⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 computer bulliten boards and the law.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
      ment Corp., may  participate in the filing of a lawsuit      against Bellsouth, and Terry Gross,  an attorney at the      New York law firm of Rabinowitz Boudin Standard Krinsky      & Lieberman.      ``The  Electronic Frontier  Foundation is  concerned by      the      irresponsibility of  Bellsouth  of  claiming  from  the      outset that  this was confidential information  when it      should have known that it was not,'' Gross said.FN23.  The unsettled state of  the law may be discovered  byreviewing the current writing on  the subject, at least someof which is listed in note 28, infra.FN24.  Legi-Tech, Inc.,  v. Keiper,  766 F.2d  728 (2d  Cir.1985).FN25.  Id.FN26.  The narrow holding in Legi-Tech was that an electron-ic  information  and retrieval  service  is "press"  for thepurpose of access to government  information.  The commenta-tor  extends  this  holding from  information  retrieval  tobulletin boards, and suggests that it  would extend at leastas far as  defamation actions.   He then appears to  abandonthis line, as he reads Dun & Bradstreet, note 30, infra, andaccompanying text, as  negating the need for such a distinc-tion.FN27.  Comment,  An  Electronic  Soapbox: Computer  BulletinBoards  and the  First  Amendment, 39  FED.  COMM. L.J.  217(1987) (authored by Eric L. Jensen).FN28.  The Jensen article, supra note 27, for example pays agreat  deal of attention  to the libel  question.  Liabilityfor  defamation is also discussed  in Soma, Smith & Sprague,Legal Analysis of Electronic Bulletin Board Activities, 7 W.NEW ENG. L. REV.  571 (1985); Becker, The Liability  of Com-puter  Bulletin Board  Operators  for  Defamation Posted  byOthers, 22 CONN. L.  REV. 203 (1989); and Comment,  ComputerBulletin  Board  Operator  Liability  for  User  Misuse,  54FORDHAM  L.  REV. 439  (1985).   The  subject  is frequentlydiscussed  within the framework  of bulletin  board systems,particularly in those message areas devoted to system opera-tors, and at least one paper on the subject is electronical-ly distributed:  Kahn, Defamation Liability  of ComputerizedBulletin Board  Operators  and  Problems  of  Proof  (1989),available by anonymous ftp from the archives of the InternetTelecommunications Digest,  lcs.mit.edu, directory  telecom-archives,  as sysop.libel.liability.   It is  also availablefrom the author of this paper.FN29.  New York Times v. Sullivan, 376 U.S. 254 (1964).FN30.  Dun &  Bradstreet, Inc. v. Greenmoss  Builders, Inc.,105 S. Ct. 2939 (1985).FN31.  Robert Welch, Inc., v. Gertz, 418 U.S. 323 (1974).FN32.  376 U.S. 254 (1964).FN33.  Id.FN34.  390 U.S. 727 (1968).  In  St. Amant, a candidate readon television statements received from a union official thathad been made  under oath.  The court found  that the candi-date's failure to investigate the  statements' truth was notreckless  disregard  for  the purpose  of  "New  York Times"malice.FN35.  There "must  be  sufficient evidence  to  permit  theconclusion that  the defendant  in fact  entertained seriousdoubts as  to the truth  of his publication."   390 U.S. 727(1968).FN36.  See  generally,  the samples  from  the  POLITICS andSERIOUS SIDE echoes attached at the end of this paper.FN37.  418 U.S. 323 (1974).FN38.  The case  was remanded for  retrial, as the  jury hadfound  liability without  fault  being  established and  hadawarded $50,000 without proof of damages.  Id.FN39.  376 U.S. 254.FN40.  418 U.S. 323.FN41.  472 U.S. 749 (1985).FN42.  472 U.S. 749.FN43.  Gertz.FN44.  Dun & Bradstreet.FN45.  Dare I say, "amorphous void?"FN46.  See generally,the discussionof republication,notes 57- 77, infra, and accompanying text.FN47.  See generally, Jensen, supra note 27.FN48.  Smith v. California, 361 U.S. 147 (1959).FN49.  See both Jensen and Soma, supra note 28.FN50.  Smith v. California, 361 U.S. at 153-4.FN51.  Interview with Professor  John Snowden, University ofNebraska College of Law, August 4, 1990.FN52.  See Comment, Computer Bulletin Board Operator Liabil-ity for User Misuse,  54 FORDHAM L. REV. 439,  447-9 (1985).Attached at the end of this paper is a sample of the debatesrecently carried in  message echoes  available in the  Omahaarea.FN53.  Smith v. California, 361 U.S. 147 (1959).FN54.  United States  v. Mishkin,  317 F.2d  634 (2d  Cir.),cert denied, 375 U.S. 827 (1963).FN55.  In  Gold v.  United States,  378 F.2d  588 (9th  Cir.1967),  the defendant knew the detailed shipping identifica-tion of the parcel in question; in United States v. Mishkin,317 F.2d 634  (2d Cir.), cert  denied, 375 U.S. 827  (1963),the defendant was held to  have scienter of obscene contentsbased on the clandestine nature of the transaction.FN56.  The  hypothetical  becomes  real  in  the  electronicworld.   "Dr. Ripco" operated  a bulletin board  in Chicago,one  which  included  electronic  mail  (see generally,  thelimited  discussion of  electronic mail,  infra), which  in-cluded  a restricted  access sub  called "phone phun."   TheSecret Service recently executed a search warrant and seizedhis system in an ongoing investigation, the details of whichhave not  yet been released.   While Dr.  Ripco has  not yetbeen charged, he  relates the existence of the  "phone phun"sub was prominent  when he was  interrogated at the time  ofthe search and seizure.   CuD, Vol. 1.28 (1990), distributedelectronically and  available from  the author.   While  Dr.Ripco's knowledge, if any, was about illegal activities, onecan easily  see a similar  argument being made  about libel.If system operators carefully control  access to an area, orif the  operators frequently  participate in the  discussionwhere a libel is committed, then activities of  the operatorcould lead to  a presumption of  knowledge of the libel  andliability at least  for failure  to promptly remove,  absentsome privilege.   See the  discussion of a  possible Edwardsprivilege, infra.FN57.  RESTATEMENT (SECOND) OF TORTS   612 (1977).FN58.  533 F.2d 601 (D.C. Cir. 1976).FN59.  See Jensen, supra note 27, at 251.FN60.  See Soma, Smith & Sprague, supra n. 8.FN61.  "The Restatement privilege recognizes `that a [commoncarrier],  which with  very  limited exceptions  extends itsfacilities to all users, has exhibited no actual or  implied"malice"  when  it  merely refuses  to  censor  a particularcommunication.'"  39 FED.  COMM. L.J.  217 at  250, n.  173,citing Anderson v.  New York Telephone  Co., 42 A.D.2d  151,345  N.Y.S.2d  745  (1973)  (dissenting  opinion), rev'd  35N.Y.2d 746, 361  N.Y.S.2d 913 (1974) (emphasis added).   Seealso note 59, supra.FN62.  553 F.2d 601.FN63.  See generally, the listing attached  to this paper ofmessage  echo  areas available  to  system operators  in theOmaha, Nebraska, vicinity.FN64.  Notwithstanding the  ultimate holding adverse  to theFCC, the court  in National Ass'n  of Reg. Util. Comm'rs  v.F.C.C. went to  some lengths  to acknowledge the  principle,and then to  distinguish it on the facts in the case at bar.553 F.2d 601.FN65.  47 U.S.C.   151 (1982).FN66.    They are connected in the logical sense, if not thephysical sense, as computer theorists use the terms.FN67.  June 19, 1934, c. 652, 48 Stat. 1064.FN68.  Comment,  An  Electronic  Soapbox: Computer  BulletinBoards and the First Amendment, 39 FED. COMM. L.J. 217, 220.FN69.  Second Computer Inquiry,  Final Decision, 77 F.C.C.2d384, 47 R.R.2d 669 (1980), reconsidered  84 F.C.C.2d 512, 50R.R.2d 629 (1981),  aff'd sub  nom. Computer and  Communica-tions Indus.  Assn'n  v. F.C.C.,  693  F.2d 198  (D.C.  Cir.1982), cert. den., 461 U.S. 938 (1983).FN70.  "In an enhanced  service the content of  the informa-tion need  not be changed and may  simply involve subscribedinteraction with stored information.  Many enhanced servicesfeature  voice or data  storage and  retrieval applications,such as in a 'mail box' service."  Id. at 421.FN71.  556  F.2d 113  (2d Cir.  1977), cert.  den. sub  nom.Edwards v. New York Times Co., 434 U.S. 1002 (1977).FN72.  The pesticide DDT  had been criticized as  harmful tomany kinds of wildlife, particularly following  the publica-tion of  Rachel Carson's book  Silent Spring.   The NationalAudubon Society had  for many years conducted  periodic birdcounts.    The counts  could  be interpreted  to  show that,contrary to the anti-DDT concerns, bird life was increasing.The  Audubon  Society  felt  that statistical  reasons,  notactual wildlife increases, were  responsible for the  anoma-lous count data  and opposed the use of its  data to supportDDT.  556 F.2d 113.FN73.  Id.FN74.  Magnetti, "In the  End the Truth  Will Out" . . .  OrWill It?, 52 MISS. L. REV. 299, 329-331 (1987).FN75.  Id.FN76.  The privilege of fair reporting, after all, should atthe minimum include the actual words of the original author,nothing more and nothing  less being said, which is  exactlywhat the bulletin board republishes.FN77.  The question would  arise of what judgment  was exer-cised if anyone could post a message.  The judgment arguablywould in the first instance be the exercise of discretion inawarding access to the  system.  See Soma, Smith  & Sprague,supra.  The  final exercise  of judgment would  be when  theeditor/system operator removed or left in place a potential-ly offending  message.   Removal would  be  the exercise  ofeditorial judgment, leaving in place an exercise of neutral-ly reporting what the individual already had said.FN78.  A Mr. Len Rose was recently indicted for the theft ofAmerican Telephone and Telegraph  Company software detailingthe  operation of  the  "E911"  emergency telephone  system.Several other individuals were charged because the software,either without their knowledge, or  with their knowledge butwithout their  knowing it was  stolen, was stored  or trans-mitted  by their systems.  (This is the same theft where Mr.Biggs was convicted.   See  n. 21,  supra, and  accompanyingtext.)  A final decision has  not been reached in Mr. Rose'scase.  A copy  of the Rose indictment is available  from theauthor.  Various versions of the other charges are availablein issues of the Computer  Underground Digest available fromthe author.FN79.  Soma, Smith & Sprague,  Legal Analysis of  ElectronicBulletin Board Activities,  7 W. NEW  ENG. L. REV. 571,  605(1985).FN80.  Computer  Underground   Digest,  various   electroniceditions,  available  from the  author.   The parallel  to apamphleteer  would  be the  seizure  of his  printing press.Particularly troublesome  is that the  warrants, apparently,did not specify seizure of the electronic mail stored on thesystem.  An action is pending in a California case.FN81.  Public importance might not be  the only First Amend-ment concern--the Speech Clause, on its face, does not limititself to public importance--but would be applicable to mostbulletin board systems with which the author is familiar.FN82.  Hernandez, ECPA and Online Computer Privacy,  41 FED.COMM. L.J. 17 (1989).FN83.  Copies of most of the pleadings  to date in the ALCORcase are available from the author.FN84.  The relevant  portions of  the Electronic  Communica-tions Privacy Act as recorded in  the United States Code areset out in an attachment to this paper.FN85.  Complaint,  Thompson v.  Predaina,  No. 88-93C  (S.D.Indiana  1988),  dismissed August  10th,  1988.   One sourcerelates the dismissal  was voluntary.   Hernandez, ECPA  andOnline  Computer  Privacy,  41 FED.  COMM.  L.J.  17 (1989).Another source  indicates the  dismissal was  caused by  thedefendant's filing bankruptcy, thereby automatically stayingthe prosecution of the suit.  Wilson, message in Fidonet:LAWecho (1990).  An electronic copy  of the complaint is avail-able from the author.FN86.  By "empirical data" the author means that he continu-ally receives questions from fellow  sysops who, knowing himto be a law student, verbalize questions about their liabil-ity  exposure over  the range  of issues  discussed in  thispaper.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -