In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 14
12
sign a sworn affidavit stating they were not involved in the
post. We have found that guilty parties will refuse to sign
an affidavit. If they refuse, this provides the victim with
at least legitimate grounds to perform a forensic exam of
their devices carrying electronic information. Depending on
the circumstantial evidence, this may even provide them a
sufficient basis to name them as a defendant in a lawsuit.
E. There are a number of cyber harassment statutes in various
states around the country under which the police could use
their powers to obtain evidence proving who performed
online reputation attacks. However, based on our experience,
we have found that police rarely devote their resources to
brand and reputation attacks on businesses, instead believing
these issues are better addressed in the civil court system.
Accordingly, under the present system, the police typically
do not pursue these cases.
Options for Stopping Attacks, and Removing
Damaging Content
Convincing the website to voluntarily remove the harmful content:
Most websites have terms of service that very clearly prohibit certain
content (e.g. defamatory statements). Each website has its own way
of permitting people to report harmful content, and most allow for
the removal of the content if it can be shown that the terms or other
rules have been violated.
For example, it is a violation of Yelp’s Terms of Service and Content
Guidelines to write fake or defamatory reviews. Yelp encourages
© Copyright 2014, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved.