ch31.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,189 行 · 第 1/4 页

HTM
1,189
字号
<UL>	<LI>Hate crimes and harassment are against the law--In 1995, an individual at the	University of Irvine in California was indicted for such activity. According to the	article &quot;Ex-student Indicted for Alleged Hate Crime in Cyberspace,&quot; prosecutors	alleged that the student sent &quot;...a threatening electronic message to about	60 University of California, Irvine, students on Sept. 20.&quot; The student was	therefore &quot;...indicted on 10 federal hate-crime charges for allegedly sending	computer messages threatening to kill Asian students.&quot;</UL><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>Visit <A HREF="http://www.nando.net/newsroom/ntn/info/111496/info15_1378.html"><TT>http://www.nando.net/newsroom/ntn/info/111496/info15_1378.html</TT></A>	to see the article &quot;Ex-student Indicted for Alleged Hate Crime in Cyberspace.&quot;	<HR></BLOCKQUOTE><UL>	<LI>Forwarding threats to the President is unlawful--In one case, a man was arrested	for sending messages to the President, threatening to kill him. In another, less	controversial case, seventh graders were arrested by the Secret Service for telling	Mr. Clinton that his &quot;ass&quot; was &quot;theirs.&quot;</UL><P>In reference to harassment and racial slurs, the law already provides a standardthat may be (and has been) applied to the Internet. That is the <I>Fighting WordsDoctrine</I>, which seems to revolve primarily around the requirement that the wordsmust be specifically directed toward an individual or individuals. Merely statingthat &quot;all blondes are stupid&quot; is insufficient.</P><P>The Fighting Words Doctrine can be understood most clearly by examining <I>VietnameseFisherman's Ass'n v. Knights of the Ku Klux Klan</I>. The case revolved around repeatedharassment of Vietnamese fisherman by the KKK in Galveston Bay. The situation involvedthe KKK members approaching (by boat) a vessel containing Vietnamese fisherman. Accordingto Donald A. Downs in his article &quot;Racial Incitement Law and Policy in the UnitedStates: Drawing the Line Between Free Speech and Protection Against Racism,&quot;the KKK:<DL>	<DD>...wore full military regalia and hoods on their faces, brandished weapons and	hung an effigy of a Vietnamese fisherman and circled within eyesight of the fisherman.</DL><P>The court in that case found the actions of the KKK to amount to fighting words.Such speech, when directed against an individual or individuals who are in some waya captive audience to those words, is not protected under the First Amendment. Similarly,threats against the President of the United States amount to unprotected speech.And, such threats, where they are extortive or unconditional and specific to theperson so threatened, amount to unprotected speech.</P><P>These laws and doctrines can be applied in any instance. Whether that applicationis ultimately successful remains another matter. Certainly, posting such informationon a Web page or even in a Usenet group may or may not be narrow enough of a directiveto call such laws (threats to the President are the obvious, notable exceptions).The law in this area is not entirely settled.<H2><FONT COLOR="#000077"><B>Summary</B></FONT></H2><P>Internet law is a new and exciting area of expertise. Because the Internet isof such extreme public interest, certain battles, such as the dispute over adult-orientedmaterial, are bound to take a decade or more. All Netizens should keep up with thelatest legislation.</P><P>Finally, perhaps a word of caution here would be wise: If you are planning toundertake some act upon the Internet and you are unsure of its legality, get a lawyer'sopinion. Not just any lawyer, either; talk to one who really knows Internet law.Many attorneys may claim to know Internet law, but the number that actually do issmall. This is important because the Information Superhighway is like any other highway.You can get pulled over, get a ticket, or even go to jail.<H3><FONT COLOR="#000077"><B>Resources</B></FONT></H3><P><B>Berne Convention For The Protection Of Literary And Artistic Works</B>.<UL>	<LI><A HREF="http://www.law.cornell.edu/treaties/berne/overview.html"><TT>http://www.law.cornell.edu/treaties/berne/overview.html</TT></A></UL><P><B>EFF's (Extended) Guide to the Internet--Copyright Law.</B><UL>	<LI><A HREF="http://soma.npa.uiuc.edu/docs/eegtti/eeg_105.html"><TT>http://soma.npa.uiuc.edu/docs/eegtti/eeg_105.html</TT></A></UL><P><B>Big Dummy's Guide to the Internet--Copyright Law.</B><UL>	<LI><A HREF="http://www.bio.uts.edu.au/www/guides/bdgtti/bdg_101.html"><TT>http://www.bio.uts.edu.au/www/guides/bdgtti/bdg_101.html</TT></A></UL><P><B>Revising the Copyright Law for Electronic Publishing.</B><UL>	<LI><A HREF="http://www.leepfrog.com/E-Law/Revising-HyperT.html"><TT>http://www.leepfrog.com/E-Law/Revising-HyperT.html</TT></A></UL><P><B>The E-Challenge for Copyright Law.</B><UL>	<LI><A HREF="http://www.utsystem.edu/OGC/IntellectualProperty/challenge.htm"><TT>http://www.utsystem.edu/OGC/IntellectualProperty/challenge.htm</TT></A></UL><P><B>Copyright Law FAQ (3/6): Common Miscellaneous Questions.</B><UL>	<LI><A HREF="http://www.lib.ox.ac.uk/internet/news/faq/archive/law.copyright-faq.part3.html"><TT>http://www.lib.ox.ac.uk/internet/news/faq/archive/law.copyright-faq.part3.html</TT></A></UL><P><B>Copyrights, Trademarks, and the Internet.</B> Donald M. Cameron, Tom S. Onyshko,and W. David Castell.<UL>	<LI><A HREF="http://www.smithlyons.com/it/cti/index.htm"><TT>http://www.smithlyons.com/it/cti/index.htm</TT></A></UL><P><B>New U.S. Copyright Board of Appeals Established.</B><UL>	<LI><A HREF="http://www.jurisdiction.com/einh0002.htm"><TT>http://www.jurisdiction.com/einh0002.htm</TT></A></UL><P><B>Copyright Law of the United States.</B> US Code-Title 17, Section 107. FairUse Clause.<UL>	<LI><A HREF="http://lfcity.com/cpy.html"><TT>http://lfcity.com/cpy.html</TT></A></UL><P><B>Copyright Law, Libraries, and Universities: Overview, Recent Developments,and Future Issues.</B> Kenneth D. Crews, J.D., Ph.D. Associate Professor of BusinessLaw. College of Business. This is an excellent source.<UL>	<LI><A HREF="http://palimpsest.stanford.edu/bytopic/intprop/crews.html"><TT>http://palimpsest.stanford.edu/bytopic/intprop/crews.html</TT></A></UL><P><B>Recent Caselaw and Legislative Developments in Copyright Law in the UnitedStates.</B><UL>	<LI><A HREF="http://www.ladas.com/GUIDES/COPYRIGHT/Copyright.USA.1995.html"><TT>http://www.ladas.com/GUIDES/COPYRIGHT/Copyright.USA.1995.html</TT></A></UL><P><B>Copyright Law and Fair Use.</B><UL>	<LI><A HREF="http://www-sul.stanford.edu/cpyright.html"><TT>http://www-sul.stanford.edu/cpyright.html</TT></A></UL><P><B>The First Amendment vs. Federal Copyright Law.</B><UL>	<LI><A HREF="http://www.krusch.com/real/copyright.html"><TT>http://www.krusch.com/real/copyright.html</TT></A></UL><P><B>Software Copyright Law.</B><UL>	<LI><A HREF="http://www.lgu.com/cr_idx.htm"><TT>http://www.lgu.com/cr_idx.htm</TT></A></UL><P><B>Electronic Copyright Law in France.</B><UL>	<LI><A HREF="http://www.spa.org/consumer/bus/franc.htm"><TT>http://www.spa.org/consumer/bus/franc.htm</TT></A></UL><P><B>U.S. Copyright Office General Information and Publications.</B><UL>	<LI><A HREF="http://lcweb.loc.gov/copyright/"><TT>http://lcweb.loc.gov/copyright/</TT></A></UL><P><B>Copyright Clearance Center (CCC).</B><UL>	<LI><A HREF="http://www.copyright.com/"><TT>http://www.copyright.com/</TT></A></UL><P><B>Copyright Reform in Canada: Domestic Cultural Policy Objectives and the Challengeof Technological Convergence.</B><UL>	<LI><A HREF="http://www.ucalgary.ca/~gagow/cpyrght.htm"><TT>http://www.ucalgary.ca/~gagow/cpyrght.htm</TT></A></UL><P><B>10 Big Myths About Copyright Explained.</B> An attempt to answer common mythsabout copyright on the Net and cover issues related to copyright and Usenet/Internetpublication.<UL>	<LI><A HREF="http://www.clari.net/brad/copymyths.html"><TT>http://www.clari.net/brad/copymyths.html</TT></A></UL><P><B>Intellectual Property and the National Information Infrastructure.</B><UL>	<LI><A HREF="http://www.uspto.gov/web/ipnii/"><TT>http://www.uspto.gov/web/ipnii/</TT></A></UL><H2><FONT COLOR="#000077"><B>Sources for General Information</B></FONT></H2><P><B>Section 3 of the Computer Misuse Act 1990: an Antidote for Computer Viruses!</B>Akdeniz, Y. Web Journal of Current Legal Issues, May 24, 1996.<UL>	<LI><A HREF="http://www.ncl.ac.uk/~nlawwww/1996/issue3/akdeniz3.html"><TT>http://www.ncl.ac.uk/~nlawwww/1996/issue3/akdeniz3.html</TT></A></UL><P><B>The Computer Fraud and Abuse Act of 1986.</B><UL>	<LI><A HREF="http://www.law.cornell.edu/uscode/18/1030.html"><TT>http://www.law.cornell.edu/uscode/18/1030.html</TT></A></UL><P><B>Crime on the Internet.</B><UL>	<LI><A HREF="http://www.digitalcentury.com/encyclo/update/crime.html"><TT>http://www.digitalcentury.com/encyclo/update/crime.html</TT></A></UL><P><B>The U.S. House of Representatives Internet Law Library Computers and the Law.</B><UL>	<LI><A HREF="http://orbus.pls.com:8001/his/95.GBM"><TT>http://orbus.pls.com:8001/his/95.GBM</TT></A></UL><P><B>EFF &quot;Legal Issues and Policy: Cyberspace and the Law&quot; Archive.</B><UL>	<LI><A HREF="http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Legal/"><TT>http://www.eff.org/pub/Privacy/Security/Hacking_cracking_phreaking/Legal/</TT></A></UL><P><B>New Computer Crime Statutes Close Loopholes.</B><UL>	<LI><A HREF="http://www.ljx.com/securitynet/articles/0325nlj.htm"><TT>http://www.ljx.com/securitynet/articles/0325nlj.htm</TT></A></UL><P><B>Federal Guidelines for Searching and Seizing Computers.</B> U.S. Departmentof Justice Criminal Division Office of Professional Development and Training. TheReport of the Working Group on Intellectual Property Rights.<UL>	<LI><A HREF="http://www.uspto.gov/web/offices/com/doc/ipnii/"><TT>http://www.uspto.gov/web/offices/com/doc/ipnii/</TT></A></UL><P><B>National Information Infrastructure Protection Act of 1996.</B><UL>	<LI><A HREF="http://www.epic.org/security/1996_computer_law.html"><TT>http://www.epic.org/security/1996_computer_law.html</TT></A></UL><P><B>Fraud and Related Activity in Connection with Access Devices.</B><UL>	<LI><A HREF="http://www.law.cornell.edu/uscode/18/1029.html"><TT>http://www.law.cornell.edu/uscode/18/1029.html</TT></A></UL><P><B>Digital Telephony Bill.</B><UL>	<LI><A HREF="http://www.eff.org/pub/Privacy/Digital_Telephony_FBI/digtel94.act"><TT>http://www.eff.org/pub/Privacy/Digital_Telephony_FBI/digtel94.act</TT></A></UL><P><B>Computer Law Briefs.</B><UL>	<LI><A HREF="http://sddtsun.sddt.com/~columbus/CBA/BBriefs/Wernick.html"><TT>http://sddtsun.sddt.com/~columbus/CBA/BBriefs/Wernick.html</TT></A></UL><CENTER><P><HR><A HREF="../ch30/ch30.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><!--<A HREF="../ch32/ch32.htm"><IMG SRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter" BORDER="0"></A>--><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <BR><BR><BR><IMG SRC="../button/corp.gif" WIDTH="284" HEIGHT="45" ALIGN="BOTTOM" ALT="Macmillan Computer Publishing USA"BORDER="0"></P><P>&#169; <A HREF="../copy.htm">Copyright</A>, Macmillan Computer Publishing. Allrights reserved.</CENTER></BODY></HTML>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?