<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Trespass to Chattels Archives - Technology &amp; Marketing Law Blog</title>
	<atom:link href="https://blog.ericgoldman.org/archives/category/trespass-to-chattels/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ericgoldman.org/archives/category/trespass-to-chattels</link>
	<description></description>
	<lastBuildDate>Wed, 29 Apr 2026 14:36:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">59487357</site>	<item>
		<title>Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</title>
		<link>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Wed, 29 Apr 2026 14:36:23 +0000</pubDate>
				<category><![CDATA[Adware/Spyware]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28840</guid>

					<description><![CDATA[<p>The defendant offers a browser extension that displays popup windows over e-commerce sites showing price comparison information. Enterpreneurs have been trying to make this sort of functionality happen since the late 1990s. Maybe this browser extension will succeed where thousands...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm">Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss.jpg"><img decoding="async" class="alignright size-medium wp-image-28842" src="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-300x155.jpg" alt="" width="300" height="155" srcset="https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-300x155.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss-768x396.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2026/04/ss.jpg 935w" sizes="(max-width: 300px) 100vw, 300px" /></a>The defendant offers a browser extension that displays popup windows over e-commerce sites showing price comparison information. Enterpreneurs have been trying to make this sort of functionality happen since the late 1990s. Maybe this browser extension will succeed where thousands have failed before. An online retailer objected to the popup window and sued. We saw a spate of lawsuits over third-party modifications to a web page, such as framing, 20-25 years ago, testing many legal theories. None of the lawsuits worked.</p>
<p>In an effort to avoid that graveyard of litigation, the plaintiff tried the trespass to chattels doctrine. But&#8230;.um&#8230;exactly how does a browser extension trespass any chattel controlled by the retailer? The retailer&#8217;s answer (I shit you not, I would not make up shit like this):</p>
<blockquote><p>superimposing the Price Comparison Tool over other content on the S&amp;S Site <strong>trespasses on valuable digital real estate</strong> that S&amp;S has expended time, resources, and effort to make aesthetically and functionally appealing to its customers (emphasis added)</p></blockquote>
<p>Holy mixed metaphors&#8230;.&#8221;digital real estate&#8221;!</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2026/04/friends-thats-not-a-thing.jpg"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-28844" src="https://blog.ericgoldman.org/wp-content/uploads/2026/04/friends-thats-not-a-thing.jpg" alt="" width="300" height="168" /></a></p>
<p>This lawsuit would be mockable at any time, but its mockability skyrockets in the wake of the <a href="https://blog.ericgoldman.org/archives/2024/01/web-page-framing-isnt-trespass-to-chattels-best-carpet-values-v-google.htm">Best Carpet Values v. Google</a> decision, which essentially rejected a functionally identical &#8220;trespass to web pages&#8221; argument.</p>
<p>Sticking closely to the Best Carpet Values decision, the court tells the plaintiff:</p>
<blockquote><p>the alleged “trespass” is not to any aspect of S&amp;S’s website that is in its possession. Rather, S&amp;S alleges that Defendants’ Price Comparison Tool alters the appearance of S&amp;S’s website in a consumer’s web browser on the consumer’s computer. S&amp;S does not allege that it possesses the consumer’s browser or computer. And S&amp;S cites no authority that it possesses, or has any property interest in, the appearance of its website on a third party consumer’s browser or computer.</p></blockquote>
<p>The plaintiff tried to obfuscate this issue by arguing that trespass to chattels can apply to intangible property&#8211;a slightly true but deeply problematic statement. As I&#8217;ve repeatedly explained, if the definition of &#8220;chattels&#8221; mean intangibles&#8211;i.e., the antonym of &#8220;chattels&#8221;&#8211;then trespass to chattels morphs into a doctrine of &#8220;trespass to plaintiff&#8217;s butthurt feelings,&#8221; and the law implodes on itself.</p>
<p>The court doesn&#8217;t take this bait. Instead, like the Best Carpet Values decision, the judge observes that by the time the browser extension modifies the retailer&#8217;s web page, the digital bits are no longer in the retailer&#8217;s &#8220;possession.&#8221; I would much prefer courts define chattels to categorically preclude debates over its applicability to intangibles, but the court&#8217;s logic gets the job done.</p>
<p>There&#8217;s nothing left for the retailer to complain about:</p>
<blockquote><p>Defendants are not alleged to have intercepted and altered S&amp;S’s website transmission such that it was impossible for any consumer to view S&amp;S’s website as S&amp;S intended. Rather, Defendants provided a tool that consumers could decide to use to view S&amp;S’s website in a way chosen by the consumer once the website transmission was in the consumer’s possession. S&amp;S has no property right in the consumer’s internet viewing decisions.</p>
<p>Furthermore, the alleged act of “trespass” identified by S&amp;S is an action taken by the consumer, not by the Defendants. The action S&amp;S alleges constitutes “trespass” is the appearance of Defendants’ Price Comparison Tool superimposed on S&amp;S’s website. But it is the consumer who decides whether to enable the Price Comparison Tool on their computer. To the extent enabling the Price Comparison Tool constitutes a trespass, Defendants aren’t the ones committing it.</p></blockquote>
<p>In a sense, the court&#8217;s ruling is pro-user. The plaintiff is essentially claiming that it alone determines the canonical view of the website. However, websites are viewed on a wide range of devices and browsers, all of which the user chooses, so web pages don&#8217;t have any canonical version that the law can recognize. The court&#8217;s decision seemingly lets users, not the website, choose which technologies they want to use to access a website.</p>
<p>And yet, this passage also implies that perhaps the retailer could sue the users for trespass to its valuable digital real estate for marring its beautiful and canonical web page. As stupid as that sounds, such a claim would not be materially worse than the claim rejected here.</p>
<p><em>Case Citation</em>: <a href="https://cases.justia.com/federal/district-courts/illinois/ilndce/1:2025cv11214/486370/57/0.pdf?ts=1777128973">S&amp;S Activewear LLC v. Promo Hunt, Inc.</a>, 2026 U.S. Dist. LEXIS 91156 (N.D. Ill. April 23, 2026). The <a href="https://pdfserver.amlaw.com/legalradar/pm-60179260_complaint.pdf">complaint</a>. Per the complaint, this lawsuit addressed more topics that just trespass to chattels. Still, three lawyers from Sidley &amp; Austin&#8211;traditionally, one of the most prestigious law firms in the country&#8211;signed off on the phrase &#8220;trespasses on valuable digital real estate.&#8221; Surely that will be a peak moment of their legal careers. <a href="https://personal.ericgoldman.org/reflections-on-my-experience-as-a-1992-summer-associate-in-sidley-austins-la-office/">A note about my time at Sidley &amp; Austin</a>.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm">Plaintiffs Are Still Litigating&#8211;and Losing&#8211;Website Framing Cases (S&#038;S v. Promo Hunt)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2026/04/plaintiffs-are-still-litigating-and-losing-website-framing-cases-ss-v-promo-hunt.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28840</post-id>	</item>
		<item>
		<title>Tenth Circuit Broadens CFAA ‘Loss’ Beyond Technological Harm&#8211;Moxie v. Nielsen (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2026/04/tenth-circuit-broadens-cfaa-loss-beyond-technological-harm-moxie-v-nielsen-guest-blog-post.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 15:33:10 +0000</pubDate>
				<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28817</guid>

					<description><![CDATA[<p>by guest blogger Kieran McCarthy After the Supreme Court’s first and only CFAA decision in Van Buren v. US in 2021, I wrote that the Court “could have done 10% more work here and provided clarity on very key questions….[but...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/tenth-circuit-broadens-cfaa-loss-beyond-technological-harm-moxie-v-nielsen-guest-blog-post.htm">Tenth Circuit Broadens CFAA ‘Loss’ Beyond Technological Harm&#8211;Moxie v. Nielsen (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>by guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p>After the Supreme Court’s first and only CFAA decision in <em>Van Buren v. US </em>in 2021, <a href="https://blog.ericgoldman.org/archives/2021/06/more-perspectives-about-van-buren-v-us-guest-blog-post.htm">I wrote that the Court</a> “could have done 10% more work here and provided clarity on very key questions….[but SCOTUS] declined the opportunity to do so. In the end, there are remarkably few clear, declarative sentences in this opinion that provide guidance for future cases.”</p>
<p>The Court intentionally left open many key questions. And so it should come as no surprise that there has been an emerging doctrinal divergence related to key concepts with the CFAA. Perhaps most notably, Courts have been applying the concept of “technological harm” in the CFAA differently in different circuits.</p>
<p>In <em>Van Buren</em>, Justice Barrett wrote:</p>
<blockquote><p>…§1030(a)(2) also gives rise to civil liability, §1030(g), with the statute defining ‘damage’ and ‘loss’ to specify what a plaintiff in a civil suit can recover. ‘[D]amage,’ the statute provides, means ‘any impairment to the integrity or availability of data, a program, a system, or information.’ §1030(e)(8). The term ‘loss’ likewise relates to costs caused by harm to computer data, programs, systems, or information services. §1030(e)(11). The statutory definitions of ‘damage’ and ‘loss’ thus focus on <strong>technological harms</strong>—such as the corruption of files—of the type unauthorized users cause to computer systems and data. Limiting ‘damage’ and ‘loss’ in this way makes sense in a scheme ‘aimed at preventing the typical consequences of hacking.’ <em>Royal Truck</em>, 974 F. 3d, at 760. The term’s definitions are ill fitted, however, to remediating ‘misuse’ of sensitive information that employees may permissibly access using their computers.</p></blockquote>
<p><em>Van Buren v. United States,</em> 141 S. Ct. 1648, 1659–60 (2021) (quoting 18 U.S.C. § 1030(e)(8), § 1030(e)(11)).</p>
<p>Multiple district courts, especially in SDNY and the Northern District of California, began to interpret <em>Van Buren</em> to demand that any CFAA “loss” be tethered to technological harm. Meanwhile, some other district courts read the statute to allow any claim to proceed that included an allegation that a plaintiff had investigated an offense and incurred $5,000 in so doing.</p>
<p>Where this comes up most consistently is in the context of an internal investigation related to alleged unauthorized access. Courts increasingly have disagreed about whether an internal investigation, untethered to “technological harm,” meets the standard for a qualifying loss under §1030(e)(11). While not quite rising to the level of a circuit split, lower courts in the 2d, 3d, and 9th Circuits have increasingly required specific pleading at the motion to dismiss stage to allege that the internal investigation posited as a “loss” was tethered to “harm to computer data, programs, systems, or information services.” In the 5th, 7th, and 11th circuits, courts were much less inclined to require that specific pleading.</p>
<p>&#8212;</p>
<p>On Jan. 21, 2026, the Tenth Circuit became the first circuit court to squarely reject the CFAA interpretation that investigations must be tethered to technological harm. It did so with <em><a href="https://www.govinfo.gov/content/pkg/USCOURTS-ca10-24-04076/pdf/USCOURTS-ca10-24-04076-0.pdf">Moxie Pest Control (Utah), LLC v. Nielsen</a>, </em>and it concluded that investigative costs qualify as a CFAA “loss” even when the plaintiff does not show or even allege “technological harm” like corrupted data or damage to systems.</p>
<p>According to the Tenth Circuit, under § 1030(e)(11)’s plain text, <em>any reasonable cost of responding to an offense</em> qualifies.</p>
<p>&#8212;</p>
<p>This was the general divide that had emerged around the country pre-<em>Moxie</em>.</p>
<p><strong>The first camp suggests that costs must be tethered to clear evidence of technological harm to qualify as a loss.</strong></p>
<p>The courts in this camp do not reject investigative costs as a category. But conclusory pleadings related to investigations in the absence of technological harm often get dismissed. These courts have demanded specifics about what was done, why the investigation was necessary, how it ties to the intrusion, and evidence that the “loss” was tethered to “harm to computer data, programs, systems, or information services.”</p>
<p>Many recent decisions have been pushing in that direction:</p>
<ul>
<li><strong><em>CoStar Group, Inc. v. Leon Capital Group, LLC</em></strong> (D.D.C. 2022) dismissed where the claimed loss was time and money spent “identifying, investigating, and attempting to block and otherwise respond,” but the allegations did not adequately plead cognizable CFAA loss.</li>
<li><strong><em>The Phoenix Co., Inc. v. Castro-Badillo</em></strong> (D.P.R. Aug. 9, 2024) dismissed where the plaintiff relied on “investigation” but did not plead what investigative measures were taken and what damage, if any, was actually caused.</li>
<li><strong><em>Sylabs Inc. v. Rose</em></strong> (N.D. Cal. Sep. 26, 2024) dismissed where “loss” was pegged to forensic analysis but the allegations were essentially conclusory and failed Rule 12(b)(6) specificity expectations.</li>
<li><strong><em>William Gottlieb Mgmt. Co., LLC v. Carlin</em></strong> (S.D.N.Y. Mar. 26, 2024) dismissed where the “investigation” just confirmed what the plaintiff already knew and did not involve analyzing effects on computer systems.</li>
<li><strong><em>X Corp. v. Center for Countering Digital Hate</em></strong> (N.D. Cal. 2024) dismissed X Corp.’s CFAA claim at the motion-to-dismiss stage because the court found that X failed to allege <em>technological harm</em> necessary under § 1030’s loss definition, and that internal costs and reputational advertising revenue losses tied to CCDH’s reports and investigations did not allege harm to computer data, systems, or programs as contemplated by the statute. Also, the broader complaint was treated as a SLAPP aimed at punishing criticism rather than bona fide CFAA conduct.</li>
</ul>
<p>If you read those cases as a group, you find situations where courts are skeptical of internal investigations because they seem pretextual. According to these cases, an alleged investigation is not a blank check to proceed with a CFAA claim. Courts want to see that the investigation was a response to an access violation causing technological harm and not just a litigation prep exercise.</p>
<p><strong>The second camp is more of a magic words approach.</strong> If there’s alleged unauthorized access, and you say there was an investigation that cost $5k, the case moves to discovery.</p>
<p>This was pretty much the consensus around the country pre-<em>Van Buren</em>. But lower courts were fairly evenly divided about that concept of loss post-<em>Van Buren</em>.</p>
<p>The Tenth Circuit in <em>Moxie</em> is now a clean appellate-level entry for this camp.</p>
<p>According to <em>Moxie</em>, the CFAA’s definition of “loss” explicitly includes response and damage-assessment costs. So district courts should not treat <em>Van Buren</em> as silently rewriting the civil-remedies threshold into limiting investigations to those tethered to technological harm.</p>
<p><em>Moxie</em> is now the most prominent post-<em>Van Buren</em> statement on this question, and because it is a circuit court opinion, and not a one-off district court order, it will carry significant weight, and may permanently tip the scales in favor of this camp.</p>
<p>&#8212;</p>
<p>The facts of <em>Moxie</em> are as follows:</p>
<p>The plaintiffs were a group of affiliated pest-control companies that alleged employees of their competitor, Aptive Environmental, bribed current and former Moxie representatives to turn over confidential, password-protected sales data (including leaderboards) stored in Moxie’s system, which Aptive then allegedly used to recruit door-to-door sales representatives. Moxie sued Aptive and several individuals under the Computer Fraud and Abuse Act (CFAA), RICO, the Defend Trade Secrets Act (DTSA), and Utah’s Uniform Trade Secrets Act (UTSA).</p>
<p>The district court dismissed Moxie’s CFAA claim for failure to plead a qualifying “loss” post-<em>Van Buren</em>, denied motions to compel broad damages discovery, and granted summary judgment on the other claims for lack of causation. On appeal, the Tenth Circuit reversed the dismissal of the CFAA claim, holding that Moxie’s allegations of over $5,000 in investigative costs incurred in response to unauthorized access plausibly satisfied the CFAA’s “loss” definition even absent technological harm, affirmed the discovery ruling, affirmed summary judgment on RICO, and reversed in part the DTSA/UTSA rulings on remedies and remanded for further proceedings.</p>
<p>&#8212;</p>
<p>For practitioners in this space, it isn’t hard to see how <em>Moxie</em> could be problematic.</p>
<p>There is a chicken-or-the-egg conundrum with the statutory language cited by the Tenth Circuit. While § 1030(e)(11)’s definition of loss includes <em>any reasonable cost of responding to an offense</em>, the statute itself does not offer any guidance on what the *offense* must be that provokes the investigation. By the Tenth Circuit’s definition, it doesn’t matter. Any conduct associated with unwanted access will do. And so, activity that does not cause technological harm can give rise to a CFAA claim if a plaintiff investigates it and incurs $5,000 in expenses.</p>
<p>The problem is twofold: (1) It lets plaintiffs convert a whole range of non-technological harms into federal computer crimes, thus seemingly contradicting the guidance of the Supreme Court and the statute itself, which requires harm to computer data, programs, systems, or information services; and (2) The $5,000 threshold becomes nigh-meaningless. Any plaintiff with a lawyer and an incident-response vendor can hit $5,000 by lunchtime. Indeed, a recent case found that a pro se plaintiff spending 25 hours of his own time was sufficient to establish a “loss” under the CFAA. <em>Karcz v. Mezouak</em>, 2026 WL 622679 (D.N.J. March 5, 2026).</p>
<p>In other words, conduct that would not give rise to a CFAA violation because the alleged harm is not technological in nature under the Supreme Court’s definition of a “loss” can easily become a CFAA “loss” as long as a plaintiff alleges that they investigated it.</p>
<p>That’s a deeply circular definition of “loss”<em>. </em>But <em>Moxie </em>didn’t grapple with that deeper circularity head-on.</p>
<p><strong>Making benign integrations and free speech criminal</strong></p>
<p>Let me lay out a couple of different fact patterns where this often plays out.</p>
<p>Even though the defendants here are highly unsympathetic, that’s not always the case. The alleged conduct was plainly wrongful. It involved alleged bribery, misuse of credentials, and copying confidential information from a protected account. But the CFAA should be reserved for technological harms, not merely unauthorized taking of information. That distinction matters. The opinion blurs the line between digital trespass and ordinary misuse of access, even though the real injury alleged was the taking of valuable business information, not damage to the integrity or functioning of the computer system itself. If the system still worked as designed, was not impaired, and suffered no meaningful technological disruption, then this looks much more like a trade secrets or unfair competition case, not a CFAA claim.</p>
<p>That overexpansion matters beyond these bad facts. Once courts allow the CFAA to reach conduct that does not cause technological harm, the statute becomes a much more flexible weapon for private plaintiffs and platforms seeking to recharacterize disfavored access as computer intrusion.  There are countless software integrations whose primary business purpose is to integrate some sort of useful activity within another company’s platform. Lots of companies build these useful layers into and on top of other companies’ software. Most of the time, the purpose of these integrations is to provide something of value to end users, but of course, <a href="https://blog.ericgoldman.org/archives/2026/01/att-blocks-t-mobiles-data-portability-efforts-guest-blog-post.htm">large platforms are often reluctant to cooperate with third parties</a>.</p>
<div id="attachment_28392" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg"><img decoding="async" aria-describedby="caption-attachment-28392" class="size-medium wp-image-28392" src="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg" alt="" width="300" height="200" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-1024x683.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-768x512.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg 1536w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-28392" class="wp-caption-text">Created by ChatGPT Dec. 2025</p></div>
<p>The panel says, almost in passing, that “we need not decide whether the conduct Moxie alleged violates the CFAA. It does,” because Nielsen used a pilfered password, and then goes on to hold that investigative costs alone can satisfy CFAA loss without any technological impairment. The problem is not that the defendants should win. They should not. The problem is that the opinion does nothing to distinguish credential theft from the far more ordinary reality of delegated access and platform integrations, where a user intentionally lets a third-party tool access an account through stored credentials, session continuity, or other account-linked mechanisms. In a world full of CRM plug-ins, analytics layers, scheduling tools, and middleware, courts should be careful not to let “access by someone other than the nominal account holder” plus “investigation” equal a federal crime. The “loss” element needs to be a meaningful filter. If it isn’t, lots of benign conduct becomes illegal.</p>
<p>If investigative expenses are enough, regardless of whether tethered to a technological harm, then a platform that objects to a researcher, watchdog, journalist, or advocacy group can more readily plead its way past dismissal by alleging unauthorized access plus the cost of figuring out what happened. <em>Moxie</em> sits uneasily beside <em>X Corp. v. Center for Countering Digital Hate</em>, where Judge Breyer recognized the basic danger directly, writing that the case was <a href="https://blog.ericgoldman.org/archives/2024/03/court-says-twitter-misused-litigation-to-punish-defendants-for-their-speech-x-v-ccdh.htm">“about punishing the Defendants for their speech” and that X sued “in order to punish CCDH” for publications criticizing the platform.</a></p>
<p>To be clear, Moxie did not involve public-interest criticism. It involved commercial espionage. But doctrine built in hard cases does not stay in hard cases. Once courts make it easier to plead CFAA claims based on contested access and post hoc investigation costs, that logic can be repurposed by platforms seeking to suppress unfavorable reporting, auditing, or accountability research. The right lesson from <em>Moxie</em> should have been narrow, but instead it was unequivocal and unqualified.</p>
<p>Don’t get it twisted: If self-motivated, sponsored investigations untethered to technological harm qualify as losses under the CFAA, then any integration disfavored by a platform can be made illegal, regardless of how valuable or pro-social it may be. And any “access” that’s disfavored by a platform can be made illegal, too. Regardless of how benign or pro-social it may be.</p>
<p>That’s the legal landscape that <em>Moxie</em> creates.</p>
<p>In the coming months, the Ninth Circuit is likely to revisit this issue with Perplexity AI’s appeal of the preliminary injunction issued by the Northern District of California in its case against Amazon. When that case is decided, we can expect to get a clearer picture of whether there will be a consensus on this issue or a true circuit split.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/04/tenth-circuit-broadens-cfaa-loss-beyond-technological-harm-moxie-v-nielsen-guest-blog-post.htm">Tenth Circuit Broadens CFAA ‘Loss’ Beyond Technological Harm&#8211;Moxie v. Nielsen (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28817</post-id>	</item>
		<item>
		<title>This Week in the &#8220;DMCA Eating Copyright Law&#8221;: Cordova v. Huneault (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2026/02/this-week-in-the-dmca-eating-copyright-law-cordova-v-huneault-guest-blog-post.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 16:42:07 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28561</guid>

					<description><![CDATA[<p>by guest blogger Kieran McCarthy A recent Northern District of California opinion in Cordova v. Huneault sent another bat-signal to those who follow this area of the law: copyright law in the context of public content is being consumed by...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/02/this-week-in-the-dmca-eating-copyright-law-cordova-v-huneault-guest-blog-post.htm">This Week in the &#8220;DMCA Eating Copyright Law&#8221;: Cordova v. Huneault (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>by guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-28526" src="https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits-300x107.jpg" alt="" width="300" height="107" srcset="https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits-300x107.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits-1024x367.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits-768x275.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits-1536x550.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2026/01/denver-metro-audits.jpg 1651w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>A recent Northern District of California opinion in <a href="https://cases.justia.com/federal/district-courts/california/candce/5:2025cv04685/450549/65/0.pdf"><em>Cordova v. Huneault</em></a> sent another bat-signal to those who follow this area of the law: copyright law in the context of public content is being consumed by the DMCA. [Eric&#8217;s note: I <a href="https://blog.ericgoldman.org/archives/2026/01/it-takes-a-lot-for-512f-claims-to-survive-a-motion-to-dismiss-cordova-v-huneault.htm">blogged the 512(f) angle of this case</a> previously.]</p>
<p>The court let a DMCA section 1201(a) claim survive a motion to dismiss based on allegations that YouTube uses technical measures, including rolling cipher mechanisms, to prevent unauthorized downloading. The court then said the fact that the videos are broadly accessible by the public does not matter. If there are technical measures aimed at stopping downloading, that can be enough to plead an access-control theory.</p>
<p>On the surface, this feels like a modest pleading-stage ruling. Courts often say, sure, the plaintiff alleged a thing, let’s get to discovery. But small decisions like this one are how bad legal interpretations get normalized. This one matters because of what it treats as obvious, and what it does not even try to engage.</p>
<p><strong>Publicly viewable, but with access locked?</strong></p>
<p>Cordova alleged that defendants copied his publicly viewable YouTube videos and reposted them. The complaint described rolling-cipher technology, which encrypts and dynamically alters the video stream’s URL signatures, and asserted that ripping tools and browser extensions can “retrieve and decrypt the obfuscated streaming URLs” to make local copies.</p>
<p>Here is the crux of the issue: The work is publicly accessible for viewing, but the platform uses technical controls that allegedly limit access to a particular version of it, the downloadable file, or a preferred pathway to the content. The opinion treats that distinction as sufficient. Viewing is public. Downloading is gated. Therefore, access is controlled.</p>
<p>That framing is doing a ton of work. It is also a convenient way to turn product design and platform preferences into federal anti-circumvention liability.</p>
<p>In the modern web, nearly everything is delivered through some combination of signed URLs, token rotation, encryption, bot gating, and rate limits. They are default architecture. If courts treat that architecture as an access control for section 1201(a), then a lot of ordinary data collection and analysis starts to look like circumvention by definition.</p>
<p>That is how content protection shifts from the domain of copyright law into a federally enforceable platform-control law without anyone ever announcing the shift.</p>
<p>[Eric&#8217;s update: to the same effect, see (<a class="link" href="http://business.cch.com/ipld/SonyMusicEntertainmentUnchartedLabs20260415041626.pdf" target="_blank" rel="noopener">Sonv Music Entertainment v. Uncharted Labs, Inc.</a>, 2026 WL 1019199 (S.D.N.Y. Apr. 15, 2026)).]</p>
<p><strong>The opinion’s biggest problem is what it does not say</strong></p>
<p><a href="https://www.eff.org/pages/unintended-consequences-fifteen-years-under-dmca">Section 1201 has been controversial for decades for a simple reason</a>. It can be used to punish bypassing a restriction even when the underlying use would not be infringing or fair use, or even when the underlying issue is not copyright at all.</p>
<p>Some courts have confronted that risk head on. Two of the most important opinions are <em>Chamberlain v. Skylink</em> and <em>Storage Technology v. Custom Hardware</em>. They wrestle with the idea that 1201 should not create a new property right where copyright does not already grant one. They also worry about a world where rights holders can wrap non-copyright interests in a thin technical wrapper and then claim the DMCA as a super-powered enforcement mechanism.</p>
<p><a href="https://mccarthylg.com/variations-in-legal-interpretations-of-the-dmca/">While there is a circuit split on this issue</a>, the courts on the other side of it should still appreciate the importance of finding a limiting principle here. They should get their spidey-sense up when section 1201 is being used as a substitute for proving copyright infringement, or as a circumvention mechanism itself to avoid fair use, interoperability, competition, and the basic underlying tenets of the Copyright Act.</p>
<p>The court in <em>Cordova</em> is uninterested in that conversation. It does not ask what prevents a plaintiff from turning any technology speed bump into a federal access-control claim. It does not grapple with the downstream impact on public-facing platforms and automated access. It does not ask whether calling publicly viewable content an access-controlled work just because the platform prefers one mode of access is consistent with what Congress really had in mind back when Clinton was the president.</p>
<p><strong>Why this matters for scraping and the open web</strong></p>
<p>I’ve been over this before, but if 1201 liability attaches whenever a platform can point to a rotating token or interface speed bump to public content and call it a TPM, then <a href="https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm">this law can lead to cascading consequences pretty quickly</a>.</p>
<p>Cordova is a pleading-stage decision. It may narrow later. But if courts keep treating copyright and fair use considerations as “immaterial” to public-facing section 1201(a) cases, the momentum around this is going to build soon. It will allow platforms to set preferences as enforceable laws, and that will have major downstream market effects throughout the tech industry.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/02/this-week-in-the-dmca-eating-copyright-law-cordova-v-huneault-guest-blog-post.htm">This Week in the &#8220;DMCA Eating Copyright Law&#8221;: Cordova v. Huneault (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28561</post-id>	</item>
		<item>
		<title>Relitigating hiQ Labs and Scraping Through the Lens of DMCA 1201 Anti-Circumvention (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 18:29:14 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28518</guid>

					<description><![CDATA[<p>by guest blogger Kieran McCarthy A series of prominent web-scraping lawsuits are revisiting the fundamentals of public data access. And in so doing, with a slight reframing of a relatively settled legal issue, major platforms are challenging the presumption that...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm">Relitigating hiQ Labs and Scraping Through the Lens of DMCA 1201 Anti-Circumvention (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>by guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p>A series of prominent web-scraping lawsuits are revisiting the fundamentals of public data access. And in so doing, with a slight reframing of a relatively settled legal issue, major platforms are challenging the presumption that collecting and using public data at scale is legal.</p>
<p>In September 2019, the <a href="https://blog.ericgoldman.org/archives/2019/09/ninth-circuit-says-linkedin-wrongly-blocked-hiqs-scraping-efforts.htm">Ninth Circuit in <em>hiQ v. LinkedIn</em></a> wrote:</p>
<blockquote><p>Although there are significant public interests on both sides, the district court properly determined that, on balance, the public interest favors <em>hiQ</em>’s position. We agree with the district court that giving companies like LinkedIn free rein to decide, on any basis, who can collect and use data—data that the companies do not own, that they otherwise make publicly available to viewers, and that the companies themselves collect and use—risks the possible creation of information monopolies that would disserve the public interest.</p></blockquote>
<p><em>hiQ Labs, Inc. v. LinkedIn Corporation</em>, 938 F.3d 985, 1004 (9th Cir. 2019) (vacated by SCOTUS, but this language was later re-affirmed verbatim by the Ninth Circuit in 2022).</p>
<p>It’s hard to overstate the importance of this language for the web-scraping industry. For the first time, there was a court taking a public-policy stand <em>in favor</em> of web scraping. This was not just an instance where a court said that scraping did not constitute a crime. This was a circuit court taking a stand on policy grounds that it was in the public interest for public data on private fora to remain publicly available for public consumption. The Ninth Circuit seemed to fully embrace the idea that allowing public use of public data was vital for a functioning digital information ecosystem.</p>
<p>For those that operate in data access, broadly defined, <em>hiQ v. LinkedIn</em> became shorthand for a simple proposition: Scraping publicly accessible web pages was legal. And <a href="https://blog.ericgoldman.org/archives/2022/12/hello-youve-been-referred-here-because-youre-wrong-about-web-scraping-laws-guest-blog-post-part-2-of-2.htm">while the truth was always a bit more nuanced</a>, and <a href="https://blog.ericgoldman.org/archives/2022/12/as-everyone-expected-years-ago-hiqs-cfaa-wins-dont-mean-it-can-freely-scrape-hiq-v-linkedin-guest-blog-post-part-1-of-2.htm">hiQ ultimately capitulated in the case and went under</a>, the legality of public data access was never questioned by industry insiders after the decision.</p>
<p>The last six years have been an absolute boon for the web-scraping industry. And it is not hyperbole to say that the AI revolution might not have come, or at least not have come as fast, had it not been for strong policy presumption in favor of legal data access to public content after <em>hiQ Labs</em>.</p>
<p>Fast-forward six years, and data-access questions are more critical than ever. All the world’s information is there for the taking and there is no shortage of people and companies doing the taking.</p>
<p>In just a few years, AI has become an integral component of almost all knowledge work. And it is arguably the single biggest engine driving economic growth right now.</p>
<p>And the fuel that powers that engine is data—usually public data collected at scale. And with that, there are dozens of lawsuits percolating over the legalities of when it is and is not permissible to copy and reuse public data.</p>
<p>But with CFAA questions about publicly available data now largely resolved (<a href="https://blog.ericgoldman.org/archives/2022/08/more-evidence-of-the-cfaa-post-van-buren-hiq-jurisprudential-anarchy-guest-blog-post.htm">except at the margins</a>), and <a href="https://blog.ericgoldman.org/archives/2023/12/should-copyright-preemption-moot-anti-scraping-tos-terms-guest-blog-post.htm">with terms of use often preempted by copyright</a>, those looking to build walled gardens have been angling for new arguments to restrict access to public data.</p>
<p>In a recent wave of disputes over AI and “public data,” a new pattern has emerged. Plaintiffs are trying to rerun the <em>hiQ</em> fact pattern under a different federal statute.</p>
<p>That statute is the Digital Millennium Copyright Act (DMCA), specifically Section 1201.</p>
<p>While <em>hiQ</em> mostly resolved the CFAA-era battle over whether “public” means “authorized,” Section 1201 is the new battlefield over whether antibot tech is a technological measure that “effectively controls access” to a copyrighted work.</p>
<div id="attachment_28392" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-28392" class="size-medium wp-image-28392" src="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg" alt="" width="300" height="200" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-1024x683.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-768x512.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg 1536w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-28392" class="wp-caption-text">Created by ChatGPT Dec. 2025</p></div>
<p>But make no mistake, from the data monopolist’s perspective (or oligopolist, if we’re being more precise here), the goal is the exact same as it was in 2019, to restrict data collectors’ access to public data. The largest incumbent platforms such as Google want “free rein to decide, on any basis, who can collect and use data—data that the companies do not own, that they otherwise make publicly available to viewers, and that the companies themselves collect and use.” Companies like Google want to control the data. Many companies (like Reddit, Yahoo, X, and others) want to license the data (even to the extent that the data is generated by their users). But almost all the major platforms are making renewed legal pushes to keep startups off their digital lawns (<a href="https://blog.ericgoldman.org/archives/2023/08/web-scraping-for-me-but-not-for-thee-guest-blog-post.htm">while at the exact same time gobbling up the same type of content from others</a>).</p>
<p><strong>Section 1201 as an alternative to copyright, the CFAA, and terms of use claims</strong></p>
<p>There are a few different reasons why 1201 is attractive to plaintiffs in scraping and AI-data cases.</p>
<p>First, in some circuits, plaintiffs are trying to use 1201 to avoid (dare I say, <em>circumvent</em>?) the copyright fair use fight. There is a circuit split on the issue, but in the major circuits where this gets litigated (notably, the Second and Ninth), plaintiffs often argue that fair use is no defense to a Section 1201 anti-circumvention claim. In some jurisdictions, defendants may not be able to rely on fair use as a categorical defense to a §1201 claim, because courts treat §1201 as analytically distinct from infringement. And there are many situations where that distinction might be dispositive. Well-designed AI systems that train on large datasets are often going to be deemed fair use because they are highly transformative. Under the DMCA, though, that might not matter.</p>
<p>Second, plaintiffs may be able to avoid the copyright registration prerequisite that constrains many copyright claims. At least as alleged in the recent YouTube-scraping cases, plaintiffs emphasize that DMCA anti-circumvention claims do not depend on copyright registration in the same way copyright infringement claims do.</p>
<p>Third, the DMCA allows plaintiffs to allege that the tech itself is inherently unlawful. 1201(a)(2) lets plaintiffs target the tooling layer (Captcha solvers, challenge tools, proxy services, and other antibot solution tech) as “trafficking” in circumvention tech. Google’s new case leans heavily into that line of argumentation.</p>
<p>Courts have been wary of turning Section 1201 into a general-purpose “keep out” sign, <a href="https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm">as Eric recently noted in the Ziff-Davis case</a>. But this new line of cases will test those limits once again. Older doctrine around “effective” technological measures and the relationship between circumvention and copyright protection shows up repeatedly in the case law discussions (think <em>Lexmark</em> and <em>Chamberlain</em>). But those were not Second or Ninth Circuit cases. And those cases were not resolved in the modern era of high-volume data access.</p>
<p><strong>Google v. SerpApi and the SearchGuard blueprint (ND Cal, Dec. 2025)</strong></p>
<p>Google’s recent lawsuit against SerpApi is the most on-the-nose “DMCA-first” pleading to date.</p>
<p><a href="https://storage.courtlistener.com/recap/gov.uscourts.cand.461513/gov.uscourts.cand.461513.1.0.pdf">Google sued SerpApi</a> in the Northern District of California, alleging SerpApi used massive volumes of fake search requests to bypass Google protections and resell content from search results. Google also publicly framed the suit as targeting “circumventing security measures protecting others’ copyrighted content that appears in Google search results.”</p>
<p>The complaint is explicit. It is a DMCA case from page one, asserting claims for circumvention (17 U.S.C. § 1201(a)(1)(A)) and trafficking in circumvention tech (17 U.S.C. § 1201(a)(2))</p>
<p>And it provides a detailed narrative about the technological measure itself. Google alleges it built SearchGuard, a system designed to block automated access without breaking normal user experience, including a JavaScript “challenge” that automated systems typically cannot solve at scale.</p>
<p>SerpApi’s public response is the classic <em>hiQ</em>-adjacent argument. We provide the same information any person can see in a browser without signing in.</p>
<p>Google’s complaint tries to make that defense irrelevant by focusing on: (1) the presence of licensed copyrighted material in SERPs, and (2) the alleged circumvention of SearchGuard to access it at scale.</p>
<p>That framing matters because it tries to make the “public vs. private” question less central. Instead, the center becomes: “was there an access-control measure, and did defendants circumvent it?”</p>
<p style="font-weight: 400;">I’ll give Google’s lawyers credit. They did a good sales job on this.</p>
<p style="font-weight: 400;">But don’t get it twisted: Google’s 1201(a) pitch that SearchGuard is a TPM stinks like two-month-old garbage in the Texas summer heat. A TPM, as Congress imagined it, is a lock on <em>access to a copyrighted work</em>, a measure that actually gates entry to protected expression. SearchGuard, by Google’s own framing, is a traffic-cop. It’s a system for managing <em>how</em> you reach pages, at <em>what</em> rate, with <em>which</em> client, under <em>which</em> terms. That’s not controlling access in any meaningful copyright sense; it’s controlling <em>conduct</em>. Conflating those two isn’t a clever reading. It’s a category error dressed up as inevitability. If SearchGuard is a TPM, then literally every site that throws up a speed bump can build an impenetrable copyright perimeter around almost any content whatsoever, and the statute becomes a magic spell. Add friction, say TPM, and now you can replace copyright law with your own proprietary preferences and they become federally enforceable.</p>
<p style="font-weight: 400;">That’s the crazy part. Google’s argument doesn’t just misread 1201(a). It turns the anti-circumvention statute into an anti-competition superweapon that will destroy existing copyright protections.</p>
<p style="font-weight: 400;">If Google pulls this off, they will have reshaped copyright law as a form of property rights in <em>interfaces</em>, where circumventing a company’s desire is treated like circumventing encryption. That doesn’t protect creators. It protects<em> incumbents</em>. It chills security research, accessibility work, archiving, interoperability, independent auditing, and every weird-but-legitimate tool that makes the internet function like it should rather than merely consumable on platform-approved terms.</p>
<p style="font-weight: 400;">Let’s be honest: This isn’t Google vs. circumvention, so much as Google wanting to build a DMCA moat around its own monopoly in search. And if successful, it will provide a handy playbook for any other platform looking to build or defend any online monopoly in any other vertical.</p>
<p>Tech writer Mike Masnick <a href="https://www.techdirt.com/2025/12/24/google-built-its-empire-scraping-the-web-now-its-suing-to-stop-others-from-scraping-google/">explains the potential consequences</a>:</p>
<blockquote><p>Google’s argument, if accepted, provides a roadmap for any website operator who wants to lock down their content: slap on a trivial TPM—a CAPTCHA, an IP check, anything—and suddenly you can invoke federal law against anyone who figures out how to get around it, even if their purpose has nothing to do with copyright infringement.</p>
<p>The implications spiral outward quickly. If Google succeeds here, what stops every major website from deciding they want licensing revenue from the largest scrapers? Cloudflare could put bot detection on the huge swath of the internet it serves and demand Google pay up. WordPress could do the same across its massive network. The open web—built on the assumption that published content is publicly accessible for indexing and analysis—becomes a patchwork of licensing requirements, each enforced through 1201 threats.</p>
<p>That doesn’t seem good for the prospects of a continued open web.</p></blockquote>
<p>This is the “relitigating hiQ” move. If accessing a public page is a CFAA non-starter, then plaintiffs try to win by arguing the defendant defeated a technological control to access the same public page, even if the end use is not infringing.</p>
<p>Nvidia, Ziff-Davis, Reddit, and a host of class-action cases are pursuing similar claims along similar themes.</p>
<p><strong>DMCA 1201 as the new anti-scraping front</strong></p>
<p>If you zoom out, these new complaints share a single strategic philosophical theme.</p>
<p>Plaintiffs allege that it does not matter whether content is public and available to anyone with a web-browser. If antibot tech is designed to make certain content inaccessible at scale to automation, anyone who accesses it at scale through is violating the DMCA.</p>
<p><em>hiQ</em> mostly put an end to hyper-aggressive CFAA allegations for public web access. But the current litigation wave shows a sophisticated and equally aggressive platform response. Swap the CFAA question (“authorized?”) for the DMCA question (“circumvented?”). That is the simple reframing at the center of the most important fights over public data.</p>
<p>Does this change the underlying public policy concerns described in <em>hiQ Labs</em>? And will those concerns highlighted in <em>hiQ Labs</em> inform the interpretation of the DMCA in this context? Only time will tell.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm">Relitigating hiQ Labs and Scraping Through the Lens of DMCA 1201 Anti-Circumvention (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2026/01/relitigating-hiq-labs-and-scraping-through-the-lens-of-the-dmca-1201-anti-circumvention-guest-blog-post.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28518</post-id>	</item>
		<item>
		<title>AT&#038;T Blocks T-Mobile&#8217;s Data Portability Efforts (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2026/01/att-blocks-t-mobiles-data-portability-efforts-guest-blog-post.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Fri, 09 Jan 2026 18:09:32 +0000</pubDate>
				<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Privacy/Security]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28478</guid>

					<description><![CDATA[<p>By guest blogger Kieran McCarthy If you have ever wondered why big incumbents keep running to the Northern District of Texas the moment someone builds a tool that makes switching easier, comparing prices easier, or generally makes the internet work...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/01/att-blocks-t-mobiles-data-portability-efforts-guest-blog-post.htm">AT&#038;T Blocks T-Mobile&#8217;s Data Portability Efforts (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_28392" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-28392" class="size-medium wp-image-28392" src="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg" alt="" width="300" height="200" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-1024x683.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-768x512.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg 1536w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-28392" class="wp-caption-text">Created by ChatGPT Dec. 2025</p></div>
<p>By guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p>If you have ever wondered why big incumbents keep running to the Northern District of Texas the moment someone builds a tool that makes switching easier, comparing prices easier, or generally makes the internet work like the internet, AT&amp;T Services, Inc. v. T-Mobile US Inc. should help you understand why.</p>
<p>On December 18, 2025, Judge Karen Gren Scholer entered <a href="https://storage.courtlistener.com/recap/gov.uscourts.txnd.412319/gov.uscourts.txnd.412319.30.0.pdf">a temporary restraining order</a> blocking T-Mobile from implementing the original “Easy Switch” feature in its T-Life app, and blocking “any substantially similar version” that “accesses or obtains” information from AT&amp;T’s “protected computer systems,” unless T-Mobile gets permission of the Court.</p>
<p>This opinion builds on the case law the N.D. Tex has been generating for years in the <a href="https://www.techdirt.com/2018/01/19/southwests-bullshit-lawsuit-over-site-that-made-45-helping-people-book-cheaper-flights/">Southwest Airlines “don’t you dare build a useful layer on top of our website” cases</a>.</p>
<p>The facts of the case are pretty simple. T-Mobile marketed a feature that let customers log into their current carrier account (AT&amp;T or Verizon) and pull information to help them compare plans and switch. Customers made the decision to switch, and T-Mobile, for obvious reasons, automated the process. The horror!</p>
<p>AT&amp;T sued, saying this was not “customer convenience.” It was unauthorized automated access and scraping of data from password-protected AT&amp;T pages, with allegations of repeated bypassing of AT&amp;T’s blocks, and “over 100” fields of customer data per user.</p>
<p>Over 100 fields? Dang! That’s, like, so many fields! And I suppose there are a few different lenses through which one could analyze that fact. One approach might be to say that automating a process with over 100 fields might be precisely the kind of thing that makes the internet useful, and that saves everyone time, money, and mental headaches.</p>
<p>Another way to view this fact is as evidence of “soooooo much computer fraud” even when T-Mobile is simply automating a process that consumers are choosing to automate. But that is how things work in the Northern District of Texas.</p>
<p>By the time the TRO issued, T-Mobile had already changed the tool so AT&amp;T and Verizon customers could upload a bill PDF or manually enter information.</p>
<p>The court found AT&amp;T likely to succeed because the Easy Switch tool, and its iterations before the November 26 change to PDF upload, accessed AT&amp;T’s systems without authorization, pulled “over 100 fields” of customer data, and transmitted the data back to T-Mobile. It also found irreparable harm to AT&amp;T’s control over its systems and data, plus reputation, goodwill and ‘customer privacy,’ without any inclination to grapple with the awkward fact that the customers were the ones asking to move their own information around. How the court concluded that customer privacy was at issue when the customers themselves initiated the switch <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f937-200d-2642-fe0f.png" alt="🤷‍♂️" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<p>Even though T-Mobile deactivated the challenged version, the court found the threat remained because T-Mobile wanted to retain the ability to use something “very similar” later.</p>
<p>T-Mobile is enjoined from implementing the original version or any “substantially similar” version, and “substantially similar” is defined basically as anything that accesses or obtains information from AT&amp;T’s protected systems.</p>
<p>Perhaps, learned reader, you might be wondering if there was any discussion of user empowerment, lower lock-in costs, increased innovation and competition, added product development, interoperability, improved price discovery, or any other known policy benefits associated with data portability in the policy section of the TRO?</p>
<p>No. There was not. This is the entire policy discussion of the opinion: “This temporary restraining order will serve the public interest. The enforcement of state and federal laws serves the public interest.”</p>
<p>See how easy this judging stuff is?</p>
<p>To be clear, this is not a case where you would expect someone like T-Mobile to prevail in Texas. But the lack of analysis or consideration for the broader issues at stake is always a bit startling. A big incumbent takes a dispute that is at least partly about competition and consumer switching, recasts it as “computer trespass,” and asks a court to shut the product down quickly. And the N.D. Texas always obliges, especially when the plaintiff is a household-name company with a website and Terms of Use, and the defendant is building a tool that rides on top of it.</p>
<p>That posture matters historically because it reflects an early willingness to treat “automation + Terms + notice” as a path into computer-access liability, even when what is being accessed is, functionally, consumer-facing information.</p>
<p>AT&amp;T’s complaint is explicit that this case is “not about competition for customers,” but about “unauthorized” intrusion into its systems, using automated bots “disguised as an AT&amp;T customer,” scraping “over 100 categories” of data, and bypassing AT&amp;T’s security measures. And that is what is what I like to call “bullshit.”</p>
<p>Either way, the N.D. Texas proves once again why it is the preferred venue and forum for those looking to build walled gardens.</p>
<p style="text-align: center;">* * *</p>
<p style="font-weight: 400;">Interestingly, Texas does have a mandatory data portability law, the TDPSA, or the Texas Data Privacy and Security Act. But the reality is that these laws have very little utility for consumers.</p>
<p style="font-weight: 400;">A portability right on paper like the TDPSA is little more than a slow and functionally useless export option. The reality is that laws like this don’t help consumers move with their data.</p>
<p style="font-weight: 400;">For one, TDPSA only mandates that companies return the “data you provided,” not the data you actually need to switch. Second, the time, frequency, and authentication friction make it useless for “I want to switch today.” Under TDPSA, controllers generally have up to 45 days (plus a possible 45-day extension) to respond. Waiting 45-90 days for data is so unhelpful that most consumers don’t see any value in requesting it. Next, a .pdf copy of data does not equal “interoperable.” Without shared schemas, APIs, and validation rules, the receiving service cannot reliably ingest the data—and certainly not at scale.</p>
<p style="font-weight: 400;">In a case like this one, the consumer-facing promise is “we’ll read your bill and account and recommend the right plan fast.” A statutory portability right typically gives you a dataset, not the transformation, normalization, and comparison workflow that makes switching easy. And when a competitor tries to fill that gap by automating access into the incumbent’s systems, you collide with the CFAA, terms of service, and state computer access statutes (exactly what the TRO discusses). Which is why, without meaningful analysis of the real value of automation for consumers in cases like this one, mandatory portability statutes are functionally useless for consumers.</p>
<p>[Eric&#8217;s comment: data portability mandates are generally quite popular, at least in academic circles. But I haven&#8217;t seen any evidence indicating that the mandates actually improve anything for anyone. I welcome pointers to academic studies on this topic.]</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2026/01/att-blocks-t-mobiles-data-portability-efforts-guest-blog-post.htm">AT&#038;T Blocks T-Mobile&#8217;s Data Portability Efforts (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28478</post-id>	</item>
		<item>
		<title>Are Robots.txt Instructions Legally Binding?&#8211;Ziff Davis v. OpenAI</title>
		<link>https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 18:20:41 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28390</guid>

					<description><![CDATA[<p>Robots.txt files express a website&#8217;s preferences for robot access. Despite their venerability, there are not many cases discussing the legal implications of robots.txt files and robot exclusion headers.[FN] As a result, we still don&#8217;t know if they are legally effective...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm">Are Robots.txt Instructions Legally Binding?&#8211;Ziff Davis v. OpenAI</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Robots.txt files express a website&#8217;s preferences for robot access. Despite their venerability, there are not many cases discussing the legal implications of robots.txt files and robot exclusion headers.[FN] As a result, we still don&#8217;t know if they are legally effective instructions. Are robots obligated to check and honor robots.txt? Or are websites expected to do more than put up a &#8220;no-trespassing&#8221; sign if they really don&#8217;t want robots? The legal answer today remains: <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f937-200d-2642-fe0f.png" alt="🤷‍♂️" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>[FN: Last night, I searched Westlaw ALLCASES and came up with 17 hits for &#8220;robots.txt&#8221; or &#8220;robot exclusion,&#8221; including some well-known cases like LinkedIn v. hiQ, Field v. Google, and Bidder&#8217;s Edge v. eBay, plus some less-heralded cases like <a href="https://blog.ericgoldman.org/archives/2013/10/calling_out_scr.htm">Tamburo v. Dwoskin</a> and <a href="https://blog.ericgoldman.org/archives/2013/07/a_trio_of_mixed_1.htm">AP v. Meltwater</a>.]</p>
<p style="text-align: center;">* * *</p>
<p>This is a lawsuit over OpenAI&#8217;s automated scraping to build its ChatGPT model. Ziff Davis deployed a robots.txt file that &#8220;allegedly instructed GPTBot not to scrape Ziff Davis’s websites,&#8221; but the GPTBot allegedly ignored the instruction. Ziff Davis argued that OpenAI ignoring the robots.txt instruction violated 17 USC 1201(a) (the anti-circumvention restrictions) because OpenAI&#8217;s scraper circumvents &#8220;a technological measure that effectively controls access to a work.&#8221; The court disagrees and dismisses the claim.</p>
<p>The court explains:</p>
<blockquote><p>Robots.txt files instructing web crawlers to refrain from scraping certain content do not “effectively control” access to that content any more than a sign requesting that visitors “keep off the grass” effectively controls access to a lawn. On Ziff Davis’s own telling, robots.txt directives are merely requests and do not effectively control access to copyrighted works. A web crawler need not “appl[y] . . . information, or a process or a treatment,” in order to gain access to web content on pages that include robots.txt directives; it may access the content without taking any affirmative step other than impertinently disregarding the request embodied in the robots.txt files. The FAC therefore fails to allege that robots.txt files are a “technological measure that effectively controls access” to Ziff Davis’s copyrighted works, and the DMCA section 1201(a) claim fails for this reason.</p></blockquote>
<p>The court adds that: &#8220;At most, Ziff Davis alleges that OpenAI disregarded the instructions that were contained in robots.txt files. This is not &#8216;circumvention&#8217; under the DMCA.&#8221;</p>
<p style="text-align: center;">* * *</p>
<p>This opinion doesn&#8217;t answer the most important questions about robots.txt because it only addresses 1201. Using 1201(a) as an anti-scraping law is not intuitive. Indeed, it feels overreaching to me, such that I doubt the plaintiffs expected the claim to succeed in court.</p>
<div id="attachment_28392" style="width: 310px" class="wp-caption alignright"><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-28392" class="size-medium wp-image-28392" src="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg" alt="" width="300" height="200" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-300x200.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-1024x683.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass-768x512.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/12/keep-off-the-grass-robot-trespass.jpg 1536w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-28392" class="wp-caption-text">Created by ChatGPT Dec. 2025</p></div>
<p>This opinion turns on the specific statutory language of 1201, which limits its applicability to other doctrines. That&#8217;s unfortunate, because we could use more clarity about if and when robots.txt can effectively limit access to websites.</p>
<p>That issue is central to trespass to chattels claims, including CFAA claims. For example, the Supreme Court indicated in <a href="https://blog.ericgoldman.org/archives/2021/06/do-we-even-need-the-computer-fraud-abuse-act-cfaa-van-buren-v-us.htm">Van Buren</a> that website access could be delimited by whether technological &#8220;gates&#8221; are up or down (the opinion didn&#8217;t clarify if the delimiting occurs when gates are up or gates are down&#8230;details&#8230;). This 1201 opinion casts a little doubt on robots.txt acting as a technological &#8220;gate&#8221; for TTC purposes. After all, the court expressly says that robots.txt don&#8217;t control access to sites and says they are as technologically effective at preventing access as a &#8220;keep off the grass&#8221; sign. If I were a scraper, I would cite the decision in favor of treating robots.txt instructions as legally irrelevant.</p>
<p><em>Case Citation</em>: <a href="https://chatgptiseatingtheworld.com/wp-content/uploads/2025/12/Judge-Stein-order-on-MTD-of-Ziff-Davis.pdf">Ziff Davis v. OpenAI, Inc.</a>, 2025 WL 3635559 (S.D.N.Y. Dec. 15, 2025)</p>
<p>UPDATE: On December 18, the<a href="https://chatgptiseatingtheworld.com/wp-content/uploads/2025/12/Judge-Stein-on-robots.txt.pdf"> judge denied Ziff Davis&#8217; request</a> to amend the complaint to cure the 1201 claim.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm">Are Robots.txt Instructions Legally Binding?&#8211;Ziff Davis v. OpenAI</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2025/12/are-robots-txt-instructions-legally-binding-ziff-davis-v-openai.htm/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28390</post-id>	</item>
		<item>
		<title>Ninth Circuit Dismisses &#8220;Session Replay&#8221; Lawsuit&#8211;Popa v. Microsoft</title>
		<link>https://blog.ericgoldman.org/archives/2025/08/ninth-circuit-dismisses-session-replay-lawsuit-popa-v-microsoft.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sat, 30 Aug 2025 18:21:20 +0000</pubDate>
				<category><![CDATA[Privacy/Security]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=28050</guid>

					<description><![CDATA[<p>This case involves &#8220;session replay&#8221; technologies, described as (cleaned up): the software embeds snippets of JavaScript computer code on a website, which then deploys on each website visitor’s internet browser for the purpose of intercepting and recording the website visitor’s...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/08/ninth-circuit-dismisses-session-replay-lawsuit-popa-v-microsoft.htm">Ninth Circuit Dismisses &#8220;Session Replay&#8221; Lawsuit&#8211;Popa v. Microsoft</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This case involves &#8220;session replay&#8221; technologies, described as (cleaned up):</p>
<blockquote><p>the software embeds snippets of JavaScript computer code on a website, which then deploys on each website visitor’s internet browser for the purpose of intercepting and recording the website visitor’s electronic communications with the website, including their mouse movements, clicks, keystrokes, URLs of web pages visited, and/or other electronic communications in real-time. The session-replay provider then uses those website communications to recreate website visitors’ entire visit to the website. A business utilizing this technology can then access useful consumer data, including detailed heatmaps of a website that provide information about which elements of a website have high user engagement, how far website users scrolled on the website, and the total clicks within a given area on the website. In essence, session-replay technology helps a business to determine which parts of its website are effective with customers and which are not</p></blockquote>
<p>Standard product marketing work.</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-28051" src="https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity-300x150.jpg" alt="" width="300" height="150" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity-300x150.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity-1024x513.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity-768x385.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity-1536x770.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2025/08/clarity.jpg 1871w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>The technology at issue is Microsoft&#8217;s Clarity service. It has three settings for capturing personal information during the session: (1) no user text is captured, (2) key items, like passwords, are not captured (this is the default setting), and (3) all user text is captured. The defendant, Pet Supplies Plus, masked the text capture so it did not include the plaintiffs&#8217; street number or zip code.</p>
<p>The plaintiffs&#8217; lawsuit over Clarity&#8217;s session replay fails because the plaintiffs lack Article III standing per <a href="https://blog.ericgoldman.org/archives/2016/05/will-the-spokeo-v-robins-supreme-court-ruling-favor-plaintiffs-or-defendants-uh.htm">Spokeo</a> and <a href="https://blog.ericgoldman.org/archives/2021/07/grokking-the-supreme-courts-transunion-decision.htm">TransUnion</a>.</p>
<p>To establish Article III standing, the plaintiffs have to show how they suffered a &#8220;concrete&#8221; injury. This is no small challenge. Tracking and recording a person&#8217;s navigation of a website may be unwanted and disquieting, but it typically has no real effects on individual users. See my old paper on <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=685241">data mining</a>.</p>
<p>I highlight this issue when I teach the old Phamtrak case. I ask students: where&#8217;s the harm where the system collected highly sensitive PII but the collector never paid attention to it? In Pharmatrak, the plaintiffs couldn&#8217;t articulate any theory of how that unexamined collected data harmed them (though the case didn&#8217;t turn on Article III standing). Same too here.</p>
<p>To satisfy Spokeo/TransUnion, the plaintiffs&#8217; claims must satisfy the common law requirement that any privacy intrusion be highly offensive. Session replay isn&#8217;t that:</p>
<blockquote><p>Popa does not explain how the tracking of her interactions with the PSP website caused her to experience any kind of harm that is remotely similar to the “highly offensive” interferences or disclosures that were actionable at common law&#8230;.Popa identifies no embarrassing, invasive, or otherwise private information collected by Clarity. Indeed, the monitoring of Popa’s interactions with PSP’s website seems most similar to a store clerk’s observing shoppers in order to identify aisles that are particularly popular or to spot problems that disrupt potential sales&#8230;.</p>
<p>At most, Popa alleges that Clarity gathered her pet-store preferences and her street name. To the extent Microsoft’s tracking software could be offensive in particular circumstances (e.g., involving sensitive medical or financial information), Popa does not plausibly allege the infringement of any such privacy interest.</p></blockquote>
<p>While I agree with the conclusion, the court&#8217;s invocation of an offline analogy to online activities is problematic. I recently dealt with similar analogies in my <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5208739">Segregate-and-Suppress paper</a>, where I claimed there was a significant difference between a physical-space retailer&#8217;s inspection of a shopper&#8217;s government-issued ID and online age authentication using government-issued ID. I pointed out several key differences, including the fact that the digital mediation (including the encoding, interceptability, and possible storage that could lead to expropriation) creates privacy and security risks that don&#8217;t exist with physical world age authentication. Also, a store clerk monitoring a shopper isn&#8217;t likely to record any of the shopper&#8217;s conversations with other store clerks or patrons, while session replay will. The opinion would have been better without the offline analogy.</p>
<p>In a footnote, the court discounts the identity theft risk:</p>
<blockquote><p>the complaint identifies potential harms that might be associated with session-replay technology, such as identity theft. But the complaint includes no allegations plausibly linking these potential, generalized harms to the operation of Clarity on PSP’s website vis-à-vis Popa.</p></blockquote>
<p>The court also discounts the possible trespass to chattels angle:</p>
<blockquote><p>Popa also mentions trespass as a potential common-law analog twice in her opening brief, without any additional explanation. But she never identifies what possessory interest Microsoft invaded. Indeed, Clarity—at least according to the complaint—appears to operate on PSP’s website rather than on an individual’s computer.</p></blockquote>
<p>The court also says that statutes (in this case, the Pennsylvania ECPA equivalent) can&#8217;t boostrap themselves into creating a concrete injury for Article III standing purposes based on the mere statutory violation.</p>
<p>The obvious question is: could session replay plaintiffs establish Article III standing with better pleadings, or will session replays always lack any cognizable harm? I think the answer is&#8230; yes? Recording for session replay is a fundamentally inconsequential act <em>by itself, </em>even though the court intimates that the collection of more sensitive consumer information might be a different story. (That&#8217;s a warning to any Clarity or other session replay users who aren&#8217;t suppressing recording of user text). However, when the data collection is combined with some other harm, such as an expropriation that leads to actual identity theft, then the plaintiffs may have something. But session replay plaintiffs aren&#8217;t likely to have evidence of these additional harms very often, and even more rarely will have that evidence at the time of filing the complaint (i.e., pre-discovery).</p>
<p>Without better facts, the plaintiffs try to manufacture Article III harms by invoking speculative and factually unsupported future possibilities. This court wasn&#8217;t receptive to that effort. Accordingly, I think most or all of the session replay cases in the Ninth Circuit won&#8217;t survive this ruling.</p>
<p><em>Case Citation</em>: <a href="https://cdn.ca9.uscourts.gov/datastore/opinions/2025/08/26/24-14.pdf"><span class="il">Popa</span> v. Microsoft Corporation</a>, 2025 WL 2448824 (9th Cir. August 26, 2025)</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/08/ninth-circuit-dismisses-session-replay-lawsuit-popa-v-microsoft.htm">Ninth Circuit Dismisses &#8220;Session Replay&#8221; Lawsuit&#8211;Popa v. Microsoft</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">28050</post-id>	</item>
		<item>
		<title>Court Rejects Trespass to Chattels Claim Over Placing Cookies&#8211;Doe v. Tenet</title>
		<link>https://blog.ericgoldman.org/archives/2025/06/court-rejects-trespass-to-chattels-claim-over-placing-cookies-doe-v-tenet.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 14:42:14 +0000</pubDate>
				<category><![CDATA[Privacy/Security]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=27826</guid>

					<description><![CDATA[<p>This is a Meta pixels case. The pixel setup includes the placement of cookies on users&#8217; devices. The plaintiffs argued that the cookie placement trespassed their devices. The court disagrees but gives plaintiffs leave to amend. (As usual, there is...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/06/court-rejects-trespass-to-chattels-claim-over-placing-cookies-doe-v-tenet.htm">Court Rejects Trespass to Chattels Claim Over Placing Cookies&#8211;Doe v. Tenet</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-scaled.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-27827 alignright" src="https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-300x245.jpg" alt="" width="300" height="245" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-300x245.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-1024x835.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-768x626.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-1536x1252.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/tamas-pap-VTNHHyMghvs-unsplash-2048x1670.jpg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>This is a Meta pixels case. The pixel setup includes the placement of cookies on users&#8217; devices. The plaintiffs argued that the cookie placement trespassed their devices. The court disagrees but gives plaintiffs leave to amend.</p>
<p>(As usual, there is a lot more going on in this case beyond trespass to chattels, but I&#8217;m focusing this blog post just on that claim).</p>
<p>The court summarizes the plaintiffs&#8217; trespass allegations:</p>
<blockquote><p>Defendants “intentionally used, intermeddled, interfered with, and dispossessed [them] of their computing devices without their consent by placing the fbp, ga, and gid cookies on [their] computing devices,” and that as a result, their devices “are useless for exchanging private communications with Tenet [ ], which substantially impairs the condition, quality, and value of [their] computing devices.”</p></blockquote>
<p>The court says these allegations aren&#8217;t good enough in light of Hamidi.</p>
<p>First, the court says the mere placement of cookies, without more, doesn&#8217;t show any actual injury to the plaintiffs. The court distinguishes the <a href="https://blog.ericgoldman.org/archives/2024/02/think-you-understand-online-trespass-to-chattels-law-think-again-in-re-meta-healthcare-pixels.htm">In re Meta Healthcare Pixels case</a>, where the plaintiffs adequately alleged that the cookies had slowed down their device. (That is almost certainly not a credible statement, but courts have a limited ability to test the evidence on a motion to dismiss). In contrast, &#8220;here Plaintiffs do not allege that the placement of cookies led to a measurable decrease in storage, memory, or any other impairment to their computing devices’ functioning.&#8221; Assuming the plaintiffs can satisfy Rule 11, it should be easy enough for them to fix these allegations.</p>
<p>Second, the plaintiffs provided no evidence of &#8220;dispossession.&#8221; Indeed, they cannot: the meaning of dispossession is (per the <a href="https://dictionary.cambridge.org/us/dictionary/english/dispossession">Cambridge Dictionary</a>) &#8220;the fact of having property, especially buildings or land, taken away from you.&#8221; No one took away the plaintiffs&#8217; phones from them. However, even if the court strikes the dispossession allegation, the plaintiffs should be able to proceed with arguments tha tthe cookies &#8220;intermeddle&#8221; or &#8220;interfere&#8221; with the device.</p>
<p>Third, the plaintiffs claimed the cookies interfered with their private communications. But this concern doesn&#8217;t reflect a technical limitation on the device&#8217;s functioning due to the cookies. Instead, it&#8217;s the users&#8217; behaviorial countermove to the cookies&#8217; presence. Per Hamidi, users&#8217; behavioral changes aren&#8217;t recognizable harms, just like the California Supreme Court disregarded the changes in Intel employees&#8217; behavior in response to Hamidi&#8217;s spam. The court cites <a href="https://blog.ericgoldman.org/archives/2024/10/pixel-case-against-google-jumps-the-shark-doe-i-v-google-catch-up-post.htm">Doe I v. Google</a>.</p>
<p>While it&#8217;s nice to see the court push back on plaintiffs&#8217; overclaims of trespass to chattels, we&#8217;ll have to see if the plaintiffs can revive the claim by copying the pleading approaches from the Meta Healthcare Pixels case. If it&#8217;s that easy for the plaintiffs to correct their complaint, this ruling becomes inconsequential. Instead, my hope is that courts will keep pushing back on the Meta Healthcare Pixels ruling, which made a breathtakingly broad interpretation of the interplay between cookies and trespass to chattels.</p>
<p><em>Case Citation</em>: <a href="https://storage.courtlistener.com/recap/gov.uscourts.caed.431422/gov.uscourts.caed.431422.45.0.pdf">Doe v. Tenet Healthcare Corp.</a>, 2025 WL 1635956 (E.D. Cal. June 9, 2025)</p>
<p><strong>More Posts on the Pixel Cases</strong></p>
<ul>
<li><a href="https://blog.ericgoldman.org/archives/2025/06/clickwrap-formed-even-when-a-consumer-has-limited-time-to-act-washington-v-flixbus.htm">Clickwrap Formed Even When a Consumer Has Limited Time to Act–Washington v. Flixbus</a></li>
<li><a href="https://blog.ericgoldman.org/archives/2025/05/meta-pixels-case-dismissed-by-second-circuit-solomon-v-triller.htm">Meta Pixels Case Dismissed by Second Circuit–Solomon v. Triller</a></li>
<li><a title="Leaky TOS Formation = No TOS Formation–Snyder v. G6" href="https://blog.ericgoldman.org/archives/2025/05/leaky-tos-formation-no-tos-formation-snyder-v-g6.htm" rel="bookmark">Leaky TOS Formation = No TOS Formation–Snyder v. G6</a></li>
<li><a title="The VPPA May Be a Dinosaur Statute, But It’s Very Much Alive in the Second Circuit–Salazar v. NBA" href="https://blog.ericgoldman.org/archives/2024/10/the-vppa-may-be-a-dinosaur-statute-but-its-very-much-alive-in-the-second-circuit-salazar-v-nba.htm" rel="bookmark">The VPPA May Be a Dinosaur Statute, But It’s Very Much Alive in the Second Circuit–Salazar v. NBA</a></li>
<li><a title="Pixel Case Against Google “Jumps the Shark”–Doe I v. Google (Catch Up Post)" href="https://blog.ericgoldman.org/archives/2024/10/pixel-case-against-google-jumps-the-shark-doe-i-v-google-catch-up-post.htm" rel="bookmark">Pixel Case Against Google “Jumps the Shark”–Doe I v. Google (Catch Up Post)</a></li>
<li><a title="Think You Understand Online Trespass to Chattels Law? Think Again–In re Meta Healthcare Pixels" href="https://blog.ericgoldman.org/archives/2024/02/think-you-understand-online-trespass-to-chattels-law-think-again-in-re-meta-healthcare-pixels.htm" rel="bookmark">Think You Understand Online Trespass to Chattels Law? Think Again–In re Meta Healthcare Pixels</a></li>
<li><a title="More Chaos in the Law of Online Contract Formation" href="https://blog.ericgoldman.org/archives/2023/08/more-chaos-in-the-law-of-online-contract-formation.htm" rel="bookmark">More Chaos in the Law of Online Contract Formation</a></li>
<li><a title="Privacy Lawsuit Based on Website Tracking by Service Provider Trimmed" href="https://blog.ericgoldman.org/archives/2021/10/privacy-lawsuit-based-on-website-tracking-by-service-provider-trimmed.htm" rel="bookmark">Privacy Lawsuit Based on Website Tracking by Service Provider Trimmed</a></li>
</ul>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/06/court-rejects-trespass-to-chattels-claim-over-placing-cookies-doe-v-tenet.htm">Court Rejects Trespass to Chattels Claim Over Placing Cookies&#8211;Doe v. Tenet</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27826</post-id>	</item>
		<item>
		<title>Reddit Challenges Anthropic&#8217;s Scraping to Create Generative AI Models (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2025/06/reddit-challenges-anthropics-scraping-to-create-generative-ai-models-guest-blog-post.htm</link>
					<comments>https://blog.ericgoldman.org/archives/2025/06/reddit-challenges-anthropics-scraping-to-create-generative-ai-models-guest-blog-post.htm#comments</comments>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 15:49:05 +0000</pubDate>
				<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Licensing/Contracts]]></category>
		<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=27806</guid>

					<description><![CDATA[<p>by guest blogger Kieran McCarthy With as much scraping as is happening for AI training and enhancement these days, it’s amazing to me that there aren’t more lawsuits happening over scraping. The legal headlines are more of a trickle than...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/06/reddit-challenges-anthropics-scraping-to-create-generative-ai-models-guest-blog-post.htm">Reddit Challenges Anthropic&#8217;s Scraping to Create Generative AI Models (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>by guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p>With as much scraping as is happening for AI training and enhancement these days, it’s amazing to me that there aren’t <em>more </em>lawsuits happening over scraping. The legal headlines are more of a trickle than the flood I was expected.</p>
<p>But on June 4th, <a href="https://redditinc.com/hubfs/Reddit%20Inc/Content/PDFs/Docket%20Stamped%20Complaint.pdf">Reddit sued Anthropic</a> in the Superior Court of California for breach of contract, unjust enrichment, trespass to chattels, tortious interference, and unfair competition.</p>
<p>&#8212;</p>
<p>The facts are as follows: Anthropic was trained, at least in part, on Reddit data. In fact, in the complaint, they have a quote from Anthropic’s model Claude where Claude admits that it was trained, in part, on Reddit data.</p>
<p>I asked ChatGPT (model o4) the same question. It replied:</p>
<p>&#8212;</p>
<p>Yes, ChatGPT has been trained, at least in part, on Reddit data.</p>
<p>OpenAI has utilized Reddit content in multiple ways throughout the development of its language models:</p>
<ol>
<li><strong>Early Training with Reddit-Linked Content</strong>: For GPT-2, OpenAI created a dataset called WebText, which consisted of web pages linked from Reddit posts that had received at least 3 upvotes. This approach was intended to gather high-quality and diverse content from the internet.</li>
<li><strong>Fine-Tuning with Reddit Data</strong>: In 2019, Microsoft Research developed DialoGPT, a conversational AI model fine-tuned on 147 million Reddit conversation exchanges from 2005 to 2017. This fine-tuning aimed to enhance the model&#8217;s ability to generate human-like dialogue .</li>
<li><strong>Recent Licensing Agreement</strong>: In May 2024, OpenAI entered into a formal partnership with Reddit, granting OpenAI access to Reddit&#8217;s Data API. This agreement allows OpenAI to use Reddit&#8217;s real-time, structured, and unique content to train and improve its AI models, including ChatGPT .</li>
</ol>
<p>&#8212;</p>
<p>And it’s the last part that is why this Reddit-Anthropic legal dispute has arisen. OpenAI and Google have entered into a formal licensing agreement with Reddit. Anthropic has not. OpenAI and Google are paying Reddit to access Reddit content. At least according to the complaint, Anthropic is not.</p>
<p>&#8212;</p>
<p>Pay to access our (user-generated) content, or we’ll sue. That’s the rub. And then the legal question is whether Reddit can restrict access to public content that is not proprietary to Reddit, but was created by its users. And according to what legal theories it can restrict that access.</p>
<p>&#8212;</p>
<p>One of the things that’s interesting to me here is that the suit has been filed in California Superior Court, rather than in the Northern District of California. Almost all of the major legal scraping precedents happened in the Northern District, and it is definitely unusual that this was filed in state court.</p>
<p>&#8212;</p>
<p>I have no idea what Anthropic’s defense to this will be, but if I were counsel for Anthropic, I would start with copyright preemption arguments. This is a content use legal dispute, at its core. And there is a legal regime dedicated to that issue, and it’s called copyright law.</p>
<p>I think there are very strong arguments post ML Genius and <a href="https://blog.ericgoldman.org/archives/2024/05/x-corp-v-bright-data-is-the-decision-weve-been-waiting-for-guest-blog-post.htm">related</a> <a href="https://blog.ericgoldman.org/archives/2024/05/elon-musks-gifts-to-web-scrapers-guest-blog-post.htm">cases</a> that the breach of contract, unjust enrichment, and unfair competition claims <a href="https://blog.ericgoldman.org/archives/2023/12/should-copyright-preemption-moot-anti-scraping-tos-terms-guest-blog-post.htm">should be preempted by copyright</a>.</p>
<p>&#8212;</p>
<p>I think Reddit’s strongest argument here is the tortious interference claim, namely that Anthropic’s failure to follow the official protocols with scraping potentially impacts its ability to comply with its own terms of service with its users (to the extent that Anthropic is not following those protocols). That would likely not be preempted by copyright, and if proven, could lead to a successful claim.</p>
<p>&#8212;</p>
<p>I hate that we’re still doing trespass to chattels claims in 2025. Reddit’s allegations boil down to this paragraph: “Anthropic’s acts have diminished the server capacity and functioning that Reddit can devote to its legitimate users and thereby injured Reddit by depriving it of the ability to use its personal property.”</p>
<p>More than two decades ago, the Cal. Supreme Court in Hamidi said “The tort does not encompass, and should not be extended to encompass, an electronic communication that neither damages the recipient computer system nor impairs its functioning.&#8221;</p>
<p>This complaint alleges neither damage to the servers nor impaired functioning. Merely “diminished capacity” without any attempt to quantify whether that’s a 20% diminished capacity or a .00002% diminished capacity. De minimis diminished server capacity when you’re probably using AWS shouldn’t be a tort.</p>
<p>We need to go back to Hamidi on that one.</p>
<p>&#8212;</p>
<p>Either way, this should be another interesting and important case to follow, assuming Anthropic decides to fight rather than just pay up.</p>
<p style="text-align: center;">* * *</p>
<p><strong>Eric&#8217;s Comments</strong></p>
<p>Reddit&#8217;s centerpiece claim against Anthropic is breach of contract. So how did it form a contract with Anthropic?</p>
<p>You&#8217;re not going to believe this, but Reddit is trying to enforce a &#8220;browsewrap.&#8221; The relevant allegations from the complaint:</p>
<blockquote><p>Reddit prominently displayed a link to the User Agreement on its platform. The use of Reddit’s platform is governed by the User Agreement. The User Agreement states: “By accessing or using [Reddit’s] Services, you agree to be bound by these Terms. If you do not agree to these Terms, you may not access or use our Services.”</p>
<p>Anthropic accepted the terms of the User Agreement every time it or its agents—including ClaudeBot, Dario Amodei, or the other authors who found Reddit data to be of the highest quality and well-suited for fine-tuning AI models—accessed or logged on to Reddit’s platform.</p></blockquote>
<p>Dafuq? Seriously?</p>
<p>I decided to check out this purported placement (I didn&#8217;t see a screenshot in the complaint&#8217;s body). I couldn&#8217;t immediately find the referenced link on Reddit&#8217;s landing page. To find it (I had to do a word search), you have to scroll down and look at the bottom of the third column (under the &#8220;popular communities&#8221; widget). Here&#8217;s what I saw on June 6 in Firefox after scrolling down some:</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit.jpg"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-27814" src="https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit-1024x563.jpg" alt="" width="1024" height="563" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit-1024x563.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit-300x165.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit-768x422.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit-1536x844.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2025/06/reddit.jpg 1818w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Do you see the words &#8220;user agreement&#8221; in the bottom right? That is the foundation of the breach of contract claim. Virtually invisible link. No call to action. No action button. Nothing to ensure that parties have notice or manifest their assent. FFS.</p>
<p>It&#8217;s even more shocking because courts recently have been <a href="https://blog.ericgoldman.org/archives/2025/03/the-ninth-circuit-has-a-lot-to-say-about-online-contract-formation-much-of-it-confusing-chabolla-v-classpass.htm">dramatically raising the bar on contract formation expectations</a>. &#8220;Sign-in-wrap&#8221; formations that historically were just fine are failing with alarming frequency. Yet, Reddit thinks it&#8217;s going to win without even so much as a sign-in-wrap???</p>
<p>To put it another way: if Reddit wins the breach of contract claim based on this allegation, it will completely blow up online contract formation law as we currently know it. For more on this, see my slide deck from <a href="https://www.ericgoldman.org/Speeches/UTAustinOnlineContracts2025.pdf">my May presentation on online contract formation</a>.</p>
<p>Now, Reddit has more arguments it could possibly make to bind Anthropic to contract terms. It could try the Register.com v. Verio/Restatements 69 contract formation workaround. It could argue that Anthropic has publicly admitted that the TOS terms bind it. It could argue that Anthropic employees created Reddit accounts and thus learned about the restrictive terms during the account formation process. It could argue that Anthropic knew about the Robots.txt restrictions and somehow that turned the Robot.txt instructions into a contract. It could argue that Anthropic&#8217;s robots clicked on the user agreement link and assented as Anthropic&#8217;s legal agents. These are all theoretical arguments because Reddit doesn&#8217;t appear to be arguing any of this yet (some of these arguments would require an amended complaint).</p>
<p>What Reddit cannot do is successfully argue that its home page link to &#8220;user agreement&#8221; creates a binding contract. Browsewraps without a call-to-action are not a contract. Claiming otherwise puts Reddit&#8211;and its very capable and expensive lawyers&#8211;at risk of massive and unrelenting public and judicial derision.</p>
<p>Reddit&#8217;s trespass to chattels claim isn&#8217;t much better. Here&#8217;s how Reddit pleads Anthropic&#8217;s knowledge of the server delimitations: &#8220;Anthropic knowingly exceeded the permission granted by Reddit to access Reddit’s personal property, including its technological infrastructure and servers.&#8221; This is a threadbare allegation of knowledge without specifying any supporting facts. The complaint&#8217;s recitation of facts only marginally improve this. Further, as Kieran notes, the TTC harm statement is also pretty weak in light of the Hamidi standard.</p>
<p>__</p>
<p>Two other noteworthy points about this lawsuit.</p>
<p>A real party-in-interest to this lawsuit is OpenAI. Now that OpenAI is paying a license fee to Reddit, they need all of their rivals to bear the same costs. If Reddit can&#8217;t impose license fees on Anthropic, assume that OpenAI will look for other ways to jack up Anthropic&#8217;s cost structure to more closely mirror OpenAI&#8217;s. I explain this dynamic in my <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4802313">Generative AI is Doomed paper</a>.</p>
<p>Also, Reddit frames itself as the champion of its users&#8217; interests, but Reddit is walking a fine (and awkward) line. Sure, it&#8217;s nominally defending its users from rapacious scraping malefactors. But in practice, even Reddit&#8217;s values have a price tag. Reddit isn&#8217;t opposed to third parties profiting from its users&#8217; content; it just needs its vig.</p>
<p style="text-align: center;">* * *</p>
<p><strong>Kieran&#8217;s Supplement</strong></p>
<p>Following up on Eric’s comments.</p>
<p>Under any reasonable current interpretation of California law, the breach of contract claim should be gone. There’s no evidence of actual or constructive knowledge of the online agreement in the complaint. There is case law in other jurisdictions that says that a sophisticated business may be held liable for breach of contract even when there is no proof of actual notice in the record (<a href="https://blog.ericgoldman.org/archives/2017/07/1h-2017-quick-links-part-5-advertising-contracts.htm"><i>CouponCabin LLC v. Savings.com, Inc.</i></a>, 2017 WL 83337 (N.D. Ind. Jan. 10, 2017); <i>Int’l Council of Shopping Ctrs., Inc. v. Info Quarter, LLC</i>, No. 17-5526 (S.D.N.Y. May 7, 2019)), and when a business also has an online agreement that is similar to the one that is being enforced. <i>DHI Group, Inc. v. Kent</i>, No. 16-1670 (S.D. Tex. Oct. 26, 2017). But that reasoning has never been applied in California.</p>
<p>Perhaps Reddit might argue in a reply that the semi-omniscient “bots” have or should have knowledge of the terms and that knowledge should be imputed to Anthropic. But that argument is without precedent in California, either. If Reddit&#8217;s allegations pass muster for “actual or constructive knowledge,” then this would be a complete evisceration of the current standard for knowledge of actual or constructive knowledge of an online agreement for a sophisticated business in California.</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/06/reddit-challenges-anthropics-scraping-to-create-generative-ai-models-guest-blog-post.htm">Reddit Challenges Anthropic&#8217;s Scraping to Create Generative AI Models (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ericgoldman.org/archives/2025/06/reddit-challenges-anthropics-scraping-to-create-generative-ai-models-guest-blog-post.htm/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27806</post-id>	</item>
		<item>
		<title>Court Overturns a Bad Jury Verdict Against Scraping&#8211;Ryanair v Booking (Guest Blog Post)</title>
		<link>https://blog.ericgoldman.org/archives/2025/03/court-overturns-a-bad-jury-verdict-against-scraping-ryanair-v-booking-guest-blog-post.htm</link>
		
		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 18:01:30 +0000</pubDate>
				<category><![CDATA[Trespass to Chattels]]></category>
		<guid isPermaLink="false">https://blog.ericgoldman.org/?p=27440</guid>

					<description><![CDATA[<p>by guest blogger Kieran McCarthy This summer, I wrote that the jury trial between Ryanair and Booking Holdings ended in the strangest way possible. The jury returned a verdict that Booking Holdings had caused exactly $5,000 in legally cognizable “loss”...</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/03/court-overturns-a-bad-jury-verdict-against-scraping-ryanair-v-booking-guest-blog-post.htm">Court Overturns a Bad Jury Verdict Against Scraping&#8211;Ryanair v Booking (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>by guest blogger <a href="https://mccarthylg.com/attorneys/">Kieran McCarthy</a></p>
<p>This summer, <a href="https://blog.ericgoldman.org/archives/2024/08/ryanair-v-booking-cfaa-trial-ends-with-strangest-possible-outcome-guest-blog-post.htm">I wrote</a> that the jury trial between Ryanair and Booking Holdings ended in the strangest way possible. The jury returned a verdict that Booking Holdings had caused <em>exactly</em> $5,000 in legally cognizable “loss” to Ryanair under the CFAA—the statutory minimum to establish a CFAA claim.</p>
<p><a href="https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-scaled.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-27443" src="https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-300x200.jpg" alt="" width="300" height="200" srcset="https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-300x200.jpg 300w, https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-1024x683.jpg 1024w, https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-768x512.jpg 768w, https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-1536x1024.jpg 1536w, https://blog.ericgoldman.org/wp-content/uploads/2025/02/elijah-mears-3-Mh_l2sLbk-unsplash-2048x1365.jpg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>Of course, there’s no way that the actual damages caused by one company to another under the CFAA would match the statutory loss threshold <em>to the cent</em>. What really happened was that the judge gave a jury instruction that confused the hell out of the jury, and so the jury returned a meaningless and indefensible verdict, one that was certain to be appealed.</p>
<p>And so it comes as no surprise that there were some post-trial fireworks in this case. On January 22, Booking.com’s renewed motion for judgment as a matter of law (“JMOL”) was granted. That indefensible jury verdict was overturned.</p>
<p>The JMOL had two primary conclusions:</p>
<p><strong><em>First</em></strong>, that the CFAA has extraterritorial application, and therefore it was appropriate for this court to apply the CFAA here. This is an incredibly controversial holding. By the time trial rolled around, this case involved only an Irish plaintiff (Ryanair) and a Dutch defendant (Booking.com B.V.).</p>
<p>Now, one might reasonably think that an American court has no business adjudicating a business dispute between two European companies, when that case might result in an extraterritorial injunction that directly conflicts with European laws in their home countries. But this court says, not so. The court’s reasoning was that because the definition of “protected computer” includes computers located outside of the United States, that this is a clear, affirmative indication of the CFAA’s extraterritorial application, even though the statute itself does not say that it has extraterritorial application. And, of course, the statute itself was drafted long before the Internet was in ubiquitous use, so the drafters could never have contemplated this situation. That holding has enormous potential ramifications for companies around the world, but it didn’t end up being dispositive to the parties in this dispute.</p>
<p><b><i>Second</i>,</b> and more importantly for the parties in this dispute, the court found that Ryanair did not meet its burden of proving at least $5,000 of “loss” attributable to Booking.com (or, in the alternative, obtaining $5,000 in value from alleged fraud). The judge determined that certain costs, such as customer service agent expenses, did not qualify as a loss, and determined that only $2,457.72 from Ryanair’s antibot technology “Shield” were attributable as losses under the CFAA. Because Ryanair did not meet the $5,000 CFAA loss threshold after the judge&#8217;s re-evaluation of the facts in the case, the judge threw out the adverse jury verdict under the CFAA.</p>
<p>And so, four and a half years after the initial complaint was filed, the case ended with no finding of liability for either party.</p>
<p>In the end, two parties paid many millions in legal fees to determine whether one party had caused another $5,000 in “loss” under the CFAA. They engaged in this absurd legal dance because Ryanair wanted injunctive relief. It wanted a worldwide, enforceable court order to get Booking and its affiliates to stop reselling Ryanair flights. I do not think that’s what the drafters of the CFAA had in mind.</p>
<p>I blame this result on this court’s definition of technological harm. Here’s what happened:</p>
<blockquote><p>After being provided the CFAA definition of “loss,” the jury was instructed that “the cost of responding to an offense may be considered a loss even if no actual technological harm has occurred, as long as the response is directed at technological harm, such as preventing an impending unauthorized access or investigating the method by which an offender accessed the computer, rather than business or other harms, such as investigating how the offender used the access for commercial gain.” Dkt. No. 453 at 5. The jury was further instructed that they “should not offset any losses by any profits Ryanair may have received as a result of Booking.com’s actions,” and that “[l]osses do not include any costs that are not borne by Ryanair.” <em>Id</em>.</p></blockquote>
<p>JMOL at 16.</p>
<p>This is equal parts nonsensical and confusing.</p>
<p>According to the Supreme Court in <em>Van Buren</em>, the definition of loss under the CFAA “focus[es] on technological harms—such as the corruption of files—of the type unauthorized users cause to computer systems and data.” <em>Van Buren v. United States</em>, 593 U.S. 374, 392 (2021). But according to this court, a party can establish technological harm “even if no actual technological harm has occurred,” as long as they investigate non-harm in a technological way.</p>
<p><a href="https://www.youtube.com/watch?v=SWIHaXsNyko">Huh? Got that?</a></p>
<p>This standard is confusing, easy to manipulate, and seems to contradict the direct language of the Supreme Court and the statute itself. It also is at odds with any sort of common-sense understanding of what constitutes technological harm. And because it allows plaintiffs to bootstrap a definition of technological harm in the absence of actual harm, it incentivizes companies to pursue business grievances through the CFAA. And apparently now companies can do this regardless of whether they have any connection to the United States, assuming they operate online and some of their business is transacted here.</p>
<p>If this is what passes as technological harm, then more CFAA absurdity is certain to come in the near future.</p>
<p><em>Case Citation</em>: <a href="https://storage.courtlistener.com/recap/gov.uscourts.ded.73139/gov.uscourts.ded.73139.516.0.pdf">Ryanair DAC v. Booking.com BV</a>, 1:20-cv-01191-WCB (D. Del. Jan. 22, 2025).</p>
<p>The post <a href="https://blog.ericgoldman.org/archives/2025/03/court-overturns-a-bad-jury-verdict-against-scraping-ryanair-v-booking-guest-blog-post.htm">Court Overturns a Bad Jury Verdict Against Scraping&#8211;Ryanair v Booking (Guest Blog Post)</a> appeared first on <a href="https://blog.ericgoldman.org">Technology &amp; Marketing Law Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27440</post-id>	</item>
	</channel>
</rss>
