Preview

Ellsworth V.

Better Essays
Open Document
Open Document
1033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ellsworth V.
Course: Business Law. (BUS205)

Assignment Title: Introduction to Law and Contracts

Assignment #: Module One Case

Should Yahoo have been forced to turn over Justin Ellsworth’s email to his parents? One in our shoes would venture to say “No”. Yahoo took a very firm stand backing its privacy acts that all account holders are entitled to as email address holders by saying nothing but “No”. I, in my opinion will say that Yahoo acted with legal responsibility in backing their contracted right to protect Justin’s email privacy’s. However there are many others that would cross over into the personnel side of the topic and say that because of the situation and that Justin’s own parents are requesting the information
…show more content…
All the next of KIN can do for Facebook is request that a memorial page be presented when searched for by other users. In fine print this sounds bold and that the information is unobtainable by even those that the deceased has placed as the next of KIN. That is what their policy agreements state and that is what as we can see with this paper what Yahoo held as its backing for not giving the account information out. So right or wrong I will say that “Yes” legally Yahoo held with what they had printed in black and white for the companies email privacy policies. As for the conclusion of the case I feel that several things should be addressed even after the final gavel has struck the podium. Yes in a court ordered hearing John and Debbie were legally allowed to access Justin’s Yahoo account. This now being a bench mark the question being asked is, what does Yahoo do from here about their privacy policies. Yahoo has made it very clear that no person after the death of the account holder …show more content…
However one exception does exist and that is if the account holder has specified otherwise allowing their next of KIN access in their will. I think that opinions on this topic can pretty much be summed up in a shotgun pattern on a target. There are several directions Yahoo could of took being persuaded by several things such as public opinion, apathy for the family or even the legal holding powers of an appointed next of KIN. However across the board I feel that Yahoo has upheld every policy that they have said to in their policy. Just out of curiosity I googled Yahoo and some other case similar to gather a more solid foundation and see if the Justin Ellsworth case was just a single showing. In all the cases that I have read here and there into Yahoo has held the exact same stand. The case’s of many varying topics such as government warrants for email traffic between criminals and terrorists. All of these case’s only surrendering the email data upon a search warrant or Yahoo is court ordered to turn the information over. So in conclusion I really don’t think that in falls in line with utilitarianism view of seeking a morally correct course of action consists in the greatest good for the greatest number, that is, in maximizing the total benefit resulting, without regard to the distribution of benefits and burdens. If that was so then Yahoo wouldn’t have much information that wouldn’t be available for public view. This course of action would for-go

You May Also Find These Documents Helpful

  • Better Essays

    In this case of Goldberg v. Kelly we have an issue that discusses the termination of welfare to a recipient. Now what seems to be the issue here is that there used to be no federal or state law on how to regulate this and enforce this but only a procedure that the New York State 's general Home Relief program adopted to use and follow. The sole issue of the problem is accepting the fact that a person with life depending needs could lose their financial aid and determining just exactly how those procedures should be carried out and exactly what they will be. The Home Relief program adopted a procedure that notifies the person to be terminated from the financial aid funds a minimum of 7 days before it can be enforced. The recipient is then allowed to request a higher official examine their case and is allowed to meet with that caseworker to be presented the evidence on why they are being terminated from the system. The only option that the welfare recipient have is to write a personal letter or one assisted by an attorney and request that a higher supervisor take look at their case. The recipient has the right to request a fair hearing after all of this and is then allowed to present their arguments orally and cross examine the witnesses against him/her. If the recipient prevails at the hearing his is then awarded all his held funds that were being held. This is where the argument comes in as to whether the recipient should be awarded the right to a fair trial before the termination that takes effect after a quick 7 days. As I had stated before the main issue at thought is assuming these recipients rely on these funds and should not lose the right to these funds without a fair trial.…

    • 1140 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Leg 100 Quiz 1

    • 7852 Words
    • 32 Pages

    |Instructions |This quiz consist of 20 multiple choice questions. The first 10 questions cover the material in Chapter 1. The second 10|…

    • 7852 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Better Essays

    ETH 301 Case Module 1

    • 860 Words
    • 3 Pages

    Years ago prior to the World Wide Web, people wrote hand written letters, cards and other correspondence. When death occurred, the property of loved ones was divided by specific instructions from a will or by court orders. If the deceased left this type of property behind it was given to the family members. Today these correspondences still continue in a digital format requiring usernames and passwords. Many people have not included usernames and passwords into their wills or instructions in the event of their death.…

    • 860 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The courts apply tests to see if certain laws are passed and they also apply tests when dealing with rights to privacy. How can the courts decide what is right and what is wrong in dealing with this case? Even though it might have been a tough decision to make the question is was it the right one? I believe in this case the courts were wrong, and should have stood strongly with the rights to privacy that was protecting Justin’s email. They didn’t take into account the future ramifications that this may cause to other email users. Yahoo’s reputation although saved from having the court order decide what they should do is still shaken. Their integrity is now questionable, and to avoid any future issues of this matter Yahoo needs to address this in their disclaimer. The courts had a duty to choose what would have been the right thing to do in this situation, but they decided to violate Justin’s rights to privacy. Justin fought for his country to defend these rights, and I believe he would not agree with the decision that was…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Peter Cruman Case Study

    • 941 Words
    • 4 Pages

    In the case of Moreno v. Hanford Sentinel, Inc. Moreno decided to post her ideas about her local community on social media. Due to Hanford Sentinel reposting her post, Moreno and her family received threats. After Moreno sued Hanford claiming Hanford violated her right to privacy, the court decided you can only prevail of an invasion of privacy if the person demonstrated an expectation of privacy. This case supports the case of P.C. v. State of Olympus because Cruman did not demonstrate an expectation of privacy. Crumans Facebook account consisted of 30 members and since Cruman logged into his Facebook account voluntarily, it shows how Cruman did not have an expectation of privacy. Another case that connects to the case of P.C. v. State of Olympus is the case New Jersey v. T.L.O, where the vice-principal searched a student's bag due to suspicion and found she was dealing marijuana. From this, the court decided that searches are valid if done relating to the reason for the search and not overly intrusive. This relates to the case of P.C. v. State of Olympus because Cruman willingly came to the principal's office and stayed for the 2 1/2 hours. Also, Cruman was not forced to log into his Facebook account and instead logged on voluntarily. He also admitted to his drug activity without force from the principal. Since Cruman voluntarily cooperated with the principal, the search conducted was not intrusive and is therefore valid in court since it did not violate Crumans Fourth Amendment rights. All in all, Crumans search was legal due to the fact that Crumans Fourth Amendment rights were not violated because Cruman voluntarily cooperated with the principal throughout the…

    • 941 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    James Burr V. Allred

    • 1002 Words
    • 5 Pages

    James Burr V. Allred was born on march 29 1899 in Bowie, Texas. Burr and V were the names of his uncles and he was known as Vee until he was older. While enlisting clerks did not want to type Allred's whole name so they dropped the Burr and the V was sometimes mistaken for a roman numeral, but Allred did not mind the change and continued to use the new name the rest of his life. His father was Renne and mother was Mary (Henson) Allred. He was one of nine children and had a strictly-disciplined home, by having a lot of sibling he learned to have patience and tolerance. What he learned in that home stood him in good stead throughout his career as a statesman. As a boy James also worked as a shoeshiner, soda pop bottler and newspaper boy and kept…

    • 1002 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Eth 301, Module#2

    • 326 Words
    • 2 Pages

    I do not think relatives or anyone else for that matter should have access to information of an individual that supposed to be protected by a company’s privacy act policy unless the member stated in a will that these specific documents should be released to the individuals or if a crime was committed. There is a privacy act statement for a reason. The purpose of the act is to protect the privacy and rights of all people in his email. Although the situation was a sad loss for the family being that they lost a son, policy and privacy acts still apply. Now days prior to establishing accounts with email companies, social networks or any other online corporations they have the individuals read and sign a user agreement in which most if not all talk about how they will protect the individual’s privacy. Privacy is the ability of an individual or group to seclude them or information about themselves and thereby reveal themselves selectively. As being a leader / supervisor in the Army, I have had first-hand experience with this situation. My soldier was killed in vehicle accident and during the Line-of-Duty investigation; the soldier stated to others that he was going to commit suicide. During the investigation, the investigating officer wanted to search the soldier’s computer. The family agreed to it but as the Commander of the soldier, I had to disagree with the family and the investigating officer. If it wasn’t outlined in the last will and testament, the Army didn’t grant his parents access or rights to his email. Even if the soldier is deceased we still have to respect the right of the individual.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Plessy V. Ferguson

    • 194 Words
    • 1 Page

    Before Plessy v. Ferguson, there were separate railway cars for white and colored people. Homer Plessy was convicted of sitting in a whites-only car. He had white parents, but since he had black ancestry he was considered black. He argued that the Louisiana’s Separate Car Act of 1890 violated the Thirteenth Amendment, which required all people to be treated equally under the law. Therefore, the Court upheld this act, however, Justice Henry Brown claims that the abolition of slavery did not prevent states from making legal distinctions between races (Plessy v. Ferguson (1896), page 511). Based on Document 4, Separate Accommodation states that railway companies carrying passengers, they shall provide equal but separated accommodations for the…

    • 194 Words
    • 1 Page
    Good Essays
  • Good Essays

    McCleskey v. Kemp

    • 960 Words
    • 4 Pages

    The case began with Warren McCleskey, an African-American man who was sentenced to death in 1978 for killing a white police officer during the robbery of a Georgia furniture store. McCleskey appealed his conviction and sentence, relying on the Eighth Amendment’s ban on cruel and unusual punishment and the Fourteenth Amendment’s guarantee of Equal Protection to argue that the death penalty in Georgia was administered in a racially discriminatory -- and therefore unconstitutional--manner.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Facts: Title II of the Social Security Act provides cash benefits to disabled workers. A man by the name of Eldridge was awarded these benefits in June of 1968. Eldridge stayed on this benefit plan until March of 1972 when he received a questionnaire regarding the current state of his medical condition. Eldridge claims that he had filled out the questionnaire conveying the fact that he was still in need of the benefits that he was entitled to; however the state agency ceased his benefits when Eldridge returned his completed questionnaire. Upon notification of the terminated benefits, Eldridge immediately challenged whether this act was constitutional or not. Eldridge was ultimately inspired to make this claim because of the results of a similar case known as Goldberg v. Kelly, which involved the termination of welfare.…

    • 581 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    George Will V. Coleman

    • 114 Words
    • 1 Page

    George Will, granted he did have plenty of evidence to support his proposition, did not present his findings clearly enough in my opinion, but rather lost me at some points. Fortunately, he was still able to grab my attention with the statistics and factual data that supported the Coleman report. This previous school year, I was in the AP Psychology course that Mckeel offers, and from what I learned in that class I believe that the family status of a child has more effect on how they do in school. Coleman's report has been seen as fact for the past five decades, so I don't imagine Will's article not being embraced by society now.…

    • 114 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Data Breach Essay

    • 665 Words
    • 3 Pages

    “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” (“What is a Data Breach?”) Cyber Criminals can potentially hack cars, phones, computers, bank accounts and even baby monitors. (Murdock) With all of these things under attack, it can be hard to escape without any personal information stolen. One major data breach took place in 2014 with the Yahoo company. At least 500 million user accounts were part of the breach, giving any personal information associated with the account to the hacker. (Fiegerman) Yahoo was working with law enforcement to investigate the breach, but after 2 months, the crime still had not been solved. (Fiegerman) In this instance, the government could have been involved in regulating the activity of Yahoo users, ultimately preventing the data breach from occurring in the first place. Victims of data breaches like these suddenly feel unsafe when using the internet. According to Walker, “one in six consumers believe that they will be a victim of another data breach in the next twelve months.” This lingering sense of risk prevents citizens from feeling completely secure when accessing an account containing personal information. One of the government’s responsibilities is protecting the American people, regulating the internet is just one possible option that would assist in spreading a sense of much needed safety across the…

    • 665 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Today, the online virtual world has expanded greatly compared to where it was just a decade ago. It has made space for many social media sites such as, Facebook, Twitter, Google+, among many other sites. Thus, meaning less privacy, and more people who can potentially gain access to it. As a result, the debate about whether a defense attorney should be authorized to gain a hold of users’ profiles has been going on since the creation of social media sites. Some who are against defense attorneys gaining access to profiles argue that it offends one's privacy. While others who are for it believe it is helpful for the court to judge fairly. Defense attorneys should be authorized to gain access to social media sites because; they are an effective tool in investigating witnesses and defendants.…

    • 791 Words
    • 4 Pages
    Good Essays