📄 how the traditional media clasifications fail to protect in t.txt
字号:
disappeared completely beginning with the sixth season episode "Chainof Command," which aired just before the "Galactic Breasts" threadstarted and seemed to spark the discussion. A captain in temporarycommand of the program's starship ordered Sirtis' character to "wear astandard uniform." She hasn't switched back to the revealing uniformsince despite the return of the permissive commanding officer.18 See note 16 above.19 Echo networks are also known as shared network systems andstore-and-forward networks. Though messages may enter the network froma specific point, it passes through many systems before reachingeveryone on the network.Such systems are organized in a hierarchical tree fashion. Naturally,if one of the major hub systems goes down, anyone "downstream" fromthat board is cut off until the hub recovers. In the case ofKnoxville's ILink connection, problems on Data Warp BBS in Houston,Texas would disrupt the mail flow to and from Knoxville and 10 othercities. (Boone, Earl. ILink International Network Map.)Because individual systems vary in how quickly they receive messagesfrom different points on the network, a message entered in one citymay appear on one BBS the next day and another BBS as much as a weeklater. (Public message from a moderator to a user returning from asuspension on how exchanges were delayed due to slow mail delivery.)Internet-based discussions tend to appear on member systems withinminutes or hours. (Just try it.)20 Rose, Lance and Jonathan Wallace. SysLaw, Winona, Minn.: PCInformation Group. p. 15.21 A similar situation occurs with mail loss, a phenomenon consideredto be tamed but never really controlled. As an example: The author oneday noticed replies to the announcement of a new moderator for a StarTrek conference. The original message which named the new moderatornever arrived.22 555 P.2d 556 (Wyo.1976), 2 Med.L.Rptr. 1166.23 Ibid., 564-567, 2 Med.L.Rptr. at 1173-75.24 An interesting idea is that the (limited purpose) public figurestatus could be extended to include online participants who log onfrequently so that they become well known even if they would beconsidered private individuals offline. (Rose and Wallace. p. 75)Their involvement may not necessarily include participation in debateconferences but their identity is common. Even stronger a case mightbe made for users who post numerous messages on topics in debateareas. Debate by its very nature (barring academic mock competitionswhich is not the issue here) demands that someone place themselvesinto the spotlight.25 Rose and Wallace. pp. 8-17.26 See a long-standing argument from ILink's BBSPolicy conferenceJuly-August 1992. See generally messaged labeled "Your Freedom, MyToys" and "Free Speech -- Again." The "common carrier" and "publicforum" principles were initiated by a user.27 Ibid. Property and privacy rights defended by sysops and networkvolunteers.28 Cavasos, Edward A. "Computer Bulletin Board Systems and The Rightof Reply: Redefining Defamation Liability for a New Technology," 12Review of Litigation (Fall 1992) pp. 231-248 at 239-240.29 Your Freedom, My Toys.30 Rose and Wallace. p. 15.31 Hunt, Eric. In the "Opinion Conference" thread from the generalYour Freedom, My Toys discussion (August 6, 1992):"USENET is a full-fledged anarchy. ... It contains some of the mostinformative and technical discussion areas available in cyberspace. Italso contains some of the worst message areas in terms of thesignal/noise ratio."32 Satirical versions may be discovered under alt.fan, however.33 Krol. p. 131.34 LuciferNet is a worthy exception. There are no rules, although oneuser reportedly was expelled for publicly stating that he hoped toembarrass the network and its users. That user also was expelled fromthe ILink network after several concurrent suspensions.35 Kapor, Mitch. "Keep the Switches Open. Prodigy: A Cautionary Tale,"Wired 1.3 (July/August 1993) p. 57.36 Taylor, Marianne. "Users say computer network is muzzling theirgive-and-take," Chicago Tribune, January 7, 1991. sec. 4 p. 1,4 at 4.37 "The Lessons of the Prodigy Controversy," EFF News 1.00 (December10, 1990) lines 444-588.38 Godwin, Mike. "What's Important About the Medphone Libel Case?" 5EFFector Online No. 5 (April 2, 1993) lines 258-436, at ln. 388-389.39 On the ILink echomail network, such attempts at disguising "pottymouth" still warrant warnings from the conference moderator. (Bibich,Larry. Message dated July 14, 1993 in Politics conference listingrules by which users should abide.)40 Gaffin, Adam. Prodigy: Where Is It Going? Available from the filesof the Electronic Frontier Foundation.41 Di Lello, Edward V. "Functional Equivalency and Its Application toFreedom of Speech on Computer Bulletin Boards," 26 Columbia Journal ofLaw and Social Problems (Winter 1993) pp. 199-247, at 207.42 Taylor. sec. 4 p. 4.43 Feder, Barnaby J. "Toward Defining Free Speech in the ComputerAge," The New York Times (November 3, 1991) p. E5.44 Steele, Shari. April 26, 1993 letter to the NationalTelecommunications and Information Administration on behalf of theElectronic Frontier Foundation. The letter was in response to theNTIA's request for comments on hate crimes as related totelecommunications, including computer bulletin boards.45 Godwin at lines 387-389.And a good thing too. Earlier this year, Prodigy user Peter Denigrisposted messages to the Money Talk forum that led to a businessdisparagement suit being filed against Denigris, an investor whoreportedly lost $9,000 on Medphone stock and encouraged others tosteer clear because the company was financially and manageriallyunsecure, and "appears to be a fraud." Prodigy was not named in thesuit. Ibid. See also Lance Rose, "When Modems Squawk, Wall StreetListens," Wired 1.3 (July/August 1993) p. 30 for a brief articleraising the question of a "chilling effect" that resulted on Prodigyduring the discovery portion of the suit.46 Feder.47 Cubby v. CompuServe 776 F.Supp. 135 (S.D.N.Y. 1991)48 Ibid. The Journalism Forum is run by Cameron Communications Inc.under contract with CompuServe.49 Ibid. That statement unfortunately was not the only one at issue asthe court's background statement indicates:"The allegedly defamatory remarks included a suggestion thatindividuals at Skuttlebut gained access to information first publishedin Rumorville `through some back door'; a statement that [Skuttlebutpublisher Robert G.] Blanchard was `bounced' from his previousemployer, WABC; and a description of Skuttlebut as a `new start-upscam.'"50 Garneau, George. "Ruling protects electronic services," Editor &Publisher (November 16, 1991) p. 15.51 Rose and Wallace. p. 12.52 No attempt is made in this paper to defend known pirate boards suchas Rusty & Edie's or Event Horizons, both of which carried copyrightedimages from porn magazines. (Copies of images from both boards areavailable on boards in other cities including Knoxville.)Event Horizons settled out of court with Playboy (Public message datedSeptember 18, 1992 by Lance Rose in ILink's BBSPolicy conference).Rusty & Edie's was temporarily shut down by the FBI after aninvestigation by that agency and the Software Publishers Association,which learned that the board was illegally distributing commercialsoftware. (Hobbs, Michael A. "FBI Shuts Bulletin Board -- CopyrightProbe Begun," Cleveland Plain Dealer, February 17, 1993. See also amessage dated February 27, 1993 in the ILink BBSPolicy conferencenoting the board's return after one month.)53 See a series of alt.censorship posts on USENET dated mid-July 1993.Copy available from author if archives cannot be located.54 Sumrada, Bobbie. "Users' Etiquette Guide to Interlink," ILinkinformation packet as file ILGUIDE.ZIP. Note that ILink(sm) has sincereplaced the term Interlink, which was registered by a packagedelivery service (public posting supported by LegalTrac index).55 Your Freedom, My Toys.56 Ibid.57 Di Lello. pp. 225-226.58 Rose. Cyberspace and the Legal Matrix: Laws or Confusion?Available from the files of the Electronic Frontier Foundation.59 Ibid. at line 360.60 Your Freedom, My Toys. See specifically messages by Glenn Sieb.61 Taviss, Michael L. "Dueling forums: the public forum doctrine'sfailure to protect the electronic forum," 60 University of CincinnatiLaw Review. (Winter 1992) pp. 757-795 at 788.62 Sumrada. For notes on extraneous ASCII, see the sections labeled"Don't quote excessively" and "How to bug your fellow BBSer."See also the "Intelec International E-Mail Network OperationalGuidelines." The Intelec Network Information File. (May 1993) Thelatest release is available on computer bulletin boards asIN-yymm.ZIP, where yy is the year and mm is the month.This document, an unretrievably terse accounting of the network rules,spells out in no uncertain terms that signatures can be no longer thanthree lines and "taglines," the parting witticisms after a signature,may be only one line.Some other networks and/or sysops are not as generous.63 Rose and Wallace. pp. 8-10.64 Ibid. pp. 15-16.65 Though high school libraries and bookstores have been known toaccept such restrictions, the concept that they as a whole abhor thebehavior defends the free expression and distribution of all ideas.66 Pollack, Andrew. "Free-Speech Issues Surround Computer BulletinBoard Use," The New York Times (November 12, 1984), pp. A1, D4. Seealso, Stiff, David. "Computer Bulletin Boards Fret Over Liability forStolen Data," Wall Street Journal (November 9, 1984) p. 33.67 From an announcement in the early 1993 on Data World BBS' newsscreen. That message has since expired and is no longer available.68 Nathan, Paco Xander. "Jackson Wins, Feds Lose," Wired 1.2 (May/June1993) p. 20. Federal District Judge Sam Sparks cited two Federal actswhich the Secret Service violated in its investigation of SteveJackson Games: the Privacy Protection Act barring government officialsfrom searching publishers, and the Electronic Communications PrivacyAct severely limiting who can intercept and read private electronicmail.69 Lehrer, David. "Akron Anomaly BBS Update," 5 Computer undergroundDigest No. 56, File 1. The update by the sysops' father has beenwidely circulated around the Internet; this reference to CuD is onlyone of several where the report can be obtained. The editors at CuDnote:"Subsequent events indicated that the raid was an excessive exercisein local law enforcement zeal. Under pressure, the sysop pleadedguilty to a minor misdemeanor charge to avoid costly legalentanglements. But, the case continues to raise issues ..."70 Kapor. "Where is the Digital Highway Really Heading?" Wired 1.3(July/August 1993), pp. 53-59, 94.71 Rose and Wallace. pp. 71-74.72 Kapor. "Legal and Policy Projects," EFF News 1.03 (March 7, 1991)ln. 115-470, at ln. 117-123, 157-198.73 See: Di Lello, note 41 above;Sassan, Anthony J. "Comparing apples to oranges: the need for a newmedia classification," 5 Software Law Journal (December 1992) pp.821-844; andTaviss, note 61 above.74 Schwartz, John. "Sex Crimes on Your Screen?" Newsweek (December 23,1991) p. 66. After a user received computer graphic files of minorsengaged in sex acts in his private mailbox, America Online presidentSteve Case said: "People ask, `How can you permit this?' It's the samequestion that could be asked to the postmaster general."______________________________________________________________________Jonathan Bell Internet: jmbell@darmok.win.net
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -