iTnews

Judge overturns MySpace bullying conviction

By Shaun Nichols on Jul 3, 2009 11:08AM

A US judge has moved to overturn the conviction of a woman accused of cyber-bullying a teenager who later committed suicide.

District Judge George Wu has ruled that Lori Drew was not guilty of violating the Computer Fraud and Abuse Act, overturning an earlier jury decision that convicted Drew on three misdemeanour counts of unauthorised access to a computer.

The 50 year-old housewife from Missouri was accused of bullying 13 year-old Megan Meier, a former friend of Drew's daughter, through social networking site Myspace.

According to prosecutors, Drew created an account for a fictional teenage boy named 'Josh.' The fake account was then used to flirt with Meier. After conducting a brief online relationship with the girl, 'Josh' then ended the relationship and began to taunt Meier, who later took her own life.

Shortly after Meier's suicide, Drew was brought up on both felony and misdemeanour charges of illegally accessing a computer. A jury in Los Angeles acquitted Drew of the felony counts, but returned a guilty verdict on the three misdemeanour charges.

The case raised a heated debate over how cyberbullying cases on the internet should be handled, both in terms of what charges can be filed and what jurisdiction local authorities can hold over online activites.

Judge Wu appeared to echo those concerns in his decision. According to the Los Angeles Times, Wu stated in his ruling that by bringing criminal charges against Drew, prosecutors were equating any violation of a site's terms and conditions with a crime.

"Is a misdemeanour committed by the conduct which is done every single day by millions and millions of people?" Wu was quoted as saying.

"If these people do read [the terms of service] and still say they're 40 when they are 45, is that a misdemeanour?"

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
bullying conviction cyberbullying drew internet lori misdemeanour myspace security terms use

Partner Content

As Australian companies lean more heavily on the cloud, edge security is finding its stride
Partner Content As Australian companies lean more heavily on the cloud, edge security is finding its stride
Resetting cyber security for the new threat landscape
Partner Content Resetting cyber security for the new threat landscape
Putting cyber security basics in place
Partner Content Putting cyber security basics in place
Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021

Sponsored Whitepapers

Move beyond passwords
Move beyond passwords
The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Shaun Nichols
Jul 3 2009
11:08AM
0 Comments

Related Articles

  • US Treasury breached by hackers
  • Testing mistake triggered Telstra route 'hijacks'
  • Chinese hackers targeted Indian vaccine makers SII, Bharat Biotech
  • MinterEllison makes its IT security 'interventions' easier to understand
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.