{"id":51,"date":"2010-02-08T12:05:20","date_gmt":"2010-02-08T16:05:20","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cyberlawclinic\/?p=51"},"modified":"2010-02-08T12:05:20","modified_gmt":"2010-02-08T16:05:20","slug":"cda-230-and-traditional-editorial-functions","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/2010\/02\/08\/cda-230-and-traditional-editorial-functions\/","title":{"rendered":"CDA 230 and &#8220;Traditional Editorial Functions&#8221;"},"content":{"rendered":"<p>One of our spring term Cyberlaw Clinic students contributed to <a href=\"http:\/\/www.citmedialaw.org\/blog\/2010\/just-say-no-sewer-section-230-no-obstacle-editing-comments\">a great post over at the Citizen Media Law Project&#8217;s blog last week<\/a>.\u00a0 The post relates to the scope of <a href=\"http:\/\/www.law.cornell.edu\/uscode\/47\/230.html\">Section 230 of the Communications Decency Act<\/a> and whether the protections afforded by CDA 230 apply to sites that undertake &#8220;traditional editorial functions&#8221; with respect to content supplied by users<\/p>\n<p>As noted in the post:<\/p>\n<blockquote><p>Today, it&#8217;s settled law that website operators are protected even if they change the content of users&#8217; postings. The leading case interpreting Section 230, <a title=\"http:\/\/www.citmedialaw.org\/sites\/citmedialaw.org\/files\/Zeran-4thCircuitOpinion.pdf\" href=\"http:\/\/www.citmedialaw.org\/sites\/citmedialaw.org\/files\/Zeran-4thCircuitOpinion.pdf\" target=\"_blank\">Zeran v. America Online, Inc.<\/a>, 129 F.3d 327, 330 (4th Cir. 1997), held that \u201clawsuits seeking to hold a service provider liable for its exercise of a publisher&#8217;s traditional editorial functions \u2014 such as <em>deciding whether to publish, withdraw, postpone or alter content<\/em> \u2014 are barred\u201d (emphasis added). Since <em>Zeran<\/em>, numerous courts have reaffirmed the principle. The Ninth Circuit, in <a title=\"http:\/\/www.citmedialaw.org\/threats\/batzel-v-smith\" href=\"http:\/\/www.citmedialaw.org\/threats\/batzel-v-smith\" target=\"_blank\">Batzel v. Smith<\/a>, 333 F.3d 1018 (9th Cir. 2003), held that \u201cminor alterations\u201d did not cost a website operator his immunity when posting another&#8217;s email message.<\/p>\n<p>In <a title=\"http:\/\/www.citmedialaw.org\/threats\/donato-v-moldow\" href=\"http:\/\/www.citmedialaw.org\/threats\/donato-v-moldow\" target=\"_blank\">Donato v. Moldow<\/a>, 865 A.2d 711 (N.J. Super. Ct. 2005), for instance, a New Jersey court found Section 230 immunity for a defendant who was alleged to have rewritten some users&#8217; posts. Federal courts in Pennsylvania (<a href=\"http:\/\/www.citmedialaw.org\/sites\/citmedialaw.org\/files\/2006-05-26-Memorandum_and_Order_Dismissing_Plaintiff%27s_Complaint%20%28E.D.%20Pa%29.pdf\" target=\"_blank\">Dimeo v. Max<\/a>, 433 F. Supp. 2d 523 (E.D. Pa. 2006)) and Louisiana (<em>Landry-Bell v. Various, Inc.<\/em>, 2005 WL 3640448 (W.D. La. 2005)) have agreed in <a href=\"http:\/\/en.wikipedia.org\/wiki\/Obiter_dictum\" target=\"_blank\">dicta<\/a>.<\/p>\n<p>Of course, Section 230&#8217;s broad grant of immunity does have its limits. Most critically, it won&#8217;t help you if you change a comment in a way that creates defamatory meaning that wasn&#8217;t there before.\u00a0 <em>Cf.<\/em> <a title=\"http:\/\/www.citmedialaw.org\/sites\/citmedialaw.org\/files\/2008-02-7-Friendfinder%20Order.pdf\" href=\"http:\/\/www.citmedialaw.org\/sites\/citmedialaw.org\/files\/2008-02-7-Friendfinder%20Order.pdf\" target=\"_blank\">Doe v. Friendfinder Network, Inc.<\/a>, 540 F. Supp.2d 288, 297\u00a0 (D.N.H. 2008) (Section 230 provides &#8220;no protection to a service provider for publisher tortious content created by the provider itself&#8221;); <em>Anthony v. Yahoo! Inc.<\/em>, 421 F. Supp.2d 1257, 1262-63 (N.D. Cal. 2006) (Yahoo! not immune under CDA for allegedly creating fake profiles on its own dating website).<\/p><\/blockquote>\n<p>The CMLP post responded to a recent post on <a href=\"http:\/\/www.wired.com\/epicenter\/2010\/02\/engadget-calls-a-timeout-for-commenters\/\" target=\"_blank\">Wired<\/a><a href=\"http:\/\/www.wired.com\/epicenter\/2010\/02\/engadget-calls-a-timeout-for-commenters\/\" target=\"_blank\">&#8216;s Epicenter blog<\/a>, which suggested that tech blog <a href=\"http:\/\/www.engadget.com\/\">Engadget<\/a> had no choice but to completely disable the comments function on its site in order to avoid liability for materials posted by commenters.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of our spring term Cyberlaw Clinic students contributed to a great post over at the Citizen Media Law Project&#8217;s blog last week.\u00a0 The post relates to the scope of Section 230 of the Communications Decency Act and whether the protections afforded by CDA 230 apply to sites that undertake &#8220;traditional editorial functions&#8221; with respect [&hellip;]<\/p>\n","protected":false},"author":2215,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5799,5064],"tags":[],"class_list":["post-51","post","type-post","status-publish","format-standard","hentry","category-cda-230","category-cmlp"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/posts\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/users\/2215"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":4,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"predecessor-version":[{"id":169,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/posts\/51\/revisions\/169"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberlawclinicold\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}