Trespass to chattels

Last updated

Trespass to chattels is a tort whereby the infringing party has intentionally (or, in Australia, negligently) interfered with another person's lawful possession of a chattel (movable personal property). The interference can be any physical contact with the chattel in a quantifiable way, or any dispossession of the chattel (whether by taking it, destroying it, or barring the owner's access to it). As opposed to the greater wrong of conversion, trespass to chattels is argued to be actionable per se.

Contents

The origin of the concept comes from the original writ of trespass de bonis asportatis. As in most other forms of trespass, remedy can only be obtained once it is proven that there was direct interference regardless of damage being done, and the infringing party has failed to disprove either negligence or intent.

In some common-law countries, such as the United States and Canada, a remedy for trespass to chattels can only be obtained if the direct interference was sufficiently substantial to amount to dispossession, or alternatively where there had been an injury proximately related to the chattel. (See Restatement (Second) of Torts, 1965.)

United States law

The Restatement of Torts, Second § 217 defines trespass to chattels as "intentionally… dispossessing another of the chattel, or using or intermeddling with a chattel in the possession of another." Harm to personal property or diminution of its quality, condition or value as a result of a defendant's use can also result in liability under § 218(b) of the Restatement.

Certain specific circumstances may lend themselves to liability for the action. The Restatement (Second) of Torts § 218 states further that:

One who commits a trespass to a chattel is subject to liability to the possessor of the chattel if, but only if,

  1. he dispossesses the other of the chattel, or
  2. the chattel is impaired as to its condition, quality, or value, or
  3. the possessor is deprived of the use of the chattel for a substantial time, or
  4. bodily harm is caused to the possessor, or harm is caused to some person or thing in which the possessor has a legally protected interest.

The trespass to chattels cause of action, frequently asserted in recent years against Internet advertisers and email spammers, is often included in complaints against spyware companies. These electronic messaging cases, and their progeny, which have cropped up over the last decade, will typically turn on the situations described in (b) or (d), and, as detailed below, the question of harm caused is a big issue.

In sum, the basic elements of a claim of trespass to chattels are: 1) the lack of the plaintiff's consent to the trespass, 2) interference or intermeddling with possessory interest, and 3) the intentionality of the defendant's actions. Actual damage is not necessarily a required element of a trespass to chattels claim. [1] [2]

Features of the claim

Lack of consent
A vendor can attempt to dispute a trespass claim on the grounds that the user consented to the terms of the contract. Even if consent was given for certain access, a user may still have a valid trespass to chattels complaint if the vendor has exceeded the contractual terms, if the contract is found to misrepresent the actual functioning of the product, or if the consent has been withdrawn. A vendor can be held liable for "any use exceeding the consent" given.
Actual harm
The precise criteria for ascertaining actual harm varies among states. In California, for instance, an electronic message can be deemed a trespass where the message interferes with the target computer's operation, as long as a plaintiff can demonstrate either actual hardware damage or actual impaired functioning. But the general concept of requiring impaired computer functioning has been adopted consistently and in showing impaired computer functioning, courts have usually emphasized system unavailability.
Intent
In clarifying the meaning of intent in the context of a trespass to chattels claim, The Second Restatement of Torts states that "intention is present when an act is done for the purpose of using or otherwise intermeddling with a chattel or with knowledge that such an intermeddling will, to a substantial certainty, result from the act," and that, furthermore, "[i]t is not necessary that the actor should know or have reason to know that such intermeddling is a violation of the possessory rights of another."

Damages from a trespass claim are limited to the actual harm sustained by the plaintiff (which can include economic loss consequent on the trespass - e.g. loss of profit on a damaged chattel). In cases of dispossession, the plaintiff is always entitled to damages if they can prove the dispossession occurred, even if no quantifiable harm can be proven.

A related tort is conversion, which involves an exercise of control over another's chattel justifying restitution of the chattel's full value. Some actions constitute trespass and conversion; in these cases, a plaintiff must choose which claim to make based on what amount of damages they seek to recover.

In the electronic age

The common law tort of trespass to chattels has been invoked in the modern context of electronic communications to combat the proliferation of unsolicited bulk email, commonly known as spam. [2] In addition, several companies have successfully used the tort to block certain people, usually competitors, from accessing their servers. Though courts initially endorsed a broad application of this legal theory in the electronic context, more recently other jurists have narrowed its scope. As trespass to chattels is extended further to computer networks, some fear that plaintiffs are using this cause of action to quash fair competition and to deter the exercise of free speech; consequently, critics call for the limitation of the tort to instances where the plaintiff can demonstrate actual damages.

Rules

The trespass to chattels tort punishes anyone who substantially interferes with the use of another's personal property, or chattels. Plaintiffs must show that the offender had intentional physical contact with the chattel and that the contact caused some substantial interference or damage. The courts that imported this common law doctrine into the digital world reasoned that electrical signals traveling across networks and through proprietary servers may constitute the contact necessary to support a trespass claim. Applying this common law action to computer networks, plaintiffs must first prove that they received some type of electronic communication (typically bulk e-mail or spam) that the defendant intentionally sent to interfere with the plaintiff's interest in his or her property and second that this communication caused a quantifiable harm to their tangible property, such as impaired functioning of the computer, network or server. [3]

Early applications of trespass to chattels to computer networks

In the late 1990s, when the World Wide Web was in its infancy, courts were more receptive to extending the trespass to chattels tort to the electronic context. In CompuServe Inc. v. Cyber Promotions, Inc. , a 1997 case that was the first to extend the trespass theory to computer networks, a federal district court held that a marketing company's mass mailing of a high volume of unsolicited advertisement emails to CompuServe subscribers constituted an actionable trespass to chattels. [4] CompuServe customers repeatedly received unwanted advertisements from Cyber Promotions, a company that specialized in sending marketing email in bulk. Cyber Promotions also modified its equipment and falsified other information to circumvent CompuServe's anti-spam measures. Due to the high volume of email, CompuServe claimed damage to its servers as well as money lost dealing with customer complaints and dissatisfaction. CompuServe also extended its damages claim to its subscribers who spent time deleting unwanted email. The court held that Cyber Promotions's intentional use of CompuServe's proprietary server was an actionable trespass to chattels and granted a preliminary injunction enjoining the spammer from sending unsolicited advertisements to any email address maintained by CompuServe. Cyber Promotions' persistence in sending email to CompuServe's servers after receiving notification that CompuServe no longer consented to the use weighed heavily in favor of a finding of trespass.

A trio of 1998 cases in the Eastern District of Virginia involving America Online more firmly established the use of the trespass to chattels tort as a spam-fighting tool. In America Online, Inc. v. IMS , the court held that the owner of a marketing company committed trespass to chattels against an Internet service provider's (ISP) computer network by sending 60 million unauthorized email advertisements to the ISP's subscribers after being notified that the spam was unauthorized. [5] The court found that the defendant, intentionally and without authorization, caused contact with the plaintiff's computer network by sending the bulk email messages. Such contact injured the plaintiff's business goodwill and diminished the functioning of its computer network.

Similarly, in America Online, Inc. v. LCGM, Inc., a company engaging in pornographic website advertising sent a deluge of spam to AOL's customers, and, in so doing, also forged the AOL domain name in an effort to trick customers into opening the emails. [6] The court once again held that a website operators' transmission of unsolicited bulk emails to customers of an ISP, using the provider's computers and computer network, constituted trespass to chattels.

In America Online, Inc. v. Prime Data Systems, Inc., the defendants sent millions of spam emails to AOL subscribers advertising computer software programs designed to facilitate bulk emailing by allowing users to harvest email addresses from the plaintiff's member directories, chat rooms, and electronic bulletin boards. [7] The defendants also used technology designed to avoid AOL's spam filtering mechanisms. The defendants frequently used false and deceptive "headers" in email messages to make it appear as if AOL had sent the messages. The increased demand on AOL's servers resulting from the spam caused substantial delays of up to 24 hours in the delivery of all email to AOL members, forcing AOL to temporarily stop accepting any new messages. As the spam problem grew worse, AOL had to purchase millions of dollars worth of additional equipment to increase the capacity of its servers to handle the volume of email. The court held that this activity constituted a trespass to chattels and awarded injunctive relief, reasonable attorneys' fees and costs, as well as damages.

Beyond spam: screen scraping and data harvesting

Since the early spam cases, courts have extended the electronic trespass to chattels theory even further to encompass screen-scraping and other data "harvesting." Screen-scraping is the practice of taking information from another website, generally through the use of search agent software, and "harvesting" the data for one's own commercial use. For example, travel websites frequently use this tactic to offer a host of options and prices gleaned from various airlines' sites. Because the courts have entertained such litigation, some companies have specifically banned the conduct in their terms and conditions statements. [8]

In eBay v. Bidder's Edge (2000), eBay successfully used the trespass to chattels tort to prevent Bidder's Edge from employing spiders to cull information about its auctions to display on its own website. [3] Although Bidder's Edge's robots only consumed a small percentage of eBay's computer resources, the court noted that the plaintiff need not demonstrate current substantial interference as conduct which constituted a use of another's property is enough to sustain a trespass to chattels claim. In light of this, the court found that eBay had demonstrated a sufficient likelihood of future injury to warrant granting a permanent injunction: "If the court were to hold otherwise, it would likely encourage other auction aggregators to crawl the eBay site, potentially to the point of denying effective access to eBay's customers." [3]

Register.com, Inc. v. Verio, Inc. (2000) is a further example of this temporary trend in which plaintiffs did not have to demonstrate any real interference. [9] Register.com, a domain name registry service, sued competitor Verio for using Register.com's proprietary WHOIS look-up service to find potential leads among its customer base. The court found that, by continuing to access Register.com's online customer database after being told to stop, Verio was trespassing on Register.com's WHOIS server. Register.com had specifically withdrawn its consent to Verio's use of search robots to review Register.com's customer list. The court held that Verio caused harm to Register.com's files through the use of these search robots and that the searches improperly taxed Register.com's server capacity.

These holdings gave the court license to expand the applicability of trespass to chattels to computer networks even further. In Oyster Software v. Forms Processing (2001), the Northern District of California determined that a plaintiff need not demonstrate any physical interference with a server at all to sustain a trespass to chattels claim and consequently denied the defendant's motion for summary judgment, even though there was no evidence of damage to the plaintiff's computer system. [10] Although Oyster conceded that there was no evidence that the defendant's activities had interfered in any way with the functioning of Oyster's computer system, the court nonetheless denied FPI's motion for summary judgment. According to the court, following the decision in eBay, plaintiffs only need to demonstrate that the defendant's actions "amounted to a 'use' of Plaintiff's computer," and the court determined that copying the metatags amounted to a use. [10]

These cases indicate that, at least in California, a plaintiff did not have to demonstrate any kind of actual interference with the computer system to successfully claim trespass to chattels.

The backlash against the tort's expansion

However, some courts subsequently limited tort claims for electronic trespasses, in that a complaining party may be unable to recover for lack of real harm if the party did not suffer any tangible damage to their property.

The Supreme Court of California reversed the trend exemplified by Oyster in the seminal case Intel Corp. v. Hamidi (2003), reaffirming the need for a demonstration either of actual interference with the physical functionality of the computer system or of the likelihood that this would happen in the future. [11] Although Intel conceded that Hamidi's emails caused neither physical damage nor any disruption to their computer system, they alleged that the economic productivity lost due to the disruption caused by the emails could sustain a trespass claim. The Supreme Court of California disagreed, holding that the tort does not extend to claims in which the electronic communication involved "neither damages the recipient computer system nor impairs its function." [11] In reaching this conclusion, the court criticized the understanding of eBay advanced in Oyster, explaining that previous cases in which courts have found trespass to chattels in the electronic setting have involved either "actual or threatened interference with the computers' function." [11] To that effect, the court in Oyster misconstrued the holding in eBay; trespass requires more than use a use--it requires an actual or threatened interference with the physical functionality of the system.

Although the vast majority of states have yet to determine the applicability of the trespass to chattels theory, the courts that have addressed the issue have applied Intel and required that the plaintiff demonstrate damage to the computer system. A supreme court in New York in School of Visual Arts v. Kuprewicz denied the defendant's motion to dismiss for failure to state a claim on the trespass to chattels claim because the plaintiff had alleged actual damage to the functionality of the computer system, which Intel requires; the defendant had sent enough e-mails that it reduced the computer system's functionality and drained the hard drive's memory. [12] The Fourth Circuit in Omega World Travel, Inc. v. Mummagraphics, Inc. also followed Intel, although this resulted in granting a motion for summary judgment for the defendant because the plaintiff did not allege any actual damage on its computer system. [13] The court clarified that Oklahoma courts have yet to recognize the validity of a trespass to chattels claim based on an electronic intrusion to a computer system, but if it were to recognize it, the plaintiff would need to allege more than nominal damages, which in this case it had not.

Cautions on expanding the tort in the electronic context

Although a number of commentators have expressed enthusiasm over the increasing "propertization" of intellectual property (that is to say, the increased application of real property doctrines to intangible property) and the extension of the trespass to chattels doctrine to computer networks, [14] a number of detractors have expressed concern over the ramifications of extending the theory to protect electronic communications that do not actually damage the computer systems in question but only cause nominal damage due to their content. [15] [16] [17] [18] Primarily, these critics worry that extending trespass to chattels in this fashion would stifle free speech on the internet because any unwelcome email might constitute a trespass and may subject the sender not only to civil liability under the trespass theory but to criminal liability as well. [19] This would presumably reduce people's willingness to communicate freely on the Internet and curtail the Internet's ability to function as an open, democratic forum. [20] Particularly in situations where the electronic communication is an email that contains speech that is of importance to the public and the communications do not hamper the functionality of the recipient's computer system, First Amendment free speech protections ought to outweigh the property right in the unharmed computer system. [21] Similarly, critics have also expressed concerns that plaintiffs have employed the doctrine to stifle legitimate competition. [22] For example, the screen-scraping cases indicate that courts might interpret trespass to chattels in such a way that allows major corporations to prevent price comparison sites from employing harmless bots to aggregate information that users want in a readily accessible format since it might encourage consumers to look elsewhere. [23]

Critics of the theory's extension to computer networks also note greater theoretical problems with the applicability of a real property theory to intellectual property. In order to explain why real property theories might extend to the Internet, proponents equate "cyberspace" with real land, arguing that owners of computer servers should have the same right of inviolability as owners of land receive to promote greater efficiency in transactions. [24] However, even if some aspects of cyberspace resemble real space, detractors contend that cyberspace is not like real land at all because "the 'placeness' of cyberspace is a matter of ongoing social construction." [25] Furthermore, even if granting property rights might help to avoid problems of inefficiency and under-cultivation in the context of real property, critics note that nothing suggests that the same principles would also be effective in the context of computer networks—especially because the problem of under-cultivation does not tend to occur online. [26]

See also

Related Research Articles

Trespass is an area of tort law broadly divided into three groups: trespass to the person, trespass to chattels, and trespass to land.

This article addresses torts in United States law. As such, it covers primarily common law. Moreover, it provides general rules, as individual states all have separate civil codes. There are three general categories of torts: intentional torts, negligence, and strict liability torts.

In tort law, detinue is an action to recover for the wrongful taking of personal property. It is initiated by an individual who claims to have a greater right to their immediate possession than the current possessor. For an action in detinue to succeed, a claimant must first prove that he had better right to possession of the chattel than the defendant, and second, that the defendant refused to return the chattel once demanded by the claimant.

Trover is a form of lawsuit in common law jurisdictions for recovery of damages for wrongful taking of personal property. Trover belongs to a series of remedies for such wrongful taking, its distinctive feature being recovery only for the value of whatever was taken, not for the recovery of the property itself.

Tortious interference, also known as intentional interference with contractual relations, in the common law of torts, occurs when one person intentionally damages someone else's contractual or business relationships with a third party, causing economic harm. As an example, someone could use blackmail to induce a contractor into breaking a contract; they could threaten a supplier to prevent them from supplying goods or services to another party; or they could obstruct someone's ability to honor a contract with a client by deliberately refusing to deliver necessary goods.

Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scraping can be done manually by a software user, the term typically refers to automated processes implemented using a bot or web crawler. It is a form of copying in which specific data is gathered and copied from the web, typically into a central local database or spreadsheet, for later retrieval or analysis.

In tort common law, the defense of necessity gives the state or an individual a privilege to take or use the property of another. A defendant typically invokes the defense of necessity only against the intentional torts of trespass to chattels, trespass to land, or conversion. The Latin phrase from common law is necessitas inducit privilegium quod jura privata. A court will grant this privilege to a trespasser when the risk of harm to an individual or society is apparently and reasonably greater than the harm to the property. Unlike the privilege of self-defense, those who are harmed by individuals invoking the necessity privilege are usually free from any wrongdoing. Generally, an individual invoking this privilege is obligated to pay any actual damages caused in the use of the property but not punitive or nominal damages.

<span class="mw-page-title-main">Canadian tort law</span> Aspect of Canadian law

Canadian tort law is composed of two parallel systems: a common law framework outside Québec and a civil law framework within Québec. Outside Québec, Canadian tort law originally derives from that of England and Wales but has developed distinctly since Canadian Confederation in 1867 and has been influenced by jurisprudence in other common law jurisdictions. Meanwhile, while private law as a whole in Québec was originally derived from that which existed in France at the time of Québec's annexation into the British Empire, it was overhauled and codified first in the Civil Code of Lower Canada and later in the current Civil Code of Quebec, which codifies most elements of tort law as part of its provisions on the broader law of obligations. As most aspects of tort law in Canada are the subject of provincial jurisdiction under the Canadian Constitution, tort law varies even between the country's common law provinces and territories.

<i>Letang v Cooper</i>

Letang v Cooper[1964] EWCA Civ 5 is an English Court of Appeal judgment, by which it was decided that negligently caused personal injury cannot be recovered under the trespass to the person, but the tort of negligence must be tried instead.

The following outline is provided as an overview of and introduction to tort law in common law jurisdictions:

Intel Corp. v. Hamidi, 30 Cal. 4th 1342 (2003), is a decision of the California Supreme Court, authored by Associate Justice Kathryn Werdegar. In Hamidi the California Supreme Court held that a former Intel Corporation employee's e-mails to current Intel employees, despite requests by Intel to stop sending messages, did not constitute trespass of Intel's e-mail system.

Conversion is an intentional tort consisting of "taking with the intent of exercising over the chattel an ownership inconsistent with the real owner's right of possession". In England and Wales, it is a tort of strict liability. Its equivalents in criminal law include larceny or theft and criminal conversion. In those jurisdictions that recognise it, criminal conversion is a lesser crime than theft/larceny.

<i>Register.com v. Verio</i> American legal case

Register.com v. Verio, 356 F.3d 393, was a decision of the United States Court of Appeals for the Second Circuit that addressed several issues relevant to Internet law, such as browse wrap licensing, trespass to servers, and enforcement of the policies of the Internet Corporation for Assigned Names and Numbers (ICANN). The decision upheld the ruling of a lower court which prevented a provider of web development services from automatically harvesting publicly available registration data from a domain name registrar's servers for advertising purposes.

In online advertising, contact scraping is the practice of obtaining access to a customer's e-mail account in order to retrieve contact information that is then used for marketing purposes.

<i>EBay v. Bidders Edge</i> Leading case

eBay v. Bidder's Edge, 100 F. Supp. 2d 1058, was a leading case applying the trespass to chattels doctrine to online activities. In 2000, eBay, an online auction company, successfully used the 'trespass to chattels' theory to obtain a preliminary injunction preventing Bidder's Edge, an auction data aggregator, from using a 'crawler' to gather data from eBay's website. The opinion was a leading case applying 'trespass to chattels' to online activities, although its analysis has been criticized in more recent jurisprudence.

<i>CompuServe Inc. v. Cyber Promotions, Inc.</i>

CompuServe Inc. v. Cyber Promotions, Inc. was a ruling by the United States District Court for the Southern District of Ohio in 1997 that set an early precedent for granting online service providers the right to prevent commercial enterprises from sending unsolicited email advertising – also known as spam – to its subscribers. It was one of the first cases to apply United States tort law to restrict spamming on computer networks. The court held that Cyber Promotions' intentional use of CompuServe's proprietary servers to send unsolicited email was an actionable trespass to chattels and granted a preliminary injunction preventing the spammer from sending unsolicited advertisements to any email address maintained by CompuServe.

<i>Gordon v. Virtumundo, Inc.</i>

Gordon v. Virtumundo, Inc., 575 F.3d 1040, is a 2009 court opinion in which the United States Court of Appeals for the Ninth Circuit addressed the standing requirements necessary for private plaintiffs to bring suit under the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003, or CAN-SPAM Act of 2003, 15 U.S.C. ch. 103, as well as the scope of the CAN-SPAM Act's federal preemption. Prior to this case, the CAN-SPAM Act's standing requirements had not been addressed at the Court of Appeals level, and only the Fourth Circuit had addressed the CAN-SPAM Act's preemptive scope.

<i>School of Visual Arts v. Kuprewicz</i>

School of Visual Arts v. Diane Kuprewicz, 771 N.Y.S.2d 804 (2003), is a New York Supreme Court case in which it was held that sending and/or directing "large volumes of unsolicited job applications and pornographic e-mails" by defendant to plaintiff if it depletes hard disk space, drains processing power, and negatively impacts other system resources of the plaintiff is sufficient to establish "a cause of action for trespass to chattels." The ruling has been followed and cited in a number of cases in different jurisdictions.

<i>America Online, Inc. v. IMS</i> 1998 U.S. District Court case

America Online, Inc. v. IMS, 24 F. Supp. 2d 548 was one of a series of legal battles America Online launched against junk e-mail. In this case, the court held that defendants' unauthorized mailing of unsolicited bulk e-mail constituted a trespass to chattels under Virginia state law.

<i>Omega World Travel, Inc. v. Mummagraphics, Inc.</i>

Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348, is a case in the United States Court of Appeals for the Fourth Circuit in which Mummagraphics, Inc. is sued by Omega World Travel, Inc. (Omega) and Cruise.com after Mummagraphic alleged that they received 11 commercial e-mail messages in violation of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 as well as Oklahoma state law. In the initial filing, the United States District Court for the Eastern District of Virginia had awarded summary judgment to Omega on all of Mummagraphics' claims finding that the commercial emails from Omega did not violate the CAN-SPAM Act, and that the CAN-SPAM Act preempted Oklahoma state law. The Court of Appeals affirmed.

References

  1. See, e.g., Hawkins v. Hawkins, 101 N.C. App. 529, 532, 400 S.E.2d 472, 475 (1999).
  2. 1 2 Marjorie A. Shields, Applicability of Common-Law Trespass Actions to Electronic Communications, 107 A.L.R.5th 549.
  3. 1 2 3 eBay v. Bidder's Edge, 100 F.Supp.2d 1058 (N.D. Cal. 2000).
  4. CompuServe Inc. v. Cyber Promotions, Inc., 962 F.Supp. 1015 (S.D.Ohio 1997).
  5. America Online, Inc. v. IMS, 24 F. Supp. 2d 548 (E.D. Va. 1998).
  6. America Online, Inc. v. LCGM, Inc., 46 F.Supp.2d 444 (E.D. Va. 1998).
  7. America Online, Inc. v. Prime Data Systems, Inc., 1998 WL 34016692 (E.D. Va. 1998).
  8. See, e.g. Wawa's website terms and conditions, which forbids users to employ screen scraping programs.
  9. Register.com, Inc. v. Verio, Inc. , 126 F. Supp. 2d 238 (S.D.N.Y. 2000).
  10. 1 2 Oyster Software v. Forms Processing, 2001 WL 1736382 (N.D.Cal. 2001).
  11. 1 2 3 Intel v. Hamidi, 30 Cal.4th 1342 (Cal. 2003).
  12. School of Visual Arts v. Kuprewicz, 771 N.Y.S.2d 804 (N.Y. Sup. 2003).
  13. Omega World Travel v. Mummagraphics, Inc., 469 F.3d 348 (4th. Cir. 2006).
  14. See, e.g., David M. Fritch, "Click Here For Lawsuit – Trespass to Chattels in Cyberspace," 9 J. Tech. L. & Pol'y 31 (June 2004).
  15. Electronic Frontier Foundation, Amicus Brief in Intel v. Hamidi (Jan. 18 2000).
  16. Laura Quilter, The Continuing Expansion of Cyberspace Trespass to Chattels , 17 Berkeley Tech. L.J. 421 (2002).
  17. Shyamkrishna Balganesh, "Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass," 12 Mich. Telecomm. & Tech. L. Rev. 265 (Spring 2006).
  18. Greg Lastowka, "Decoding Cyberproperty," 40 Ind. L. Rev. 23 (2007).
  19. EFF Amicus Brief in Intel v. Hamidi at 6.
  20. Id.
  21. Id. at 28-29.
  22. EFF, EFF Analysis of Trespass to Chattels Legal Theory Archived 2008-12-01 at the Wayback Machine .
  23. Law Professors' Amicus Brief in eBay v. Bidder's Edge at 14.
  24. Lastowka, "Decoding Cyberproperty" at 46
  25. Id. at 45.
  26. Id. at 55.