⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 defamation liability of computerized bulliten board operators.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
             D E F A M A T I O N   L I A B I L I T Y                                O F                      C O M P U T E R I Z E D          B U L L E T I N   B O A R D   O P E R A T O R S             A N D   P R O B L E M S   O F   P R O O F                                        John R. Kahn                                       CHTLJ Comment                                       Computer Law Seminar                                       Upper Division Writing                                       February, 1989                                                                              ---             D E F A M A T I O N   L I A B I L I T Y                                O F                      C O M P U T E R I Z E D          B U L L E T I N   B O A R D   O P E R A T O R S             A N D   P R O B L E M S   O F   P R O O F John R. KahnCHTLJ Comment/Upper Division Writing/Computer Law SeminarFebruary, 1989_________________________________________________________________I.  INTRODUCTION             A  computer  user  sits  down  at her personal computer, turns  it  on, and has it dial the number of a local computerized bulletin  board  service  (BBS)  where  she  has  been exchanging opinions,    information,    electronic    mail,   and   amicable conversation  with other users. Upon connecting with the BBS, she enters  a secret "password", presumably known only to herself and to  the  bulletin  board  operator,  so  as to gain access to the system.         To  her  surprise,  she  finds herself deluged with lewd electronic  mail  from  complete  strangers  and hostile messages from  persons  with  whom she believed she was on friendly terms. The messages read: "Why did you call me a worthless son-of-a -----  yesterday? I really thought we could be friends, but I guess I was  wrong";  "Hey, baby, I liked your fetish you were telling me about  yesterday:  call  me at home, or I'll call YOU"; and, "Why didn't  you  get around to telling me about your venereal disease sooner?".  Yet  our user has not called this BBS in weeks and has never  made  any  of  these statements. Dismayed and angered, the ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              2----------------------user  comes  to  realize  that  she is the victim of computerized bulletin board abuse.         A  personal  computer  hobbyist  (hereafter "SYSOP") who operates  a  computerized bulletin board system notices a rash of heated  arguments, profanity and complaints being reported to him by  users  on  what had been a forum for the peaceful exchange of ideas.   Investigating   the   complaints,   he   discovers  that previously     responsible     users     have     suddenly    and uncharacteristically  been  leaving  insulting,  rude  and  false messages  about other users on the bulletin board. One user is so enraged   about   a   public   message  accusing  her  of  sexual misadventures  that  she  is  threatening  to  sue  the  computer hobbyist  in  libel  for  having permitted the message to appear. The  SYSOP  realizes  that  both  he  and  his  subscribers  have suffered computerized bulletin board abuse.         The  aggravating  force behind both the above situations is   most   likely   a   third  user  (known  hereafter  as  "the masquerader")   who   maliciously   exploits  both  his  computer knowledge  and  his  access  to  BBSes. Since the masquerader has discovered  the  password  and name of the regular user, and uses them  to  access  bulletin boards, he appears for all intents and purposes  to  be that regular user. The computer thus believes it has  admitted a legitimate subscriber to its database when it has in  fact  given  almost  free  reign  to  a  reckless hacker. The masquerader,  posing  as another legitimate user, is then free to portray  that  user  in  whatever  light  he  pleases and also to harass other users of the bulletin board.---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              3----------------------         When  validated  users  later discover that someone else has   been  impersonating  them,  they  invariably  cancel  their subscriptions  to  that  BBS  and often bring a defamation action against   its  SYSOP  for  the  smearing  of  their  good  names. Conversely,   the   SYSOP,  in  an  effort  to  avoid  liability, reluctantly  engages  in  monitoring  each  and  every  piece  of information  posted  daily  by  hundreds  of  users. If the SYSOP chooses  instead  to  stop  running  his  BBS altogether, another efficient and valuable forum for ideas is lost.         What  sort of defamation action may be maintained by the wrongfully  disparaged  user?  Is the computerized bulletin board offered  by  the  SYSOP  subject to the stricter self-scrutiny of newspapers,  or  does  it operate under some lesser standard? How may  the  initial  party  at  fault  -  the masquerader - be held accountable for his computerized torts?         The  scope  of  this  Comment  will  be  to  examine the defamation   liability   of   computerized   BBS   operators  and evidentiary  proof  issues  that  arise  in  tracing computerized defamation  to  its  true  source.  Other possible Tort causes of action  -  intentional infliction of emotional distress, invasion of  privacy,  trespass  to  chattels  -  are not addressed. It is assumed  throughout  that  the  plaintiff is a private person and that  the issues involved are not matters of "public interest" as defined in Gertz v. Robert Welch, Inc.1    A.   Background         Computerized  BBSes exist as a quick, easy and efficient way   to  acquire  and  exchange  information  about  the  entire ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              4----------------------spectrum   of   interests.2   The  growing  popularity  of  these electronic  forums  was  demonstrated  in  a  recent  study which numbered  BBSes  at  more  than  3,500  nationwide.3 The size and complexity  of  computerized  BBSes  range from relatively simple programs,  run  on  privately-owned  microcomputers  with  a  few hundred  subscribers,  to vast, multi-topic database systems with nationwide lists of subscribers and operated for profit.4         The  process  of  reaching,  or "accessing" one of these bulletin  boards  is  quite  simple:  all  that  is required is a computer,   a  computer  program  that  allows  the  computer  to communicate  over  the phone lines, and a "modem" (a device which converts   the   computer's   electrical  signals  into  acoustic impulses,  defined  infra).5  Once  she has accessed the BBS, the caller   is   free   to  trade  useful  non-copyrighted  computer programs,  exchange  ideas  on  a host of topics, post electronic mail  for  later reading by others, and much more.6 The ease with which  most  BBSes may be accessed and the wealth of interests to be  found  there  ensure  that they will continue to be important sources of information and discourse.         However,  the speed and efficiency of computerized BBSes also  subject  them  to  serious, wide-ranging civil and criminal abuse.  Recently  a  young  computer user paralyzed several major computer  systems across the nation by sending a harmful computer program  (or  "worm")  to  them  over  telephone  lines. The worm quickly  replicated  itself  in  the computers' memories and thus decreased  their  output  capacities.7  Further, certain computer abusers  (known  as  "hackers") use the power of the computerized ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              5----------------------forum  to  ply  illegal  copies  of  copyrighted  programs,  bilk hundreds  of  millions  of  dollars annually from credit card and phone  companies, and to wrongfully access others' data files.8 A minority   of  other  BBSes  exist  mainly  to  circulate  racist ideologies.9         What  is  more,  it now appears that the ancient tort of defamation  is  actively  being  practiced  through  the  use  of computerized   BBSes.10   Due   to   the   almost   ethereal  way computerized  BBSes  operate  - one person may conveniently leave an  electronic  message for others to respond to at their leisure and  there  is  no  need  for the parties to converse directly or even  to  know  each other11 - the risk of detection when the BBS is  abused  is  lower  than  that for defamation practiced in the print  media.12  Difficulties  arise  with  identifying  the true party  at  fault  and with authenticating the computer records as evidence  of  the  defamation.13  Adding  to  this  problem is an uncertainty  in  the laws concerning the appropriate liability of SYSOPs  for defamatory messages on their BBSes of which they were unaware.14    B.   Definitions         The  following  are  brief definitions of some important technical terms connected with electronic BBSes:         SYSOP:  An  abbreviation  for "System Operator", this is the  individual  generally responsible for organizing information and  for  trouble-shooting  on  a computerized bulletin board. On larger  bulletin  boards  covering  hundreds  of  topics, several SYSOPS  may  be in charge of maintaining information contained in ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              6----------------------separate  discrete  fields.15 But when the BBS is privately owned and  operated,  a  single SYSOP may very well oversee all aspects of  the  board's  operations, in addition to being able to access all his users' passwords and personal information.16         Modem:   An  abbreviation  for  "Modulator/Demodulator". This  is  a  device  which  links a computer to an ordinary phone line  and  converts computer signals to auditory phone signals. A computer  modem  on  the  other  end  of  the  transmission  then reverses  the  process.  Computers  using  modems  transfer  data rapidly across phone lines and thus share information.17         Validation:  Basically  this is a set of procedures used by  responsible  SYSOPs  to  do everything reasonably possible to verify  that  the personal information supplied by a user is true and  correct.  Common  sense and emerging legal standards dictate that  the  SYSOP should not merely rely on the name provided by a potential  user  when  the  SYSOP  does  not personally know that individual.   The   SYSOP   may   be  required  to  independently corroborate  the  prospective  subscriber's  information by first asking  the  potential  user's name, address and phone number and then  by  checking  that information with directory assistance.18 These  procedures  will hopefully aid the operator in identifying wrongdoers  if  misuse  occurs;19 however, as will be seen, these procedures are by no means foolproof.         Database:  Any  collection  of  data  in  a computer for purposes  of  later  retrieval  and  use, i.e., names, addresses, phone numbers, membership codes, etc.         User:  Anyone who accesses a computerized bulletin board ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn              7----------------------system  and is exposed to the information stored there. Users may be  identified  by  their  true  names,  by an assigned numerical code, or by colorful "handles", or "usernames."20         Operating  System:  This is a program which controls the computer's   basic  operations  and  which  recognizes  different computer  users  so  that their actions do not interfere with one another.21  For  example,  most multi-user operating systems will not  allow  one  user  to delete another's data unless the second user  gives  explicit  permission.22 BBS system software programs perform  this  function  through  their  use  of  "accounts"  and "passwords":23  private electronic mail sent to a particular user may  not  be read or deleted by others. The BBS' operating system is  also  designed  to  deny access to those attempting to log on under an unvalidated or unrecognized name.24         Account/Username:   As   another   part  of  BBS  system security,   each   user  chooses  an  "account",  or  "username", consisting  of  one  to  eight  letters  or  numbers.25  The BBS' operating  system then will not allow commands issued by one user of  one  account to modify data created by another account;26 nor will  it  grant  access to an account that has been terminated or invalidated.         Password:  Yet  another aspect of BBS system security is the  use  of  "passwords"  as  a  prerequisite  to  accessing the computer  system.  Most  operating  systems  require  the user to enter  both  her  account name and password to use the account.27 Because  electronic  mail  cannot be sent without the username to which  it  is  being addressed, and because the account cannot be 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -