210 likes | 370 Views
Trespass to Chattels: eBay and Intel. Richard Warner. Three Questions. First : to what extent does one impliedly consent to access by the general public when one connects a publicly accessible system to the Internet?
E N D
Trespass to Chattels: eBay and Intel Richard Warner
Three Questions • First: to what extent does one impliedly consent to access by the general public when one connects a publicly accessible system to the Internet? • Second: can one always revoke consent by notifying third parties that their access is unauthorized? • Third: when does access by a third party impair value or harm a relevant interest?
eBay v. Bidder’s Edge • The leading case is eBay v. Bidder’s Edge. • eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the status of auctions. • eBay is by far the largest of hundreds of similar sites.
eBay v. Bidder’s Edge • The large number of sites creates a dilemma for buyers. • Should a buyer search one site, or a few sites, and settle for the best combination of price and quality the limited search reveals? • Or, is a broader search worth the extra effort? • Bidder’s Edge solves this dilemma.
The eBay Fact Pattern • Bidder’s Edge allows a buyer to perform a single search on its site, where that search yields a list of all relevant items for sale on over one hundred other auction sites. • Bidder’s Edge accomplishes this feat through software robots–often called “spiders”–that automatically search the Internet for relevant information.
Revocation of Consent • “On November 9, 1999, eBay sent BE a letter reasserting that BE's activities were unauthorized, insisting that BE cease accessing the eBay site, alleging that BE's activities constituted a civil trespass and offering to license BE's activities.”
The Court on Consent • “BE argues that it cannot trespass eBay's web site because the site is publicly accessible. BE's argument is unconvincing.” • “eBay's servers are private property, conditional access to which eBay grants the public.”
The Court on Consent • “eBay does not generally permit the type of automated access made by BE. In fact, eBay explicitly notifies automated visitors that their access is not permitted.” • “Moreover, eBay repeatedly and explicitly notified BE that its use of eBay's computer system was unauthorized.” • Bidder’s Edge continued to attempt to access the eBay site.
Like CompuServe? • This looks like the CompuServe fact pattern; we have intentional, unauthorized access. • But does the access impair the value of eBay’s computers, or harm some relevant legally protected interest? • The court holds that the access impairs value.
Bidder’s Edge’s Argument Against • “BE argues that its searches represent a negligible load on plaintiff's computer systems, and do not rise to the level of impairment to the condition or value of eBay's computer system required to constitute a trespass.”
Impairment of Value • “However, it is undisputed that eBay's server and its capacity are personal property, • and that BE's searches use a portion of this property. • Even if . . . its searches use only a small amount of eBay's computer system capacity, BE has nonetheless deprived eBay of the ability to use that portion of its personal property for its own purposes. • The law recognizes no such right to use another's personal property” (emphasis added).
The Breadth of the Right • Consider: Any access to a server for any purpose uses some portion of that personal property for that purpose. • Thus: any unauthorized use impairs value. • So: a system owner can turn any access into a trespass simply by informing the other party that such access is no longer authorized.
Buchanan Marine v. McCormack Sand • The defendant moored its barges to the buoy the plaintiff built and maintained for use by its tugboats. (743 F. Supp. 139 (1991)). • The court found a trespass to chattels and issued an injunction without requiring the plaintiff of show any harm other than being deprived of the use of its property. • It did not matter whether the plaintiff desired to use the buoy at the time the defendant was using them.
Private Property • It was the potential deprivation that mattered. • The buoy did not become available for use by others as soon as the owner was not using it. • To hold otherwise would be inconsistent with the fact that the buoy is private property. • An owner of private property has the right, within broad limits, to decide that no one shall use the property.
Linking and Trespass • Linking is another source of trespass to chattels claims—although creating a link is not a trespass • Mere creation involves no access; access occurs when one uses the link. • So how is trespass relevant?
An Analogy • Y rents factory space from X. The space contains a machine that Y wants to use, but, X and Y cannot agree on rental terms, so X locks the switch that starts the machine. • Jones, a former employee of X, obtains the key and, without any authorization, unlocks the switch knowing that Y will use the machine, which Y does. • Jones is liable for trespass to chattels as he intentionally and foreseeably contributed to the unauthorized use of the machine.
Linking and Trespass • Links are similar. • The linking site knowingly and intentionally facilitates access to the linked-to system. • The access uses some of the system’s computer capacity, hence, if the access is unauthorized, it impairs value (according to eBay).
Intel v. Hamidi • Hamidi, a former Intel employee, sent e-mails to current employees criticizing Intel’s employment practices. • On each of six occasions, he sent up to 35,000 e-mails, despite Intel’s demand that he stop. • This is intentional, unauthorized access. • Does it impair value or harm a relevant interest?
No Impairment of Value • The majority held that the e-mails did not impair the value of Intel’s e-mail system. • The amount of e-mail was relatively small and did not slow down or shut down Intel’s system. • This holding rejects the eBay approach. The mere use of another’s computing capacity is not sufficient to impair value.
No Harm To A Relevant Interest • The majority also held that Hamidi’s access did not harm any legally protected interest appropriately related to that system. • In the spam cases, courts have counted an ISP’s loss of business reputation and customer goodwill as a relevant harm. • But in those cases, the harm arose from the number of messages; here it arises from their content. The court thinks that this means the harm is not appropriately related to the chattel.
Which Approach Is Best? • Should we follow eBay or Intel? • We can begin by seeing what influenced the Intel court.