📄 computer bulliten boards and the law.txt
字号:
THE ELECTRONIC PAMPHLET--COMPUTER BULLETIN BOARDS AND THE LAW Submitted in Partial Fulfillment Of the Requirements of Mass Communications by Michael H. Riddle 72446.3241@compuserve.com Sysop on 1:285/27@fidonet(c) Copyright 1990, by Michael H. Riddle. All Rights Reserved. This paper may be freely distributed via electronic media provided that the entire text remains intact, including this first page,notice, and disclaimer, and further provided that full credit is given. DISCLAIMER: This paper was prepared by a law student as part of a course of study, and should not be construed to represent a legal opinion. Anyone with a need for a current legal opinion relating to this material should contact an attorney licensed to practice in their state.--- THE ELECTRONIC PAMPHLET--COMPUTER BULLETIN BOARDS AND THE LAW Introduction--Bulletin Boards Then and Now In 1517, Martin Luther nailed his 95 theses to the doorof the church in Wittenberg, Germany, an act which is gener-ally considered the start of the Reformation, the Protestantreligious movement (Protesting aspects of the Catholicchurch as it then existed). [FN1] The author remembers howoutrageous it seemed to him, the first time he heard thestory, that anyone would have the effrontery to nail evenone, let alone 95, documents to a church door. It was onlylater, after much study of history and theology, that hecame to learn that the church door was routinely used forthis purpose. At a time before widespread publication ofnewspapers, before telegraph, telephone, television, or CBradio, the church door was the acknowledged location forimportant notes or topics of discussion. [FN2] Students at the University of Nebraska College of Lawuse the "kiosk" inside the main entrance to the college topass notes to each other. Hexagonal in shape, one side ofthe kiosk is reserved for general announcements and bulle-tins. Sometimes the postings are as routine as announcementof a meeting; at other times, they might be a call to actionto save the trees in a local park from the bulldozer.Students are cautioned, during their first formal orienta-tion at the College, to check the kiosk daily. [FN3] Just inside the door at Baker's Supermarket in LaVista,Nebraska, is a board where customers (and presumably others)may post notes about items for sale, offers of employment,and the like. Similar boards are found in other locationsaround town, provided either as a public service by a busi-ness, or perhaps as yet another advertising "gimmick,"another way of increasing business at the store. [FN4] During the Revolution, and when the FoundingFathers [FN5] wrote the Constitution and the Bill ofRights, similar functions were often fulfilled by "pamphle-teers." Anyone with an idea and a little loose change couldbuy or borrow a printing press, and soon be distributingtheir ideas around the town. [FN6] Today, another forum is increasingly available fornotices, reminders and discussions--the computer bulletinboard. [FN7] Listings of items for sale, notices of meet-ings, and discussion about matters important or trivial maybe found in the world of electronics as well as groceries.At one time the province of the technically and financiallygifted, bulletin boards are increasing available to Every-man. [FN8] At least one commentator has directly comparedthe bulletin board system of today with the pamphlet ofyesterday. [FN9] In the simplest form, a bulletin board is a computer,often a small personal computer (PC), connected to a tele-phone line by a device called a modem. [FN10] While largeand expensive systems are possible, a person desiring toenter the bulletin board arena may do so for a total invest-ment less than $500. [FN11] At the simplest, the bulletinboard system acts as a "store and forward" system. Individ-uals call the BBS one at a time, "log on" (typically usingsome sort of entry code and password protection to insureidentity), read messages that have been left and post anymessages they desire. They then log off, and the system isavailable to the next caller. [FN12] "Networked" systems add an additional step, one whichgreatly expands the nature of the forum. At pre-designatedtimes, the BBS scans the messages to see what has beenposted on the board since the last similar event, and pre-pares "mail packets" with those messages. It then callsother systems and forwards the packets to those systems,receiving in turn any mail designated for it. In thismanner, messages may be entered in Lincoln or Omaha at noexpense to the user, and be sent literally around theworld. [FN13] Static on the Lines? While bulletin board systems may facilitate communica-tion, they have a potential for misuse as well. Severalpositive benefits of bulletin boards are that users mayexpress their opinions on matters of public interest, maylook for reviews of products they are considering buying,and might ask specific questions about any number of mat-ters. [FN14] Potential for abuse exists in both civil andcriminal areas, particularly for defamation (libel or slan-der), theft of intellectual property (particularly softwarepiracy and copyright violations), and theft (credit cardabuse, telephone system fraud, and similar actions). [FN15] Press coverage of this type of activity inevitably refers tothe use of bulletin boards, [FN16] and in the public mindall bulletin board operators and users become associatedwith "hackers" and "phreakers." [FN17] Recent news eventscovered at some length the "Internet worm" propagated byRobert Morris, which brought several national computernetworks almost to a complete halt. [FN18] The presstreatment of the event once again tended toward the sensa-tional, using what have come to be pejorative terms, such as"hacker," "phreaker", and the like. These reports alsofrequently included what could easily interpreted as deroga-tory references to bulletinboard systems ingeneral. [FN19] - The United States Secret Service has been charged withenforcement of federal laws relating to computer crime, anda recent investigation known as "Sun Devil" has receivedsome publicity in the traditional media, and even more inthe electronic fora. [FN20] In the zealous pursuit oftheir goal to eliminate computer crime, the Secret Serviceis often trampling on toes and arguably chilling the freeexpression of ideas. An example of what can happen occurredrecently when someone illegally (meaning without authoriza-tion) entered a Bellsouth computer and downloaded (arguably"stole") documentation about the "E911" enhanced emergencycommunications system. (E911 is the system that calls theemergency dispatcher when someone dials 9-1-1 and automati-cally displays for the dispatcher the calling number andaddress, and any other information that has previously beenfiled, such as hazardous chemicals, invalids or small chil-dren, etc.) One Robert Biggs plead guilty to the actualtheft, and a Craig Neidorf was charged along with Biggs.Neidorf apparently was not charged directly with the theft(assuming, arguendo, theft had occurred), but rather withpublishing the data in an electronic newsletter. Neidorf'scomputer equipment, including that use for a bulletin boardsystem, was seized, even though it contained electronicmail. [FN21] The case against Neidorf was suddenly dismissed on thefourth day, after it became apparent that nothing of value(in the sense that it was already publicly available) hadbeen published by Neidorf. [FN22] Legal Issues Relating to Bulletin Board Systems Several legal issues remain unresolved, at least asthey pertain to bulletin board systems. [FN23] This paperwill survey what appear to be the most obvious ones at themoment, briefly review the law as it appears to be on thesubject, and may occasionally suggest what the author advo-cates as the "proper" rule on the issue. Briefly stated,the emerging issues appear to be whether bulletin boardsystems are protected by either the Speech or Press Clausesof the First Amendment, and to what extent; whether thebulletin board system operators are or should be liable forillegal or actionable misdeeds of their users; what theexpected duty of care should be for the system operators asa defense to such liability, and what protections might beextended to bulletin board systems, directly or indirectlythrough their operators, under the Fourth Amendment. Thispaper will discuss four areas bearing on the legal rightsand responsibilities of system operators: whether a bulle-tin board system is "press" for First Amendment purposes,what rules of decision ought to apply for system operatorliability for defamation originally published by users, whatother liability might attach for contents of messages on thesystem, and some limited concerns about privacy of electron-ic mail vis-a-vis search and seizure rules. Bulletin Board Systems and the First Amendment In assessing what vicarious liability, for defamationor for illegal or illegally obtained information, systemoperators might have for information posted on their bulle-tin boards by users, one is drawn to a comparison with thepress. While the analogy, like most analogies, breaks downat some point, it is still helpful. At least one reporteddecision has held that electronic information storage andretrieval systems may in some circumstances be considered"press." [FN24] Access to Information In Legi-Tech, Inc., v. Keiper, [FN25] a computerizedlegislative information retrieval service was denied accessto a state-owned computer database of legislative materials.In deciding for Legi-Tech, the court treated the service asif it were a form of press, in that it existed to collectand disseminate information about issues of public impor-tance and interest. While Legi-Tech did not directly ad-dress a bulletin board system, at least not in the sensethat the term is generally used, the comparison is clearwhen the bulletin board system contains message areas ofpublic discussion in traditional areas of public concern,such as government, politics, and laws. At least one com-mentator, citing Legi-Tech, has concluded that for somepurposes [FN26] bulletins boards should be consideredpress. [FN27] Liability for Defamation Deciding that a bulletin board system is "press" forsome purposes begs the question, what does it mean aboutanything? One of the more common concerns among systemoperators appears to be vicarious liability for libelspublished by users. [FN28] While the seminal modern casediscussing liability of the press for libel, New York Timesv. Sullivan, [FN29] might suggest a stringent standard forpress liability, more recent cases call that into question.Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., [FN30] might fairly be read to suggest there is no difference, inthe libel context, between press and non-press, but ratherthe true distinction is between what is and is not a matterof public concern worthy of heightened protection. Such aninterpretation would arguably be consistent with the interimcase of Robert Welch, Inc., v. Gertz, [FN31] which alsoappeared to rest its holding on a public-private distinc-tion. Assuming, arguendo, that the New York Times v. Sulli-van [FN32] decision established a special level of protec-tion for the press, then the BBS operator clearly wouldbenefit from the extension of such a privilege. At the timethe message is entered by the user, the operator has noknowledge whatsoever of the contents of the message, andtherefore cannot know it to be false. Later, when theoperator sees the message, the operator might arguably havea duty to remove it if it were blatantly false; otherwise,the issue would appear to become when failure to remove orchallenge a message would be "reckless disregard of whetherit was false or not." [FN33] In considering the question,one might expect normally to find dispositive the holding inSt. Amant v. Thompson [FN34] that failure to investigate,without more, could not establish reckless disregard for thetruth. [FN35] The astute reader recognizes, of course, that the NewYork Times holding concerned statements about public offi-cials. The commentary found on bulletin boards certainlytalks about politics and public officials. [FN36] Thequestion remains, however, about private parties. RobertWelch, Inc., v. Gertz [FN37] is generally cited as thedecision next addressing the subject. In Gertz, an attorneyhad representing police officer's family in a murder inves-tigation. The defendant made false statements about theattorney in its monthly publication American Opinion. Thejudge having ruled the attorney was not a public figure, thejury returned a plaintiff's verdict for $50,000. The trialjudge later reconsidered his ruling, and entered a judgmentnot withstanding the verdict on the theory that a discussionabout a matter of public concern deserved protection. Theissue on appeal appeared to be whether the attorney was apublic figure, not whether the issue was of public concern.The Court ruled that the fact he was not a public figurecontrolled. He had not "thrust himself into the vortex ofthis public issue, nor did he engage the public's attentionin an attempt to influence the outcome." The Court then heldthat as long as liability was not imposed without some basisof fault, the states could write their own rules for "pri-vate" libels. [FN38] If New York Times [FN39] established a new standard of"malice" for press publishing on public matters, andGertz [FN40] refused to extend that standard to privateparties, even when matters of public concern might be atstake, then what about Dun & Bradstreet? [FN41] Dun &Bradstreet, a private credit-reporting firm, published falseinformation about Greenmoss Builders, suggesting Greenmosshad filed bankruptcy when in fact it was an Greenmoss em-ployee who had filed. The Vermont Supreme Court found Gertzinapplicable to nonmedia defamation actions, and sustaineddamages to Greenmoss. The Supreme Court affirmed, but on adifferent basis not involving a distinction between media
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -