SlideShare a Scribd company logo
1 of 3
Download to read offline
Thomas Techsavvy, a domiciliary and habitual resident of Atlanta, Georgia (Fulton County) started
an electronic commerce company about four years ago. The company developed a business plan,
signed up customers, and successfully started operations. Investment bankers became interested
in taking the company public through an initial Public Stock offering (IPO). Thomas was scheduled
to make a final presentation to the lead investment banker on February 1, 2014. Throughout the
month of January 2014, he and his small staff had worked 16-hour days including weekends to
develop sales projections, financial statements, and images of the companys Web sites for the
presentation. On January 31, 2014, Thomas received an email message, apparently from a former
high school classmate, with the subject line, I Miss You. Thomas opened an attachment to the
message and was puzzled by the attachment contents, which referred to omissions in his email
address book.
Thomas turned his attention back to a last minute review of the materials before heading to New
York for his presentation the next day. To his great surprise, he found that all the files containing
the charts for his presentation had been suddenly erased. Despite frantic efforts by Thomas and
his staff to recover the files in time for his flight to New York, they were lost and Thomas was
forced to cancel his presentation. Over the next several weeks, the stock market fell, and the
investment banker declined interest in further exploration of an IPO. After investigation, Thomas
staff, along with a variety of technical consultants and law enforcement agencies, determined that
the damage to his files had been caused by a computer virus that had spread over much of the
world in I Miss You messages.
Apparently, the virus was the work of John Schmoe, a renegade Australian computer hacker who
wrote the virus, intending that it replicate in email address books and spread around the world. He
intentionally wrote the program so that the virus would erase word processing, spreadsheet,
image, and presentation files on any computer on which it was received. He began the
propagation of the virus by sending it to everyone who had an email account with Australia OnLine
(AOL), an Internet Service Provider located in Canberra, Australia and incorporated in Australia.
AOL is a wholly-owned subsidiary of AOL-Time Warner, an American (Delaware) company with its
principal place of business in Arlington, Virginia. AOL-Time Warner systematically and
continuously does business in every one of the 50 states.
At the time, Thomas own email service was provided by Fulton County Access (Full Access),
located in Atlanta, Georgia. Thomas selected Full Access as his Internet service provider in part
because Full Access had made commitments in both its advertisements and its subscriber
agreement that it offered virus free email accounts by sweeping email files every few minutes with
virus detection and eradication software. Unfortunately, the I Miss You virus caught almost
everyone by surprise and the Full Access virus protection software did not detect it. The Internet
and email service contract between Thomas and Full Access contains a forum-selection and
choice-of-law clause providing that any claims must be litigated in Illinois courts under Illinois law.
Thomas had never read the Terms of Service Contract because it was only made available if he
had clicked on a particular button when he signed up for the Full Access service. He did not do so,
and he was surprised when Full Access mentioned the forum-selection and choice-of-law clauses
in its answer.
Thomas has obtained your law firm, which has filed suit against Mr. Schmoe, Australia OnLine and
Full Access in the Superior Court of Fulton County, Georgia. The claim against Mr. Schmoe is
based on trespass, the one against AOL is based on negligence for allowing Mr. Schmoe to use
its services without determining that he had a long history of misconduct on the Internet, and the
claim against Full Access is for breach of contract.
Full Access answered the complaint and vigorously contests its liability. Full Access has filed a
motion to dismiss Thomass claim, and its lawyers state that if the motion is denied, they are
prepared to present evidence that any obligation it had under its warranty was fulfilled and that the
virus attack could not have been foreseen and should be treated under Georgia contract law as an
unforeseeable and unpreventable event under the Force Majeure Doctrine (often otherwise
referred to as the Commercial Impracticability Defense) applicable in Georgia. Australia OnLine
has entered a limited special appearance for the purpose of contesting jurisdiction only, arguing
that under Virginia law the acts of corporate subsidiaries and parents cannot be attributed to each
other. Mr. Schmoe filed a separate answer, denying liability.
The partner in charge of this case feels a bit overwhelmed with the Conflicts issues in this case.
She has asked you to write her a memorandum explaining the likely effect in this case of the
resolution of the Conflicts issues. Please tell her how she should proceed to best represent
Thomas. Please also tell her any additional information that you would like to have to better predict
what will happen in this case. You need not discuss substantive law except as necessary to fully
explore the conflict of laws issues. Limit your answer to no more than 2400 words.
please assume the following about the states laws below:
Georgia conflicts law is unsettled. Georgia decisions can be found embracing traditional choice-
of-law rules as well as more modern approaches. A relatively recent Georgia case involving a
trespass claim against an email spammer held that trespass is not available as a legal theory for
unpermitted access to computer resources or for damage to electronic files. Georgia corporation
law affords strong protection to corporate affiliates, not allowing the attribution of conduct by
another as long as they are separately incorporated. A statute in Georgia immunizes Internet
intermediaries for liability for the conduct of their subscribers and others who use their services.
Georgia law is favorable to breach of contract claims against Internet Service Providers. The
statute of limitations in Georgia for tort actions is 3 years, and for contract and property actions is 4
years.
Illinois follows the Second Restatement of Conflict of Laws. It has a one-year statute of limitations
for tort, contract and property suits. Illinois law does not recognize Force Majeure clauses unless
they are explicitly reserved.
Virginia courts follow the First Restatement of Conflict of Laws. Virginia law allows the corporate
veil to be pierced (for owners of corporations to be held liable for the acts of corporations they
own) when the owner exercises close control over the operations of the owned corporation.
Virginia cases allow the corporate veil to be pierced when a subsidiary uses the same name as
the parent corporation. A Virginia statute immunizes Internet intermediaries for liability for the
conduct of their subscribers and others who post information on their servers. Virginia trespass
law allows claims for intentional damage to computer files and for unpermitted entry into computer
resources. In Virginia, plaintiffs need not establish their causes of action in order to obtain default
judgments. The statutes of limitation in Virginia are as follows: torts4 years; contracts2 years;
property 4 years.
Australian courts use interest analysis to resolve choice-of-law problems. Australian law allows
trespass actions for damage to computer files and for unpermitted entry into computer resources.
It does not provide any immunity for Internet intermediaries. It preserves corporate veils and does
not attribute the conduct of one corporate affiliate to another. In Australia, plaintiffs need not
establish their causes of action in order to obtain default judgments. The statutes of limitations for
tort, contract and property actions are all 5 years.

More Related Content

Similar to Thomas Techsavvy a domiciliary and habitual resident of Atl.pdf

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 
Data Scrapping On the Internet (Web Scraping)
Data Scrapping On the Internet (Web Scraping)Data Scrapping On the Internet (Web Scraping)
Data Scrapping On the Internet (Web Scraping)BenjaminShalevSalovi
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legalAxon Partners
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
 

Similar to Thomas Techsavvy a domiciliary and habitual resident of Atl.pdf (12)

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Data Scrapping On the Internet (Web Scraping)
Data Scrapping On the Internet (Web Scraping)Data Scrapping On the Internet (Web Scraping)
Data Scrapping On the Internet (Web Scraping)
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Watch Your Step on the Internet!
Watch Your Step on the Internet! Watch Your Step on the Internet!
Watch Your Step on the Internet!
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legal
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social Media
 

More from aakarinterio

Which of the following is true Multiple Choice The role of .pdf
Which of the following is true Multiple Choice The role of .pdfWhich of the following is true Multiple Choice The role of .pdf
Which of the following is true Multiple Choice The role of .pdfaakarinterio
 
Which of the following best describes the role of Business I.pdf
Which of the following best describes the role of Business I.pdfWhich of the following best describes the role of Business I.pdf
Which of the following best describes the role of Business I.pdfaakarinterio
 
What happens to the accounting equation when the adjustment .pdf
What happens to the accounting equation when the adjustment .pdfWhat happens to the accounting equation when the adjustment .pdf
What happens to the accounting equation when the adjustment .pdfaakarinterio
 
Une cada trmino con la definicin correcta Hiptesis nula .pdf
Une cada trmino con la definicin correcta Hiptesis nula .pdfUne cada trmino con la definicin correcta Hiptesis nula .pdf
Une cada trmino con la definicin correcta Hiptesis nula .pdfaakarinterio
 
Western companies flooded into China when it opened its door.pdf
Western companies flooded into China when it opened its door.pdfWestern companies flooded into China when it opened its door.pdf
Western companies flooded into China when it opened its door.pdfaakarinterio
 
TM 16 soruyu yantladnz iin ok teekkr ederiz 1 Dil.pdf
TM 16 soruyu yantladnz iin ok teekkr ederiz   1 Dil.pdfTM 16 soruyu yantladnz iin ok teekkr ederiz   1 Dil.pdf
TM 16 soruyu yantladnz iin ok teekkr ederiz 1 Dil.pdfaakarinterio
 
The media has grown over the years and continues to be a sou.pdf
The media has grown over the years and continues to be a sou.pdfThe media has grown over the years and continues to be a sou.pdf
The media has grown over the years and continues to be a sou.pdfaakarinterio
 
Suppose that we are testing 0 1 2 vs 1 1 2 where the .pdf
Suppose that we are testing 0 1  2 vs 1 1  2 where the .pdfSuppose that we are testing 0 1  2 vs 1 1  2 where the .pdf
Suppose that we are testing 0 1 2 vs 1 1 2 where the .pdfaakarinterio
 
The Comprehensive Everglades Restoration Plan of 2000 would .pdf
The Comprehensive Everglades Restoration Plan of 2000 would .pdfThe Comprehensive Everglades Restoration Plan of 2000 would .pdf
The Comprehensive Everglades Restoration Plan of 2000 would .pdfaakarinterio
 
Suppose someone voices their opinion that the USA needs a mo.pdf
Suppose someone voices their opinion that the USA needs a mo.pdfSuppose someone voices their opinion that the USA needs a mo.pdf
Suppose someone voices their opinion that the USA needs a mo.pdfaakarinterio
 
TB 06108 Martock Company utiliza el inventario peridico.pdf
TB 06108 Martock Company utiliza el inventario peridico.pdfTB 06108 Martock Company utiliza el inventario peridico.pdf
TB 06108 Martock Company utiliza el inventario peridico.pdfaakarinterio
 
Suns Inc has a dividend yield of 51 percent and is expecte.pdf
Suns Inc has a dividend yield of 51 percent and is expecte.pdfSuns Inc has a dividend yield of 51 percent and is expecte.pdf
Suns Inc has a dividend yield of 51 percent and is expecte.pdfaakarinterio
 
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci d.pdf
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci   d.pdfStrateji uygulamasnda dzeltici ayarlamalar yapma sreci   d.pdf
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci d.pdfaakarinterio
 
Recolectar datos primarios de manera regular y venderlos a u.pdf
Recolectar datos primarios de manera regular y venderlos a u.pdfRecolectar datos primarios de manera regular y venderlos a u.pdf
Recolectar datos primarios de manera regular y venderlos a u.pdfaakarinterio
 
Solo preguntas sobre gestin de integracin de proyectos .pdf
Solo preguntas sobre gestin de integracin de proyectos    .pdfSolo preguntas sobre gestin de integracin de proyectos    .pdf
Solo preguntas sobre gestin de integracin de proyectos .pdfaakarinterio
 
Seeley y Swan comparten por igual las ganancias las prdida.pdf
Seeley y Swan comparten por igual las ganancias las prdida.pdfSeeley y Swan comparten por igual las ganancias las prdida.pdf
Seeley y Swan comparten por igual las ganancias las prdida.pdfaakarinterio
 
Podran ayudarme con esto por favor Crea una escena 700.pdf
Podran ayudarme con esto por favor  Crea una escena 700.pdfPodran ayudarme con esto por favor  Crea una escena 700.pdf
Podran ayudarme con esto por favor Crea una escena 700.pdfaakarinterio
 
Eager a tipped employee reported to his employer that he h.pdf
Eager a tipped employee reported to his employer that he h.pdfEager a tipped employee reported to his employer that he h.pdf
Eager a tipped employee reported to his employer that he h.pdfaakarinterio
 
Planificacin de la sucesin para el puesto de director ejec.pdf
Planificacin de la sucesin para el puesto de director ejec.pdfPlanificacin de la sucesin para el puesto de director ejec.pdf
Planificacin de la sucesin para el puesto de director ejec.pdfaakarinterio
 
ORACLE SQL DEVELOPER Please help with query statements that .pdf
ORACLE SQL DEVELOPER Please help with query statements that .pdfORACLE SQL DEVELOPER Please help with query statements that .pdf
ORACLE SQL DEVELOPER Please help with query statements that .pdfaakarinterio
 

More from aakarinterio (20)

Which of the following is true Multiple Choice The role of .pdf
Which of the following is true Multiple Choice The role of .pdfWhich of the following is true Multiple Choice The role of .pdf
Which of the following is true Multiple Choice The role of .pdf
 
Which of the following best describes the role of Business I.pdf
Which of the following best describes the role of Business I.pdfWhich of the following best describes the role of Business I.pdf
Which of the following best describes the role of Business I.pdf
 
What happens to the accounting equation when the adjustment .pdf
What happens to the accounting equation when the adjustment .pdfWhat happens to the accounting equation when the adjustment .pdf
What happens to the accounting equation when the adjustment .pdf
 
Une cada trmino con la definicin correcta Hiptesis nula .pdf
Une cada trmino con la definicin correcta Hiptesis nula .pdfUne cada trmino con la definicin correcta Hiptesis nula .pdf
Une cada trmino con la definicin correcta Hiptesis nula .pdf
 
Western companies flooded into China when it opened its door.pdf
Western companies flooded into China when it opened its door.pdfWestern companies flooded into China when it opened its door.pdf
Western companies flooded into China when it opened its door.pdf
 
TM 16 soruyu yantladnz iin ok teekkr ederiz 1 Dil.pdf
TM 16 soruyu yantladnz iin ok teekkr ederiz   1 Dil.pdfTM 16 soruyu yantladnz iin ok teekkr ederiz   1 Dil.pdf
TM 16 soruyu yantladnz iin ok teekkr ederiz 1 Dil.pdf
 
The media has grown over the years and continues to be a sou.pdf
The media has grown over the years and continues to be a sou.pdfThe media has grown over the years and continues to be a sou.pdf
The media has grown over the years and continues to be a sou.pdf
 
Suppose that we are testing 0 1 2 vs 1 1 2 where the .pdf
Suppose that we are testing 0 1  2 vs 1 1  2 where the .pdfSuppose that we are testing 0 1  2 vs 1 1  2 where the .pdf
Suppose that we are testing 0 1 2 vs 1 1 2 where the .pdf
 
The Comprehensive Everglades Restoration Plan of 2000 would .pdf
The Comprehensive Everglades Restoration Plan of 2000 would .pdfThe Comprehensive Everglades Restoration Plan of 2000 would .pdf
The Comprehensive Everglades Restoration Plan of 2000 would .pdf
 
Suppose someone voices their opinion that the USA needs a mo.pdf
Suppose someone voices their opinion that the USA needs a mo.pdfSuppose someone voices their opinion that the USA needs a mo.pdf
Suppose someone voices their opinion that the USA needs a mo.pdf
 
TB 06108 Martock Company utiliza el inventario peridico.pdf
TB 06108 Martock Company utiliza el inventario peridico.pdfTB 06108 Martock Company utiliza el inventario peridico.pdf
TB 06108 Martock Company utiliza el inventario peridico.pdf
 
Suns Inc has a dividend yield of 51 percent and is expecte.pdf
Suns Inc has a dividend yield of 51 percent and is expecte.pdfSuns Inc has a dividend yield of 51 percent and is expecte.pdf
Suns Inc has a dividend yield of 51 percent and is expecte.pdf
 
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci d.pdf
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci   d.pdfStrateji uygulamasnda dzeltici ayarlamalar yapma sreci   d.pdf
Strateji uygulamasnda dzeltici ayarlamalar yapma sreci d.pdf
 
Recolectar datos primarios de manera regular y venderlos a u.pdf
Recolectar datos primarios de manera regular y venderlos a u.pdfRecolectar datos primarios de manera regular y venderlos a u.pdf
Recolectar datos primarios de manera regular y venderlos a u.pdf
 
Solo preguntas sobre gestin de integracin de proyectos .pdf
Solo preguntas sobre gestin de integracin de proyectos    .pdfSolo preguntas sobre gestin de integracin de proyectos    .pdf
Solo preguntas sobre gestin de integracin de proyectos .pdf
 
Seeley y Swan comparten por igual las ganancias las prdida.pdf
Seeley y Swan comparten por igual las ganancias las prdida.pdfSeeley y Swan comparten por igual las ganancias las prdida.pdf
Seeley y Swan comparten por igual las ganancias las prdida.pdf
 
Podran ayudarme con esto por favor Crea una escena 700.pdf
Podran ayudarme con esto por favor  Crea una escena 700.pdfPodran ayudarme con esto por favor  Crea una escena 700.pdf
Podran ayudarme con esto por favor Crea una escena 700.pdf
 
Eager a tipped employee reported to his employer that he h.pdf
Eager a tipped employee reported to his employer that he h.pdfEager a tipped employee reported to his employer that he h.pdf
Eager a tipped employee reported to his employer that he h.pdf
 
Planificacin de la sucesin para el puesto de director ejec.pdf
Planificacin de la sucesin para el puesto de director ejec.pdfPlanificacin de la sucesin para el puesto de director ejec.pdf
Planificacin de la sucesin para el puesto de director ejec.pdf
 
ORACLE SQL DEVELOPER Please help with query statements that .pdf
ORACLE SQL DEVELOPER Please help with query statements that .pdfORACLE SQL DEVELOPER Please help with query statements that .pdf
ORACLE SQL DEVELOPER Please help with query statements that .pdf
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Thomas Techsavvy a domiciliary and habitual resident of Atl.pdf

  • 1. Thomas Techsavvy, a domiciliary and habitual resident of Atlanta, Georgia (Fulton County) started an electronic commerce company about four years ago. The company developed a business plan, signed up customers, and successfully started operations. Investment bankers became interested in taking the company public through an initial Public Stock offering (IPO). Thomas was scheduled to make a final presentation to the lead investment banker on February 1, 2014. Throughout the month of January 2014, he and his small staff had worked 16-hour days including weekends to develop sales projections, financial statements, and images of the companys Web sites for the presentation. On January 31, 2014, Thomas received an email message, apparently from a former high school classmate, with the subject line, I Miss You. Thomas opened an attachment to the message and was puzzled by the attachment contents, which referred to omissions in his email address book. Thomas turned his attention back to a last minute review of the materials before heading to New York for his presentation the next day. To his great surprise, he found that all the files containing the charts for his presentation had been suddenly erased. Despite frantic efforts by Thomas and his staff to recover the files in time for his flight to New York, they were lost and Thomas was forced to cancel his presentation. Over the next several weeks, the stock market fell, and the investment banker declined interest in further exploration of an IPO. After investigation, Thomas staff, along with a variety of technical consultants and law enforcement agencies, determined that the damage to his files had been caused by a computer virus that had spread over much of the world in I Miss You messages. Apparently, the virus was the work of John Schmoe, a renegade Australian computer hacker who wrote the virus, intending that it replicate in email address books and spread around the world. He intentionally wrote the program so that the virus would erase word processing, spreadsheet, image, and presentation files on any computer on which it was received. He began the propagation of the virus by sending it to everyone who had an email account with Australia OnLine (AOL), an Internet Service Provider located in Canberra, Australia and incorporated in Australia. AOL is a wholly-owned subsidiary of AOL-Time Warner, an American (Delaware) company with its principal place of business in Arlington, Virginia. AOL-Time Warner systematically and continuously does business in every one of the 50 states. At the time, Thomas own email service was provided by Fulton County Access (Full Access), located in Atlanta, Georgia. Thomas selected Full Access as his Internet service provider in part because Full Access had made commitments in both its advertisements and its subscriber agreement that it offered virus free email accounts by sweeping email files every few minutes with virus detection and eradication software. Unfortunately, the I Miss You virus caught almost everyone by surprise and the Full Access virus protection software did not detect it. The Internet and email service contract between Thomas and Full Access contains a forum-selection and choice-of-law clause providing that any claims must be litigated in Illinois courts under Illinois law. Thomas had never read the Terms of Service Contract because it was only made available if he had clicked on a particular button when he signed up for the Full Access service. He did not do so, and he was surprised when Full Access mentioned the forum-selection and choice-of-law clauses in its answer. Thomas has obtained your law firm, which has filed suit against Mr. Schmoe, Australia OnLine and
  • 2. Full Access in the Superior Court of Fulton County, Georgia. The claim against Mr. Schmoe is based on trespass, the one against AOL is based on negligence for allowing Mr. Schmoe to use its services without determining that he had a long history of misconduct on the Internet, and the claim against Full Access is for breach of contract. Full Access answered the complaint and vigorously contests its liability. Full Access has filed a motion to dismiss Thomass claim, and its lawyers state that if the motion is denied, they are prepared to present evidence that any obligation it had under its warranty was fulfilled and that the virus attack could not have been foreseen and should be treated under Georgia contract law as an unforeseeable and unpreventable event under the Force Majeure Doctrine (often otherwise referred to as the Commercial Impracticability Defense) applicable in Georgia. Australia OnLine has entered a limited special appearance for the purpose of contesting jurisdiction only, arguing that under Virginia law the acts of corporate subsidiaries and parents cannot be attributed to each other. Mr. Schmoe filed a separate answer, denying liability. The partner in charge of this case feels a bit overwhelmed with the Conflicts issues in this case. She has asked you to write her a memorandum explaining the likely effect in this case of the resolution of the Conflicts issues. Please tell her how she should proceed to best represent Thomas. Please also tell her any additional information that you would like to have to better predict what will happen in this case. You need not discuss substantive law except as necessary to fully explore the conflict of laws issues. Limit your answer to no more than 2400 words. please assume the following about the states laws below: Georgia conflicts law is unsettled. Georgia decisions can be found embracing traditional choice- of-law rules as well as more modern approaches. A relatively recent Georgia case involving a trespass claim against an email spammer held that trespass is not available as a legal theory for unpermitted access to computer resources or for damage to electronic files. Georgia corporation law affords strong protection to corporate affiliates, not allowing the attribution of conduct by another as long as they are separately incorporated. A statute in Georgia immunizes Internet intermediaries for liability for the conduct of their subscribers and others who use their services. Georgia law is favorable to breach of contract claims against Internet Service Providers. The statute of limitations in Georgia for tort actions is 3 years, and for contract and property actions is 4 years. Illinois follows the Second Restatement of Conflict of Laws. It has a one-year statute of limitations for tort, contract and property suits. Illinois law does not recognize Force Majeure clauses unless they are explicitly reserved. Virginia courts follow the First Restatement of Conflict of Laws. Virginia law allows the corporate veil to be pierced (for owners of corporations to be held liable for the acts of corporations they own) when the owner exercises close control over the operations of the owned corporation. Virginia cases allow the corporate veil to be pierced when a subsidiary uses the same name as the parent corporation. A Virginia statute immunizes Internet intermediaries for liability for the conduct of their subscribers and others who post information on their servers. Virginia trespass law allows claims for intentional damage to computer files and for unpermitted entry into computer resources. In Virginia, plaintiffs need not establish their causes of action in order to obtain default judgments. The statutes of limitation in Virginia are as follows: torts4 years; contracts2 years;
  • 3. property 4 years. Australian courts use interest analysis to resolve choice-of-law problems. Australian law allows trespass actions for damage to computer files and for unpermitted entry into computer resources. It does not provide any immunity for Internet intermediaries. It preserves corporate veils and does not attribute the conduct of one corporate affiliate to another. In Australia, plaintiffs need not establish their causes of action in order to obtain default judgments. The statutes of limitations for tort, contract and property actions are all 5 years.