3785 lines
198 KiB
Plaintext
3785 lines
198 KiB
Plaintext
This paper first appeared in the Albany Law Journal of Science and
|
||
Technology, Volume 3, Number 1. Care has been taken so that each
|
||
printed page has been indicated in this file (by strings of 70 "="
|
||
signs, which can be search/replaced with page breaks in most word
|
||
processors), this way the paper may be cited without the need to track
|
||
down an official printed copy. (The only thing lost should be the
|
||
itallics and the small caps.)
|
||
|
||
This paper may be freely distributed under the following conditions:
|
||
|
||
1. It must be distributed without alteration.
|
||
2. It may not be distributed for a direct profit.
|
||
3. This paper is being distributed as postcard-ware. If you find it
|
||
informative or useful, please drop a note to the author and tell him
|
||
how you got a hold of this paper.
|
||
|
||
David Loundy
|
||
465 Pleasant Ave.
|
||
Highland Park, IL 60035
|
||
|
||
This paper is not intended to constitute legal advice pertaining to any
|
||
particular factual situation.. If you have a problem, or are seeking
|
||
advice as to how to avoid one, see an attorney to discuss your specific
|
||
situation.
|
||
|
||
|
||
|
||
======================================================================
|
||
E-LAW: LEGAL ISSUES AFFECTING COMPUTER INFORMATION SYSTEMS AND
|
||
SYSTEM OPERATOR LIABILITY[FN+]
|
||
|
||
David J. Loundy[FN*]
|
||
|
||
TABLE OF CONTENTS
|
||
|
||
I. Introduction.................................... 81
|
||
II. Computer Information Systems Defined............ 82
|
||
A. Bulletin Board Systems....................... 82
|
||
B. Teletext and Videotex or Videotext........... 85
|
||
C. Information Distribution Systems............. 85
|
||
D. Networks..................................... 86
|
||
E. Issues Involved.............................. 87
|
||
F. Legal Analogies.............................. 88
|
||
III. Current Regulatory Environment.................. 89
|
||
A. Defamation................................... 90
|
||
B. Speech Advocating Lawless Action............. 98
|
||
C. Fighting Words............................... 100
|
||
D. Child Pornography............................ 101
|
||
E. Computer Crime............................... 104
|
||
F. Computer Fraud............................... 105
|
||
G. Unauthorized Use of Communications Services.. 107
|
||
H. Viruses...................................... 108
|
||
I. Protection From Hackers...................... 111
|
||
IV. Privacy......................................... 112
|
||
A. Pre-Electronic Communication Privacy Act of
|
||
1986. .................................... 112
|
||
B. Electronic Communications Privacy Act of 1986 113
|
||
--------------------------
|
||
[FN+] Copyright 1992-1993 by David Loundy All Rights Reserved
|
||
[FN*] The author has a J.D. from the University of Iowa Law School and
|
||
has a B.A. in Telecommunications from Purdue University. He has been
|
||
active in the use and administration of computer bulletin board systems
|
||
for a number of years, and served on the Law School Computer Committee.
|
||
The author would like to thank Christina King and Professor Nicholas
|
||
Johnson for their assistance during the writing of this paper.
|
||
======================================================================
|
||
80 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
C. Access to Stored Communications............. 116
|
||
D. An Apparent Exception for Federal Records... 117
|
||
E. Privacy Protection Act of 1980.............. 118
|
||
V. Obscene and Indecent Material.................. 121
|
||
A. Obscenity................................... 121
|
||
B. Indecent Speech............................. 123
|
||
VI. Copyright Issues............................... 124
|
||
A. Basics of Copyrights........................ 124
|
||
B. Copyrighted Text............................ 130
|
||
C. Copyrighted Software........................ 130
|
||
D. Copyrighted Pictures........................ 132
|
||
VII. Liability for Computer Information System Content 134
|
||
A. Information System as Press................. 135
|
||
B. Information System as Republisher/
|
||
Disseminator............................... 138
|
||
C. Information System as Common Carrier........ 140
|
||
D. Information System as Traditional Mail...... 143
|
||
E. Information System as Traditional Bulletin
|
||
Board...................................... 145
|
||
F. Information System as Broadcaster........... 149
|
||
VIII. Suggestions for Regulation..................... 152
|
||
======================================================================
|
||
81 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
Introduction
|
||
|
||
|
||
Over the last 50 years, the people of the developed
|
||
world have begun to cross into a landscape unlike any
|
||
which humanity has experienced before. It is a region
|
||
without physical shape or form. It exists, like a
|
||
standing wave, in the vast web of our electronic
|
||
communication systems. It consists of electron states,
|
||
microwaves, magnetic fields, light pulses and thought
|
||
itself.
|
||
It is familiar to most people as the "place" in
|
||
which a long-distance telephone conversation takes
|
||
place. But it is also the repository for all digital or
|
||
electronically transferred information, and, as such, it
|
||
is the venue for most of what is now commerce, industry,
|
||
and broad-scale human interaction. William Gibson called
|
||
this Platonic realm "Cyberspace," a name which has some
|
||
currency among its present inhabitants.
|
||
Whatever it is eventually called, it is the homeland of
|
||
the Information Age, the place where the future is destined
|
||
to dwell.[FN1]
|
||
|
||
"Computer information systems," as the term is used in this paper,
|
||
refers to a variety of computer services that, together, make up
|
||
"Cyberspace." Cyberspace is the realm of digital data. Its shores
|
||
and rivers are the computer memories and telephone networks that
|
||
connect computers all over the world. Cyberspace is a hidden
|
||
universe behind the automatic teller machines, telephones, and
|
||
WESTLAW terminals which many of us take for granted. It is also a
|
||
way for computer users all over the world to interact with each
|
||
other instantaneously. At ever increasing rates, people are
|
||
beginning to see the advantages of this new electronic medium and
|
||
incorporate travels into Cyberspace as a regular part of their
|
||
lives. However, the growth of electronic communication and data
|
||
manipulation has not been matched by an equal growth in
|
||
understanding on the part of legislatures, the judiciary, or the
|
||
bar.
|
||
This paper examines the current regulatory structure
|
||
governing a few of the "Empires of Cyberspace," such as bulletin
|
||
board systems, electronic databases, file servers, networks and
|
||
the like. Different legal analogies that may apply will be
|
||
illustrated, and some of their strengths, weaknesses and
|
||
alternatives will be analyzed. We will begin by looking at
|
||
different types of computer information systems, and then the
|
||
major legal issues surrounding
|
||
--------------------------
|
||
[FN1] Mitchell Kapor & John P. Barlow, Across the Electronic
|
||
Frontier, July 10, 1990, available over Internet, by anonymous
|
||
FTP, at FTP.EFF.ORG (Electronic Frontier Foundation).
|
||
======================================================================
|
||
82 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
computer information systems will
|
||
be surveyed in brief.[FN2] Next, the different legal analogies which
|
||
could be applied to computer information systems will be examined.
|
||
These different analogies provide an understanding of how courts
|
||
have seen various communication technologies, and how more
|
||
traditional technologies are similar to computer information
|
||
systems. Liability for improper activities <20> both defining what is
|
||
improper and who can be held responsible <20> has been determined by
|
||
the analogy the courts decide to apply. Finally, an evaluation
|
||
will be made of where the law affecting computer information
|
||
systems now stands, and how it should be developed.
|
||
|
||
II. Computer Information Systems Defined
|
||
|
||
A. Bulletin Board Systems
|
||
|
||
Often referred to simply as a BBS, a computer bulletin board
|
||
system is the computerized equivalent to the bulletin boards
|
||
commonly found in the workplace, schools and the like. Instead of
|
||
hanging on a wall covered with notes pinned up with thumbtacks,
|
||
computer bulletin boards exist inside the memory of a computer
|
||
system.[FN3] Rather than walking up to a bulletin board and reading
|
||
notes other people have left or sticking up notes of his or her
|
||
own, the BBS user connects his or her personal computer to the
|
||
"host" computer,[FN4] usually via a telephone line.[FN5] Once connected
|
||
to the host computer, a user can read the notes (also referred to
|
||
as
|
||
--------------------------
|
||
[FN2] Each of the legal issues could be discussed in papers at least
|
||
this large, so only the most important aspects will be covered.
|
||
[FN3] To run a computer bulletin board system, three things are
|
||
needed beginning with a computer. Bulletin board systems can be
|
||
run on virtually any size computer, from a small personal computer
|
||
costing a few hundred dollars, to a large mainframe computer
|
||
affordable only to large corporations and universities. In
|
||
addition to the computer, bulletin board software is also needed,
|
||
which is obtainable either commercially or free. Finally, you need
|
||
a way for people (usually called "users" in computer jargon) to
|
||
access your bulletin board. This is accomplished via a modem or by
|
||
connection to a computer network.
|
||
[FN4] A host computer is the computer on which the bulletin board
|
||
software runs and which stores the messages left by users of the BBS.
|
||
[FN5] Connection via a telephone line may be accomplished by a modem,
|
||
a device which converts computer data to an audio signal which can
|
||
then be transferred over a standard telephone wire where it is
|
||
received by another computer, also equipped with a modem, which
|
||
then converts the signal back into a form comprehensible to the
|
||
receiving computer. More and more often computers may be found
|
||
connected together in a network, such as computers in a lab at a
|
||
university, or office computers which share resources.
|
||
======================================================================
|
||
83 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
messages or posts) of other users or type in his or her own
|
||
messages to be read by other users. These Computer Bulletin Boards
|
||
are referred to as "systems" because they often provide additional
|
||
services or several separate "areas" for messages related to
|
||
different topics.[FN6]
|
||
Bulletin board systems can be classified in a number of ways.
|
||
One way to classify them is by the number of users BBSs support
|
||
simultaneously. The majority of BBSs run by hobbyists are single-
|
||
user boards which means they can only be used by one person at a
|
||
time. But some bulletin boards are able to support many users at
|
||
the same time, often upwards of fifty users at once. Another way
|
||
to differentiate between BBSs is by means of access: some are
|
||
available only by direct dial, other BBSs are available through a
|
||
network.[FN7]
|
||
There are a number of different things bulletin board systems
|
||
allow one to do. As their name implies, their primary function is
|
||
as a place to post messages and read messages posted by others.
|
||
Whatever the user's interests, there is probably a BBS to cater to
|
||
it. However, like any communications forum, this can raise some
|
||
serious First Amendment concerns over some of the potential uses,
|
||
such as availability of pornographic material, defamation, etc.
|
||
Another use for bulletin board systems is the sending of
|
||
electronic mail, or E-Mail, as it is commonly called. Electronic mail
|
||
--------------------------
|
||
[FN6] These "areas" may be referred to by a variety of names, such as
|
||
forums, special interest groups (SIGs), conferences, rooms,
|
||
newsgroups, etc.
|
||
[FN7] Because of the way a BBS is accessed, some easily have national
|
||
or international reach. The international aspects of computer
|
||
information systems are beyond the scope of this paper, though
|
||
with the increasingly international reach of telecommunications it
|
||
is important to keep in mind that some computer systems may be
|
||
used by people in other countries as easily as they may be used by
|
||
people in their home countries.
|
||
Bulletin board systems originally started on a small scale, used
|
||
by local computer "hackers" to exchange information among
|
||
themselves. The term "hacker" is used in a number of different
|
||
ways. It was originally used to refer to someone who uses his or
|
||
her computer knowledge to break into other computer systems. See
|
||
Eric C. Jensen, An Electronic Soapbox: Computer Bulletin Boards
|
||
and the First Amendment, 39 FED. COM. L.J. 217 n.50 (1987). With
|
||
the rise of national and international computer networks, BBSs are
|
||
becoming more accessible to the general populace not just for
|
||
local users, but also for users all over the world. Some countries
|
||
already provide their citizens easy access to state-endorsed
|
||
computer information systems. The world leader has been France,
|
||
which has provided its "Minitel" service since 1982. Wallys W.
|
||
Conhaim, Maturing French Videotext becomes Key International
|
||
Business Tool, 9 INFO. TODAY 28 (1992). Minitel has grown to a
|
||
system of about six million terminals as of the end of 1991, and
|
||
it includes access to over 16,000 information services. Carol
|
||
Wilson, The Myths and Magic of Minitel; France's Minitel Videotex
|
||
Service, TELEPHONY, Dec. 2, 1991, at 52, 52.
|
||
======================================================================
|
||
84 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
is a message that is sent from one computer user to another,
|
||
occurring either between users on the same computer, or between
|
||
users on different computers connected together in a network.
|
||
Electronic mail is different from regular mail in three important
|
||
ways. First, E-mail is provided by private parties and, thus, is
|
||
not subject to government control under the postal laws.[FN8]
|
||
However, it is under the control of the System Operator (often
|
||
called the SYSOP) of the bulletin board system. This gives rise to
|
||
the second issue <20> privacy. Unlike the U.S. mail, electronic mail
|
||
is almost always examinable by someone other than the sender and
|
||
the receiver.[FN9] By necessity, the communications provider may not
|
||
only have access to all mail sent through the computer system, but
|
||
may also have to keep copies (or "backups") in case of system
|
||
failure.[FN10] Third, E-mail is interactive in nature and can involve
|
||
almost instantaneous communication, more like a telephone than
|
||
regular mail,[FN11] so much so that regular users of E-mail often
|
||
refer to the U.S. mail as "snail mail."
|
||
Another service many bulletin board systems make available is
|
||
the uploading and downloading of files.[FN12] A BBS providing a
|
||
section of files for its users to download, can distribute almost
|
||
any type of computer file. This may consist of text, software,
|
||
pictures, or even sounds. Multiple user bulletin board systems are
|
||
also frequently used for their "chat" features, allowing a user to
|
||
talk to other users who are on-line (connected to the host
|
||
computer) at the same time.[FN13]
|
||
--------------------------
|
||
[FN8] Robert W. Kastenmeier et al., Communications Privacy: A
|
||
Legislative Perspective, 1989 WIS. L. REV. 715, 727.
|
||
[FN9] Id.
|
||
[FN10] Id.
|
||
[FN11] Id.
|
||
[FN12] Downloading entails transferring files from the computer on
|
||
which the BBS runs to the user's computer, and uploading is the reverse.
|
||
[FN13] This operates as a way to get information more directly from
|
||
other people and even to meet new friends. In fact, for some
|
||
people a BBS is a major social outlet, allowing communication on
|
||
equal terms without first impressions being formed by physical
|
||
appearances. Some people have even decided to get married to other
|
||
users, solely based on the messages they have exchanged. John
|
||
Johnston, Looking for Log-On Love, Gannett News Service, Mar. 25,
|
||
1992, available in LEXIS, Nexis Library, Currnt file. Others are
|
||
not looking for information or casual conversation, but rather for
|
||
"net sex." Chat features can be used much like telephone 900
|
||
number dial-a-porn services. Before cracking down on them, the
|
||
French Minitel system determined that sex oriented messages
|
||
constituted nearly 20 percent of the usage of its conferencing
|
||
system. John Markoff, The Nation; The Latest Technology Fuels the
|
||
Oldest of Drives, N.Y. TIMES, Mar. 22, 1992, <20> 4, at 5.
|
||
======================================================================
|
||
85 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
B. Teletext and Videotex or Videotext
|
||
|
||
Another kind of computer information system is Teletext,[FN14] a
|
||
one-way distribution system, generally run over a cable television
|
||
system.[FN15] It sends out a continually repeating set of information
|
||
screens.[FN16] By using a decoder, a user can select which screen he
|
||
or she wants.[FN17] The decoder then "grabs" the requested screen and
|
||
displays it as it cycles by.[FN18] Since Teletext is only a one-way
|
||
service, a user can only read the information the service has
|
||
available for his or her reading. There is no way for the user to
|
||
contribute his or her own input to the system.
|
||
More advanced than Teletext is videotex[FN19] (often called
|
||
videotext).[FN20] Videotex is a two-way service which usually uses a
|
||
personal computer as a terminal.[FN21] When provided via a telephone,
|
||
videotex is basically the same as any other computer information
|
||
system discussed in this paper, so the terms "videotex" and
|
||
"computer information system" are used synonymously for ease of
|
||
discussion.
|
||
|
||
C. Information Distribution Systems
|
||
|
||
Computers are used frequently for distributing information of
|
||
various types. One common type of information distribution system
|
||
is the database.[FN22] These services allow the user to enter a
|
||
variety of "search terms" to look through the information the
|
||
service has collected.[FN23]
|
||
Another type of information distribution system is the "file
|
||
--------------------------
|
||
[FN14] See generally Richard N. Neustadt, Symposium: Legal Issues in
|
||
Electronic Publishing: 1. Background -- The Technology, 36 FED. COM
|
||
L.J. 149 (1984).
|
||
[FN15] Id.
|
||
[FN16] Id.
|
||
[FN17] Id.
|
||
[FN18] Id.
|
||
[FN19] Id.
|
||
[FN20] The final "t" is often left off because on many computers,
|
||
filenames are limited to eight characters. See A Glossary of
|
||
Computer Technology Terms, AM. BANKER, Oct. 25, 1989, at 10
|
||
[hereinafter Glossary].
|
||
[FN21] Neustadt, supra note 14, at 149.
|
||
[FN22] Examples include WESTLAW, LEXIS, DIALOG, ERIC, and the local
|
||
library's card catalog.
|
||
[FN23] Some of these services are quite large, and may contain the
|
||
whole text of books and periodicals, though some may contain only
|
||
citations requiring the user to look elsewhere to find the actual
|
||
material desired. These services differ significantly in their
|
||
degree of complexity<74>for example, in the types of search terms
|
||
they will allow.
|
||
======================================================================
|
||
86 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
server."[FN24] A file server (or just "server") is a storage device,
|
||
such as a disk drive or CD ROM, hooked up to a computer network,
|
||
which lets any computer connected to it access the files contained
|
||
on the server.[FN25] These files may consist of virtually anything,
|
||
ranging from software to news articles distributed by a "news
|
||
server." While file servers may be found as part of another
|
||
computer information system, the server itself is used only for
|
||
storing and retrieving files.[FN26]
|
||
|
||
D. Networks
|
||
|
||
A network is a series of computers, connected often by
|
||
special types of telephone wires.[FN27] Many networks are conduits
|
||
used to call up a remote computer in order to make use of that
|
||
computer's resources from a remote personal computer or
|
||
terminal.[FN28] Many networks allow a much broader range of uses such
|
||
as sending E-mail and more interactive forms of communication
|
||
between machines,[FN29] transferring computer files, and also
|
||
providing the same remote access and use that the simpler networks
|
||
allow.[FN30]
|
||
Some of these networks are so sophisticated and far-reaching
|
||
that they provide an ideal communications medium for the computer
|
||
literate. They can be used not only for personal E-mail, but they
|
||
are also used for a number of special kinds of electronic
|
||
publishing.[FN31]
|
||
--------------------------
|
||
[FN24] See MACUSER, June 1991, at 134.
|
||
[FN25] See Glossary, supra note 20.
|
||
[FN26] On large networks, such as the Internet, there are even
|
||
databases called "archies," which index file servers available all
|
||
over the network. They have small descriptions of available
|
||
software, and give a listing of what machines on the network have
|
||
the file available. Alan Emtage, What Is 'Archie', EFFECTOR ONLINE,
|
||
Oct. 18, 1991, available over Internet, by anonymous FTP, at
|
||
FTP.EFF.ORG (Electronic Frontier Foundation)(Vol. 1, No. 12).
|
||
[FN27] CHRISTOPHER CONDON & YALE COMPUTER CENTER, BITNET USERHELP, 1988.
|
||
Available over Bitnet by sending the command "get bitnet userhelp"
|
||
to NETSERV@BITNIC. Id.
|
||
[FN28] Some of the major examples of networks are Tymnet, Sprintnet,
|
||
and specifically for WESTLAW and LEXIS users there is Westnet and
|
||
Meadnet.
|
||
[FN29] An example of such interactive communication is the UNIX "Talk"
|
||
command which allows a person to talk instantaneously with a
|
||
remote user. Both users can type simultaneously; one user's text
|
||
appears on the top of his or her computer screen while the other
|
||
user's text appears on the bottom.
|
||
[FN30] Some examples of these more full-service type networks include
|
||
the Internet, Bitnet, and ARPANET.
|
||
[FN31] One such special use is the electronic forum, basically an
|
||
automated mailing list. A message is sent to a "LISTSERVER" where
|
||
it is then automatically distributed to other people on its
|
||
electronic mailing list. A LISTSERVER is an automated computer
|
||
mailing program running out of a computer account. Mail is sent to
|
||
the account; the LISTSERVER then redistributes the message. The
|
||
people on the list then receive the message as E-mail. They can
|
||
respond by sending a reply back to the LISTSERVER which then
|
||
distributes that message to its list, which includes the first
|
||
message sender. This works, in effect, like a group of people
|
||
standing around discussing a topic, though some people are left
|
||
behind in the discussion if they do not log on to read their mail
|
||
regularly. CONDON & YALE COMPUTER CENTER, supra, note 27. A similar
|
||
type of electronic publication is the electronic digest; a message
|
||
is sent to the LISTSERVER, but, instead of being automatically
|
||
sent out, it is held. A "moderator" then sorts through and edits
|
||
the material for distribution to the people on the digest's
|
||
mailing list. Id. The most formal type of electronic publishing is
|
||
the Electronic magazine or journal, often called the E-journal.
|
||
These are "real" magazines, just like print magazines, but they
|
||
are distributed electronically, rather than in hard copy. Id.
|
||
======================================================================
|
||
87 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
E. Issues Involved
|
||
|
||
Computer information systems present a whole slew of legal
|
||
issues. Whenever a new form of communication emerges, there is a
|
||
concern that, along with legitimate users will come some abusers.
|
||
Just as a bulletin board system can be used for political debate,
|
||
it can also be used as an outlet for defamation. How should this
|
||
be treated? Who is liable? Is it the user who originally posted
|
||
the defamation, or the system operator who controls and provides
|
||
the forum? Currently, these are hotly debated issues.
|
||
Whenever a new communications medium develops, there is a
|
||
risk that it will be used to deliver material which society frowns
|
||
upon, such as obscene or indecent data. Computer information
|
||
systems allow the distribution of this material in the forms of
|
||
text, picture, and sound.
|
||
One major use for computer information systems is
|
||
transferring files; in fact, that is the whole purpose for
|
||
services such as file servers. Legal issues arise when these
|
||
transfers contain copyrighted material for example, either text,
|
||
pictures, sounds, or computer software which violates copyright
|
||
law.
|
||
A growing threat to computer users is the computer virus. The
|
||
Computer Virus Industry Association reports that in 1988, nearly
|
||
90,000 personal computers were affected by computer viruses.[FN32]
|
||
Viruses can be distributed via computer information systems, both
|
||
consciously and unconsciously. They can be put into a system by
|
||
someone intending to cause harm, or they can be innocently
|
||
transferred by a user who has an infected disk.[FN33]
|
||
Privacy is another issue for users and system operators of
|
||
--------------------------
|
||
[FN32] Dawn Stover, Viruses, Worms, Trojans, and Bombs; Computer
|
||
"Infections", POPULAR SCI., Sept. 1989, at 59.
|
||
[FN33] Id. Some people consider them such a threat that Lloyd's of
|
||
London even offers an insurance policy that specifically covers
|
||
viruses. Id.
|
||
======================================================================
|
||
88 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
computer information systems. With society becoming increasingly
|
||
computerized, people need to be made aware of how secure their
|
||
stored data and electronic mail really is. The Fourth Amendment to
|
||
the United States Constitution reads: "The right of the people to
|
||
be secure in their persons, houses, papers, and effects, against
|
||
unreasonable searches and seizures, shall not be violated, and no
|
||
Warrants shall issue, but upon probable cause, supported by Oath
|
||
or affirmation, and particularly describing the place to be
|
||
searched and the persons or things to be seized."[FN34] Yet, how does
|
||
this Amendment apply to Cyberspace. Cyberspace is a vague,
|
||
ethereal place with no readily identifiable boundaries, where a
|
||
"seizure" may not result in the loss of anything tangible and may
|
||
not even be noticed?
|
||
In all of these cases, questions arise as to who is liable.
|
||
If SYSOPs are not made aware of the legal issues they may face in
|
||
running a computer system, they may either fail to reduce or
|
||
eliminate harm when it is within their power to do so, or they may
|
||
unnecessarily restrict the services they provide out of fear of
|
||
liability.
|
||
|
||
F. Legal Analogies
|
||
|
||
Liability for illegal activities in Cyberspace is affected by
|
||
how the particular computer information service is viewed. Some
|
||
services allow one entity to deliver its message to a large number
|
||
of receivers. In this regard the service acts like a publisher.
|
||
Some theorists already refer to computer networks as "the printing
|
||
presses of the 21st century."[FN35] Many publishers use BBSs to
|
||
supplement their printed editions either by providing additional
|
||
stories or by providing computer information services on a BBS.[FN36]
|
||
However, other services are more like common carriers than
|
||
publishers. Networks just pass data from one computer to another
|
||
<EFBFBD>they do not gather and edit data. Still other services are more
|
||
akin to broadcasting than common carriage. This similarity exists
|
||
because computer services can be provided by sending data over the
|
||
airwaves, thus providing the same services available from
|
||
computers networked together by wire. Computer services can also
|
||
be used to
|
||
--------------------------
|
||
[FN34] U.S. CONST. amend. IV.
|
||
[FN35] M.I.T. Professor Ithiel de Sola Pool, quoted in John Markoff,
|
||
Some Computer Conversation Is Changing Human Contact, N.Y. TIMES,
|
||
May 13, 1990, <20> 1, at 1.
|
||
[FN36] See generally 'Fred The Computer'; Electronic Newspaper
|
||
Services Seen as 'Ad-Ons', COMM. DAILY, Apr. 10, 1990, at 4.
|
||
======================================================================
|
||
89 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
allow many entities to deliver their messages
|
||
simultaneously to many other entities. In this way, computer
|
||
information systems are likened to traditional public fora, such
|
||
as street corners or community bulletin boards.
|
||
None of these analogies is especially useful taken
|
||
individually. Each is accurate in describing some situations, but
|
||
lacking in describing others. There is a tendency to look at a
|
||
service and give it a label, and then regulate it based on its
|
||
label. This labeling works well in some instances; but, when a
|
||
service has a number of communication options, such as a BBS that
|
||
provides a series of bulletin boards, E-mail, and a chat feature,
|
||
and that makes available electronic periodicals in the BBS's file
|
||
system, one analogy is insufficient. To regulate computer
|
||
information systems properly, lawyers, judges, and juries need to
|
||
understand computer information systems and how they work.
|
||
|
||
III. Current Regulatory Environment
|
||
|
||
The current regulatory environment governing computer
|
||
information systems is somewhat confused because of the
|
||
multiplicity of the means which can be employed in regulating a
|
||
wide variety of dissimilar services. The Federal Communications
|
||
Commission, which regulates broadcasters and common carriers
|
||
providing electronic data, considers computer information systems
|
||
to be "enhanced" services, and, therefore, computer information
|
||
systems are not regulated by the F.C.C.[FN37] However, some specific
|
||
aspects of computer information systems are governed by existing
|
||
case law and statutes.
|
||
Let us start with a hypothetical situation. The Data
|
||
Playground is a large, full service bulletin board system. In the
|
||
BBS's message system, one of the fora, called the Sewer, is set
|
||
aside for the users as a place to blow off some steam, and express
|
||
their anger at whatever they feel like complaining about. Samantha
|
||
Sysop, the bulletin board operator, feels such a forum is
|
||
necessary. She feels that without it, frustrated users will leave
|
||
unpleasant messages in the other fora which are meant for rational
|
||
discussions of serious topics. By providing the Sewer, users who
|
||
get upset with other users or with life in general can "take their
|
||
problem to the Sewer."
|
||
--------------------------
|
||
[FN37] Second Computer Inquiry 61 F.C.C.2d 103 (1976) (Amendment of
|
||
Section 64.702 of the Commission's Rules and Regulations, Notice
|
||
of Inquiry and Proposed Rulemaking). See also Second Computer
|
||
Inquiry, 77 F.C.C.2d 384, 420-21 (1980) (Final Decision) (The
|
||
talks directly discuss BBSs as enhanced services.).
|
||
======================================================================
|
||
90 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
Because she is unsure of any liability for
|
||
posts in the Sewer which get too heated, she posts a disclaimer,
|
||
which can be seen the first time a user posts in or reads the
|
||
Sewer, which states that the SYSOP disclaims all liability for
|
||
anything that is said in the Sewer. Samantha Sysop reads the posts
|
||
left in the Sewer, and once in a while posts a message there
|
||
herself. One day a user, Sam Slammer, leaves the following message
|
||
in the Sewer:
|
||
|
||
From: Sam Slammer
|
||
|
||
I am sick and tired of logging onto this damned bulletin
|
||
board and seeing that damn user Dora Defamed here. She
|
||
is always here. However, at least if she is here it
|
||
means that she is not still at home beating her young
|
||
daughter. In fact, her daughter is too good looking to
|
||
be stuck with a mother like Dora. She should be stuck
|
||
with someone like me, after all, I really like young
|
||
girls, and having sex with her would be a real catch.
|
||
(If anyone would like to see the films of the last
|
||
little girl I had sex with, leave me mail) Anyway, Dora:
|
||
it is a wonder that kid isn't brain damaged, seeing as
|
||
you are so badly warped. I would really like to do
|
||
society a favor and kill you before you get the chance
|
||
to beat any more children. In fact, if anyone is near
|
||
the computer where Dora is connected to this BBS from, I
|
||
urge you to go over to her and kill her. Do us all a
|
||
favor.
|
||
|
||
This hypothetical post raises a number of issues. In one post
|
||
there is potentially defamatory speech, speech advocating lawless
|
||
action, fighting words, and an admission and solicitation of child
|
||
pornography.
|
||
|
||
A. Defamation
|
||
|
||
Defamation can occur on a computer information system in a
|
||
number of forms: posts on a bulletin board system, like the one in
|
||
the Sam Slammer hypothetical can be defamatory, as can electronic
|
||
periodicals; file servers and databases can distribute defamatory
|
||
material; E-mail can contain defamatory statements. Defamation can
|
||
even be distributed in the form of a scanned photograph.[FN38] But
|
||
what is defamation, and what risks and obligations does it present
|
||
to a system operator?
|
||
Defamation occurs in two forms <20> libel and slander. The
|
||
difference between these two forms of defamation is often not
|
||
apparent, based on a common sense approach, rather it is solely a
|
||
matter of
|
||
--------------------------
|
||
[FN38] See Gregory G. Sarno, Annotation, Libel and Slander: Defamation
|
||
by Photograph, 52 A.L.R. 4th 488, 495 (1987).
|
||
======================================================================
|
||
91 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
form and "no respectable authority has ever attempted to
|
||
justify the distinction on principle."[FN39] With the rise of new
|
||
forms of technology which confuse the distinction between libel
|
||
and slander, many courts have advocated the elimination of the
|
||
distinction.[FN40] Speech on a computer information system has more
|
||
of the characteristics of libel than slander. Most courts have
|
||
argued, based on libel cases, that messages appearing on computer
|
||
information systems are libel and not slander; often judges used
|
||
the generic term "defamation."[FN41]
|
||
Slander is publication in a transitory form <20> speech, for
|
||
example, is slander.[FN42] Libel, on the other hand, is embodied in a
|
||
physical, longer lasting form, or "by any other form of
|
||
communication that has the potentially harmful qualities
|
||
characteristic of written or printed words."[FN43] Written or printed
|
||
words are considered more harmful than spoken words because they
|
||
are deemed more premeditated and deliberate. For example, Sam
|
||
Slammer had to sit down at a keyboard and compose his post; it is
|
||
not a matter of a comment carelessly made in a fit of anger.
|
||
Printed words also last longer, because they are put in a form in
|
||
which they can serve to remind auditors of the defamation, while
|
||
the spoken word is gone once uttered.[FN44] Had Sam Slammer accused
|
||
Dora Defamed of child abuse in person, the statement would be
|
||
fleeting; on the BBS it is stored for viewing by any user who
|
||
decides to read what posts have been left in the Sewer. For days,
|
||
weeks, or months people can read Sam's statement unless Samantha
|
||
Sysop removes it. Any user can save a copy of the post on his or
|
||
her own computer, and can distribute it, verbatim, to anyone else,
|
||
with Sam's name right at the top. Text on a computer screen shares
|
||
more traits with libel than with slander. Computer text appears as
|
||
printed words, and it is often more pre-meditated than spoken
|
||
words. Computer text can be called up off of a disk as many times
|
||
as is needed. The message can even be printed out, and the text
|
||
can be more widely circulated than the same words when they are
|
||
spoken.
|
||
In its barest form, libel is the publication of a false,
|
||
defamatory
|
||
--------------------------
|
||
[FN39] RESTATEMENT (SECOND) OF TORTS <20> 568 cmt. b (1989).
|
||
[FN40] Id.
|
||
[FN41] See, e.g., Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc.
|
||
472 U.S. 749 (1985).
|
||
[FN42] RESTATEMENT (SECOND) OF TORTS <20> 568(2).
|
||
[FN43] Id. <20> 568(1).
|
||
[FN44] See Tidmore v. Mills, 32 So. 2d 769, 774 (Ala. Ct. App.), cert.
|
||
denied, 32 So. 2d 782 (Ala. 1947).
|
||
======================================================================
|
||
92 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
and unprivileged statement to a third person.[FN45]
|
||
"Defamatory" communication is defined as communication that tends
|
||
to harm the reputation of another so "as to lower him [or her] in
|
||
the estimation of the community or to deter third persons from
|
||
associating or dealing with him [or her]."[FN46] Actual harm to
|
||
reputation is not necessary for a statement to be defamatory, and
|
||
the statement need not actually result in a third person's refusal
|
||
to deal with the object of the statement; rather the words used
|
||
must merely be likely to have such an effect.[FN47] For this reason,
|
||
if the person defamed already looks so bad in the eyes of the
|
||
community that his or her reputation could not be made worse, or
|
||
if the statements are made by someone who has no credibility,
|
||
there will not be a strong case for defamation.[FN48] "Community"
|
||
does not refer to the entire community, but rather to a
|
||
"substantial and respectable minority" of the community.[FN49] Even
|
||
more specifically, the community is not necessarily seen as the
|
||
community at large, but rather as the "relevant" community.[FN50]
|
||
This means, for example, that one could post a defamatory message
|
||
on a bulletin board system defaming another user and be subject to
|
||
a libel suit, even though only other BBS users see the post.
|
||
In the hypothetical, we don't know whether Sam's accusations
|
||
of child beating are true. If they are, Sam would have a defense
|
||
against a charge of libel. The comment is being "published" to any
|
||
other BBS user who reads the message Sam has left publicly, and as
|
||
already discussed, the computer message has the same harmful
|
||
qualities as a message written and distributed on paper. In fact,
|
||
Sam's comments are potentially reaching a larger audience than Sam
|
||
could have reached by simply posting a notice on a bulletin board
|
||
in the local computer center. The remark about child abuse has the
|
||
potential for lowering people's estimation of Dora, and could
|
||
easily encourage people to avoid associating with her. Even if
|
||
people do not avoid Dora because of the remark, in a defamation
|
||
suit it is sufficient that the statements have the potential to have
|
||
--------------------------
|
||
[FN45] RESTATEMENT (SECOND) OF TORTS <20> 558 (1989).
|
||
[FN46] Id. <20> 559.
|
||
[FN47] Id. <20> 559 cmt. d.
|
||
[FN48] Id.
|
||
[FN49] Id. <20> 569 cmt. e.
|
||
[FN50] See, e.g., Ben-Oliel v. Press Publishing Co., 167 N.E. 432
|
||
(N.Y. 1929). This case involved a newspaper article on Palestinian
|
||
art and custom which was mistakenly credited to the plaintiff, an
|
||
expert in the field. The article contained a number of
|
||
inaccuracies that, while still impressive to the lay reader, would
|
||
embarrass the plaintiff among other experts.
|
||
======================================================================
|
||
93 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
that effect, and here they clearly do.
|
||
The community at issue here is not the world at large, but
|
||
rather a substantial and respectable minority of the "relevant"
|
||
community. Bulletin board systems can give rise to a close knit
|
||
group of users. Here, she is being attacked in a public forum in
|
||
front of the whole community of users. This raises another issue:
|
||
Can a person sue for defamation that occurred to a fictitious name
|
||
or a persona that appears on a computer? If "Dora Defamed" was not
|
||
the BBS user's real name, could the real user sue Sam Slammer for
|
||
defaming the user's "Dora" persona on the BBS? In a bulletin board
|
||
community, unless users know each other in real life away from the
|
||
computer, the only impression one user gets of another is from how
|
||
he or she appears on the computer screen. The user in real life
|
||
may not even be the same sex as the person he or she portrays on
|
||
the bulletin board system. On the BBS, people only know and
|
||
associate with Dora; not the real person behind the name. When
|
||
Dora is defamed, in essence, so is the person behind the computer
|
||
representation of Dora. The user is defamed in the eyes of the
|
||
users behind all of the other BBS personalities that read Sam's
|
||
post. It should not matter if Dora Defamed is not the user's real
|
||
identity - a defamation action should still be allowed. The last
|
||
issue is whether Dora is being defamed in front of at least a
|
||
"substantial and respectable" minority of the relevant community.
|
||
This hinges on who reads the Sewer forum. If the Sewer is widely
|
||
read, a defamation suit will be more likely to succeed than if the
|
||
Sewer is largely ignored.
|
||
Because defamation involves speech, defamation raises serious
|
||
First Amendment concerns. Just because speech is defamatory, does
|
||
not mean that it is left unprotected. Analysis is based on the
|
||
party or parties privy to the defamation. In our hypothetical, the
|
||
relevant parties are Sam and Dora. Constitutional protection was
|
||
first found for some types of defamation in New York Times v.
|
||
Sullivan.[FN51] This case involved an advertisement taken out in a
|
||
newspaper expressing grievances with the treatment of blacks in
|
||
Alabama.[FN52] An elected city commissioner sued, claiming that the
|
||
statements made in the advertisement defamed him and that the
|
||
advertisement contained some inaccuracies.[FN53] Justice Brennan
|
||
argued that the case should be considered "against the background
|
||
--------------------------
|
||
[FN51] New York Times v. Sullivan, 376 U.S. 254 (1964).
|
||
[FN52] Id. at 256.
|
||
[FN53] Id.
|
||
======================================================================
|
||
94 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
of a profound national commitment to the principle that debate on
|
||
public issues should be uninhibited, robust, and wide-open, and
|
||
that it may well include vehement, caustic, and sometimes
|
||
unpleasantly sharp attacks on government and public officials."[FN54]
|
||
The court held that, because one of the main purposes of the First
|
||
Amendment was to preserve debate and critical analysis of the
|
||
affairs of elected officials, any censorship of that speech would
|
||
be detrimental to society.[FN55] Because of this, the court said
|
||
libel laws should be relaxed where the speech pertains to the
|
||
affairs of elected officials.[FN56] Likewise, due to the importance
|
||
of being able to examine the worthiness of public officials, the
|
||
court felt that speech critical of officials should also be less
|
||
open to attack on grounds of falsity.[FN57] False speech that is made
|
||
known can be investigated, but true speech that the critic worries
|
||
may be false and may result in a libel suit, will remain
|
||
undisseminated.[FN58] Because of the importance of monitoring elected
|
||
officials, the court held that allowing speech that would aid in
|
||
the monitoring of elected officials' conduct was more important
|
||
than protecting officials from potential harm resulting from
|
||
defamatory speech.[FN59] A balance between open debate and freedom
|
||
from defamation was struck by establishing an "actual malice"
|
||
standard of liability for the publisher.[FN60] "Actual malice" is a
|
||
term of art with a specific meaning in the publishing context. As
|
||
the court stated:
|
||
|
||
The constitutional guarantees require, we think, a federal
|
||
rule that prohibits a public official from recovering damages
|
||
for a defamatory falsehood relating to his [or her] official
|
||
conduct unless he [or she] proves that the statement was made
|
||
with "actual malice" -- that is, with knowledge that it was
|
||
false or with reckless disregard of whether it was false or
|
||
not.[FN61]
|
||
|
||
This standard applies to electronic publishing as clearly as
|
||
it applies to print or speech. SYSOPs and users are freed from
|
||
liability for defamation carried on computer information systems,
|
||
as it applies to public officials, so long as the material is not
|
||
allowed to remain when the SYSOP or user knows of its falsity or
|
||
has reckless
|
||
--------------------------
|
||
[FN54] Id. at 270.
|
||
[FN55] Id. at 279.
|
||
[FN56] Id.
|
||
[FN57] Id.
|
||
[FN58] Id.
|
||
[FN59] Id.
|
||
[FN60] Id. at 279-80.
|
||
[FN61] Id.
|
||
======================================================================
|
||
95 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
disregard for its truth. Dora, as far as we know, is
|
||
not a public official. If Dora were a persona on the bulletin
|
||
board system, and not the user's actual name, and if there is no
|
||
way for the average user to associate the persona with the real
|
||
person, then even if "Dora" were defamed and the real user was a
|
||
public official, it would be questionable as to whether the public
|
||
official privilege would apply. In this situation, the rationale
|
||
behind the privilege would not be relevant to the actual facts.
|
||
Statements about Dora do not reflect on the actual user's
|
||
abilities to perform his or her official job. If, however, the
|
||
public official can be linked to the Dora persona, then the basis
|
||
for privileging statements about public officials does apply to
|
||
the situation, and Sam Slammer's statement may be privileged,
|
||
presuming no actual malice was intended.
|
||
The New York Times standard was expanded in two important
|
||
cases, Curtis Publishing Co. v. Butts,[FN62] and its companion case,
|
||
Associated Press v. Walker.[FN63] Both cases involved defamation of
|
||
people who did not fit under the "public official" heading, but
|
||
who were "public figures." As discussed in the concurrence, some
|
||
people, even though they are not part of the government, are
|
||
nonetheless sufficiently influential to affect matters of
|
||
important public concern.[FN64] The Court subsequently has defined
|
||
public figures as "[t]hose who, by reason of the notoriety of
|
||
their achievements or the vigor and success with which they seek
|
||
the public's attention, are properly classed as public figures ...
|
||
."[FN65] Because these people have influence in our governance, just
|
||
as public officials do, the same "actual malice" standard should
|
||
apply to such public figures.[FN66] Here, as in the case of public
|
||
officials, we don't really know who Dora Defamed is. If she is a
|
||
public figure, Sam's child abuse claim may be privileged; if she
|
||
is not, he may be liable.
|
||
Another major case defining the constitutional protection of
|
||
defamation is Gertz v. Robert Welch, Inc.[FN67] In Gertz, a magazine
|
||
published an article accusing a lawyer of being a "Communist-
|
||
fronter" and a "Marxist."[FN68] The article accused the plaintiff of
|
||
plotting
|
||
--------------------------
|
||
[FN62] Curtis Publishing Co. v. Butts, 388 U.S. 130 (1967), aff'g 351
|
||
F.2d 702 (5th Cir. 1965), reh'g denied, 389 U.S. 889 (1967).
|
||
[FN63] Associated Press v. Walker, 388 U.S. 130 (1967), rev'g 393
|
||
S.W.2d 671 (Tex. Civ. App. 1965), reh'g denied, 389 U.S. 889 (1967).
|
||
[FN64] See 388 U.S. at 164 (Warren, C.J., concurring).
|
||
[FN65] Gertz v. Robert Welch, Inc., 418 U.S. 323, 342 (1974). See
|
||
infra text accompanying notes 67-79.
|
||
[FN66] 418 U.S. at 343.
|
||
[FN67] Id. at 323.
|
||
[FN68] Id.
|
||
======================================================================
|
||
96 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
against the police.[FN69] The plaintiff was a lawyer who
|
||
played a role in the trial of a police officer who was charged
|
||
with shooting a boy.[FN70] The lawyer sued for defamation. The
|
||
publisher's defense was based on another exception to defamation
|
||
law that the court had carved out in Rosenbloom v. Metromedia,
|
||
Inc.[FN71] Rosenbloom extended the New York Times standard to include
|
||
not just public officials and public figures, but also private
|
||
figures who were actively involved in matters of public
|
||
concern.[FN72] The Gertz court held that this expansion went too
|
||
far,[FN73] and the court overruled Rosenbloom.[FN74] The court in Gertz
|
||
acknowledged that the press should not be held strictly liable for
|
||
false factual assertions where matters of public interest were
|
||
concerned.[FN75] Strict liability would serve to chill the
|
||
publisher's speech by leading to self censorship where facts are
|
||
in doubt.[FN76] This First Amendment interest was balanced against
|
||
the individual's interest in being compensated for defamatory
|
||
falsehood.[FN77] The court reasoned that private individuals were
|
||
deserving of more protection than public officials and public
|
||
figures because private persons do not have the same access to
|
||
channels of communication, and they have not voluntarily exposed
|
||
themselves to the public spotlight.[FN78] The court held that "so
|
||
long as they do not impose liability without fault, the States may
|
||
define for themselves the appropriate standard of liability for a
|
||
publisher or broadcaster of defamatory falsehood injurious to a
|
||
private individual."[FN79] Courts have not made it very difficult for
|
||
private people to sue for defamation where there is no matter of
|
||
public concern at issue; in one of the more famous defamation
|
||
cases, Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc.,[FN80] Dun
|
||
& Bradstreet was held liable for a credit report made from
|
||
inaccurate records contained in a database.[FN81] The court argued
|
||
that statements on
|
||
--------------------------
|
||
[FN69] Id. at 326.
|
||
[FN70] Id.
|
||
[FN71] See Rosenbloom v. Metromedia, Inc., 403 U.S. 29 (1971).
|
||
[FN72] Id. at 31-32.
|
||
[FN73] 418 U.S. at 345.
|
||
[FN74] Id. at 346.
|
||
[FN75] Id. at 340.
|
||
[FN76] Id.
|
||
[FN77] Id. at 341.
|
||
[FN78] Id. at 344.
|
||
[FN79] Id. at 347.
|
||
[FN80] 472 U.S. at 749 (involving a suit for defamation because of a
|
||
false credit report).
|
||
[FN81] Id.; cf. Thompson v. San Antonio Retail Merchants Ass'n, 682
|
||
F.2d. 509 (5th Cir. 1982).
|
||
======================================================================
|
||
97 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
matters of no public concern, especially when
|
||
solely motivated by profit, did not deserve sufficient First
|
||
Amendment protection to outweigh the individual's interest in
|
||
suing for defamation.[FN82]
|
||
In our hypothetical, we must look to the subject of Sam
|
||
Slammer's defamatory comment to see if it is a matter of public
|
||
concern. Sam is accusing Dora of "beating her kid." While child
|
||
abuse may be a matter of public concern, whether Dora is such an
|
||
abuser is not likely a matter of public concern. Just as people's
|
||
inabilities to pay their debts can be a matter of public concern,
|
||
as was found in the Dun & Bradstreet case,[FN83] the ability of one
|
||
particular company to pay its debts is not necessarily a matter of
|
||
public concern. Child abuse is not the issue in this hypothetical;
|
||
Dora Defamed's potential child abuse is the issue.
|
||
The press has been found to have other privileges as a result
|
||
of the kind of news the press is reporting. One such privilege, is
|
||
for fair report, or "neutral reportage,"[FN84] (which is not an issue
|
||
in our hypothetical). This isolates a reporter from defamatory
|
||
statements that he or she is reporting.[FN85] The reasoning behind
|
||
this is that the fact that some statements were made is a matter
|
||
of public interest, especially around sensitive issues, and
|
||
therefore the public interest is best served by allowing the press
|
||
to inform people of these statements without the risk of
|
||
liability.[FN86] Neutral reporting is privileged, but if the reporter
|
||
is found not to have lived up to the "actual malice" standard
|
||
(knowing or careless disregard for the truth), his or her report
|
||
will not be considered neutral and therefore the fair report
|
||
privilege will not apply.
|
||
Statements of opinion are also privileged.[FN87] Protection of
|
||
opinion is, of necessity, not absolute otherwise "a writer could
|
||
escape liability ... simply by using, explicitly or implicitly,
|
||
the words `I think.'"[FN88] Sam Slammer cannot defend himself by
|
||
saying, "Well, I think Dora beats her daughter." The court in
|
||
Cianci v. New Times
|
||
--------------------------
|
||
[FN82] 472 U.S. at 761-62.
|
||
[FN83] Id.
|
||
[FN84] See, Edwards v. National Audubon Soc'y, Inc., 556 F.2d 113 (2d.
|
||
Cir. 1977). See also Time, Inc. v. Pape, 401 U.S. 279, reh'g
|
||
denied, 401 U.S. 1015 (1971) (Newspaper's coverage of a government
|
||
report which, due to inaccuracies, defamed a public official,
|
||
could not result in liability unless the newspaper published the
|
||
story with actual malice); Beary v. West Publishing Co., 763 F.2d
|
||
66 (2d Cir. 1985) (holding a publisher that exactly reprinted a
|
||
court opinion was absolutely privileged for any defamatory
|
||
comments in the court opinion).
|
||
[FN85]763 F.2d at 68.
|
||
[FN86] 556 F.2d at 119.
|
||
[FN87] See, e.g., Greenbelt Coop. Publishing Ass'n v. Bresler, 398
|
||
U.S. 6 (1970).
|
||
[FN88] Cianci v. New York Times Publishing Co., 636 F.2d 54, 64 (1980)
|
||
======================================================================
|
||
98 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
Publishing Co.[FN89] succinctly laid out the limits of the opinion
|
||
privilege:
|
||
|
||
(1) that a pejorative statement of opinion concerning a public figure
|
||
generally is constitutionally protected ... no matter how vigorously
|
||
expressed;
|
||
(2) that this principle applies even when the statement includes a
|
||
term which could refer to criminal conduct if the term could not
|
||
reasonably be so understood in context; but
|
||
(3) that the principle does not cover a charge which could reasona-
|
||
bly be understood as imputing specific criminal or other wrongful
|
||
acts.[FN90]
|
||
|
||
In the hypothetical, Sam made an outright accusation that Dora
|
||
Defamed committed a criminal act. Even if he had stated that he
|
||
believes that she beats her daughter, unless the statement is
|
||
clearly one interpretable as an opinion, he still is likely to be
|
||
held liable for his remark.
|
||
In sum, what this means for computer information systems,
|
||
whether speech on a bulletin board, text in an electronic journal,
|
||
or in any of the other forms of electronic publication, is that
|
||
liability may result if the message is libelous. It may not result
|
||
in liability if the defamation concerns public figures, public
|
||
officials, or matters of public interest. Communications that
|
||
defame a user may not constitute defamation to the community at
|
||
large, but the statements may still give rise to liability if it
|
||
lowers the opinion of the user in the eyes of the rest of the
|
||
bulletin board users.
|
||
|
||
B. Speech Advocating Lawless Action
|
||
|
||
The First Amendment states that "Congress shall make no law
|
||
... abridging the freedom of speech, or of the press."[FN91] The
|
||
First Amendment is one of the most important guarantees in the
|
||
Bill of Rights, because speech is essential for securing other
|
||
rights.[FN92]
|
||
--------------------------
|
||
[FN89] Id.
|
||
[FN90] Id. (referring to Greenbelt Coop. Letter Carriers v. Austin,
|
||
418 U.S. 264 (1974); Gertz v. Robert Welsh 418 U.S. 323 (1974);
|
||
Buckley v. Littell, 539 F2d 882, cert. denied, 429 U.S. 1062
|
||
(1977); Rinaldi v. Holt, Rinehart & Winston, Inc., 366 N.E.2d 1299
|
||
(N.Y.), cert. denied, 434 U.S. 969 (1977)) (The court in Cianci
|
||
held the privilege inapplicable to a situation in which the
|
||
plaintiff was clearly accused of committing a criminal act.).
|
||
[FN91] U.S. CONST. amend. I.
|
||
[FN92] Legal Overview: The Electronic Frontier and the Bill of Rights,
|
||
available over Internet, by anonymous FTP, at FTP.EFF.ORG
|
||
(Electronic Frontier Foundation).
|
||
======================================================================
|
||
99 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
While the right of free speech has been challenged by
|
||
the emergence of each new medium of communication, the right of
|
||
free speech still applies to the new forms of communication,
|
||
although it is, at times, more restrictive.[FN93] An example of such
|
||
a restriction is the regulation of radio and television by the
|
||
Federal Communications Commission.[FN94] The rationale for F.C.C.
|
||
governance is based on spectrum scarcity. Currently, this is not a
|
||
real issue with computer information systems, but with the rise of
|
||
packet radio and wireless networks which transmit computer data
|
||
through the airwaves,[FN95] the F.C.C. may choose to regulate some
|
||
aspects of computer information systems. Some people advocate
|
||
that, with changes in technology, distinctions between different
|
||
forms of media, such as between electronic and print media, should
|
||
be eliminated; instead, one all-encompassing standard should be
|
||
used.[FN96] No matter what the standard employed, some forms of
|
||
speech are currently not allowed on the local street corner or on
|
||
the local computer screen. In our Sam Slammer hypothetical,
|
||
questions arise as to whether his message contains some of this
|
||
speech which is inappropriate for public consumption.
|
||
One type of speech not permitted is advocacy of lawless
|
||
action, as laid out in Brandenburg v. Ohio.[FN97] The court in
|
||
Brandenburg held that the guarantees of free speech and free press
|
||
do not forbid a state from proscribing advocacy of the use of
|
||
force or of law violation "where such advocacy is directed to
|
||
inciting or producing imminent lawless action and is likely to
|
||
incite or produce such action."[FN98] Sam threatened to kill Dora,
|
||
and he urged others to kill her as well. An important distinction
|
||
is made between mere advocacy and incitement to imminent lawless
|
||
action <20>the first is protected speech, while the second is not.
|
||
This distinction is quite important, yet can be blurry, in a
|
||
computer context. On a bulletin board system, for instance,
|
||
messages may be read by a user weeks after they have been posted.
|
||
It is hard to imagine such "stale" messages as advocating imminent
|
||
lawless action. In our hypothetical, Sam encourages anyone near
|
||
--------------------------
|
||
[FN93] Id.
|
||
[FN94] Hereinafter F.C.C.
|
||
[FN95] Matt Kramer, Wireless Communication Net: Dream Come True;
|
||
Wireless Distributed Area Networks The Wide View, P.C. WEEK, Mar.
|
||
5, 1990, at 51, 51.
|
||
[FN96] Harvey Silverglate, Legal Overview, The Electronic Frontier and
|
||
the Bill of Rights,available over Internet, by anonymous FTP, at
|
||
FTP.EFF.ORG (Electronic Frontier Foundation).
|
||
[FN97] Brandenburg v. Ohio, 395 U.S. 444 (1969).
|
||
[FN98] Id. at 447.
|
||
======================================================================
|
||
100 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
the computer Dora is using to go kill her. A user who reads the
|
||
post hours later, may no longer have the opportunity to take the
|
||
requested action, even if so inclined. Dora may be, for example,
|
||
at home (beating her daughter?), and no longer at that computer.
|
||
The action was advocated, but other users will not be incited to
|
||
carry out the action because the act would not be possible at the
|
||
time. An information system with a chat feature, which allows
|
||
users to talk nearly instantaneously to one another, is, however,
|
||
altogether different. With such a "chat" feature, it would be
|
||
possible to make a Brandenburg incitement threat.
|
||
|
||
C. Fighting Words
|
||
|
||
Another kind of speech not given First Amendment protection
|
||
is "fighting words." Fighting words are "those which by their very
|
||
utterance inflict injury or tend to incite an immediate breach of
|
||
the peace.[FN99] In Chaplinsky v. State of New Hampshire, the court
|
||
held that fighting words (as well as lewd, obscene, profane, and
|
||
libelous language) "are no essential part of any exposition of
|
||
ideas, and are of such slight social value as a step to truth that
|
||
any benefit that may be derived from them is clearly outweighed by
|
||
the social interest in order and morality."[FN100] The court further
|
||
defined fighting words as words that have a direct tendency to
|
||
provoke acts of violence from the individual to whom the remarks
|
||
are addressed, as judged not by what the addressee believes, but
|
||
rather by what a common person of average intelligence would be
|
||
provoked into fighting.[FN101] A message posted on a bulletin board or
|
||
sent by E-mail could contain fighting words. Dora is being accused
|
||
of being a child abuser, and in the message someone offers to
|
||
sexually abuse her young daughter. There is no imminence
|
||
requirement in Chaplinsky as there is in Brandenburg.[FN102] Fighting
|
||
words can be considered delivered to the addressee when the
|
||
message is read. Dora will become enraged when she reads Sam's
|
||
message. When Sam left the message has little bearing on when Dora
|
||
will be ready to fight. While it is hard to fight with the message
|
||
sender when he or she may not be nearby or even in the same
|
||
country, that does not preclude some forms of "fighting." Of
|
||
course, if the sender of the fighting words is nearby, actual
|
||
fighting could occur. If the
|
||
--------------------------
|
||
[FN99] Chaplinsky v. State of New Hampshire, 315 U.S. 568, 572 (1942).
|
||
[FN100] Id.
|
||
[FN101] Id. at 573.
|
||
[FN102] Compare id. with 395 U.S. at 446.
|
||
======================================================================
|
||
101 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
sender of the message is on a
|
||
computer network, an angered recipient could "fight" by trying to
|
||
tamper with or otherwise damage the sender's computer account. If
|
||
Sam had written his post about Samantha Sysop instead of Dora, he
|
||
could find himself unable to access the bulletin board system, or
|
||
he may find that his copy of his master's thesis which he was word
|
||
processing is suddenly missing from his computer account.
|
||
|
||
D. Child Pornography
|
||
|
||
Other areas of content are regulated on computer information
|
||
systems. One is child pornography. New York v. Ferber[FN103] held that
|
||
states can prohibit the depiction of minors engaged in sexual
|
||
conduct. The Ferber court gave five reasons for its holding.
|
||
First, the legislative judgment, that using children as subjects
|
||
of pornography could be harmful to their physical and
|
||
psychological well-being, easily passes muster under the First
|
||
Amendment.[FN104] Second, application of the Miller standard for
|
||
obscenity (discussed infra) is not a satisfactory solution to the
|
||
problem of child pornography.[FN105] Third, the financial gain
|
||
involved in selling and advertising child pornography provides
|
||
incentive to produce such material <20> and such activity is
|
||
prohibited throughout the United States.[FN106] Fourth, the value of
|
||
permitting minors to perform/appear in lewd exhibitions is
|
||
negligible at best.[FN107] Finally, classifying child pornography as a
|
||
form of expression outside the protection of the First Amendment
|
||
is not incompatible with earlier court decisions.[FN108] The court
|
||
said, "[T]he distribution of photographs and films depicting
|
||
sexual activity by juveniles is intrinsically related to the
|
||
sexual abuse of children ..."[FN109] and is therefore within the
|
||
state's interest and power to prohibit. The Federal government has
|
||
explicitly addressed child pornography as it pertains to computer
|
||
communication.[FN110] Section 2252 of Title 18 of the U.S. Code
|
||
forbids knowing foreign or interstate transportation or reception
|
||
by any means
|
||
--------------------------
|
||
[FN103] New York v. Ferber, 458 U.S. 747 (1982).
|
||
[FN104] Id. at 756-57 (citing Globe Newspaper Co. v. Superior Court,
|
||
457 U.S. 596, 607 (1982)).
|
||
[FN105] Id. at 759 (citing Miller v. California, 413 U.S. 15, reh'g
|
||
denied, 414 U.S. 881 (1973)).
|
||
[FN106] Id. at 761.
|
||
[FN107] Id. at 762.
|
||
[FN108] Id. at 763.
|
||
[FN109] Id. at 759.
|
||
[FN110] See 18 U.S.C. <20> 2252 (1978).
|
||
======================================================================
|
||
102 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
including, for example, visual depictions of minors
|
||
engaged in sexually explicit conduct which have been converted
|
||
into a computer-readable form.[FN111] Pictures are easily converted
|
||
into a computer-readable form. Once in such a form, they can be
|
||
distributed, interstate, over a computer information system.
|
||
Pictures are put into a computer by a process called "scanning" or
|
||
"digitizing."[FN112] Scanning is accomplished by dividing a picture up
|
||
into little tiny elements called pixels.[FN113] The equivalent can be
|
||
seen by looking very closely at a television screen or at a
|
||
photograph printed in a newspaper. The computer examines each of
|
||
these dots, or pixels, and measures its brightness; the computer
|
||
does this with every pixel. The picture is then represented by a
|
||
series of numbers that correspond to the brightness and location
|
||
of each pixel. These numbers can be stored as a file for access on
|
||
a bulletin board system or file server or can be transferred over
|
||
a network.[FN114]
|
||
Computers do not differentiate between "innocuous" pictures
|
||
and pictures that are pornographic. A piece of child pornography
|
||
can be scanned and distributed by file server, bulletin board, or
|
||
through E-mail just like any other computer file. If Sam Slammer
|
||
had received a response from someone interested in seeing the
|
||
pictures of the last time he had sex with a child, the pictures
|
||
could easily be scanned into a computer-readable form and
|
||
distributed over a BBS or computer network. While a computer may
|
||
not differentiate between subject matter of pictures, the law
|
||
does. Persons responsible for distributing child pornography could
|
||
be prosecuted for child abuse, and such a suit could result in
|
||
$50,000 or more in fines and damages.[FN115] If Sam Slammer did try to
|
||
distribute the pictures he made of the last time he had sex with a
|
||
minor, his distribution of those pictures over a computer
|
||
information system could result in a prosecution for child abuse.
|
||
Another issue raised by section 2252 is possession of
|
||
pornographic material. Anyone who "knowingly possesses 3 or more
|
||
books, magazines, periodicals, films, video tapes, or other matter
|
||
which contain any visual depiction [of child pornography] that has
|
||
been mailed, or has been shipped or transported in interstate or
|
||
foreign commerce, or which was produced using materials which
|
||
--------------------------
|
||
[FN111] Id. <20> 2252(a)(1).
|
||
[FN112] See Lois F. Lunin, An Overview of Electronic Image Information,
|
||
OPTICAL INFO. SYSS., May 1990.
|
||
[FN113] Id.
|
||
[FN114] Id.
|
||
[FN115] See 18 U.S.C. <20> 2255(a) (1986).
|
||
======================================================================
|
||
103 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
have been mailed or so shipped or transported, by means including
|
||
computer"[FN116] can be fined and imprisoned for up to five
|
||
years.[FN117]
|
||
While the requirement of knowledge may insulate some computer
|
||
information systems such as networks, it clearly does not protect
|
||
computer users who knowingly traffic in pornographic material
|
||
stored in computer files. Thus, if Sam were distributing
|
||
pornographic pictures in and out of his computer account, he could
|
||
be charged under section 2252 with transporting material used in
|
||
child pornography. He would probably need to be caught with three
|
||
pictures in his account at the time, but it is likely that a
|
||
prosecutor could ask a system operator to look through any back-
|
||
ups of the computer data which was in Sam's account at an earlier
|
||
time.
|
||
Typically, a system operator will make a backup copy of
|
||
all of the data stored on a computer system. This is done so that
|
||
if the computer should malfunction, the information can be
|
||
restored by use of this backup. Backups are often kept for a while
|
||
before being erased, in essence freezing all of the users'
|
||
accounts as they were at a time in the past. If pictures were also
|
||
found in the backups, a claim could be made that Sam was in
|
||
possession of these pictures as well. This would be an easy claim
|
||
to make if Sam had the ability to ask the SYSOP to recover any of
|
||
the files that are on these back-ups, but which are no longer in
|
||
his actual account. Based on the public policy against child
|
||
pornography, it is likely that an attempt would be made to hold
|
||
Sam responsible for the knowing possession of any files that were
|
||
formerly in his account that could still be recovered from the
|
||
system operator's backups of Sam's data. As to Samantha Sysop's
|
||
liability, unless she knew what was stored in Sam's account, it is
|
||
unlikely that she would be held liable for having child
|
||
pornography stored on her computer system. Section 2252, as quoted
|
||
above, contains a knowledge requirement. If Samantha Sysop did not
|
||
know what was in Sam's account, she would not meet that knowledge
|
||
requirement. If she had reason to know that Sam had pictures of
|
||
child pornography in his account, but intentionally turned her
|
||
back, she may be considered to have constructive knowledge of the
|
||
presence of the pornographic material on her system, and therefore
|
||
she could be charged with the knowing possession of the material.
|
||
It is not likely to make a difference that the material is in
|
||
Sam's account; Sam's account is still
|
||
--------------------------
|
||
[FN116] <20> 2252(a)(4)(B).
|
||
[FN117] Id. <20> 2252(b).
|
||
======================================================================
|
||
104 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
on Samantha's computer
|
||
system which she is responsible for maintaining in a legal manner.
|
||
Child pornographers, or pedophiles, may use bulletin board
|
||
systems and E-mail for more than just storing and transporting
|
||
pictures. There has been some publicity over bulletin boards being
|
||
used by pedophiles to contact each other.[FN118] Law enforcement use
|
||
of bulletin board systems to track down pedophiles has not
|
||
resulted in prosecutions of system operators, but there have been
|
||
convictions of BBS users who have arranged to make "snuff films"
|
||
through contacts they have made over a computer.[FN119]
|
||
|
||
E. Computer Crime
|
||
|
||
Some areas of "computer crime" are regulated.[FN120] Computer
|
||
crime is an issue which computer information system operators
|
||
should be aware of, as they may be on the receiving end at some
|
||
point. The term "computer crime" covers a number of offenses,[FN121]
|
||
such as: the unauthorized accessing of a computer system;[FN122] the
|
||
unauthorized accessing of a computer to gain certain kinds of
|
||
information (such as defense information or financial records);[FN123]
|
||
accessing a computer and removing, damaging, or preventing access
|
||
to data without authorization;[FN124] trafficking in stolen computer
|
||
passwords;[FN125] spreading computer viruses;[FN126] and a number of
|
||
other related offenses.[FN127] All of these are activities which are
|
||
often referred to as "hacking."[FN128]
|
||
--------------------------
|
||
[FN118] See, Jim Doyle, FBI Probing Child Porn On Computers: Fremont
|
||
Man Complains of Illicit Mail, SAN FRANCISCO CHRON., Dec. 5, 1991 at
|
||
A23. See also, Robert F. Howe, Va. Man Pleads Guilty in Child Sex
|
||
Film Plot; Computer Ads Led to Youth Volunteer's Arrest, WASH.
|
||
POST., Nov. 30, 1989, at C1.; Robert L. Jackson, Child Molesters
|
||
Use Electronic Networks; Computer-Crime Sleuths Go Undercover,
|
||
L.A. TIMES, Oct. 1, 1989, at 20.
|
||
[FN119] See United States v. Lambey, 949 F.2d 133 (1991).
|
||
[FN120] Note, Addressing the New Hazards of the High Technology
|
||
Workplace, 104 HARV. L. REV. 1898, 1913 (1991).
|
||
[FN121] Id. at 1898.
|
||
[FN122] See 949 F.2d 133; Jensen, supra note 7, at 222.
|
||
[FN123] See 949 F.2d 133; Note, supra note 120, at 1898; Jensen, supra
|
||
note 7, at 222.
|
||
[FN124] See 949 F.2d 133; Note, supra note 120, at 1898; Jensen supra
|
||
note 7, at 222.
|
||
[FN125] Note, supra note 120, at 1899; Jensen, supra note 7, at 222.
|
||
[FN126] See United States v. Morris, 928 F.2d 505 (2d Cir.), cert.
|
||
denied, 112 S. Ct. 72 (1991).
|
||
[FN127] Jensen, supra note 7, at 222.
|
||
[FN128] Id.
|
||
======================================================================
|
||
105 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
F. Computer Fraud
|
||
|
||
The first federal computer crime law, entitled the
|
||
Counterfeit Access Device and Computer Fraud and Abuse Act of
|
||
1984, was passed in October of 1984.[FN129]
|
||
|
||
[T]he Act made it a felony knowingly to access a computer
|
||
without authorization, or in excess of authorization, in
|
||
order to obtain classified United States defense or foreign
|
||
relations information with the intent or reason to believe
|
||
that such information would be used to harm the United States
|
||
or to advantage a foreign nation.[FN130]
|
||
|
||
Access to obtain information from financial records of a financial
|
||
institution or in a consumer file of a credit reporting agency was
|
||
also outlawed.[Fn131] Access to use, destroy, modify or disclose
|
||
information found in a computer system, (as well as to prevent
|
||
authorized use of any computer used for government business if
|
||
such a use would interfere with the government's use of the
|
||
computer) was also made illegal.[FN132] The 1984 Act had several
|
||
shortcomings, and was revised in The Computer Fraud and Abuse Act
|
||
of 1986.[FN133] The 1986 Act added three new crimes <20> a computer fraud
|
||
offense,[FN134] modeled after federal mail and wire fraud
|
||
statutes;[FN135]
|
||
an offense for the alteration, damage or destruction of
|
||
information contained in a "federal interest computer;"[FN136] and an
|
||
offense for trafficking in computer passwords under some
|
||
circumstances.[FN137]
|
||
This Computer Fraud and Abuse Act presents a powerful weapon
|
||
for SYSOPs whose computers have been violated by hackers. It was
|
||
made even more powerful by the first person charged with its
|
||
violation.[Fn138] Robert T. Morris Jr. was charged with releasing a
|
||
"worm" onto a section of the Internet computer network,[FN139] causing
|
||
numerous government and university computers to either
|
||
--------------------------
|
||
[FN129] Dodd S. Griffith, The Computer Fraud and Abuse Act of 1986: A
|
||
Measured Response to a Growing Problem, 43 VAND. L. REV. 453, 455
|
||
(1990).
|
||
[FN130] Id. at 460.
|
||
[FN131] Id.
|
||
[FN132] Id.
|
||
[FN133] The Computer Fraud and Abuse Act of 1986, 18 U.S.C. <20> 1030
|
||
(1988).
|
||
[FN134] Griffith, supra note 129, at 474.
|
||
[FN135] Id.
|
||
[FN136] Id.
|
||
[FN137] Id.
|
||
[FN138] United States v. Morris, 928 F.2d 504 (2d Cir.), cert. denied,
|
||
112 S. Ct. 72 (1991).
|
||
[FN139] Id.; Nicholas Martin, Revenge of the Nerds; The Real Problem
|
||
with Computer Viruses Isn't Genius Programmers, It's Careless
|
||
Ones, PSYCHOL. TODAY, Jan. 1989, at 21.
|
||
======================================================================
|
||
106 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
"crash" or become "catatonic."[FN140] Morris is the son of the Chief
|
||
Scientist at the National Security Agency's National Computer Security
|
||
Center.[FN141] His father is also a former researcher at AT&T's Bell
|
||
Laboratories where he worked on the original UNIX operating
|
||
system.[FN142] UNIX is the operating system that many mainframe
|
||
computers use. Morris claims that the purpose of his worm program
|
||
was to demonstrate security defects and the inadequacies of
|
||
network security, not to cause harm.[FN143] However, due to a small
|
||
error in his worm program, it got out of control and caused
|
||
numerous computers to require maintenance to eliminate the worm at
|
||
costs ranging from $200 to $53,000.[FN144] District Judge Munson read
|
||
the Computer Fraud and Abuse Act largely as defining a strict
|
||
liability crime. The relevant language applies to someone who:
|
||
|
||
(5) intentionally accesses a Federal interest computer
|
||
without authorization, and by means of one or more
|
||
instances of such conduct alters, damages, or destroys
|
||
information in any such Federal interest computer, or
|
||
prevents authorized use of any such computer or
|
||
information, and thereby -
|
||
|
||
(A) causes loss ... of a value aggregating
|
||
$1,000 or more ....[FN145]
|
||
|
||
Judge Munson's interpretation is that this language requires
|
||
intent only to access the computer, not intent to cause actual
|
||
damage.[FN146] On appeal, Munson's reading was affirmed by the Court
|
||
of Appeals,[FN147] and the Supreme Court refused to hear further
|
||
appeals.[FN148]
|
||
Morris' lawyer, Thomas Guidoboni, described the statute as
|
||
"perilously vague" because it treats intruders who do not cause
|
||
any harm just as severely as computer terrorists.[FN149] While the
|
||
Judge's interpretation of the statute makes it a more powerful
|
||
weapon in a prosecutor's corner, Guidoboni argues that Munson's
|
||
interpretation violates the sense of fairness that underlies the
|
||
U.S.
|
||
--------------------------
|
||
[FN140] 928 F.2d. at 506.
|
||
[FN141] Robin Nelson, Viruses, Pests, and Politics: State of the Art,
|
||
20 COMPUTER & COMM. DECISIONS, Dec. 1989, at 40, 40.
|
||
[FN142] Id.
|
||
[FN143] 928 F.2d. at 504.
|
||
[FN144] Id. at 506.
|
||
[FN145] 18 U.S.C. <20> 1030(a)(5)(A).
|
||
[FN146] 928 F.2d at 506-07.
|
||
[FN147] 328 F2d. 504 (1991).
|
||
[FN148] 112 S. Ct. at 72.
|
||
[FN149] Thomas A. Guidoboni, What's Wrong with the Computer Crime
|
||
Statute?; Defense and Prosecution Agree the 1986 Computer Fraud
|
||
and Abuse Act is Flawed but Differ on How to Fix It, COMPUTERWORLD,
|
||
Feb. 17, 1992, at 33, 33.
|
||
======================================================================
|
||
107 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
criminal justice system, which almost always differentiates
|
||
between people who intend to cause harm and those who do not.[FN150]
|
||
No one seems to argue that what Morris did was right, but many do
|
||
not agree that he should be charged with a felony although he was
|
||
convicted.[FN151]
|
||
The jury in the Morris case indicated that the most difficult
|
||
question was whether Morris' access to the Internet was
|
||
unauthorized even though defense counsel pointed out that 2
|
||
million subscribers had the same access.[FN152] The jury's difficulty
|
||
in resolving this issue is indicative of a lack of understanding
|
||
of how computer networks work.[FN153]
|
||
|
||
G. Unauthorized Use of Communications Services
|
||
|
||
One of the favorite targets of computer hackers is the
|
||
telephone company. Telephone systems are susceptible to computer
|
||
hackers' illegal use. By breaking into the telephone company's
|
||
computer, hackers can then place free long distance calls to other
|
||
computers.[FN154] They can also break into telephone companies'
|
||
computers and get lists of telephone credit card numbers.[FN155]
|
||
Trafficking of stolen credit card numbers and other kinds of
|
||
telecommunications fraud costs long distance carriers about $1.2
|
||
billion annually.[FN156] Distribution of fraudulently procured long
|
||
distance codes is often accomplished over bulletin board systems,
|
||
or by publication in electronic journals put out by hackers over
|
||
computer networks.[FN157] The major protection for the telephone
|
||
companies is found in section 1343 of the Mail Fraud Chapter of
|
||
the U.S. Code.[FN158] This section prohibits the use of wires, radio
|
||
or television in order to fraudulently deprive a party of money or
|
||
--------------------------
|
||
[FN150] Id.
|
||
[FN151] Mike Godwin, Editorial: Amendments Would Undue Damage of Morris
|
||
Decision, EFFECTOR ONLINE, Oct. 18, 1991, available over Internet,
|
||
by anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation).
|
||
[FN152] David F. Geneson, Recent Developments in the Investigation and
|
||
Prosecution of Computer Crime, 301 PLI/Pat 45, at 2. The
|
||
difficulty arises from the fact that Morris had authorized access
|
||
to some computers but not others, presenting the question whether
|
||
Morris' actions amounted to unauthorized access or whether his
|
||
actions exceeded authorized access. 928 F.2d at 510.
|
||
[FN153] Geneson, supra note 152, at 2.
|
||
[FN154] Cindy Skrzycki, Thieves Tap Phone Access Codes to Ring Up
|
||
Illegal Calls, WASH. POST, Sept. 2, 1991, <20> 1 at A1.
|
||
[FN155] Id.
|
||
[FN156] Id.
|
||
[FN157] Id.
|
||
[FN158] Fraud by Wire, Radio, or Television, 18 U.S.C. <20> 1343 (1992).
|
||
======================================================================
|
||
108 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
property.[FN159] This statute has been held to include fraudulent use
|
||
of telephone services.[FN160] Presumably, this statute may also cover
|
||
fraudulent theft of computer services when the computer is
|
||
accessed by wire. Computer information systems that knowingly
|
||
distribute information aiding in wire fraud could be charged with
|
||
conspiracy to violate section 1346 of the Mail Fraud Chapter,[FN161]
|
||
which specifically covers schemes to defraud.[FN162] Some state laws
|
||
exist to punish theft of local telephone service or publication of
|
||
telephone access codes.[FN163]
|
||
|
||
H. Viruses
|
||
|
||
As pointed out in the introduction, computer viruses are
|
||
increasingly of concern <20> both for operators of computer
|
||
information systems, as well as for users of the systems. But what
|
||
is a virus? A virus refers to any sort of destructive computer
|
||
program, though the term is usually reserved for the most
|
||
dangerous ones.[FN164] Computer virus crime involves an intent to
|
||
cause damage, "akin to vandalism on a small scale, or terrorism on
|
||
a grand scale."[FN165] Viruses can spread through networked computers
|
||
or by sharing disks between computers.[FN166] Viruses cause damage by
|
||
either attacking another file or by simply filling up the
|
||
computer's memory or by using up the computer's processor
|
||
power.[FN167] There are a number of different types of viruses, but
|
||
one of the factors common to most of them is that they all copy
|
||
themselves (or parts of themselves).[FN168] Viruses are, in essence,
|
||
self-replicating.
|
||
Also discussed earlier was a "pseudo-virus," called a worm.
|
||
People in the computer industry do not agree on the distinctions
|
||
between worms and viruses.[FN169] Regardless, a worm is a program
|
||
--------------------------
|
||
[FN159] Id.
|
||
[FN160] See, e.g., Brandon v. United States, 382 F.2d 607 (10th Cir.
|
||
1967).
|
||
[FN161] 18 U.S.C. <20> 1346.
|
||
[FN162] Id.
|
||
[FN163] See, e.g., State v. Northwest Passage, Inc., 585 P.2d 794
|
||
(Wash. 1978) (en banc).
|
||
[FN164] See, e.g., Daniel J. Kluth, The Computer Virus Threat: A Survey
|
||
of Current Criminal Statutes, 13 HAMLINE L. REV. 297 (1990).
|
||
[FN165] Id.
|
||
[FN166] David R. Johnson et al., Computer Viruses: Legal and Policy
|
||
Issues Facing Colleges and Universities. 54 EDUC. L. REP. (West)
|
||
761 (Sept. 14, 1989).
|
||
[FN167] Id. at 762.
|
||
[FN168] Id.
|
||
[FN169] Eric Allman, Worming My Way; November 1988 Internet Worm, UNIX
|
||
REV., January 1989, at 74.
|
||
======================================================================
|
||
109 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
specifically designed to move through networks.[FN170] A worm may have
|
||
constructive purposes, such as to find machines with free
|
||
resources that could be more efficiently used, but usually a worm
|
||
is used to disable or slow down computers. More specifically,
|
||
worms are defined as, "computer virus programs ... [which]
|
||
propagate on a computer network without the aid of an unwitting
|
||
human accomplice. These programs move of their own volition based
|
||
upon stored knowledge of the network structure."[FN171]
|
||
Another type of virus is the "Trojan Horse."[FN172] These are
|
||
viruses which hide inside another seemingly harmless program.[FN173]
|
||
Once the Trojan Horse program is used on the computer system, the
|
||
virus spreads.[FN174] The virus type which has gained the most fame
|
||
recently has been the Time Bomb, which is a delayed action virus
|
||
of some type.[FN175] This type of virus has gained notoriety as a
|
||
result of the Michelangelo virus. A virus designed to erase the
|
||
hard drives of people using IBM compatible computers on the
|
||
artist's birthday, Michelangelo was so prevalent, it was even
|
||
distributed accidentally by some software publishers when the
|
||
software developers' computers became infected.[FN176]
|
||
One concern many have about statutes dealing with computer
|
||
viruses is the problem that the statutes need some kind of intent
|
||
requirement.[FN177] Without some sort of intent requirement, virus
|
||
statutes may be sufficiently overbroad so as to cover defective
|
||
computer programs.[FN178]
|
||
What legal remedies are available for virus attacks?
|
||
Distributing a virus affecting computers used substantially by the
|
||
government or financial institutions is a federal crime under the
|
||
Computer Fraud and Abuse Act.[FN179] If a virus also involves
|
||
unauthorized access to an electronic communications system
|
||
involving interstate commerce, the Electronic Communications
|
||
Privacy Act may come into play.[FN180] Most states have statutes that
|
||
make it a crime to
|
||
--------------------------
|
||
[FN170] Kluth, supra note 164, at 298.
|
||
[FN171] Id. at note 14.
|
||
[FN172] See Stover, supra note 32.
|
||
[FN173] Id.
|
||
[FN174] Kluth, supra note 164, at 298.
|
||
[FN175] See Stover, supra note 32.
|
||
[FN176] Electronic Mail Software Provider Reports Virus Contamination,
|
||
UPI, Feb. 3, 1992, available in LEXIS, Nexis Library, UPI File.
|
||
[FN177] See Kluth, supra note 164.
|
||
[FN178] Id.
|
||
[FN179] 18 U.S.C. <20> 1030 (1984).
|
||
[FN180] Electronic Communications Privacy Act of 1986, 18 U.S.C. <20>2510
|
||
(1984).
|
||
======================================================================
|
||
110 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
intentionally interfere with a computer
|
||
system.[FN181] These statutes will often cover viruses as well as
|
||
other forms of computer crime. State statutes generally work by
|
||
affecting any of ten different areas:[FN182]
|
||
1. Expanded definitions of "property" to include computer
|
||
data.[FN183]
|
||
2. Prohibiting unlawful destruction of computer files.[FN184]
|
||
3. Prohibiting use of a computer to commit, aid or abet
|
||
commission of a crime.[FN185]
|
||
4. Creating crimes against intellectual property.[FN186]
|
||
5. Prohibiting knowing or unauthorized use of a computer or
|
||
computer services.[FN187]
|
||
6. Prohibiting unauthorized copying of computer data.[FN188]
|
||
7. Prohibiting the prevention of authorized use.[FN189]
|
||
8. Prohibiting unlawful insertion of material into a computer
|
||
or network.[FN190]
|
||
9. Creating crimes like "Voyeurism"<22> Unauthorized entry into
|
||
a computer system just to see what is there.[FN191]
|
||
10. "Taking possession" of or exerting control of a computer
|
||
or software.[FN192]
|
||
SYSOPs must also worry about being liable to their users as a
|
||
result of viruses which cause a disruption in service. Service
|
||
outages caused by viruses or by shutdowns to prevent the spreading
|
||
of viruses could result in a breach of contract where continual
|
||
service is guaranteed; however, contract provisions could provide
|
||
for excuse or deferral of obligation in the event of disruption of
|
||
service by a virus.
|
||
Similarly, SYSOPs are open to tort suits caused by negligent
|
||
virus control.[FN193] "[A SYSOP] might still be found liable on the
|
||
--------------------------
|
||
[FN181] Johnson et al., supra note 166, at 764. See Anne W. Branscomb,
|
||
Rogue Computer Programs and Computer Rogues: Tailoring the
|
||
Punishment to Fit the Crime, 16 RUTGERS COMPUTER TECH. L.J. 1, 30-31,
|
||
61 (1990).
|
||
[FN182] Branscomb, supra note 181, at 32.
|
||
[FN183] Id.
|
||
[FN184] Id. at 33.
|
||
[FN185] Id.
|
||
[FN186] Id. at 34.
|
||
[FN187] Id.
|
||
[FN188] Id. at 35.
|
||
[FN189] Id.
|
||
[FN190] Id.
|
||
[FN191] Id. at 36.
|
||
[FN192] Id. at 37.
|
||
[FN193] See Johnson et al., supra, note 166, at 764, 766.
|
||
======================================================================
|
||
111 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
ground that, in its role as operator of a computer system or
|
||
network, it failed to use due care to prevent foreseeable damage,
|
||
to warn of potential dangers, or to take reasonable steps to limit
|
||
or control the damage once the dangers were realized."[FN194] The
|
||
nature of "care" still has not been defined by court or
|
||
statute.[FN195] But still, it is likely that a court would find that a
|
||
provider is liable for failure to take precautions against viruses
|
||
when precautions are likely to be needed. SYSOPs are also likely
|
||
to be held liable for not treating files they know are infected.
|
||
Taking precautions against viruses would be likely to reduce the
|
||
chances or degree of liability.
|
||
|
||
I. Protection from Hackers
|
||
|
||
System Operators need to worry about damage caused by hackers
|
||
as well as damage caused by viruses. While hackers are liable for
|
||
the damage they cause, SYSOPs may find themselves on the receiving
|
||
end of a tort suit for being negligent in securing their computer
|
||
information system. For a SYSOP to be found negligent, there must
|
||
first be a duty of care to the user who is injured by the
|
||
hacker.[FN196] There must then be a breach of that duty[FN197] <20> the
|
||
SYSOP must display conduct "which falls below the standard established
|
||
by law for the protection of others against unreasonable risk of
|
||
harm."[FN198] Simply put, the SYSOP must do what is generally expected
|
||
of someone in his or her position in order to protect users from
|
||
problems a normal user would expect to be protected against.
|
||
Events that the SYSOP could not have prevented <20> or foreseen and
|
||
planned for <20> will not result in liability.[FN199] A SYSOP's duty "may
|
||
be defined as a duty to select and implement security provisions,
|
||
to monitor their effectiveness, and to maintain the provisions in
|
||
accordance with changing security needs."[FN200] SYSOPs should be
|
||
aware of the type of information stored in their systems, what
|
||
kind of security is needed for the services they provide, and what
|
||
users are authorized to use what data and which services.
|
||
--------------------------
|
||
[FN194] Id. at 766.
|
||
[FN195] Id.
|
||
[FN196] W. PAGE KEETON ET AL., PROSSER AND KEETON ON THE LAW OF TORTS
|
||
<EFBFBD>30(1), at 164 (5th ed. 1984).
|
||
[FN197] Id. <20> 30(2), at 164.
|
||
[FN198] Id. <20> 31, at 169.
|
||
[FN199] Id. <20> 29, at 162.
|
||
[FN200] Cheryl S. Massingale & A. Faye Borthick, Risk Allocation for
|
||
Computer System Security Breaches: Potential Liability for
|
||
Providers of Computer Services, 12 W. NEW ENG. L. REV. 167, 187
|
||
(1990).
|
||
======================================================================
|
||
112 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
SYSOPs also have a duty to explain to each user the extent of his or her
|
||
authorization to use the computer information service.[FN201]
|
||
The same analysis applies to operator-caused problems. If the
|
||
SYSOP accidentally deletes data belonging to a user or negligently
|
||
maintains the computer system, resulting in damage, he or she
|
||
would be liable to the user to the same extent as he or she would
|
||
be from hacker damage that occurred due to negligence.
|
||
|
||
IV. Privacy
|
||
|
||
Privacy has been a concern of computer information system
|
||
providers from the very beginning. With the speed, power,
|
||
accessibility, and storage capacity provided by computers comes
|
||
tremendous potential to infringe on people's privacy. It is
|
||
imperative that users of services such as electronic mail
|
||
understand how these services work, i.e., how private the users'
|
||
communications really are, and who may have access to the users'
|
||
"personal" E-mail. The same is true for stored computer files.
|
||
Just as importantly, System Operators should be aware of what
|
||
restrictions and requirements exist to maintain users' privacy
|
||
expectations.
|
||
|
||
A. Pre-Electronic Communications Privacy Act of 1986
|
||
|
||
One of the most significant cases establishing privacy for
|
||
electronic communications is Katz v. United States.[FN202] Katz
|
||
involved the use of an electronic listening device (or "bug")
|
||
mounted on the outside of a public telephone booth.[FN203] The
|
||
government (who placed the bug) assumed that, because the bug did
|
||
not actually penetrate the walls of the booth, and was not
|
||
actually a "wire tap," there was no invasion of privacy.[FN204]
|
||
However, Defendant argued that the bug was an unlawful search and
|
||
seizure in violation of the Fourth Amendment.[FN205] The court held
|
||
that "the Fourth Amendment protects people, not places. What a
|
||
person knowingly exposes to the public, even in his own home or
|
||
office, is not a subject of Fourth Amendment protection.
|
||
[citations omitted] But what he seeks to preserve as private, even
|
||
in an area accessible to the public, may be constitu-
|
||
--------------------------
|
||
[FN201] Id. at 188-89.
|
||
[FN202] Katz v. United States, 389 U.S. 347 (1967).
|
||
[FN203] Id. at 348.
|
||
[FN204] Id. at 351.
|
||
[FN205] Id.
|
||
======================================================================
|
||
113 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
tionally protected."[FN206] The decision in this case is also understood
|
||
to say that if a person does not have a reasonable expectation of
|
||
privacy, there is, in fact, no Fourth Amendment protection.[FN207] The
|
||
person must have a subjective expectation of privacy, and to be
|
||
reasonable, it must be an expectation that society is willing to
|
||
recognize as reasonable.[FN208] For example, most people have a
|
||
reasonable expectation that calls made from inside a closed
|
||
telephone booth will be private. For computer users, this means
|
||
that, because the computer operator has control over the system
|
||
and can read any messages, the user cannot reasonably protect his
|
||
or her privacy. If there is no reasonable expectation of privacy,
|
||
there can be no violation of privacy, and, therefore, no Fourth
|
||
Amendment claim.[FN209]
|
||
Statutory protection of the right to privacy was originally
|
||
provided by the Federal Wiretap Statute.[FN210] However, this statute
|
||
affected only "wire communication," which is limited to "aural
|
||
[voice] acquisition."[FN211] In United States v. Seidlitz,[FN212] the
|
||
court held that interception of computer transmission is not an
|
||
"aural acquisition" and, therefore, the Wiretap Act did not
|
||
provide protection.[FN213] Even if the Act did cover transmission, it
|
||
still does not cover stored computer data.[FN214] This does not result
|
||
in significant or comprehensive protection of E-mail or stored
|
||
data.
|
||
|
||
B. Electronic Communications Privacy Act of 1986
|
||
|
||
Prior to the passage of the Electronic Communications
|
||
Privacy Act, communications between two persons were
|
||
subject to widely disparate legal treatment depending on
|
||
whether the message was carried by regular mail,
|
||
electronic mail, an analog phone line, a cellular phone,
|
||
or some other form of electronic communication system.
|
||
This technology-dependent legal approach turned the
|
||
Fourth Amend-
|
||
--------------------------
|
||
[FN206] Id.
|
||
[FN207] See, e.g., Oliver v. U.S. 466 U.S. 170 (1984).
|
||
[FN208] See 389 U.S. at 347; see also California v. Ciraolo 476 U.S.
|
||
207, reh'g denied, 478 U.S. 1014 (1986).
|
||
[FN209] See Ruel Hernandez, Computer Electronic Mail and Privacy,
|
||
available over Internet, by anonymous FTP, at FTP.EFF.ORG
|
||
(Electronic Frontier Foundation).
|
||
[FN210] 18 U.S.C. <20> 2510 (1968).
|
||
[FN211] See Hernandez, supra note 209.
|
||
[FN212] United States v. Seidlitz, 589 F.2d 152 (4th Cir. 1978), cert.
|
||
denied, 441 U.S. 922 (1979).
|
||
[FN213] Id. at 157.
|
||
[FN214] See Hernandez, supra note 209.
|
||
======================================================================
|
||
114 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
ment's protection on its head. The Supreme
|
||
Court had said that the Constitution protects people,
|
||
not places, but the Wiretap Act did not adequately
|
||
protect all personal communications; rather, it extended
|
||
legal protection only to communications carried by some
|
||
technologies.[FN215]
|
||
|
||
The Federal Wiretap Act was updated by the Electronic
|
||
Communications Privacy Act of 1986.[FN216] The Electronic
|
||
Communications Privacy Act deals specifically with the
|
||
interception and disclosure of interstate[FN217] electronic
|
||
communications[FN218], and functions as the major sword and shield
|
||
protecting E-mail. It works both to guarantee the privacy of E-
|
||
mail and also to provide an outlet for prosecuting anyone who will
|
||
not respect that privacy. The statute provides in part that "any
|
||
person who (a) intentionally intercepts, endeavors to intercept,
|
||
or procures any other person to intercept or endeavor to intercept
|
||
any wire, oral, or electronic communication"[FN219] shall be fined or
|
||
imprisoned.[FN220] The intentional disclosure or use of the contents
|
||
of any wire, oral, or electronic communication that is known or
|
||
could reasonably be known to have been intercepted in violation of
|
||
the statute is prohibited.[FN221] This largely guarantees the privacy
|
||
of E-mail as well as data transfers over a network or telephone
|
||
line going to or from a computer information system. In essence,
|
||
E-mail cannot legally be read except by the sender or the receiver
|
||
even if someone else actually intercepted the message. Further
|
||
disclosure or use of the message contents by any party, other than
|
||
the message sender and its intended recipient, is prohibited if
|
||
the intercepting party knows or has reason to know that the
|
||
message was illegally intercepted.
|
||
Section 2 of the Electronic Communications Privacy Act[FN222]
|
||
provides an exception for SYSOPs and their employees to the extent
|
||
necessary to manage properly the computer information system:
|
||
|
||
It shall not be unlawful under this chapter for an
|
||
operator of a switchboard, or an officer, employee, or
|
||
agent of a provider of wire or electronic communication
|
||
service, whose facilities are used in the transmission
|
||
of a wire communication, to intercept, disclose, or use
|
||
--------------------------
|
||
[FN215] Robert W. Kastenmeier et al., supra note 8, at 720 (citations
|
||
omitted).
|
||
[FN216] Electronic Communications Privacy Act of 1986, 18 U.S.C. <20>2510
|
||
(1968).
|
||
[FN217] Id. <20> 2510(12).
|
||
[FN218] 18 U.S.C. <20> 2511.
|
||
[FN219] Id. <20> 2511(1)(a).
|
||
[FN220] Id. <20> 2511(4).
|
||
[FN221] Id. <20> 2511(1)(c).
|
||
[FN222] Id. <20> 2511(2)(a)(i).
|
||
======================================================================
|
||
115 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
that communication in the normal course of his
|
||
employment while engaged in any activity which is a
|
||
necessary incident to the rendition of his service or to
|
||
the protection of rights or property of the provider of
|
||
that service, except that a provider of wire
|
||
communication service to the public shall not utilize
|
||
service observing or random monitoring except for
|
||
mechanical or service quality control checks.[FN223]
|
||
|
||
"Electronic Communication System" is defined as "any wire, radio,
|
||
electromagnetic, photooptical or photoelectronic facilities for
|
||
the transmission of electronic communications, and any computer
|
||
facilities or related electronic equipment for the electronic
|
||
storage of such communications."[FN224] Further exceptions are made
|
||
for SYSOPs of these systems when the originator or addressee of
|
||
the message gives consent;[FN225] when the message is being given to
|
||
another service provider to be further forwarded towards its
|
||
destination;[FN226] where the message is inadvertently obtained by the
|
||
SYSOP; and appears to pertain to a crime;[FN227] when the divulgence
|
||
is being made to a law enforcement agency;[FN228] or where the message
|
||
is configured so as to be readily accessible to the public.[FN229] It
|
||
is worth noting that this section also applies to broadcast
|
||
communications, as long as they are in a form not readily
|
||
accessible to the general public (with some exceptions).[FN230] This
|
||
will probably cover the up-and-coming technologies of radio-WANS
|
||
(Wide Area Networks<6B>computer networks which link computers by
|
||
radio transmission rather than wires), and also packet radio.
|
||
These technologies are especially likely to be covered by the
|
||
statute if data is transmitted using some sort of encryption
|
||
scheme.[FN231]
|
||
For law enforcement agencies to intercept electronic
|
||
communications, they must first obtain a search warrant by
|
||
following the procedure laid out in section 2518 of this Act.[FN232]
|
||
The statute does not prohibit the use of pen registers or trap and
|
||
trace devices.[FN233] The
|
||
--------------------------
|
||
[FN223] Id.
|
||
[FN224] Id. <20> 2510(14).
|
||
[FN225] Id. <20> 2511(3)(b)(ii).
|
||
[FN226] Id. <20> 2511(3)(b)(iii).
|
||
[FN227] Id. <20> 2511(3)(b)(iv).
|
||
[FN228] Id. <20> 2511(3)(b)(iv).
|
||
[FN229] Id. <20> 2511(3)(b)(i).
|
||
[FN230] Id. <20> 2511.
|
||
[FN231] Encryption is in essence a coding of the data so it cannot be
|
||
understood by anyone without the equipment or knowledge necessary
|
||
to decode the transmission.
|
||
[FN232] 18 U.S.C. <20> 2518 (1968).
|
||
[FN233] Id. <20> 2511(2)(h)(i). A pen register is a device which records
|
||
the telephone numbers called from a specific telephone; a trap and
|
||
trace device records the phone originating calls to a specific
|
||
telephone.
|
||
======================================================================
|
||
116 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
warrant requirement makes it harder for law
|
||
enforcement officials to get at the contents of the
|
||
communications, but does not substantially impede efforts to find
|
||
out who is calling the computer information system.
|
||
|
||
C. Access to Stored Communications
|
||
|
||
Section 2511 of the Electronic Communications Privacy Act
|
||
concerns the interception of computer communications. Section 2701
|
||
of the Act prohibits unlawful access to communications which are
|
||
being stored on a computer.[FN234] The section reads, in part,
|
||
"whoever -- (1) intentionally accesses without authorization a
|
||
facility through which an electronic communication service is
|
||
provided; or (2) intentionally exceeds an authorization to access
|
||
that facility; and thereby obtains, alters, or prevents authorized
|
||
access to a wire or electronic communication while it is in
|
||
electronic storage in such system"[FN235] shall be subject to fines
|
||
and/or imprisonment, or both.[FN236] Like section 2511, this section
|
||
includes provisions prohibiting the divulgence of the stored
|
||
messages.[FN237] Importantly, while this statute allows law
|
||
enforcement agencies to gain access to stored communications,
|
||
subject to a valid search warrant,[FN238] it does specifically allow
|
||
the government to permit the system operator to first make backup
|
||
copies of stored computer data, so that the electronic
|
||
communications may be preserved for use outside of the
|
||
investigation.[FN239] Such a statute is needed because the government
|
||
often takes the stored data to sort through during the course of
|
||
its investigation, as was the case in Steve Jackson Games, Inc. v.
|
||
United States Secret Service.[FN240] In this case, the Secret Service
|
||
raided a publisher and seized its bulletin board system,
|
||
electronic mail and all. The court held that the government had to
|
||
go through the procedures established by section 2701 et seq.,
|
||
covering stored wire and electronic communications, in order to
|
||
discover
|
||
--------------------------
|
||
[FN234] Id. <20> 2701.
|
||
[FN235] Id. <20> 2701(a).
|
||
[FN236] Id. <20> 2701(b).
|
||
[FN237] Id. <20> 2702.
|
||
[FN238] See id. <20> 2703.
|
||
[FN239] Id. <20> 2703(a)
|
||
[FN240] Steve Jackson Games, Inc. v. United States Secret Serv., 816
|
||
F. Supp. 432 (W.D. TEX. 1993).
|
||
======================================================================
|
||
117 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
properly the contents of the electronic mail on the
|
||
BBS.[FN241] The court said that the evidence of good faith reliance
|
||
on what the Secret Service believed to be a valid search warrant
|
||
was insufficient.[FN242] The government knew that the computer had
|
||
private electronic communications stored on it, and therefore the
|
||
only means they could legally use to gain access to those
|
||
communications was by compliance with the Act, and not by seizing
|
||
the BBS.[FN243]
|
||
The Steve Jackson Games Case was also valuable for showing
|
||
the interplay between protection against interception of
|
||
electronic communication[FN244] and access to stored
|
||
communication.[FN245] Judge Sparks held, in essence, that taking a
|
||
whole computer is not an "interception" as contemplated by section
|
||
2510 et seq., especially in light of the protection of stored
|
||
communication by section 1701 et seq. He analogized the situation
|
||
to the seizure of a tape recording of a telephone conversation and
|
||
said that the "aural acquisition" occurs when the tape is made,
|
||
not each time the tape is played back by the police.[FN246] This
|
||
interpretation of an intellectually complex concept[FN247] makes
|
||
sense when the two code sections are read together.
|
||
|
||
D. An Apparent Exception for Federal Records
|
||
|
||
A recent case presents an apparent exception to the
|
||
Electronic Communications Privacy Act.[FN248] In Armstrong v.
|
||
Executive Office of the President,[FN249] while not mentioning the
|
||
Electronic Communications Privacy Act, the court required certain
|
||
electronic mail and stored data to be saved and made available for
|
||
the National Archives.[FN250] While electronic communications are
|
||
normally
|
||
--------------------------
|
||
[FN241] Id. at 434.
|
||
[FN242] Id. at 443.
|
||
[FN243] Id. at 442-43.
|
||
[FN244] Id.; 18 U.S.C. <20> 2510.
|
||
[FN245] 816 F. Supp. at 442-43.
|
||
[FN246] 816 F. Supp. at 441-42; 18 U.S.C. <20> 2701.
|
||
[FN247] Stored communications may be intercepted in some sense because
|
||
the message writer may have sent the E-mail, but it has not yet
|
||
been read by the recipient. Also, messages being sent from one BBS
|
||
user to another on bulletin board systems which support multiple
|
||
users simultaneously may never be stored on the computer. By
|
||
reading the two sections as complimentary, the complexities should
|
||
be accounted for - communications not covered by <20> 2510 should be
|
||
covered by <20> 2701 and vise versa.
|
||
[FN248] See 18 U.S.C. <20> 2511 (1968).
|
||
[FN249] Armstrong v. Executive Office of the President, 810 F. Supp
|
||
335 (D.C. Cir. 1993).
|
||
[FN250] Id. at 348.
|
||
======================================================================
|
||
118 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
protected under the Electronic Communications Privacy
|
||
Act, the Federal Records Act[FN251] requires that:
|
||
|
||
all ... machine readable materials, or other documentary
|
||
materials, regardless of physical form or
|
||
characteristics, made or received by an agency of the
|
||
United States under Federal law or in connection with
|
||
the transaction of public business and preserved or
|
||
appropriated for preservation by that agency ... as
|
||
evidence of the organization, functions, policies,
|
||
decisions, procedures, operations, or other activities
|
||
of the Government or because of the informational value
|
||
of the data in them [be preserved].[FN252]
|
||
|
||
The court held that the actual computer records must be saved, not
|
||
just paper copies of the electronically mailed notes, because the
|
||
computer records contain more information than printouts.[FN253]
|
||
Printed copies of the messages contain the text of the notes, but
|
||
only the computer records contain information such as who received
|
||
the E-mail messages and when the communication was received.[FN254]
|
||
A similar possible exception to the privacy of E-mail is the
|
||
Presidential Records Act,[FN255] which requires that all records
|
||
classified by the Act as "Presidential Records"[FN256] be preserved
|
||
for historical researchers. However, the only case to apply this
|
||
statute to Presidential E-mail held that the Presidential Records
|
||
Act impliedly precludes judicial review of the President's
|
||
compliance with the Act.[FN257]
|
||
|
||
E. Privacy Protection Act of 1980
|
||
|
||
It is also possible that computer information systems will be
|
||
--------------------------
|
||
[FN251] Federal Records Act, 44 U.S.C. <20><> 2101-2118, 2901-2910, 3101-
|
||
3107, 3301-3324.
|
||
[FN252] Id. <20> 3301.
|
||
[FN253] 810 F. Supp. at 342, 343.
|
||
[FN254] Id. at 341.
|
||
[FN255] 44 U.S.C. <20> 2201.
|
||
[FN256] Section 2201(2) of the Act defines a Presidential record as:
|
||
|
||
documentary materials ... created or received by the
|
||
President, his immediate staff, or a unit or individual in
|
||
the Executive Office of the President whose function is to
|
||
advise and assist the President, in the course of conducting
|
||
activities which relate to or have an affect upon the
|
||
carrying out of the constitutional, statutory, or other
|
||
official or ceremonial duties of the President.
|
||
|
||
Id.
|
||
[FN257] Armstrong v. Bush, 924 F.2d. 282, 290 (D.C. Cir. 1991).
|
||
======================================================================
|
||
119 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
protected under the Privacy Protection Act of 1980.[FN258] The
|
||
Privacy Protection Act immunizes from law enforcement search and
|
||
seizure any "work product materials possessed by a person
|
||
reasonably believed to have a purpose to disseminate to the public
|
||
a newspaper, book, broadcast, or other similar form of public
|
||
communication, in or affecting interstate commerce."[FN259] This
|
||
statute was passed to overturn the decision in Zurcher v. Stanford
|
||
Daily,[FN260] a case which held that a newspaper office could be
|
||
searched, even when no one working at the paper was suspected of a
|
||
crime.[FN261] The only exceptions to the law's prohibition on
|
||
searches of publishers are the following: probable cause to
|
||
believe that the person possessing the materials has committed or
|
||
is committing the crime to which the materials relate,[FN262] or the
|
||
immediate seizure is necessary to prevent the death or serious
|
||
injury to a human being.[FN263] Based on the list of types of
|
||
"publishers" covered by this statute, electronic publishers should
|
||
fall under this section.
|
||
The first case that attempted to apply this statute to
|
||
electronic publishers was the Steve Jackson Games case, mentioned
|
||
in the preceding section. It is a good case study in law
|
||
enforcement violations of electronic data privacy. Steve Jackson
|
||
Games is a small publisher of fantasy role-playing games in
|
||
Texas.[FN264] The company also ran a BBS to gain customer feedback on
|
||
the company's games.[FN265] The Secret Service took all of the
|
||
company's computers, both their regular business computers and the
|
||
one on which they were running the company's BBS (private
|
||
electronic mail etc.).[FN266] They also took all of the copies of
|
||
their latest game, GURPS Cyberpunk, which one of the Secret
|
||
Service agents referred to as "a handbook for computer crime."[FN267]
|
||
The raid by the Secret Service caused the company to temporarily
|
||
shut down;[FN268] Steve Jackson Games also had to lay off half its
|
||
employees.[FN269] The release of
|
||
--------------------------
|
||
[FN258] Privacy Protection Act of 1980, 42 U.S.C. <20> 2000aa (1980).
|
||
[FN259] Id. <20> 2000aa(a).
|
||
[FN260] Zurcher v. Stanford Daily, 436 U.S. 547 (1978).
|
||
[FN261] Id. at 549.
|
||
[FN262] 42 U.S.C. <20>2000aa(a)(1).
|
||
[FN263] Id. <20>2000aa (a)(2).
|
||
[FN264] Mitchell Kaypor, Civil Liberties in Cyberspace; Computers,
|
||
Networks and Public Policy, SCI. AM., Sept. 1991, 158, 158.
|
||
[FN265] Id.
|
||
[FN266] Steve Jackson Games, Inc. v. United States Secret Serv., 816
|
||
F. Supp. 432, 439 (W.D. Tex. 1993).
|
||
[FN267] Id. at 439-40.
|
||
[FN268] Id. at 438.
|
||
[FN269] Id.
|
||
======================================================================
|
||
120 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
the game was delayed for months,
|
||
since the Government took all of the word processing disks as well
|
||
as all of the printed drafts of the game.[FN270] The Electronic
|
||
Frontier Foundation, which provided legal counsel for Steve
|
||
Jackson, likened the Secret Service's action to an indiscriminant
|
||
seizure of all of a business's filing cabinets and printing
|
||
presses.[FN271] Steve Jackson Games was raided because one of its
|
||
employees ran a BBS out of his home <20> one out of a possible
|
||
several thousand around the country that distributed the
|
||
electronic journal "Phrack," in which a stolen telephone company
|
||
document was published.[FN272] The document contained information
|
||
which was publicly available in other forms.[FN273] The employee was
|
||
also accused of being a part of a fraud scheme <20> the fraud being
|
||
the explanation in a two line message what Kermit is <20>a publicly
|
||
available communications protocol.[FN274] The employee was also co-
|
||
SYSOP of the bulletin board system at Steve Jackson Games.[FN275]
|
||
The case held that at the time of the raid, the Secret
|
||
Service did not know that Steve Jackson Games was a publisher
|
||
(even though they should have), as the Privacy Protection Act[FN276]
|
||
requires, though they did know shortly after.[FN277] Judge Sparks
|
||
said the continued refusal to return the publisher's work product,
|
||
once the Secret Service had been informed that Steve Jackson Games
|
||
was a publisher, amounted to a violation of the Act.[FN278] In the
|
||
raid, the Secret Service seized a number of Steve Jackson's
|
||
computers, and a number of papers.[FN279] As mentioned, this included
|
||
the company's BBS, which contained public comments on newspaper
|
||
articles submitted for review, public announcements, and other
|
||
public and private communications.[FN280]
|
||
While the judge did find a violation of the Privacy
|
||
Protection Act,[FN281] he did not specify which items led to the
|
||
violation. The vio-
|
||
--------------------------
|
||
[FN270] Legal Case Summary, May 10, 1990, available over Internet, by
|
||
anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation).
|
||
[FN271] Id.
|
||
[FN272] 816 F. Supp. at 436.
|
||
[FN273] United States v. Riggs, 743 F. Supp. 556 (N.D. Ill. 1990).
|
||
[FN274] Special Issue: Search Affidavit for Steve Jackson Games,
|
||
COMPUTER UNDERGROUND DIG., Nov. 13, 1990, available over Internet, by
|
||
anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation).
|
||
[FN275] 816 F. Supp. at 436.
|
||
[FN276] 42 U.S.C. <20> 2000aa.
|
||
[FN277] 816 F. Supp. at 437.
|
||
[FN278] Id.
|
||
[FN279] Id.
|
||
[FN280] Id. at 439-40.
|
||
[FN281] Id. at 441.
|
||
======================================================================
|
||
121 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
lation could have been the seizure of the
|
||
papers, the computers used for word processing, or the BBS. Thus,
|
||
the question still remains unanswered as to whether the seizure of
|
||
the BBS alone, which was being used to generate work product for
|
||
the publisher, would have amounted to a violation of the Act.
|
||
Importantly, other users of the BBS who had posted public comments
|
||
about Steve Jackson's Games were also plaintiffs in the case. They
|
||
were not allowed recovery based on the Privacy Protection Act.[FN282]
|
||
Therefore, either the individual message posters were not
|
||
considered to be publishers themselves (only perhaps authors of
|
||
works published in electronic form by Steve Jackson Games' BBS) or
|
||
their messages were not considered to be work product subject to
|
||
protection.
|
||
|
||
V. Obscene and Indecent Material
|
||
|
||
Computer information systems can contain obscene or indecent
|
||
material in the form of text files, pictures, or sounds (such as
|
||
the sampled recording of an indecent or obscene text). Different
|
||
degrees of liability depend on which legal analogy is applied to
|
||
computer information systems. Differences in regulation based on
|
||
medium are a result of differing First Amendment concerns.[FN283]
|
||
|
||
A. Obscenity
|
||
|
||
The constitutional definition of "obscenity," as a term of
|
||
art,[FN284] was solidified in Roth v. United States.[FN285] The Roth
|
||
definition asks if the material deals with sex in a manner
|
||
appealing to prurient interests.[FN286] This standard was further
|
||
explained in Miller v. California,[FN287] a case which explored the
|
||
constitutionality of a state statute prohibiting the mailing of
|
||
unsolicited sexually explicit material.[FN288] The court expressed
|
||
the test for obscenity as:
|
||
|
||
whether (a) the average person, applying community
|
||
standards
|
||
--------------------------
|
||
[FN282] Id.
|
||
[FN283] See, e.g., F.C.C. v. Pacifica Foundation, 438 U.S. 726, reh'g
|
||
denied, 439 U.S. 883 (1978).
|
||
[FN284] The term "obscene material" is used synonymously with
|
||
"pornographic material." See Miller v. California, 413 U.S. 15,
|
||
n.2, reh'g denied, 414 U.S. 881 (1973).
|
||
[FN285] Roth v. United States, 354 U.S. 476 (1957).
|
||
[FN286] Id. at 487.
|
||
[FN287] 413 U.S. at 15.
|
||
[FN288] Id.
|
||
======================================================================
|
||
122 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
would find that the work, taken as a whole,
|
||
appeals to the prurient interest, (b) whether the work
|
||
depicts or describes, in a patently offensive way,
|
||
sexual conduct specifically defined by the applicable
|
||
state law; and (c) whether the work, taken as a whole,
|
||
lacks serious literary, artistic, political, or
|
||
scientific value.[FN289]
|
||
|
||
The first two prongs of this test have been held to be issues left
|
||
to local juries, while the last prong is to be determined by the
|
||
court.[FN290] Courts have been unwilling to find a national standard
|
||
for obscenity, and have held that a carrier of obscenity must be
|
||
wary of differences in definition between the states.[FN291] This has
|
||
profound implications for computer information systems which have
|
||
a national reach. It means SYSOPs must be aware of not only one
|
||
standard of obscenity, but fifty. SYSOPs must be aware of the
|
||
different standards because the Constitution's protection of free
|
||
speech does not extend to obscenity, and states are free to make
|
||
laws severely restricting its availability, especially to
|
||
children.[FN292] Although states can regulate the availability of
|
||
obscene material, they cannot forbid the mere possession of it in
|
||
the home.[FN293] The justification for this is based on privacy.[FN294]
|
||
In the now famous words of Justice Marshall in Stanley v.
|
||
Georgia,[FN295]
|
||
|
||
Whatever may be the justifications for other statutes
|
||
regarding obscenity, we do not think they reach the
|
||
privacy of one's home. If the First Amendment means
|
||
anything, it means that a State has no business telling
|
||
a man, sitting alone in his own house, what books he may
|
||
read, or what films he may watch. Our whole
|
||
constitutional heritage rebels at the thought of giving
|
||
government the power to control men's minds.[FN296]
|
||
|
||
Stanley has been interpreted as establishing a "zone of privacy"
|
||
about one's home.[FN297] Many computer information system users are
|
||
connected to the system by modem from their homes. Because of
|
||
this, any pornographic material they have stored on their home
|
||
computers is protected from government regulation.[FN298] However,
|
||
--------------------------
|
||
[FN289] Id. at 24.
|
||
[FN290] Pope v. Illinois, 481 U.S. 497, 500 (1987) (citing Smith v.
|
||
United States, 431 U.S. 291 (1977)).
|
||
[FN291] Hamling v. United States, 418 U.S. 87 (1974).
|
||
[FN292] See, e.g., 413 U.S. 15; Kois v. Wisconsin, 408 U.S. 2219
|
||
(1972).
|
||
[FN293] Stanley v. Georgia, 394 U.S. 557 (1969).
|
||
[FN294] Id. at 565.
|
||
[FN295] Id.
|
||
[FN296] Id.
|
||
[FN297] Jensen, supra note 7.
|
||
[FN298] Note that an exception would be made for child pornography,
|
||
see discussion supra part III.D.
|
||
======================================================================
|
||
123 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
connecting to a remote computer information system entails moving
|
||
obscene material in and out of this zone of privacy, and therefore
|
||
may not be insulated from state legislation.[FN299] Support for this
|
||
argument comes from U.S. v. Orito[FN300] which held that Congress has
|
||
the authority to prevent obscene material from entering the stream
|
||
of commerce, either by public or private carrier.[FN301] While a
|
||
person's disk drive on his or her computer is analogous to his or
|
||
her home library, connecting to a computer information system can
|
||
be seen as analogous to going out to a bookstore.[FN302] Stanley[FN303]
|
||
may protect a person's private library, but "[c]ommercial
|
||
exploitation of depictions, descriptions, or exhibitions of
|
||
obscene conduct on commercial premises open to the adult public
|
||
falls within a State's broad power to regulate commerce and
|
||
protect the public environment."[FN304]
|
||
|
||
B. Indecent Speech
|
||
|
||
Speech which is not considered obscene may qualify as
|
||
indecent. In F.C.C. v. Pacifica Foundation, Inc., the court held
|
||
that indecent speech is protected by the First Amendment, unlike
|
||
obscene and pornographic material, though it can still be
|
||
regulated where there is a sufficient governmental interest.[FN305]
|
||
Indecent language is that which "describes, in terms patently
|
||
offensive as measured by community standards ... sexual or
|
||
excretory activities and organs ..."[FN306] This language comes from
|
||
F.C.C. v. Pacifica Foundation, Inc.,[FN307] a broadcasting case which
|
||
upheld the channeling of indecent language into time periods when
|
||
it was not as likely that children would be in the audience.
|
||
Discussion of indecent speech will be continued in the analysis of
|
||
the different legal analogies that may apply to computer
|
||
information systems.
|
||
--------------------------
|
||
[FN299] Jensen, supra note 7.
|
||
[FN300] U.S. v. Orito, 413 U.S. 139 (1973).
|
||
[FN301] Id. at 143.
|
||
[FN302] See Cubby, Inc. v. CompuServe, Inc., 776 F. Supp. 135
|
||
(S.D.N.Y. 1991).
|
||
[FN303] 394 U.S. at 565.
|
||
[FN304] Paris Adult Theatre I v. Slaton, 413 U.S. 49, 68-69, reh'g
|
||
denied, 414 U.S. 881 (1973).
|
||
[FN305] 438 U.S. at 726.
|
||
[FN306] Id. at 732.
|
||
[FN307] Id. at 726-27.
|
||
======================================================================
|
||
124 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
VI. Copyright Issues
|
||
|
||
A. Basics of Copyrights
|
||
|
||
Text, pictures, sounds, software <20> all of these can be
|
||
distributed by computer information systems, and all can be
|
||
copyrighted. The Constitution guarantees Congress the power to
|
||
"promote the Progress of Science and Useful Arts, by securing for
|
||
limited Times to Authors and Inventors the exclusive right to
|
||
their respective Writings and Discoveries."[FN308] This power is
|
||
exercised in the form of the Copyright Act, Title 17 of the U.S.
|
||
Code.[FN309] Section 102 of the Copyright Act allows protection of
|
||
"original works of authorship fixed in any tangible medium of
|
||
expression, now known or later developed, from which they can be
|
||
perceived, reproduced, or otherwise communicated, either directly
|
||
or with the aid of a machine or device."[FN310] The statute lists
|
||
several types of works as illustrations of types of works which
|
||
qualify for copyright protection.[FN311] Relevant to computer
|
||
information systems, the list includes literary works; pictorial,
|
||
graphic, and sculptural works; motion pictures and other
|
||
audiovisual works; and sound recordings.[FN312] The "now known or
|
||
later developed" language allows expansion of copyright coverage
|
||
to meet any new means of expression, such as those available over
|
||
a computer information system.[FN313] In fact, the notes accompanying
|
||
this code section acknowledge that copyright protection applies to
|
||
a work "whether embodied in a physical object in written, printed,
|
||
photographic, sculptural, punched, magnetic, or any other stable
|
||
form."[FN314] The element of fixation is important in the copyright
|
||
statute; a work which is not fixed is not covered by the statute,
|
||
and any possible protection must come from local common law.[FN315]
|
||
This can lead to some strange results. A live concert cannot be
|
||
copyrighted under this statute, but if the performer records the
|
||
concert while he or she performs, the concert can then be
|
||
copyrighted.[FN316] For computer information systems,
|
||
--------------------------
|
||
[FN308] U.S. CONST. art. I, <20> 8, cl. 8.
|
||
[FN309] Copyright Act of 1947, 17 U.S.C. <20> 101 (1947).
|
||
[FN310] Id. <20> 102(a).
|
||
[FN311] Id. <20> 101.
|
||
[FN312] Id. <20> 102(a) Other categories include musical works, dramatic
|
||
works, pantomimes and choreographic works, and architectural works. Id.
|
||
[FN313] See <20> 101 (Historical and Statutory Notes).
|
||
[FN314] Id.
|
||
[FN315] Id.
|
||
[FN316] Id.
|
||
======================================================================
|
||
125 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
this implies that conversations occurring over a computer or network
|
||
which are not stored on a disk[FN317] are unprotected by the Copyright
|
||
Act, but if any party to the conversation, or the system operator,
|
||
stores the messages, it is then possible to copyright some elements of
|
||
the conversation.
|
||
Copyright protection extends to works of authorship; it does
|
||
not extend to ideas, processes, concepts, inventions and the
|
||
like.[FN318] Distinguishing between works of authorship and processes
|
||
can at times result in some subtle distinctions. An example of
|
||
this is computer typefaces, or fonts (which can often be found
|
||
available for downloading on file servers or bulletin board
|
||
systems). There are two major kinds of type faces, bit-mapped and
|
||
postscript. Bit-mapped fonts are composed of data describing where
|
||
points are drawn in order to make out the shape of the letter.[FN319]
|
||
Postscript fonts, on the other hand, consist of a computer program
|
||
which describes the outline of the letter.[FN320] Digital typefaces
|
||
are not considered copyrightable, because they are seen as just a
|
||
copy of the underlying letter design, a process for drawing a
|
||
representation of a letter, and thus bit-mapped fonts are not
|
||
copyrightable.[FN321] Postscript fonts are seen as computer programs<6D>
|
||
the program is a work of authorship, it just so happens to draw
|
||
letters, and they have been held to be copyrightable.[FN322]
|
||
The Copyright Act gives the copyright holder exclusive rights
|
||
to his or her works.[FN323] This allows the author to reproduce,
|
||
perform, display, or create derivative works as he or she pleases,
|
||
and to do so to the exclusion of all others.[FN324] This means a
|
||
computer information system can distribute only material that is
|
||
either not copyrighted, or for which the SYSOP has permission to
|
||
copy. This presents no problem for material the system operator
|
||
acquires personally, but two problems exist regarding material
|
||
that users
|
||
--------------------------
|
||
[FN317] Data which is not stored on a disk is kept in a computer's
|
||
"RAM" (Random Access Memory). RAM is a volatile information store
|
||
where the computer keeps the information it is actively
|
||
processing. When the computer is turned off, all of this data is
|
||
lost; thus, anything stored in RAM is missing the required element
|
||
of "fixation."
|
||
[FN318] Id. <20> 102(b).
|
||
[FN319] See Charles Von Simon, Page Turns in Copyright Law with Adobe
|
||
Typeface Ruling, COMPUTERWORLD, Feb. 5, 1990, at 120.
|
||
[FN320] Id.
|
||
[FN321] See Adobe Successfully Registers Copyright Claim for Font
|
||
Program, COMPUTER LAWYER, Feb. 1990, at 26.
|
||
[FN322] Von Simon, supra note 319.
|
||
[FN323] Copyright Act of 1947, 17 U.S.C. <20> 106 (1947).
|
||
[FN324] Id.
|
||
======================================================================
|
||
126 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
upload to the computer system. First, even if the SYSOP
|
||
sees that the material a user has uploaded is copyrighted, how is
|
||
the SYSOP to know that permission has not been granted by the
|
||
copyright holder? Second, copyright notices can be removed by the
|
||
person posting copyrighted material, in which case the SYSOP may
|
||
have no way to know if the data is copyrighted. A SYSOP cannot
|
||
just ignore a suspicion that a work is copyrighted, because such
|
||
an act could lead to the conclusion that the SYSOP was a
|
||
participant in the copyright infringement by allowing the computer
|
||
file to be distributed on his or her system.[FN325] There is no
|
||
intent or knowledge requirement to find a copyright violation.
|
||
Copyright infringement is a strict liability crime. When a work is
|
||
copied, even if the person making the copy does not know or have
|
||
reason to know, that the work is copyrighted, an infringement may
|
||
still be found.[FN326] Even subconscious copying has been held to be
|
||
an infringement.[FN327]
|
||
One protection the Copyright Act gives to a computer
|
||
information system is a compilation copyright. A compilationn
|
||
copyright gives the SYSOP a copyright on the data contained in the
|
||
computer information system as a whole.[FN328] This does not give the
|
||
SYSOP a copyright to the individual copyrighted elements carried
|
||
on the system, but it does allow a copyright for the way the
|
||
material is organized.[FN329] An example of this would be the
|
||
electronic journal composed from articles submitted by users. The
|
||
compiler of the journal would not own a copyright to the
|
||
individual articles, but he or she would own a copyright in those
|
||
elements which are original to the compiler, for example, to the
|
||
arrangement of the articles which makes up the periodical as a
|
||
whole.[FN330] A bulletin board system could presumably also copyright
|
||
its entire message base.
|
||
As mentioned, the Copyright Act gives an author the exclusive
|
||
rights to make copies of his or her works, as well as create
|
||
derivative works.[FN331] This includes copies in computer readable
|
||
form.[FN332] Thus, scanned pictures, digitized sounds, machine
|
||
readable texts,
|
||
--------------------------
|
||
[FN325] See Screen Gems-Columbia Music, Inc. v. Mark-Fi Records, Inc.,
|
||
256 F. Supp. 399 (S.D.N.Y. 1966).
|
||
[FN326] De Acosta v. Brown, 146 F.2d 408 (2d Cir. 1944).
|
||
[FN327] Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F.
|
||
Supp. 177 (S.D.N.Y. 1976).
|
||
[FN328] 17 U.S.C. <20> 103.
|
||
[FN329] Id.
|
||
[FN330] Feist Publications, Inc. v. Rural Tel. Serv. Co., Inc., 111
|
||
S.Ct. 1282 (1991).
|
||
[FN331] 17 U.S.C. <20> 106.
|
||
[FN332] 17 U.S.C. <20> 101.
|
||
======================================================================
|
||
127 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
and computer programs are all subject to an
|
||
author's copyright. Any attempt to turn original material into one
|
||
of these computer-readable forms without the author's permission
|
||
(and unless the copy falls under one of the exceptions in sections
|
||
107-120) is a violation of the author's copyright.
|
||
With decreasing costs of data storage, and increasing access
|
||
to computer networks, comes an increase in the number of computer
|
||
archives. These computer archives store various types of data
|
||
which can be searched by the archive user. The archive site can be
|
||
searched, and the information can be copied by anyone with
|
||
sufficient access to the archive. This ease with which information
|
||
can be accessed and duplicated has some profound copyright
|
||
implications. I will use as an example a "lyric server," an
|
||
archive that stores lyrics to songs by assorted artists. Other
|
||
types of information that can be distributed will be discussed
|
||
shortly.
|
||
In my lyric server example, if someone is sitting down with
|
||
an album jacket and typing the lyrics into the computer for
|
||
distribution in the archive, the translation of the lyrics from
|
||
the album jacket to a computer text file constitutes an
|
||
unauthorized copy. Similarly, if someone else types in the file
|
||
and a System Operator then puts the file into the archive for
|
||
distribution, the SYSOP has violated the author's right to make
|
||
and distribute copies of his or her work.[FN333]
|
||
Once the file is in the archive for distribution, every time
|
||
the information is copied, there may be a copyright violation.
|
||
There is a difference here between copying and viewing. As
|
||
mentioned, the Copyright Act protects against unauthorized copying
|
||
of a work. The Act defines a copy as a fixation "from which the
|
||
work can be perceived, reproduced, or otherwise communicated,
|
||
either directly or with the aid of a machine or device."[FN334] Thus,
|
||
if someone connects to the computer information system and just
|
||
peruses the archive, if the information is not "downloaded,"
|
||
"screen captured," or otherwise recorded on computer disk, tape,
|
||
or printout, then no fixation is made and thus, no copy. However,
|
||
while the archive user may not be making a copy, if the archive is
|
||
publicly accessible viewing some types of files may constitute a
|
||
public performance or display[FN335] of the copyrighted work, which
|
||
are also protected rights.[FN336]
|
||
--------------------------
|
||
[FN333] 17 U.S.C. <20><> 106(1), (3).
|
||
[FN334] 17 U.S.C. <20> 101
|
||
[FN335] Id.
|
||
[FN336] 17 U.S.C. <20> 106
|
||
======================================================================
|
||
128 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
Whether the unauthorized archiving of a copyrighted work or
|
||
whether further copying of a protected work by the archive user
|
||
constitutes a violation of section 106 of the Copyright Act is
|
||
also determined by whether the copying falls under one of the
|
||
Act's exceptions. The two relevant exceptions are the "fair use"
|
||
provision[FN337] and the "reproduction by libraries and archives"
|
||
provision.[FN338]
|
||
|
||
[F]air use was traditionally a means of promoting educational
|
||
and critical uses. Fair use, then, is an exception to the
|
||
general rule that the public's interest in a large body of
|
||
intellectual products coincides with the author's interest in
|
||
exclusive control of his work, and it is decided in each case
|
||
as a matter of equity ... ."[FN339]
|
||
|
||
The fair use provision contains a list of uses that are presumed
|
||
to be acceptable uses of copyrighted works, and a list of four
|
||
factors that must be taken into account to determine if the use
|
||
constitutes a fair use of the work. The list includes use for
|
||
criticism, comment, news reporting, teaching, scholarship, or
|
||
research.[FN340] This list may provide some guidance as to what
|
||
constitutes legal use for the user of a computer information
|
||
system, but not for the provider of the archive. The archive user
|
||
may be safe in copying song lyrics from the lyric server if he or
|
||
she is using the lyrics for the purpose of commentary, for
|
||
example, but the SYSOP who provides the service may not have the
|
||
same defense.
|
||
The four factors to be applied in deciding whether the use of
|
||
a copyrighted work in each case constitutes fair use are:
|
||
|
||
(1) the purpose and character of the use, including
|
||
whether such use is of commercial nature or is for
|
||
nonprofit purposes:
|
||
(2) the nature of the copyrighted work;
|
||
(3) the amount and substantiality of the portion used
|
||
in relation to the copyrighted work as a whole; and
|
||
(4) the effect of the use upon the potential market
|
||
for or the value of the copyrighted work.[FN341]
|
||
|
||
Applying these factors to the System Operator's liability for a lyric
|
||
server, the character of the use depends on whether access to the
|
||
--------------------------
|
||
[FN337] 17 U.S.C. <20> 107.
|
||
[FN338] 17 U.S.C. <20> 108.
|
||
[FN339] Bruce J. McGiverin, Note, Digital Sound Sampling, Copyright
|
||
and Publicity: Protecting Against the Electronic Appropriation of
|
||
Sounds, 87 COLUM. L. REV. 1723, 1736 (1987) (citations omitted).
|
||
[FN340] 17 U.S.C. <20> 107.
|
||
[FN341] Id.
|
||
======================================================================
|
||
129 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
lyrics is available for free, or as a profit making
|
||
venture. The nature of the work is song lyrics, likely intended
|
||
for commercial sale. The amount used, is the entire lyrics to each
|
||
copyrighted song.[FN342] A use of the copyrighted work which makes
|
||
the original obsolete will obviously be more likely to be found an
|
||
unfair use than a use which brings more notoriety to the original.
|
||
And finally, placing copyrighted lyrics on a publicly accessible
|
||
computer information system may have a profound impact on the
|
||
potential market for the computerized distribution of lyrics,
|
||
depending upon the potential number of users of the lyric server.
|
||
The other possible exception to the copyright holder's
|
||
exclusive rights is section 108 which deals with copying by
|
||
libraries and archives.[FN343] Unlike the section 107 fair use
|
||
provision, which in this case is more aimed at the end user,
|
||
section 108 is aimed more at the information provider. Section 108
|
||
allows the archive itself to reproduce or distribute no more than
|
||
one copy or phonorecord of a work, and as long as the archive is
|
||
available to the public or to researchers not affiliated with the
|
||
library or archive, the archive does not get direct or indirect
|
||
profit from making or distributing the copy, and the copy contains
|
||
a notice of copyright.[FN344] It is reasonable to argue that when the
|
||
user requests a host computer to send a text file containing the
|
||
lyrics to a specific song, the archive is making this type of
|
||
copy. Section 108 allows the user to request copies of "no more
|
||
than one article or other contribution to a copyrighted collection
|
||
or periodical issue, or ... a small part of any other copyrighted
|
||
work"[FN345] as long as the copy becomes the property of the user,
|
||
the archive has no notice that the copy is to be used for anything
|
||
other than study, scholarship, or research, and as long as the
|
||
archive displays prominently "at the place where orders are
|
||
accepted, and includes on its order form, a warning of copyright
|
||
in accordance with requirements that the Register of Copyrights
|
||
shall prescribe by regulation."[FN346] This requirement of the
|
||
posting of copyright notice would clearly apply to the lyric
|
||
server, just as it does to a library photocopier. Even if a
|
||
passive computer system is held to be more like a self-serve
|
||
copier, and the SYSOP
|
||
--------------------------
|
||
[FN342] While the use of the entire song's lyrics weighs heavily
|
||
against the use being a fair use,, the Supreme Court has held that
|
||
use of the entire work can be a fair use. See Sony Corp. of Am. v.
|
||
Universal City Studios, Inc., 464 U.S. 417 (1984).
|
||
[FN343] 17 U.S.C. <20> 108.
|
||
[FN344] 17 U.S.C. <20> 108(a).
|
||
[FN345] 17 U.S.C. <20> 108(d).
|
||
[FN346] Id.
|
||
======================================================================
|
||
130 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
plays no part in the copying by the user, if
|
||
the archive is made available so that copying may occur, the
|
||
system operator is still subject to a copyright infringement claim
|
||
if the "reproducing equipment" does not bear a notice that any
|
||
copies made may be subject to copyright law.[FN347]
|
||
To summarize with the lyric server example, while a system
|
||
operator may not be liable for the use to which users put any
|
||
copyrighted text they copy off of the computer information system,
|
||
the SYSOP still must be wary of some obstacles. Copyright notice
|
||
must be provided, and, specifically, the notice that is prescribed
|
||
by the Register of Copyrights may require that each file have its
|
||
own copyright notice. Access to the archive must be fairly open.
|
||
The archive must not directly or indirectly profit from
|
||
distributing the copyrighted works. Potentially the biggest hurdle
|
||
is that care must be taken in assembling the archive so that any
|
||
materials that need to be converted into a computer-readable form
|
||
are converted without violating the author's section 106 rights.[FN348]
|
||
|
||
B. Copyrighted Text
|
||
|
||
Copyrighted text can appear on computer information systems
|
||
as either files in a file server or database; or it can appear in
|
||
an E-mail message or post on a BBS; or it can be worked into an E-
|
||
journal. The most obvious place to find copyrighted text is on
|
||
information systems such as LEXIS/NEXIS, WESTLAW and Dialog.
|
||
Textual material, such as electronically stored journals, gets a
|
||
fairly straightforward copyright analysis; the hardest job for a
|
||
SYSOP may be discovering what text is copyrighted. Once infringing
|
||
text is discovered, the SYSOP must remove it, or risk being held
|
||
as a conspirator in the copyright infringement.[FN349]
|
||
|
||
C. Copyrighted Software
|
||
|
||
Bulletin board systems, network file servers, and main-frame
|
||
computers that use FTP (File Transfer Protocol) all offer the
|
||
opportunity to copy software. The Software Publisher's Association
|
||
(SPA) offers the opportunity to be on the receiving end of a
|
||
--------------------------
|
||
[FN347] 17 U.S.C. <20> 108(f)(1).
|
||
[FN348] See 17 U.S.C. <20> 106.
|
||
[FN349] See Screen Gems-Columbia Music, Inc. v. Mark-Fi Records, Inc.,
|
||
256 F. Supp. 523 (S.D.N.Y. 1966).
|
||
======================================================================
|
||
131 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
lawsuit if any of that copied software is copyrighted.[FN350] The SPA
|
||
is a group established by a number of software publishers in order
|
||
to cut down on software piracy.[FN351] The SPA monitors bulletin
|
||
board systems for distribution of copyrighted software.[FN352] They
|
||
warn SYSOPs that they will be monitored, giving the SYSOP the
|
||
opportunity to remove any software he or she does not have the
|
||
right to distribute.[FN353] The SPA also examines office computers
|
||
for unlicensed software.[FN354]
|
||
Violators are asked to remove illegally held software,
|
||
purchase legally licensed copies, and pay a fine equal to the
|
||
amount of the purchase price of the software package.[FN355]
|
||
Compliance with the SPA requirements saves the offender the
|
||
additional cost of a lawsuit.[FN356] Noncompliance will result in a
|
||
lawsuit filed by the SPA.[FN357]
|
||
As mentioned, not all copying of copyrighted software is
|
||
illegal. Two exceptions are worth noting. One is for the making of
|
||
backup copies. The Copyright Act allows a copy of legally licensed
|
||
software to be made if such a copy is needed to use the
|
||
software.[FN358] The Act also allows a copy to be made for archival
|
||
purposes, as long as the copy is destroyed "in the event that
|
||
continued possession of the computer program should cease to be
|
||
rightful."[FN359] The other exception is shareware. Shareware is a
|
||
popular method of software publishing which allows a software
|
||
programmer to distribute his or her work without all of the
|
||
marketing costs, often via a computer information system.[FN360] A
|
||
user can call up a BBS, download software, and try it out for a
|
||
while. If the user likes the software, he or she sends the
|
||
programmer a shareware fee. The difference between shareware and
|
||
public domain software is that public-domain software is freely
|
||
distributed with the consent of the copyright owner, while
|
||
shareware is not distributed without restriction <20> use of
|
||
shareware beyond a reasonable trial period (often specified in the
|
||
documentation distributed with the
|
||
--------------------------
|
||
[FN350] Janet Mason, Crackdown on Software Pirates; Industry Watchdogs
|
||
Renew Efforts to Curb Illegal Copying, COMPUTERWORLD, Feb. 5, 1990,
|
||
at 107.
|
||
[FN351] Id.
|
||
[FN352] Id.
|
||
[FN353] Id.
|
||
[FN354] Id.
|
||
[FN355] Id.
|
||
[FN356] Id.
|
||
[FN357] Id.
|
||
[FN358] 17 U.S.C. <20> 117(1).
|
||
[FN359] Id. <20> 117(2).
|
||
[FN360] Steve Givens, Sharing Shareware: Non-Traditional Marketing
|
||
Relies on Honor System, ST. LOUIS BUS. J., July 1, 1991, <20> 2 at 1B.
|
||
======================================================================
|
||
132 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
software) without payment of
|
||
the shareware fee is a violation of copyright law.[FN361]
|
||
|
||
D. Copyrighted Pictures
|
||
|
||
As mentioned earlier,[FN362] pictures can be scanned into a
|
||
computer and stored. Pictures can also be drawn directly on a
|
||
computer by means of graphics software. A hybrid of the two is
|
||
also possible <20> pictures can be scanned, and once scanned, they
|
||
can be further altered with image processing software.[FN363] All of
|
||
these forms are covered by the Copyright Act.[FN364] Pictures created
|
||
on the computer using graphics or "paint box" software are in an
|
||
original copyrightable form.[FN365] Images that are scanned are in
|
||
violation of the original copyright holder's rights, unless
|
||
permission to distribute the scanned image has been obtained.[FN366]
|
||
In fact, even the unauthorized initial scan made of a copyrighted
|
||
work is in violation of the copyright, even without further
|
||
distribution.[FN367] As one author said, "[t]he law is quite
|
||
straightforward; a copy is a copy, period. There is no wording
|
||
that differentiates among images produced by scanners, by
|
||
photocopiers, or by crocheting them into toilet seat covers."[FN368]
|
||
Images which are scanned that are not copyrighted, such as works
|
||
on which the copyright has already expired,[FN369] do not violate the
|
||
Copyright Act, and, if sufficient creativity is contributed in the
|
||
scanning process, the images may be eligible for copyright
|
||
protection in their own right.[FN370] If a scan of a copyrighted
|
||
picture is then altered into a new image, the modified version
|
||
likely still falls
|
||
--------------------------
|
||
[FN361] Id.
|
||
[FN362] See supra text accompanying notes 114-16.
|
||
[FN363] Legal aspects of the doctoring of photographs are beyond the
|
||
scope of this paper <20> for a good discussion of such issues, see
|
||
Benjamin Seecof, Scanning into the Future of Copyrightable Images:
|
||
Computer-Based Image Processing Poses a Present Threat, 5 HIGH
|
||
TECH. L.J. 371 (1990).
|
||
[FN364] 17 U.S.C. <20> 102(a)(5).
|
||
[FN365] Id. <20> 102(a).
|
||
[FN366] Id. <20> 101 (defining a copy); id. <20> 106 (Section 106 gives the
|
||
copyright holder exclusive rights to make copies and derivative
|
||
works of his or her creation.).
|
||
[FN367] Id. <20> 101.
|
||
[FN368] Ezra Shapiro, More on Copyright; Digitizing of Copyrighted
|
||
Images, MACWEEK, Oct. 11, 1988, at 27.
|
||
[FN369] 17 U.S.C. <20> 302 (applying to works created after Jan. 1, 1978,
|
||
provides that a copyright shall expire 50 years after the death of
|
||
the author of the work).
|
||
[FN370] See, e.g., Burrow-Giles Lithographic Co. v. Sarony, 111 U.S.
|
||
53 (1984) (holding that photographs are copyrightable by virtue of
|
||
the creativity that goes into arranging the subject elements and
|
||
photographic variables into a distinct picture).
|
||
======================================================================
|
||
133 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
under the original copyright.[FN371] It therefore
|
||
enjoys no protection on its own, and copyright release must be
|
||
obtained from the holder of the copyright in order to distribute
|
||
the image (or to modify it in the first place).[FN372]
|
||
Once again, one of the most difficult tasks for a system
|
||
operator is determining which images are copyrighted. The
|
||
Copyright Act provides an author with the right to have his or her
|
||
name associated with his or her own work, as well as the right to
|
||
have his or her name disassociated with a mutilation of his or her
|
||
work, (along with the right to prevent such mutilations in the
|
||
first place).[FN373] Based on these rights, a SYSOP should be
|
||
especially careful of images which appear to be doctored. Many of
|
||
the larger computer information services settle the dilemma over
|
||
establishing copyright status by allowing the images under the
|
||
assumption that no one will mistake a scanned copy for an
|
||
original, and that therefore no one is being hurt.[FN374] This
|
||
argument has no basis in the law of copyrights. The Copyright Act
|
||
gives the author the right to make copies of his or her work, and
|
||
this includes bad copies.[FN375] Also, the claim that no damage is
|
||
being done is an unreasonably narrow view. The copyright holder,
|
||
and not the public, is allowed exclusive control of the channels
|
||
through which his or her work reaches the market.[FN376]
|
||
Computerized images present a whole new market for an
|
||
artist's work, and widespread, unauthorized distribution can
|
||
destroy the potential to disseminate the work in the computer
|
||
market <20> a right clearly given to the author of the work. Some
|
||
computer information services also defend the possibility that
|
||
some of their stored images are provided on the basis of the "fair
|
||
use"[FN377]
|
||
--------------------------
|
||
[FN371] 17 U.S.C. <20> 106; see Gracen v. Bradford Exch., 698 F. 2d. 300,
|
||
(7th Cir. 1983); cf. Copyright Registration for Colorized Versions
|
||
of Black and White Motion Pictures, 37 C.F.R. 202 (1987).
|
||
[FN372] Id. <20> 106A.
|
||
[FN373] Id.
|
||
[FN374] Ezra Shapiro, Copywrongs on Consumer Info Networks? Posting of
|
||
Scanned Images on Electronic Services Infringes Copyrights,
|
||
MACWEEK, Aug. 30, 1988, at 20.
|
||
[FN375] 17 U.S.C. <20> 106.
|
||
[FN376] Franklin Mint Corp. v. National Wildlife Art Exch., 575 F.2d
|
||
62 (3d Cir. 1978); see also Zaccini v. Scripps-Howard Broadcasting
|
||
Co., 433 U.S. 562 (1977) (involved TV station covering the
|
||
plaintiff's entire act (human cannonball), depriving the plaintiff
|
||
of a chance to sell tickets to the television viewers, since they
|
||
had already seen his act).
|
||
[FN377] 17 U.S.C. <20> 107.
|
||
======================================================================
|
||
134 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
exception.[FN378] Relying on fair use is also not a very
|
||
realistic position to take. One artist found some of his work
|
||
scanned and available on a BBS, only after he was told of its
|
||
presence by a friend. The artist's name and copyright notice had
|
||
been cropped off. By the time the artist protested, 240 people had
|
||
downloaded his images.[FN379] Such wide infringement into a
|
||
potentially new market for the artist is not likely to be found by
|
||
a court to constitute "fair" use. For a SYSOP to be free from
|
||
liability, the only thing he or she can do is to make sure the
|
||
image is either not protected by copyright, or that the use of the
|
||
image has been approved by the copyright holder.
|
||
The above analysis applies to sampled sounds, as well as
|
||
images, stored in a computer information system; though for sounds
|
||
it is even more difficult to determine what material is being
|
||
distributed in violation of the copyright laws. In addition, if
|
||
there is a false attribution as to the origin of the work and an
|
||
element of unfairness or deception, unauthorized use of
|
||
copyrighted material on a computer information system may
|
||
constitute the tort of unfair competition.[FN380] Unauthorized use
|
||
where "a plaintiff believes that the defendant, at little or no
|
||
cost, has appropriated what the plaintiff considers the
|
||
plaintiff's own commercially valuable property" may constitute a
|
||
subset of unfair competition-misappropriation.[FN381]
|
||
|
||
VII. Liability for Computer Information System Content
|
||
|
||
In order to determine who is liable for illegal activity of
|
||
the kind so far discussed, it is necessary to know how computer
|
||
information systems are viewed by the law. Computer information
|
||
systems may be seen by the law as analogous to one of the other
|
||
communications media, such as newspapers or common carriers, or
|
||
they may be seen as unique media. Specific legislation geared
|
||
towards the computer media has already been discussed. However,
|
||
the law still leaves some issues unresolved. To resolve such
|
||
issues, it is necessary to understand how other media are
|
||
regulated, and how computer information systems are similar to or
|
||
different from those media.
|
||
--------------------------
|
||
[FN378] Shapiro, supra note 374.
|
||
[FN379] Liz Horton, Electronic Ethics of Photography; Use of Images in
|
||
Desktop Publishing, FOLIO: THE MAG. FOR MAG. MGMT., Jan. 1990, at 71.
|
||
[FN380] Thomas C. Moglovkin, Note, Original Digital: No More Free
|
||
Samples, 64 S. CAL. L. REV. 135, 163 (1990).
|
||
[FN381] Id. at 165.
|
||
======================================================================
|
||
135 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
In all cases where the law would hold a party guilty for
|
||
actions carried out on a computer information system, this paper
|
||
assumes that the SYSOP is liable if he or she is the initial cause
|
||
of that violation because the law, by its terms, would clearly
|
||
apply to the system operator. The primary question at issue here
|
||
is the extent of a SYSOP's liability for illegal conduct conducted
|
||
by the users of the computer information system.
|
||
|
||
A. Information System as Press
|
||
|
||
Many services on a computer information system are similar to
|
||
those of print publishers. Just as there are magazines and
|
||
newspapers, there are electronic periodicals. Just as there are
|
||
street corner pamphleteers, so are there E-mail activists. Just as
|
||
First Amendment privileges apply to the print media, so, one can
|
||
argue, they should apply to the electronic press. Often the only
|
||
practical difference between print media and electronic media is
|
||
paper. In fact, with electronic word processing and page layout
|
||
programs used by most print publishers, even printed periodicals
|
||
at one stage exist in the same form as electronic journals do when
|
||
they are published.
|
||
Even bulletin board operators sometimes see themselves as
|
||
being analogous to print publishers. Prodigy is an example of a
|
||
service that sees itself as a publisher. In fact, Prodigy refers
|
||
to the people who screen messages posted in their conferences as
|
||
"editors" and not censors, and Prodigy claims all of them have
|
||
journalism backgrounds.[FN382] Both Prodigy and the local newspaper
|
||
take "articles" by "authors" and "publish" them in their
|
||
respective media for the consumption of their "subscribers."
|
||
There are two types of publishers, primary and secondary. A
|
||
primary publisher is presumed to play a part in the creative
|
||
process of creating the message which is then disseminated.[FN383]
|
||
Primary publishers are what one generally thinks of when thinking
|
||
of publishers. Prodigy claims to be such a publisher. While the
|
||
Constitution provides some protection to the editor's judgment as
|
||
to what to print,[FN384] the protection is not complete. All of the
|
||
restrictions on content discussed earlier apply to publishers
|
||
<EFBFBD>advocacy of lawless
|
||
--------------------------
|
||
[FN382] Mitchell Kapor, A Day in the Life of Prodigy, EFFECTOR ONLINE,
|
||
available over Internet, by anonymous FTP, at FTP.EFF.ORG
|
||
(Electronic Frontier Foundation) (Vol. 1, No. 5).
|
||
[FN383] Robert Charles, Computer Bulletin Boards and Defamation: Who
|
||
Should be Liable? Under What Standard?, 2 J.L. & TECH 121, 131 (1987).
|
||
[FN384] U.S. CONST. amend. I.
|
||
======================================================================
|
||
136 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
action, child pornography, obscenity,
|
||
defamation, etc. The SYSOP, as an electronic publisher, shares the
|
||
same liability as a print publisher would, for example, the New
|
||
York Times[FN385] "actual malice" standard for defamation, and a
|
||
"knowing" standard as required by the statutes forbidding the
|
||
transportation of material involved in child pornography.[FN386] The
|
||
publisher is generally held to know what is being published
|
||
because he or she has editorial control over the material that is
|
||
published.
|
||
The question then becomes, is knowledge enough to result in
|
||
liability? This is determined by the actual crime with which the
|
||
publisher is charged. Defamation generally requires the publisher
|
||
to have published the defamation with "knowing or reckless
|
||
disregard for the truth."[FN387] For a SYSOP, at least a "know or
|
||
have reason to know" standard would be necessary. A publisher
|
||
generally knows he or she is publishing, as well as what is being
|
||
published. A SYSOP for a large computer information system with a
|
||
lot of users may not be able to keep track of all of the
|
||
electronic journals and messages on bulletin boards which are
|
||
being run on his or her system. While a SYSOP may have the same
|
||
editorial control that a print publisher has, the sheer size may
|
||
effectively prohibit actual editorial control over what is being
|
||
published over the computer system. For this reason, it would be
|
||
unfair to hold a SYSOP to a standard that requires less than a
|
||
"knowing or reason to know" standard. An argument for this minimum
|
||
requirement is supported by some cases, for example, those which
|
||
do not allow the publisher to be held liable for everything in his
|
||
or her periodical, such as the safety of products sold by their
|
||
advertisers.[FN388] As the court in Yuhas v. Mudge held,
|
||
|
||
[t]o impose the [duty to check the truth of the claims
|
||
of all of their advertisers] upon publishers of
|
||
nationally circulated magazines, newspapers and other
|
||
publications would not only be impractical and
|
||
unrealistic, but would have a staggering adverse effect
|
||
on the commercial world and our economic system. For the
|
||
law to permit such exposure to those in the publishing
|
||
business ... would open the doors to "liability in an
|
||
indeterminate amount for an indeterminate time, to an
|
||
indeterminate class."[FN389]
|
||
--------------------------
|
||
[FN385] New York Times v. United States, 403 U.S. 713 (1971).
|
||
[FN386] 18 U.S.C. <20> 2252.
|
||
[FN387] 403 U.S. at 713.
|
||
[FN388] See, e.g., Yuhas v. Mudge, 322 A.2d 824, 825 (N.J. Super. Ct.
|
||
App. Div. 1974).
|
||
[FN389] Id.
|
||
======================================================================
|
||
137 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
Operators of large systems are quick to support the view that the
|
||
job of monitoring every communication on their systems would be a
|
||
prohibitively large task.[FN390] If a "know or have reason to know"
|
||
standard were applied to computer information systems, offending
|
||
material reported to a SYSOP would have to be dealt with under
|
||
threat of liability. Also, any offending material discovered by
|
||
the SYSOP would need to be removed. A SYSOP also could not avoid
|
||
monitoring for improper content, knowing such content is present,
|
||
and then later claim ignorance. However, holding a SYSOP
|
||
responsible even for material that he or she did not know was on
|
||
the computer system would require a much larger time commitment on
|
||
the part of the SYSOP or the hiring of staff to supervise the
|
||
activities taking place on the computer system. Most small
|
||
hobbyists running bulletin board systems would not be able to
|
||
support this additional commitment and would be forced to cease
|
||
operating out of fear of liability. Larger commercial services
|
||
would have to either increase costs to the users or decide that
|
||
providing some services are no longer worth the expense. The net
|
||
result would be a contracting of the number of outlets for free
|
||
expression by means of computer. By requiring at least a "reason
|
||
to know" standard, a balance can be struck <20> the service can be
|
||
provided, but a SYSOP could not hide his or her head in the sand
|
||
to avoid liability. Any problem brought to the SYSOP's attention
|
||
would have to be addressed; any problem the SYSOP discovered would
|
||
also need to be taken care of; and any problem likely to be
|
||
present could not be ignored by the SYSOP.
|
||
A secondary publisher is someone who is involved in the
|
||
publication process, such as a press operator, mail carrier, or
|
||
radio and television engineer, who usually does not know when a
|
||
statement he or she transmits is defamatory and is usually not in
|
||
a position to prevent the harm <20> a secondary publisher generally
|
||
has no control over the content of the message, unlike a primary
|
||
publisher.[FN391] Unless the secondary publishers know or have reason
|
||
to know of the defamatory nature of the material they are
|
||
transmitting, they are free from liability for defamation.[FN392]
|
||
Secondary publishers are often treated synonymously with
|
||
republishers which are discussed in the next section.
|
||
--------------------------
|
||
[FN390] Information Policy, Computer Communications Networks Face
|
||
Identity Crisis over Their Legal Status, DAILY REP. FOR EXECUTIVES,
|
||
Feb. 26, 1991, at A-6.
|
||
[FN391] Joseph P. Thornton, et al., Symposium: Legal Issues in
|
||
Electronic Publishing: 5. Libel, 36 FED. COM. L.J. 178, 179 (1984).
|
||
[FN392] See RESTATEMENT (SECOND) OF TORTS <20> 581 (1989).
|
||
======================================================================
|
||
138 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
B. Information System as Republisher/Disseminator
|
||
|
||
A republisher, or disseminator, is defined as "someone who
|
||
circulates, sells, or otherwise deals in the physical embodiment
|
||
of the published material."[FN393] Some computer information systems
|
||
are like republishers because all they do is make available files,
|
||
just like a book seller or library makes texts available. A
|
||
librarian cannot be expected to read every book in the library,
|
||
just as the system operator of a service may not be able to read
|
||
every text file stored on the computer system. File servers and
|
||
data bases can be large enough to store complete texts of books
|
||
and periodicals, as users of services such as WESTLAW and
|
||
LEXIS/NEXIS are well aware. Computer information systems can also
|
||
contain massive quantities of software, E-mail and electronic
|
||
journals, all stored ready for users to peruse like a library
|
||
book. One of the characteristics of secondary publishers; is that
|
||
they are "presumed, by definition, to be ignorant of the
|
||
defamatory nature of the matter published or to be unable to
|
||
modify the defamatory message in order to prevent the harm."[FN394]
|
||
The case that first established the immunity from liability
|
||
for distributors, breaking the common law tradition, was Smith v.
|
||
California.[FN395] Smith involved a bookseller who was convicted of
|
||
violating a statute that made it illegal to deal in obscene
|
||
materials. The lower court held violators of the statute strictly
|
||
liable. However, the court held that a law which holds a
|
||
bookseller strictly liable for the contents of the books he or she
|
||
sells is unconstitutional. Justice Brennan stated his reasons as
|
||
follows:
|
||
|
||
For if the bookseller is criminally liable without knowledge
|
||
of the contents ... he will tend to restrict the books he
|
||
sells to the ones he has inspected; and thus the State will
|
||
have imposed a restriction upon the distribution of
|
||
constitutionally protected as well as obscene literature. It
|
||
has been well observed of a statute construed as dispensing
|
||
with any requirement of scienter that: "Every bookseller
|
||
would be placed under an obligation to make himself aware of
|
||
the contents of every book in his shop. It would be
|
||
unreasonable to demand so near an approach to omniscience."
|
||
And the bookseller's burden would become the public's burden
|
||
... . The bookseller's limitation in the amount of reading
|
||
material with which he could familiarize himself, and his
|
||
timidity in the face of absolute criminal
|
||
--------------------------
|
||
[FN393] Jensen, supra note 7, at 3.
|
||
[FN394] Charles, supra note 383, at 131.
|
||
[FN395] Smith v. California, 361 U.S. 147 (1959), reh'g denied, 361
|
||
U.S. 950 (1960).
|
||
======================================================================
|
||
139 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
liability, thus
|
||
would tend to restrict the public's access to forms of the
|
||
printed word which the State could not constitutionally
|
||
suppress directly.[FN396]
|
||
|
||
While this case did not determine the degree of liability
|
||
appropriate for a bookseller, it did find that strict liability
|
||
was too restrictive.[FN397] Later courts, however, were willing to
|
||
set a minimum standard of liability, and that standard was set to
|
||
a "know or have reason to know" standard.[FN398] In addition,
|
||
secondary publishers are not required to investigate the contents
|
||
of the messages they are delivering in order to avoid
|
||
liability.[FN399]
|
||
Recently, a court has applied the Smith[FN400] analysis to
|
||
computer information systems. Cubby, Inc. v. CompuServe, Inc.[FN401]
|
||
is a major decision supporting the analogy of the computer
|
||
information system as a republisher or disseminator of media.
|
||
CompuServe was one of the first public computer information
|
||
systems, founded in 1969 as a time-sharing system by H&R Block in
|
||
order to make use of some of its surplus computer facilities.[FN402]
|
||
CompuServe is now so large that it contracts out its editorial
|
||
control of various discussion groups to other companies, who
|
||
maintain the forum in accordance with CompuServe's general
|
||
guidelines.[FN403] The groups maintaining the forums are similar to
|
||
print publishers <20> they take articles submitted by users and then
|
||
publish them, exerting editorial control over the material where
|
||
necessary. CompuServe works, in essence, like an electronic book
|
||
store. CompuServe sells to its users the materials that the
|
||
discussion groups publish. In Cubby, one of the forums uploaded
|
||
and made available an on-line publication which defamed the
|
||
plaintiff.[FN404] CompuServe had no opportunity to review the
|
||
periodical's contents before it was made available to CompuServe's
|
||
subscribers.[FN405] District Judge Leisure held that, since
|
||
CompuServe had no editorial control over the periodical, and
|
||
CompuServe did not know or have reason to know of the defamation
|
||
--------------------------
|
||
[FN396] Id. at 153 (citation omitted).
|
||
[FN397] Id. at 155.
|
||
[FN398] Seton v. American News Co., 133 F. Supp. 591 (N.D. Fla. 1955);
|
||
cf. Manual Enters., Inc. v. Day, 370 U.S. 478 (1962).
|
||
[FN399] 133 F. Supp. at 593.
|
||
[FN400] 361 U.S. at 950.
|
||
[FN401] 776 F. Supp. at 135.
|
||
[FN402] Clifford Carlsen, Wide Area Bulletin Boards Emerge as Method
|
||
of Corporate Communications, SAN FRANCISCO BUS. TIMES, Mar. 15, 1991,
|
||
at 15.
|
||
[FN403] 776 F. Supp. at 137.
|
||
[FN404] Id. at 138.
|
||
[FN405] Id.
|
||
======================================================================
|
||
140 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
contained in the periodical, CompuServe was in essence "an
|
||
electronic, for-profit library."[FN406] Like a bookstore or library,
|
||
CompuServe had the option to carry or not to carry the periodical,
|
||
but once the decision was made CompuServe had no editorial control
|
||
over the periodical. The court recognized the function of
|
||
technology and admitted that a computer database is the functional
|
||
equivalent to a news distributor or a public library, and
|
||
therefore, so as not to impede the flow of information, the same
|
||
"know or have reason to know" standard should apply.[FN407]
|
||
This holding has a number of profound implications for the
|
||
law governing computer information systems. First, it establishes
|
||
a clear determination of SYSOP liability: where the SYSOP does not
|
||
exert editorial control, and does not know or have reason to know
|
||
of the dissemination of offensive material, he or she cannot be
|
||
held liable. This also implies that once a SYSOP is made aware, or
|
||
has reason to believe, that the computer system is being used for
|
||
illegal purposes, he or she is obligated to remedy the situation
|
||
under penalty of liability. It also implies that a SYSOP can
|
||
reduce potential liability by avoiding awareness of message
|
||
content on his or her system, limited by the "reason to know"
|
||
element <20> a SYSOP could not, however, escape liability by sticking
|
||
his or her head in the sand while knowing that the computer
|
||
information system was likely being used for illicit purposes. The
|
||
scope of this holding is arguably broad, especially since the
|
||
court relied on an obscenity case to determine a defamation issue.
|
||
This means that the same standard may now apply in both defamation
|
||
and obscenity cases involving computer systems whose operators do
|
||
not exert editorial control.[FN408]
|
||
|
||
C. Information System as Common Carrier
|
||
|
||
Network transmissions, E-mail, and some other features of a
|
||
computer information systems such as "chat" features all work in a
|
||
way similar to a common carrier. A common carrier is a service
|
||
that:
|
||
|
||
is [of] a quasi-public character, which arises out of the
|
||
undertaking
|
||
--------------------------
|
||
[FN406] Id. at 140.
|
||
[FN407] Id.
|
||
[FN408] The Compuserve Case: A Step Forward in First Amendment
|
||
Protection for Online Services, EFFECTOR ONLINE, Jan. 7, 1992,
|
||
available over Internet, by anonymous FTP, at FTP.EFF.ORG
|
||
(Electronic Frontier Foundation) (Vol. 2, No. 3).
|
||
======================================================================
|
||
141 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
"to carry for all people indifferently
|
||
... ." This does not mean that the particular services
|
||
offered must practically be available to the entire
|
||
public; a specialized carrier whose service is of
|
||
possible use to only a fraction of the population may
|
||
nonetheless be a common carrier if he [or she] holds
|
||
himself [or herself] out to serve indifferently all
|
||
potential users.[FN409]
|
||
|
||
Importantly, a computer information system need not be classified
|
||
according to only one communications analogy <20> a system can act at
|
||
times like a publisher, and at times like a common carrier. A
|
||
service is defined as a common carrier when it acts as such based
|
||
on the way it conducts its activities.[FN410]
|
||
Common carriers have generally been considered secondary
|
||
publishers,[FN411] and as such, have traditionally functioned under a
|
||
reduced standard of liability.[FN412] That standard is, once again, a
|
||
"know or have reason to know" standard of liability.[FN413] This
|
||
standard has been widely adopted and applied to the electronic
|
||
communications media: from telegraph,[FN414] to telephone,[FN415] and
|
||
even to options such as telephone answering services.[FN416] There
|
||
are a number of reasons for applying a knowing standard to a
|
||
common carrier.
|
||
One reason is efficiency; service providers would not be able
|
||
to do their job transmitting as well if they also had to monitor
|
||
content.[FN417] Another reason is fairness; common carrier operators
|
||
are not trained in what is libelous and what is not, and, even if
|
||
they were, they would have to make many decisions at a quick rate
|
||
<EFBFBD> not a fair burden to place on the common carrier.[FN418] And a
|
||
third reason is privacy; by removing a need for common carriers to
|
||
monitor content of transmissions, the likelihood is increased that
|
||
transmissions will be held private. A "know or have reason to
|
||
know" standard makes a lot of sense for computer networks, as all
|
||
of the above interests would be served by regulating a network as a
|
||
--------------------------
|
||
[FN409] National Ass'n of Regulatory Util. Comm'rs v. F.C.C., 533 F.2d
|
||
601, 608 (1976).
|
||
[FN410] Id. at 608.
|
||
[FN411] E.g., Von Meysenbug v. Western Union Tel. Co., 54 F. Supp 100
|
||
(S.D. Fla. 1944); Mason v. Western Union Tel. Co., 52 Cal. App. 3d
|
||
429, (1975).
|
||
[FN412] RESTATEMENT (SECOND) OF TORTS <20> 612 (1989).
|
||
[FN413] Id. <20> 581.
|
||
[FN414] 54 F. Supp at 100; Western Union Tel. Co. v. Lesesne, 182 F.2d
|
||
135 (4th Cir. 1950); O'Brien v. Western Union Tel. Co., 113 F.2d
|
||
539 (1st Cir. 1940).
|
||
[FN415] Anderson v. New York Tel. Co., 320 N.E.2d 647 (N.Y. 1974).
|
||
[FN416] People v. Lauria, 251 Cal. App. 2d 471 (1967).
|
||
[FN417] Charles, supra note 383, at 143.
|
||
[FN418] Id. at 123.
|
||
======================================================================
|
||
142 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
common carrier.
|
||
Like a common carrier, computer networks carry data from one
|
||
computer to another with no regard for the information being
|
||
transferred. Data that is transferred over a computer network
|
||
often consists of electronic mail being forwarded from an account
|
||
on a sending machine to an account on a receiving machine. Network
|
||
traffic may also contain confidential documents being passed from
|
||
computer to computer. Support for a "knowing" standard is gained
|
||
from the Electronic Communications Privacy Act of 1986[FN419] which
|
||
statutorily applies this standard to the interception and use of
|
||
intercepted E-mail and network communications. For a SYSOP to be
|
||
liable for a user's illegal use of the system, the SYSOP would
|
||
have to know or guess that the illegal use was going on, and he or
|
||
she would then be under an obligation to prevent such a use.
|
||
It is worth mentioning at this point that not all
|
||
communications over a common carrier are unregulated. There are
|
||
some uses of electronic common carriers which are forbidden: an
|
||
example is obscenity by phone. A recent issue with the growth of
|
||
900 telephone numbers has been "dial-a-porn," where people can
|
||
call a number and hear sexually oriented messages. The use of a
|
||
telephone to convey obscene, indecent, or harassing messages is
|
||
outlawed.[FN420] An exception is made for indecent telephone
|
||
messages, so long as provisions are used to prevent minors from
|
||
receiving these indecent messages.[FN421] Allowable safeguards
|
||
include: scrambling messages so they cannot be understood without
|
||
a descrambler, issuing a password by mail with age verification,
|
||
or requiring a credit card number before transmission of the
|
||
message.[FN422] While this statute applies only to communication over
|
||
a telephone, it does not distinguish between aural and data
|
||
communications. Without making this distinction, the statute may
|
||
also cover connecting to a bulletin board system or other service
|
||
which provides indecent material. If this statute were applied to
|
||
computer information systems, as it is applied to dial-a-porn,
|
||
SYSOPs would have to employ one of the same means of preventing
|
||
access to minors, and would have to make sure that the service
|
||
offered met the standards of constitutionally protected indecency
|
||
and that it did not cross the line into prohibited obscenity.[FN423]
|
||
--------------------------
|
||
[FN419] Electronic Communications Privacy Act of 1986, 18 U.S.C.
|
||
<EFBFBD>2510.
|
||
[FN420] 47 U.S.C. <20> 223.
|
||
[FN421] 47 C.F.R. <20> 64.201
|
||
[FN422] Id.
|
||
[FN423] See Sable Communications v. F.C.C., 492 U.S. 115 (1989).
|
||
======================================================================
|
||
143 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
As discussed earlier, there is no national standard for
|
||
obscenity. A SYSOP would have to be careful not to break the
|
||
obscenity laws in any state to which the computer information
|
||
system reached. With the ease of access of a computer information
|
||
system by means of a long distance telephone call, this would make
|
||
computer information systems subject to the obscenity laws of
|
||
every state. It is not hard to see how computer porn services
|
||
should be subject to regulation in the same form as dial-a-porn.
|
||
In both cases, the material being transmitted to the caller is the
|
||
same: for dial-a-porn the material is transmitted aurally; for
|
||
computer porn it is transmitted over a computer screen visually.
|
||
With a computer's ability to transmit images and sounds as well as
|
||
text, the justification for regulating computer distributed
|
||
indecent material is equal to or greater than the justification
|
||
for regulating standard audio dial-a-porn. The regulations on
|
||
dial-a-porn could simply be applied in a computer context. The
|
||
distribution means is essentially the same <20> a wire connection
|
||
from the sender to the receiver. In the case of dial-a-porn, this
|
||
wire is a telephone line. In the case of material transmitted by
|
||
computer, the wire is either a telephone line or a network
|
||
connection. The means of preventing access by minors could also be
|
||
made the same, regardless of the means of access; a password, a
|
||
credit card, or age verification by mail could still be required
|
||
to access the service.
|
||
|
||
D. Information System as Traditional Mail
|
||
|
||
Since a major use for computer information systems is sending
|
||
E-mail, it is only sensible to compare such a use to the U.S.
|
||
mail. The U.S. mail is a type of common carrier mandated expressly
|
||
by the Constitution.[FN424] U.S. mail, or "snail mail" is governed by
|
||
a statute which gives "regular" mail the same kind of privacy that
|
||
the Electronic Communications Privacy Act[FN425] gives E-mail. The
|
||
postal service act punishes
|
||
|
||
[w]hoever takes any letter ... out of any post office or
|
||
any authorized depository for mail matter, or from any
|
||
mail carrier, or which has been in any post office or
|
||
authorized depository, or in the custody of any letter
|
||
or mail carrier, before it has been delivered to the
|
||
person to whom it was directed, with design to obstruct
|
||
the correspondence, or to pry into the business or
|
||
secrets of another, or
|
||
--------------------------
|
||
[FN424] U.S. CONST. art. I, <20> 8.
|
||
[FN425] 18 U.S.C. <20> 2510.
|
||
======================================================================
|
||
144 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
opens, secretes, embezzles, or destroys the same ... .[FN426]
|
||
|
||
This statute has the same effect as the statutes specifically
|
||
geared towards electronic communications <20> it protects both mail
|
||
in transmission,[FN427] as well as mail being stored for the
|
||
recipient.[FN428] Just as the Electronic Communications Privacy Act
|
||
protects stored communications in the form of an E-mail
|
||
recipient's "mail box,"[FN429] so does the postal service protect a
|
||
"snail mail" recipient's mail box.[FN430] U.S. mail recipients have
|
||
certain protections which E-mail recipients may also create for
|
||
themselves. U.S. mail recipients can ask the post office to block
|
||
mail from particular senders who are distributing what the
|
||
receiver sees as sexually offensive mail.[FN431] However, the reason
|
||
for this protection from unpleasant U.S. mail <20> based on notions
|
||
of trespass[FN432] <20> could easily apply to E-mail and network
|
||
communications as well. In the case of electronic mail, a computer
|
||
program could be set up to automatically reject incoming mail from
|
||
certain senders. A program could also be used to search through
|
||
the text of an incoming message and reject any message which
|
||
contained certain terms which would indicate that the message's
|
||
contents were something which the receiver did not want to see.
|
||
The same similarity analysis between E-mail and the U.S. Mail
|
||
would work to preserve an advertiser's right to send out E-mail
|
||
for commercial purposes, just as commercial U.S. mail enjoys some
|
||
Constitutional protection.[FN433] The one significant bar to the
|
||
creation of a large junk E-mail industry is access. The U.S. mail
|
||
is a true common carrier and as such they do not prohibit material
|
||
based on advertising content. E-mail in many contexts may appear
|
||
to be a common carrier, but if it is sent over a company's
|
||
computer system, for instance, there may be no way for an
|
||
advertiser to gain access to the company's E-mail system.
|
||
Similarly, large networks, such as the Internet, exist for
|
||
educational purposes. While network authorities do not censor E-
|
||
mail, in keeping the network in line with the definition of a
|
||
common carrier, a user could still report a
|
||
--------------------------
|
||
[FN426] Mail, 18 U.S.C. <20> 1702.
|
||
[FN427] Compare <20> 1702 with E-mail, 18 U.S.C. <20> 2510.
|
||
[FN428] Compare <20> 1702 with <20> 2511.
|
||
[FN429] <20> 2511.
|
||
[FN430] <20> 1702; see also United States Postal Serv. v. Council of
|
||
Greenburgh Civic Ass'n, 453 U.S. 114 (1981).
|
||
[FN431] Rowan v. United States Postal Dep't, 397 U.S. 728 (1970).
|
||
[FN432] Id. at 737.
|
||
[FN433] Bolger v. Young Drug Prods. Corp., 463 U.S. 60 (1983).
|
||
======================================================================
|
||
145 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
company which was trying to advertise over the network. Since the
|
||
Internet is not meant to be used for profit making purposes, an
|
||
offending company reported by a user could be denied access privileges
|
||
to the network.
|
||
|
||
E. Information System as Traditional Bulletin Board
|
||
|
||
For centuries courts have been looking at liability for
|
||
notices posted on bulletin boards, bathroom walls, sides of
|
||
buildings, and wherever else defamatory material can be posted. In
|
||
the past few hundred years there has been little debate about
|
||
proprietor liability for the content of the "bulletin boards"
|
||
under its control. The law of Great Britain, as parent to the U.S.
|
||
legal system, is illustrative. The English Star Chamber in
|
||
Halliwood's Case (1601) held that "if one finds a libel, and would
|
||
keep himself out of danger, if it be composed against a private
|
||
man, the finder may either burn it or deliver it to a
|
||
magistrate."[FN434] A fairly modern case (1937) which is cited more
|
||
frequently in this country is Byrne v. Deane. This case involved a
|
||
poem, placed on the wall of a private golf club, which was alleged
|
||
to be defamatory of one of the club's members.[FN435] Judge Hilbery
|
||
held that the owners of the club could be held liable as
|
||
republishers of the defamation.[FN436] He based this conclusion on
|
||
the fact that the club owners had complete control of the walls of
|
||
the club;[FN437] they had seen the poem;[FN438] they could have removed
|
||
it;[FN439] and yet they did not.[FN440] In the words of Judge Greer, "by
|
||
allowing the defamatory statement ... to rest upon their wall and
|
||
not to remove it, with the knowledge that they must have had that
|
||
by not removing it it would be read by people to whom it would
|
||
convey such meaning as it had, were taking part in the publication
|
||
of it."[FN441]
|
||
Courts in this country have made rulings on the posting of
|
||
defamatory material since at least 1883. Woodling v.
|
||
Knickerbocker[FN442] involved two placards left on a table at a
|
||
furniture dealer,
|
||
--------------------------
|
||
[FN434] As quoted in Byrne v. Deane, 1 K.B. 818, 824 (Eng. C.A. 1937).
|
||
[FN435] Id. at 818. The case finally held against the plaintiff on the
|
||
grounds that the message was not defamatory. Id.
|
||
[FN436] Id. at 820.
|
||
[FN437] Id. at 821.
|
||
[FN438] Id. at 838.
|
||
[FN439] Id.
|
||
[FN440] Id.
|
||
[FN441] Id.
|
||
[FN442] Woodling v. Knickerbocker, 17 N.W. 387 (Minn. 1883).
|
||
======================================================================
|
||
146 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
one which read, "[t]his was taken from Dr.
|
||
Woodling as he would not pay for it; for sale at a bargain,"[FN443]
|
||
and the other which read, "Moral: Beware of dead-beats."[FN444] The
|
||
court found for the plaintiff, holding that regardless of who left
|
||
the sign, anyone who allowed or encouraged its placement, or who
|
||
had authority to remove the sign after it was placed, could be
|
||
held liable for its publication.[FN445] Importantly, the court also
|
||
discussed the liability of one of the furniture store owners who
|
||
had not seen the defamation.[FN446] The court said that she could not
|
||
be held liable for her partner's nonfeasance in removing the sign
|
||
because there was no way to imply that she had given him authority
|
||
to act as a publisher of defamatory material, and this was beyond
|
||
the scope of their business.[FN447] This situation was contrasted
|
||
with that of a business involved in publishing or selling books or
|
||
magazines.[FN448] In the case of a publisher or seller, all of the
|
||
partners are to be regarded as having given authority to the other
|
||
partners in deciding what to publish or sell, and therefore all of
|
||
the partners are to be held liable for defamation.[FN449] This
|
||
implies that a SYSOP who either does not monitor the content of
|
||
publicly accessible parts of the system under his or her control,
|
||
or a SYSOP or computer information system owner who delegates such
|
||
responsibility may still be held liable for defamatory material.
|
||
Fogg v. Boston & L. R. Co.[FN450] supports this theory. In this
|
||
case, a newspaper article defaming a ticket broker was posted in
|
||
the defendant's railway office.[FN451] The court held that a jury
|
||
could properly have found that the defendant, by way of its
|
||
agents, had knowledge of what was posted in its office.[FN452] Also,
|
||
by not having it removed in a timely manner the company could be
|
||
construed as having endorsed or ratified the posting of the
|
||
defamatory article, even if it had not been responsible for its
|
||
posting in the first place.[FN453]
|
||
Hellar v. Bianco is a case in which the proprietor of an
|
||
establish-
|
||
--------------------------
|
||
[FN443] Id.
|
||
[FN444] Id.
|
||
[FN445] Id.
|
||
[FN446] Id.
|
||
[FN447] Id.
|
||
[FN448] Id.
|
||
[FN449] Id.
|
||
[FN450] Fogg v. Boston & L. R. Co., 20 N.E. 109 (Mass. 1889).
|
||
[FN451] Id.
|
||
[FN452] Id. at 110.
|
||
[FN453] Id.
|
||
======================================================================
|
||
147 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
ment was originally unaware of the defamation, and this
|
||
case raised the issue as to what constituted a reasonable time to
|
||
remove defamatory posts once a proprietor is made aware of their
|
||
existence.[FN454] Hellar involved "libelous matter indicating that
|
||
appellant was an unchaste woman who indulged in illicit amatory
|
||
ventures"[FN455] which was scrawled on a men's room wall of a
|
||
tavern.[FN456] After the woman who was the subject of the note began
|
||
getting calls about the graffiti, the bartender was asked to have
|
||
the message removed.[FN457] Later that evening, when it was not
|
||
removed, the tavern owner was charged with republication of the
|
||
libel.[FN458] The court held that republication occurred when the
|
||
bartender knew of the libel, and had an opportunity to remove it,
|
||
but did not do so.[FN459] In this set of circumstances, a short
|
||
period of time was sufficient to constitute republication.
|
||
A longer period of time was found not to constitute
|
||
republication in Tacket v. General Motors Corp.[FN460] Tacket
|
||
involved a defamatory sign posted in a GM factory.[FN461] The court
|
||
said that it was conceivable that it could take three days to
|
||
remove a sign because of the speed at which large bureaucracies
|
||
work.[FN462] The court did say that a second sign which had been
|
||
posted for seven or eight months was different and that a lengthy
|
||
time of posting without removal could be found by a jury to be
|
||
republication by implied ratification.[FN463]
|
||
A more recent case, Scott v. Hull,[FN464] appears, at first
|
||
glance, to hold in a manner contrary to these earlier cases. In
|
||
Scott, graffiti defaming the plaintiff was written on the side of
|
||
a building.[FN465] The plaintiff told the defendant about the
|
||
graffiti and asked that it be removed; the defendant refused.[FN466]
|
||
The court held that the building owners were not liable as
|
||
republishers, and they were under no duty to remove the
|
||
graffiti.[FN467] The reasoning behind this decision is
|
||
--------------------------
|
||
[FN454] Hellar v. Bianco, 244 P.2d 757 (Cal. Ct. App. 1952).
|
||
[FN455] Id. at 758.
|
||
[FN456] Id.
|
||
[FN457] Id. at 759.
|
||
[FN458] Id.
|
||
[FN459] Id.
|
||
[FN460] Tacket v. General Motors Corp., 836 F.2d 1042 (7th Cir. 1987).
|
||
[FN461] Id. at 1043-34.
|
||
[FN462] Id. at 1047.
|
||
[FN463] Id.
|
||
[FN464] Scott v. Hull, 259 N.E. 160 (Ohio Ct. App. 1970).
|
||
[FN465] Id. at 160.
|
||
[FN466] Id. at 161.
|
||
[FN467] Id. at 162.
|
||
======================================================================
|
||
148 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
that the viewing of the graffiti was not at the invitation of the
|
||
owners <20> as it was in the earlier cases.[FN468]
|
||
In Scott v. Hull, the graffiti was on the outside of the
|
||
defendant's building.[FN469] It was placed there by strangers and
|
||
read by strangers.[FN470] The defamation was not put there by an act
|
||
of the defendant, and the court refused to find liability for
|
||
nonfeasance in this instance.[FN471] In Hellar,[FN472] the defamation
|
||
was "published" in the restroom on the defendant's premises. The
|
||
graffiti was placed there by invitees of the defendant,[FN473] and
|
||
was read by other invitees.[FN474] Byrne v. Deane,[FN475] Woodling v.
|
||
Knickerbocker,[FN476] and Tacket v. General Motors Corp.[FN477] are
|
||
similar to Hellar. The same was true in Fogg v. Boston & L. R.
|
||
Co.,[FN478] except there the defamation was even related to the
|
||
defendant's business.
|
||
Invitee analysis of defamation raises two issues involving
|
||
computer information systems. First, can someone post "outside" of
|
||
a computer? An example of this might be someone who defames
|
||
someone by electronic mail sent from one user on a computer to
|
||
several others. If the injured party sued the operator of a
|
||
bulletin board which also runs on that computer, the invitee
|
||
analysis would indicate that the BBS operator could not be held
|
||
liable. This would make sense assuming the BBS SYSOP has nothing
|
||
to do with the electronic mail, and has no control over the mail
|
||
system. Although the offending message is on the same computer as
|
||
the bulletin board system, the mail does not appear on the
|
||
computer at the request of the BBS operator, unlike a post left by
|
||
a user invited to use the BBS. Messages sent by E-mail would go
|
||
beyond the scope of the BBS's invitation; therefore it would be
|
||
unreasonable to hold the bulletin board operator liable as
|
||
responsibility would fall on the operator of the mail system. If,
|
||
however, the BBS operator had been given the power to remove an
|
||
offending message left anywhere on the computer system, then an
|
||
agency argument would say that the BBS SYSOP has the duty to
|
||
remove the of-
|
||
--------------------------
|
||
[FN468] Id.
|
||
[FN469] Id. at 160.
|
||
[FN470] Id.
|
||
[FN471] Id. at 162.
|
||
[FN472] 244 P.2d at 757.
|
||
[FN473] Id.
|
||
[FN474] Id.
|
||
[FN475] 1 K.B. at 818.
|
||
[FN476] 17 N.W. at 387.
|
||
[FN477] 836 F.2d at 1042.
|
||
[FN478] 20 N.E. at 109.
|
||
======================================================================
|
||
149 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
fending message, or have someone else do it. This is
|
||
similar to the case of graffiti in a bar <20> a bartender could not
|
||
easily claim immunity from a defamation charge with the argument
|
||
that removing graffiti was not the job of a the bartender. If the
|
||
bartender is not hired to clean, the bartender could at least
|
||
inform someone who was, rather than leave the defamatory graffiti
|
||
in place.
|
||
The second issue the invitee analysis raises is messages
|
||
posted by someone who is clearly not an invitee, for instance, a
|
||
computer hacker who is essentially a trespasser. In this
|
||
situation, a SYSOP should likely be required to remove any
|
||
defamatory messages left by a hacker under the same reasoning as
|
||
the above cited cases. These cases all assume that the writing was
|
||
left by an invitee raising the presumption that the SYSOP is aware
|
||
of the message, so just because defamatory messages are left by a
|
||
trespasser does not mean the SYSOP or building owner should be any
|
||
less liable if they know of the message, have the opportunity to
|
||
remove it, and yet do not do so.
|
||
|
||
F. Information System as Broadcaster
|
||
|
||
With the rise of packet radio and radio WANS (wireless
|
||
networks), the analogy of a computer information system as
|
||
broadcaster is also of growing importance. Authority to govern
|
||
broadcasting is given to the F.C.C. under the Communications Act
|
||
of 1934.[FN479] The justification for content regulation over the
|
||
airwaves is "spectrum scarcity." There are only so many radio and
|
||
television stations that can be on the air at once. "Without
|
||
government control, the medium would be of little use because of
|
||
the cacophony of competing voices, none of which could be clearly
|
||
and predictably heard."[FN480] In order to preserve the "market place
|
||
of ideas" from monopolization, the F.C.C. governs the use of the
|
||
airwaves to preserve the rights of viewers and listeners to be
|
||
informed.[FN481] An equal concern is to protect children from
|
||
inappropriate material; this is especially true because of radio
|
||
and television's special reach <20> they can even bring indecent
|
||
messages to those children too young to read.[FN482] Radio and
|
||
television are given special treatment, including the "channeling"
|
||
of constitu-
|
||
--------------------------
|
||
[FN479] Communications Act of 1934, 47 U.S.C. <20> 301.
|
||
[FN480] Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367, 376 (1969).
|
||
[FN481] Id. at 390.
|
||
[FN482] F.C.C. v. Pacifica Foundation, Inc., 438 U.S. 726, reh'g
|
||
denied, 439 U.S. 883 (1978).
|
||
======================================================================
|
||
150 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
tionally protected speech, because:
|
||
|
||
1. children have access to radios and in many cases are
|
||
unsupervised by parents; 2. radio receivers are in the
|
||
home, a place where people's privacy interest is
|
||
entitled to extra deference; 3. unconsenting adults may
|
||
tune in a station without any warning that offensive
|
||
language is being or will be broadcast; and 4. there is
|
||
a scarcity of spectrum space, the use of which the
|
||
government must therefore license in the public
|
||
interest.[FN483]
|
||
|
||
These facts allow the F.C.C. to promulgate rules to channel
|
||
constitutionally protected "indecent" speech to times of the day
|
||
when children are not as likely to be in the listening audience,
|
||
but the F.C.C. may not altogether prohibit indecent speech.[FN484]
|
||
The four factors justifying channeling of speech do not work
|
||
very well when applied to wired computer communication, such as
|
||
computer information systems. No spectrum scarcity issue is
|
||
involved when calling a computer information system. Any indecent
|
||
material available via computer must be actively sought, as there
|
||
is a reduced risk of having the telephone ring and being
|
||
spontaneously assaulted by a computer spewing lewd data.[FN485] While
|
||
computers, like radio receivers, are in the home, it takes an
|
||
active effort to obtain indecent material via computer, so the
|
||
risks of accidental exposure to such material at issue in the
|
||
broadcasting situation are just not present. Finally, although
|
||
children do have unsupervised access to computers, they also may
|
||
have some potential unsupervised access to dial-a-porn and cable
|
||
television. Neither dial-a-porn nor cable are restricted as
|
||
severely as broadcasting. As far as the four factors justifying
|
||
channeling of indecent speech applying to wireless data
|
||
transmission (packet radio, radio-WAN), the element of spectrum
|
||
scarcity comes back into play, giving the F.C.C. more of a reason
|
||
to regulate computer communications sent via the airwaves.
|
||
However, it is less likely that offensive material will
|
||
accidentally be received, since data being broadcast may be
|
||
encrypted in order to avoid its unauthorized interception by
|
||
minors.
|
||
As well as channeling indecent speech, the other exceptions and
|
||
--------------------------
|
||
[FN483] Id. at 731.
|
||
[FN484] Action for Children's Television v. F.C.C., 932 F.2d. 1504
|
||
(D.C. Cir), reh'g denied, 1991 U.S. App. LEXIS 25527, reh'g denied
|
||
1991 U.S. App. LEXIS 25425 (1991) (en banc).
|
||
[FN485] It is possible for telemarketers to use computers for phone
|
||
solicitation; it is similarly possible for an individual to prompt
|
||
a computer to make lewd or obscene phone calls.
|
||
======================================================================
|
||
151 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
guarantees of free speech that apply to publishers apply to
|
||
broadcasters. For instance, a broadcaster does not have the right
|
||
to make defamatory statements with knowing or reckless disregard
|
||
for the truth.[FN486]
|
||
Cable television and cable audio signals are governed in a
|
||
similar fashion to regular broadcasting. These services are seen
|
||
as an "ancillary" services to broadcasting, and therefore fall
|
||
under the F.C.C.'s authority.[FN487] Like computer information
|
||
systems, but unlike broadcasting, cable television must be
|
||
actively brought into the home. Because of this, cable television
|
||
traditionally was not seen as being as "pervasive" as
|
||
broadcasting, and therefore the Pacifica[FN488] obscenity standard
|
||
traditionally was not extended to cable.[FN489] Recent cable
|
||
television regulation, however, acknowledges the growth of cable,
|
||
which now reaches nearly sixty per cent of all television
|
||
households.[FN490] The Communications Act of 1934[FN491] allowed a cable
|
||
franchising authority to prohibit or restrict any service that "in
|
||
the judgment of the franchising authority is obscene, or is in
|
||
conflict with community standards in that it is lewd, lascivious,
|
||
filthy, or indecent or is otherwise unprotected by the
|
||
Constitution of the United States." The 1992 amendments to the
|
||
Communications Act allow a cable operator to establish a policy of
|
||
excluding "programming that the cable operator reasonably believes
|
||
describes or depicts sexual or excretory activities or organs in a
|
||
patently offensive manner as measured by contemporary community
|
||
standards."[FN492] Thus, this standard taken from Pacifica now can be
|
||
applied to cable television. The new amendments require the F.C.C.
|
||
to create regulations to channel indecent material onto a single
|
||
cable channel which must then be blocked out unless requested in
|
||
writing by the subscriber, thus preventing access by minors.[FN493]
|
||
Also, analogous to the postal service statutes, the new cable
|
||
regulations add a provision for service users to have the service
|
||
provider block out unsolicited sexually explicit materials on
|
||
re-
|
||
--------------------------
|
||
[FN486] Adams v. Frontier Broadcasting Co., 555 P.2d 556 (Wyo. 1976).
|
||
[FN487] Mail, 47 U.S.C. <20> 151; see also United States v. Midwest Video
|
||
Corp., 406 U.S. 649 (1972).
|
||
[FN488] 438 U.S. at 726.
|
||
[FN489] Community Television, Inc. v. Roy City, 555 F. Supp. 1164 (D.
|
||
Utah 1982); Cruz v. Ferre, 755 F.2d 1415 (11th Cir. 1985).
|
||
[FN490] Cable Television Consumer Protection and Competition Act of
|
||
1992, Pub. L. No. 102-385, <20> 2(3), 106 Stat. 1460.
|
||
[FN491] 47 U.S.C. <20> 532(h).
|
||
[FN492] Cable Television Consumer Protection Act of 1992, <20>10(a)(2).
|
||
[FN493] Id. <20> 10(b).
|
||
======================================================================
|
||
152 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
quest.[FN494] Because wired computer networks are more like cable,
|
||
cable provides a better analogy than broadcasting. In fact, as
|
||
mentioned earlier, teletext services are usually provided over
|
||
cable television.
|
||
The use of computers over the air waves is currently
|
||
limited, but it promises to increase in the future as technology
|
||
advances. In any case, because computer data can be easily
|
||
encrypted, radio networks do not share the same need for content
|
||
restrictions that broadcasters require. While cable television is
|
||
a better analogy for traditional computer information systems than
|
||
is broadcasting, some of the other regulatory schemes still fit
|
||
computer information systems more tightly. This is because
|
||
computer information systems do not provide the same sorts of
|
||
services as cable television. Rather, computers are used as the
|
||
common carriers, bulletin boards, and electronic presses that have
|
||
already been discussed.
|
||
|
||
VIII. Suggestions for Regulation
|
||
|
||
Now that the current regulatory environment of computer
|
||
information systems has been discussed, we are left wondering how
|
||
well the regulations function to control Cyberspace. Many people
|
||
fear that the current law does not effectively protect the rights
|
||
of voyagers through Cyberspace. This has given rise to groups such
|
||
as Computer Professionals for Social Responsibility[FN495] and the
|
||
Electronic Frontier Foundation.[FN496] Groups such as these work to
|
||
increase access to technology for the general masses; to help
|
||
legislatures understand what it is they are regulating; to help
|
||
aid in the passing of responsible, workable, laws; and, where
|
||
necessary, to help defend people whose rights are being violated
|
||
because of legislation which does not properly cover computer
|
||
information systems. Constitutional law professor Laurence Tribe
|
||
has even proposed a new amendment to the Constitution to protect
|
||
individuals from such violations of their rights. His proposed
|
||
amendment reads:
|
||
|
||
This Constitution's protections for the freedoms of
|
||
speech, press, petition, and assembly, and its
|
||
protections against unreasonable searches and seizures
|
||
and the deprivation of life, liberty, or property
|
||
--------------------------
|
||
[FN494] Id. <20> 15.
|
||
[FN495] Katy Ring, Computer Professionals for Social Responsibility
|
||
Seeks to Change Lay Preconceptions, COMPUGRAM INT'L, Oct. 9, 1990.
|
||
[FN496] John P. Barlow, Crime and Puzzlement: In Advance of the Law on
|
||
the Electronic Frontier; Cyberspace, WHOLE EARTH REV., Sept. 22,
|
||
1990, at 44.
|
||
======================================================================
|
||
153 E-Law Copyright 1992-1993 by David Loundy
|
||
|
||
without due process of law, shall be construed as fully
|
||
applicable without regard to the technological method or
|
||
medium through which information content is generated,
|
||
stored, altered, transmitted, or controlled.[FN497]
|
||
|
||
This amendment would serve to ensure that the speech and privacy
|
||
right that we currently enjoy in other media would be applied to
|
||
electronic communications as well. An amendment such as this would
|
||
avoid incidents like the raid on Steve Jackson Games. This
|
||
amendment would serve to guarantee that a computer bulletin board
|
||
publishing the contemporary editor's message would enjoy the same
|
||
constitutional protection as the print publisher's printing press.
|
||
Some authors focus more on how liability should be assessed
|
||
and damages determined in a new medium which offers the
|
||
opportunity for violation of rights on an instantaneous, global
|
||
scale. For example, one author believes that SYSOPs should be at
|
||
least jointly liable with the poster of the offending
|
||
material.[FN498] He argues that the average subscriber to a BBS does
|
||
not have the resources to compensate adequately for injuries
|
||
caused by the potentially widespread reach of offending
|
||
material.[FN499] Also, it may not even be able to discover the reach
|
||
of offending material.[FN500] Copyrighted material could be spread
|
||
from computer to computer all over the world after just one file
|
||
transfer.[FN501]
|
||
Others want to simplify the issue of system operator
|
||
liability by holding the SYSOP liable, in addition to the original
|
||
poster, as a means of compensating victims and deterring computer
|
||
crime.[FN502] These people argue that SYSOPs should be liable for
|
||
content because they are easier to track down than the users who
|
||
posted the offending material, and also, by holding them liable,
|
||
SYSOPs are more likely to work at deterring others from the use of
|
||
their service for inappropriate purposes.
|
||
What is necessary to regulate computer information system
|
||
content and system operator liability is, first and foremost, an
|
||
understanding of the technology. The law is a slow evolving,
|
||
tradi-
|
||
--------------------------
|
||
[FN497] Laurence Tribe Proposed Constitutional Amendment, available
|
||
over Internet, by anonymous FTP, at FTP.EFF.ORG (Electronic
|
||
Frontier Foundation).
|
||
[FN498] See generally Charles, supra note 383.
|
||
[FN499] Id.
|
||
[FN500] Id.
|
||
[FN501] Id.
|
||
[FN502] Johnathan Gilbert, Computer Bulletin Board Operator Liability
|
||
for User Misuse, 54 FORDHAM L. REV. 439, 441 (1985).
|
||
======================================================================
|
||
154 ALB. L. J. SCI. & TECH. [Vol. 3 1993]
|
||
|
||
tion-bound beast. Computers are an upstart technology
|
||
pioneered by people who do things like create viruses to let loose
|
||
on their friends in order to hone their programming skills.[FN503] If
|
||
judges, juries, lawyers and legislators do not understand current
|
||
technology, the technology will have changed before the law
|
||
catches up to it. Many of our current laws will work well if
|
||
adapted to computer information systems. The Electronic
|
||
Communications Privacy Act of 1986[FN504] works well to regulate
|
||
electronic mail because it is modeled after the statute that
|
||
governs the U.S. mail.[FN505] For many people, these new
|
||
communications fora are direct replacements for the ones that they
|
||
represent; therefore they should be regulated like the ones they
|
||
represent. This may entail using several different regulatory
|
||
schemes, but this should not be too difficult to employ by people
|
||
who understand the technology at issue <20> simply regulate E-mail
|
||
like U.S. mail, regulate networks like common carriers, etc. It
|
||
would not be difficult to employ the correct legal analogy if the
|
||
computer information service at issue is looked at from the point
|
||
of view of the user. Where novel legislation is needed is in
|
||
defining terms to be used in the developing law. An example is
|
||
trespassing. If someone hacks into a computer system, is he or she
|
||
breaking and entering, or is the situation more analogous to
|
||
someone making a prank telephone call?
|
||
Tribe's proposed Constitutional amendment is similar to a
|
||
modern day spelling out of a natural law concept. The law already
|
||
exists, so it should be assumed that the Constitution covers all
|
||
technologies equally, including Cyberspace. In theory an amendment
|
||
to the Constitution is not necessary; however, a new amendment
|
||
would leave no doubts and would make for streamlined judicial
|
||
decisions. As computer information systems grow in popularity and
|
||
scope, older media will pass away. The structure already exists to
|
||
regulate the new technology, because, in essence, the new
|
||
technology is just a new incarnation of the old.
|
||
--------------------------
|
||
[FN503] See Branscomb, supra note 181, at 7-11.
|
||
[FN504] 18 U.S.C. <20> 2511.
|
||
[FN505] 18 U.S.C. <20> 1702.
|
||
|