2237 lines
104 KiB
Plaintext
2237 lines
104 KiB
Plaintext
|
|
||
|
D E F A M A T I O N L I A B I L I T Y
|
||
|
O F
|
||
|
C O M P U T E R I Z E D
|
||
|
B U L L E T I N B O A R D O P E R A T O R S
|
||
|
A N D P R O B L E M S O F P R O O F
|
||
|
|
||
|
|
||
|
|
||
|
John R. Kahn
|
||
|
CHTLJ Comment
|
||
|
Computer Law Seminar
|
||
|
Upper Division Writing
|
||
|
February, 1989
|
||
|
|
||
|
|
||
|
---
|
||
|
D E F A M A T I O N L I A B I L I T Y
|
||
|
O F
|
||
|
C O M P U T E R I Z E D
|
||
|
B U L L E T I N B O A R D O P E R A T O R S
|
||
|
A N D P R O B L E M S O F P R O O F
|
||
|
|
||
|
John R. Kahn
|
||
|
CHTLJ Comment/Upper Division Writing/Computer Law Seminar
|
||
|
|
||
|
February, 1989
|
||
|
|
||
|
_________________________________________________________________
|
||
|
|
||
|
I. INTRODUCTION
|
||
|
|
||
|
A computer user sits down at her personal computer,
|
||
|
turns it on, and has it dial the number of a local computerized
|
||
|
bulletin board service (BBS) where she has been exchanging
|
||
|
opinions, information, electronic mail, and amicable
|
||
|
conversation with other users. Upon connecting with the BBS, she
|
||
|
enters a secret "password", presumably known only to herself and
|
||
|
to the bulletin board operator, so as to gain access to the
|
||
|
system.
|
||
|
|
||
|
To her surprise, she finds herself deluged with lewd
|
||
|
electronic mail from complete strangers and hostile messages
|
||
|
from persons with whom she believed she was on friendly terms.
|
||
|
The messages read: "Why did you call me a worthless son-of-a ----
|
||
|
- yesterday? I really thought we could be friends, but I guess I
|
||
|
was wrong"; "Hey, baby, I liked your fetish you were telling me
|
||
|
about yesterday: call me at home, or I'll call YOU"; and, "Why
|
||
|
didn't you get around to telling me about your venereal disease
|
||
|
sooner?". Yet our user has not called this BBS in weeks and has
|
||
|
never made any of these statements. Dismayed and angered, the
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 2
|
||
|
----------------------
|
||
|
|
||
|
user comes to realize that she is the victim of computerized
|
||
|
bulletin board abuse.
|
||
|
|
||
|
A personal computer hobbyist (hereafter "SYSOP") who
|
||
|
operates a computerized bulletin board system notices a rash of
|
||
|
heated arguments, profanity and complaints being reported to him
|
||
|
by users on what had been a forum for the peaceful exchange of
|
||
|
ideas. Investigating the complaints, he discovers that
|
||
|
previously responsible users have suddenly and
|
||
|
uncharacteristically been leaving insulting, rude and false
|
||
|
messages about other users on the bulletin board. One user is so
|
||
|
enraged about a public message accusing her of sexual
|
||
|
misadventures that she is threatening to sue the computer
|
||
|
hobbyist in libel for having permitted the message to appear.
|
||
|
The SYSOP realizes that both he and his subscribers have
|
||
|
suffered computerized bulletin board abuse.
|
||
|
|
||
|
The aggravating force behind both the above situations
|
||
|
is most likely a third user (known hereafter as "the
|
||
|
masquerader") who maliciously exploits both his computer
|
||
|
knowledge and his access to BBSes. Since the masquerader has
|
||
|
discovered the password and name of the regular user, and uses
|
||
|
them to access bulletin boards, he appears for all intents and
|
||
|
purposes to be that regular user. The computer thus believes it
|
||
|
has admitted a legitimate subscriber to its database when it has
|
||
|
in fact given almost free reign to a reckless hacker. The
|
||
|
masquerader, posing as another legitimate user, is then free to
|
||
|
portray that user in whatever light he pleases and also to
|
||
|
harass other users of the bulletin board.
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 3
|
||
|
----------------------
|
||
|
|
||
|
|
||
|
When validated users later discover that someone else
|
||
|
has been impersonating them, they invariably cancel their
|
||
|
subscriptions to that BBS and often bring a defamation action
|
||
|
against its SYSOP for the smearing of their good names.
|
||
|
Conversely, the SYSOP, in an effort to avoid liability,
|
||
|
reluctantly engages in monitoring each and every piece of
|
||
|
information posted daily by hundreds of users. If the SYSOP
|
||
|
chooses instead to stop running his BBS altogether, another
|
||
|
efficient and valuable forum for ideas is lost.
|
||
|
|
||
|
What sort of defamation action may be maintained by the
|
||
|
wrongfully disparaged user? Is the computerized bulletin board
|
||
|
offered by the SYSOP subject to the stricter self-scrutiny of
|
||
|
newspapers, or does it operate under some lesser standard? How
|
||
|
may the initial party at fault - the masquerader - be held
|
||
|
accountable for his computerized torts?
|
||
|
|
||
|
The scope of this Comment will be to examine the
|
||
|
defamation liability of computerized BBS operators and
|
||
|
evidentiary proof issues that arise in tracing computerized
|
||
|
defamation to its true source. Other possible Tort causes of
|
||
|
action - intentional infliction of emotional distress, invasion
|
||
|
of privacy, trespass to chattels - are not addressed. It is
|
||
|
assumed throughout that the plaintiff is a private person and
|
||
|
that the issues involved are not matters of "public interest" as
|
||
|
defined in Gertz v. Robert Welch, Inc.1
|
||
|
|
||
|
|
||
|
A. Background
|
||
|
|
||
|
Computerized BBSes exist as a quick, easy and efficient
|
||
|
way to acquire and exchange information about the entire
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 4
|
||
|
----------------------
|
||
|
|
||
|
spectrum of interests.2 The growing popularity of these
|
||
|
electronic forums was demonstrated in a recent study which
|
||
|
numbered BBSes at more than 3,500 nationwide.3 The size and
|
||
|
complexity of computerized BBSes range from relatively simple
|
||
|
programs, run on privately-owned microcomputers with a few
|
||
|
hundred subscribers, to vast, multi-topic database systems with
|
||
|
nationwide lists of subscribers and operated for profit.4
|
||
|
|
||
|
The process of reaching, or "accessing" one of these
|
||
|
bulletin boards is quite simple: all that is required is a
|
||
|
computer, a computer program that allows the computer to
|
||
|
communicate over the phone lines, and a "modem" (a device which
|
||
|
converts the computer's electrical signals into acoustic
|
||
|
impulses, defined infra).5 Once she has accessed the BBS, the
|
||
|
caller is free to trade useful non-copyrighted computer
|
||
|
programs, exchange ideas on a host of topics, post electronic
|
||
|
mail for later reading by others, and much more.6 The ease with
|
||
|
which most BBSes may be accessed and the wealth of interests to
|
||
|
be found there ensure that they will continue to be important
|
||
|
sources of information and discourse.
|
||
|
|
||
|
However, the speed and efficiency of computerized BBSes
|
||
|
also subject them to serious, wide-ranging civil and criminal
|
||
|
abuse. Recently a young computer user paralyzed several major
|
||
|
computer systems across the nation by sending a harmful computer
|
||
|
program (or "worm") to them over telephone lines. The worm
|
||
|
quickly replicated itself in the computers' memories and thus
|
||
|
decreased their output capacities.7 Further, certain computer
|
||
|
abusers (known as "hackers") use the power of the computerized
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 5
|
||
|
----------------------
|
||
|
|
||
|
forum to ply illegal copies of copyrighted programs, bilk
|
||
|
hundreds of millions of dollars annually from credit card and
|
||
|
phone companies, and to wrongfully access others' data files.8 A
|
||
|
minority of other BBSes exist mainly to circulate racist
|
||
|
ideologies.9
|
||
|
|
||
|
What is more, it now appears that the ancient tort of
|
||
|
defamation is actively being practiced through the use of
|
||
|
computerized BBSes.10 Due to the almost ethereal way
|
||
|
computerized BBSes operate - one person may conveniently leave
|
||
|
an electronic message for others to respond to at their leisure
|
||
|
and there is no need for the parties to converse directly or
|
||
|
even to know each other11 - the risk of detection when the BBS
|
||
|
is abused is lower than that for defamation practiced in the
|
||
|
print media.12 Difficulties arise with identifying the true
|
||
|
party at fault and with authenticating the computer records as
|
||
|
evidence of the defamation.13 Adding to this problem is an
|
||
|
uncertainty in the laws concerning the appropriate liability of
|
||
|
SYSOPs for defamatory messages on their BBSes of which they were
|
||
|
unaware.14
|
||
|
|
||
|
|
||
|
B. Definitions
|
||
|
|
||
|
The following are brief definitions of some important
|
||
|
technical terms connected with electronic BBSes:
|
||
|
|
||
|
SYSOP: An abbreviation for "System Operator", this is
|
||
|
the individual generally responsible for organizing information
|
||
|
and for trouble-shooting on a computerized bulletin board. On
|
||
|
larger bulletin boards covering hundreds of topics, several
|
||
|
SYSOPS may be in charge of maintaining information contained in
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 6
|
||
|
----------------------
|
||
|
|
||
|
separate discrete fields.15 But when the BBS is privately owned
|
||
|
and operated, a single SYSOP may very well oversee all aspects
|
||
|
of the board's operations, in addition to being able to access
|
||
|
all his users' passwords and personal information.16
|
||
|
|
||
|
Modem: An abbreviation for "Modulator/Demodulator".
|
||
|
This is a device which links a computer to an ordinary phone
|
||
|
line and converts computer signals to auditory phone signals. A
|
||
|
computer modem on the other end of the transmission then
|
||
|
reverses the process. Computers using modems transfer data
|
||
|
rapidly across phone lines and thus share information.17
|
||
|
|
||
|
Validation: Basically this is a set of procedures used
|
||
|
by responsible SYSOPs to do everything reasonably possible to
|
||
|
verify that the personal information supplied by a user is true
|
||
|
and correct. Common sense and emerging legal standards dictate
|
||
|
that the SYSOP should not merely rely on the name provided by a
|
||
|
potential user when the SYSOP does not personally know that
|
||
|
individual. The SYSOP may be required to independently
|
||
|
corroborate the prospective subscriber's information by first
|
||
|
asking the potential user's name, address and phone number and
|
||
|
then by checking that information with directory assistance.18
|
||
|
These procedures will hopefully aid the operator in identifying
|
||
|
wrongdoers if misuse occurs;19 however, as will be seen, these
|
||
|
procedures are by no means foolproof.
|
||
|
|
||
|
Database: Any collection of data in a computer for
|
||
|
purposes of later retrieval and use, i.e., names, addresses,
|
||
|
phone numbers, membership codes, etc.
|
||
|
|
||
|
User: Anyone who accesses a computerized bulletin board
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 7
|
||
|
----------------------
|
||
|
|
||
|
system and is exposed to the information stored there. Users may
|
||
|
be identified by their true names, by an assigned numerical
|
||
|
code, or by colorful "handles", or "usernames."20
|
||
|
|
||
|
Operating System: This is a program which controls the
|
||
|
computer's basic operations and which recognizes different
|
||
|
computer users so that their actions do not interfere with one
|
||
|
another.21 For example, most multi-user operating systems will
|
||
|
not allow one user to delete another's data unless the second
|
||
|
user gives explicit permission.22 BBS system software programs
|
||
|
perform this function through their use of "accounts" and
|
||
|
"passwords":23 private electronic mail sent to a particular user
|
||
|
may not be read or deleted by others. The BBS' operating system
|
||
|
is also designed to deny access to those attempting to log on
|
||
|
under an unvalidated or unrecognized name.24
|
||
|
|
||
|
Account/Username: As another part of BBS system
|
||
|
security, each user chooses an "account", or "username",
|
||
|
consisting of one to eight letters or numbers.25 The BBS'
|
||
|
operating system then will not allow commands issued by one user
|
||
|
of one account to modify data created by another account;26 nor
|
||
|
will it grant access to an account that has been terminated or
|
||
|
invalidated.
|
||
|
|
||
|
Password: Yet another aspect of BBS system security is
|
||
|
the use of "passwords" as a prerequisite to accessing the
|
||
|
computer system. Most operating systems require the user to
|
||
|
enter both her account name and password to use the account.27
|
||
|
Because electronic mail cannot be sent without the username to
|
||
|
which it is being addressed, and because the account cannot be
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 8
|
||
|
----------------------
|
||
|
|
||
|
used without knowledge of the password, usernames are generally
|
||
|
public knowledge while passwords are a closely-guarded secret,
|
||
|
known only to the user and the operating system.28
|
||
|
|
||
|
Teleprocessing: This is defined as accessing a computer
|
||
|
from a remote location, usually over a telephone line or similar
|
||
|
communications channel.29
|
||
|
|
||
|
Uploading/Downloading: For purposes of exchanging
|
||
|
computer programs or electronic mail over the phone lines, the
|
||
|
process of transferring information from one's personal computer
|
||
|
to the bulletin board is called uploading. The reverse process -
|
||
|
transferring information from a bulletin board to a personal
|
||
|
computer - is known as downloading.30
|
||
|
|
||
|
II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS
|
||
|
|
||
|
A. Computerized Defamation: Libel or Slander?
|
||
|
|
||
|
Libel is the "publication of defamatory matter by
|
||
|
written or printed words, by its embodiment in physical form, or
|
||
|
by any other form of communication that has the potentially
|
||
|
harmful qualities characteristic of written or printed words."31
|
||
|
Publication of a defamatory matter is "its communication
|
||
|
intentionally or by a negligent act to one other than the person
|
||
|
defamed."32 A communication is defamatory if it "tends to so
|
||
|
harm the reputation of another as to lower him in the estimation
|
||
|
of the community or to deter third persons from associating or
|
||
|
dealing with him."33 The difference between libel and slander
|
||
|
has traditionally depended upon the form of the communication:
|
||
|
oral defamation generally is considered slander, while written
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 9
|
||
|
----------------------
|
||
|
|
||
|
defamation is generally considered libel.34 The distinction is
|
||
|
important, because libel requires no proof of special damages
|
||
|
and is actionable by itself, while slander generally requires
|
||
|
proof of special damages in order to be actionable.35
|
||
|
|
||
|
However, with the advent of electronic media, the
|
||
|
traditional libel/slander distinctions as they apply to sight
|
||
|
and hearing are no longer valid. For example, passing defamatory
|
||
|
gestures and signals, though visible to sight, were considered
|
||
|
slander;36 an ad-libbed statement on a telecast impugning a
|
||
|
person's financial status was found to be libel.37
|
||
|
|
||
|
It has been suggested that the real distinction between
|
||
|
libel and slander is the threat and magnitude of harm to
|
||
|
reputation inherent in the form of publication.38 Libel has been
|
||
|
historically associated with writings because (1) a writing is
|
||
|
made more deliberately than an oral statement; (2) a writing
|
||
|
makes a greater impression to the eye than does an oral
|
||
|
statement to the ear; (3) a writing is more permanent than
|
||
|
speech; and (4) a writing has a wider area of dissemination than
|
||
|
speech.39 These four qualities inherent in a writing made the
|
||
|
possible harm to reputation greater than mere spoken words. In
|
||
|
applying libel to the new form of computerized communication
|
||
|
used on BBSes, the potentiality for harm to reputation is
|
||
|
significant, and should again be considered the controlling
|
||
|
factor.
|
||
|
|
||
|
In our hypothetical situation, the user discovered that
|
||
|
another user (the masquerader) had usurped her account name and
|
||
|
password, causing her great embarrassment and humiliation. The
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 10
|
||
|
----------------------
|
||
|
|
||
|
act of prying into and taking another's computer information to
|
||
|
misuse it elsewhere would indicate a certain deliberation on the
|
||
|
actor's part to spread defamatory messages. Secondly, the
|
||
|
defamatory message is displayed to other users on their computer
|
||
|
monitors in the form of electronic characters, making a visual
|
||
|
impression. Third, this electronic defamation is more permanent
|
||
|
than mere words because it is stored in the BBS' memory until
|
||
|
erased by the user or SYSOP. Finally, the message arguably has a
|
||
|
wider area of dissemination than a one-to-one spoken defamation
|
||
|
because, as a message on an electronic BBS, it has the potential
|
||
|
of being viewed by hundreds, perhaps thousands, of users each
|
||
|
day. Based on these four criteria, the capacity for harm to our
|
||
|
user's reputation due to the masquerader's activities is indeed
|
||
|
great enough to be considered libellous.
|
||
|
|
||
|
B. Defamation Liability of the SYSOP
|
||
|
|
||
|
Having established the electronic message as being
|
||
|
libellous, the next issue is to determine the extent of
|
||
|
liability for the SYSOP who unknowingly permits the message to
|
||
|
be communicated over his BBS. Case law indicates that the
|
||
|
SYSOP's liability depends upon the type of person defamed and on
|
||
|
the subject matter of the defamation.
|
||
|
|
||
|
1. Degree of fault required
|
||
|
|
||
|
The United States Supreme Court has addressed modern
|
||
|
defamation liability in two major decisions. Both conditioned
|
||
|
the publisher's liability on the type of person defamed and on
|
||
|
the content of the defamation. In New York Times v. Sullivan,40
|
||
|
the Court determined that in order for a public official to
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 11
|
||
|
----------------------
|
||
|
|
||
|
recover damages in a defamation action, the statement must be
|
||
|
shown to have been made with "actual malice", i.e., with
|
||
|
knowledge of its falsity or with reckless disregard for its
|
||
|
truth.41 Due to society's interest in "uninhibited, robust and
|
||
|
wide-open" debate on public issues, neither factual error nor
|
||
|
defamatory content sufficed to remove the First Amendment's
|
||
|
shield from criticism of an official's conduct.42
|
||
|
|
||
|
The Supreme Court further elaborated on defamation
|
||
|
liability standards in the private and quasi-private sphere when
|
||
|
it decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher
|
||
|
of a John Birch Society newsletter made certain false and
|
||
|
inaccurate accusations concerning an attorney who represented a
|
||
|
deceased boy's family. The family had civilly sued the policeman
|
||
|
who murdered the boy. In rebutting what he perceived to be a
|
||
|
secret campaign against law and order, the publisher labelled
|
||
|
the family's attorney a "Leninist" and "Communist-fronter".44 In
|
||
|
addition, the publisher asserted that the attorney had been a
|
||
|
member of the National Lawyers Guild, which "'probably did more
|
||
|
than any other outfit to plan the Communist attack on the
|
||
|
Chicago police during the 1968 Democratic Convention.'"45 In
|
||
|
publishing these statements throughout Chicago, the managing
|
||
|
editor of the Birch Society newsletter made no effort to verify
|
||
|
or substantiate the charges against the attorney.46
|
||
|
|
||
|
The Supreme Court held in Gertz that while First
|
||
|
Amendment considerations protect publications about public
|
||
|
officials47 and about "public figures"48, requiring a showing of
|
||
|
"actual malice" before defamation damages could be recovered,
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 12
|
||
|
----------------------
|
||
|
|
||
|
the same was not true for defamation suits brought by private
|
||
|
citizens49, a group to which the attorney was held to belong.50
|
||
|
Private citizens were seen as deserving more protections from
|
||
|
defamation than public officials or public figures, so they were
|
||
|
not required to show "actual malice" as a precondition to
|
||
|
recovery.51 The Court then left it to the states to decide the
|
||
|
precise standard of liability for defamation of private
|
||
|
individuals, so long as liability without fault was not the
|
||
|
standard.52
|
||
|
|
||
|
By Gertz, then, the appropriate standard of liability
|
||
|
for publicizing defamation of private parties falls somewhere
|
||
|
below actual malice and above strict liability. The problem with
|
||
|
defining the defamation standard for computerized BBS operators,
|
||
|
however, is a lack of uniform standards. In such circumstances,
|
||
|
the objective "reasonable person" standard will likely be
|
||
|
applied to the SYSOP's actions.53 Several cases may be usefully
|
||
|
applied by analogy.
|
||
|
|
||
|
The court in Hellar v. Bianco54 held that a bar
|
||
|
proprietor could be responsible for not removing a libellous
|
||
|
message concerning the plaintiff's wife that appeared on the
|
||
|
wall of the bar's washroom after having been alerted to the
|
||
|
message's existence.55 The court noted that "persons who invite
|
||
|
the public to their premises owe a duty to others not to
|
||
|
knowingly permit their walls to be occupied with defamatory
|
||
|
matter.... The theory is that by knowingly permitting such
|
||
|
matter to remain after reasonable opportunity to remove [it],
|
||
|
the owner of the wall or his lessee is guilty of republication
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 13
|
||
|
----------------------
|
||
|
|
||
|
of the libel."56 The Hellar court then left the ultimate
|
||
|
determination of the bar owner's negligence to the jury.57 This
|
||
|
holding seems to be in accord with the Restatement of Torts,
|
||
|
which provides:
|
||
|
|
||
|
PUBLICATION:
|
||
|
|
||
|
(2) One who intentionally and unreasonably
|
||
|
fails to remove defamatory matter that
|
||
|
he knows to be exhibited on land or
|
||
|
chattels in his possession or under his
|
||
|
control is subject to liability for its
|
||
|
continued publication.58
|
||
|
|
||
|
Contrarily, however, the Ohio court of appeals in Scott
|
||
|
v. Hull59 found that the building owner and agent who had
|
||
|
control over a building's maintenance were not responsible for
|
||
|
libel damages for graffiti inscribed by an unknown person on an
|
||
|
exterior wall.60 The court distinguished Hellar by noting that
|
||
|
in Hellar the bartender constructively adopted the defamatory
|
||
|
writing by delaying in removing it after having been expressly
|
||
|
asked to do so:
|
||
|
|
||
|
"It may thus be observed from these cases
|
||
|
that where liability is found to exist it is
|
||
|
predicated upon actual publication by the
|
||
|
defendant or on the defendant's ratification
|
||
|
of a publication by another, the ratification
|
||
|
in Hellar v. Bianco...consisting of at least
|
||
|
the positive acts of the defendants in
|
||
|
continuing to invite the public into their
|
||
|
premises where the defamatory matter was on
|
||
|
view after the defendants had knowledge of
|
||
|
existence of same."61
|
||
|
|
||
|
The Scott court held that defendants could only be
|
||
|
responsible for publishing a libellous remark through a positive
|
||
|
act, not nonfeasance; thus, their mere failure to remove the
|
||
|
graffiti from the building's exterior after having it called to
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 14
|
||
|
----------------------
|
||
|
|
||
|
their attention was held not to be a sufficient basis of
|
||
|
liability.62
|
||
|
|
||
|
A situation similar to Scott arose recently in Tackett
|
||
|
v. General Motors Corporation.63 There, an employee brought a
|
||
|
libel suit against his employer for, inter alia, failing to
|
||
|
remove allegedly defamatory signs from the interior wall of its
|
||
|
manufacturing plant after having notice of their existence. One
|
||
|
large sign remained on the wall for two to three days while a
|
||
|
smaller one remained visible for seven to eight months.64
|
||
|
Instead of focussing on the Scott malfeasance/nonfeasance
|
||
|
test,65 the Tackett court considered defendant's implied
|
||
|
adoption of the libellous statement to be the correct basis of
|
||
|
liability.66 While saying that failure to remove a libellous
|
||
|
message from a publicly-viewed place may be the equivalent of
|
||
|
adopting that statement, and noting that Indiana would follow
|
||
|
the Restatement view "when the time comes,"67 the Tackett court
|
||
|
held that the Restatement view could be taken too far. Citing
|
||
|
Hellar, the court wrote:
|
||
|
|
||
|
The Restatement suggests that a tavern owner
|
||
|
would be liable if defamatory graffiti
|
||
|
remained on a bathroom stall a single hour
|
||
|
after the discovery [Citation to Hellar]. The
|
||
|
common law of washrooms is otherwise, given
|
||
|
the steep discount that readers apply to such
|
||
|
statements and the high cost of hourly
|
||
|
repaintings of bathroom stalls [Citation to
|
||
|
Scott]. The burden of constant vigilance
|
||
|
exceeds the benefits to be had. A person is
|
||
|
responsible for statements he makes or
|
||
|
adopts, so the question is whether a reader
|
||
|
may infer adoption from the presence of a
|
||
|
statement. That inference may be unreasonable
|
||
|
for a bathroom wall or the interior of a
|
||
|
subway car in New York City but appropriate
|
||
|
for the interior walls of a manufacturing
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 15
|
||
|
----------------------
|
||
|
|
||
|
|
||
|
plant, over which supervisory personnel
|
||
|
exercise greater supervision and control. The
|
||
|
costs of vigilance are small (most will be
|
||
|
incurred anyway), and the benefits
|
||
|
potentially large (because employees may
|
||
|
attribute the statements to their employer
|
||
|
more readily than patrons attribute graffiti
|
||
|
to barkeeps).68
|
||
|
|
||
|
According to this reasoning, then, the location and
|
||
|
length of time the libel is allowed to appear plays an integral
|
||
|
part in determining whether a given defendant has adopted the
|
||
|
libel, and thus has published it.
|
||
|
|
||
|
An application of the foregoing analysis to the issue
|
||
|
at hand highlights the need for greater care in allowing the
|
||
|
posting of electronic mail messages on a BBS. The Tackett court
|
||
|
noted that while the content of graffitti scrawled on bathroom
|
||
|
walls might be subject to healthy skepticism by its readers, the
|
||
|
same might not be true for other locations such as interiors of
|
||
|
subway cars or manufacturing plant walls.69 If this is true,
|
||
|
then it is reasonable to assume that a defamatory message
|
||
|
displayed in a forum for the exchange of ideas is more apt to be
|
||
|
taken seriously by its readers - especially when the libellous
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 16
|
||
|
----------------------
|
||
|
|
||
|
message purports to be written by the subject of the libel.70
|
||
|
|
||
|
Further, the Tackett court indicated that the high cost
|
||
|
of repainting bathroom stalls by the hour outweighed its
|
||
|
perceptible benefits. The same is not true for electronic BBSes,
|
||
|
where the costs of prevention are minimal in light of the threat
|
||
|
of widespread harm to users' reputations.71
|
||
|
|
||
|
2. Damages
|
||
|
|
||
|
Once the plaintiff establishes that the SYSOP failed to
|
||
|
act reasonably in removing statements known to be libellous from
|
||
|
his BBS or in negligently failing to prevent their appearance
|
||
|
there,72 no proof of special damages is necessary as libel is
|
||
|
actionable per se.73 The state's interest in protecting private
|
||
|
reputations has been held to outweigh the reduced constitutional
|
||
|
value of speech involving matters of no public concern such that
|
||
|
presumed and punitive damages may be recovered absent a showing
|
||
|
of actual malice.74
|
||
|
|
||
|
The proper gauge of liability has again raised some
|
||
|
questions.75 One writer has noted that if the burden of proof is
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 17
|
||
|
----------------------
|
||
|
|
||
|
to rest on the plaintiff, she may be at a disadvantage in
|
||
|
producing sufficient evidence to demonstrate negligent conduct
|
||
|
on the part of the SYSOP.76 Solutions to this problem have
|
||
|
ranged from a rebuttable presumption of negligence in favor of
|
||
|
the plaintiff77 to adoption of a set of standards similar to
|
||
|
those set out in the Federal Fair Credit Reporting Act.78 In
|
||
|
either event, damage awards for computer abuse have been
|
||
|
addressed both by federal and state law.79
|
||
|
|
||
|
3. Suggestions
|
||
|
|
||
|
Because computerized BBSes are still a relatively new
|
||
|
technological phenomena, consistent standards for SYSOPs' duties
|
||
|
have yet to be developed.80 However, at least one users' group
|
||
|
has adopted a voluntary code of standards for electronic BBSes,
|
||
|
applicable to both users and SYSOPs of boards open to the
|
||
|
general public:
|
||
|
|
||
|
SCOPE:
|
||
|
|
||
|
This Minimum Code of Standards applies to
|
||
|
both users and SYStem Operators (SYSOPs) of
|
||
|
electronic bulletin boards available to the
|
||
|
general public.
|
||
|
|
||
|
FREEDOM OF SPEECH AND IDEAS
|
||
|
|
||
|
Each user and SYSOP of such systems shall
|
||
|
actively encourage and promote the free
|
||
|
exchange and discussion of information,
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 18
|
||
|
----------------------
|
||
|
|
||
|
|
||
|
ideas, and opinions, except when the content
|
||
|
would:
|
||
|
- Compromise the national security of the
|
||
|
United States.
|
||
|
- violate proprietary rights.
|
||
|
- violate personal privacy,
|
||
|
- constitute a crime,
|
||
|
- constitute libel, or
|
||
|
- violate applicable state, federal or
|
||
|
local laws and regulations affecting
|
||
|
telecommunications.
|
||
|
|
||
|
DISCLOSURE
|
||
|
|
||
|
Each user and SYSOP of such system will:
|
||
|
- disclose their real name, and
|
||
|
- fully disclose any personal, financial,
|
||
|
or commercial interest when evaluation
|
||
|
any specific product or service.
|
||
|
|
||
|
PROCEDURES
|
||
|
|
||
|
SYSOPS shall:
|
||
|
|
||
|
- review in a timely manner all publicly
|
||
|
accessible information, and
|
||
|
- delete any information which they know
|
||
|
or should know conflicts with this code
|
||
|
of standards.
|
||
|
|
||
|
A 'timely manner' is defined as what is
|
||
|
reasonable based on the potential harm that
|
||
|
could be expected. Users are responsible for:
|
||
|
|
||
|
- ensuring that any information they
|
||
|
transmit to such systems adheres to this
|
||
|
Minimum Code of Standards, and
|
||
|
|
||
|
- upon discovering violations of the
|
||
|
Minimum Code of Standards, notifying the
|
||
|
SYSOP immediately.
|
||
|
|
||
|
IMPLEMENTATION
|
||
|
|
||
|
Electronic bulletin board systems that choose
|
||
|
to follow this Minimum Code of Standards
|
||
|
shall notify their users by publishing this
|
||
|
Minimum Code, as adopted by the [Capitol PC
|
||
|
Users Group], and prominently display the
|
||
|
following:
|
||
|
'This system subscribes to the Capitol PC
|
||
|
Users Group Minimum Code of Standards for
|
||
|
electronic bulletin board systems.'81
|
||
|
|
||
|
While non-binding on publicly-accessible BBSes, the
|
||
|
above guidelines furnish sound basic policies that all SYSOPs
|
||
|
might use in shielding themselves from defamation liability. Our
|
||
|
hypothetical at the beginning of this Comment described a
|
||
|
situation where a malicious intruder was able to access and
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 19
|
||
|
----------------------
|
||
|
|
||
|
masquerade as a validated user on a BBS; the following are some
|
||
|
additional computer security measures that the reasonable SYSOP
|
||
|
could conduct to avoid that situation:
|
||
|
|
||
|
a. Special "screening" software: One writer has
|
||
|
suggested discouraging potential BBS misuse through programming
|
||
|
the BBS to reject those messages containing common defamatory
|
||
|
and obscene language;82 such a program would discard a message
|
||
|
containing any of those terms and would presumably notify the
|
||
|
SYSOP of their presence. Drawbacks to this procedure are that
|
||
|
computer programs cannot understand all the nuances of libellous
|
||
|
messages83 and would thus lead to the rigid deletion of many
|
||
|
otherwise legitimate messages.84
|
||
|
|
||
|
b. Unique passwords: A more fundamental and
|
||
|
economical approach would be for the SYSOP to both notify all
|
||
|
new users about the potential for computerized BBS abuse and to
|
||
|
encourage their use of a unique password on each BBS they call.
|
||
|
This would have the practical effect of keeping a masquerader
|
||
|
from using the names and passwords found on one BBS to
|
||
|
wrongfully access and masquerade on other BBSes. A drawback to
|
||
|
this procedure is that the truly malicious masquerader may still
|
||
|
discover a BBS' most sensitive user records by way of a renegade
|
||
|
computer program called a "trojan horse".85 However, one could
|
||
|
speculate that the SYSOP acts reasonably in informing potential
|
||
|
users of the existing threat and in helping them avoid it.
|
||
|
|
||
|
c. Encryption: This is essentially a way for the
|
||
|
SYSOP to make the users' passwords unique for them. The power of
|
||
|
the computer allows complex algorithms to be applied to data to
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 20
|
||
|
----------------------
|
||
|
|
||
|
encode it in such a way that, without the key to the code, it is
|
||
|
virtually impossible to decode the information.86 This technique
|
||
|
would have the added benefit of forcing the masquerader, upon
|
||
|
accessing the BBS with a trojan horse program, to search for the
|
||
|
secret decoding algorithm in addition to the BBS' secret user
|
||
|
files. Indeed, it is conceivable that a special encryption or
|
||
|
password could be devised to allow only the SYSOP access to the
|
||
|
BBS' decoding algorithm. However, encryption involves a
|
||
|
significant overhead - impractical for most small, privately-
|
||
|
operated BBSes - and is more frequently used to protect messages
|
||
|
from one system to another where the data is vulnerable to
|
||
|
interception as it passes over transmission lines.87
|
||
|
|
||
|
d. Prompt damage control: In accord with Hellar,88
|
||
|
the Restatement (Second) of Torts,89 and possibly Tackett,90 a
|
||
|
SYSOP acts reasonably in promptly assisting the libelled user to
|
||
|
partially reverse the effects of the masquerader's actions.
|
||
|
Recall that in those instances a defendant was held to have
|
||
|
impliedly adopted a defamatory statement by acting unreasonably
|
||
|
slowly in removing it from his property once having been made
|
||
|
aware of it.91 While it may be unreasonable to expect the SYSOP
|
||
|
to monitor each message posted every day - especially where the
|
||
|
defamatory message appears to have been left by the true user -
|
||
|
it is not too much to require the SYSOP to quickly remedy
|
||
|
security flaws in his BBS as they are pointed out to him.92 To
|
||
|
this end, the SYSOP has several options. In situations where the
|
||
|
defaming user libels another without masquerading as the
|
||
|
libelled party, the SYSOP could simply delete the defamer's
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 21
|
||
|
----------------------
|
||
|
|
||
|
account. In situations where a user masquerading as another
|
||
|
posts a libellous message, the SYSOP could publish a retraction
|
||
|
to all his subscribers, urging them to use a different password
|
||
|
on each BBS they call. Further, where a masquerader published
|
||
|
the libel, the SYSOP should offer his full cooperation to the
|
||
|
maligned user in tracking down the time and date the libellous
|
||
|
message was posted93 in order to better limit the SYSOP's
|
||
|
liability.
|
||
|
|
||
|
Certain BBS SYSOPs claim that holding them liable for
|
||
|
information appearing on their BBSes violates their First
|
||
|
Amendment rights by restricting their right to free speech94 and
|
||
|
by holding them responsible for the libel perpetrated by the
|
||
|
|
||
|
From kadie Sat Oct 12 09:53:46 1991
|
||
|
To: cafb-mail
|
||
|
~Subject: Computers and Academic Freedom mailing list (batch edition)
|
||
|
Status: R
|
||
|
|
||
|
|
||
|
Computers and Academic Freedom mailing list (batch edition)
|
||
|
Sat Oct 12 09:53:27 EDT 1991
|
||
|
|
||
|
[For information on how to get a much smaller edited version of the
|
||
|
list, send email to archive-server@eff.org. Include the line:
|
||
|
send acad-freedom caf
|
||
|
- Carl ]
|
||
|
|
||
|
In this issue:
|
||
|
|
||
|
:
|
||
|
|
||
|
The addresses for the list are now:
|
||
|
comp-academic-freedom-talk@eff.org - for contributions to the list
|
||
|
or caf-talk@eff.org
|
||
|
listserv@eff.org - for automated additions/deletions
|
||
|
(send email with the line "help" for details.)
|
||
|
caf-talk-request@eff.org - for administrivia
|
||
|
|
||
|
-------------------
|
||
|
|
||
|
masquerader. It has been suggested that the SYSOP should be held
|
||
|
to the same standard of liability as a neighborhood supermarket
|
||
|
which furnishes a public bulletin board:95 just as the
|
||
|
supermarket would not be liable for posting an advertisement for
|
||
|
illicit services, so should the BBS SYSOP escape liability for
|
||
|
libellous messages left on his board, especially when its poster
|
||
|
appears to be a validated user.96
|
||
|
|
||
|
However, this comparison lacks merit for the reasons
|
||
|
given by the Seventh Circuit in Tackett v. General Motors
|
||
|
Corporation.97 The defendant's liability in that case rested on
|
||
|
its publication of libel by implicitly adopting the statement.98
|
||
|
Defendant's failure to remove a defamatory sign painted on one
|
||
|
of the interior walls of its factory for seven or eight months
|
||
|
after discovering its presence was such that "[a] reasonable
|
||
|
person could conclude that Delco 'intentionally and unreasonably
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 22
|
||
|
----------------------
|
||
|
|
||
|
fail[ed] to remove' this sign and thereby published its
|
||
|
contents."99
|
||
|
|
||
|
There would certainly be accomplice liability if the
|
||
|
supermarket unreasonably delayed removing an advertisement for
|
||
|
illegal services from its bulletin board once it was made aware
|
||
|
of it. The market could be seen as having adopted the ad's
|
||
|
statements by not acting responsibly to its viewing public.
|
||
|
Similarly, a SYSOP would be liable for defamatory messages
|
||
|
posted on his BBS - even by what appears to be the true user -
|
||
|
if he fails to act reasonably by using his computer skill to
|
||
|
eviscerate the libel.100 While the computerized BBS may be
|
||
|
nothing more than a hobby of the SYSOP, the speed with which it
|
||
|
can disseminate potentially damaging information among its users
|
||
|
demands the standards of responsibility described above.
|
||
|
|
||
|
C. Defamation Liability of the Masquerader
|
||
|
|
||
|
1. Degree of fault required
|
||
|
|
||
|
It should be noted that the liability and proof issues
|
||
|
concerning the SYSOP and masquerader are inverse. As to the
|
||
|
SYSOP who allows libellous messages to be posted on his BBS, his
|
||
|
liability may be inferred simply by those messages having
|
||
|
appeared there;101 however, his degree of fault - actual malice
|
||
|
or simple negligence - is subject to debate.102 Conversely,
|
||
|
while the masquerader's degree of fault is clearly evident,103
|
||
|
tracing that fault back to him is a more elusive matter.104 The
|
||
|
requisite degree of fault for masqueraders is set out in federal
|
||
|
and state law.105
|
||
|
|
||
|
2. Damages
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 23
|
||
|
----------------------
|
||
|
|
||
|
|
||
|
Assuming arguendo that the masquerader's defamatory
|
||
|
publications have been successfully traced back to him by the
|
||
|
plaintiff, actual and punitive damages may then be recovered
|
||
|
from him based on his knowledge of the publication's falsity or
|
||
|
reckless disregard for its truth.106 Federal and state law have
|
||
|
also specified certain remedies.107
|
||
|
|
||
|
III PROBLEMS OF PROOF
|
||
|
|
||
|
A. Proof of SYSOP's Actions
|
||
|
|
||
|
We have seen that while the appropriate degree of fault
|
||
|
for a SYSOP to be liable for defamatory messages appearing on
|
||
|
his BBS is subject to dispute,108 a showing that the defamation
|
||
|
appeared there due to the SYSOP's negligence is much more
|
||
|
capable of resolution.109 The jury should be made aware of the
|
||
|
actual validation/security procedures practiced by the SYSOP and
|
||
|
should weigh them in light of the prevailing practice.110
|
||
|
Several facets of an emerging standard of care for SYSOPs have
|
||
|
already been suggested in this Comment,111 and the SYSOP's
|
||
|
adherence to them could be shown through users' testimony.
|
||
|
|
||
|
B. Proof of Masquerader's Actions
|
||
|
|
||
|
In contrast with the degree of fault required to
|
||
|
establish the SYSOP's publication of the libellous message, the
|
||
|
degree of fault for the masquerader is much less subject to
|
||
|
debate. The masquerader's actions are not likely to be
|
||
|
considered merely inadvertent or negligent.112 However, because
|
||
|
the masquerader has intentionally discovered and usurped the
|
||
|
user's name and password, he appears to be that user on all
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 24
|
||
|
----------------------
|
||
|
|
||
|
computer records. Tracing the masquerader's defamatory
|
||
|
publication back to him thus encounters some important
|
||
|
evidentiary barriers: the maligned user is forced to rely on
|
||
|
computerized records produced by the BBS and phone company in
|
||
|
trying to link the masquerader's libellous publication back to
|
||
|
him.113 We turn now to consider the evidentiary hurdles to be
|
||
|
overcome in tracing the libellous communication to its true
|
||
|
source.
|
||
|
|
||
|
1. The Hearsay Rule & Business Records Exception
|
||
|
|
||
|
The first evidentiary obstacle to connecting the
|
||
|
masquerader with his libellous publication is the hearsay rule.
|
||
|
As defined by the Federal Rules of Evidence, hearsay is "a
|
||
|
statement, other than one made by the declarant while testifying
|
||
|
at the trial or hearing, offered in evidence to prove the truth
|
||
|
of the matter asserted";114 as such, it is inadmissible as
|
||
|
evidence at trial.115 Computer-generated evidence is subject to
|
||
|
the hearsay rule, not because it is the "statement of a
|
||
|
computer", but because it is the statement of a human being who
|
||
|
entered the data.116 To the extent the plaintiff user relies on
|
||
|
computer-generated records to show that a call was placed from
|
||
|
the masquerader to the BBS at the time and date in question,
|
||
|
then, her evidence may be excluded.
|
||
|
|
||
|
However, numerous exceptions to the hearsay rule have
|
||
|
developed over the years such that evidence which might
|
||
|
otherwise be excluded is deemed admissible. The most pertinent
|
||
|
hearsay exception as applied to computerized evidence is the
|
||
|
"business records exception", which admits into evidence any
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 25
|
||
|
----------------------
|
||
|
|
||
|
records or data compilations, so long as (1) they were made
|
||
|
reasonably contemporaneously with the events they record; (2)
|
||
|
they were prepared/kept in the course of a regularly conducted
|
||
|
business activity; and (3) the business entity creating these
|
||
|
records relied on them in conducting its operations.117 The
|
||
|
veracity of the computer records and of the actual business
|
||
|
practices are shown by the record custodian's or other qualified
|
||
|
witness' testimony, unless the circumstances indicate lack of
|
||
|
trustworthiness.118 The term "business" as used in this rule
|
||
|
includes callings of every kind, whether or not conducted for
|
||
|
profit.119
|
||
|
|
||
|
Statutes and judicial decisions in several states have
|
||
|
gradually recognized that the business records exception extends
|
||
|
to include computer-generated records.120 This is largely due to
|
||
|
(1) modern business' widespread reliance on computerized record-
|
||
|
keeping, (2) the impracticability of calling as witnesses every
|
||
|
person having direct personal knowledge of the records'
|
||
|
creation, and (3) the presumption that if a business was willing
|
||
|
to rely on such records, there is little reason to doubt their
|
||
|
accuracy.121
|
||
|
|
||
|
Using this exception to the hearsay rule, plaintiff
|
||
|
user would most likely seek to admit the BBS' computer-generated
|
||
|
username/password log-in records plus the phone company's call
|
||
|
records to establish the connection between the masquerader's
|
||
|
telephone and the BBS at the precise instant the libellous
|
||
|
message was posted.122 As an initial matter, however, plaintiff
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 26
|
||
|
----------------------
|
||
|
|
||
|
must first lay a foundation for both the BBS' and phone
|
||
|
company's computer-generated business records.
|
||
|
|
||
|
A sufficient foundation for computer-generated records
|
||
|
was found recently to exist in People v. Lugashi.123 There, the
|
||
|
California Court of Appeal affirmed a conviction of grand theft
|
||
|
based on evidence adduced from computer-generated bank records.
|
||
|
Defendant, an oriental rug store owner, had been convicted of
|
||
|
fraudulently registering thirty-seven sales on counterfeit
|
||
|
credit cards. The issuing banks became suspicious of criminal
|
||
|
activity when charge card sales data from defendant's store
|
||
|
showed 44 fraudulent uses of charge cards at defendant's store
|
||
|
within only five weeks.124 As each fraudulent credit card
|
||
|
transaction was completed, defendant registered the sale
|
||
|
simultaneously with the banks' computers.125 Each night, as
|
||
|
standard bank practice, the banks then reduced the computer
|
||
|
records of credit card transactions to microfiche. Information
|
||
|
gleaned from these microfiche records was entered against
|
||
|
defendant at trial.126
|
||
|
|
||
|
The California Court of Appeal recognized the trial
|
||
|
court judge's wide discretion in determining whether a
|
||
|
sufficient foundation to qualify evidence as a business record
|
||
|
has been laid.127 It held that defendant's allocations of error
|
||
|
were without merit since defendant himself had acknowledged that
|
||
|
the bank's computer entries memorialized in the microfiche
|
||
|
record were entered simultaneously as they occurred in the
|
||
|
regular course of business.128 Further, the Court of Appeals
|
||
|
dismissed defendant's claim that only a computer expert could
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 27
|
||
|
----------------------
|
||
|
|
||
|
supply testimony concerning the reliability of the computer
|
||
|
record:
|
||
|
Appellant's proposed test incorrectly presumes computer
|
||
|
data to be unreliable, and, unlike any other business
|
||
|
record, requires its proponent to disprove the
|
||
|
possibility of error, not to convince the trier of fact
|
||
|
to accept it, but merely to meet the minimal showing
|
||
|
required for admission....
|
||
|
The time required to produce this additional [expert]
|
||
|
testimony would unduly burden our already crowded trial
|
||
|
courts to no real benefit.129
|
||
|
|
||
|
|
||
|
|
||
|
The Lugashi court then followed the bulk of other
|
||
|
jurisdictions adopting similar analyses and upholding admission
|
||
|
of computer records with similar or less foundational showings
|
||
|
over similar objections.130
|
||
|
|
||
|
As to admission into evidence of telephone companies'
|
||
|
computer-generated call records under the business records
|
||
|
exception, courts have evinced a similar attitude to that in
|
||
|
Lugashi. In State v. Armstead,131 a prosecution for obscene
|
||
|
phone calls, the trial court was held to have properly admitted
|
||
|
computer printouts showing that calls had been made from
|
||
|
defendant's mother's telephone, despite defendant's contention
|
||
|
that the witness who was called to lay the foundation had not
|
||
|
been personally responsible for making the record.132 Because
|
||
|
the printout represented a simultaneous self-generated record of
|
||
|
computer operation, the court held it was therefore not
|
||
|
hearsay.133
|
||
|
|
||
|
In an Ohio prosecution for interstate telephone
|
||
|
harassment, it was held no error was committed in admitting
|
||
|
defendant's computerized phone statement under the Business
|
||
|
Records exception which showed that telephone calls had been
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 28
|
||
|
----------------------
|
||
|
|
||
|
made from defendant's phone in Ohio to various numbers in
|
||
|
Texas.134 A sufficient foundation for the admission of business
|
||
|
records under Federal Rules of Evidence 803(6) was established
|
||
|
when a telephone company witness identified the records as
|
||
|
authentic and testified they were made in the regular course of
|
||
|
business.135
|
||
|
|
||
|
Applying the foregoing analyses to BBSes, the plaintiff
|
||
|
user would establish a foundation for the correlated BBS136 and
|
||
|
telephone company phone logs by showing that (1) they were made
|
||
|
contemporaneously with the posting of the libellous message;137
|
||
|
(2) they were prepared/kept in the course of a regularly
|
||
|
conducted business activity, since both the BBS and telephone
|
||
|
company consistently maintain accounts of all persons who use
|
||
|
their services; and (3) the BBS and telephone company relied on
|
||
|
those records for billing purposes.138 Once such a foundation is
|
||
|
laid, the trial court has wide discretion in admitting business
|
||
|
records into evidence.139
|
||
|
|
||
|
2. Authentication & the Voluminous Records Exception
|
||
|
|
||
|
The second evidentiary barrier encountered in tracing
|
||
|
the masquerader's libellous messages back to him is proving his
|
||
|
authorship of the libel, or "authenticating" the computerized
|
||
|
records.140 The computer-generated phone and BBS records showing
|
||
|
that a call from a certain phone number at a particular date and
|
||
|
time resulted in a libellous message being published must
|
||
|
somehow be linked to the masquerader.
|
||
|
|
||
|
The Federal Rules of Evidence provide in pertinent
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 29
|
||
|
----------------------
|
||
|
|
||
|
part:
|
||
|
(a) General provision. The requirement of
|
||
|
authentication or identification as a condition
|
||
|
precedent to admissibility is satisfied by
|
||
|
evidence sufficient to support a finding that the
|
||
|
matter in question is what its proponent claims.
|
||
|
(b) Illustrations. By way of illustration only, and
|
||
|
not by way of limitation, the following are
|
||
|
examples of authentication or identification
|
||
|
conforming with the requirements of this rule:...
|
||
|
(6) Telephone conversations. Telephone
|
||
|
conversations, by evidence that a call was
|
||
|
made to the number assigned at the time by
|
||
|
the telephone company to a particular person
|
||
|
or business, if
|
||
|
(A) in the case of a person, circumstances,
|
||
|
including self-identification, show the
|
||
|
person answering to be the one called,
|
||
|
or
|
||
|
(B) in the case of a business, the call was
|
||
|
made to a place of business and the
|
||
|
conversation related to business
|
||
|
reasonably transacted over the
|
||
|
telephone....141
|
||
|
|
||
|
The question of whether a writing is properly
|
||
|
authenticated is primarily one of law for the court; if the
|
||
|
court decides the question affirmatively, it is ultimately for
|
||
|
the jury.142 The court will make no assumptions as to the
|
||
|
authenticity of documents in deciding their initial
|
||
|
admissibility.143 The difficulty presented here is that the
|
||
|
Federal Rules of Evidence seem to require authentication of
|
||
|
telephone calls by reference to their specific content.144 The
|
||
|
specific content of a given phone call is not demonstrated by
|
||
|
phone logs showing merely the date and time the call occurred.
|
||
|
|
||
|
The authentication of extrinsic documents may be
|
||
|
subject to a "best evidence rule" objection. As stated in
|
||
|
Federal Rule of Evidence 1002:
|
||
|
REQUIREMENT OF ORIGINAL: To prove the contents of a
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 30
|
||
|
----------------------
|
||
|
|
||
|
writing, recording, or photograph, the original of that
|
||
|
writing, recording, or photograph is required, unless
|
||
|
provided otherwise in these rules or by an act of
|
||
|
Congress.145
|
||
|
|
||
|
|
||
|
|
||
|
Since its introduction in the 18th century, various
|
||
|
rationales have been posited for this rule.146 While earlier
|
||
|
writers asserted that the rule is intended to prevent fraud,
|
||
|
most modern commentators agree that the rule's main purpose is
|
||
|
to convey to the court the exact operative effect of the
|
||
|
writing's contents.147
|
||
|
|
||
|
However, at least one jurisdiction has implicitly
|
||
|
equated compliance with the business records exception with the
|
||
|
Best Evidence Rule. In Louisiana v. Hodgeson,148 the defendant
|
||
|
in a manslaughter trial contended that a printout of her
|
||
|
telephone bill, offered to show communications between her and a
|
||
|
third party, was not authenticated.149 The court, while making
|
||
|
no specific reference to the authentication point, rejected
|
||
|
defendant's contention, noting that the information from the
|
||
|
computer's storage was the company's business record and that it
|
||
|
was accessible only by printout.150
|
||
|
|
||
|
Similarly, in an Indiana bank robbery prosecution,151
|
||
|
the state offered microfiche copies of the telephone company's
|
||
|
computerized records showing certain telephone calls from
|
||
|
defendant. On appeal, defendant argued that these documents were
|
||
|
not authenticated because they were not the "original or first
|
||
|
permanent entry," and that they therefore should not have been
|
||
|
admitted into evidence. The court disagreed, saying that a
|
||
|
duplicate was admissible to the same extent as an original
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 31
|
||
|
----------------------
|
||
|
|
||
|
unless a "genuine issue" were raised as to the authenticity of
|
||
|
the original.152
|
||
|
|
||
|
By these precedents, then, provided plaintiff user
|
||
|
establishes that both the telephone and BBS user records were
|
||
|
prepared in accordance with the business records exception,153
|
||
|
the fact that a call from the masquerader's phone is shown to
|
||
|
have occurred at the same instant the libellous message was
|
||
|
posted may be sufficient to authenticate that the call was made
|
||
|
by the masquerader. Other circumstantial evidence adduced by
|
||
|
plaintiff user would strengthen this inference.154
|
||
|
|
||
|
Another authentication hurdle in plaintiff's case is
|
||
|
the requirement that the entire original record sought to be
|
||
|
authenticated be produced.155 This requirement can prove highly
|
||
|
impractical in situations where there are vast numbers of
|
||
|
individual records extending over long periods of time.156
|
||
|
Requiring plaintiff to produce the entire body of these records
|
||
|
would be unduly expensive and time-consuming. What is more, if
|
||
|
plaintiff were to attempt to summarize vast computerized
|
||
|
business data compilations so as to introduce those summaries
|
||
|
into evidence without producing the complete body of computer
|
||
|
records, such summaries might not be admissible on the grounds
|
||
|
that they were not made "in the regular course of business."157
|
||
|
|
||
|
However, an exception to strict authentication
|
||
|
requirements of the Federal Rules of Evidence has been
|
||
|
developed. Rule 1006 provides:
|
||
|
The contents of voluminous writings, recordings, or
|
||
|
photographs which cannot conveniently be examined in
|
||
|
court may be presented in the form of a chart, summary,
|
||
|
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 32
|
||
|
----------------------
|
||
|
|
||
|
or calculation. The originals, or duplicates, shall be
|
||
|
made available for examination or copying, or both, by
|
||
|
other parties at reasonable time and place. The court
|
||
|
may order that they be produced in court.158
|
||
|
|
||
|
|
||
|
|
||
|
In Cotton v. John W. Eshelman & Sons, Inc.,159
|
||
|
summaries of certain computerized records were held properly
|
||
|
admitted into evidence on the theory that "[w]hen pertinent and
|
||
|
essential facts can be ascertained only by an examination of a
|
||
|
large number of entries in books of account, an auditor or
|
||
|
expert examiner who has made an examination and analysis of the
|
||
|
books and figures may testify as a witness and give summarized
|
||
|
statements of what the books show as a result of his
|
||
|
investigation, provided the books themselves are accessible to
|
||
|
the court and to the parties."160 Under this precedent,
|
||
|
plaintiff user would only need to produce the pertinent parts of
|
||
|
the computerized records, as determined by an impartial auditor.
|
||
|
IV. CONCLUSION
|
||
|
|
||
|
It is difficult to overestimate the ease with which
|
||
|
computers now enable us to compile and exchange information.
|
||
|
Computerized "bulletin boards" run on personal microcomputers by
|
||
|
private persons and businesses are examples of this enhanced
|
||
|
form of communication. Users can trade computer programs and
|
||
|
exchange a wealth of ideas, opinions, and personal information
|
||
|
through such forums.
|
||
|
|
||
|
The advantages of this process break down, however,
|
||
|
when malicious users abuse the system and BBS SYSOPS
|
||
|
intentionally or negligently allow this to occur. The nature of
|
||
|
computerized data is such that tortious misinformation may
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 33
|
||
|
----------------------
|
||
|
|
||
|
easily be spread to thousands of users before it is discovered.
|
||
|
Because the potential for harm to reputation is so tremendous,
|
||
|
appropriate standards of liability and methods of proof must be
|
||
|
addressed.
|
||
|
|
||
|
The requisite degree of fault in libelling private
|
||
|
persons is less than that for libelling public officials/public
|
||
|
figures, and may be established as against a SYSOP by a simple
|
||
|
showing of his negligent failure to observe reasonably minimal
|
||
|
computer security measures. The basis of liability for a
|
||
|
masquerader who intentionally misappropriates another's private
|
||
|
information is even less subject to debate.
|
||
|
|
||
|
Two main evidentiary hurdles face the plaintiff seeking
|
||
|
to link the masquerader with his libellous message through
|
||
|
reliance on computer-generated records. First, the hearsay rule
|
||
|
automatically excludes all evidence produced out-of-court that
|
||
|
is being offered to prove the truth of the matter at hand.
|
||
|
Second, the authentication requirement demands that the
|
||
|
masquerader's connection to the entire body of proffered
|
||
|
computer records be established.
|
||
|
|
||
|
However, certain exception to both of these limitations
|
||
|
ease the plaintiff's burden. First, the business records
|
||
|
exception to the hearsay rule admits computer records into
|
||
|
evidence if they (1) were made reasonably contemporaneously with
|
||
|
the events they record; (2) were prepared/kept in the course of
|
||
|
a regularly conducted business activity; and (3) the business
|
||
|
entity creating these records relied on them in conducting its
|
||
|
operations. Both BBS and telephone company records may come
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 34
|
||
|
----------------------
|
||
|
|
||
|
under this exception. Second, the voluminous writings exception
|
||
|
allows the contents of voluminous computerized records which
|
||
|
cannot conveniently be examined in court to be presented in the
|
||
|
form of a summary. So long as the original records or duplicates
|
||
|
thereof are available for examination by other parties at
|
||
|
reasonable times and places, the entire data compilation need
|
||
|
not be produced. Plaintiff should employ both of these
|
||
|
exceptions in an effort to convince a jury by a preponderance of
|
||
|
the evidence that the masquerader has abused his computer skills
|
||
|
and has damaged plaintiff's reputation.
|
||
|
|
||
|
==============================================
|
||
|
Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU>
|
||
|
id AA20305; Fri, 20 Apr 90 12:46:45 PDT
|
||
|
~Date: Fri, 20 Apr 90 12:42:02 PDT
|
||
|
~From: Lang Zerner <langz@ebay.sun.com>
|
||
|
Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM>
|
||
|
~Subject: Sysops and libel liability -- endnotes
|
||
|
Resent-Date: Sat, 21 Apr 90 0:05:23 CDT
|
||
|
Resent-From: telecom@eecs.nwu.edu
|
||
|
Resent-To: ptownson@gaak.LCS.MIT.EDU
|
||
|
Status: RO
|
||
|
Here are the endnotes to the paper I submitted in a separate message.
|
||
|
Be seeing you...
|
||
|
==Lang
|
||
|
=======
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 35
|
||
|
----------------------
|
||
|
|
||
|
ENDNOTES
|
||
|
|
||
|
1. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
|
||
|
|
||
|
2. These interests can cover anything from science fiction
|
||
|
to gourmet cooking. Uyehara, Computer Bulletin Boards:
|
||
|
Let the Operator Beware, 14 Student Lawyer 28 (1986).
|
||
|
|
||
|
3. Id., at 30.
|
||
|
|
||
|
4. The data service Compuserve is one such national BBS
|
||
|
run for profit by business organizations. Uyehara, at
|
||
|
28. Other examples of large databases of interest to
|
||
|
the legal profession are computerized research services
|
||
|
such as LEXIS and WESTLAW.
|
||
|
|
||
|
5. Uyehara, at 28; Manning, Bulletin Boards: Everybody's
|
||
|
Online Services, Online, Nov. 1984, at 8,9. "Modem" is
|
||
|
defined infra, note 17 and accompanying text.
|
||
|
|
||
|
6. "...computer bulletin boards offer their users
|
||
|
important benefits. An individual can use a bulletin
|
||
|
board to express his opinion on a matter of public
|
||
|
interest. He may find a review of a product he is
|
||
|
considering buying. He may find a useful piece of
|
||
|
software. An individual might also use the bulletin
|
||
|
board to ask a technical question about a specific
|
||
|
computer program." Note, Computer Bulletin Board
|
||
|
Operator Liability For User Misuse, 54 Fordham L.Rev.
|
||
|
439, 440 (1985) (Authored by Jonathan Gilbert); see
|
||
|
also Lasden, Of Bytes And Bulletin Boards, N.Y.Times,
|
||
|
August 4, 1985, sec. 6, at 34, col. 1, where the author
|
||
|
notes computer users may now use BBSes to voice their
|
||
|
opinions directly to State Senators' offices.
|
||
|
|
||
|
7. "Virus" Hits Nation's Research Computers, San Jose
|
||
|
Mercury News, Nov. 4, 1988, at 1, col. 1.
|
||
|
|
||
|
8. "It is estimated that the theft of long-distance
|
||
|
services and software piracy each approximate $100
|
||
|
million a year; credit card fraud via computers costs
|
||
|
about $200 million annually." Pittman, Computer
|
||
|
Security In Insurance Companies, 85 Best's Rev. - Life-
|
||
|
Health Ins. Edition, Apr. 1985 at 92.
|
||
|
|
||
|
9. Schiffres, The Shadowy World of Computer "Hackers,"
|
||
|
U.S. News & World Report, June 3, 1985, at 58.
|
||
|
|
||
|
10. Pollack, Free Speech Issues Surround Computer Bulletin
|
||
|
Board Use, N.Y. Times, Nov. 12, 1984, note 1, at D4,
|
||
|
col. 6.
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 36
|
||
|
----------------------
|
||
|
|
||
|
11. Note, 54 Fordham L.Rev. 440-441 (1985).
|
||
|
|
||
|
12. Poore and Brockman, 8 Nat'l L.J. 14, (1985).
|
||
|
|
||
|
13. See infra, Topic III, Problems of Proof.
|
||
|
|
||
|
14. The uncertainty revolves around how to define BBSes.
|
||
|
When viewed as analogous to newspapers and other media,
|
||
|
SYSOPS would be responsible for any message posted on
|
||
|
their systems, much as newspaper editors are
|
||
|
responsible for articles appearing in their medium.
|
||
|
Uyehara, 14 Student Lawyer 30 (1986). But when BBSes
|
||
|
are compared to a bulletin board found in a public hall
|
||
|
or supermarket, the liability issue is focused more on
|
||
|
those actually posting the messages rather than on the
|
||
|
board's owner. Id., at 30. This Comment suggests that
|
||
|
BBS SYSOPs be held to a reasonable standard of care
|
||
|
emerging specifically for their endeavors. See infra,
|
||
|
Topic II.
|
||
|
|
||
|
15. Poore and Brockman, 8 Nat'l L.J. 14, (1985). Another
|
||
|
writer has noted that Compuserve now has over 200,000
|
||
|
users making use of nearly 100 diverse databases.
|
||
|
Lasden, Of Bytes And Bulletin Boards, N.Y. Times,
|
||
|
August 4, 1985, sec. 6, at 34, col. 1.
|
||
|
|
||
|
16. Poore and Brockman, 8 Nat'l L.J. 14 (1985).
|
||
|
|
||
|
17. 14 Am Jur. POF 2d Computer-Generated Evidence Sec. 11
|
||
|
(1977).
|
||
|
|
||
|
18. Note, 54 Fordham L.Rev. 439, 446 (1985).
|
||
|
|
||
|
19. Id.
|
||
|
|
||
|
20. See "Account," infra, note 25 and accompanying text.
|
||
|
|
||
|
21. Garfinkel, An Introduction to Computer Security, 33
|
||
|
Prac. Law.41-42 (1987).
|
||
|
|
||
|
22. Id.
|
||
|
|
||
|
23. See infra, notes 25 and 27 and accompanying text.
|
||
|
|
||
|
24. Some more sophisticated operating systems provide
|
||
|
greater access control by (1) recording unauthorized
|
||
|
attempts at entry; (2) recording those attempts and
|
||
|
sending a warning to the perpetrator; and (3) keeping
|
||
|
the perpetrartor off the system permanently until
|
||
|
he/she is reinstated by the computer's security
|
||
|
administrator or SYSOP. Balding, Computer Breaking and
|
||
|
Entering: The Anatomy of Liability, 5 Computer Lawyer,
|
||
|
Jan. 1988, at 6.
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 37
|
||
|
----------------------
|
||
|
|
||
|
25. Garfinkel, An Introduction to Computer Security, 33
|
||
|
Prac. Law. 42 (1987).
|
||
|
|
||
|
26. Id.
|
||
|
|
||
|
27. Id. "A password is a secret word or phrase that should
|
||
|
be known only to the user and the computer. When the
|
||
|
user first attempts to use the computer, he must first
|
||
|
enter the password. The computer then compares the
|
||
|
typed password to the stored password and, if they
|
||
|
match, allows the user access."
|
||
|
|
||
|
28. Id., at 42 and 46.
|
||
|
|
||
|
29. 14 Am. Jur. POF 2d Computer-Generated Evidence Sec. 11
|
||
|
(1977).
|
||
|
|
||
|
30. 54 Fordham L.Rev. 439, note 2 (1985).
|
||
|
|
||
|
31. Restatement (Second) of Torts Sec. 568(1) (1976).
|
||
|
|
||
|
32. Restatement (Second) of Torts Sec. 577(1) (1976).
|
||
|
|
||
|
|
||
|
33. Restatement (Second) of Torts Sec.559 (1976).
|
||
|
|
||
|
34. Veeder, The History and Theory of the Law of
|
||
|
Defamation, 3 Colum. L.Rev. 546, 569-571 (1903).
|
||
|
|
||
|
35. Restatement (Second) of Torts Sec. 622 (1976).
|
||
|
|
||
|
36. Restatement, Torts Sec. 568, comment d (1938).
|
||
|
|
||
|
37. Shor v. Billingley, 4 Misc.2d 857, 158 N.Y.S.2d 476
|
||
|
(Sup. Ct. 1956), aff'd mem., 4 App.Div. 2d 1017, 169
|
||
|
N.Y.S.2d 416 (1st Dep't. 1957).
|
||
|
|
||
|
38. Torts: Defamation: Libel-Slander Distinction:
|
||
|
Extemporaneous Remarks Made on Television Broadcast:
|
||
|
Shor v. Billingley, 4 Misc. 2d 857, 158 N.Y.S.2d 476
|
||
|
(Sup.Ct. N.Y. County 1957), 43 Cornell L.Q. 320, 322
|
||
|
(1957) (Authored by Stephen A. Hochman).
|
||
|
|
||
|
39. Id.
|
||
|
|
||
|
|
||
|
40. 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964),
|
||
|
motion denied 376 U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d
|
||
|
83.
|
||
|
|
||
|
|
||
|
41. 376 U.S. 254, 273.
|
||
|
|
||
|
42. 376 U.S. 254, 280.
|
||
|
|
||
|
43. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 38
|
||
|
----------------------
|
||
|
|
||
|
44. Gertz v. Robert Welch, Inc., 418 U.S. 323, 326.
|
||
|
|
||
|
45. Id.
|
||
|
|
||
|
46. Id., at 327.
|
||
|
|
||
|
47. "...those who hold governmental office may recover for
|
||
|
injury to reputation only on clear and convincing proof
|
||
|
that the defamatory falsehood was made with knowledge
|
||
|
of its falsity or with reckless disregard for the
|
||
|
truth." Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
|
||
|
"An individual who decides to seek governmental office
|
||
|
must accept certain necessary consequences of that
|
||
|
involvement in pubic affairs. He runs the risk of
|
||
|
closer public scrutiny than might otherwise be the
|
||
|
case." Id., at 344.
|
||
|
|
||
|
48. "...[A]n individual may attain such pervasive fame and
|
||
|
notoriety that he becomes a public figure for all
|
||
|
purposes and in all contexts. More commonly, an
|
||
|
individual voluntarily injects himself or is drawn into
|
||
|
a particular public controversy and thereby becomes a
|
||
|
public figure for a limited range of issues. In either
|
||
|
case such persons assume special prominence in the
|
||
|
resolution of public questions." 418 U.S. 323, 351.
|
||
|
|
||
|
|
||
|
49. "Even if the foregoing generalities do not obtain in
|
||
|
every circumstance, the communications media are
|
||
|
entitled to act on the assumption that public officials
|
||
|
and public figures have voluntarily exposed themselves
|
||
|
to the increased risk of injury from defamatory
|
||
|
falsehood concerning them. No such assumption is
|
||
|
justified with respect to a private individual. He has
|
||
|
not accepted public office or assumed an 'influential
|
||
|
role in ordering society.' Curtis Publishing Co. v.
|
||
|
Butts, 388 U.S., at 164 ...He has relinquished no part
|
||
|
of his interest in the protection of his own good name,
|
||
|
and consequently he has a more compelling call on the
|
||
|
courts for redress of injury inflicted by the
|
||
|
defamatory falsehood. Thus, private individuals are not
|
||
|
only more vulnerable to injury than public officials
|
||
|
and public figures; they are also more deserving of
|
||
|
recovery." Id., at 345.
|
||
|
|
||
|
50. "...[P]etitioner was not a public figure. He ...
|
||
|
plainly did not thrust himself into the vortex of this
|
||
|
public issue, nor did he engage the public's attention
|
||
|
in an attempt to influence its outcome." Id., at 352.
|
||
|
|
||
|
51. Justice Powell noted for the Court that
|
||
|
|
||
|
"[T]he communications media are entitled to act on
|
||
|
the assumption that public officials and public
|
||
|
figures have voluntarily exposed themselves to
|
||
|
increased risk of injury from defamatory falsehood
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 39
|
||
|
----------------------
|
||
|
concerning them. No such assumption is justified
|
||
|
with respect to a private individual. He has not
|
||
|
accepted public office or assumed an 'influential
|
||
|
role in ordering society....' He has relinquished
|
||
|
no part of his interest in the protection of his
|
||
|
own good name, and consequently he has a more
|
||
|
compelling call on the courts for redress of injury
|
||
|
inflicted be defamatory falsehood. Thus, private
|
||
|
individuals are not only more vulnerable to injury
|
||
|
than public officials and public figures; they are
|
||
|
also more deserving of recovery." Id., at 345.
|
||
|
|
||
|
|
||
|
52. Id., at 347.
|
||
|
|
||
|
53. Keeton, Dobbs, Keeton and Owen, Prosser and Keeton on
|
||
|
Torts, sec. 32, p.174. See also Vaughn v. Menlove, 3
|
||
|
Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837).
|
||
|
|
||
|
54. 111 Cal. App. 2d 424, 244 P.2d 757, 28 ALR2d 451
|
||
|
(1952).
|
||
|
|
||
|
|
||
|
55. 111 Cal. App. 2d 424, 427.
|
||
|
|
||
|
56. Id., at 426.
|
||
|
|
||
|
57. Id, at 427.
|
||
|
|
||
|
58. Restatement (Second) of Torts Sec. 577(2) (1976).
|
||
|
|
||
|
59. 22 Ohio App.2d 141, 259 N.E.2d 160 (1970).
|
||
|
|
||
|
|
||
|
60. Scott v. Hull, 259 N.E.2d 160, 162 (1970).
|
||
|
|
||
|
61. Id., at 161.
|
||
|
|
||
|
62. Id., at 162.
|
||
|
|
||
|
63. 836 F.2d 1042 (7th Cir. 1987).
|
||
|
|
||
|
|
||
|
From kadie Sat Oct 12 09:54:35 1991
|
||
|
To: cafb-mail
|
||
|
~Subject: Computers and Academic Freedom mailing list (batch edition)
|
||
|
Status: R
|
||
|
|
||
|
|
||
|
Computers and Academic Freedom mailing list (batch edition)
|
||
|
Sat Oct 12 09:54:16 EDT 1991
|
||
|
|
||
|
[For information on how to get a much smaller edited version of the
|
||
|
list, send email to archive-server@eff.org. Include the line:
|
||
|
send acad-freedom caf
|
||
|
- Carl ]
|
||
|
|
||
|
In this issue:
|
||
|
|
||
|
:
|
||
|
|
||
|
The addresses for the list are now:
|
||
|
comp-academic-freedom-talk@eff.org - for contributions to the list
|
||
|
or caf-talk@eff.org
|
||
|
listserv@eff.org - for automated additions/deletions
|
||
|
(send email with the line "help" for details.)
|
||
|
caf-talk-request@eff.org - for administrivia
|
||
|
|
||
|
-------------------
|
||
|
|
||
|
|
||
|
64. Id., at 1047.
|
||
|
|
||
|
65. The Court of Appeals noted the Restatement view and
|
||
|
observed that Indiana law had neither embraced nor
|
||
|
rejected that approach. Id., at 1046.
|
||
|
|
||
|
66. Id.
|
||
|
|
||
|
67. Id.
|
||
|
|
||
|
68. Id., at 1046-47.
|
||
|
|
||
|
69. Id.
|
||
|
|
||
|
|
||
|
70. Recall that in our hypothetical a third user
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 40
|
||
|
----------------------
|
||
|
masquerading as another is transmitting messages to
|
||
|
others, revealing embarassing and false information.
|
||
|
|
||
|
|
||
|
71. BBS systems security and other preventative measures
|
||
|
are discussed more fully infra, Topic 3.d.
|
||
|
|
||
|
|
||
|
72. Issues in proving the SYSOP's role in publishing the
|
||
|
libellous statement are discussed more fully in Topic
|
||
|
III. A., infra.
|
||
|
|
||
|
73. Sydney v. MacFadden Newspaper Publishing Corp., 242
|
||
|
N.Y. 208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also
|
||
|
Restatement (Second) of Torts Sec. 621 (1976) ("One who
|
||
|
is liable for a defamatory communication is liable for
|
||
|
the proved, actual harm caused to the reputation of the
|
||
|
person defamed.")
|
||
|
|
||
|
74. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472
|
||
|
U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985).
|
||
|
|
||
|
75. See supra, note 53 and accompanying text.
|
||
|
|
||
|
76. Note, Protecting the Subjects of Credit Reports, 80
|
||
|
Yale L.J. 1035, 1051-52, n.88 (1971).
|
||
|
|
||
|
77. Gertz did not rule out an assumption of defendant's
|
||
|
negligence. See Eaton, The American Law of Defamation
|
||
|
Through Gertz V. Robert Welch, Inc., and Beyond: An
|
||
|
Analytical Primer, 61 Va. L.Rev. 1349 (1975).
|
||
|
|
||
|
78. 15 U.S.C.A. Sec. 1681 et seq. (1974). Two standards are
|
||
|
proposed there: the first, willful noncompliance, is
|
||
|
defined as equivalent to the New York Times "actual
|
||
|
malice" standard, and violators are liable for actual
|
||
|
and punitive damages. Sec. 1681(n), supra. Presumably
|
||
|
this would apply to the situation where the SYSOP is
|
||
|
dilatory in removing the libellous message. The second
|
||
|
proposed standard, negligent noncompliance, occurs in
|
||
|
the absence of willfulness and results in liability
|
||
|
only for actual damages. Sec. 1681(o), supra.
|
||
|
Situations where the SYSOP failed to adopt reasonable
|
||
|
computer security measures might come under this
|
||
|
category.
|
||
|
|
||
|
79. 18 U.S.C.S. Sec. 2707(b),(c) (Law. Co-op 1979 & Supp.
|
||
|
1988) provides in pertinent part:
|
||
|
(b) Relief. In a civil action under this section,
|
||
|
appropriate relief includes -
|
||
|
(1) Such preliminary and other equitable or
|
||
|
declaratory relief as may be appropriate;
|
||
|
(2) damages under subsection (c); and
|
||
|
(3) a reasonable attorney's fee and other
|
||
|
litigation costs reasonably incurred.
|
||
|
(c) Damages. The court may assess as damages in a
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 41
|
||
|
----------------------
|
||
|
civil action under this section the sum of the
|
||
|
actual damages suffered by the plaintiff and
|
||
|
any profits made by the violator as a result
|
||
|
of the violation, but in no case shall a
|
||
|
person entitled to recover receive less than
|
||
|
the sum of $1,000.
|
||
|
|
||
|
18 U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988)
|
||
|
limits the civil action under this section to two years
|
||
|
after the date upon which the claimant first discovered
|
||
|
or had a reasonable opportunity to discover the
|
||
|
violation.
|
||
|
As to damage provisions supplied by state law, see
|
||
|
California Penal Code 502(e)(1),(2) (West Pub. 1988):
|
||
|
(e)(1) In addition to any civil remedy available,
|
||
|
the owner or lessee of the computer, computer
|
||
|
system, computer network, computer program, or data
|
||
|
may bring a civil action against any person
|
||
|
convicted under this section for compensatory
|
||
|
damages, including any expenditure reasonably and
|
||
|
necessarily incurred by the owner or lessee to
|
||
|
verify that a computer system, computer network,
|
||
|
computer program, or data was not altered, damaged,
|
||
|
or deleted by the access. For purposes of actions
|
||
|
authorized by this subdivision, the conduct of an
|
||
|
unemancipated minor shall be imputed to the parent
|
||
|
or legal guardian having control or custody of the
|
||
|
minor, pursuant to the provisions of Section 1714.1
|
||
|
of the Civil Code.
|
||
|
(2) In any action brought pursuant to this
|
||
|
subdivision the court may award reasonable
|
||
|
attorney's fees to a prevailing party.
|
||
|
|
||
|
|
||
|
80. A lawsuit recently filed in the United States District
|
||
|
Court for the Southern District of Indiana may break
|
||
|
new ground in enunciating precisely what BBS SYSOPs'
|
||
|
reasonable duties of care are. Thompson v. Predaina,
|
||
|
Civil Action #IP-88 93C (S.D. Ind. filed 1988). The
|
||
|
complaint alleges, inter alia, invasion of plaintiff
|
||
|
user's privacy, libel, and wrongful denial of access to
|
||
|
the BBS in violation of U.S.C. Title 18, ss 2701
|
||
|
(a)(2). As to statutory damages available, see infra,
|
||
|
note 105.
|
||
|
|
||
|
81. Gemignani, Computer Law 33:7 (Lawyers Co-op 1985, Supp.
|
||
|
1988) (quoting Capitol PC Users Group Minimum Code of
|
||
|
Standards for electronic Bulletin Board Systems,
|
||
|
reprinted in 4 Computer Law Reptr. 89).
|
||
|
|
||
|
82. Note, 54 Fordham L.Rev. 439, 449 (1985) (Authored by
|
||
|
Jonathan Gilbert).
|
||
|
|
||
|
83. Id., at 449.
|
||
|
|
||
|
84. Id., at 449-50.
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 42
|
||
|
----------------------
|
||
|
|
||
|
85. A "trojan horse" program takes control of the BBS and
|
||
|
allows its sender to access and steal its most
|
||
|
sensitive information. Fites, Johnston and Kratz, The
|
||
|
Computer Virus Crisis, Van Nortrand/Reinhold (1989), at
|
||
|
39 and 45.
|
||
|
|
||
|
86. Balding, Computer Breaking and Entering: The Anatomy of
|
||
|
Liability, 5 Computer Law. (January 1988), at 6.
|
||
|
|
||
|
87. Id.
|
||
|
|
||
|
88. Hellar v. Bianco, 244 P.2d 757. See supra, note 54 and
|
||
|
accompanying text.
|
||
|
|
||
|
89. Restatement (Second) of Torts Sec. 577(2) (1976). See
|
||
|
supra, note 58 and accompanying text.
|
||
|
|
||
|
90. Tackett v. General Motors Corporation, 836 F.2d 1042
|
||
|
(7th Cir. 1987). See supra, note 63 and accompanying
|
||
|
text.
|
||
|
|
||
|
91. See note 53, supra, and accompanying text.
|
||
|
|
||
|
|
||
|
92. It has been suggested that this would be the rough
|
||
|
equivalent of a newspaper publishing a retraction after
|
||
|
discovering what it had printed was defamatory. Note,
|
||
|
54 Fordham L.Rev. 439, note 55 (1985). BBS operators
|
||
|
should not be held liable in this situation insofar as
|
||
|
they did not know of the nature of the statement at the
|
||
|
time it was made. Restatement (Second) of Torts Sec.
|
||
|
581 (1977).
|
||
|
|
||
|
93. Proving the masquerader's actions is discussed more
|
||
|
fully infra, Topic III. B.
|
||
|
|
||
|
94. Stipp, Computer Bulletin Board Operators Fret Over
|
||
|
Liability for Stolen Data, Wall St. J. Nov. 9, 1984, at
|
||
|
33, col. 1.
|
||
|
|
||
|
95. Id.
|
||
|
|
||
|
96. See Topic I., supra, where the masquerader has
|
||
|
discovered and uses the password and name of the
|
||
|
regular user; he appears for all intents and purposes
|
||
|
to be that regular user.
|
||
|
|
||
|
97. 836 F.2d 1042 (7th Cir. 1987).
|
||
|
|
||
|
98. Id., at 1047.
|
||
|
|
||
|
99. Id.
|
||
|
|
||
|
100. Indeed, U.S.C. Title 18, Sec. 2702 (Law. Co-op 1979 &
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 43
|
||
|
----------------------
|
||
|
Supp. 1988) proscribes the knowing dissemination of an
|
||
|
electronically stored communication by the SYSOP:
|
||
|
Sec. 2702. Disclosure of contents
|
||
|
(a) Prohibitions. Except as provided in subsection
|
||
|
(b)-
|
||
|
(1) a person or entity providing an
|
||
|
electronic communication service to the
|
||
|
public shall not knowingly divulge to any
|
||
|
person or entity the contents of a
|
||
|
communication while in electronic storage
|
||
|
on that service; and
|
||
|
(2) a person or entity providing remote
|
||
|
computing service to the public shall not
|
||
|
knowingly divulge to any person or entity
|
||
|
the contents of any communication which
|
||
|
is carried or maintained on that service-
|
||
|
(A) on behalf of, and received by means
|
||
|
of electronic transmission from (or
|
||
|
created by means of computer
|
||
|
processing of communications
|
||
|
received by means of electronic
|
||
|
transmissions from), a subscriber or
|
||
|
customer of such service; and
|
||
|
(B) solely for the purpose of providing
|
||
|
storage or computer processing
|
||
|
services to such subscriber or
|
||
|
customer, if the provider is not
|
||
|
authorized to access the contents of
|
||
|
any such communications for purposes
|
||
|
of providing any services other than
|
||
|
storage or computer processing.
|
||
|
|
||
|
A similar provision is embodied in Cal. Pen. Code sec.
|
||
|
502(c)(6) (West Pub. 1988), which provides:
|
||
|
|
||
|
(c) Except as provided in subdivision (i),
|
||
|
any person who commits any of the
|
||
|
following acts is guilty of a public
|
||
|
offense:
|
||
|
(6) Knowingly and without permission
|
||
|
provides or assists in providing a
|
||
|
means of accessing a computer,
|
||
|
computer system, or computer network
|
||
|
in violation of this section.
|
||
|
|
||
|
|
||
|
|
||
|
101. The doctrine of res ipsa loquitor, or "the thing speaks
|
||
|
for itself" warrants the inference of the SYSOP's
|
||
|
negligence, which the jury may draw or not as its
|
||
|
judgement dictates. See Sullivan v. Crabtree, 36
|
||
|
Tenn.App. 469, 258 S.W.2d 782 (1953).
|
||
|
|
||
|
102. See discussion under Topic II. B., supra.
|
||
|
|
||
|
103. As someone who intentionally accesses confidential
|
||
|
password information to masquerade as other users on
|
||
|
other BBSes, the masquerader falls well within the pale
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 44
|
||
|
----------------------
|
||
|
of "actual malice" defined in Gertz v. Robert Welch,
|
||
|
Inc., 418 U.S. 323, 342, supra, note 43 and
|
||
|
accompanying text (a defamatory falsehood was made with
|
||
|
knowledge of its falsity or with reckless disregard for
|
||
|
the truth).
|
||
|
|
||
|
104. Evidentiary problems involved with proving the
|
||
|
masquerader's actions are discussed more in Topic III.
|
||
|
B., infra.
|
||
|
|
||
|
105. 18 U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988)
|
||
|
describes the masquerader's fault thus:
|
||
|
(a) Cause of action. Except as provided in section
|
||
|
2703(e), any provider of electronic
|
||
|
communication service, subscriber, or customer
|
||
|
aggrieved by any violation of this chapter in
|
||
|
which the conduct constituting the violation
|
||
|
is engaged in with a knowing or intentional
|
||
|
state of mind may, in a civil action, recover
|
||
|
from the person or entity which engaged in
|
||
|
that violation such relief as may be
|
||
|
appropriate.
|
||
|
|
||
|
California Penal Code sec. 502(c) et seq. (West Pub.
|
||
|
1988) is even more specific:
|
||
|
(c) Except as provided in subdivision (i), any
|
||
|
person who commits any of the following acts
|
||
|
is guilty of a public offense:
|
||
|
(1) Knowingly accesses and without permission
|
||
|
alters, damages, deletes, destroys, or
|
||
|
otherwise uses any data, computer,
|
||
|
computer system, or computer network in
|
||
|
order to either
|
||
|
(A) devise or execute any scheme or
|
||
|
artiface to defraud, deceive, or
|
||
|
extort, or
|
||
|
(B) wrongfully control or obtain money,
|
||
|
property or data.
|
||
|
* * *
|
||
|
(3) Knowingly and without permission uses or
|
||
|
causes to be used computer services.
|
||
|
(4) Knowingly accesses and without permission
|
||
|
adds, alters, damages, deletes, or
|
||
|
destroys any data, computer software, or
|
||
|
computer programs which reside or exist
|
||
|
internal or external to a computer,
|
||
|
computer system, or computer network.
|
||
|
* * *
|
||
|
(7) Knowingly and without permission accesses
|
||
|
or causes to be accessed any computer,
|
||
|
computer system, or computer network.
|
||
|
|
||
|
|
||
|
106. Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
|
||
|
|
||
|
107. In addition to the remedies set forth in note 105,
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 45
|
||
|
----------------------
|
||
|
supra, the following federal and state penalties may
|
||
|
apply:
|
||
|
18 U.S.C.S. Sec. 2701(b),(c) (Law. Co-op 1979 & Supp.
|
||
|
1988):
|
||
|
(b) Punishment. The punishment for an offense
|
||
|
under subsection (a) of this seciton is -
|
||
|
(1) if the offense is committed for purposes
|
||
|
of commercial advantage, malicious
|
||
|
destruction or damage, or private
|
||
|
commercial gain -
|
||
|
(A) a fine not more than &250,000 or
|
||
|
imprisonment for not more than one
|
||
|
year, or both, in the case of a
|
||
|
first offense under this
|
||
|
subparagraph; and
|
||
|
(B) a fine under this title or
|
||
|
imprisonment for not more than two
|
||
|
years, or both, for any subsequent
|
||
|
offense under this subparagraph; and
|
||
|
(2) a fine of not more than $5,000 or
|
||
|
imprisonment for not more than six
|
||
|
months, or both, in any other case.
|
||
|
(c) Exceptions. Subsection (a) of this section
|
||
|
does not apply with respect to conduct
|
||
|
authorized-
|
||
|
(1) by the person or entity providing a wire
|
||
|
or electronic communications service;
|
||
|
(2) by a user of that service with respect to
|
||
|
a communication of or intended for that
|
||
|
user; or
|
||
|
(3) in section 2703, 2704, or 2518 of this
|
||
|
title.
|
||
|
|
||
|
For an example of state-mandated damages provisions on
|
||
|
this subject, see California Penal Code sec. 502(d) et
|
||
|
seq. (West Pub. 1988).
|
||
|
|
||
|
108. See discussion under Topic II. B., supra.
|
||
|
|
||
|
109. See note 101, supra.
|
||
|
|
||
|
110. "Custom...bears upon what other will expect the actor
|
||
|
to do, and what, therefore, reasonable care may require
|
||
|
the actor to do, upon the feasibility of taking
|
||
|
precautions, the difficulty of change, and the actor's
|
||
|
opportunity to learn the risks and what is called for
|
||
|
to meet them. If the actor does only what everyone else
|
||
|
has done, there is at least an inference that the actor
|
||
|
is conforming to the community's idea of reasonable
|
||
|
behavior." Keeton, Dobbs, Keeton and Owen, Prosser and
|
||
|
Keeton on Torts, sec. 33, p.194. See also James,
|
||
|
Particularizing Standards of Conduct in Negligence
|
||
|
Trials, 5 Vand. L. Rev. 697, 709-714 (1952); Ploetz v.
|
||
|
Big Discount Panel Center, Inc., 402 So.2d 64 (Fla.
|
||
|
App. 1981).
|
||
|
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 46
|
||
|
----------------------
|
||
|
|
||
|
111. See notes 80-93, supra, and accompanying text.
|
||
|
|
||
|
112. See note 103, supra.
|
||
|
|
||
|
113. See Pfau and Keane, Computer Logs Can Pinpoint Illegal
|
||
|
Transactions, Legal Times of Washington, vol. 6, p.16
|
||
|
(May 14, 1984): "Computers can monitor their own use.
|
||
|
Unlike other such forms of physical evidence such as
|
||
|
guns, computers can keep track of individual users and
|
||
|
other identifying data. Imagine a gun that logs every
|
||
|
instance it is fired or even handled, and shows the
|
||
|
date, time, and activity. Recovery of such a weapon
|
||
|
would be essential to the prosecution.
|
||
|
"Most computers have long had built-in logging
|
||
|
capabilities....The log function was designed to
|
||
|
facilitate billing for the use of computer resources
|
||
|
rather than to assist crime detection. To the extent
|
||
|
that the owner of a smaller computer does not charge
|
||
|
for its use, he or she has no incentive to purchase a
|
||
|
self-executing log. Still, such logs keep surprisingly
|
||
|
accurate records of who is using the computer."
|
||
|
|
||
|
114. Fed. R. Evid. 801(c).
|
||
|
|
||
|
115. Fed. R. Evid. 802: "Hearsay is not admissible except as
|
||
|
provided by these rules or by other rules precribed by
|
||
|
the Supreme Court pursuant to statutory authority or by
|
||
|
Act of Congress." Exclusion of hearsay evidence is
|
||
|
grounded on: (1) nonavailability of the declarant for
|
||
|
cross-examination and observance of demeanor; (2)
|
||
|
absence of an oath by the person making the statement;
|
||
|
amd (3) significant risk that the person that the
|
||
|
witness may report proffered statements inaccurately. 2
|
||
|
Bender, Computer Law, sec. 6.01[2].
|
||
|
|
||
|
116. Gemignani, The Data Detectives: Building A Case From
|
||
|
Computer Files, 3 Nat'l L.J. 29 (1981).
|
||
|
|
||
|
117. Fed. R. Evid. 803(6). See also 2 Bender, Computer Law,
|
||
|
sec. 6.01[4] (1988).
|
||
|
|
||
|
118. Fed. R. Evid. 803(6).
|
||
|
|
||
|
119. Id. In current practice records kept by nonprofit
|
||
|
organizations, such as churches, have long been held to
|
||
|
be admissible. Ford v. State, 82 Tex.Cr.R. 638, 200
|
||
|
S.W. 841 (1918). It is at least arguable that a
|
||
|
computerized BBS, although run as a hobby, falls under
|
||
|
the same classification.
|
||
|
|
||
|
120. See Iowa Code Ann. Sec. 622.28; People v. Lugashi, 252
|
||
|
Cal.Rptr 434 (Cal.App. 2 Dist. 1988).
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 47
|
||
|
----------------------
|
||
|
|
||
|
121. See 14 Am.Jur. POF2d Sec. 15 (1977, Supp. 1988). Cf.
|
||
|
United States v. De Georgia, 420 F.2d 889, 2 CLSR 479,
|
||
|
484 (1969, CA9 Ariz), where it was held that it is
|
||
|
immaterial whether a business record is maintained in a
|
||
|
computer rather than in company books regarding
|
||
|
admissibility of those records, so long as (1) the
|
||
|
trial court requires the proponent of the computerized
|
||
|
records to lay a foundation as to their
|
||
|
trustworthiness, and (2) the opposing party is given
|
||
|
the same opportunity to inquire into the computer's
|
||
|
accuracy as he would have to inquire into the accuracy
|
||
|
of written business records.
|
||
|
|
||
|
122. The BBS program run on the SYSOP's computer ordinarily
|
||
|
"stamps" the date and time of day each user logs onto
|
||
|
the BBS. A corresponding record is automatically
|
||
|
affixed to each piece of electronic mail posted so that
|
||
|
the reader knows when it was added to the database.
|
||
|
Similarly, the telephone company maintains copious
|
||
|
records of the date and time each phone call is
|
||
|
connected in its dialing area. The caller has no
|
||
|
control over either of these processes.
|
||
|
|
||
|
123. 252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988).
|
||
|
|
||
|
124. Id., at 437.
|
||
|
|
||
|
125. Id.
|
||
|
|
||
|
126. Id.
|
||
|
|
||
|
127. Id., at 439.
|
||
|
|
||
|
128. Id., at 437.
|
||
|
|
||
|
129. Id., at 440.
|
||
|
|
||
|
130. Id., at 442. See also United States v. Russo, 480 F.2d
|
||
|
1228 (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct.
|
||
|
915, 39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V
|
||
|
Roland Thomas II, 719 F.2d 104 (1983 CA5 La), 104 Fed
|
||
|
Rules Evid Serv 731; Peoples Cas & Coke Co. v. Barrett,
|
||
|
118 Ill.App.3d 52, 73 Ill. Dec. 400, 455 N.E.2d 829
|
||
|
(1983).
|
||
|
|
||
|
131. 432 So.2d 837 (La., 1983).
|
||
|
|
||
|
132. Id., at 839-40.
|
||
|
|
||
|
133. Id., at 839.
|
||
|
|
||
|
134. United States v. Verlin, 466 F.Supp. 155 (ND Tex,
|
||
|
1979).
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 48
|
||
|
----------------------
|
||
|
|
||
|
135. Id., at 158.
|
||
|
|
||
|
136. The reasonable SYSOP should offer his full cooperation
|
||
|
in aiding the maligned user to regain her good name by
|
||
|
providing her with his BBS' phone-in records made at
|
||
|
the time the libellous message appeared. See note 93,
|
||
|
supra.
|
||
|
|
||
|
137. See note 123, supra.
|
||
|
|
||
|
138. Cf. note 118, supra. As to an electronic BBS being
|
||
|
classified as a "business" for hearsay purposes, see
|
||
|
note 120, supra.
|
||
|
|
||
|
139. See note 128, supra.
|
||
|
|
||
|
140. Authentication has been broadly described thus: "[W]hen
|
||
|
a claim or offer involves impliedly or expressly any
|
||
|
element of personal connection with a corporeal object,
|
||
|
that connection must be made to appear...." Wigmore,
|
||
|
Evidence, Sec. 2129 at 564 (2d ed. 1972). This
|
||
|
requirement is also known as the "Best Evidence Rule."
|
||
|
|
||
|
141. Fed. R. Evid. 901(a),(b)(6).
|
||
|
|
||
|
142. 2 Bender, Computer Law, sec. 5.03[1][a] (1988).
|
||
|
|
||
|
143. Id.
|
||
|
|
||
|
144. See Fed. R. Evid. 901(b)(6): "(6) Telephone
|
||
|
conversations. Telephone conversations, by evidence
|
||
|
that a call was made to the number assigned at the time
|
||
|
by the telephone company to a particular person or
|
||
|
business, if *** (B) in the case of a business, the
|
||
|
call was made to a place of business and the
|
||
|
conversation related to business reasonably transacted
|
||
|
over the telephone...." (emphasis added).
|
||
|
|
||
|
145. Fed. R. Evid. 1002.
|
||
|
|
||
|
|
||
|
146. E.W. Cleary, McCormick on Evidence, sec. 231 (2nd. Ed.
|
||
|
1972).
|
||
|
|
||
|
|
||
|
147. Id. Further rationales for the rule are risks of
|
||
|
inaccuracy contained in commonly used copying
|
||
|
techniques and heightened chances of witness'
|
||
|
forgetfulness through oral testimony. Id., sec. 231.
|
||
|
|
||
|
|
||
|
148. 305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974).
|
||
|
|
||
|
149. 305 So.2d 421, 427.
|
||
|
|
||
|
150. Id., at 428.
|
||
|
---
|
||
|
Defamation Liability of Computerized BBS Operators
|
||
|
& Problems of Proof (C) 1989 John R. Kahn 49
|
||
|
----------------------
|
||
|
|
||
|
151. Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979).
|
||
|
|
||
|
152. Id., at 370.
|
||
|
|
||
|
153. See note 121, supra, and accompanying text.
|
||
|
|
||
|
154. Other circumstantial evidence might include, among
|
||
|
other things: possible motive for the masquerader to
|
||
|
defame plaintiff; plaintiff's own inability to call
|
||
|
from the phone number from which the defamatory message
|
||
|
is shown to have originated; or even an electronic
|
||
|
"fingerprint" left by the particular computer from
|
||
|
which the defamatory message originated. Pfau and
|
||
|
Keane, Computer Logs Can Pinpoint Illegal Trasactions,
|
||
|
Legal Times of Washington, vol. 6, p.16 (May 14, 1984).
|
||
|
|
||
|
155. Fed. R. Evid. 1002 provides:
|
||
|
REQUIREMENT OF ORIGINAL. To prove the content of
|
||
|
a writing, recording, or photograph, the original
|
||
|
of that writing, recording or photograph is
|
||
|
required, unless provided otherwise in these
|
||
|
rules or by an Act of Congress.
|
||
|
|
||
|
|
||
|
156. Examples of this situation are the telephone company's
|
||
|
keeping of hundreds of thousands of individual
|
||
|
computerized records of each telephone call made within
|
||
|
a certain dialing area, or a BBS' extensive history of
|
||
|
subscriber use compiled for billing purposes.
|
||
|
|
||
|
157. See Harned v. Credit Bureau of Gilette, 513 P2d 650, 5
|
||
|
CLSR 394 (1973).
|
||
|
|
||
|
158. Fed. R. Evid. 1006.
|
||
|
|
||
|
|
||
|
159. 137 Ga.App. 360, 223 S.E.2d 757 (1976).
|
||
|
|
||
|
160. 223 S.E.2d 757, 760.
|
||
|
|
||
|
Downloaded From P-80 International Information Systems 304-744-2253
|