Digital Abuse
JURI 5589 · Spring 2023
Wed 8:30–10:20 am · Cheeley Room
Office Hours: Wed 10:30–11:30 am
Digital abuse is on the rise. People are increasingly using networked technologies to engage in harassment, stalking, privacy invasions, and surveillance. The law will often adapt to deal with harmful technologies, but is it adapting quickly enough? Is law even the right tool to confront digital abuse? If it is, which laws work best and who should enforce them?
One of the pressing challenges of our time is deciding whether and how to regulate digital abuse. This seminar will consider responses to various harms enabled by networked technologies, exploring issues related to civil rights, consumer protection, cybercrime, free speech, privacy, and private self-governance. As we cover these topics, we’ll confront issues related to gender, race, class, sexuality, and intersectionality, all of which are crucial to understanding how our society shapes and is shaped by technology.
___________________
Your legal education should be as affordable as possible, so I’ve posted all materials for free below and assigned no casebook. For written materials, please review the entire piece unless I parenthetically note a specific page range. I’ve also listed some supplementary materials. They’re truly optional, but they provide some perspective or background that I find interesting or helpful, and I hope they might also be useful if you’re looking for inspiration or guidance when working on your assignments. Finally, I can highly recommend EndTAB’s newsletter and blog and Without My Consent’s 50 State Project as supplementary resources throughout this seminar — they’re truly invaluable resources for victims of digital abuse and people working in this area.
Given that this course focuses extensively on many forms of abuse and violence, it feels redundant and unwieldy to provide individual content warnings for each one of our assigned materials. Instead, please be aware that all of these materials might disturb at least some of you and that, more generally, this seminar will constantly challenge us to confront painful topics in ways that I can’t always predict in advance. Of particular note, some materials include graphic descriptions of intimate-partner violence and gender-based abuse, and I want you to be in the right headspace when engaging with them. I’d encourage you to take breaks and walks during and after your class prep, and some of you might also wish to take advantage of UGA’s Health & Wellness resources occasionally throughout the semester. Please take care of yourselves.
1. Digital Abuse
January 11
In this introductory session, let’s think critically about how we might conceptualize digital abuse. Is it principally a legal concept? A sociological one? Should we even use an umbrella term to capture such diverse forms of conduct? Consider, in particular, which common features might justify such collective treatment. Pay close attention to who generally perpetrates digital abuse, who enables it, who benefits from it, and who suffers from it. Given these dynamics, what might it mean to think of digital abuse in terms of “cyber civil rights” or as “violence” or “gender-based” harm? Are these helpful constructs that enhance our understanding? Do they risk alienating people, limiting our responses, or misdirecting our attention? Finally, consider how we might expand our conception of “regulation” beyond law to include extralegal interventions that influence and constrain behavior. With this broadened lens, how and when might law complement, supplant, or obstruct regulation by other means?
John Oliver, Online Harassment: Last Week Tonight with John Oliver, HBO (2015)
Karen Levy, No Safe Haven for Victims of Digital Abuse, Slate (2018)
Nellie Bowles, Thermostats, Locks and Lights: Digital Tools of Domestic Abuse, New York Times (2018)
Danielle Keats Citron & Mary Anne Franks, Cyber Civil Rights in the Time of COVID-19, Harvard Law Review Online (2020)
Karen Levy & Bruce Schneier, Privacy Threats in Intimate Relationships, Journal of Cybersecurity (2020) (1–7)
Suzie Dunn, Is It Actually Violence? Framing Technology-Facilitated Abuse as Violence, The Emerald International Handbook of Technology-Facilitated Violence and Abuse (2021)
Rachel Louise Snyder, The Term ‘Domestic Violence’ Is a Failure, Atlantic (2019)
Lawrence Lessig, Code 2.0 (2006) (121–27)
Supplemental
Danielle Keats Citron, Defining Online Harassment, Forbes (2014)
Robin West, Cyber-Sexual Harassment, JOTWELL (2015)
Michele Ybarra, Myeshia Price-Feeney, Amanda Lenhart & Kathryn Zickuhr, Intimate Partner Digital Abuse, Data & Society (2017)
Amanda Lenhart, Michele Ybarra, Kathryn Zickuhr & Myeshia Price-Feeney, Online Harassment, Digital Abuse, and Cyberstalking in America, Data & Society (2017)
Adam Dodge, The Decline of Digital Health — 10 Sobering Statistics About Online Abuse, Medium (2020)
Marthe Goudsmit, Thread on Image-Based Sexual Abuse, Twitter (2020)
Helen Nissenbaum, How Computer Systems Embody Values, Computer (2001)
2. Civil Law
January 18
Some victims of digital abuse will seek restraining orders under family law to make everything “just stop” and trigger further sanctions. Other victims might sue their abusers under tort or copyright law, seeking compensation, injunctions, or recognition of the harm they suffered. But when should civil liability kick in, and how effective will these strategies be in reality? Are civil claims likely to vindicate victims’ social standing, compensate their losses, or deter future abuse? Are existing laws up to the task or should legislatures fashion new causes of action? And has the time come to sacrifice the internet’s sacred cow—Section 230 of the Communications Decency Act—and amend or abolish the immunity it offers to tech companies whose services are used to perpetrate abuse?
Guest: Michelle Gonzalez, Cyber Civil Rights Initiative
Danielle Keats Citron, Sexual Privacy, Yale Law Journal (2019) (1944–53)
Norman v. Doby (Ga. Ct. App. 2013) (ignore Parts 2 & 3)
California Family Code § 6320
Mariel Padilla, Student Wins $725,000 in Lawsuit Over ‘Troll Storm’ Led by The Daily Stormer, New York Times (2019)
Dumpson v. Ade (D.D.C. 2019) (skim Memorandum Opinion & Restorative Justice Settlement)
Brittan Heller, Of Legal Rights and Moral Wrongs: A Case Study of Internet Defamation, Yale Journal of Law & Feminism (2007)
Sue Halpern, How Joe Biden Could Help Internet Companies Moderate Harmful Content, New Yorker (2020)
Amanda Levendowski, Our Best Weapon Against Revenge Porn: Copyright Law?, Atlantic (2014)
Doe v. Elam (Complaint), (C.D. Cal. 2014) (skim)
Supplemental
Ben, Would You Sign an NDA Before Sexting? E-Gree Hopes So, SexTechGuide (2020)
Adam Dodge & Erica Johnstone, Using Fake Video to Perpetrate Intimate Partner Abuse, California Partnership to End Domestic Violence (2018)
Ruthven Darlene, Confronting Domestic Violence, Los Altos Town Crier (2020) (Parts 1, 2, 3, 4, 5 & 7)
Scott Hershovitz, Taylor Swift, Philosopher of Forgiveness, New York Times (2019)
Uniform Civil Remedies for Unauthorized Disclosure of Intimate Images Act (2018)
Matthew F. Ferraro & Louis W. Tompros, New York’s Right to Publicity and Deepfakes Law Breaks New Ground, WilmerHale (2020)
Christine Hauser, $6.4 Million Judgment in Revenge Porn Case Is Among Largest Ever, New York Times (2018)
3. Criminal Law
January 25
If digital abuse is as harmful as research reveals, we might think that criminal law should play a role in addressing it. Criminal punishment has long been how societies have expressed condemnation of serious wrongs, while also purporting to offer greater deterrence and prevention of antisocial behavior. The rise of digital abuse has seen prosecutors harness longstanding criminal laws to punish perpetrators, but it has also spurred proposals to expand federal and state criminal codes to reach abuse that currently falls beyond the law’s reach. As you analyze our materials, query whether criminalization is the best way to tackle tech-enabled harms that are often belittled. Even if criminal penalties might do some good, consider how might these efforts conflict with decarceration and abolition movements that have grown in public consciousness in recent years.
Guest: Tracy DeTomasi, Callisto
United States v. Alkhabaz (6th Cir. 1997)
Nina Totenberg, Is a Threat Posted on Facebook Really a Threat?, NPR (2014)
People v. Barber (N.Y. Crim. Ct. 2014)
Georgia Code § 16-11-90
Amanda Hess, A Former FBI Agent on Why It’s So Hard to Prosecute Gamergate Trolls, Slate (2014)
Aya Gruber, The Troubling Alliance Between Feminism and Policing, California Law Review Online (2020)
Sarah Jeong, Revenge Porn Is Bad. Criminalizing It Is Worse, Wired (2013)
Jessica Ladd, The Reporting System that Sexual Assault Survivors Want, TED (2016)
Callisto (browse)
Supplemental
Swatting Could Become a Federal Crime, The Economist (2019)
SHIELD Act (2019)
Georgia Appeals Court Says “Upskirting” Is Legal, CBS News (2016)
Soraya Chemaly & Mary Anne Franks, Supreme Court May Have Made Online Abuse Easier, Time (2015)
Eugene Volokh, Utah ‘Anti-Doxxing’ Bill Would Outlaw Mentioning a Person’s Name Online ‘With Intent to Offend,’ Washington Post (2016)
4. Antidiscrimination Law
February 1
Ample evidence shows that women, racial minorities, and sexual minorities face disproportionately high levels of online mistreatment. Antidiscrimination law has long sought to protect civil rights in the real world, but what can it do in cyberspace? Should we accept the premise of that question—that cyberspace is a sociologically and legally distinct “place”—and craft new legal regimes for online life? Or should we reject the distinction and simply apply our rules for school and workplace harassment to tech-facilitated abuse? Switching from theory to practice, ponder how these debates apply to the Trump administration’s amended Title IX regulations and assess whether the Biden administration should take a different approach.
Guest: Kristopher Stevens, UGA Equal Opportunity Office
Amanda Hess, Why Women Aren’t Welcome on the Internet, Pacific Standard (2014)
Mary Anne Franks, The Banality of Cyber Discrimination, or, the Eternal Recurrence of September, Denver Law Review Online (2010)
Helen Norton, Regulating Cyberharassment: Some Thoughts on Sexual Harassment 2.0, Denver Law Review Online (2010)
Feminist Majority Foundation v. University of Mary Washington (4th Cir. 2018) (skim)
Jeannie Suk Gersen, How Concerning Are the Trump Administration’s New Title IX Regulations?, New Yorker (2020)
Tovia Smith, Biden Begins Process To Undo Trump Administration's Title IX Rules, NPR (2021)
Ronald K.L. Collins, The Liberal Divide and the Future of Free-Speech Law, Boston University Law Review Annex (2015)
Supplemental
Danielle Keats Citron, Reputation Economies in Cyberspace (2008)
50 State Project, Without My Consent (Federal: Title VII & Title IX)
Helen Norton Cyberharassment and Workplace Law, Boston University Law Review Annex (2015)
Ari Ezra Waldman, Amplifying Abuse: The Fusion of Cyberharassment and Discrimination, Boston University Law Review Annex (2015)
Carrie N. Baker, These Young Feminists Took on Abusive Trolls on Their Campus—and Won, Ms. (2019)
Anna North, New Trump Administration Rules on Sexual Assault Could Keep Survivors Silent, Vox (2019)
Alyssa Leader, Thread on Title IX, Twitter (2020)
Department of Education, Nondiscrimination on the Basis of Sex in Education Programs or Activities Receiving Federal Financial Assistance (2020) (643–45, 649–51)
Thomas Kadri, Thread on Title IX, Twitter (2020)
Kimberlé Crenshaw, The Urgency of Intersectionality, TED (2016)
5. Consumer Law
February 8
While civil claims and criminal prosecutions are common responses to wrongs, state and federal authorities have other means of enforcing the law. With broad statutory immunities limiting the claims that individuals may bring, administrative agencies and state attorneys general have occasionally intervened to tackle egregious forms of digital abuse. Sometimes they do so under the guise of protecting consumers from deceptive and unfair business practices; other times they use telecommunications law to counter harmful uses of otherwise-valuable technologies. Are we using these branches of law enough? Are they fit for this purpose? Think creatively about how existing regulations designed for phones and photos might adapt to curb abuses in the digital age.
Guest: Lindsey Song, Sanctuary for Families
In the Matter of Craig Brittain (Complaint) (Fed. Trade Comm’n 2015)
Danielle Keats Citron & Woodrow Hartzog, The Decision that Could Finally Kill the Revenge Porn Business, Atlantic (2015)
New York Attorney General, Attorney General James Announces Settlement with Dating App for Failure to Secure Private and Nude Photos (2019)
Federal Communications Commission, FCC to Fine Two Individuals $25,000 Each for Falsifying Caller ID Information with the Intent to Harm (2016)
Louise Matsakis, A Hidden Risk for Domestic Violence Victims: Family Phone Plans, Wired (2020)
Ashley Gold & Margaret Harding McGill, Wireless Lobby Tangles Future of Domestic Violence Bill, Axios (2022)
Supplemental
Danielle Keats Citron, Spying Inc., Washington & Lee Law Review (2015) (1269–73)
Federal Trade Commission, Website Operator Banned from the ‘Revenge Porn’ Business After FTC Charges He Unfairly Posted Nude Photos (2015)
Nicki Dell, Karen Levy, Damon McCoy & Thomas Ristenpart, How Domestic Abusers Use Smartphones to Spy on Their Partners, Vox (2018)
Federal Trade Commission, FTC Brings First Case Against Developers of “Stalking” Apps (2019)
Andrew C. Glass, Gregory N. Blase & Roger L. Smerage, Legislative Efforts to Curb Caller ID Spoofing Continue at Federal and State Levels, TCPA Watch (2018)
Truth in Caller ID Act (2009)
Clinic to End Tech Abuse, Family Phone Plans and Domestic Violence (2020)
6. Procedural Law
February 15
In the wake of abuse, the reality is that few victims speak out and even fewer seek legal recourse. But when they do, procedural law can quickly become their friend or foe. Procedure matters. As Congressman John Dingell was fond of saying, “I’ll let you write the substance, you let me write the procedure, and I’ll screw you every time.” Court rules can either shield victims or leave them vulnerable to further harms. What should be done to combat so-called “paper abuse” or “procedural stalking”? How far can protections for victims extend before they unfairly impinge on the rights of the accused? Think critically about how new technological affordances enabling abuse might affect foundational legal concepts: evidentiary rules, burdens of proof, fair notice, and due process.
Guest: Dr. Gilat Juli Bachar, Temple University Beasley School of Law
Gilat Juli Bachar, A Duty to Disclose Social Injustice Torts (work in progress)
Jennifer J. Freyd, Violations of Power, Adaptive Blindness and Betrayal Trauma Theory, Feminism & Psychology (1997) (28–30)
Jessica Klein, How Domestic Abusers Weaponize the Courts, Atlantic (2019)
Tyler Kingkade, As More College Students Say “Me Too,” Accused Men Are Suing For Defamation, BuzzFeed (2017)
Schwern v. Plunkett (9th Cir. 2017) (3–10)
Supplemental
Susan L. Miller & Nicole L. Smolter, “Paper Abuse”: When All Else Fails, Batterers Use Procedural Stalking, Violence Against Women (2011)
Niki Lemeshka & Taylor Thompson Tabb, Georgia Domestic Violence Fatality Review Project (2017) (26)
Alyssa Leader, Stop SLAPP-ing Me: Unintended Consequences of Speaking up in the “Me Too” Era, First Amendment Law Review (2019)
Sheila Burke, New Tennessee Law Seeks to Stop ‘Stalking by Way of the Courts,’ Associated Press (2018)
Daniel Solove, Of Sex Tapes, Pseudonymous Litigation, and Judicial Bungling, Concurring Opinions (2005)
7. Technology
February 22
We’ll now pivot to extralegal regulation (though always beware of how law can enable or disable private ordering in this space). If technology is part of the problem, can it be part of the solution? When Lessig says that “code is law,” he reminds us that technological design can regulate our behavior in ways analogous to legal rules. But let’s dig deeper than this influential slogan. We tend to discuss technology in detached and abstract terms, losing sight of the role that people play in creating it and how they might constrain its misuse. And beyond the “who,” let’s assess the “how” and the “why.” Pay close attention to possible differences between how humans design carelessly or intentionally with respect to harms enabled by their creations. Consider also how technology can provide victims a lifeline, giving them tools to escape and recover from abuse.
Guest: Brenda Dvoskin, Harvard Law School
Brenda Dvoskin, Speaking Back to Sexual-Privacy Invasions, Washington Law Review (forthcoming 2023)
Julian Dibbell, A Rape in Cyberspace, The Village Voice (1993)
Julia Angwin & Hannes Grassegger, Facebook’s Secret Censorship Rules Protect White Men from Hate Speech But Not Black Children, ProPublica (2017)
Thomas Kadri, Networks of Empathy, Utah Law Review (2020) (1081–97)
Olivier Sylvain, Recovering Tech’s Humanity, Columbia Law Review Forum (2019) (252–55, 259–64)
Kevin Kantor, People You May Know, Button Poetry (2015)
Mary Anne Franks, The Many Ways Twitter Is Bad at Responding to Abuse, Atlantic (2014)
Andrea James, Blocking 8 Emoji Stopped 90% of My Unwanted Instagram Comments, Boing Boing (2021)
Andy Greenberg, The Simple Way Apple and Google Let Domestic Abusers Stalk Victims, Wired (2019)
Olivia Solon, Facebook Asks Users for Nude Photos in Project to Combat ‘Revenge Porn,’ Guardian (2017)
StopNCII (browse)
Supplemental
Rachel Wenitsky, Fight Me, Twitter (2020)
Ruha Benjamin & Paul Holdengräber, The Quarantine Tapes: Episode 129, Literary Hub (2020) (17:00–30:45)
Safiya Umoja Noble & Sarah T. Roberts, Build the New Counterculture, Future Says (2020)
Evan Selinger & Albert Fox Cahn, Cybersecurity Workers Need to Learn from Those They’re Trying to Protect, OneZero (2019)
Will Oremus, 5 Ideas to Make Silicon Valley Less Racist, OneZero (2020)
Lawrence Lessig, Code Is Law: On Liberty in Cyberspace, Harvard Magazine (2000)
Helen Nissenbaum, Values in the Design of Computer Systems, Computers & Society (1998)
Betsy Morris, Tech Companies Step Up Fight Against ‘Deepfakes,’ Wall Street Journal (2019)
Patrick Howell O’Neill, NYC Has Hired Hackers to Hit Back at Stalkerware, MIT Technology Review (2019)
Julie Jargon, Apple’s Anti-Sexting Tool for iOS Will Warn Kids About Nudes—but Won’t Notify Parents, Wall Street Journal (2021)
Emma Grey Ellis, Tech Is a Double-Edged Lifeline for Domestic Violence Victims, Wired (2020)
8. Markets
March 1
Markets constrain behavior in all sorts of ways, yet digital markets can present peculiar challenges. For one thing, many tech companies frame their services as “free.” For another, the tech industry routinely rebukes regulation as stifling innovation. And even if some industry insiders wish to rein in their employers, companies regularly claim that their responsibilities to shareholders stand in the way. Though there are kernels of truth in all three refrains, let’s interrogate them. How do existing laws buttress these assertions? How might governments tweak—or perhaps overhaul—the business models that sustain the status quo? And if lawmakers remain inert, what can shareholders, companies, employees, and the rest of us do to challenge the economic incentives enabling digital abuse?
Guest: Payton Iheme, Bumble
Neil Richards, Why Privacy Matters: An Introduction (2021)
Ann Bartow, Online Harassment, Profit Seeking, and Section 230, Boston University Law Review Annex (2015)
Kaveh Waddell, How FamilyTreeNow Makes Stalking Easy, Atlantic (2017)
Thomas Kadri, Brokered Abuse, Journal of Free Speech Law (forthcoming 2023)
Karen Levy, Intimate Surveillance, Iowa Law Review (2015) (687–93)
Tiffany Hsu & Eleanor Lutz, More Than 1,000 Companies Boycotted Facebook. Did It Work?, New York Times (2020)
Valeriya Safronova, The Fight to End ‘Cyberflashing,’ New York Times (2022)
Supplemental
Danielle Keats Citron, A New Compact for Sexual Privacy, William & Mary Law Review (2021) (45–57)
Catherine Buni & Soraya Chemaly, The Unsafety Net: How Social Media Turned Against Women, Atlantic (2014)
John Naughton, Outlaw the Business Model, Future Says (2020)
Anna Lauren Hoffmann, Terms of Inclusion: Data, Discourse, Violence, New Media & Society (2020)
Heidi Welsh & Michael Passoff, Proxy Preview: Helping Shareholders Vote Their Values (2019) (57–60)
Megan Rose Dickey & Taylor Hatmaker, Facebook Employees Stage Virtual Walkout in Protest of Company’s Stance on Trump Posts, TechCrunch (2020)
9. Norms
March 15
Efforts to tackle digital abuse through legal and technological regulation will inevitably fail if unsupported by complementary social norms. While law and technology can influence norms, we might expect too much from these regulatory tools if people generally misunderstand or trivialize abuse. But how can we shift customs and beliefs in enduring ways? Is it circular to rely on law’s “expressive” value to change people’s attitudes? Is there value to a law that’s rarely enforced? Assess the array of initiatives and organizations discussed in the materials, asking whether they’re likely to address the causes or the effects of digital abuse. Finally, consider some of the structural impediments to meaningful change in this area—sexism, racism, homophobia—and imagine how educators and activists might erode them.
Guest: Dr. Christina Proctor, University of Georgia College of Public Health
Thomas Kadri, Networks of Empathy, Utah Law Review (2020) (1097–1118)
Deborah Epstein & Lisa A. Goodman, Discounting Women: Doubting Domestic Violence Survivors’ Credibility and Dismissing Their Experiences, University of Pennsylvania Law Review (2019) (416–20, 447–53)
Danielle Keats Citron, Law’s Expressive Value in Combating Cyber Gender Harassment, Michigan Law Review (2009) (407–15)
Catharine A. MacKinnon, #MeToo Has Done What the Law Could Not, New York Times (2018)
Dr. Holly Jacobs, Being A Victim of Revenge Porn Forced Me To Change My Name, XO Jane (2013)
danah boyd, Dear Voyeur, Meet Flâneur . . . Sincerely, Social Media, Surveillance & Society (2011)
Mikki Kendall, Paths (2016) (skim only)
ThinkUKnow, Megan’s Story (2010)
Thorn, Stop Sextortion (2020)
Supplemental
John Perry Barlow, A Declaration of the Independence of Cyberspace, EFF (1996)
Amanda R. Witwer, Lynn Langton, Michael J.D. Vermeer, Duren Banks, Dulani Woods & Brian A. Jackson, Countering Technology-Facilitated Abuse, RAND Corporation (2020) (6–14)
Wildly Parenthetical, Sexting and Slut-Shaming, Hoyden About Town (2010)
Kath Albury & Kate Crawford, Sexting, Consent and Young People’s Ethics: Beyond Megan’s Story, Continuum: Journal Media & Cultural Studies (2012)
Anti-Defamation League; EndTAB; Cyber Civil Rights Initiative; TrollBusters; FemTechNet (browse)
10. Speed Pitching: Red Team
March 22
Students in the Red Team will pitch their op-ed ideas to the class.
Each of you will have 2 minutes to give your pitch followed by around 7 minutes of questions, comments, and discussion involving everyone else.
11. Speed Pitching: Black Team
March 29
Students in the Black Team will pitch their op-ed ideas to the class.
Each of you will have 2 minutes to give your pitch followed by around 7 minutes of questions, comments, and discussion involving everyone else.
12. One-on-Ones & Teamwork
April 5
Students in the Red Team will each have 10-minute one-on-one meetings with Professor Kadri to discuss their op-eds.
When you’re not meeting with Professor Kadri, you’ll work with your teammates on your presentations for our final session.
13. One-on-Ones & Teamwork
April 12
Students in the Black Team will each have 10-minute one-on-one meetings with Professor Kadri to discuss their op-eds.
When you’re not meeting with Professor Kadri, you’ll work with your teammates on your presentations for our final session.
14. Team Presentations
April 19
The Red and Black Teams will give their group presentations. Each presentation should last 20 minutes (with each person in your team speaking for roughly equal time), followed by 20 minutes of discussion (with each person in the other team offering at least one question or comment). Slides and handouts are optional.
For syllabus inspiration, I’d like to thank Danielle Citron, Mary Anne Franks, Karen Levy, Emily Prifogle, and Ethan Zuckerman, all of whose curricula helped me when shaping my own. I’m also immensely grateful to Amanda Levendowski for her feedback on pedagogy and course curation.