📄 computer bulliten boards and the law.txt
字号:
and nonmedia. The plurality opinion suggested that thecrucial distinction was whether the speech involved a "pub-lic issue," "public speech," or an "issue of public con-cern." While Gertz did not clearly draw the distinction, itwas clear to the plurality from the facts of Gertz that sucha limitation was implied. [FN42] As applied to bulletin board systems, it would appearthen that if the BBS is press, New York Times malice wouldbe the rule for defamation involving public issues or publicofficials. As long as the defamation was by one user aboutanother user, the defamed party could be held to have delib-erately "thrust himself into the vortex of this publicissue" in an "attempt to influence the outcome." [FN43] That the issue was of public concern [FN44] could fairly beimplied from the fact of discussion on a public messagebase, subject to rebuttal. Of course, the possibilityalways exists that a user inserted a defamatory statementinto a void, [FN45] in which case the system operator wouldarguably at least have a duty to remove the offending state-ment, absent a privilege to republish. [FN46] One of the difficulties in discussing the defamationissue lies in distinguishing the system operator as "vic-tim," i.e., the innocent republisher of a defamation, fromthe system operator as initial defamer. The operator maybe, but usually is not, the original publisher of an allegeddefamation. [FN47] The system operator is more generally arepublisher of information and, like the bookseller in Smithv. California, [FN48] may not fairly be held to know inadvance the contents of messages left on the bulletin board,let alone whether they are true or false. [FN49] In Smith,the issue was whether the bookseller, absent knowledge ofthe contents, could be held liable for obscene material inhis store. The Court held that he could not. "Every book-seller would be placed under an obligation to make himselfaware of the contents of every book in his shop. It wouldbe altogether unreasonable to demand so near an approach toomniscience...." [FN50] One must be careful, however, whendiscussing the impact of Smith. At least one commentatorhas suggested that the typical application of Smith is that,in the totality of the circumstances surrounding an "adult"bookstore, the bookseller can be inferred to know the con-tents of his merchandise. [FN51] One could suggest thatthe factual situation would be critical in the context of abulletin board system. In manner similar to the Smith bookseller, the systemoperator is not aware of the contents of a message at themoment it is posted. While most system operators review thecontents of most messages left on their bulletin boards mostof the time, it is not always practical to do so, and to theextent that the discussion centers on issues of obviouspublic importance, such prescreening implicates seriousFirst Amendment concerns regarding censorship and chillingdebate on issues of public importance. [FN52] While it is not reasonable to expect system operatorsto be aware of the contents of every message, particularlyas it is posted, the question still remains of what dutythey owe once they become aware of an offending message.Courts interpreting Smith [FN53] generally have appliedsome element of scienter. Once system operators are awarethat offending messages have been posted on the board, theyarguably have a duty to remove the message. [FN54] Proofof scienter might arguably be shown by the totality of thecircumstances surrounding the operation, such as limitedaccess, extensive password protection, or previous patternof abuse. [FN55] Such a pattern might be shown if a bulletin boardsystem has, for example, 16 message areas, 15 of which aregenerally available to the public at large, but one of whichis "hidden" and available only to close friends and associ-ates of the system operator. Such a restricted sub-area("sub"), if used for questionable activities, might moreeasily be distinguishable from the generally accessiblesubs. The operator, by exercising the control necessary tokeep the sub restricted and to grant access to the "chosenfew," could arguably be inferred to have personal knowledgeof the questionable activities. [FN56] A question also arises about whether the system opera-tors might be able to claim a privilege of republication.The primary privilege normally mentioned in bulletin boardcircles is that of the common carrier. The Restatement(Second) of Torts acknowledges a privilege for a commoncarrier to republish a defamation if the "public utility[is] under a duty to transmit messages...." [FN57] Acareful examination suggests that a common carrier privi-lege, however, is neither warranted nor wise. In NationalAss'n of Reg. Util. Comm'rs v. F.C.C., [FN58] the courtformulated a two-part test that would appear to apply tobulletin boards and one which they could arguably pass. Thecase involved cable television. The coaxial cable installedfor distribution of cable television is capable of carryingsignals in the reverse direction. FCC regulations requiredsuch a reverse channel to be available. The FCC originallyhad not completely foreclosed state and local regulation ofthe reverse channel. When it acted to preempt such regula-tion, the plaintiffs in this action sued to void the preemp-tion. The court ruled that the reverse channel was anintrastate common carrier, holding that to be a commoncarrier an entity must first provide indifferent service toall who request it. Many bulletin board systems will nor-mally accept as a user anyone who applies, and many moreaccept anyone who applies whose registration information isnot facially false; e.g., anyone who might provide a namelisted in the applicable telephone directory at the numberprovided. Second, the system must be such that the custom-ers can transmit information of their own choice. In thecase of the bulletin board system, by definition the infor-mation is of the customer's own choice. The difficulty withthis approach, probably fatal if ever adjudicated, is thatno one has yet suggested a duty of bulletin board operatorsto transmit any or all messages submitted to them, or evento open their boards to the public. [FN59] Most bulletinboard systems, after all, are run as a hobby at aloss. [FN60] It would be an absurd result to decide thatmerely by operating a bulletin board system as a hobby, thatan operator mustprovide service to anyonewho asked. [FN61] -Additionally, most system operators reserve the right toedit or delete questionable messages, an action certainlyincompatible with the requirement that on a common carrier,the information be of the customer's own choice. [FN62] (Such a reservation of rights, however, is entirely consis-tent with the editorial discretion inherent in a PressClause model, as is the discretion concerning which fewechoes or message areas, out of the extensive possibilities,should be carried on the system. [FN63] ) In addition, thebulletin board is not a common carrier as that term has beeninterpreted by the FCC, and the courts will normally give"great deference" to the interpretation given by the admin-istrative agency. [FN64] The Federal Communications Com-mission is authorized to regulate interstate commerce bywire or radio. [FN65] Since bulletin board systems operateby connection to the interstate telephone system, and sincemany of them actually are connected [FN66] to an interstatenetwork of computerized bulletin board systems, and since itseems well-settled that the term "interstate commerce" hasan extremely broad meaning, then it would follow that theFCC could assert jurisdiction. While it would logicallyfollow, it seems to this author that it would exceed theprobable intent of the Congress which enacted the Communi-cations Act of 1934. [FN67] The FCC appears to agree with the author. In responseto the "increasing complexity and overlap of communicationssystems in the 1970s," [FN68] the FCC conducted a series ofhearings which has become known as the Second ComputerInquiry. [FN69] The Commission distinguished between"basic" and "enhanced" services. Basic services act as apipe for information without significantly altering it--atransparent path. Enhanced services combine basic servicewith some sort of processing. The Commission retained itstraditional jurisdiction over basic services, but leftenhanced services essentially unregulated. Computerizedbulletin board services were specifically mentioned asenhanced services. [FN70] If it seems likely that bulletin board systems are notcommon carriers, it also seems wise. We saw in the discus-sion of defamation, supra, that bulletin boards might argu-ably be characterized as press. While the discussion wasbased on access to information, it was noted that a logicalextension could be made. One such likely extension is to aprivilege of republication. In 1977, the United StatesSupreme Court denied certiorari to Edwards v. NationalAudubon Society, Inc. [FN71] In Edwards, the editor of anAudubon Society magazine characterized scientists usingSociety data to support the continued use of the pesticideDDT as "paid liars." [FN72] The New York Times accuratelyreported the charges. Five scientists sued both AudubonSociety and the Times. The Second Circuit dismissed thejudgment against the Times, finding a privilege of neutralreporting essential to the operation of the Press Clause ofthe First Amendment. [FN73] While the precedential valueof "cert. denied" is of uncertain value, the decision standsin the Second Circuit. The courts are split about whetherthe "neutral reporting" privilege is valid. [FN74] Manyhave accepted it and many have refused to accept it. [FN75] If there is any validity to it, however, it should apply tobulletin boards. The editors of the New York Times, afterall, had the option (editorial discretion) not to publish.In contrast, inherent in the nature of the bulletin board isimmediate republication. The operator may only, once hebecomes aware of the libel, remove it. No editorial choiceis exercised immediately, and in the case of networkedsystems, an intervening mail event will cause the question-able matter to be republished widely before the systemoperator has the reasonable opportunity to take any action.At least to the extent that bulletin board systems facili-tate discussion of matters of public importance, and atleast to the extent that the Edwards privilege is evervalid, the neutral (fair) reporting privilege should applyto bulletin boards. [FN76] This application of theneutral/fair reporting privilege would, it seems to theauthor, be a better solution to the problem of republicationthan common carrier recognition, as it would leave thesystem operator with the independence and discretion implic-it in a hobby. [FN77] Civil and Criminal Liability for Contents of Messages In a similar manner, system operators have been chargedwith various criminal violations based on the contents ofmessages left on their bulletin boards. [FN78] One of theearliest reported cases involved a Mr. Tcimpidis, who wascharged solely because of information posted on his bulletinboard containing stolen telephone credit card numbers. Theexact basis of the charge is missing from the reviews;however, one can surmise that it was for aiding and abettingor some similar theory, in that charges were later droppedfor lack of evidence of knowledge or intent. [FN79] Re-cently, the "Sun Devil" investigation by the United StatesSecret Service has resulted in the seizure of computerequipment and at least the temporary cessation of activitiesat several bulletin board systems. Boards operated by Mr.Craig Neidorf and one outside Chicago, called "JOLNET" have,for example, ceased operations. The JOLNET operator, a Mr.Rich Andrews, initiated contact with the Secret Service whenhe became aware of potentially illegal activity on hisboard. Notwithstanding 18 U.S.C. 2703 et seq., whichappear to prefer solicitation of archival copies and backuprecords of such systems, the Secret Service seized theactual computer equipment as evidence, shutting down thesystem. [FN80] Such seizures would appear to be troublesome to theextent that a bulletin board system may fairly be said to besome kind of a forum provided for the public discussion ofmatters of importance. [FN81] One cannot foresee a more"chilling" effect on free speech than to be frozen to death--or shut down by seizure. Privacy Concerns and the Fourth Amendment The discussion above briefly mentioned that some bulle-tin board systems had been seized, apparently without regardto the presence of electronic mail. While search and sei-zure and privacy issues are not directly pertinent to apaper on mass communications law, they seem to the author tobe inextricably combined in any discussion of bulletinboards. Virtually every bulletin board system providesfacilities forsome sort ofprivate, electronic mail. [FN82] - One case in California involved a foundation known asALCOR, which practiced cryogenic preservation of people whodied from what they hoped would, in the future, be a treat-able disease. ALCOR came under investigation on chargesthey had preserved some people a little hastily, essentiallya charge of some kind of homicide. While no serious commen-tator has suggested that the case should not have beeninvestigated, the problem appears to be that the founda-tion's electronic mail system was seized with undeliveredmail still in storage. The system was apparently accessibleto the public. [FN83] ALCOR sued under 42 U.S.C. 1983for the return of the system and damages, alleging, interalia, that the government violated the provisions of theElectronic Communication Privacy Act of 1986 (ECPA). [FN84] A decision has not yet been reached in the case. The only other known action involving the privacyprovisions of the ECPA is Thompson v. Predaina. [FN85] Auser accused a system operator, inter alia, of causingprivate messages to be made public without the permission ofthe sender or intended recipient, thereby violating the act.The complaint was voluntarily dismissed prior to trial onthe merits. Predaina would have been an ideal opportunityfor judicial construction of the latest Congressional at-tempt to define the privacy protections of the electronicworld. As the technological complexity of society increasinglydraws us into the electronic world, privacy issues become ofmore concern to more people. The responsibilities and dutyof care of a system operator to the users of the system,regarding whatever reasonable expectation of privacy theymay have, would seem to be something each system operatorwould want to know. Experience in both this class and inthe real world tells the prudent observer of the legal scenethat Congress passing an Act is but the first step in anarea filled with First and Fourth Amendment concerns. Itwould have been helpful for a judicial construction of theECPA, but that will of necessity wait for another time. There is, from empirical data, [FN86] a connec-tion between the earlier discussion of liability for defama-tion and illegal activities and liability for privacy. ManyFrom kadie Sat Oct 12 09:51:10 1991To: cafb-mail~Subject: Computers and Academic Freedom mailing list (batch edition)Status: RComputers and Academic Freedom mailing list (batch edition)Sat Oct 12 09:50:57 EDT 1991[For information on how to get a much smaller edited version of the
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -