opinion

How FOSTA Intersects With CDA, DMCA

How FOSTA Intersects With CDA, DMCA

Laws in the U.S. known in short by the acronyms FOSTA, CDA and DMCA each relate to online content and services. The CDA and DMCA have been around since 1996 and 1998, respectively. The “new kid on the block,” or more accurately, the new bully on the block, is FOSTA, passed in 2018. The applications of these laws are different, yet interconnected, as they intersect in various possible scenarios with FOSTA showing no mercy.

Section 230 of the CDA, “Communications Decency Act,” has allowed the internet to flourish as a place of open communication by protecting website providers from certain liabilities for illegal activities of users on their sites. Section 230 says, in summary, that a provider of an “interactive computer service” is not to be treated as the publisher or speaker of information shared on the service by a third-party user. So, if a user of a site posts or transmits information that is furthering an illegal activity, the site provider is not liable for that, with some exceptions including copyright infringement.

Unlike the safe harbor provisions of the CDA and DMCA, the ‘black letter law’ of FOSTA is unforgiving, so website providers beware, even if you’re already compliant elsewhere.

The DMCA, “Digital Millennium Copyright Act,” fills in the gap for copyright infringement liability left by Section 230 of the CDA. The DMCA includes “safe harbor” provisions that if a website “service provider” follows, will basically clear the provider of liability for copyright infringement committed by third party users on the provider’s website. These provisions state, in short, that in response to a user complaint requesting a take-down of their copyrighted content (which was uploaded by a third party), if the website service provider removes the content in a timely manner, the website service provider will not be liable for the copyright infringement.

FOSTA, the “Allow States and Victims to Fight Online Sex Trafficking Act,” created a new gap, or more accurately, a gaping hole, in the protection afforded by Section 230 of the CDA. According to the new law, a provider of an “interactive computer service” that — with the intent to promote or facilitate the prostitution or sex trafficking of another person, or with reckless disregard to such on their site — can be subject to civil or criminal liability. Violations may result in the imposition of fines and jail time of up to 25 years. Unlike the DMCA, there is no safe harbor written into the law.

An “interactive computer service” for purposes of CDA and FOSTA, or “service provider” for purposes of DMCA, can be any website which allows the posting or transmission of user-generated content. Examples include clip sites, live cam sites, tube sites, dating sites, escort advertising services and web forums, as well as mainstream websites, such as social networking sites.

Previously, the CDA (specifically, Section 230) and the DMCA enabled communication on websites without requiring “Big Brother” censorship of users by website providers. The practical effect of FOSTA, though, is that providers of websites that allow users to post or communicate with one another now have to monitor and censor that content for possible prostitution and sex trafficking.

Let’s take a look at some hypothetical, yet certainly plausible, scenarios.

In a first hypothetical scenario, Website Provider 1 operates an escort advertising service. Person A grabs an image of a flower from an online search result, and superimposes text onto it saying, “BJs with me for $50, and sex for $100/hr. Call now: (XXX) XXX-XXXX.” Person B owns the copyright to the image. Person A posts the image to her feed on Website Provider 1’s site without Person B’s permission. Website Provider 1 has staff that manually monitors activity on the site only for obscenity, and allowed the image upload.

In this first scenario, there are at least two issues — potential copyright infringement and potential promotion of prostitution in violation of FOSTA. Person B is angry that his image has been stolen and files a DMCA notice (requesting take-down of the image) with Website Provider 1. Here, Website Provider 1 can escape liability for copyright infringement via the DMCA if it follows the proper procedures for removal. Such removal does not absolve Website Provider 1 of liability under FOSTA, however, since FOSTA does not include a safe harbor. It could be argued in court that, by manually allowing the posting of the image, Website Provider 1 intended to promote prostitution, and therefore, would be subject to penalties.

In a second hypothetical scenario, Website Provider 2 operates a clip site. Person C uploads a video to the site and writes in a comment below the video, “Hot girls like these for sale by the hour — great sex, discreet and inexpensive. Call now (XXX) XXX-XXXX.” Person D sees the video and realizes that it is actually her video, and that Person C pirated it. Website Provider 2 does not monitor activity on the site, except to address user complaints.

In this second scenario, there are at least two issues — potential copyright infringement and potential facilitation of sex trafficking in violation of FOSTA. Person D files a DMCA take-down request with Website Provider 2, and Website Provider 2removes the video according to DMCA guidelines. Accordingly, Website Provider 2 can be freed from liability for copyright infringement … but may still be liable for a violation of FOSTA for facilitating sex trafficking. In court, it could be argued that the provider acted in reckless disregard of sex trafficking on its site by choosing not to monitor for such activity, and therefore, would be subject to penalties.

In a third hypothetical scenario, Website Provider 3 operates an online group chatroom application. Person E initiates a chatroom titled, “Criminals and Thieves” and uploads a cover image that includes a false statement, “My wife, Jane Doe, embezzled millions from my business.” In the chatroom, Person F types, “Person E, I’m so sorry to hear about your wife’s scam. You want to get her back? I’ll sleep with you for $100.” Person E responds, “Yes, that sounds great. I’ll meet you at XYZ hotel in a half hour.” Website Provider 3 uses automated text-filtering software to monitor for things like criminal activity and obscenity on the site.

In this third scenario, there are at least two issues — potential defamation and potential facilitation of prostitution in violation of FOSTA. Website Provider 3 eventually finds the image, which managed to evade the text filters, via a user complaint. Website Provider 3 takes down the image immediately. Under Section 230 of the CDA, the provider can escape liability for a claim of defamation by Jane Doe (though Person E is still on the hook, as Section 230 is not applicable to the offending user). When investigating the complaint, Website Provider 3 sees the chat between Persons E and F, and also disables their user accounts.

Note that, in such a scenario, although the disabling of accounts will serve as evidence of efforts to remedy the situation, FOSTA’s lack of safe harbor provisions means that those efforts may still not absolve Website Provider 3 of liability under FOSTA. In addition, the use of the filtering software will serve as evidence of good faith effort to prevent that kind of situation, but failure of the software is not a basis for not being liable under FOSTA.

The actual edges and boundaries of FOSTA, and the extent to which it will be applied, are still to be determined in the court system. Unlike the safe harbor provisions of the CDA and DMCA, the “black letter law” of FOSTA is unforgiving, so website providers beware, even if you’re already compliant elsewhere.

Disclaimer: The content of this article constitutes general information, and is not legal advice. If you would like legal advice from Maxine Lynn, an attorney-client relationship must be formed by signing a letter of engagement with her law firm. To inquire, visit SexTech.Lawyer.

Maxine Lynn is an intellectual property (IP) attorney with the law firm of Keohane & D’Alessandro, PLLC, having offices in Albany, New York. She focuses her practice on prosecution of patents for technology, trademarks for business brands and copyrights for creative materials. Through her company, Unzipped Media, Inc., she publishes the Unzipped: Sex, Tech & the Law blog at SexTechLaw.com and the Unzipped: The Business of Sex podcast at BusinessOf.sex.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Why Cyber Insurance Is Crucial for Adult Businesses

From streaming services and interactive platforms to ecommerce and virtual reality experiences, the adult industry has long stood at the forefront of online innovation. However, the same technology-forward approach that has enabled adult businesses to deliver unique and personalized content to consumers worldwide also exposes them to myriad risks.

Corey D. Silverstein ·
opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
Show More