⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer bulliten boards and the law.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
and  nonmedia.   The  plurality  opinion suggested  that thecrucial distinction was whether the  speech involved a "pub-lic issue,"  "public speech,"  or an  "issue of public  con-cern."  While Gertz did not clearly draw the distinction, itwas clear to the plurality from the facts of Gertz that sucha limitation was implied. [FN42]      As applied to  bulletin board systems, it  would appearthen that if the BBS  is press, New York Times malice  wouldbe the rule for defamation involving public issues or publicofficials.  As long as the  defamation was by one user aboutanother user, the defamed party could be held to have delib-erately  "thrust  himself  into the  vortex  of  this publicissue"  in an  "attempt  to influence  the outcome." [FN43] That the issue was of public concern [FN44]  could fairly beimplied  from  the fact  of discussion  on a  public messagebase,  subject  to  rebuttal.   Of  course,  the possibilityalways exists that  a user  inserted a defamatory  statementinto a void, [FN45]  in which case the system operator wouldarguably at least have a duty to remove the offending state-ment, absent a privilege to republish. [FN46]      One of  the difficulties in  discussing the  defamationissue lies in  distinguishing the  system operator as  "vic-tim," i.e., the  innocent republisher of a  defamation, fromthe system  operator as initial  defamer.  The  operator maybe, but usually is not, the original publisher of an allegeddefamation. [FN47]   The system operator is more generally arepublisher of information and, like the bookseller in Smithv. California, [FN48]  may  not fairly  be held  to know  inadvance the contents of messages left on the bulletin board,let alone whether they are true or false. [FN49]   In Smith,the issue was  whether the  bookseller, absent knowledge  ofthe contents, could  be held liable for  obscene material inhis store.   The Court held that he could not.  "Every book-seller  would be placed under  an obligation to make himselfaware of  the contents of every book in  his shop.  It wouldbe altogether unreasonable  to demand so near an approach toomniscience...." [FN50]   One must be careful, however, whendiscussing the  impact of Smith.   At least  one commentatorhas suggested that the typical application of Smith is that,in the totality of the  circumstances surrounding an "adult"bookstore, the bookseller  can be inferred to  know the con-tents of his  merchandise. [FN51]    One could suggest  thatthe factual situation would be critical  in the context of abulletin board system.     In manner similar  to the Smith bookseller,  the systemoperator is not  aware of the contents  of a message  at themoment it is posted.  While most system operators review thecontents of most messages left on their bulletin boards mostof the time, it is not always practical to do so, and to theextent  that  the discussion  centers  on issues  of obviouspublic  importance,  such  prescreening  implicates  seriousFirst Amendment  concerns regarding censorship  and chillingdebate on issues of public importance. [FN52]        While it is  not reasonable to expect  system operatorsto be aware of the  contents of every message,  particularlyas it is  posted, the  question still remains  of what  dutythey  owe once they  become aware  of an  offending message.Courts  interpreting  Smith [FN53]   generally have  appliedsome element of scienter.   Once system operators  are awarethat  offending messages have been posted on the board, theyarguably have a  duty to remove the  message. [FN54]   Proofof scienter might arguably  be shown by the totality  of thecircumstances  surrounding the  operation,  such as  limitedaccess, extensive  password protection, or  previous patternof abuse. [FN55]      Such a  pattern  might be  shown  if a  bulletin  boardsystem has, for example,  16 message areas, 15 of  which aregenerally available to the public at large, but one of whichis  "hidden" and available only to close friends and associ-ates of  the system  operator.   Such a  restricted sub-area("sub"),  if used  for questionable  activities, might  moreeasily  be  distinguishable  from the  generally  accessiblesubs.  The operator, by exercising the control  necessary tokeep the sub restricted  and to grant access to  the "chosenfew," could arguably be inferred  to have personal knowledgeof the questionable activities. [FN56]      A question also arises about  whether the system opera-tors might be  able to claim  a privilege of  republication.The  primary privilege normally  mentioned in bulletin boardcircles  is that  of the  common carrier.   The  Restatement(Second)  of  Torts acknowledges  a  privilege for  a commoncarrier to  republish a  defamation if  the "public  utility[is]  under  a  duty to  transmit  messages...." [FN57]    Acareful examination  suggests that  a common  carrier privi-lege, however, is neither warranted  nor wise.  In  NationalAss'n of  Reg. Util.  Comm'rs v.  F.C.C., [FN58]  the  courtformulated a  two-part test  that would  appear to apply  tobulletin boards and one which they could arguably pass.  Thecase involved cable television.  The coaxial cable installedfor distribution of cable television  is capable of carryingsignals in the reverse direction.   FCC regulations requiredsuch a reverse channel to be  available.  The FCC originallyhad not completely foreclosed state  and local regulation ofthe reverse channel.  When it  acted to preempt such regula-tion, the plaintiffs in this action sued to void the preemp-tion.    The court  ruled that  the  reverse channel  was anintrastate  common  carrier,  holding that  to  be  a commoncarrier an entity must first  provide indifferent service toall who request it.   Many bulletin board systems  will nor-mally accept as  a user  anyone who applies,  and many  moreaccept anyone  who applies whose registration information isnot facially false;  e.g., anyone who  might provide a  namelisted in the  applicable telephone directory at  the numberprovided.  Second, the system must  be such that the custom-ers can transmit  information of their  own choice.  In  thecase of the bulletin board system, by  definition the infor-mation is of the customer's own choice.  The difficulty withthis approach, probably  fatal if ever adjudicated,  is thatno one has yet suggested a  duty of bulletin board operatorsto transmit any or  all messages submitted to them,  or evento  open their boards to  the public. [FN59]   Most bulletinboard  systems,  after  all,  are  run   as  a  hobby  at  aloss. [FN60]   It would  be an absurd result to  decide thatmerely by operating a bulletin board system as a hobby, thatan operator mustprovide service to anyonewho asked. [FN61] -Additionally, most  system operators reserve  the right toedit  or delete  questionable messages, an  action certainlyincompatible with the requirement that  on a common carrier,the  information be  of the  customer's own  choice. [FN62] (Such a reservation of rights,  however, is entirely consis-tent  with  the  editorial discretion  inherent  in  a PressClause  model,  as is  the  discretion concerning  which fewechoes or message areas, out of the extensive possibilities,should  be carried on the system. [FN63] )  In addition, thebulletin board is not a common carrier as that term has beeninterpreted by the  FCC, and the  courts will normally  give"great deference" to the interpretation  given by the admin-istrative agency. [FN64]    The Federal  Communications Com-mission  is  authorized to  regulate interstate  commerce bywire or radio. [FN65]   Since bulletin board systems operateby connection to the interstate  telephone system, and sincemany of them actually are connected [FN66]  to an interstatenetwork of computerized bulletin board systems, and since itseems well-settled  that the term "interstate  commerce" hasan extremely broad  meaning, then it  would follow that  theFCC could  assert jurisdiction.   While  it would  logicallyfollow, it seems  to this  author that it  would exceed  theprobable intent of  the Congress which enacted  the Communi-cations Act of 1934. [FN67]        The FCC appears to agree with  the author.  In responseto the "increasing complexity  and overlap of communicationssystems in the 1970s," [FN68]  the FCC conducted a series ofhearings   which  has become  known as  the  Second ComputerInquiry. [FN69]     The  Commission   distinguished  between"basic" and  "enhanced" services.   Basic services act  as apipe for  information without  significantly altering  it--atransparent  path.  Enhanced  services combine basic servicewith some sort  of processing.  The  Commission retained itstraditional  jurisdiction  over  basic  services,  but  leftenhanced  services  essentially  unregulated.   Computerizedbulletin  board  services  were  specifically  mentioned  asenhanced services. [FN70]      If it seems likely that bulletin board  systems are notcommon carriers, it also seems wise.   We saw in the discus-sion of defamation, supra, that  bulletin boards might argu-ably  be characterized as  press.  While  the discussion wasbased on access to information, it  was noted that a logicalextension  could be made.  One such likely extension is to aprivilege  of  republication.   In  1977, the  United StatesSupreme  Court  denied  certiorari  to Edwards  v.  NationalAudubon Society, Inc. [FN71]    In Edwards, the editor of anAudubon  Society  magazine  characterized  scientists  usingSociety data to support  the continued use of the  pesticideDDT as "paid liars." [FN72]   The  New York Times accuratelyreported the  charges.   Five scientists  sued both  AudubonSociety and  the Times.   The  Second Circuit  dismissed thejudgment against the  Times, finding a privilege  of neutralreporting essential to the operation  of the Press Clause ofthe First  Amendment. [FN73]   While the  precedential valueof "cert. denied" is of uncertain value, the decision standsin the Second Circuit.   The courts are split  about whetherthe  "neutral reporting" privilege  is valid. [FN74]    Manyhave accepted it and many have refused to accept it. [FN75] If there is any  validity to it, however, it should apply tobulletin boards.  The  editors of the New York  Times, afterall, had the  option (editorial discretion) not  to publish.In contrast, inherent in the nature of the bulletin board isimmediate republication.   The  operator may  only, once  hebecomes aware of the libel, remove  it.  No editorial choiceis  exercised  immediately,  and in  the  case  of networkedsystems, an intervening mail event  will cause the question-able  matter  to  be republished  widely  before  the systemoperator has the reasonable opportunity  to take any action.At  least to the extent that  bulletin board systems facili-tate  discussion  of matters  of  public importance,  and atleast to  the  extent that  the  Edwards privilege  is  evervalid,  the neutral (fair)  reporting privilege should applyto  bulletin  boards. [FN76]     This  application  of   theneutral/fair  reporting  privilege would,  it  seems to  theauthor, be a better solution to the problem of republicationthan  common  carrier  recognition, as  it  would  leave thesystem operator with the independence and discretion implic-it in a hobby. [FN77]     Civil and Criminal Liability for Contents of Messages     In a similar manner, system operators have been chargedwith various criminal  violations based  on the contents  ofmessages  left on their bulletin boards. [FN78]   One of theearliest reported cases  involved a  Mr. Tcimpidis, who  wascharged solely because of information posted on his bulletinboard containing stolen telephone credit  card numbers.  Theexact  basis of  the  charge is  missing  from the  reviews;however, one can surmise that it was for aiding and abettingor some similar theory, in  that charges were later  droppedfor lack  of evidence of  knowledge or intent. [FN79]    Re-cently, the "Sun  Devil" investigation by the  United StatesSecret  Service  has  resulted in  the  seizure  of computerequipment and at least the temporary cessation of activitiesat several  bulletin board systems.  Boards  operated by Mr.Craig Neidorf and one outside Chicago, called "JOLNET" have,for example, ceased operations.  The JOLNET  operator, a Mr.Rich Andrews, initiated contact with the Secret Service whenhe  became  aware  of potentially  illegal  activity  on hisboard.    Notwithstanding 18  U.S.C.   2703  et seq.,  whichappear to prefer solicitation of  archival copies and backuprecords  of  such  systems, the  Secret  Service  seized theactual  computer equipment  as evidence,  shutting  down thesystem. [FN80]      Such seizures  would appear  to be  troublesome to  theextent that a bulletin board system may fairly be said to besome kind of a  forum provided for the public  discussion ofmatters of importance. [FN81]    One  cannot foresee a  more"chilling" effect on free speech than to be frozen to death--or shut down by seizure.          Privacy Concerns and the Fourth Amendment     The discussion above briefly mentioned that some bulle-tin board systems had been seized, apparently without regardto the presence of  electronic mail.  While search  and sei-zure and  privacy  issues are  not directly  pertinent to  apaper on mass communications law, they seem to the author tobe  inextricably  combined  in  any discussion  of  bulletinboards.   Virtually  every bulletin  board  system  providesfacilities forsome sort ofprivate, electronic mail. [FN82] -  One  case  in California  involved  a foundation  known asALCOR, which  practiced cryogenic preservation of people whodied from what they hoped would,  in the future, be a treat-able disease.   ALCOR  came under  investigation on  chargesthey had preserved some people a little hastily, essentiallya charge of some kind of homicide.  While no serious commen-tator  has  suggested that  the  case should  not  have beeninvestigated, the  problem appears  to be  that the  founda-tion's electronic  mail system  was seized with  undeliveredmail still in storage.  The system was apparently accessibleto the  public. [FN83]   ALCOR  sued under 42  U.S.C.   1983for the  return of the  system and damages,  alleging, interalia, that  the government  violated the  provisions of  theElectronic Communication Privacy Act of 1986 (ECPA). [FN84] A decision has not yet been reached in the case.     The  only  other  known action  involving  the  privacyprovisions of the ECPA  is Thompson v. Predaina. [FN85]    Auser  accused  a  system operator,  inter  alia,  of causingprivate messages to be made public without the permission ofthe sender or intended recipient, thereby violating the act.The complaint was  voluntarily dismissed  prior to trial  onthe merits.   Predaina would have been  an ideal opportunityfor judicial  construction of  the latest  Congressional at-tempt to define  the privacy  protections of the  electronicworld.     As the technological complexity of society increasinglydraws us into the electronic world, privacy issues become ofmore  concern to more people.  The responsibilities and dutyof  care of a  system operator to  the users  of the system,regarding whatever  reasonable expectation  of privacy  theymay have,  would seem to  be something each  system operatorwould want  to know.   Experience in both this  class and inthe real world tells the prudent observer of the legal scenethat Congress  passing an Act  is but  the first step  in anarea filled with  First and Fourth  Amendment concerns.   Itwould have been helpful for  a judicial construction of  theECPA, but that will of necessity wait for another time.          There is, from  empirical data, [FN86]  a  connec-tion between the earlier discussion of liability for defama-tion and illegal activities and liability for privacy.  ManyFrom kadie Sat Oct 12 09:51:10 1991To: cafb-mail~Subject: Computers and Academic Freedom mailing list (batch edition)Status: RComputers and Academic Freedom mailing list (batch edition)Sat Oct 12 09:50:57 EDT 1991[For information on how to get a much smaller edited version of the

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -