View Mobile Site

Ask the Expert

Signal Photos


John H. Shaffery: Your Web site’s terms of use shouldn’t be overlooked

It’s the Law

Posted: May 7, 2009 3:22 p.m.
Updated: May 8, 2009 4:55 a.m.
The terms for using Web sites, which often take on a form of legalese few users pay attention to, are more important than they are interesting to read.

These terms restrict how the public can use a Web site to obtain information, purchase goods and services, or take part in Web-based social networking.

Largely because of the federal Computer Fraud and Abuse Act, the terms of use can now be used by prosecutors charging individuals with wrongdoing emanating from a violation of the terms, or by Web-site owners themselves seeking civil remedies for legal injuries from what amounts to a breach of contract.

The growing and evolving body of court decisions concerning terms of use and the CFAA should prompt owners of Web sites to adopt and regularly review the terms for using their sites, giving special attention to the following considerations:

n Instead of using just any boilerplate legal language, the terms of use should be tailored to fit the particular risks posed to the business and users of the site.

n The terms of use must be easily seen and understood to have their intended effect. This means that they should be conspicuous on the site and written to clearly indicate conduct that is, and is not, authorized. There may be no one fail-safe approach, but one court has said that there is adequate communication of the terms of use if the terms can be accessed from all pages on the site.

n Web site owners may want to make explicit the agreement to abide by the terms of use by including so-called “clickwrap,” or “browsewrap,” agreements that make consent to the terms a condition of using the site.

If the user clicks on “I accept,” but then violates the terms of use, this essentially nails down the fact that the user lacked the necessary authorization for his actions. This may be pivotal in later criminal or civil court cases.

For example, in a recent criminal case in which a university student secured access to a university computer site and stole Social Security numbers and other confidential data, the prosecution was aided by the fact that the student had signed an “acceptable use” computer policy that prohibited the very actions which led to the criminal charges against him.

n Putting the terms of use in place is one thing, but then monitoring compliance and notifying users of suspected or confirmed violations is what results in enhanced protection. In the case of the university student who was improperly gathering sensitive personal information, the university had, on three occasions, detected that the student’s computer was performing unauthorized and suspicious functions, and had informed him of its discoveries. When the student nonetheless continued to scan and infiltrate computers without authorization, adding to his database of stolen information, his fate in the ensuing criminal case was sealed.

John H. Shaffery is a partner with Poole & Shaffery, LLP, a full-service business, corporate and employment law firm.  He can be reached at (661) 290-2991.  His column represents his own views and not necessarily those of The Signal.  “It’s The Law” appears Fridays and rotates between members of the Santa Clarita Valley Bar Association.  Nothing contained herein shall be or is intended to be construed as providing legal advice.


Most Popular Articles

There are no articles at this time.
Commenting not available.
Commenting is not available.


Powered By
Morris Technology
Please wait ...