Zelda Williams and Social Media Decency


[The first of a new series in which we ask JD Supra contributors to address the perils, legal or otherwise, of being an online citizen today, and all that entails. Stay tuned for additional articles in the series.]

Robin Williams, beloved comedian and frequent Twitter-user, died last week. His final tweet was to his daughter, wishing a "Happy Birthday to Ms. Zelda Rae Williams!" Like any child who loses a parent, Zelda was undoubtedly heartbroken. She posted a heartfelt tribute to her dad on Twitter. In response, several anonymous Twitter users sent her graphic photos purporting to be her father's dead body — taunting her until she decided to stop using Twitter and Instagram altogether.

Social media commentators can be feral. This is largely due to a psychological phenomenon known as the online disinhibition effect. The relative anonymity of social media communications, for some, opens the door for cruel and indifferent behavior.

In the late 1990's Congress became concerned with the volume of pornographic material on the Internet and passed the Communications Decency Act of 1996 (CDA). It attempted to regulate (and prevent) publication of obscene or indecent content to minors. Much of the CDA was held to be unconstitutional a long while ago, but one portion of the CDA continues to live on that has drastic impact on online decency.

Ms. Williams made a reasoned decision to step out of the social media world for a time, but there are certainly steps a user and counsel can take when going through the analysis.

Section 230 of the CDA provides that "[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider."  This single sentence has given immunity to social media platforms, such as Facebook, Twitter, or Instagram, from liability for postings made by users of the platform. So the sites themselves have little concern for liability for defamatory, false, or tasteless content. Plus, posting rude or indecent content — while gauche — is not illegal.

So, what is one to do when confronted with harassing postings on social media websites? Ms. Williams made a reasoned decision to step out of the social media world for a time, but there are certainly steps a user and counsel can take when going through the analysis.

The first step is to determine if there is anything in the posting that includes a threat to life or safety. There is a world of difference between a rude comment and a threat of physical violence, and if a post is threatening to someone or to their family, call law enforcement immediately before doing anything else.

The second step is to determine whether it is worthwhile to spend the effort to respond or attempt to have the postings at issue taken down. It is frequently the best course of action to ignore postings from "trolls" — those who deliberately attempt to inflame or draw a response by posting disruptive content. The goal of many trolls is to elicit a response. By responding or taking action, you are often fueling the trolling flame and will thereby provoke more and more responses. Even if you are able to have a post removed, a sophisticated user can create near-infinite dummy accounts and continue to post more and more negative content if provoked.

Third, assuming you want the content taken down, you should review salient policies and use the reporting mechanisms provided by the platform at issue. Twitter, Facebook, YouTube, Instagram and other platforms are accustomed to getting thousands of reports regarding posted content every day. They all have robust online reporting mechanisms for everything from abusive content, to copyright violations, to violations of the site's terms of service. For example, the users who posted the graphic photos to Zelda Williams were eventually banned from Twitter for violating Twitter's policies after being reported.

Due to the difficulty and expense associated with tracking down a poster, the policies of social media sites serve as the de facto international law of decency for social media postings...

A common rookie mistake from lawyers who are used to paper is to prepare a pen-and-ink letter to put in the mail to demand removal of a post from a major social media website. This is typically ineffective, as most online reporting mechanisms are geared to have rapid responses only to online reports. Paper letters delay the process, where the process is set up to be automated via an online reporting mechanism. In the author's experience, using the online reporting mechanism on most major sites will result in a response and action within 24 hours.

If reporting content does not work, or you wind up with a whack-a-mole situation where the content continues to pop up again and again, you can often seek a cyberstalking injunction. While the parameters of such an injunction varies by jurisdiction, you can typically obtain an injunction against an individual who is repeatedly using electronic communications that cause substantial emotional distress to a person, and the communications serve no legitimate purpose. If the content is defamatory, or lends itself to another cause of action (such as public disclosure of private facts or another privacy tort), you can always sue for injunctive relief to stop the posting as well.

The trouble, of course, is whom to sue when the posting is anonymous?

In a civil proceeding, figuring out who is the posting party typically requires one or more subpoenas. Civil subpoenas are subject to the prohibitions contained within the Stored Communications Act (SCA), 18 U.S.C. §2701, et seq. The SCA prohibits electronic communication service providers (such as Twitter or Facebook) from "knowingly divulg[ing] to any person or entity the contents of a communication while in electronic storage by that service."  18 U.S.C. § 2702(a)(1). The SCA, however, permits service providers to produce subscriber information "to any person other than a governmental entity." 18 U.S.C. § 2702(c)(6).

For that reason, a subpoena served in conjunction with a civil proceeding is permissible if it seeks subscriber information associated with specific accounts. As a practical matter, account holders on various social media sites furnish certain identifying information when he or she creates an account. This information can include name, phone number, and alternate email addresses that may be used for recovery purposes (i.e. forgetting a password). This type of information is not protected by the SCA, as it is not considered content, and may be produced in response to a civil subpoena by a non-governmental entity. See 18 U.S.C. § 2702(c)(6).

Internet Protocol address login records are also obtainable by civil subpoena. Under 18 U.S.C. § 2702(c)(1), customer records or subscriber information may be disclosed as authorized in 18 U.S.C. § 2703, which permits providers to disclose user identification information, "records of session times and durations" and "temporarily assigned network addresses."  18 U.S.C. § 2703(c)(2); see Sams v. Yahoo!, Inc., CV-10-5897-JF HRL (N.D. Cal. 2011) (subscriber information and IP address data is not content-based). As this information is not considered to be content-based, it may be produced in response to a civil subpoena pursuant to the SCA.

Once the subscriber information is obtained, assuming you cannot readily identify the poster, the Internet Service Provider that assigned the IP of the poster would need to be subpoenaed. Most ISPs will likely not turn over this information without a subpoena as ISPs are typically cable providers, and pursuant to the Cable TV Privacy Act of 1984, 47 U.S.C. § 551, cable providers are prohibited from disclosing personally identifiable information pertaining to their subscribers without a court order.

Unfortunately, the end result of the civil action coupled with multiple subpoenas is often a dead-end...

Assuming that the ISP record enables you to identify an individual account holder (as opposed to a shared public wireless connection) who is in the United States, then you can proceed with your civil action with an identified defendant.

Unfortunately, the end result of the civil action coupled with multiple subpoenas is often a dead-end. Users who use public wi-fi accounts, or who post from outside the United States or through proxy servers, can be nigh impossible to identify or to reach with United States-based judicial proceedings.

This is why the policies and procedures of sites, such as Twitter, Instagram, and Facebook, are so important. Due to the difficulty and expense associated with tracking down a poster, the policies of social media sites serve as the de facto international law of decency for social media postings — the social media sites control their terms of service, and they primarily dictate what users can and cannot do. Like Zelda, users who do not want to be exposed to harassing content can choose not to participate, and simply stay offline.


[Adam Losey is an attorney at Foley & Lardner LLP, based out of New York, Florida, and the District of Columbia.  He routinely handles issues associated with the intersection of technology and law, and can be reached at alosey@foley.com.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© JD Supra Perspectives | Attorney Advertising

Written by:


JD Supra Perspectives on:

Popular Topics
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.