⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 defamation liability of computerized bulliten board operators.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
the  masquerader's  libellous messages back to him is proving his authorship  of  the  libel,  or "authenticating" the computerized records.140  The computer-generated phone and BBS records showing that  a call from a certain phone number at a particular date and time  resulted  in  a  libellous  message  being  published  must somehow be linked to the masquerader.         The  Federal  Rules  of  Evidence  provide  in pertinent ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             29----------------------part:    (a)  General     provision.     The    requirement    of          authentication  or  identification  as  a condition          precedent   to   admissibility   is   satisfied  by          evidence  sufficient  to support a finding that the          matter in question is what its proponent claims.    (b)  Illustrations.  By  way  of  illustration only, and          not   by  way  of  limitation,  the  following  are          examples   of   authentication   or  identification          conforming with the requirements of this rule:...         (6)  Telephone       conversations.       Telephone               conversations,  by  evidence  that  a call was               made  to  the  number  assigned at the time by               the  telephone  company to a particular person               or business, if               (A)  in  the  case of a person, circumstances,                    including  self-identification,  show the                    person  answering  to  be the one called,                    or              (B)  in  the  case of a business, the call was                    made  to  a  place  of  business  and the                    conversation    related    to    business                    reasonably     transacted     over    the                    telephone....141         The   question   of   whether   a  writing  is  properly authenticated  is  primarily  one  of  law  for the court; if the court  decides  the  question affirmatively, it is ultimately for the  jury.142  The  court  will  make  no  assumptions  as to the authenticity    of    documents   in   deciding   their   initial admissibility.143  The  difficulty  presented  here  is  that the Federal  Rules  of  Evidence  seem  to  require authentication of telephone  calls  by  reference to their specific content.144 The specific  content  of  a  given phone call is not demonstrated by phone logs showing merely the date and time the call occurred.         The   authentication   of  extrinsic  documents  may  be subject  to  a  "best  evidence  rule"  objection.  As  stated in Federal Rule of Evidence 1002:    REQUIREMENT  OF  ORIGINAL:  To  prove  the contents of a ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             30----------------------    writing,  recording, or photograph, the original of that     writing,  recording,  or  photograph is required, unless     provided  otherwise  in  these  rules  or  by  an act of     Congress.145                 Since  its  introduction  in  the  18th century, various rationales  have  been  posited  for  this rule.146 While earlier writers  asserted  that  the  rule  is intended to prevent fraud, most  modern  commentators  agree that the rule's main purpose is to  convey  to  the  court  the  exact  operative  effect  of the writing's contents.147         However,   at  least  one  jurisdiction  has  implicitly equated  compliance  with the business records exception with the Best  Evidence  Rule.  In Louisiana v. Hodgeson,148 the defendant in  a  manslaughter  trial  contended  that  a  printout  of  her telephone  bill, offered to show communications between her and a third  party,  was  not authenticated.149 The court, while making no  specific  reference  to  the  authentication  point, rejected defendant's  contention,  noting  that  the  information from the computer's  storage was the company's business record and that it was accessible only by printout.150         Similarly,  in  an  Indiana bank robbery prosecution,151 the  state  offered  microfiche copies of the telephone company's computerized   records   showing  certain  telephone  calls  from defendant.  On appeal, defendant argued that these documents were not  authenticated  because  they were not the "original or first permanent  entry,"  and  that they therefore should not have been admitted  into  evidence.  The  court  disagreed,  saying  that a duplicate  was  admissible  to  the  same  extent  as an original ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             31----------------------unless  a  "genuine  issue" were raised as to the authenticity of the original.152         By  these  precedents,  then,  provided  plaintiff  user establishes  that  both  the  telephone and BBS user records were prepared  in  accordance  with the business records exception,153 the  fact  that  a  call from the masquerader's phone is shown to have  occurred  at  the  same  instant  the libellous message was posted  may  be sufficient to authenticate that the call was made by  the  masquerader.  Other  circumstantial  evidence adduced by plaintiff user would strengthen this inference.154         Another  authentication  hurdle  in  plaintiff's case is the  requirement  that  the  entire  original record sought to be authenticated  be  produced.155 This requirement can prove highly impractical  in  situations  where  there  are  vast  numbers  of individual  records  extending  over  long  periods  of  time.156 Requiring  plaintiff  to produce the entire body of these records would  be  unduly  expensive and time-consuming. What is more, if plaintiff   were   to  attempt  to  summarize  vast  computerized business  data  compilations  so  as to introduce those summaries into  evidence  without  producing  the complete body of computer records,  such  summaries  might not be admissible on the grounds that they were not made "in the regular course of business."157         However,   an   exception   to   strict   authentication requirements   of   the   Federal  Rules  of  Evidence  has  been developed. Rule 1006 provides:    The  contents  of  voluminous  writings,  recordings, or     photographs  which  cannot  conveniently  be examined in     court  may be presented in the form of a chart, summary,     ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             32----------------------    or  calculation.  The originals, or duplicates, shall be     made  available  for examination or copying, or both, by     other  parties  at  reasonable time and place. The court     may order that they be produced in court.158                 In   Cotton   v.  John  W.  Eshelman  &  Sons,  Inc.,159 summaries  of  certain  computerized  records  were held properly admitted  into  evidence on the theory that "[w]hen pertinent and essential  facts  can  be ascertained only by an examination of a large  number  of  entries  in  books  of  account, an auditor or expert  examiner  who has made an examination and analysis of the books  and  figures  may testify as a witness and give summarized statements   of   what   the  books  show  as  a  result  of  his investigation,  provided  the  books themselves are accessible to the   court   and  to  the  parties."160  Under  this  precedent, plaintiff  user would only need to produce the pertinent parts of the computerized records, as determined by an impartial auditor.IV. CONCLUSION         It  is  difficult  to  overestimate  the ease with which computers  now  enable  us  to  compile and exchange information. Computerized  "bulletin boards" run on personal microcomputers by private  persons  and  businesses  are  examples of this enhanced form  of  communication.  Users  can  trade computer programs and exchange  a  wealth  of ideas, opinions, and personal information through such forums.         The  advantages  of  this  process  break down, however, when   malicious   users   abuse   the   system  and  BBS  SYSOPS intentionally  or  negligently allow this to occur. The nature of computerized  data  is  such  that  tortious  misinformation  may ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             33----------------------easily  be  spread to thousands of users before it is discovered. Because  the  potential  for harm to reputation is so tremendous, appropriate  standards  of liability and methods of proof must be addressed.         The  requisite  degree  of  fault  in  libelling private persons  is  less than that for libelling public officials/public figures,  and  may  be established as against a SYSOP by a simple showing  of  his  negligent failure to observe reasonably minimal computer   security  measures.  The  basis  of  liability  for  a masquerader  who  intentionally misappropriates another's private information is even less subject to debate.         Two  main evidentiary hurdles face the plaintiff seeking to  link  the  masquerader  with  his  libellous  message through reliance  on  computer-generated records. First, the hearsay rule automatically  excludes  all  evidence produced out-of-court that is  being  offered  to  prove  the  truth  of the matter at hand. Second,   the   authentication   requirement   demands  that  the masquerader's   connection   to  the  entire  body  of  proffered computer records be established.         However,  certain exception to both of these limitations ease   the   plaintiff's  burden.  First,  the  business  records exception  to  the  hearsay  rule  admits  computer  records into evidence  if they (1) were made reasonably contemporaneously with the  events  they record; (2) were prepared/kept in the course of a  regularly  conducted  business  activity; and (3) the business entity  creating  these  records relied on them in conducting its operations.  Both  BBS  and  telephone  company  records may come ---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             34----------------------under  this  exception. Second, the voluminous writings exception allows  the  contents  of  voluminous  computerized records which cannot  conveniently  be examined in court to be presented in the form  of a summary. So long as the original records or duplicates thereof  are  available  for  examination  by  other  parties  at reasonable  times  and  places,  the entire data compilation need not   be   produced.   Plaintiff  should  employ  both  of  these exceptions  in an effort to convince a jury by a preponderance of the  evidence that the masquerader has abused his computer skills and has damaged plaintiff's reputation.           ==============================================Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU>	id AA20305; Fri, 20 Apr 90 12:46:45 PDT~Date: Fri, 20 Apr 90 12:42:02 PDT~From: Lang Zerner <langz@ebay.sun.com>Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM>~Subject: Sysops and libel liability -- endnotesResent-Date:  Sat, 21 Apr 90 0:05:23 CDTResent-From: telecom@eecs.nwu.eduResent-To: ptownson@gaak.LCS.MIT.EDUStatus: ROHere are the endnotes to the paper I submitted in a separate message.Be seeing you...==Lang=======---Defamation Liability of Computerized BBS Operators& Problems of Proof          (C) 1989 John R. Kahn             35----------------------                             ENDNOTES1.       418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).2.       These  interests can cover anything from science fiction          to  gourmet  cooking. Uyehara, Computer Bulletin Boards:          Let the Operator Beware, 14 Student Lawyer 28 (1986).3.       Id., at 30.4.       The  data  service  Compuserve  is one such national BBS          run  for  profit  by business organizations. Uyehara, at          28.  Other  examples  of  large databases of interest to          the  legal profession are computerized research services          such as LEXIS and WESTLAW.5.       Uyehara,  at  28;  Manning, Bulletin Boards: Everybody's          Online  Services,  Online, Nov. 1984, at 8,9. "Modem" is          defined infra, note 17 and accompanying text.6.       "...computer   bulletin   boards   offer   their   users          important  benefits.  An  individual  can use a bulletin          board  to  express  his  opinion  on  a matter of public          interest.  He  may  find  a  review  of  a product he is          considering  buying.  He  may  find  a  useful  piece of          software.  An  individual  might  also  use the bulletin          board  to  ask  a  technic

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -