Case Against Cyberstalking

Improved Essays
Dear Professor Ross,

You asked whether Conner Walsh could be charged with cyberstalking in connection to the text messages and Facebook posts sent from his personal accounts. The answer is probably not. In order to be found liable for cyberstalking the defendant must show repeated electronic communication that is, “directed at a specific person,” that, “serve[s] no legitimate purpose.” Leach v. Kersey, 162 So.3d 1104, 1106 (Fla. Dist. Ct. App. 2015). Because these facts are not present Walsh’s communication would not constitute cyberstalking.

According to Walsh, he and Mr. Bezo have known each other since October of 2014. Walsh began working for Bazinga Enterprise as a legal intern. They became romantically involved, which recently came to an abrupt end. Walsh has been contacting Mr. Bezo through text messages to collect his last paycheck from his employment at Bazinga Enterprise. Walsh sent messages and pictures specifically stating his wish to collect his last paycheck and a picture venting frustration over not being paid. Walsh has also sent pictures through Facebook that were directed at the Bazinga Enterprise company account.
…show more content…
Stat. §784.048 (2015). Cyberstalking is “a course of conduct through electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person serving no legitimate purpose,” Leach v. Kersey, 162 So.3d at 1106. Cyberstalking is not found where the electronic messages are, “not directed at a specific person.” Horowitz v. Horowitz, 160 So.3d 531,531 (Fla. Dist. Ct. App. 2015). In Horowitz, where a husband posted messages on his Facebook page but were not specifically directed nor tagged to his wife, the court concluded that those posts did not constitute cyberstalking. Id. at

Related Documents

  • Improved Essays

    Student’s Name Professor’s Name Course Date Essay 13 Cyber Stalking According to the statute 784.048 cyber stalking is intentionally using electronic medium channels to communicate through words, language, and images that are offensive to the other party (Beane 213). The messages could either be sexual, intimidating or simply harassment to the recipient and they have no legitimate purpose.…

    • 378 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Case Name: Anthony Douglas Elonis, Petitioner, v. United States., No. 13-983 (2014) Factual History: Anthony Douglas Elonis actively uses Facebook, a social networking Web site. After seven years of marriage, Elonis’s wife left him and took their two young children with her. Elonis changed his user name on Facebook to a fake name. He posted a threating photo of one of his co-workers and himself on Halloween. After his co-worker’s found out about the photo, Elonis posted a status threating to kill multiple friends and co-workers.…

    • 759 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Elonis Vs Us Case Study

    • 546 Words
    • 3 Pages

    Although the content of the Facebook posts may have been threatening, there was no evidence of any action being taken to harm or plan to harm…

    • 546 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    False 19. This is a form of computer harassment that happens between two individuals is _____. Cyberstalking 20. _________________ is a program that appears to be a legitimate program but is actually something malicious instead.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    It stated, “the employer was entitled to analyze his Facebook messages, particularly given evidence that he messaged a co-worker that he injured himself fishing, rather than in a workplace accident on the employer’s vessel, as he alleged.” (Park Topic 5 Bullet 1) Evidence on his own Facebook proved that he did not in fact get hurt at work but on his own time. He claimed that he deleted his Facebook account but in reality, he had only deactivated it, meaning all the information was still present. In…

    • 1299 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Cyberbullying Murder, theft, or arson are extremely fair reasons to put someone in jail, but is cyberbullying? Would people just be wasting the jury's time and taxpayers resources on cyberbullying cases or would it be a worthy idea? Some people believe that it is a good reason to prosecute a person, but it is undoubtedly not superb logic. Cyberbullying is by no means a acceptable thing, but someone should not be criminally prosecuted for it. The article, Sacrificing the First Amendment to Catch “Cyberbullies” by Kirk Sigmon states “The last time I checked, hurting someone’s feelings-even in real life- never justified criminal prosecution.”…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Embedded Assessment

    • 776 Words
    • 4 Pages

    With the increased use of social media by society, there are more opportunities than ever before to steal identities or execute fraud online. For example, status updates posted on Facebook or tweets posted on Twitter and many other social media sites can be used by criminals. In regards to stealing or stalking one’s identity, by posting photos and/or videos on websites such as YouTube, Flickr, etc. could provide stalkers deeper information about you, regarding your family, friends, interests and other vital…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyberbullying is known as a willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Individuals should not be prosecuted for statements made on social media because the citizens of the United States have the right to say whatever they want. Also cyberbullies can use false or anybody’s information to mislead the real I.D. of the attacker. The proposed law in the radio interview “The dangers of cyberbullying”, Ms. Eden Foster commented the proposed bill called “Megan Meir Cyberbullying Prevention Act”.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Facebook Title Analysis

    • 712 Words
    • 3 Pages

    Does the Author’s position support the title? How does Facebook makes us dumber? I don’t think this article supports the title. The Author goes on to talking about how misinformation will spread so quickly on social media, and why don’t people look for the truth. I agree with that…

    • 712 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    In The New and Evolving tort of Contributory Cybersquatting: Did the Courts get it right? From…

    • 1735 Words
    • 7 Pages
    Great Essays
  • Great Essays

    While some sites concentrate on laws that defend victims age 18 and under, Working to Halt Online Abuse is a help resource comprising of a list of up-to-date and unresolved cyberstalking-related in the United States federal and state laws. In addition, it lists those states that do not have laws yet and associated laws from other countries. The Global Cyber Law Database (GCLD) wishes to become the most inclusive and influential foundation of cyber laws for all countries.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    In a world where technology has overtaken society, people have found it much easier to commit crimes. We've all heard of websites such as Facebook, Twitter, Ebay, and possibly the most talked about for being so dangerous, Craigslist. These are websites where people can interact with one another, but sometimes it may just so happen that you do not know who you're truly talking to. What or who is hiding behind a computer screen on the other side may just be your worst nightmare. Philip Markoff, an aspiring medical student was dubbed the Craigslist killer in 2009 for committing robberies and even killing one of his victims.…

    • 1726 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cyber bullying Thesis statement – cyber bullying is the act that occurs using electronic technology. It may include different forms of devices like computers cell phones and also tablets and any other means of social media communication tools. Cyber bullying is a problem known globally. Sometimes it may be unnoticed most of the times when it happens, but cyber bullying can be very destructive and most of the times are very lethal to those people who are being bullied.…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Social Media’s Negative Effects on Adolescents Adolescence is an important period in our lifetime, it is when we are most vulnerable to influence by others. Social media plays a huge role in how people connect with one another in their daily lives. This is especially true for adolescents who are among the heaviest users of social networking sites. While teens strive to find their own identities, they come across several forms of influence through social media. Some of these effects are caused by cyberbullying, sexting, and a phenomenon known as Facebook Depression.…

    • 1241 Words
    • 5 Pages
    Superior Essays