Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another “under an assumed character with intent to obtain a benefit or to injure or defraud another.” See, Penal Law '190.25. The foremost case brought under this law, People v. Golb, 15 N.E.3d 805 (N.Y. 2014), in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place. In essence, Golb is about a son creating myriad fake online personalities to defend his father against other scholars who differed with his father's interpretation of the origin of the Dead Sea Scrolls. Some of the profiles were fictitious, but others were in fact impersonations of the very targets of the campaign, that is, those scholars that disagreed with the defendant's father.
This is hardly common Internet debate fodder, and it illustrates how the ease of access to anonymous, seemingly consequence-free communication provided by the Internet can create conflicts that in the past may not have materialized. If nothing else, Golb also sheds insight into how even the most particularized and arcane subjects ripe for argument can metastasize into legal proceedings that lead to a criminal conviction of the impersonator. Over a vigorous dissent arguing that criminalizing this speech constituted a First Amendment violation, the Court of Appeals concluded that most of such acts of impersonation could sustain a criminal conviction.
Golb is hardly an outlier. As discussed further below, litigation that seeks to hold online impersonators liable for any havoc they may cause, whether it be of a financial, reputational or emotional nature, has proliferated in numerous jurisdictions. Thus far, plaintiffs have found moderate success, although convictions under federal criminal anti-hacking statutes appear to be the exception to the rule. Another common element of these actions is that most focus on messages understood to be coming from the ostensible sender, and not the impersonator, as such message are naturally those less likely to be understood as false. Finally, these cases illustrate that to be actionable, the messages must be reasonably considered to not involve obvious parodies or jokes.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?