant on the internet and interactive media for political, educational, cultural, and entertainment services. 47 U.S.C. § 230(a)(5). Yet security threats are flourishing, with hundreds of thousands of new forms of objectionable content every day. Congress determined that consumer choice and robust competition are the best way to safeguard consumers, but the Ninth Circuit’s decision frustrates both choice and competition.</p></blockquote>
<p><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf"><em>Internet Association Amicus Brief</em></a>.</p>
<blockquote><p>Congress had good reason to omit a good faith requirement from subsection (c)(2)(B). As discussed above, subsection (A) protects direct blocking or filtering by online service providers—situations where providers act unilaterally to protect themselves or their users from objectionable material. In contrast, subsection (B) only applies where service providers put blocking tools in the hands of users, who must independently and affirmatively decide to use those tools. Here, blocking does not occur unilaterally; it instead requires cooperation between a service provider and a third party&#8230;.</p>
<p>Congress logically concluded it was unnecessary to include a good faith requirement or to allow Section 230’s protection to turn on disputes about a service provider’s motives. Here, the user’s independent choice operates as a check on the provider’s decisions about what material should be filtered or blocked.</p></blockquote>
<p><a href="https://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf"><em>TechFreedom Amicus Brief</em></a>. From the argument summary:</p>
<blockquote><p>Subsection 230(c)(2)(B) contains a simple command: “No provider or user of an interactive computer service shall be held liable [for] any action taken to enable or make available . . . the technical means to restrict access to [objectionable] material.” That’s it. But when the Ninth Circuit interpreted this statute, it saw something different. Speculating that a strict textual interpretation would lead to a result that “appear[ed] contrary to [the statute’s] history and purpose,” the court divined words invisible to the human eye: an exception for conduct allegedly motivated by “anticompetitive animus.” That exception is nowhere to be found in the statute that Congress enacted.</p></blockquote>
<p><strong>Case library</strong></p>
<ul>
<li><a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143223/20200511125322450_No.%2019-__%20Malwarebytes%20Petition%205-11%20Final.pdf">Malwarebytes&#8217; petition for certiorari</a>. Amicus briefs from <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145516/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf">Cybersecurity Experts</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/143970/20200521130329415_19-1284%20Brief.pdf">EFF</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145436/20200611231453037_ESET%20Amicus%20Brief.pdf">ESET</a>, <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145554/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf">Internet Association</a>, and <a href="http://www.supremecourt.gov/DocketPDF/19/19-1284/145499/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf">TechFreedom</a>.</li>
<li>The <a href="https://www.supremecourt.gov/search.aspx?filename=/docket/DocketFiles/html/Public/19-1284.html">SCOTUS page</a> for Malwarebytes v. Enigma.</li>
<li><a href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Blog post</a> on Asurvio v. Malwarebytes, an application of the Ninth Circuit&#8217;s ruling.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Ninth Circuit&#8217;s amended ruling</a>. <a href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/06/cybersecurity-experts-support-supreme-court-review-of-enigma-v-malwarebytes-ruling-on-section-230c2b.htm">Cybersecurity Experts Support Supreme Court Review of Enigma v. Malwarebytes Ruling on Section 230(c)(2)(B)</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 16:10:20 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Marketing]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20972</guid>

					<description><![CDATA[<p>Section 230(c)(2)(B) says that filtering software makers aren&#8217;t liable for their classification decisions. This proposition provides the legal foundation for the anti-threat software industry. However, those expectations were disrupted by the Ninth Circuit&#8217;s 2019 in Enigma v. Malwarebytes, which held...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>Section 230(c)(2)(B) says that filtering software makers aren&#8217;t liable for their classification decisions. This proposition provides the legal foundation for the anti-threat software industry. However, those expectations were disrupted by the Ninth Circuit&#8217;s 2019 in <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Enigma v. Malwarebytes</a>, which held that Section 230(c)(2)(B) didn&#8217;t apply when a plaintiff alleges that the filtering decision was motivated by anticompetitive animus. <a href="https://ssrn.com/abstract=3484314">This amicus brief</a> explains why the 9th Circuit&#8217;s ruling is bad for cybersecurity.</p>
<p>Today I&#8217;m blogging about what I believe is the first ruling applying Enigma to anti-threat software since the Ninth Circuit ruling. The defendant is the same (Malwarebytes); but this time the plaintiff is Asurvio, which used to be &#8220;PC Driver.&#8221; I <a href="https://blog.ericgoldman.org/archives/2019/03/filtering-software-defeats-another-lawsuit-pc-driver-v-malwarebytes.htm">blogged a prior ruling</a> in this case last year. The district court judge shuts down the Section 230(c)(2)(B) workaround.</p>
<p><em>Section 230(c)(2)(B). </em>In response to Malwarebytes&#8217; motion to dismiss, the court says Asurvio doesn&#8217;t compete with Malwarebytes:</p>
<blockquote><p>[Asurvio] is not a computer security software provider; it does not sell malware detection software designed to scan a computer and report PUPs. Rather, Asurvio sells driver update software. Asurvio’s software programs “work in real time in the background of the operating system to optimize processing and locate and install all missing and outdated software drivers.” Asurvio does not allege that its DRIVER SUPPORT or ACTIVE OPTIMIZATION programs provide any anti-spyware or anti-malware functionality as Malwarebytes does</p></blockquote>
<p>Asurvio claimed it also provided anti-malware services. The court discounts these services because they are provided only via live technical support, not as a primary service. Asurvio also argued that both parties competed to help users improve their computers&#8217; performance. The court rejects this too: &#8220;If the Court were to accept Asurvio’s argument, then any developer of performance optimizing software designed for “self-help” computer users could potentially plead around the broad immunity granted by section 230(c)(2)(B) and render the statutory immunity meaningless.&#8221;</p>
<p><em>Section 230(c)(1). </em>Asurvio complained about critical third-party messages in Malwarebytes&#8217; message boards. The court says that the complaint doesn&#8217;t connect the third parties to Malwarebytes, despite the users&#8217; titles as &#8220;trusted advisor&#8221; and &#8220;expert.&#8221; Compare <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">the Enigma v. Bleeping Computer opinion from 2016</a>.</p>
<p><em>Others</em>. The disparagement/Lanham Act claims fail because Malwarebytes&#8217; classifications are not capable of being proven false. The tortious interference claim fails because Asurvio didn&#8217;t specify which contract was being interfered with.</p>
<p><em>Implications</em></p>
<p>The Enigma ruling sent shockwaves through the anti-threat vendor community because it disrupted a decade of settled legal doctrine. Though it&#8217;s logical to fear &#8220;anticompetitive&#8221; blocking, in reality we know it&#8217;s easy to allege anticompetitive blocking and quite hard to prove. So the Enigma ruling created the risk that many previously easy cases would become expensive and time-consuming, even if they were eventually unmeritorious.</p>
<p>This ruling partially assuages those fears. On a motion to dismiss, the court circumscribed the universe of competitors and rejected tendentious attempts to portray non-competitors as competitors. Both of these conclusions bode well for future Section 230(c)(2)(B). Still, this ruling doesn&#8217;t change the fact that many existing anti-threat software vendors are in fact sketchy and deserve to be filtered; yet anti-threat vendors will be skittish about calling out their sketchy competitors. This case also contributes towards building a new jurisprudence of competition internal to Section 230(c)(2)(B), an unwanted development given that we have an entire body of law (antitrust law) dedicated to that purpose.</p>
<p><em>Case citation</em>: <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=3181&amp;context=historical">Asurvio LP v. Malwarebytes Inc.</a>, 2020 WL 1478345 (N.D. Cal. March 26, 2020)</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/03/section-230-protects-classifying-non-competitive-software-as-a-threat-asurvio-v-malwarebytes.htm">Section 230 Protects Classifying Non-Competitive Software as a Threat&#8211;Asurvio v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ninth Circuit Doubles Down on Bad Ruling That Undermines Cybersecurity&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Thu, 09 Jan 2020 15:08:20 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20734</guid>

					<description><![CDATA[<p>This case involves rival makers of anti-threat software. The defendant, Malwarebytes, classified its rival&#8217;s software as a PUP, or Potentially Unwanted Program. The rival sued. Malwarebytes defended on 47 USC 230(c)(2)(B), which provides a safe harbor for filtering software. Malwarebytes...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Ninth Circuit Doubles Down on Bad Ruling That Undermines Cybersecurity&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">This PUP Is definitely having a bad day after this ruling.<br />photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>This case involves rival makers of anti-threat software. The defendant, Malwarebytes, classified its rival&#8217;s software as a PUP, or Potentially Unwanted Program. The rival sued. Malwarebytes defended on 47 USC 230(c)(2)(B), which provides a safe harbor for filtering software. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Malwarebytes won on that ground</a> in the district court. Then, in a troubling ruling that broke with precedent, a 3-judge panel of the Ninth Circuit <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">held</a> that (1) 230(c)(2)(B) requires good faith on the part of filtering software makers, and (2) mere allegations that filtering was based on ant-competitive animus defeat the 230(c)(2)(B) safe harbor. Thus, Malwarebytes cannot rely on the safe harbor that Congress custom-developed for this circumstance.</p>
<p>Malwarebytes sought rehearings by the panel and en banc. In support of that request, <a href="https://ssrn.com/abstract=3484314">Venkat and I, on behalf of 7 other cybersecurity law professors, submitted an amicus brief</a> explaining how the ruling undermined cybersecurity, because it will discourage anti-threat software makers from legitimately downgrading their shady AF rivals (and many anti-threat software vendors are indeed shady AF). Any benefits consumers might gain from policing anticompetitive downgrades surely will be overwhelmed by the greater proliferation of harmful software that undermines our online security.</p>
<p>On New Years Eve (in a fitting end to <a href="https://blog.ericgoldman.org/archives/2020/01/top-internet-law-developments-of-2019.htm">an awful year for Internet Law</a>), the Ninth Circuit denied the petition and issued an amended opinion. Unfortunately, the court made only minor substantive amendments. The redline of those substantive changes:</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2020/01/enigma.jpg"><img loading="lazy" class="aligncenter size-full wp-image-20735" src="https://blog.ericgoldman.org/wp-content/uploads/2020/01/enigma.jpg" alt="" width="943" height="723" srcset="https://blog.ericgoldman.org/wp-content/uploads/2020/01/enigma.jpg 943w, https://blog.ericgoldman.org/wp-content/uploads/2020/01/enigma-300x230.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2020/01/enigma-768x589.jpg 768w" sizes="(max-width: 943px) 100vw, 943px" /></a></p>
<p>There are two good aspects of this amended opinion. First, the court got rid of the murky language that filtering software makers could not consider the identity of the threat&#8217;s maker in its filtering decision. That legal standard contravened central tenets of cybersecurity, so good riddance. Second, the amended language expresses the court&#8217;s holding exceptionally clearly: &#8220;blocking and filtering decisions that are driven by anticompetitive animus are not entitled to immunity under section 230(c)(2).&#8221;</p>
<p>I have nothing else good to say about the amendments. The court still collapses 230(c)(2)(A), which has a &#8220;good faith&#8221; requirement, with 230(c)(2)(B), which does not; and the amended opinion still gives purveyors of shady AF anti-threat software an easy workaround to any future 230(c)(2)(B) defense. For reasons that Venkat and I explain in the amicus brief, this makes the Internet less secure.</p>
<p>As for this case, Malwarebytes has a choice. It can appeal to the US Supreme Court, which I personally hope it does not do because the case&#8217;s legal issues aren&#8217;t the best fact setup for SCOTUS review of Section 230. Malwarebytes would have favorable odds on appeal, but the odds of something going dreadfully wrong are too high for my tastes. Alternatively, Malwarebytes can pursue the case on remand and win on the merits. <a href="https://tushnet.blogspot.com/2020/01/malwarebytes-same-result-new-puzzles-on.html">Rebecca Tushnet explores some of the likely arguments</a>. On remand, Malwarebytes probably will show that its filtering decision lacked anti-competitive animus, in which case it deserved the Section 230(c)(2)(B) safe harbor that this court denied. That wouldn&#8217;t be the first time that the Ninth Circuit eviscerated <a href="https://ssrn.com/abstract=3351323">Section 230&#8217;s procedural benefits</a> for no corresponding gains. Recall, for example, how the court denied Section 230 for Roommates.com because it allegedly engaged in illegal content, only to conclude four years later that Roommates.com actually qualified for Section 230 all along because <a href="https://blog.ericgoldman.org/archives/2012/02/roommatescom_is.htm">Roommates.com never had illegal content at all</a>.</p>
<p><em>Case citation</em>: <a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/12/31/17-17351.pdf">Enigma Software Group USA v. Malwarebytes, Inc.</a>, 2019 WL 7373959 (9th Cir. Dec. 31, 2019)</p>
<p><em>Case library</em>:</p>
<ul>
<li><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes’ petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>. <a href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Blog post</a> on the filings.</li>
<li><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</li>
<li>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</li>
</ul>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm">Ninth Circuit Doubles Down on Bad Ruling That Undermines Cybersecurity&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2020/01/ninth-circuit-doubles-down-on-bad-ruling-that-undermines-cybersecurity-enigma-v-malwarebytes.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Rehearing Briefs in Enigma Software v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Thu, 21 Nov 2019 16:49:24 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20603</guid>

					<description><![CDATA[<p>In September, in Enigma v. Malwarebytes, the Ninth Circuit issued a troubling Section 230(c)(2)(B) ruling that allowed plaintiffs&#8217; allegations of anti-competitive animus to override the safe harbor for anti-threat software vendors. It was a 2-1 ruling on a key topic,...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Rehearing Briefs in Enigma Software v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="8484524390_cc35257f2a_o-300x225" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">A good PUP. Photo by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>In September, in Enigma v. Malwarebytes, the Ninth Circuit <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">issued a troubling Section 230(c)(2)(B) ruling</a> that allowed plaintiffs&#8217; allegations of anti-competitive animus to override the safe harbor for anti-threat software vendors. It was a 2-1 ruling on a key topic, so it&#8217;s the kind of case that could support further proceedings in the Ninth Circuit.</p>
<p>Perhaps not surprisingly, the defendant Malwarebytes has requested en banc or panel review. Its <a href="https://digitalcommons.law.scu.edu/historical/2064/">petition for rehearing</a>.</p>
<p>Four amicus briefs were filed in support of Malwarebytes&#8217; brief:</p>
<p><a href="https://ssrn.com/abstract=3484314"><strong>Cybersecurity Law professors&#8217; amicus brief</strong></a></p>
<p>Venkat and I drafted this brief (with the help of Jess Miers) and filed it on behalf of 7 other professors. Our introduction:</p>
<blockquote><p>The panel or the Court en banc should rehear this case so that it can reevaluate the ruling’s consequences for cybersecurity. Though anti-competitive animus could be a troubling reason for one software program to block another, the Court’s decision overcorrects for this concern. The panel decision will foster spurious legal accusations of anti-competitive blocking of software programs that are, in fact, dangerous to businesses and consumers. These legal threats will hinder the ability of anti-threat software vendors to properly classify threats to businesses and consumers, which will make the Internet less safe for everyone.</p></blockquote>
<p><strong><a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association amicus brief</a></strong></p>
<blockquote><p>Three aspects of the majority’s decision especially concern IA and its members. First, the panel improperly imported a motive-based good-faith limitation into Section 230(c)(2)(B). As explained in Appellee’s rehearing petition, that defies fundamental rules of statutory interpretation and collapses an important distinction between subsection (c)(2)(A), which includes an express “good faith” requirement, and subsection (c)(2)(B), which conspicuously omits one.</p>
<p>Second, by uncritically accepting what appears from the opinion to be Appellant’s bare allegations of anticompetitive animus, the panel’s decision threatens to make it all too easy for plaintiffs to plead around Section 230(c)(2)(B). That result is squarely at odds with this Court’s decisions in <a href="https://blog.ericgoldman.org/archives/2008/04/roommatescom_de_1.htm">Fair Hous. Council v. Roommates.com, LLC</a>, 521 F.3d 1157, 1162 (9th Cir. 2008) (en banc), and <a href="https://blog.ericgoldman.org/archives/2016/09/ninth-circuit-criticizes-attempts-to-plead-around-secton-230-kimzey-v-yelp.htm">Kimzey v. Yelp!, Inc.</a>, 836 F.3d 1263 (9th Cir. 2016). Those cases make clear that because Section 230 protects service providers against protracted legal battles (not just ultimate liability), the immunity cannot be defeated at the pleading stage with conclusory assertions. The panel’s contrary approach puts the content-moderation decisions of online providers and users at risk of “death by ten thousand duck-bites,” Roommates.com, 521 F.3d at 1174, opening the door to costly litigation for any plaintiff willing to make even threadbare allegations of improper motive. That subverts Congress’s goal of encouraging and removing disincentives for the development and use of filtering technologies.</p>
<p>Third, the majority’s dictum that the “criteria for blocking online material must be based on the characteristics of the online material, i.e., its content, and not on the identity of the entity that produced it,” is particularly troubling. While perhaps unintended by the panel, this stray statement could be applied in ways that would further undermine the very practices that Section 230 was intended to protect. Online service providers and their users routinely make moderation decisions that apply to entities or individuals, rather than just isolated pieces of content. That happens, for example, when a provider terminates a user’s account or when users deploy tools like Twitter’s Block feature to filter content from certain other users. These measures are a vital part of online self-regulation and are covered by any coherent reading of Section 230(c)(2). The panel’s ambiguous language threatens to arbitrarily limit the ability of platforms and users to protect themselves against abusive, offensive, or problematic accounts or users. At a minimum, therefore, the Court should grant rehearing to correct (or strike) the panel’s errant dicta.</p></blockquote>
<p><strong><a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET amicus brief</a></strong></p>
<blockquote><p>The majority opinion in this case undermines internet security and harms consumer choice in at least two critical ways.</p>
<p>First, the opinion creates a major roadblock to effective computer security software. The decision undercuts statutory immunity for filtering technology whenever there are allegations of anticompetitive animus, even though a purveyor of objectionable material can easily position itself as a competitor and make a facially plausible claim of such animus. This undermines Congress’s goals in enacting the Communications Decency Act, 47 U.S.C. § 230 (1996) (CDA), and harms the procompetitive interests the majority opinion purports to protect.</p>
<p>Second, the decision substitutes litigation for the user choice that has created a thriving marketplace of protections available to consumers. Such choice now exists at two levels: when the user decides what security software to deploy, and when the user chooses to filter out an objectionable program with the aid of that software. The majority opinion would substitute litigation in which the user has no role for both of these choices.</p></blockquote>
<p><strong><a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE amicus brief</a></strong></p>
<blockquote><p>Amici represent the interests of Internet users and support Malwarebytes’ petition because the Enigma panel’s ruling will discourage the development of effective tools that allow users to customize their experiences online. Reading Section 230(c)(2)(B) (47 U.S.C. § 230(c)(2)(B)) to provide unequivocal protection to the providers of filtering tools, which the Enigma panel failed to do, is consistent with the plain meaning of the statute and congressional policy goals, and ultimately best empowers Internet users by incentivizing the development of robust and diverse filtering tools.</p>
<p>Filtering tools give Internet users choices. People use filtering tools to directly protect themselves and to craft the online experiences that comport with their values, by screening out spyware, adware, or other forms of malware, spam, or content they deem inappropriate or offensive. Platforms use filtering tools for the same reasons, enabling them to create diverse places for people online.</p>
<p>Amicus EFF also supports rehearing because it directly benefits from a plain reading of Section 230(c)(2)(B), as its public interest technologists have developed a free tool, called Privacy Badger, that stops advertisers and other third-party trackers from secretly tracking users as they browse the web. EFF’s ability to continue providing free privacy-enhancing tools to Internet users will be seriously threatened if the panel’s incorrect interpretation of Section 230(c)(2)(B) stands.</p>
<p>Finally, amicus EFF supports rehearing because ensuring that Section 230(c)(2)(B) unequivocally protects filtering tool providers encourages those providers to block harmful software that is used to perpetuate domestic violence and harassment. EFF is working to eradicate this so-called “stalkerware,” and that goal is more likely to be achieved when filtering tool providers have the unqualified Section 230(c)(2)(B) immunity that Congress intended.</p></blockquote>
<p><strong>Case library</strong></p>
<p><a href="https://digitalcommons.law.scu.edu/historical/2064/">Malwarebytes&#8217; petition for rehearing</a>. Supporting amicus briefs from <a href="https://ssrn.com/abstract=3484314">cybersecurity law professors</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=2&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">EFF/CAUCE</a>, <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=1&amp;article=3079&amp;context=historical&amp;type=additional">ESET</a>, and <a href="https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?filename=0&amp;article=3079&amp;context=historical&amp;type=additional&amp;preview_mode=1">Internet Association</a>.</p>
<p><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Ninth Circuit ruling</a>. <a href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</p>
<p><a href="https://www.malwarebytes.com/pdf/press/OrderGrantingDefendantsMotiontoDismiss.pdf">District court opinion</a>. <a href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm">Blog post</a> on that ruling.</p>
<p>Related decision in <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2016cv00057/451893/45">Enigma Software v. Bleeping Computer</a>. <a href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm">Blog post</a> on that ruling.</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm">Rehearing Briefs in Enigma Software v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2019/11/rehearing-briefs-in-enigma-software-v-malwarebytes.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Section 230 Helps Search Engine Defeat &#8220;Right to Be Forgotten&#8221; Lawsuit&#8211;Mosha v. Yandex</title>
		<link>https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Thu, 03 Oct 2019 19:15:26 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Search Engines]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20476</guid>

					<description><![CDATA[<p>Looking holistically at the broad arc of Internet Law history, I could make a good case that the EU&#8217;s Right to Be Forgotten marked the beginning of the end of the modern Internet. It was the first time that a...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm">Section 230 Helps Search Engine Defeat &#8220;Right to Be Forgotten&#8221; Lawsuit&#8211;Mosha v. Yandex</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo.jpg"><img loading="lazy" class="alignright size-medium wp-image-20161" src="https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo-300x300.jpg" alt="230-tattoo-300x300" width="300" height="300" srcset="https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo-300x300.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo-150x150.jpg 150w, https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo-768x768.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo-1024x1024.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2019/06/230-tattoo.jpg 1037w" sizes="(max-width: 300px) 100vw, 300px" /></a>Looking holistically at the broad arc of Internet Law history, I could make a good case that <a href="https://blog.ericgoldman.org/archives/2014/08/primer-on-european-unions-right-to-be-forgotten-excerpt-from-my-internet-law-casebook-bonus-linkwrap.htm">the EU&#8217;s Right to Be Forgotten</a> marked the beginning of the end of the modern Internet. It was the first time that a major democracy (the EU) affirmatively required Internet technology to be &#8220;dumber&#8221; for legal reasons rather than technical limits.</p>
<p>Despite its deep anti-technology and pro-censorial motivations, the EU&#8217;s RTBF has been a popular policy innovation among other regulators. It has proliferated to other countries, including Russia. It has also inspired a tsunami of other regulatory interventions that make other Internet technologies dumber than they need to be. Arguably, we might view the period right before RTBF&#8217;s launch as the high-water mark of Internet freedom. It&#8217;s been a straight line downhill since.</p>
<p>Predictably, RTBF has fostered a lot of censorship. <a href="https://transparencyreport.google.com/eu-privacy/overview">Google has received</a> nearly 900,000 EU delisting requests, though it has rejected a majority of those requests. Its rejections have spurred countless complaints that keep percolating through DPAs and the court system&#8211;a litigation machine that will churn ceaselessly in perpetuity. Those lawsuits produced a couple of important RTBF-related ECJ rulings this week that I hope to address in a future blog post.</p>
<p>Today&#8217;s case involves an RTBF lawsuit over non-deindexing, but it involves the Russian RTBF and the leading Russian search engine, Yandex. This case is a fine example of a multi-year delisting lawsuit that has spanned continents. It&#8217;s also a good reminder that RTBF won&#8217;t work under current US law.</p>
<p>Mosha claims that search results in Yandex.ru (the Russian edition of Yandex&#8217;s search engine) defame him, such as “Yury Mosha–Exposing a Fraudster,” “Yury Mosha the Swindler,” “Yury Mosha the Rogue,” “Yury Mosha the Scammer,” and “Yury Mosha Deceived.” He asked Yandex to delist those results. Yandex refused. In 2017, he sued Yandex in Russia pursuant to Russia&#8217;s RTBF law. The Russian court ruled against Mosha after he and his lawyer unexpectedly (?) no-showed at the hearing. The US court summarizes the Russian court&#8217;s findings:</p>
<blockquote><p>The Khamovniki Court held that Yandex, LLC’s refusal to de-index the websites was lawful and justified for numerous reasons: (1) Mosha presented no evidence, and the record did not reflect, that the sites distributed the information in violation of Article 10.3; (2) the Yandex search system on Yandex.ru automatically indexes publicly available information on the Internet and does not distribute the information, so it is not liable for third-party content; (3) Russia’s constitution guarantees the right to freely share information; and (4) per Article 10.3, the websites contained information about activities with criminal features (i.e. Articles 158 (robbery) and 159 (swindling) of the Russian Federation Criminal Code) and the time limit for imposing criminal liability for those actions had not yet expired.</p></blockquote>
<p>A Russian appellate court upheld this ruling on what appears to be procedural grounds.</p>
<p>In 2018, Mosha sued Yandex&#8217;s US subsidiary in New York for failure to delist the Yandex.ru search results. The US court grants the defendant&#8217;s motion to dismiss.</p>
<p><em>International Comity.</em> Yandex claimed res judicata as a defense because it won in Russia, which it said should preclude relitigation in the US. The court rejects this argument on several grounds, including the fact that Mosha was suing a different entity (the US subsidiary) with different claims than those at issue in Russia.</p>
<p>Yandex&#8217;s loss of the res judicata defense has a silver lining. Arguably, if Mosha had won the deindexing ruling in Russia and sought to enforce it in the US, we would not want to squelch Yandex&#8217;s defense on res judicata grounds. Instead, we would want to relitigate it under US law, which would almost certainly reject such deindexing. It makes me wonder if Yandex was short-sighted in bringing this defense or if it was playing some clever 4D chess with the hope of losing the defense here so that it would set a precedent for future cases where it wouldn&#8217;t want the defense. Or maybe they were so confident that they would always win international RTBF rulings that they would only be seeking affirmances in future US cases?</p>
<p><em>Defamation</em>. The court says: &#8220;while the purported statement imputes fraud or misconduct to Mosha’s character, it does not do so in relation to his important business operations, i.e., Mosha does not plead his business significantly involves his Jewish heritage, or specifically says that he cheats his business customers&#8230;.Additionally, Mosha did not plead that Yandex, Inc. published the defamatory statements; he merely references seventeen website links which he claims to contain defamatory information.&#8221;</p>
<p><em>Tortious Interference.</em> The court says: &#8220;Mosha does not identify any specific contracts that were breached, the parties to said contracts, or how such contracts were breached—all essential elements for sustaining a claim of tortious interference&#8230;.he makes no plausible allegations that Yandex, Inc. intentionally procured Mosha’s customers to breach their contract with him or that he suffered actual damages.&#8221;</p>
<p><em>.Section 230</em>. The court says: &#8220;Yandex, Inc. has immunity under the CDA&#8230;.Courts have widely held that as aggregators of third-party content, Internet search providers are interactive computer services, and as such, have immunity under the CDA.&#8221;  To get around Section 230, Mosha argued that the content violated federal criminal law. The court responds: &#8220;the § 230(e)(1) exception does not apply in civil actions, even assuming arguendo that civil litigants could &#8216;enforce&#8217; criminal statutes through a separate civil remedies provision.&#8221; [Cite to <a href="https://blog.ericgoldman.org/archives/2019/07/second-circuit-issues-powerful-section-230-win-to-facebook-in-material-support-for-terrorists-case-force-v-facebook.htm">Force v. Facebook</a>, though there are several other cases in this line saying 230 applies to civil claims for federal crimes.]</p>
<p>This is a clean and decisive ruling, but it&#8217;s not the first time that a court has used Section 230 to reject an RTBF-style claim in the United States. Other precedents include <a href="https://blog.ericgoldman.org/archives/2006/10/google_wins_law.htm">Maughan v. Google Technology, Inc.</a>, 143 Cal. App. 4th 1242 (Cal. App. Ct. 2006); <a href="https://blog.ericgoldman.org/archives/2007/09/askcom_not_liab.htm">Murawski v. Pataki,</a> 514 F. Supp. 2d 577 (S.D.N.Y. 2007); <a href="https://blog.ericgoldman.org/archives/2012/10/pro_se_privacy.htm">Shah v. MyLife.Com, Inc.</a>, 2012 WL 4863696 (D. Or. 2012); <a href="https://blog.ericgoldman.org/archives/2013/01/section_230_sti.htm">Merritt v. Lexis Nexis</a>, 2012 WL 6725882 (E.D. Mich. 2012); <a href="https://blog.ericgoldman.org/archives/2013/01/section_230_sti.htm">Nieman v. Versuslaw, Inc.</a>, 2012 WL 3201931 (C.D. Ill. 2012); <a href="https://blog.ericgoldman.org/archives/2013/01/section_230_sti.htm">Getachew v. Google, Inc.</a>, 491 Fed. Appx. 923 (10th Cir. 2012); <a href="https://blog.ericgoldman.org/archives/2013/04/google_immunize.htm">Mmubango v. Google, Inc.</a>, 2013 WL 664231 (E.D. Pa. 2013); <a href="https://blog.ericgoldman.org/archives/2016/07/search-engine-snippets-protected-by-section-230-okroley-v-fastcase.htm">O’Kroley v. Fastcase Inc.</a>, 831 F.3d 352 (6th Cir. 2016); <a href="https://blog.ericgoldman.org/archives/2016/05/google-isnt-required-to-de-index-negative-ripoff-report-fakhrian-v-google-forbes-cross-post.htm">Fakhrian v. Google Inc.</a>, 2016 WL 1650705 (Cal. App. Ct. 2016); <a href="https://blog.ericgoldman.org/archives/2016/08/repeat-plaintiff-cant-sue-search-engines-because-employers-wont-hire-him-despot-v-baltimore-life-insurance.htm">Despot v. Baltimore Life Insurance Co.</a>, 2016 WL 4148085 (W.D. Pa. 2016); <a href="https://blog.ericgoldman.org/archives/2016/11/court-rejects-effort-to-de-index-search-results-manchanda-v-google.htm">Manchanda v. Google, Inc.</a>, 2016 WL 6806250 (S.D.N.Y. 2016).</p>
<p><strong>Case citation</strong>: <a href="https://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2018cv05444/495793/43">Mosha v. Yandex Inc.</a>, 2019 WL 4805922 (S.D.N.Y. Sept. 30, 2019) (see the amended version issued October 30, 2019: <span id="cite1">2019 WL 5595037),</span></p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm">Section 230 Helps Search Engine Defeat &#8220;Right to Be Forgotten&#8221; Lawsuit&#8211;Mosha v. Yandex</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Terrible Ninth Circuit 230(c)(2) Ruling Will Make the Internet More Dangerous&#8211;Enigma v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Thu, 19 Sep 2019 18:06:03 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Privacy/Security]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20421</guid>

					<description><![CDATA[<p>The Ninth Circuit has issued a Section 230(c)(2) opinion that creates significant problems for anti-spyware/spam/virus vendors (I&#8217;ll call them &#8220;anti-threat vendors&#8221;). The ruling will paralyze their decision-making, expose them to greater legal threats, and reduce their ability to protect consumers...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Terrible Ninth Circuit 230(c)(2) Ruling Will Make the Internet More Dangerous&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="8484524390_cc35257f2a_o-300x225" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">This ruling caused this PUP to have a bad day. Photo by <a href="https://www.flickr.com/photos/anikshrestha/">Anik Shrestha</a></p></div>
<p>The Ninth Circuit has issued a Section 230(c)(2) opinion that creates significant problems for anti-spyware/spam/virus vendors (I&#8217;ll call them &#8220;anti-threat vendors&#8221;). The ruling will paralyze their decision-making, expose them to greater legal threats, and reduce their ability to protect consumers from unwanted software. This ruling makes the Internet less safe. I hope the Ninth Circuit will fix it via further proceedings.</p>
<p><strong>Background</strong></p>
<p>Section 230 protects online services from liability for third-party content in two primary ways. As a crude approximation, Section 230(c)(1) immunizes the decisions to leave up third-party content; Section 230(c)(2) provides a safe harbor for removing or blocking third-party content. Section 230(c)(2) further subdivides into two parts. (A) covers first-party removals; (B) covers anti-threat vendors who send blocking/filtering instructions to third parties (like users who have installed the vendor&#8217;s software, or servers that subscribe to third-party blocklists).</p>
<p>The vast majority of Section 230 caselaw involves 230(c)(1), which has become the foundation of the modern Internet. In contrast, Section 230(c)(2) gets a lot less attention, for several reasons. First, content removal generally produces less litigation than continued content publication. Second, liability for content removal <a href="https://ssrn.com/abstract=1934310">often can be handled through a variety of risk management techniques</a>, including contract provisions. Third, Section 230(c)(2)(A) has a &#8220;good faith&#8221; requirement that is riskier and more expensive to litigate than Section 230(c)(1), which has no parallel scienter requirement. As a result, online services sued for terminating user accounts <a href="https://blog.ericgoldman.org/archives/2019/07/russia-fucked-with-american-democracy-but-it-cant-fuck-with-section-230-federal-agency-of-news-v-facebook.htm">have successfully adopted a 230(c)(1) defense</a> in situations where the statute seemingly contemplated 230(c)(2)(A) would apply.</p>
<p>Because of this, Section 230(c)(2) has largely receded in importance. However, Section 230(c)(2)(B) still provides foundational protection in one critical context: anti-threat software.</p>
<p>In 2009, the Ninth Circuit issued a groundbreaking Section 230(c)(2) ruling in <a href="https://blog.ericgoldman.org/archives/2009/06/antispyware_com.htm">Zango v. Kaspersky</a>. I ranked that ruling as <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3025943">#6 on my list of top 10 Section 230 rulings of all time</a>. The opinion didn&#8217;t do anything fancy; it just basically interpreted the statute as written to conclude that anti-threat vendors qualified for Section 230(c)(2)&#8217;s protection. Despite the straightforward statutory analysis, the ruling has had major and beneficial consequences. As I wrote in my article, &#8220;this ruling is the main reason why we rarely see lawsuits anymore against [anti-threat vendors] for their blocking or removal decisions.&#8221; Because of Zango&#8217;s importance, any change to its holding has potentially dramatic implications.</p>
<p><strong>Section 230(c)(2) and Anticompetitive Animus</strong></p>
<p>Writing for the majority, Judge Schroeder (a Carter appointment) frames the case as &#8220;whether § 230(c)(2) immunizes blocking and filtering decisions that are driven by anticompetitive animus.&#8221; The majority answers the question negatively: &#8220;if a provider’s basis for objecting to and seeking to block materials is because those materials benefit a competitor, the objection would not fall within any category listed in the statute and the immunity would not apply.&#8221; The majority explains:</p>
<blockquote><p>users selecting a security software provider must trust that the provider will block material consistent with that user’s desires. Users would not reasonably anticipate providers blocking valuable online content in order to stifle competition. Immunizing anticompetitive blocking would, therefore, be contrary to another of the statute’s express policies: “removing disincentives for the utilization of blocking and filtering technologies&#8221;&#8230;.interpreting the statute to give providers unbridled discretion to block online content would, as Judge Fisher warned, enable and potentially motivate internet-service providers to act for their own, and not the public, benefit”</p></blockquote>
<p>The dissent thought the Zango precedent was dispositive: &#8220;Although the parties were not direct competitors, the plaintiff in Zango asserted similar anticompetition effects. The majority’s policy arguments are in conflict with our recognition in Zango that the broad language of the Act is consistent with “the Congressional goals for immunity” as expressed in the language of the statute.&#8221;</p>
<p>Still, at a high enough level of abstraction, the majority&#8217;s reasoning sounds sensible. If a plaintiff has credible evidence that the defendant has violated antitrust law, it should have legal recourse. Section 230(c)(2) should not stand in the way.</p>
<p>Nevertheless, the majority&#8217;s legal standard creates two obvious and significant problems. First, many spammers, virusmakers, and adware/spyware makers will claim&#8211;legitimately or not&#8211;to be direct or partial competitors with anti-threat vendors. In those situations, the threat purveyors will naturally claim that the blocking was motivated by anticompetitive animus. In fact, I would expect such anticompetitive animus claims to be routine for blocked entities, not an exception. Indeed, as the dissent noted, Zango claimed (not credibly) its adware was competitive with Kaspersky&#8217;s anti-threat software. For a similar phenomenon, recall how many vertical search engines mockably claimed they were Google&#8217;s competitors when Google downranked or delisted them. If a blocked or filtered threat purveyor can easily bypass Section 230(c)(2) merely by claiming they were blocked based on the anti-threat vendor&#8217;s alleged anticompetitive animus, then Section 230(c)(2)(B) doesn&#8217;t really protect anti-threat vendors.</p>
<p>Second, even when a software vendor actually directly competes with the anti-threat vendor, it might still be appropriate to block it. Unfortunately, the anti-threat software industry has too many sleazy players who are really in the scareware or adware business. When anti-threat vendors&#8217; direct competitors are also threats to consumers, the court&#8217;s standards virtually ensure that Section 230(c)(2) won&#8217;t be available.</p>
<p>Thus, this case functionally overturns Zango v. Kaspersky. The Zango ruling gave a lot of comfort to anti-threat vendors that they could make their classification decisions without being sued for each one. This ruling restores the pre-Zango default, when anti-threat vendors feared a lawsuit with each of their classification decisions.</p>
<p>The demise of the Zango v. Kaspersky rule will have three pernicious consequences. First, anti-threat vendors will have to do more upfront homework to justify and document their blocking decisions in case they may be challenged in the future. That increases their costs and slows down their decision-making.</p>
<p>Second, to reduce the risk of litigation, anti-threat vendors will err on the side of not blocking (or will reverse their decision when threatened with a lawsuit). At the margins, anti-threat vendors will now green-light &#8220;potentially unwanted programs&#8221; (PUPs) that they would have historically blocked. Ironically, then, this ruling is pro-spam, pro-virus, and pro-spyware/adware. It makes consumers less safe because more sketchy programs will not be blocked when they should have. Worse, as anti-threat vendors do a poorer job of their core consumer protection function, consumers&#8217; trust in the entire anti-threat industry will degrade even more.</p>
<p>Third, anti-threat vendors will be sued by blocked software vendors more often. Even if those lawsuits ultimately fail, they will increase the industry&#8217;s costs with little concomitant benefit. And in the end, we don&#8217;t want courts usurping the judgment of anti-threat vendors in deciding what is a threat or not. That&#8217;s an expensive, slow, and very unsatisfying way of making blocking decisions.</p>
<p>All of these consequences are maddeningly unnecessary because Malwarebytes is likely to win this case via other legal theories. It probably didn&#8217;t block Enigma solely out of anti-competitive animus, and its judgment about Enigma&#8217;s threat status is a constitutionally protected opinion. Like some of the other Ninth Circuit Section 230 debacles (like promissory estoppel and failure to warn), this opinion is likely to increase everyone&#8217;s litigation and judicial costs to reach defense wins. Anti-threat vendors have the editorial freedom to decide what programs to block, but they won&#8217;t have 230(c)(2)&#8217;s judicial fast lane.</p>
<p>But what if Malwarebytes did actually block Enigma solely out of anti-competitive animus? The majority treats Malwarebytes&#8217; block as market-determinative, i.e., Malwarebytes&#8217; block apparently freezes Enigma out of the market. But if Malwarebytes&#8217; users aren&#8217;t happy with its blocking function, the users can uninstall Malwarebytes and adopt Enigma instead. This means consumers are empowered to override Malwarebytes&#8217; decisions. If so, we don&#8217;t need Section 230(c)(2)(B) to police this corner of the marketplace.</p>
<p>Note: The tie-breaking vote was cast by a district judge sitting by designation, not by a Ninth Circuit-appointed judge. It&#8217;s troubling to see Ninth Circuit law being set by a visiting judge. This would be another good reason to consider granting en banc review.</p>
<p><strong>Problematic Dicta With the Majority Opinion</strong></p>
<p>The majority opinion reaches a bad result, but that&#8217;s not its only problem. I&#8217;ll highlight three unfortunate passages from the majority opinion:</p>
<p><em>What Does &#8220;Objectionable&#8221; Mean?</em> 230(c)(2) has a catchall excuse for blocking of anything vendors consider &#8220;objectionable.&#8221; This catchall has vexed courts because it is broad and unbounded. The majority says the catchall could apply here: &#8220;Spam, malware and adware could fairly be placed close enough to harassing materials to at least be called &#8216;otherwise objectionable.'&#8221;</p>
<p>So far so good. Then, the majority adds: &#8220;We think that the catchall was more likely intended to encapsulate forms of unwanted online content that Congress could not identify in the 1990s.&#8221; Huh? I have no idea where the majority got this impression. More likely, Congress wanted a general-purpose catchall to avoid comprehensively enumerating all possible categories of objectionable material. Because the majority&#8217;s addition is unsupported and speculative dicta, I hope other courts will ignore it.</p>
<p><em>Blocking Based on Identity. </em>The majority opinion says:</p>
<blockquote><p>the criteria for blocking online material must be based on the characteristics of the online material, i.e. its content, and not on the identity of the entity that produced it.</p></blockquote>
<p>Rebecca Tushnet calls this language &#8220;particularly destructive&#8221; of the safe harbor, for good reason. This passage can&#8217;t possibly be right. Read literally, this would prevent any reputation scores for spam filters, any effort to identify and block recidivists, even any IP address blocks. There are substantial operational efficiencies from making blocking and filtering decisions based on content source rather than doing individualized determinations for each and every content item. This passage jeopardizes all of those operational efficiencies. Plus, in some cases, the identity of the content publisher makes a huge difference. A beheading video posted by a terrorist organization is different when it&#8217;s posted by a human rights watchdog, even if the video is identical in both cases. So it&#8217;s essential for anti-threat vendors to consider content source and not just the four corners of content items. This passage needs to be fixed or ignored.</p>
<p><em>Limits on</em> <em>Discretion</em>. It&#8217;s worth revisiting this quote from the majority opinion:</p>
<blockquote><p>interpreting the statute to give providers unbridled discretion to block online content would, as Judge Fisher warned, enable and potentially motivate internet-service providers to act for their own, and not the public, benefit</p></blockquote>
<p>WTH? Of course all for-profit companies act for their own benefit. That&#8217;s called capitalism. What&#8217;s remarkable about Section 230 is that it motivates Internet companies to undertake *socially valuable* content moderation work&#8211;<em>despite</em> the apparent financial disincentives to doing so.</p>
<p>As a result, language like this is extraordinarily pernicious, because it suggests that Section 230 is conditioned on defendants exercising their editorial discretion only for the &#8220;public benefit&#8221; rather than any other objectives. That&#8217;s nonsensical. Content moderation is a zero-sum game where someone gets what they want and someone else doesn&#8217;t, and the losers will always claim that the decision wasn&#8217;t in the &#8220;public&#8221; benefit. Furthermore, <a href="https://www.ft.com/content/d1387b70-a5d5-11e2-9b77-00144feabdc0">as Margaret Thatcher suggested</a>, there is no monolithic &#8220;public&#8221; to prioritize. Instead, there are heterogeneous communities with diverse needs that often must balanced rather than pareto-optimize. This passage also needs to be fixed or ignored.</p>
<p><strong>Section 230 and Lanham Act False Advertising Claims</strong></p>
<p>The opinion had one good aspect. Section 230 expressly does not apply to intellectual property claims, including federal trademark claims. However, because the Lanham Act false advertising provisions occupy the same part of the US code as federal trademark law, some courts have held that Section 230 doesn&#8217;t apply to Lanham Act false advertising claims. The court correctly reaches the opposite conclusion:</p>
<blockquote><p>the intellectual property exception contained in § 230(e)(2) encompasses claims pertaining to an established intellectual property right under federal law, like those inherent in a patent, copyright, or trademark. The exception does not apply to false advertising claims brought under § 1125(a) of the Lanham Act, unless the claim itself involves intellectual property.</p></blockquote>
<p><strong>Comments from the Litigants</strong></p>
<p>Comments from Terry Budd, Enigma&#8217;s counsel:</p>
<blockquote>
<div>In its Opinion in the <em>Enigma Software vs Malwarebytes</em> case the 9th Circuit (Justice Schroeder) held that Section 230 is not limitless &#8211; and reasoned that to grant immunity for anticompetitive tortious conduct by a company against a competitor would violate the statutory purposes of Section 230 expressly articulated by Congress and violate the statute itself.  Stated another way, to allow a company to harm a competitor and consumers though anticompetitive, unfair trade practices which have been unlawful under well established American legal precedent for decades &#8211;  and then to allow that company to claim immunity under what was designed to be a Good Samaritan statute, is antithetical to the very core of the Good Samaritan Doctrine. The 9th Circuit is a very highly-respected and thoughtful Court &#8211; particularly so in the legal software/tech sector  &#8211; and we agree with the Court’s ultimate holdings.</div>
</blockquote>
<p>Comments from Tyler Newby, Malwarebytes&#8217; counsel:</p>
<blockquote><p>We are disappointed by the majority’s ruling.  The company is evaluating its options for seeking further appellate review, and it is likely to petition for en banc review.</p>
<p>We think the majority opinion failed to recognized the distinction between 230(c)(2)(A), which applies to service providers that filter content in a way that may not be transparent to users, and 230(c)(2)(B), which applies to providers of filtering technology that users may choose to use or not to use based on their own preferences.  We agree with Judge Rawlinson’s dissent that the plain text of CDA Section 230(c)(2)(B) does not include the limitation on immunity read into it by the majority.  Nothing in the text of the statute or its stated purposes would limit immunity to filtering where the source of the filtered content was not considered.  Malwarebytes, like other security software providers, is a provider of  filtering tools to users who can choose to use its software or one of the many other options available to them, depending on whether they agree with how Malwarebytes filters PUPs.  Malwarebytes puts consumer choice first, and its Potentially Unwanted Program criteria are designed give users more control over their computers.</p>
<p>Finally, it is important to note that Malwarebytes does not compete with Enigma. The opinion’s description of the companies as direct competitors is not based on any evidentiary findings, but solely on Enigma’s allegations at the pleadings stage.</p></blockquote>
<p><strong>Other Coverage</strong>:</p>
<p><a href="https://tushnet.blogspot.com/2019/09/9th-circuit-drives-big-hole-through.html">Rebecca Tushnet</a>. She wrote: &#8220;Eric Goldman is gonna hate that.&#8221; Rebecca knows me really well!</p>
<p><a href="https://www.techdirt.com/articles/20190913/10380042985/ninth-circuit-reverses-course-while-quoting-own-precedent-saying-otherwise-says-section-230-doesnt-cover-anti-competitive.shtml">Tim Cushing</a></p>
<p><strong>Case citation</strong>: <a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/12/17-17351.pdf">Enigma Software Group USA, LLC v. Malwarebytes, Inc.</a>, 2019 WL 4315152 (9th Cir. Sept. 12, 2019)</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm">Terrible Ninth Circuit 230(c)(2) Ruling Will Make the Internet More Dangerous&#8211;Enigma v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2019/09/terrible-ninth-circuit-230c2-ruling-will-make-the-internet-more-dangerous-enigma-v-malwarebytes.htm/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Comments on Rep. Gosar&#8217;s &#8220;Stop the Censorship Act,&#8221; Another &#8220;Conservative&#8221; Attack on Section 230</title>
		<link>https://blog.ericgoldman.org/archives/2019/08/comments-on-rep-gosars-stop-the-censorship-act-another-conservative-attack-on-section-230.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Thu, 15 Aug 2019 16:29:10 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Content Regulation]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Internet History]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=20353</guid>

					<description><![CDATA[<p>At this point, many &#8220;conservatives&#8221; favor government regulation of the editorial practices of Internet companies. As a result, proposals coming from DC &#8220;conservatives&#8221; that reference &#8220;censorship&#8221; in their titles almost certainly are designed to embrace, not prevent, censorship. For example,...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/08/comments-on-rep-gosars-stop-the-censorship-act-another-conservative-attack-on-section-230.htm">Comments on Rep. Gosar&#8217;s &#8220;Stop the Censorship Act,&#8221; Another &#8220;Conservative&#8221; Attack on Section 230</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2019/06/censorship-meme.jpg"><img loading="lazy" class="alignright size-full wp-image-20111" src="https://blog.ericgoldman.org/wp-content/uploads/2019/06/censorship-meme.jpg" alt="censorship-meme" width="257" height="196" /></a>At this point, many &#8220;conservatives&#8221; favor government regulation of the editorial practices of Internet companies. As a result, proposals coming from DC &#8220;conservatives&#8221; that reference &#8220;censorship&#8221; in their titles almost certainly are designed to embrace, not prevent, censorship. For example, I proposed renaming <a href="https://blog.ericgoldman.org/archives/2019/07/comments-on-sen-hawleys-ending-support-for-internet-censorship-act.htm">Sen. Hawley&#8217;s &#8220;Ending Support for Internet Censorship Act&#8221;</a> as &#8220;Support for Internet Censorship Act,&#8221; because that&#8217;s exactly what the bill does. Similarly, with <a href="https://www.congress.gov/bill/116th-congress/house-bill/4027/text?q=%7B%22search%22%3A%5B%22paul+gosar%22%5D%7D&amp;r=3&amp;s=4">Rep. Gosar D.D.S.&#8217;s &#8220;Stop the Censorship Act,&#8221;</a> I think a proper name would be simply &#8220;Censorship Act.&#8221; Truth in advertising.</p>
<p>Rep. Gosar&#8217;s HR 4027 was introduced in Congress July 25, 2019, but the text didn&#8217;t appear in Congress.gov until yesterday (August 14). I do not understand it took 3 weeks for the bill&#8217;s text to become public. In the interim, the bill has caused some confusion. When introduced, Rep. Gosar issued a <a href="https://gosar.house.gov/news/documentsingle.aspx?DocumentID=3854">press release</a> but didn&#8217;t include the text. Unsurprisingly, the press release wasn&#8217;t 100% accurate. That sparked several news reports that responded to the press release but were themselves imprecise because they weren&#8217;t grounded in the text.</p>
<p>Now that the text is public, we can finally do a well-informed evaluation. The bill proposes three substantive changes to Section 230(c)(2). First, it would limit the 230(c)(2)(A) safe harbor for filtering/blocking decisions only to &#8220;unlawful&#8221; content, rather than the current much broader scope of &#8220;objectionable&#8221; content. Second, it would limit the 230(c)(2)(B) safe harbor for providing filtering instructions only to &#8220;unlawful&#8221; content. Third, it would create a new safe harbor for providing users with the ability to restrict access to material. I did a redline showing its proposed changes to Section 230(c):</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar.png"><img loading="lazy" class="aligncenter size-full wp-image-20348" src="https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar.png" alt="gosar" width="1309" height="799" srcset="https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar.png 1309w, https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar-300x183.png 300w, https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar-768x469.png 768w, https://blog.ericgoldman.org/wp-content/uploads/2019/08/gosar-1024x625.png 1024w" sizes="(max-width: 1309px) 100vw, 1309px" /></a></p>
<p>This bill is terrible in many ways. Among other problems, it grossly misunderstands Section 230&#8217;s mechanics, its desired policy consequences would be horrible, and it is misdrafted to advance those objectives. Some of the bill&#8217;s lowlights:</p>
<p><strong>Internet Services Rarely Rely on Section 230(c)(2)(A) Any More.</strong> Section 230(c)(2)(A) doesn&#8217;t matter to most Internet services. As I&#8217;ve explained before, as a gross stereotype, Section 230(c)(1) protects &#8220;leave-up&#8221; decisions, and Section 230(c)(2)(A) protects &#8220;removal&#8221; decisions. In general, content removal decisions trigger far fewer lawsuits than leave-up decisions.</p>
<p>In the case of removals, the most likely plaintiff is the user whose content has been removed. Those users often don&#8217;t have enough at stake to sue, and they will have to navigate around the service&#8217;s TOS and its many provisions protecting the service.</p>
<p>Meanwhile, courts have narrowed the scope of Section 230(c)(2)(A)&#8217;s safe harbor to the point where very few services rely on its safe harbor. Instead, <a href="https://blog.ericgoldman.org/archives/2019/07/russia-fucked-with-american-democracy-but-it-cant-fuck-with-section-230-federal-agency-of-news-v-facebook.htm">courts routinely hold</a> that Section 230(c)(1), instead of Section 230(c)(2)(A), preempts users&#8217; suits over removal decisions, so most Internet services rely on that.</p>
<p>As a result, amending Section 230(c)(2)(A) won&#8217;t likely change the outcomes for users who experience removals. In other words, the bill&#8217;s revisions to Section 230(c)(2)(A) aren&#8217;t likely to advance the drafters&#8217; policy objectives. It&#8217;s perplexing, and possibly embarrassing, that the bill drafters apparently misunderstood the role Section 230(c)(2)(A) actually plays in the ecosystem. Oops.</p>
<p><strong>Anti-Threat Vendors Rely on Section 230(c)(2)(B), But This Bill Would Eviscerate Their Safe Harbor</strong>. While Section 230(c)(2)(A) has faded in importance, Section 230(c)(2)(B) remains a vital protection for anti-threat vendors, such as vendors of anti-spam, anti-spyware, anti-malware, and anti-virus software. Every time these vendors make a classification decision that will block their users&#8217; access to third party software or content, they face potential lawsuits. Fortunately, in the <a href="https://blog.ericgoldman.org/archives/2009/06/antispyware_com.htm">Zango v. Kaspersky ruling</a> from a decade ago, the Ninth Circuit held that Section 230(c)(2)(B) applied to those lawsuits. In practice, that ruling ended lawsuits by spammers, adware vendors, and other producers of threats against software vendors over blocking and classification decisions.</p>
<p>The bill would implicitly overturn Zango v. Kaspersky and instead provide a safe harbor only for blocking &#8220;unlawful content.&#8221; As a result, vendors who produce software or content that is pernicious/unwanted, but not technically illegal, would have much greater legal leverage to challenge any classification decisions. This has at least two bad consequences: (1) anti-threat software will become substantially less useful to users because they let through more unwanted stuff, and (2) there will be a lot more litigation over classification decisions, which will raise defense costs and make the anti-threat vendors scared to block anyone. So instead of calling this bill &#8220;Stop the Censorship Act,&#8221; it might be more accurate to call it the &#8220;Stop Protecting Consumers from Spam, Spyware, Malware, and Viruses Act.&#8221;</p>
<p>The bill would also remove the safe harbor for parental control software vendors that block children&#8217;s access to content that is lawful but nevertheless inappropriate for kids. If this changes the vendors&#8217; behavior, the bill seemingly would make parental control software useless. That outcome would be rich in historical irony, because Congress wanted Section 230 to spur the adoption of self-regulatory efforts to keep kids safe online&#8211;through technologies like parental control software. Indeed, Section 230(d) (added a couple years after Section 230&#8217;s initial passage) *requires* &#8220;interactive computer services&#8221; to notify customers about the availability of parental control software (a provision that is widely ignored, but whatever). This bill would directly undermine one of Section 230&#8217;s principal policy goals, so perhaps it should be renamed the &#8220;Stop Keeping Kids Safe Online Act.&#8221;</p>
<p><strong>What Is &#8220;Unlawful&#8221; Content?</strong> The bill doesn&#8217;t define the term &#8220;unlawful content,&#8221; and its meaning isn&#8217;t self-evident. Some possibilities of what it might mean:</p>
<ul>
<li>Most likely the drafters meant that &#8220;unlawful&#8221; content only refers to content categorically outside of U.S. Constitutional protection. That includes things like child porn, obscenity, true threats/incitement to imminent violence, certain types of speech incident to criminal conduct, and possibly copyright infringement. Note that some other standard First Amendment exclusions, such as defamation, enjoy substantial procedural limits required by the First Amendment, so it&#8217;s not clear how to categorize that kind of content.</li>
<li>Any content that creates potential tort exposure. This would include a wide but indeterminate array of content.</li>
<li>Any content that is illegal or tortious under any law anywhere on the globe. In practice, that would be virtually all content.</li>
</ul>
<p>Due to the term&#8217;s imprecision, it&#8217;s hard to judge the scope of the suppressable content that would be consistent with the redefined safe harbor.</p>
<p><strong>Limiting Content Filtering to &#8220;Unlawful Content&#8221; Would Be Stupid</strong>. Let&#8217;s assume the bill would limit the Section 230(c)(2) safe harbors only to removing Constitutionally unprotected content. If so, removing pernicious but legal content would no longer get the safe harbor. If Internet services actually changed their behavior due to this reshaped safe harbor, they would be overrun by trollers, spammers, and miscreants, which would crowd out all productive conversations. In other words, this bill seeks to make Internet services look more like 8Chan. Perhaps this bill should be renamed the &#8220;I <img src="https://s.w.org/images/core/emoji/13.0.1/72x72/2764.png" alt="❤" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 8Chan Act.&#8221;</p>
<p><strong>What Does It Mean to Give Users &#8220;Options to Restrict Access&#8221; to Content?</strong> The bill proposes a new safe harbor for putting more filtering power in users&#8217; hands. Putting aside the filter bubble risk, on balance that sounds like it could be a good thing.</p>
<p>But what does it mean to give users &#8220;options to restrict access&#8221;? The press release expressly cites three examples: Google <em>SafeSearch, </em>Twitter <em>Quality Filter </em>or YouTube <em>Restricted Mode </em>(I retained the quirky italicization from the press release).</p>
<p>Wut? Google SafeSearch is on by default, so does this means that Google&#8217;s default search always will qualify for the new 230(c)(2)(C) safe harbor even though the SafeSearch routinely blocks and downgrades lawful content?  I don&#8217;t know much about Twitter&#8217;s Quality Filter or how widely it&#8217;s used. Surely the reference to YouTube&#8217;s Restricted Mode can&#8217;t be right&#8211;after all, having his videos restricted <a href="https://blog.ericgoldman.org/archives/2018/03/youtube-isnt-a-company-town-duh-prager-university-v-google.htm">triggered Prager University to sue Google</a> (unsuccessfully). Or maybe the drafters didn&#8217;t realize that?</p>
<p>All three examples involve coarse filters&#8211;essentially, they are either on-or-off. So if a binary on/off filtering tool qualifies as giving users &#8220;options&#8221; to filter, then what personalization or filtering tool wouldn&#8217;t qualify for 230(c)(2)(C)?</p>
<p>Because many services give users options to personalize the content they see in some way or another, 230(c)(2)(C) seemingly could swallow up the rest of the bill and make the changes to 230(c)(A) and (B) functionally irrelevant. For example, because installing anti-threat software or parental control software is a binary &#8220;option,&#8221; maybe those services gain back via 230(c)(2)(C) everything that they seemingly lost in the proposed revisions to 230(c)(2)(B)&#8230;? But it&#8217;s hard to say that most filtering software puts true &#8220;options&#8221; into the hands of users&#8211;in virtually all cases, anti-spam software is a binary on/off, so the real filtering power remains in the service&#8217;s classification decisions. So if 230(c)(2)(C) is broad enough to pick up binary options, I don&#8217;t understand what the drafters think they are accomplishing.</p>
<p>[Note the odd grammar of 230(c)(2)(C). The safe harbor only applies to &#8220;actions taken to provide&#8221; users with filters. It doesn&#8217;t say that the safe harbor applies to the actual filtering decisions. I&#8217;m assuming it does because that&#8217;s the only sensible outcome. If the safe harbor doesn&#8217;t protect filtering decisions, I have no idea what would be covered by this safe harbor.]</p>
<p style="text-align: center;">* * *</p>
<p style="text-align: left;">Last month, <a href="https://blog.ericgoldman.org/archives/2019/07/large-and-diverse-coalition-issues-a-statement-of-principles-to-help-evaluate-ugc-liability-reform-proposals.htm">a huge coalition of Section 230 experts released seven principles to evaluate proposed amendments to Section 230</a>. I&#8217;ll use the principles to evaluate Rep. Gosar&#8217;s bill:</p>
<ul>
<li><em>Principle #1: Content creators bear primary responsibility for their speech and actions</em>. The bill doesn&#8217;t directly address this issue because it focuses on removals, not leave-up decisions.</li>
<li><em>Principle #2: Any new intermediary liability law must not target constitutionally protected speech</em>. Arguably, the bill doesn&#8217;t violate this principle because it seeks to protect Constitutionally protected speech from editorial filtering. But it advances that goal at the expense of the Internet services&#8217; editorial discretion, so it also seeks to restrict the constitutionally protected speech of Internet services.</li>
<li><em>Principle #3: The law shouldn’t discourage Internet services from moderating content</em>. It absolutely tries to discourage Internet services from moderating content in the worst possible way.</li>
<li><em>Principle #4: Section 230 does not, and should not, require “neutrality.”</em> The bill doesn&#8217;t expressly address neutrality, but by forcing Internet companies to treat pro-social and anti-social content equally, the bill creates the kind of false equivalency that violates this principle.</li>
<li><em>Principle #5: We need a uniform national legal standard</em>. The bill doesn&#8217;t directly address this issue. However, by circumscribing Section 230(c)(2)&#8217;s shield, it would newly expose defendants to a wide range of diverse state law claims&#8211;something we saw frequently when spammers and adware vendors sued anti-threat software vendors. So the bill violates this principle sub silento.</li>
<li><em>Principle #6: We must continue to promote innovation on the Internet</em>. The bill drafters might think they are promoting innovation with the new 230(c)(2)(C) safe harbor, which tries to push more filtering to user-controlled options and thus might spur filtering innovations. I don&#8217;t think that would be the result, especially if a binary on-off option satisfies the safe harbor. However, I don&#8217;t think this bill has the same pernicious anti-innovation effects that Sen. Hawley&#8217;s bill would have.</li>
<li><em>Principle #7: Section 230 should apply equally across a broad spectrum of online services</em>. The bill doesn&#8217;t directly implicate this issue. However, by mucking with Section 230(c)(2)(B), the bill would actually newly expose anti-threat vendors to liability that might not be faced by other players in the ecosystem.</li>
</ul>
<p>On the plus side, this bill doesn&#8217;t run afoul of all the principles. On the minus side, this bill directly, squarely, and perniciously violates several principles, especially Principles #3 and 4. That should be a huge red flag.</p>
<p style="text-align: center;">* * *</p>
<p>It doesn&#8217;t bring me any joy to dunk on a bill like this. Like Sen. Hawley&#8217;s bill, it almost certainly was meant as a piece of performative art to &#8220;play to the base&#8221; rather than as a serious policy proposal. But even as performative art, it highlights how Section 230 is grossly misunderstood by politicians inside DC, and it&#8217;s a reminder that modifying Section 230 requires extreme care because even minor changes could have dramatic and very-much-unwanted consequences.</p>
<p>Even if there are merits to taking a closer look at Section 230, proposals like this don&#8217;t aid that process. Instead, by perpetrating myths about Section 230 and politicizing Section 230, bills like this degrade the conversation. They move us yet closer to the day when Congress does something terrible to Section 230 for all of the wrong reasons.</p>
<p>[SPECIAL SHOUTOUT TO REPORTERS: If I&#8217;m right that Sen. Hawley&#8217;s bill and this bill are performative art, not serious policy proposals, you do a HUGE disservice to your readers and the world when you treat the bill authors as credible information sources on Section 230. In effect, you are helping them amplify their messages to their base while polluting the discourse for everyone else. Of course, the bill drafters know you will do this, so introducing a performative art bill buys them an ill-deserved seat at the discussion. They are intentionally weaponizing your compulsion to present &#8220;both sides&#8221; against you. Don&#8217;t take the bait.]</p>
<p style="text-align: center;">* * *</p>
<p style="text-align: center;"><strong>Appendix</strong></p>
<p>I offered several alternative names for the bill, so I thought it would be helpful to recap them all here:</p>
<p>&#8220;Censorship Act&#8221;</p>
<p>&#8220;Stop Protecting Consumers from Spam, Spyware, Malware, and Viruses Act&#8221;</p>
<p>&#8220;Stop Keeping Kids Safe Online Act&#8221;</p>
<p>&#8220;I <img src="https://s.w.org/images/core/emoji/13.0.1/72x72/2764.png" alt="❤" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 8Chan Act&#8221;</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/08/comments-on-rep-gosars-stop-the-censorship-act-another-conservative-attack-on-section-230.htm">Comments on Rep. Gosar&#8217;s &#8220;Stop the Censorship Act,&#8221; Another &#8220;Conservative&#8221; Attack on Section 230</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Filtering Software Defeats Another Lawsuit&#8211;PC Drivers v. Malwarebytes</title>
		<link>https://blog.ericgoldman.org/archives/2019/03/filtering-software-defeats-another-lawsuit-pc-driver-v-malwarebytes.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Fri, 08 Mar 2019 15:01:14 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Derivative Liability]]></category>
		<category><![CDATA[Trademark]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=19732</guid>

					<description><![CDATA[<p>I blogged about this case in September. PC Drivers makes software that claims to help speed up users&#8217; computers. Malwarebytes blocked it as a &#8220;potentially unwanted program,&#8221; or PUP. Litigation ensued. In the prior ruling, Malwarebytes won big, but then...</p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/03/filtering-software-defeats-another-lawsuit-pc-driver-v-malwarebytes.htm">Filtering Software Defeats Another Lawsuit&#8211;PC Drivers v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_19201" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o.jpg"><img aria-describedby="caption-attachment-19201" loading="lazy" class="size-medium wp-image-19201" src="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg" alt="8484524390_cc35257f2a_o-300x225" width="300" height="225" srcset="https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-300x225.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-768x576.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2018/09/8484524390_cc35257f2a_o-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-19201" class="wp-caption-text">Unlike shady software, this is a good PUP. by Anik Shrestha, https://www.flickr.com/photos/anikshrestha/</p></div>
<p>I <a href="https://blog.ericgoldman.org/archives/2018/09/section-230-helps-malware-vendor-avoid-liability-for-blocking-decision-pc-drivers-v-malwarebytes.htm">blogged about this case</a> in September. PC Drivers makes software that claims to help speed up users&#8217; computers. Malwarebytes blocked it as a &#8220;potentially unwanted program,&#8221; or PUP. Litigation ensued. In the prior ruling, Malwarebytes won big, but then unexpectedly asked the judge to transfer the litigation from Texas to California rather than close out the case with a judge who already supported its positions. Fortunately for Malwarebytes, the California court reaches the same conclusions.</p>
<p><em>Section 230(c)(2)(B)</em>. As the Texas court held, Malwarebytes&#8217; blocking of PC Drivers is pretty much a textbook application of Section 230(c)(2)(B)&#8217;s safe harbor for filtering instructions. PC Drivers tried four arguments to get around it:</p>
<ul>
<li>The safe harbor shouldn&#8217;t work on a motion to dismiss. The court cites 3 cases that have found 230(c)(2)(B) on a motion to dismiss.</li>
<li>230(c)(2)(B) doesn&#8217;t apply to click stealing. PC Drivers claims that Malwarebytes &#8220;steals&#8221; &#8220;click advertising services&#8221; by diverting PC Drivers customers to become Malwarebytes customers. This happens because Malwarebytes flagged PC Drivers&#8217; domains as PUP sources and displays a warning to its software users when they try to access those domains. The court says the &#8220;alleged redirection in this case clearly is an action that enables or makes available the technical means to restrict access to material.&#8221; This discussion has some parallels to the alleged diversion at issue in competitive keyword advertising cases, but the court doesn&#8217;t make the linkage. The court also says 230(c)(2)(B) extends to providing screenshots and instructions on how to remove PC Drivers.</li>
<li>Malwarebytes committed tortious contract interference by blocking its software even for its paying customers and making it really hard for them to keep using the software. The court says the Ninth Circuit rejected this argument in <a href="https://blog.ericgoldman.org/archives/2009/06/antispyware_com.htm">Zango v. Kaspersky</a>.</li>
<li>Its software isn&#8217;t &#8220;objectionable.&#8221; The court responds that the statute makes clear that it&#8217;s a subjective standard for objectionable.</li>
</ul>
<p>Section 230(c)(2)(B) thus wipes out most of PC Drivers&#8217; claims.</p>
<p><em>False </em><em>Advertising</em>. PC Drivers claims that Malwarebytes violated Lanham Act 43(a) by saying that its software is a “system optimizer” that “uses intentional false positives to convince users that their systems have problems.” The court says these are non-actionable opinions.</p>
<p><em>Trademarks</em>. &#8220;PC Drivers contends that Malwarebytes’ use of the Marks is causing confusion by &#8216;deceiv[ing] the public into believing PC Drivers’ website and [P]roducts are malicious, and that Malwarebytes’ premium product is the solution to resolve any future ‘malicious’ programs.'&#8221; The court says this is a &#8220;novel&#8221; theory of trademark infringement unsupported by the precedent. Also, Malwarebytes qualifies for nominative use because its messages connoted disapproval of PC Drivers.</p>
<p>The court&#8217;s ruling is sensible and unsurprising given the Texas ruling. A different case against Malwarebytes, brought by Enigma, is on appeal to the Ninth Circuit. The ruling in that case should be more of the same, but if the Ninth Circuit does something goofy, this case previews the nonsense we can anticipate.</p>
<p><strong>Case citation</strong>: <a href="https://blog.ericgoldman.org/archives/2018/09/section-230-helps-malware-vendor-avoid-liability-for-blocking-decision-pc-drivers-v-malwarebytes.htm">PC Drivers Headquarters LP v. Malwarebytes Inc.</a>, 2019 WL 1061739 (N.D. Cal. March 6, 2019)</p>
<p><strong>Other Posts on Malwarebytes</strong>:</p>
<p><a href="https://blog.ericgoldman.org/archives/2018/09/section-230-helps-malware-vendor-avoid-liability-for-blocking-decision-pc-drivers-v-malwarebytes.htm">Section 230 Helps Malware Vendor Avoid Liability for Blocking Decision–PC Drivers v. Malwarebytes</a></p>
<p><a title="Section 230(c)(2) Protects Anti-Malware Vendor–Enigma v. Malwarebytes" href="https://blog.ericgoldman.org/archives/2017/11/section-230c2-protects-anti-malware-vendor-enigma-v-malwarebytes.htm" rel="bookmark">Section 230(c)(2) Protects Anti-Malware Vendor–Enigma v. Malwarebytes</a></p>
<p><a title="Message Board Operator May Be Liable For Moderator’s Content–Enigma v. Bleeping" href="https://blog.ericgoldman.org/archives/2016/07/message-board-operator-may-be-liable-for-moderators-content-enigma-v-bleeping.htm" rel="bookmark">Message Board Operator May Be Liable For Moderator’s Content–Enigma v. Bleeping</a></p>
<p>The post <a rel="nofollow" href="https://blog.ericgoldman.org/archives/2019/03/filtering-software-defeats-another-lawsuit-pc-driver-v-malwarebytes.htm">Filtering Software Defeats Another Lawsuit&#8211;PC Drivers v. Malwarebytes</a> appeared first on <a rel="nofollow" href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
