Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Similar documents
TORTS SPECIFIC TORTS NEGLIGENCE

FILED: KINGS COUNTY CLERK 09/03/ :48 PM INDEX NO /2014 NYSCEF DOC. NO. 1 RECEIVED NYSCEF: 09/04/2014

How to Use Torts Tactically in Employment Litigation

Particular Crimes can be grouped under 3 headings: Crimes against people Crimes against property Crimes against business interests

LICENSE TO USE THIS SITE

Intentional Torts. What Is a Tort? Tort Recovery

Intentional Torts. What Is a Tort? Tort Recovery

HYDERALLY & ASSOCIATES, P.C.

Review of Elements of Fraud

LEGAL TERMS OF USE. Ownership of Terms of Use

Ownership of Site; Agreement to Terms of Use

PRIVACY STATEMENT - TERMS & CONDITIONS. For users of Princh printing, copying and scanning services PRIVACY STATEMENT

Case 2:06-cv RSM Document 26 Filed 04/17/2006 Page 1 of 10

Canadian Systems of Law Contract and Tort Law for Professionals There are two systems of law that operate in Canada: Common Law and Civil Law.

The use of the Service for the following activities is prohibited:

TERMS OF SERVICE. KNR Health and Beauty, LLC.

Mendocino Community Network Services Contract

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

Application Terms of Use

LAW Rule of conduct enforced by controlling authority; provides order, stability, and justice.

FILED: KINGS COUNTY CLERK 09/02/ :36 PM INDEX NO /2014 NYSCEF DOC. NO. 1 RECEIVED NYSCEF: 09/02/2014

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

Highway246.net INTERNET ACCESS AGREEMENT

TERMS AND CONDITIONS OF SERVICE

Terms of Use. Effective Date: January 1, 2018

BRUNO WORKS MEMBERSHIP AGREEMENT

NC General Statutes - Chapter 1 Article 43 1

Business Law Tort Law Unit Textbook

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

Violation Level at First Offense. (Level 1 offenses are generally nonseparable, Level 2 offenses are generally separable)

Terms of Use Agreement

By signing up for and/or otherwise accessing any of the services or products offered by Cal.net you agree to

Pure Haven Essentials Website Terms of Use

Washoe Tribe of Nevada and California. Law & Order Code TITLE 3 TORTS. [Last Amended 10/1/04. Current Through 2/3/09.]

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

TERMS OF USE. 1. Background

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

Robert I, Duke of Normandy. 22 June July 1035

CONTRACT LAW. Elements of a Contract

Terms of Service. Last Updated: April 11, 2018

SHARED WORKSPACE TERMS OF USE

Case 1:08-cv FAM Document 52 Entered on FLSD Docket 07/10/2008 Page 1 of 7

Terms and Conditions for Pennsylvania Conference of State Trial Judges (PCSTJ.org) Trademarks, Logos, Service Marks Copyright

Cenex Tanks of Thanks Sweepstakes ( Sweepstakes ) OFFICIAL RULES

3. Entry Period. You may enter a Submission between 5:00 PM Eastern Time ( ET ) December 1, 2016 and 11:59 PM ET December 23, 2016 ( Entry Period ).

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes

Terms and Conditions for Online Payments

USE OF ANY CWGS ENTERPRISES, LLC WEB SITE OR MOBILE APP SIGNIFIES YOUR AGREEMENT TO THESE TERMS OF USE.

FILED: NEW YORK COUNTY CLERK 11/04/ :40 PM INDEX NO /2016 NYSCEF DOC. NO. 1 RECEIVED NYSCEF: 11/04/2016

TERMS OF USE Intellectual Property Copyright Policy

SUPERIOR COURT OF WASHINGTON FOR KING COUNTY

Terms and Conditions for FtWashingtonVet.com Trademarks, Logos, Service Marks Copyright Accuracy of Information

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

Case: 3:11-cv TMR Doc #: 1 Filed: 11/07/11 Page: 1 of 13 PAGEID #: 1 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF OHIO WESTERN DIVISION

ACCEPTABLE USE POLICY. 1. General Notice

NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES

REGISTRANT AGREEMENT Version 1.5

on your blue computer graded bubble sheet in the appropriate location.

ANTI-FRAUD AND CORRUPTION POLICY. For the ACT Alliance

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

Table of limitation periods

NII Ph.D : Online Application

Contributary Platform User Terms of Service

TORT LAW. By Helen Jordan, Elaine Martinez, and Jim Ponce

Site Terms and Conditions of Use

MLL217 MISLEADING CONDUCT AND ECONOMIC TORTS

Case 3:17-cv MO Document 1 Filed 09/27/17 Page 1 of 10

Case 2:11-cv Document 1 Filed 11/23/11 Page 1 of 14 UNITED STATES DISTRICT COURT DISTRICT OF NEVADA ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

Filing # E-Filed 03/07/ :02:15 AM

ELEMENTS OF LIABILITY AND RISK

in relation to the credit worthiness, business or financial situation of any person; or in respect of any content, service, product, material or

Ethical Hacking. Countermeasures Version 6. Hacking Laws

Liberty American Ins. Group, Inc. v. WestPoint Underwriters, L.L.C., 199 F.Supp.2d 1271 (M.D.Fla. 2001)

FILED: NEW YORK COUNTY CLERK 08/21/2013 INDEX NO /2013 NYSCEF DOC. NO. 1 RECEIVED NYSCEF: 08/21/2013

TERMS OF SERVICE. This page is available in: Last Updated: 21 May Redline from the previous version of our Terms of Service

Understanding the RM Process

INFORMATION PRIVACY STATUTES AND REGULATIONS

Senate Bill No. 404 Senators Smith, Woodhouse, Denis, Spearman, Parks; and Atkinson

Terms and Conditions For Online-Payments

Ramifications of Fraud

CHAPTER 8: GENUINE AGREEMENT

RE/MAX Canada Instagram "Home Sweet Home" Contest OFFICIAL CONTEST RULES

GENERAL CONDITIONS OF USE OF THE SUPPLIER PORTAL

NO. 14 The Plaintiff, State of Washington, by and through its attorneys Robert W. Ferguson,

the Notices section below.

Bahrain s Draft Law on Computer Crimes

IN THE CIRCUIT COURT OF ST. LOUIS CITY STATE OF MISSOURI

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Case 2:18-cv JTM-MBN Document 1 Filed 06/04/18 Page 1 of 22 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF LOUISIANA

Privacy Policy & Terms of Use

OFFICIAL GENERAL CONTEST RULES The Bert Show, LLC

District > Intermediate > Business Education > Business Law ( ) (District) > Juett, David

Case 2:13-cv EJF Document 2 Filed 10/10/13 Page 1 of 20

S16G0662. LYMAN et al. v. CELLCHEM INTERNATIONAL, INC. After Dale Lyman and his wife, Helen, left Cellchem International, Inc.

AUGUR SITE TERMS OF USE

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 H 1 HOUSE BILL 308. Short Title: Admission Ticket Reform Act. (Public)

2017 Cleveland Metroparks Centennial Art Show. Theme: Celebrating Our Centennial 100 Years of Cleveland Metroparks

Be it enacted by the General Assembly of the Commonwealth of Kentucky: Section 1. KRS is amended to read as follows:

Transcription:

Chapter 6 Business Torts and Online Crimes and Torts Disparagement of Property Slander of Title Slander of Quality (Trade Libel) Defenses Disparagement of Property Disparagement of property occurs when a party intentionally publishes an injurious falsehood about another s product or property. There are two torts in the disparagement of property family: 1. Slander of Title, and 2. Slander of Quality. Slander of Quality is also known as Trade Libel. 1

Slander of Title Occurs when there is either an oral or written false and unprivileged statement about the title to real or personal property that causes actual monetary damages to the plaintiff. It has four required elements: 1. The statement was published (often by recording a document in the county records.) 2. The statement was false. 3. There was an absence of privilege, and 4. There was a disparagement of another s property that a third party relied upon, resulting in a monetary loss. Slander of Quality (Trade Libel) An intentional disparagement on the quality of another s property (goods or services) that results in monetary damage. It has two required elements: 1. Plaintiff suffered actual monetary loss. This generally requires a showing that the false publication caused a third party to refrain from dealing with the plaintiff, causing an economic loss, such as lost profit. 2. The disparaging statement was (or statements were) false. Defenses to Disparagement 1. Truth. Only false statements can be said to disparage the quality of someone s products or title. True statements cannot. The plaintiff must prove falsity. 2. Absolute Privilege is available in judicial proceedings, legislative proceedings, and certain executive proceedings. 3. Qualified Privilege exists in statements impugning title for persons with a bona fide claim on the property. 2

Defenses to Disparagement 3. Qualified Privilege in statements impugning quality for competitors: The rule is that a competitor may compare her products favorably with those of a rival even though she does not believe her products are superior, provided she makes no false assertions of specific unfavorable facts about her rival s products. Appropriation of Likeness for Commercial Purposes Common Law Right of Publicity Our right to prevent others from using our name or likeness in their publications without our permission is one of the four aspects of our right to privacy that we learned about in chapter 5. This is called our common law right of publicity. It has four required elements: 1. The defendant has used the plaintiff s identity 2. To his (the defendant s) advantage 3. Without the plaintiff s consent, and 4. This has caused injury to the plaintiff. Example: Eastwood v. Superior Court Clint Eastwood sued the National Enquirer for publishing an article falsely reporting that he was involved in a love triangle. The trial court granted a demurrer for the defendant, but the California Court of Appeals reversed and remanded. 3

Statutory Right of Publicity In addition to our common law right of publicity; in 1971, California supplemented this right by adopting Civil Code section 3344, subdivision (a). This code section provides that any person who knowingly uses another s name, photograph, or likeness, in any manner, for purposes of advertising products, merchandise, goods or services, or for purposes of solicitation of purchases of products without that person s prior consent shall be liable for any (actual) damages sustained by the person injured as a result. To win a right of publicity lawsuit under this theory, plaintiff must prove the use of their name or likeness was done knowingly. That means mistake or inadvertence could be an effective defense. Interference With Economic Relations of Others 1. Inducing a Breach of Contract 2. Interference with a Contractual Relationship 3. Interference with a Prospective Economic Advantage of Another Inducement to Breach Another Person s Contract This theory is designed to protect a person from intentional acts that are undertaken with the intention of producing, and that do produce, an actual breach of a valid contract. To win, plaintiff must prove: 1. That there was an existing valid contract, and 2. That the defendant had knowledge of the contract and intended to induce a breach (a failure to perform,) and 3. That the defendant s wrongful conduct caused an actual breach to occur, and 4. That the plaintiff suffered damages as a result. 4

Interference with Contractual Relations This theory is designed to protect against intentional acts that do not result in a contract breach but make the plaintiff s performance of the contract more expensive or burdensome. Plaintiff must prove: 1. Plaintiff had an existing valid contract with 3 rd party, and 2. Defendant had knowledge of the contract, and 3. Defendant s intentional and unjustified acts were intended to interfere with or disrupt the contract, and 4. There was actual interference, and 5. Damages were suffered by plaintiff as a result of defendant s actions. Interference with a Prospective Economic Advantage Also known as Intentional Interference with Prospective Economic Relations and Tortious Interference with Prospective Business Advantage, this third theory is designed to protect against intentional acts, causing harm to an economic relationship that is likely to produce an economic benefit. Plaintiff must prove: 1. There was an economic relationship with a 3 rd party that offered the probability of a future economic benefit to the plaintiff 2. The defendant had knowledge of this relationship 3. Defendant intended to disrupt this relationship. 4. Defendant engaged in wrongful conduct that was a substantial factor in producing an actual disruption of the relationship and damages were suffered by the plaintiff as a result. Online Crimes and Torts Online Crime Cyber Torts 5

Online Crime Crimes that can be committed using computers: Hacking Spamming Fraud Identity theft Embezzlement Unlawful marketing of online pornography Definitions Hacker: The person who breaks into the computer on which the stored data is located. Spamming: Sending unsolicited bulk email advertisements. Fraud: A family of crimes involving the deception of another person for the purposes of obtaining money or property from him. More Definitions Identity Theft: The unlawful use of another's personal identifying information (such as a credit card number) to commit other crimes, such as credit card fraud. Embezzlement: The unlawful conversion of personal property that is lawfully in your possession into your own property. 6

Federal Statutes to Combat Online Crime Include 1. The Computer Fraud and Abuse Act of 1984, amended by 2. The National Information Infrastructure Protection Act of 1996 3. The Communications Decency Act of 1996 4. The Identity Theft and Assumption Deterrence Act of 1998 5. The Fair and Accurate Credit Transaction Act of 2003 6. The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 7. The Identity Theft Penalty Enhancement Act of 2004 8. The U.S. Safe Web Act of 2006 More Definitions Cyber Espionage: The deployment of viruses that clandestinely observe or destroy data in the computer systems of government agencies and large enterprises. Industrial Espionage: The process whereby persons gain unauthorized access to the records or databases of private, for-profit companies for nefarious purposes, such as ransomware or theft of trade secrets. Two Federal Statutes That Fight Cybercrime The Computer Fraud and Abuse Act of 1984 makes it a federal crime to use a computer to commit theft, espionage, trespass, fraud, or damage to another computer. The Identity Theft and Assumption Deterrence Act of 1998 bars the use of false identification to commit fraud or other crimes. 7

One California Statute That Fights Cybercrime The California Anti-Phishing Act of 2005 makes it a state crime for any person, by means of a Web page, electronic mail message, or otherwise through use of the Internet, to solicit, request, or take any action to induce another person to provide identifying information by representing itself to be a business without the authority or approval of that business. Challenges in the Prosecution of Online Crime Include 1. Establishing jurisdiction, especially when perpetrated from an offshore server. 2. Obtaining physical evidence. 3. Obtaining the identity of the perpetrator. More Definitions Business Tort: The wrongful interference with the business rights of others. Includes but is not limited to engaging in unfair competition, and interference with the economic relations of others. Cyber Tort: The occurrence of a tort online. 8

Examples of Cyber Torts Online industrial espionage for the purposes of obtaining the trade secrets of others, or engaging in other wrongful forms of competition. Cyber Defamation and Product Disparagement: Tampering with the product reviews of one s competitors products in order to spread lies about them. 9