705 lines
33 KiB
Plaintext
705 lines
33 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Dec 20, 1992 Volume 4 : Issue 67
|
|||
|
ISSN 1067-672X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Iditor: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.67 (Dec 20, 1992)
|
|||
|
File 1--Thanks to all and see ya Jan 9th
|
|||
|
File 2--Secret Service Raids Dorm
|
|||
|
File 3--Tales From the Crackdown
|
|||
|
File 4--SYSLAW (Review #1)
|
|||
|
File 5--SYSLAW (Review #2)
|
|||
|
File 6--Model BBS/User Contract (from SYSLAW)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sat, 19 Dec 92 23:18:21 CST
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Thanks to all and see ya Jan 9th
|
|||
|
|
|||
|
CuD will be on vacation from 23 December through about 8 January.
|
|||
|
Issue #5.01 will be out about January 9. We will, however, continue to
|
|||
|
answer mail and take subs over break.
|
|||
|
|
|||
|
A special year's end THANKS!!! goes out to the gang who have
|
|||
|
maintained the CuD ftp sites: DAN (beware of flaming sambuca snorters)
|
|||
|
CAROSONE, PAUL (even if he is from the "other" university in Michigan)
|
|||
|
SOUTHWORTH, RALPH (the quiet one) SIMS, JYRKI (who will never be
|
|||
|
accused of lurking) KUOPOLLA, and the guy who makes it all possible
|
|||
|
BRENDAN (the only Zen net-meister we now) KEHOE. And, special thanks
|
|||
|
to the mailserv meister at mailserv@batpad.lgb.ca.us. He's too young
|
|||
|
to mention his name, but he's done a fine job in keeping the mailserv
|
|||
|
going.
|
|||
|
|
|||
|
As usal, the proof reeding and coyp editor, Etaion Shrdlu, Junior, has
|
|||
|
kept CuD texts error-free ofspelling and typo errors.
|
|||
|
|
|||
|
And, of course, thanks to everybody who sent in articles (and to those
|
|||
|
who read them).
|
|||
|
|
|||
|
The January issues will include several on the Software Publishers'
|
|||
|
Association (SPA), including interviews, commentary, and other stuff.
|
|||
|
So, see ya'll about a week after New Year's.
|
|||
|
|
|||
|
Jim and Gordon
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 17 Dec 92 16:08:10 CST
|
|||
|
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
|
|||
|
Subject: File 2--Secret Service Raids Dorm
|
|||
|
|
|||
|
Federal Agents Raid Dorm, Seize Computer Equipment
|
|||
|
By JOE ABERNATHY Copyright 1992, Houston Chronicle
|
|||
|
|
|||
|
The Secret Service has raided a dorm room at Texas Tech University,
|
|||
|
seizing the computers of two Houston-area students who allegedly used
|
|||
|
an international computer network to steal computer software.
|
|||
|
|
|||
|
Agents refused to release the names of the two area men and a third
|
|||
|
from Austin, who were not arrested in the late-morning raid Monday at
|
|||
|
the university in Lubbock. Their cases will be presented to a grand
|
|||
|
jury in January.
|
|||
|
|
|||
|
They are expected to be charged with computer crime, interstate
|
|||
|
transport of stolen property and copyright infringement.
|
|||
|
|
|||
|
"The university detected it," said Resident Agent R. David Freriks of
|
|||
|
the Secret Service office in Dallas, which handled the case. He said
|
|||
|
that Texas Tech computer system operators contacted the Secret Service
|
|||
|
when personal credit information was found mixed with the software
|
|||
|
mysteriously filling up their fixed-disk data storage devices.
|
|||
|
|
|||
|
The raid is the first to fall under a much broader felony definition
|
|||
|
of computer software piracy that could affect many Americans. This
|
|||
|
October revision to the copyright law was hotly debated by computer
|
|||
|
experts, who contended that it sets the felony threshold far too low.
|
|||
|
|
|||
|
Agents allege that the three used a chat system hosted on the Internet
|
|||
|
computer network, which connects up to 15 million people in more than
|
|||
|
40 nations, to make contacts with whom they could trade pirated
|
|||
|
software. The software was transferred over the network, into Texas
|
|||
|
Tech's computers, and eventually into their personal computers. The
|
|||
|
Secret Service seized those three personal computers and associated
|
|||
|
peripherals which an agent valued at roughly $5,000.
|
|||
|
|
|||
|
The software Publishers Association, a software industry group
|
|||
|
chartered to fight piracy, contends that the industry lost $1.2
|
|||
|
billion in sales in 1991 to pirates.
|
|||
|
|
|||
|
Although these figures are widely questioned for their accuracy,
|
|||
|
piracy is widespread among Houston's 450-plus computer bulletin
|
|||
|
boards, and even more so on the global Internet.
|
|||
|
|
|||
|
"There are a lot of underground sites on the Internet run by
|
|||
|
university system administrators, and they have tons of pirated
|
|||
|
software available to download -- gigabytes of software," said Scott
|
|||
|
Chasin, a former computer hacker who is now a computer security
|
|||
|
consultant. "There's no way that one agency or authority can go
|
|||
|
through and try to sweep all the bad software off the Internet,
|
|||
|
because the Internet's too big."
|
|||
|
|
|||
|
The mission of the Secret Service does not normally include the
|
|||
|
pursuit of software piracy, but rather the use of "electronic access
|
|||
|
devices" such as passwords in the commission of a crime. This gives
|
|||
|
the service purview over many computer and telecommunications crimes,
|
|||
|
which often go hand-in-hand, with occasional bleedover into other
|
|||
|
areas.
|
|||
|
|
|||
|
Freriks said that the investigation falls under a revision of the
|
|||
|
copyright laws that allows felony charges to be brought against anyone
|
|||
|
who trades more than 10 pieces of copyrighted software -- a threshold
|
|||
|
that would cover many millions of Americans who may trade copies of
|
|||
|
computer programs with their friends.
|
|||
|
|
|||
|
"The ink is barely dry on the amendment, and you've already got law
|
|||
|
enforcement in there, guns blazing, because somebody's got a dozen
|
|||
|
copies of stolen software," said Marc Rotenberg, director of Computer
|
|||
|
Professionals for Social Responsibility, in Washington, D.C. "That was
|
|||
|
a bad provision when it was passed, and was considered bad for
|
|||
|
precisely this reason, giving a justification for over-reaching by law
|
|||
|
enforcement."
|
|||
|
|
|||
|
Freriks noted that the raid also involved one of the first uses of an
|
|||
|
expanded right to use forfeiture against computer crime, although he
|
|||
|
was unable to state from where this authority evolved after a civil
|
|||
|
rights lawyer questioned his assertion that it was contained in the
|
|||
|
copyright law revision.
|
|||
|
|
|||
|
"One of our complaints has always been that you catch 'em, slap 'em on
|
|||
|
the wrist, and then hand back the smoking gun," he said. "Now all that
|
|||
|
equipment belongs to the government."
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 17 Dec 92 16:32:11 CST
|
|||
|
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
|
|||
|
Subject: File 3--Tales From the Crackdown
|
|||
|
|
|||
|
Have you been accused, falsely or with cause, of a computer crime?
|
|||
|
Have you been the victim of a computer crime? Are you a law
|
|||
|
enforcement professional who would like to set the record straight?
|
|||
|
|
|||
|
If you fit any of these, or if you're a knowledgeable, qualified
|
|||
|
observer, the Houston Chronicle would like to talk with you. We're
|
|||
|
doing a completely different kind of hacker story from the kind you're
|
|||
|
used to reading, but we need your help. We need to know about cases
|
|||
|
with which you've been involved, what went right and what went wrong.
|
|||
|
|
|||
|
Don't be shy. We don't promise to edit reality, but you can count on
|
|||
|
us to get your story right, no matter which side of the aisle you
|
|||
|
tread, and to try to sympathize with your beliefs and objectives.
|
|||
|
|
|||
|
More details will be forthcoming out of the glare of our competition's
|
|||
|
eyes :-) so let's talk:
|
|||
|
|
|||
|
Joe Abernathy Joe.Abernathy@chron.com
|
|||
|
Special Projects P.O. Box 4260
|
|||
|
The Houston Chronicle Houston, Texas 77210
|
|||
|
(800) 735-3820 Ext 6845 (713) 220-6845
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 11 Nov 92 14:13:30 CST
|
|||
|
From: Mike.Riddle@IVGATE.OMAHUG.ORG(Mike Riddle)
|
|||
|
Subject: File 4--SYSLAW (Review #1)
|
|||
|
|
|||
|
SYSLAW (Second Edition). By Lance Rose and Jonathan Wallace. Winona
|
|||
|
(Minn.): PC Information Group, Inc. 306 pp. $34.95 (paper).
|
|||
|
|
|||
|
The old truism that law follows technology comes as no surprise to
|
|||
|
readers of the Computer Underground Digest. Many, if not most, of the
|
|||
|
(horror) stories we hear about "evil hackers", or the (sometimes)
|
|||
|
excesses of various law enforcement agencies, can be understood much
|
|||
|
better when we realize the lack of computer knowledge within society
|
|||
|
at large. System operators, be they sysadmins at a large university
|
|||
|
or commercial site, or sysops of a PC-based bulletin board in a
|
|||
|
basement or closet, increasingly have questions about their legal
|
|||
|
rights and responsibilities. Can I delete that user? Should (or can
|
|||
|
I legally) censor or delete that message or file? How can I protect
|
|||
|
myself from civil or criminal liability? Can my equipment be seized
|
|||
|
because of something a user does?
|
|||
|
|
|||
|
SYSLAW is an attempt to explore the gap between statutes and case law
|
|||
|
on the one side, and technological reality on the other. Since the
|
|||
|
law works slowly, many of the questions about the intersection of law
|
|||
|
and technology do not have textbook answers. But "the smallest
|
|||
|
journey begins with a step." Messrs. Rose and Wallace have made a
|
|||
|
substantial step down that path.
|
|||
|
|
|||
|
While the courts have yet to rule on many of the questions posed by
|
|||
|
sysops, sysadmins, and others, we still have fundamental principles of
|
|||
|
constitutional and communications law to rely upon. Rose and Wallace
|
|||
|
begin by exploring Sysop rights within the traditional framework of
|
|||
|
Constitutional law, particularly the First Amendment.
|
|||
|
|
|||
|
After discussing the Constitutional principles that apply to Sysops,
|
|||
|
they then go on to explore the contractual nature of computer
|
|||
|
communications. Contracts are legally enforceable agreements, and we
|
|||
|
find them everywhere in daily life. Sometimes we even realize that a
|
|||
|
contract is involved, and a small fraction of those contracts are
|
|||
|
important enough to be written down.
|
|||
|
|
|||
|
Bulletin boards are the same way. Explicit or implied contracts are
|
|||
|
established when a user logs on to a bulletin board. Rose and Wallace
|
|||
|
suggest the wise sysop recognize this reality, and explicitly lay out
|
|||
|
a contract for use. They also include a sample as an appendix.
|
|||
|
|
|||
|
Another area of concern is the law of intellectual property. Who owns
|
|||
|
the posts? Does a moderator (either usenet or Fido style) have any
|
|||
|
ownership in the overall newsgroup or echo? When can messages legally
|
|||
|
be copied? What about files and executable code? While the context
|
|||
|
may be new, many of the questions are old and have relatively
|
|||
|
well-established answers.
|
|||
|
|
|||
|
What about "injurious materials" on a bulletin board? Is the sysop
|
|||
|
liable? What did _Cubby v. Compuserve_ really decide? What are the
|
|||
|
rules on search and seizure, and what has actually happened in the few
|
|||
|
cases we know about? Does the sysop have an obligation to search for
|
|||
|
and/or warn about viruses? What about sexually explicit material?
|
|||
|
|
|||
|
Many of these areas do not have clear answers, and one of the
|
|||
|
strengths of SYSLAW is that the authors do not attempt to invent law
|
|||
|
where it doesn't exist. But in the places where the law is unsettled,
|
|||
|
they do a good job explaining the legal, social and sometimes moral
|
|||
|
considerations that a court would consider if the question arose.
|
|||
|
They sometimes tell you what they think the result might be, or what
|
|||
|
they think it should be. They caution at the start that until courts
|
|||
|
consider several cases, and/or until we get appellate decisions, the
|
|||
|
users and operators incur some degree of risk in engaging in certain
|
|||
|
activities. The reader is left with a better understanding of the
|
|||
|
issues involved, and reasonable actions sysops might take to insulate
|
|||
|
themselves from liability of one sort or another.
|
|||
|
|
|||
|
SysLaw is available from PC Information Group, 800-321-8285 or
|
|||
|
507-452-2824, and located at 1126 East Broadway, Winona, MN 55987.
|
|||
|
You may order by credit card or by mail. Price is $34.95 plus $3.00
|
|||
|
shipping and (if applicable) sales tax. Price is subject to change
|
|||
|
after January 1, 1993. For additional information, please
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 28 Nov 92 10:19:54 CDT
|
|||
|
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 5--SYSLAW (Review #2)
|
|||
|
|
|||
|
The U.S. Secret Service's "crackdown" on hackers in the past two years
|
|||
|
has included seizures of computer hardware running BBSes. This raises
|
|||
|
significant questions for the legal obligations of both users and
|
|||
|
sysops. The "Phrack trial," Operation Sun Devil, and--more
|
|||
|
recently--the alleged USSS involvement in disrupting law-abiding 2600
|
|||
|
meetings underscore the importance of establishing unequivocal
|
|||
|
Constitutional protections of BBSes. SYSLAW, a comprehensive summary
|
|||
|
of the legal liabilities and obligations of BBS sysops, is mistitled:
|
|||
|
It's not simply a legal handbook for sysops, but a helpful compendium
|
|||
|
of laws and practices relevant to BBS users as well. Although both
|
|||
|
Lance Rose and Jonathan Wallace (R&W) are attorneys, the volume is
|
|||
|
written clearly and without overwhelming legal jargon, and even the
|
|||
|
casual BBS user should derive sufficient information from the volume
|
|||
|
to understand the problems sysops confront in running a board.
|
|||
|
|
|||
|
Rose and Wallace accomplish their stated goals (p. xxii) of
|
|||
|
familiarizing readers with the kinds of legal questions arising in a
|
|||
|
BBS context, providing sysops with a legal overview of laws bearing on
|
|||
|
BBS operations, and identifying the legal ambiguities in which the law
|
|||
|
appears to provide no clear guidelines for operation, yet may place a
|
|||
|
sysop at legal risk. Syslaw is divided into nine chapters and 10
|
|||
|
hefty appendices. The core issues in the book are 1) First Amendment
|
|||
|
and speech, 2) privacy, 3) sysop liabilities to users, and 4)
|
|||
|
sysop/user relations.
|
|||
|
|
|||
|
In the first chapter, the authors emphasize that the question of the
|
|||
|
relationship of a BBS to the First Amendment remains unsettled, and
|
|||
|
this relationship generates considerable discussion in BBS forums and
|
|||
|
on Usenet (eg, comp.org.eff.talk). While noting that BBSs create new
|
|||
|
challenges or Constitutional interpretation, R&W identify two reasons
|
|||
|
why BBSs deserve "the full protection from legal interference granted
|
|||
|
by the First Amendment under its express protections of "speech,"
|
|||
|
"press," "peaceable assembly," and "petitioning the government" (p.
|
|||
|
2). First, BBSs are focal points for creating, collecting and
|
|||
|
disseminating information, and as such, electronic speech is
|
|||
|
"perfectly analogous to printed materials which are universally
|
|||
|
acknowledge as protected under the First Amendment." Second, R&W argue
|
|||
|
that BBSs are analogous to physical printing presses and promote the
|
|||
|
growth of alternative publishers with diverse points of view. Just as
|
|||
|
technology has expanded rights from print media other media, such
|
|||
|
broadcast radio and television, BBSs also reflect an emergent
|
|||
|
technology that functions in much the same way as the older media:
|
|||
|
|
|||
|
BBS's ((sic)) powerfully fulfill the goal of the First
|
|||
|
Amendment by enabling effective publishing and distribution of
|
|||
|
diverse points of view, many of which never before had a voice.
|
|||
|
Protecting BBS's should be one of the primary functions of the
|
|||
|
First Amendment today (p. 3).
|
|||
|
|
|||
|
R&W argue that there are three main ways that the First Amendment
|
|||
|
protects BBSs:
|
|||
|
|
|||
|
(1) it sharply limits the kinds of speech that can be considered
|
|||
|
illegal on BBS', (2) it assures that the overall legal burdens on
|
|||
|
sysops will be kept light enough that they can keep their BBS'
|
|||
|
running to distribute their own speech and others', and (3) it
|
|||
|
limits the government's ability to search or seize BBS' where it
|
|||
|
would interfere with BBS' ability to distribute speech.
|
|||
|
|
|||
|
The authors identify three kinds of BBS operations that, for First
|
|||
|
Amendment purposes, qualify for various types and amounts of
|
|||
|
protection (p. 8-17): They are simultaneously publishers, distributors,
|
|||
|
and shared message networks.
|
|||
|
|
|||
|
The authors emphasize that speech protections are an issue between the
|
|||
|
government and the citizens, not the sysops and their users. Sysops,
|
|||
|
they remind us, can--within the law--run their boards and censor as
|
|||
|
they wish. The danger, R&W suggest, is that over-cautious sysops may
|
|||
|
engage in unnecessary self-censorship in fear of government
|
|||
|
intervention. Their goal is to provide the BBS community with
|
|||
|
guidelines that help distinguish legal from illegal speech (and
|
|||
|
files).
|
|||
|
|
|||
|
The remaining chapters address topics such as sysop liability when
|
|||
|
injurious activities or materials occur on a BBS, the sysops
|
|||
|
obligations when obviously illegal behavior is discovered, the
|
|||
|
"problem" of sexual explicit materials, and searches and seizures. Of
|
|||
|
special interest is the chapter on contractual obligations between
|
|||
|
sysop and users (chapter 2) in which they suggest that one way around
|
|||
|
many of the potential legal liabilities a sysop might face with users
|
|||
|
is to require a binding "caller contract" that explicitly delineates
|
|||
|
the rights and obligations of each party. They provide a sample
|
|||
|
contract (Appendix A) that, if implemented at the first-call in screen
|
|||
|
progression format (any unwillingness to agree to the terms of the
|
|||
|
contract prevents the caller from progressing into the system) that
|
|||
|
they judge to be legally binding if the caller completes the contract
|
|||
|
by agreeing to its terms.
|
|||
|
|
|||
|
The Appendixes also include a number of federal statutes that provide a
|
|||
|
handy reference for readers. These include statues on child
|
|||
|
pornography, state computer crime laws, and federal computer fraud and
|
|||
|
abuse acts.
|
|||
|
|
|||
|
My one, in fact my only, objection to the book was to a rather
|
|||
|
hyperbolic swipe at "pirate boards:"
|
|||
|
|
|||
|
Only a tiny minority of BBS's operate as "pirate
|
|||
|
boards" for swapping stolen software, computer access codes,
|
|||
|
viruses etc. When these criminal boards are seized and shut
|
|||
|
down by the authorities everyone benefits (p. 6).
|
|||
|
|
|||
|
This rather excessive and simplistic view of "piracy" seems to
|
|||
|
contradict both their intent to improve understanding of new
|
|||
|
technology and corresponding behaviors by avoiding such extreme words
|
|||
|
as "stolen software" and to clarify the nuances in various forms of
|
|||
|
behavior in ways that distinguish between, for example, casual
|
|||
|
swapping of copyright files and profiteering.
|
|||
|
This, however, is a minor quibble (and will be taken up in future
|
|||
|
issues of CuD focusing on piracy and the Software Publishers'
|
|||
|
Association).
|
|||
|
|
|||
|
Syslaw should be required reading for all BBSers. Unfortunately, it is
|
|||
|
available *only* from PC Information group, Inc. Those wishing to
|
|||
|
obtain a copy can write the publisher at:
|
|||
|
1125 East Broadway
|
|||
|
Winona, MN 55987
|
|||
|
Voice: (800-321-8285 / 507-452-2824
|
|||
|
Fax: 507-452-0037
|
|||
|
|
|||
|
If ordering directly, add $3.00 (US) to the $34.95 price for shipping.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 01 Dec 92 10:33:25 EST
|
|||
|
From: Lance Rose <72230.2044@COMPUSERVE.COM>
|
|||
|
Subject: File 6--Model BBS/User Contract (from SYSLAW)
|
|||
|
|
|||
|
|
|||
|
Appendix A
|
|||
|
|
|||
|
Sample Caller Contract (from SysLaw)
|
|||
|
|
|||
|
The following sample contract provides some guidelines for a sysop's
|
|||
|
contract with his or her callers. Everyone's BBS and services are a
|
|||
|
little different, so it is not recommended that readers use this
|
|||
|
sample in "plain vanilla" form as their own contract. If possible, ask
|
|||
|
a lawyer comfortable with online activities to review the form and
|
|||
|
recommend any changes necessary for your particular BBS.
|
|||
|
|
|||
|
BULLETIN BOARD SERVICES AGREEMENT
|
|||
|
|
|||
|
|
|||
|
A. Introduction
|
|||
|
|
|||
|
We start every new caller relationship with a contract. It spells out
|
|||
|
what you can expect from us, and what we expect from you. We do not
|
|||
|
know each caller personally, so it is important to set out the ground
|
|||
|
rules clearly in advance.
|
|||
|
|
|||
|
If you agree to what you read below, welcome to our system! An
|
|||
|
instruction screen at the end of the contract will show you how to
|
|||
|
sign up.
|
|||
|
|
|||
|
If you have any questions about any part of the contract, please send
|
|||
|
us an e-mail about it! We will be glad to explain why these contract
|
|||
|
provisions are important for our system. We are willing to work with
|
|||
|
you on making changes if you can show us you have a better approach.
|
|||
|
|
|||
|
Please remember - until you and we have an agreement in place, you
|
|||
|
will not receive full access to our system.
|
|||
|
|
|||
|
B. Access and Services.
|
|||
|
|
|||
|
(1) Access - We will give you full access to all file and message
|
|||
|
areas on our system. Currently, these include:
|
|||
|
|
|||
|
Public message areas - reading and posting messages. We are also a
|
|||
|
member of Fidonet, which means you can join in public discussions with
|
|||
|
callers of other bulletin boards around the world.
|
|||
|
|
|||
|
File transfer areas - uploading, downloading files and browsing files
|
|||
|
|
|||
|
E-mail - sending and receiving messages (please see the section on
|
|||
|
privacy, below)
|
|||
|
|
|||
|
Chat areas - real-time discussions with other callers who are online
|
|||
|
at the same time as you
|
|||
|
|
|||
|
Gateways - permitting you to send e-mail to systems on other computer
|
|||
|
networks. Currently, we have an Internet gateway in place, and we
|
|||
|
operate as a Fidonet node.
|
|||
|
|
|||
|
(2) Services - We offer a variety of services to our callers, and are
|
|||
|
adding more all the time. Our current services include:
|
|||
|
|
|||
|
Daily electronic news from nationally syndicated news services. Free
|
|||
|
classified advertising for our callers, in an area subdivided into
|
|||
|
different product categories.
|
|||
|
|
|||
|
Virus hotline - an area with frequently updated news on computer virus
|
|||
|
outbreaks, new forms of virus detected, new ways to protect your
|
|||
|
computer, and other matters of interest.
|
|||
|
|
|||
|
QMail (TM) services, allowing you to upload and download all messages
|
|||
|
you are interested in batch form.
|
|||
|
|
|||
|
If you would like to set up a private discussion area on our system
|
|||
|
for a group, we will be glad to do so for fees and terms to be
|
|||
|
discussed.
|
|||
|
|
|||
|
(3) We may change or discontinue certain access or services on our
|
|||
|
system for time to time. We will try to let you know about such
|
|||
|
changes a month or more in advance.
|
|||
|
|
|||
|
C. Price and Payment
|
|||
|
|
|||
|
(1) We will charge you a monthly fee for using our system. For $15
|
|||
|
per month, you can use our system each month for up to 40 hours of
|
|||
|
connect time, and you can send up to 200 electronic mail messages. For
|
|||
|
additional use, you will be required to pay additional charges of 50
|
|||
|
cents an hour, and 10 cents per electronic mail message.
|
|||
|
|
|||
|
(2) Certain services on our system require additional fees. Please
|
|||
|
review the complete price list in the Caller Information area before
|
|||
|
signing up for any such services. The price list will tell you which
|
|||
|
services are included in the standard monthly fee, and which are
|
|||
|
extra.
|
|||
|
|
|||
|
(3) You may pay by check or by credit card. You will be given the
|
|||
|
opportunity to choose the payment method when you sign up.
|
|||
|
|
|||
|
If you choose to pay by credit card, we will automatically bill the
|
|||
|
amount due to your credit card account at the end of every month.
|
|||
|
|
|||
|
If you choose to pay by check, we will send you an invoice at the end
|
|||
|
of every month. Payment is due within twenty days after we send your
|
|||
|
invoice.
|
|||
|
|
|||
|
(4) We can change the prices and fees at any time, except that our
|
|||
|
existing customers will receive two months notice of any change. All
|
|||
|
price changes will be announced in opening screen bulletins.
|
|||
|
|
|||
|
D. System Rules
|
|||
|
|
|||
|
Besides payment, the only thing we ask from you is that you follow the
|
|||
|
rules we set for use of the system. You will find our rules in two
|
|||
|
places: in the following list here in the contract, and in the
|
|||
|
bulletins posted at various points in the system.
|
|||
|
|
|||
|
Here are some of the basic rules for our system:
|
|||
|
|
|||
|
Respect other callers of the system. Feel free to express yourself,
|
|||
|
but do not do anything to injure or harm others. In particular, if you
|
|||
|
dislike someone else's ideas, you can attack the ideas, but not the
|
|||
|
person.
|
|||
|
|
|||
|
We want people to speak freely on our system. But if you misuse that
|
|||
|
freedom to abuse others, we will take the liberty of cutting that
|
|||
|
discussion short.
|
|||
|
|
|||
|
Do not use our system for anything that might be illegal. This system
|
|||
|
may not be used to encourage anything to do with illegal drugs,
|
|||
|
gambling, pornography, prostitution, child pornography, robbery,
|
|||
|
spreading computer viruses, cracking into private computer systems,
|
|||
|
software infringement, trafficking in credit card codes, or other
|
|||
|
crimes.
|
|||
|
|
|||
|
People sometimes have trouble figuring out whether certain activities
|
|||
|
are illegal. It's usually not that hard. If it's illegal out there,
|
|||
|
it's illegal in here! Using a bulletin board system to commit a crime
|
|||
|
does not make it less of a crime. In fact, if you use a bulletin board
|
|||
|
system to commit a crime, you're exposing the operators of the system,
|
|||
|
and its other callers, to legal risks that should be yours alone.
|
|||
|
|
|||
|
If you genuinely do not know whether something you'd like to do is
|
|||
|
legal or illegal, please discuss it with us before you proceed. And
|
|||
|
if we tell you we do not want you to pursue your plans on our system,
|
|||
|
please respect our decision.
|
|||
|
|
|||
|
Respect the security of our system. Do not try to gain access to
|
|||
|
system areas private to ourselves, or to other callers. Some callers
|
|||
|
try to crack system security just to show it can be done. Don't try to
|
|||
|
demonstrate this on our system.
|
|||
|
|
|||
|
E. Privacy
|
|||
|
|
|||
|
We offer private electronic mail on our system as a service to our
|
|||
|
callers. We will endeavor to keep all of your e-mail private,
|
|||
|
viewable only by you and the person to whom you address it, except:
|
|||
|
|
|||
|
We, as system operators, may need to look at your electronic mail if
|
|||
|
we believe it is necessary to protect ourselves or other callers from
|
|||
|
injury or damage. For example, if we have reason to believe a caller
|
|||
|
is involved in illegal activities, which creates a risk that our
|
|||
|
system could be seized by the authorities, we will review his or her
|
|||
|
electronic mail for our own protection. We will not, however, monitor
|
|||
|
electronic mail unless we believe it is being misused.
|
|||
|
|
|||
|
We will not deliberately disclose electronic mail to other callers.
|
|||
|
If we believe certain electronic mail is connected with illegal
|
|||
|
activities, we may disclose it to the authorities to protect our
|
|||
|
system, ourselves and other callers.
|
|||
|
|
|||
|
Remember that the person to whom you send electronic mail does not
|
|||
|
need to keep it secret. The sender or receiver of electronic mail has
|
|||
|
the right to make it public.
|
|||
|
|
|||
|
If the authorities ever search or seize our system, they may gain
|
|||
|
access to your private electronic mail. In that case, we cannot assure
|
|||
|
they will not review it. Remember that you have personal rights of
|
|||
|
privacy that even the government cannot legally violate, though you
|
|||
|
may have to go to court to enforce those rights.
|
|||
|
|
|||
|
F. Editorial Control
|
|||
|
|
|||
|
We want our system to be a worthwhile place for all of our callers.
|
|||
|
This does not mean everyone can do whatever they choose on this
|
|||
|
system, regardless of its effect on others. It is our job to
|
|||
|
accommodate the common needs of all callers while striving to meet our
|
|||
|
own goals for the system.
|
|||
|
|
|||
|
We will not monitor all messages and file transfers. We want to keep
|
|||
|
the message and file traffic moving quickly and smoothly - this goal
|
|||
|
would be defeated if we monitored everything on the system. However,
|
|||
|
if we see (or hear about) messages or other activities that violate
|
|||
|
the rules, threaten the order or security of the system, or use the
|
|||
|
system in ways we do not agree with, we will take appropriate action.
|
|||
|
|
|||
|
Our editorial control includes normal housekeeping activities like
|
|||
|
changing subject headers and deleting profanities in public messages
|
|||
|
and selecting among uploaded files for those we wish to make available
|
|||
|
for download. It also goes beyond that.
|
|||
|
|
|||
|
If a caller persists in posting messages or transferring files that we
|
|||
|
previously warned him should not be on the system, those messages will
|
|||
|
be deleted, and he or she may be locked out. If we discover any caller
|
|||
|
violating the rules, especially the prohibition against illegal
|
|||
|
activities, we will act firmly and swiftly. Depending on the
|
|||
|
circumstances, the caller involved will be warned, or simply locked
|
|||
|
out. If the caller has done anything to put us or other callers in
|
|||
|
jeopardy, we may contact the authorities.
|
|||
|
|
|||
|
We do not plan on doing any of these things. If all callers act with
|
|||
|
respect and regard for us and for other callers, there will never be
|
|||
|
any problems. But if problems arise, we will assert control over our
|
|||
|
system against any caller who threatens it. And in this Agreement, you
|
|||
|
acknowledge that control.
|
|||
|
|
|||
|
G. Ownership of Materials
|
|||
|
|
|||
|
You shall retain all rights to all original messages you post and all
|
|||
|
original files you upload. Likewise, you must respect the ownership
|
|||
|
rights of others in their own messages and files. You may not post or
|
|||
|
upload any messages or files unless you own them, or you have full
|
|||
|
authority to transmit them to this system.
|
|||
|
|
|||
|
We own certain things you will find on this system, including the
|
|||
|
"look and feel" of the system, the name of our system, and the
|
|||
|
collective work copyright in sequences of public messages on our
|
|||
|
system. You cannot reproduce any message thread from our system,
|
|||
|
either electronically or in print, without our permission and the
|
|||
|
permission of all participants in the thread. This is not a complete
|
|||
|
list - other things on the system are also our property. Before you
|
|||
|
copy anything from our system with plans of reproducing it or
|
|||
|
distributing it, contact us about it.
|
|||
|
|
|||
|
H. Limitation of Liability and Indemnity.
|
|||
|
|
|||
|
The great danger for us, and for all operators of bulletin board
|
|||
|
systems, is that we might be held accountable for the wrongful actions
|
|||
|
of our callers. If one caller libels another caller, the injured
|
|||
|
caller might blame us, even though the first caller was really at
|
|||
|
fault. If a caller uploads a program with a computer virus, and other
|
|||
|
callers' computers are damaged, we might be blamed even though the
|
|||
|
virus was left on our board by a caller. If a caller transfers
|
|||
|
illegal credit card information to another caller through private
|
|||
|
electronic mail, we might be blamed even though we did nothing more
|
|||
|
than unknowingly carry the message from one caller to another.
|
|||
|
|
|||
|
We did not start this system to take the blame for others' actions,
|
|||
|
and we cannot afford to operate it if we must take that blame.
|
|||
|
Accordingly, we need all callers to accept responsibility for their
|
|||
|
own acts, and to accept that an act by another caller that damages
|
|||
|
them must not be blamed on us, but on the other caller. These needs
|
|||
|
are accomplished by the following paragraph:
|
|||
|
|
|||
|
You agree that we will not be responsible to you for any indirect,
|
|||
|
consequential, special or punitive damages or losses you may incur in
|
|||
|
connection with our system or any of the data or other materials
|
|||
|
transmitted through or residing on our system, even if we have been
|
|||
|
advised of the possibility of such damage or loss. In addition, you
|
|||
|
agree to defend and indemnify us and hold us harmless from and against
|
|||
|
any and all claims, proceedings, damages, injuries, liabilities,
|
|||
|
losses, costs and expenses (including reasonable attorneys fees)
|
|||
|
relating to any acts by you or materials or information transmitted by
|
|||
|
you in connection with our system leading wholly or partially to
|
|||
|
claims against us or our system by other callers or third parties.
|
|||
|
|
|||
|
I. Choice of Law
|
|||
|
|
|||
|
Our bulletin board system can be reached by callers from all fifty
|
|||
|
states, and around the world. Each of these places has a different set
|
|||
|
of laws. Since we cannot keep track of all these laws and their
|
|||
|
requirements, you agree that the law of our own state, ________, will
|
|||
|
apply to all matters relating to this Agreement and to our bulletin
|
|||
|
board system. In addition, you agree and consent that if you ever take
|
|||
|
legal action against us, the courts of our own state, _______, will
|
|||
|
have exclusive jurisdiction over any such legal actions.
|
|||
|
|
|||
|
J. General
|
|||
|
|
|||
|
This agreement is the entire understanding between you and us
|
|||
|
regarding your relationship to our bulletin board system. If either
|
|||
|
you or we fail to notify the other of any violations of this
|
|||
|
agreement, this will not mean that you or we cannot notify the other
|
|||
|
of future violations of any part of this agreement.
|
|||
|
|
|||
|
|
|||
|
[Contract sign-up process]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.67
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|