home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 101.4 KB | 2,235 lines | [TEXT/EDIT] |
-
- D E F A M A T I O N L I A B I L I T Y
- O F
- C O M P U T E R I Z E D
- B U L L E T I N B O A R D O P E R A T O R S
- A N D P R O B L E M S O F P R O O F
-
-
-
- John R. Kahn
- CHTLJ Comment
- Computer Law Seminar
- Upper Division Writing
- February, 1989
-
-
- ---
- D E F A M A T I O N L I A B I L I T Y
- O F
- C O M P U T E R I Z E D
- B U L L E T I N B O A R D O P E R A T O R S
- A N D P R O B L E M S O F P R O O F
-
- John R. Kahn
- CHTLJ Comment/Upper Division Writing/Computer Law Seminar
-
- February, 1989
-
- _________________________________________________________________
-
- I. INTRODUCTION
-
- A computer user sits down at her personal computer,
- turns it on, and has it dial the number of a local computerized
- bulletin board service (BBS) where she has been exchanging
- opinions, information, electronic mail, and amicable
- conversation with other users. Upon connecting with the BBS, she
- enters a secret "password", presumably known only to herself and
- to the bulletin board operator, so as to gain access to the
- system.
-
- To her surprise, she finds herself deluged with lewd
- electronic mail from complete strangers and hostile messages
- from persons with whom she believed she was on friendly terms.
- The messages read: "Why did you call me a worthless son-of-a ----
- - yesterday? I really thought we could be friends, but I guess I
- was wrong"; "Hey, baby, I liked your fetish you were telling me
- about yesterday: call me at home, or I'll call YOU"; and, "Why
- didn't you get around to telling me about your venereal disease
- sooner?". Yet our user has not called this BBS in weeks and has
- never made any of these statements. Dismayed and angered, the
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 2
- ----------------------
-
- user comes to realize that she is the victim of computerized
- bulletin board abuse.
-
- A personal computer hobbyist (hereafter "SYSOP") who
- operates a computerized bulletin board system notices a rash of
- heated arguments, profanity and complaints being reported to him
- by users on what had been a forum for the peaceful exchange of
- ideas. Investigating the complaints, he discovers that
- previously responsible users have suddenly and
- uncharacteristically been leaving insulting, rude and false
- messages about other users on the bulletin board. One user is so
- enraged about a public message accusing her of sexual
- misadventures that she is threatening to sue the computer
- hobbyist in libel for having permitted the message to appear.
- The SYSOP realizes that both he and his subscribers have
- suffered computerized bulletin board abuse.
-
- The aggravating force behind both the above situations
- is most likely a third user (known hereafter as "the
- masquerader") who maliciously exploits both his computer
- knowledge and his access to BBSes. Since the masquerader has
- discovered the password and name of the regular user, and uses
- them to access bulletin boards, he appears for all intents and
- purposes to be that regular user. The computer thus believes it
- has admitted a legitimate subscriber to its database when it has
- in fact given almost free reign to a reckless hacker. The
- masquerader, posing as another legitimate user, is then free to
- portray that user in whatever light he pleases and also to
- harass other users of the bulletin board.
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 3
- ----------------------
-
-
- When validated users later discover that someone else
- has been impersonating them, they invariably cancel their
- subscriptions to that BBS and often bring a defamation action
- against its SYSOP for the smearing of their good names.
- Conversely, the SYSOP, in an effort to avoid liability,
- reluctantly engages in monitoring each and every piece of
- information posted daily by hundreds of users. If the SYSOP
- chooses instead to stop running his BBS altogether, another
- efficient and valuable forum for ideas is lost.
-
- What sort of defamation action may be maintained by the
- wrongfully disparaged user? Is the computerized bulletin board
- offered by the SYSOP subject to the stricter self-scrutiny of
- newspapers, or does it operate under some lesser standard? How
- may the initial party at fault - the masquerader - be held
- accountable for his computerized torts?
-
- The scope of this Comment will be to examine the
- defamation liability of computerized BBS operators and
- evidentiary proof issues that arise in tracing computerized
- defamation to its true source. Other possible Tort causes of
- action - intentional infliction of emotional distress, invasion
- of privacy, trespass to chattels - are not addressed. It is
- assumed throughout that the plaintiff is a private person and
- that the issues involved are not matters of "public interest" as
- defined in Gertz v. Robert Welch, Inc.1
-
-
- A. Background
-
- Computerized BBSes exist as a quick, easy and efficient
- way to acquire and exchange information about the entire
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 4
- ----------------------
-
- spectrum of interests.2 The growing popularity of these
- electronic forums was demonstrated in a recent study which
- numbered BBSes at more than 3,500 nationwide.3 The size and
- complexity of computerized BBSes range from relatively simple
- programs, run on privately-owned microcomputers with a few
- hundred subscribers, to vast, multi-topic database systems with
- nationwide lists of subscribers and operated for profit.4
-
- The process of reaching, or "accessing" one of these
- bulletin boards is quite simple: all that is required is a
- computer, a computer program that allows the computer to
- communicate over the phone lines, and a "modem" (a device which
- converts the computer's electrical signals into acoustic
- impulses, defined infra).5 Once she has accessed the BBS, the
- caller is free to trade useful non-copyrighted computer
- programs, exchange ideas on a host of topics, post electronic
- mail for later reading by others, and much more.6 The ease with
- which most BBSes may be accessed and the wealth of interests to
- be found there ensure that they will continue to be important
- sources of information and discourse.
-
- However, the speed and efficiency of computerized BBSes
- also subject them to serious, wide-ranging civil and criminal
- abuse. Recently a young computer user paralyzed several major
- computer systems across the nation by sending a harmful computer
- program (or "worm") to them over telephone lines. The worm
- quickly replicated itself in the computers' memories and thus
- decreased their output capacities.7 Further, certain computer
- abusers (known as "hackers") use the power of the computerized
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 5
- ----------------------
-
- forum to ply illegal copies of copyrighted programs, bilk
- hundreds of millions of dollars annually from credit card and
- phone companies, and to wrongfully access others' data files.8 A
- minority of other BBSes exist mainly to circulate racist
- ideologies.9
-
- What is more, it now appears that the ancient tort of
- defamation is actively being practiced through the use of
- computerized BBSes.10 Due to the almost ethereal way
- computerized BBSes operate - one person may conveniently leave
- an electronic message for others to respond to at their leisure
- and there is no need for the parties to converse directly or
- even to know each other11 - the risk of detection when the BBS
- is abused is lower than that for defamation practiced in the
- print media.12 Difficulties arise with identifying the true
- party at fault and with authenticating the computer records as
- evidence of the defamation.13 Adding to this problem is an
- uncertainty in the laws concerning the appropriate liability of
- SYSOPs for defamatory messages on their BBSes of which they were
- unaware.14
-
-
- B. Definitions
-
- The following are brief definitions of some important
- technical terms connected with electronic BBSes:
-
- SYSOP: An abbreviation for "System Operator", this is
- the individual generally responsible for organizing information
- and for trouble-shooting on a computerized bulletin board. On
- larger bulletin boards covering hundreds of topics, several
- SYSOPS may be in charge of maintaining information contained in
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 6
- ----------------------
-
- separate discrete fields.15 But when the BBS is privately owned
- and operated, a single SYSOP may very well oversee all aspects
- of the board's operations, in addition to being able to access
- all his users' passwords and personal information.16
-
- Modem: An abbreviation for "Modulator/Demodulator".
- This is a device which links a computer to an ordinary phone
- line and converts computer signals to auditory phone signals. A
- computer modem on the other end of the transmission then
- reverses the process. Computers using modems transfer data
- rapidly across phone lines and thus share information.17
-
- Validation: Basically this is a set of procedures used
- by responsible SYSOPs to do everything reasonably possible to
- verify that the personal information supplied by a user is true
- and correct. Common sense and emerging legal standards dictate
- that the SYSOP should not merely rely on the name provided by a
- potential user when the SYSOP does not personally know that
- individual. The SYSOP may be required to independently
- corroborate the prospective subscriber's information by first
- asking the potential user's name, address and phone number and
- then by checking that information with directory assistance.18
- These procedures will hopefully aid the operator in identifying
- wrongdoers if misuse occurs;19 however, as will be seen, these
- procedures are by no means foolproof.
-
- Database: Any collection of data in a computer for
- purposes of later retrieval and use, i.e., names, addresses,
- phone numbers, membership codes, etc.
-
- User: Anyone who accesses a computerized bulletin board
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 7
- ----------------------
-
- system and is exposed to the information stored there. Users may
- be identified by their true names, by an assigned numerical
- code, or by colorful "handles", or "usernames."20
-
- Operating System: This is a program which controls the
- computer's basic operations and which recognizes different
- computer users so that their actions do not interfere with one
- another.21 For example, most multi-user operating systems will
- not allow one user to delete another's data unless the second
- user gives explicit permission.22 BBS system software programs
- perform this function through their use of "accounts" and
- "passwords":23 private electronic mail sent to a particular user
- may not be read or deleted by others. The BBS' operating system
- is also designed to deny access to those attempting to log on
- under an unvalidated or unrecognized name.24
-
- Account/Username: As another part of BBS system
- security, each user chooses an "account", or "username",
- consisting of one to eight letters or numbers.25 The BBS'
- operating system then will not allow commands issued by one user
- of one account to modify data created by another account;26 nor
- will it grant access to an account that has been terminated or
- invalidated.
-
- Password: Yet another aspect of BBS system security is
- the use of "passwords" as a prerequisite to accessing the
- computer system. Most operating systems require the user to
- enter both her account name and password to use the account.27
- Because electronic mail cannot be sent without the username to
- which it is being addressed, and because the account cannot be
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 8
- ----------------------
-
- used without knowledge of the password, usernames are generally
- public knowledge while passwords are a closely-guarded secret,
- known only to the user and the operating system.28
-
- Teleprocessing: This is defined as accessing a computer
- from a remote location, usually over a telephone line or similar
- communications channel.29
-
- Uploading/Downloading: For purposes of exchanging
- computer programs or electronic mail over the phone lines, the
- process of transferring information from one's personal computer
- to the bulletin board is called uploading. The reverse process -
- transferring information from a bulletin board to a personal
- computer - is known as downloading.30
-
- II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS
-
- A. Computerized Defamation: Libel or Slander?
-
- Libel is the "publication of defamatory matter by
- written or printed words, by its embodiment in physical form, or
- by any other form of communication that has the potentially
- harmful qualities characteristic of written or printed words."31
- Publication of a defamatory matter is "its communication
- intentionally or by a negligent act to one other than the person
- defamed."32 A communication is defamatory if it "tends to so
- harm the reputation of another as to lower him in the estimation
- of the community or to deter third persons from associating or
- dealing with him."33 The difference between libel and slander
- has traditionally depended upon the form of the communication:
- oral defamation generally is considered slander, while written
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 9
- ----------------------
-
- defamation is generally considered libel.34 The distinction is
- important, because libel requires no proof of special damages
- and is actionable by itself, while slander generally requires
- proof of special damages in order to be actionable.35
-
- However, with the advent of electronic media, the
- traditional libel/slander distinctions as they apply to sight
- and hearing are no longer valid. For example, passing defamatory
- gestures and signals, though visible to sight, were considered
- slander;36 an ad-libbed statement on a telecast impugning a
- person's financial status was found to be libel.37
-
- It has been suggested that the real distinction between
- libel and slander is the threat and magnitude of harm to
- reputation inherent in the form of publication.38 Libel has been
- historically associated with writings because (1) a writing is
- made more deliberately than an oral statement; (2) a writing
- makes a greater impression to the eye than does an oral
- statement to the ear; (3) a writing is more permanent than
- speech; and (4) a writing has a wider area of dissemination than
- speech.39 These four qualities inherent in a writing made the
- possible harm to reputation greater than mere spoken words. In
- applying libel to the new form of computerized communication
- used on BBSes, the potentiality for harm to reputation is
- significant, and should again be considered the controlling
- factor.
-
- In our hypothetical situation, the user discovered that
- another user (the masquerader) had usurped her account name and
- password, causing her great embarrassment and humiliation. The
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 10
- ----------------------
-
- act of prying into and taking another's computer information to
- misuse it elsewhere would indicate a certain deliberation on the
- actor's part to spread defamatory messages. Secondly, the
- defamatory message is displayed to other users on their computer
- monitors in the form of electronic characters, making a visual
- impression. Third, this electronic defamation is more permanent
- than mere words because it is stored in the BBS' memory until
- erased by the user or SYSOP. Finally, the message arguably has a
- wider area of dissemination than a one-to-one spoken defamation
- because, as a message on an electronic BBS, it has the potential
- of being viewed by hundreds, perhaps thousands, of users each
- day. Based on these four criteria, the capacity for harm to our
- user's reputation due to the masquerader's activities is indeed
- great enough to be considered libellous.
-
- B. Defamation Liability of the SYSOP
-
- Having established the electronic message as being
- libellous, the next issue is to determine the extent of
- liability for the SYSOP who unknowingly permits the message to
- be communicated over his BBS. Case law indicates that the
- SYSOP's liability depends upon the type of person defamed and on
- the subject matter of the defamation.
-
- 1. Degree of fault required
-
- The United States Supreme Court has addressed modern
- defamation liability in two major decisions. Both conditioned
- the publisher's liability on the type of person defamed and on
- the content of the defamation. In New York Times v. Sullivan,40
- the Court determined that in order for a public official to
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 11
- ----------------------
-
- recover damages in a defamation action, the statement must be
- shown to have been made with "actual malice", i.e., with
- knowledge of its falsity or with reckless disregard for its
- truth.41 Due to society's interest in "uninhibited, robust and
- wide-open" debate on public issues, neither factual error nor
- defamatory content sufficed to remove the First Amendment's
- shield from criticism of an official's conduct.42
-
- The Supreme Court further elaborated on defamation
- liability standards in the private and quasi-private sphere when
- it decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher
- of a John Birch Society newsletter made certain false and
- inaccurate accusations concerning an attorney who represented a
- deceased boy's family. The family had civilly sued the policeman
- who murdered the boy. In rebutting what he perceived to be a
- secret campaign against law and order, the publisher labelled
- the family's attorney a "Leninist" and "Communist-fronter".44 In
- addition, the publisher asserted that the attorney had been a
- member of the National Lawyers Guild, which "'probably did more
- than any other outfit to plan the Communist attack on the
- Chicago police during the 1968 Democratic Convention.'"45 In
- publishing these statements throughout Chicago, the managing
- editor of the Birch Society newsletter made no effort to verify
- or substantiate the charges against the attorney.46
-
- The Supreme Court held in Gertz that while First
- Amendment considerations protect publications about public
- officials47 and about "public figures"48, requiring a showing of
- "actual malice" before defamation damages could be recovered,
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 12
- ----------------------
-
- the same was not true for defamation suits brought by private
- citizens49, a group to which the attorney was held to belong.50
- Private citizens were seen as deserving more protections from
- defamation than public officials or public figures, so they were
- not required to show "actual malice" as a precondition to
- recovery.51 The Court then left it to the states to decide the
- precise standard of liability for defamation of private
- individuals, so long as liability without fault was not the
- standard.52
-
- By Gertz, then, the appropriate standard of liability
- for publicizing defamation of private parties falls somewhere
- below actual malice and above strict liability. The problem with
- defining the defamation standard for computerized BBS operators,
- however, is a lack of uniform standards. In such circumstances,
- the objective "reasonable person" standard will likely be
- applied to the SYSOP's actions.53 Several cases may be usefully
- applied by analogy.
-
- The court in Hellar v. Bianco54 held that a bar
- proprietor could be responsible for not removing a libellous
- message concerning the plaintiff's wife that appeared on the
- wall of the bar's washroom after having been alerted to the
- message's existence.55 The court noted that "persons who invite
- the public to their premises owe a duty to others not to
- knowingly permit their walls to be occupied with defamatory
- matter.... The theory is that by knowingly permitting such
- matter to remain after reasonable opportunity to remove [it],
- the owner of the wall or his lessee is guilty of republication
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 13
- ----------------------
-
- of the libel."56 The Hellar court then left the ultimate
- determination of the bar owner's negligence to the jury.57 This
- holding seems to be in accord with the Restatement of Torts,
- which provides:
-
- PUBLICATION:
-
- (2) One who intentionally and unreasonably
- fails to remove defamatory matter that
- he knows to be exhibited on land or
- chattels in his possession or under his
- control is subject to liability for its
- continued publication.58
-
- Contrarily, however, the Ohio court of appeals in Scott
- v. Hull59 found that the building owner and agent who had
- control over a building's maintenance were not responsible for
- libel damages for graffiti inscribed by an unknown person on an
- exterior wall.60 The court distinguished Hellar by noting that
- in Hellar the bartender constructively adopted the defamatory
- writing by delaying in removing it after having been expressly
- asked to do so:
-
- "It may thus be observed from these cases
- that where liability is found to exist it is
- predicated upon actual publication by the
- defendant or on the defendant's ratification
- of a publication by another, the ratification
- in Hellar v. Bianco...consisting of at least
- the positive acts of the defendants in
- continuing to invite the public into their
- premises where the defamatory matter was on
- view after the defendants had knowledge of
- existence of same."61
-
- The Scott court held that defendants could only be
- responsible for publishing a libellous remark through a positive
- act, not nonfeasance; thus, their mere failure to remove the
- graffiti from the building's exterior after having it called to
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 14
- ----------------------
-
- their attention was held not to be a sufficient basis of
- liability.62
-
- A situation similar to Scott arose recently in Tackett
- v. General Motors Corporation.63 There, an employee brought a
- libel suit against his employer for, inter alia, failing to
- remove allegedly defamatory signs from the interior wall of its
- manufacturing plant after having notice of their existence. One
- large sign remained on the wall for two to three days while a
- smaller one remained visible for seven to eight months.64
- Instead of focussing on the Scott malfeasance/nonfeasance
- test,65 the Tackett court considered defendant's implied
- adoption of the libellous statement to be the correct basis of
- liability.66 While saying that failure to remove a libellous
- message from a publicly-viewed place may be the equivalent of
- adopting that statement, and noting that Indiana would follow
- the Restatement view "when the time comes,"67 the Tackett court
- held that the Restatement view could be taken too far. Citing
- Hellar, the court wrote:
-
- The Restatement suggests that a tavern owner
- would be liable if defamatory graffiti
- remained on a bathroom stall a single hour
- after the discovery [Citation to Hellar]. The
- common law of washrooms is otherwise, given
- the steep discount that readers apply to such
- statements and the high cost of hourly
- repaintings of bathroom stalls [Citation to
- Scott]. The burden of constant vigilance
- exceeds the benefits to be had. A person is
- responsible for statements he makes or
- adopts, so the question is whether a reader
- may infer adoption from the presence of a
- statement. That inference may be unreasonable
- for a bathroom wall or the interior of a
- subway car in New York City but appropriate
- for the interior walls of a manufacturing
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 15
- ----------------------
-
-
- plant, over which supervisory personnel
- exercise greater supervision and control. The
- costs of vigilance are small (most will be
- incurred anyway), and the benefits
- potentially large (because employees may
- attribute the statements to their employer
- more readily than patrons attribute graffiti
- to barkeeps).68
-
- According to this reasoning, then, the location and
- length of time the libel is allowed to appear plays an integral
- part in determining whether a given defendant has adopted the
- libel, and thus has published it.
-
- An application of the foregoing analysis to the issue
- at hand highlights the need for greater care in allowing the
- posting of electronic mail messages on a BBS. The Tackett court
- noted that while the content of graffitti scrawled on bathroom
- walls might be subject to healthy skepticism by its readers, the
- same might not be true for other locations such as interiors of
- subway cars or manufacturing plant walls.69 If this is true,
- then it is reasonable to assume that a defamatory message
- displayed in a forum for the exchange of ideas is more apt to be
- taken seriously by its readers - especially when the libellous
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 16
- ----------------------
-
- message purports to be written by the subject of the libel.70
-
- Further, the Tackett court indicated that the high cost
- of repainting bathroom stalls by the hour outweighed its
- perceptible benefits. The same is not true for electronic BBSes,
- where the costs of prevention are minimal in light of the threat
- of widespread harm to users' reputations.71
-
- 2. Damages
-
- Once the plaintiff establishes that the SYSOP failed to
- act reasonably in removing statements known to be libellous from
- his BBS or in negligently failing to prevent their appearance
- there,72 no proof of special damages is necessary as libel is
- actionable per se.73 The state's interest in protecting private
- reputations has been held to outweigh the reduced constitutional
- value of speech involving matters of no public concern such that
- presumed and punitive damages may be recovered absent a showing
- of actual malice.74
-
- The proper gauge of liability has again raised some
- questions.75 One writer has noted that if the burden of proof is
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 17
- ----------------------
-
- to rest on the plaintiff, she may be at a disadvantage in
- producing sufficient evidence to demonstrate negligent conduct
- on the part of the SYSOP.76 Solutions to this problem have
- ranged from a rebuttable presumption of negligence in favor of
- the plaintiff77 to adoption of a set of standards similar to
- those set out in the Federal Fair Credit Reporting Act.78 In
- either event, damage awards for computer abuse have been
- addressed both by federal and state law.79
-
- 3. Suggestions
-
- Because computerized BBSes are still a relatively new
- technological phenomena, consistent standards for SYSOPs' duties
- have yet to be developed.80 However, at least one users' group
- has adopted a voluntary code of standards for electronic BBSes,
- applicable to both users and SYSOPs of boards open to the
- general public:
-
- SCOPE:
-
- This Minimum Code of Standards applies to
- both users and SYStem Operators (SYSOPs) of
- electronic bulletin boards available to the
- general public.
-
- FREEDOM OF SPEECH AND IDEAS
-
- Each user and SYSOP of such systems shall
- actively encourage and promote the free
- exchange and discussion of information,
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 18
- ----------------------
-
-
- ideas, and opinions, except when the content
- would:
- - Compromise the national security of the
- United States.
- - violate proprietary rights.
- - violate personal privacy,
- - constitute a crime,
- - constitute libel, or
- - violate applicable state, federal or
- local laws and regulations affecting
- telecommunications.
-
- DISCLOSURE
-
- Each user and SYSOP of such system will:
- - disclose their real name, and
- - fully disclose any personal, financial,
- or commercial interest when evaluation
- any specific product or service.
-
- PROCEDURES
-
- SYSOPS shall:
-
- - review in a timely manner all publicly
- accessible information, and
- - delete any information which they know
- or should know conflicts with this code
- of standards.
-
- A 'timely manner' is defined as what is
- reasonable based on the potential harm that
- could be expected. Users are responsible for:
-
- - ensuring that any information they
- transmit to such systems adheres to this
- Minimum Code of Standards, and
-
- - upon discovering violations of the
- Minimum Code of Standards, notifying the
- SYSOP immediately.
-
- IMPLEMENTATION
-
- Electronic bulletin board systems that choose
- to follow this Minimum Code of Standards
- shall notify their users by publishing this
- Minimum Code, as adopted by the [Capitol PC
- Users Group], and prominently display the
- following:
- 'This system subscribes to the Capitol PC
- Users Group Minimum Code of Standards for
- electronic bulletin board systems.'81
-
- While non-binding on publicly-accessible BBSes, the
- above guidelines furnish sound basic policies that all SYSOPs
- might use in shielding themselves from defamation liability. Our
- hypothetical at the beginning of this Comment described a
- situation where a malicious intruder was able to access and
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 19
- ----------------------
-
- masquerade as a validated user on a BBS; the following are some
- additional computer security measures that the reasonable SYSOP
- could conduct to avoid that situation:
-
- a. Special "screening" software: One writer has
- suggested discouraging potential BBS misuse through programming
- the BBS to reject those messages containing common defamatory
- and obscene language;82 such a program would discard a message
- containing any of those terms and would presumably notify the
- SYSOP of their presence. Drawbacks to this procedure are that
- computer programs cannot understand all the nuances of libellous
- messages83 and would thus lead to the rigid deletion of many
- otherwise legitimate messages.84
-
- b. Unique passwords: A more fundamental and
- economical approach would be for the SYSOP to both notify all
- new users about the potential for computerized BBS abuse and to
- encourage their use of a unique password on each BBS they call.
- This would have the practical effect of keeping a masquerader
- from using the names and passwords found on one BBS to
- wrongfully access and masquerade on other BBSes. A drawback to
- this procedure is that the truly malicious masquerader may still
- discover a BBS' most sensitive user records by way of a renegade
- computer program called a "trojan horse".85 However, one could
- speculate that the SYSOP acts reasonably in informing potential
- users of the existing threat and in helping them avoid it.
-
- c. Encryption: This is essentially a way for the
- SYSOP to make the users' passwords unique for them. The power of
- the computer allows complex algorithms to be applied to data to
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 20
- ----------------------
-
- encode it in such a way that, without the key to the code, it is
- virtually impossible to decode the information.86 This technique
- would have the added benefit of forcing the masquerader, upon
- accessing the BBS with a trojan horse program, to search for the
- secret decoding algorithm in addition to the BBS' secret user
- files. Indeed, it is conceivable that a special encryption or
- password could be devised to allow only the SYSOP access to the
- BBS' decoding algorithm. However, encryption involves a
- significant overhead - impractical for most small, privately-
- operated BBSes - and is more frequently used to protect messages
- from one system to another where the data is vulnerable to
- interception as it passes over transmission lines.87
-
- d. Prompt damage control: In accord with Hellar,88
- the Restatement (Second) of Torts,89 and possibly Tackett,90 a
- SYSOP acts reasonably in promptly assisting the libelled user to
- partially reverse the effects of the masquerader's actions.
- Recall that in those instances a defendant was held to have
- impliedly adopted a defamatory statement by acting unreasonably
- slowly in removing it from his property once having been made
- aware of it.91 While it may be unreasonable to expect the SYSOP
- to monitor each message posted every day - especially where the
- defamatory message appears to have been left by the true user -
- it is not too much to require the SYSOP to quickly remedy
- security flaws in his BBS as they are pointed out to him.92 To
- this end, the SYSOP has several options. In situations where the
- defaming user libels another without masquerading as the
- libelled party, the SYSOP could simply delete the defamer's
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 21
- ----------------------
-
- account. In situations where a user masquerading as another
- posts a libellous message, the SYSOP could publish a retraction
- to all his subscribers, urging them to use a different password
- on each BBS they call. Further, where a masquerader published
- the libel, the SYSOP should offer his full cooperation to the
- maligned user in tracking down the time and date the libellous
- message was posted93 in order to better limit the SYSOP's
- liability.
-
- Certain BBS SYSOPs claim that holding them liable for
- information appearing on their BBSes violates their First
- Amendment rights by restricting their right to free speech94 and
- by holding them responsible for the libel perpetrated by the
-
- From kadie Sat Oct 12 09:53:46 1991
- To: cafb-mail
- ~Subject: Computers and Academic Freedom mailing list (batch edition)
- Status: R
-
-
- Computers and Academic Freedom mailing list (batch edition)
- Sat Oct 12 09:53:27 EDT 1991
-
- [For information on how to get a much smaller edited version of the
- list, send email to archive-server@eff.org. Include the line:
- send acad-freedom caf
- - Carl ]
-
- In this issue:
-
- :
-
- The addresses for the list are now:
- comp-academic-freedom-talk@eff.org - for contributions to the list
- or caf-talk@eff.org
- listserv@eff.org - for automated additions/deletions
- (send email with the line "help" for details.)
- caf-talk-request@eff.org - for administrivia
-
- -------------------
-
- masquerader. It has been suggested that the SYSOP should be held
- to the same standard of liability as a neighborhood supermarket
- which furnishes a public bulletin board:95 just as the
- supermarket would not be liable for posting an advertisement for
- illicit services, so should the BBS SYSOP escape liability for
- libellous messages left on his board, especially when its poster
- appears to be a validated user.96
-
- However, this comparison lacks merit for the reasons
- given by the Seventh Circuit in Tackett v. General Motors
- Corporation.97 The defendant's liability in that case rested on
- its publication of libel by implicitly adopting the statement.98
- Defendant's failure to remove a defamatory sign painted on one
- of the interior walls of its factory for seven or eight months
- after discovering its presence was such that "[a] reasonable
- person could conclude that Delco 'intentionally and unreasonably
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 22
- ----------------------
-
- fail[ed] to remove' this sign and thereby published its
- contents."99
-
- There would certainly be accomplice liability if the
- supermarket unreasonably delayed removing an advertisement for
- illegal services from its bulletin board once it was made aware
- of it. The market could be seen as having adopted the ad's
- statements by not acting responsibly to its viewing public.
- Similarly, a SYSOP would be liable for defamatory messages
- posted on his BBS - even by what appears to be the true user -
- if he fails to act reasonably by using his computer skill to
- eviscerate the libel.100 While the computerized BBS may be
- nothing more than a hobby of the SYSOP, the speed with which it
- can disseminate potentially damaging information among its users
- demands the standards of responsibility described above.
-
- C. Defamation Liability of the Masquerader
-
- 1. Degree of fault required
-
- It should be noted that the liability and proof issues
- concerning the SYSOP and masquerader are inverse. As to the
- SYSOP who allows libellous messages to be posted on his BBS, his
- liability may be inferred simply by those messages having
- appeared there;101 however, his degree of fault - actual malice
- or simple negligence - is subject to debate.102 Conversely,
- while the masquerader's degree of fault is clearly evident,103
- tracing that fault back to him is a more elusive matter.104 The
- requisite degree of fault for masqueraders is set out in federal
- and state law.105
-
- 2. Damages
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 23
- ----------------------
-
-
- Assuming arguendo that the masquerader's defamatory
- publications have been successfully traced back to him by the
- plaintiff, actual and punitive damages may then be recovered
- from him based on his knowledge of the publication's falsity or
- reckless disregard for its truth.106 Federal and state law have
- also specified certain remedies.107
-
- III PROBLEMS OF PROOF
-
- A. Proof of SYSOP's Actions
-
- We have seen that while the appropriate degree of fault
- for a SYSOP to be liable for defamatory messages appearing on
- his BBS is subject to dispute,108 a showing that the defamation
- appeared there due to the SYSOP's negligence is much more
- capable of resolution.109 The jury should be made aware of the
- actual validation/security procedures practiced by the SYSOP and
- should weigh them in light of the prevailing practice.110
- Several facets of an emerging standard of care for SYSOPs have
- already been suggested in this Comment,111 and the SYSOP's
- adherence to them could be shown through users' testimony.
-
- B. Proof of Masquerader's Actions
-
- In contrast with the degree of fault required to
- establish the SYSOP's publication of the libellous message, the
- degree of fault for the masquerader is much less subject to
- debate. The masquerader's actions are not likely to be
- considered merely inadvertent or negligent.112 However, because
- the masquerader has intentionally discovered and usurped the
- user's name and password, he appears to be that user on all
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 24
- ----------------------
-
- computer records. Tracing the masquerader's defamatory
- publication back to him thus encounters some important
- evidentiary barriers: the maligned user is forced to rely on
- computerized records produced by the BBS and phone company in
- trying to link the masquerader's libellous publication back to
- him.113 We turn now to consider the evidentiary hurdles to be
- overcome in tracing the libellous communication to its true
- source.
-
- 1. The Hearsay Rule & Business Records Exception
-
- The first evidentiary obstacle to connecting the
- masquerader with his libellous publication is the hearsay rule.
- As defined by the Federal Rules of Evidence, hearsay is "a
- statement, other than one made by the declarant while testifying
- at the trial or hearing, offered in evidence to prove the truth
- of the matter asserted";114 as such, it is inadmissible as
- evidence at trial.115 Computer-generated evidence is subject to
- the hearsay rule, not because it is the "statement of a
- computer", but because it is the statement of a human being who
- entered the data.116 To the extent the plaintiff user relies on
- computer-generated records to show that a call was placed from
- the masquerader to the BBS at the time and date in question,
- then, her evidence may be excluded.
-
- However, numerous exceptions to the hearsay rule have
- developed over the years such that evidence which might
- otherwise be excluded is deemed admissible. The most pertinent
- hearsay exception as applied to computerized evidence is the
- "business records exception", which admits into evidence any
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 25
- ----------------------
-
- records or data compilations, so long as (1) they were made
- reasonably contemporaneously with the events they record; (2)
- they were prepared/kept in the course of a regularly conducted
- business activity; and (3) the business entity creating these
- records relied on them in conducting its operations.117 The
- veracity of the computer records and of the actual business
- practices are shown by the record custodian's or other qualified
- witness' testimony, unless the circumstances indicate lack of
- trustworthiness.118 The term "business" as used in this rule
- includes callings of every kind, whether or not conducted for
- profit.119
-
- Statutes and judicial decisions in several states have
- gradually recognized that the business records exception extends
- to include computer-generated records.120 This is largely due to
- (1) modern business' widespread reliance on computerized record-
- keeping, (2) the impracticability of calling as witnesses every
- person having direct personal knowledge of the records'
- creation, and (3) the presumption that if a business was willing
- to rely on such records, there is little reason to doubt their
- accuracy.121
-
- Using this exception to the hearsay rule, plaintiff
- user would most likely seek to admit the BBS' computer-generated
- username/password log-in records plus the phone company's call
- records to establish the connection between the masquerader's
- telephone and the BBS at the precise instant the libellous
- message was posted.122 As an initial matter, however, plaintiff
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 26
- ----------------------
-
- must first lay a foundation for both the BBS' and phone
- company's computer-generated business records.
-
- A sufficient foundation for computer-generated records
- was found recently to exist in People v. Lugashi.123 There, the
- California Court of Appeal affirmed a conviction of grand theft
- based on evidence adduced from computer-generated bank records.
- Defendant, an oriental rug store owner, had been convicted of
- fraudulently registering thirty-seven sales on counterfeit
- credit cards. The issuing banks became suspicious of criminal
- activity when charge card sales data from defendant's store
- showed 44 fraudulent uses of charge cards at defendant's store
- within only five weeks.124 As each fraudulent credit card
- transaction was completed, defendant registered the sale
- simultaneously with the banks' computers.125 Each night, as
- standard bank practice, the banks then reduced the computer
- records of credit card transactions to microfiche. Information
- gleaned from these microfiche records was entered against
- defendant at trial.126
-
- The California Court of Appeal recognized the trial
- court judge's wide discretion in determining whether a
- sufficient foundation to qualify evidence as a business record
- has been laid.127 It held that defendant's allocations of error
- were without merit since defendant himself had acknowledged that
- the bank's computer entries memorialized in the microfiche
- record were entered simultaneously as they occurred in the
- regular course of business.128 Further, the Court of Appeals
- dismissed defendant's claim that only a computer expert could
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 27
- ----------------------
-
- supply testimony concerning the reliability of the computer
- record:
- Appellant's proposed test incorrectly presumes computer
- data to be unreliable, and, unlike any other business
- record, requires its proponent to disprove the
- possibility of error, not to convince the trier of fact
- to accept it, but merely to meet the minimal showing
- required for admission....
- The time required to produce this additional [expert]
- testimony would unduly burden our already crowded trial
- courts to no real benefit.129
-
-
-
- The Lugashi court then followed the bulk of other
- jurisdictions adopting similar analyses and upholding admission
- of computer records with similar or less foundational showings
- over similar objections.130
-
- As to admission into evidence of telephone companies'
- computer-generated call records under the business records
- exception, courts have evinced a similar attitude to that in
- Lugashi. In State v. Armstead,131 a prosecution for obscene
- phone calls, the trial court was held to have properly admitted
- computer printouts showing that calls had been made from
- defendant's mother's telephone, despite defendant's contention
- that the witness who was called to lay the foundation had not
- been personally responsible for making the record.132 Because
- the printout represented a simultaneous self-generated record of
- computer operation, the court held it was therefore not
- hearsay.133
-
- In an Ohio prosecution for interstate telephone
- harassment, it was held no error was committed in admitting
- defendant's computerized phone statement under the Business
- Records exception which showed that telephone calls had been
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 28
- ----------------------
-
- made from defendant's phone in Ohio to various numbers in
- Texas.134 A sufficient foundation for the admission of business
- records under Federal Rules of Evidence 803(6) was established
- when a telephone company witness identified the records as
- authentic and testified they were made in the regular course of
- business.135
-
- Applying the foregoing analyses to BBSes, the plaintiff
- user would establish a foundation for the correlated BBS136 and
- telephone company phone logs by showing that (1) they were made
- contemporaneously with the posting of the libellous message;137
- (2) they were prepared/kept in the course of a regularly
- conducted business activity, since both the BBS and telephone
- company consistently maintain accounts of all persons who use
- their services; and (3) the BBS and telephone company relied on
- those records for billing purposes.138 Once such a foundation is
- laid, the trial court has wide discretion in admitting business
- records into evidence.139
-
- 2. Authentication & the Voluminous Records Exception
-
- The second evidentiary barrier encountered in tracing
- the masquerader's libellous messages back to him is proving his
- authorship of the libel, or "authenticating" the computerized
- records.140 The computer-generated phone and BBS records showing
- that a call from a certain phone number at a particular date and
- time resulted in a libellous message being published must
- somehow be linked to the masquerader.
-
- The Federal Rules of Evidence provide in pertinent
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 29
- ----------------------
-
- part:
- (a) General provision. The requirement of
- authentication or identification as a condition
- precedent to admissibility is satisfied by
- evidence sufficient to support a finding that the
- matter in question is what its proponent claims.
- (b) Illustrations. By way of illustration only, and
- not by way of limitation, the following are
- examples of authentication or identification
- conforming with the requirements of this rule:...
- (6) Telephone conversations. Telephone
- conversations, by evidence that a call was
- made to the number assigned at the time by
- the telephone company to a particular person
- or business, if
- (A) in the case of a person, circumstances,
- including self-identification, show the
- person answering to be the one called,
- or
- (B) in the case of a business, the call was
- made to a place of business and the
- conversation related to business
- reasonably transacted over the
- telephone....141
-
- The question of whether a writing is properly
- authenticated is primarily one of law for the court; if the
- court decides the question affirmatively, it is ultimately for
- the jury.142 The court will make no assumptions as to the
- authenticity of documents in deciding their initial
- admissibility.143 The difficulty presented here is that the
- Federal Rules of Evidence seem to require authentication of
- telephone calls by reference to their specific content.144 The
- specific content of a given phone call is not demonstrated by
- phone logs showing merely the date and time the call occurred.
-
- The authentication of extrinsic documents may be
- subject to a "best evidence rule" objection. As stated in
- Federal Rule of Evidence 1002:
- REQUIREMENT OF ORIGINAL: To prove the contents of a
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 30
- ----------------------
-
- writing, recording, or photograph, the original of that
- writing, recording, or photograph is required, unless
- provided otherwise in these rules or by an act of
- Congress.145
-
-
-
- Since its introduction in the 18th century, various
- rationales have been posited for this rule.146 While earlier
- writers asserted that the rule is intended to prevent fraud,
- most modern commentators agree that the rule's main purpose is
- to convey to the court the exact operative effect of the
- writing's contents.147
-
- However, at least one jurisdiction has implicitly
- equated compliance with the business records exception with the
- Best Evidence Rule. In Louisiana v. Hodgeson,148 the defendant
- in a manslaughter trial contended that a printout of her
- telephone bill, offered to show communications between her and a
- third party, was not authenticated.149 The court, while making
- no specific reference to the authentication point, rejected
- defendant's contention, noting that the information from the
- computer's storage was the company's business record and that it
- was accessible only by printout.150
-
- Similarly, in an Indiana bank robbery prosecution,151
- the state offered microfiche copies of the telephone company's
- computerized records showing certain telephone calls from
- defendant. On appeal, defendant argued that these documents were
- not authenticated because they were not the "original or first
- permanent entry," and that they therefore should not have been
- admitted into evidence. The court disagreed, saying that a
- duplicate was admissible to the same extent as an original
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 31
- ----------------------
-
- unless a "genuine issue" were raised as to the authenticity of
- the original.152
-
- By these precedents, then, provided plaintiff user
- establishes that both the telephone and BBS user records were
- prepared in accordance with the business records exception,153
- the fact that a call from the masquerader's phone is shown to
- have occurred at the same instant the libellous message was
- posted may be sufficient to authenticate that the call was made
- by the masquerader. Other circumstantial evidence adduced by
- plaintiff user would strengthen this inference.154
-
- Another authentication hurdle in plaintiff's case is
- the requirement that the entire original record sought to be
- authenticated be produced.155 This requirement can prove highly
- impractical in situations where there are vast numbers of
- individual records extending over long periods of time.156
- Requiring plaintiff to produce the entire body of these records
- would be unduly expensive and time-consuming. What is more, if
- plaintiff were to attempt to summarize vast computerized
- business data compilations so as to introduce those summaries
- into evidence without producing the complete body of computer
- records, such summaries might not be admissible on the grounds
- that they were not made "in the regular course of business."157
-
- However, an exception to strict authentication
- requirements of the Federal Rules of Evidence has been
- developed. Rule 1006 provides:
- The contents of voluminous writings, recordings, or
- photographs which cannot conveniently be examined in
- court may be presented in the form of a chart, summary,
-
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 32
- ----------------------
-
- or calculation. The originals, or duplicates, shall be
- made available for examination or copying, or both, by
- other parties at reasonable time and place. The court
- may order that they be produced in court.158
-
-
-
- In Cotton v. John W. Eshelman & Sons, Inc.,159
- summaries of certain computerized records were held properly
- admitted into evidence on the theory that "[w]hen pertinent and
- essential facts can be ascertained only by an examination of a
- large number of entries in books of account, an auditor or
- expert examiner who has made an examination and analysis of the
- books and figures may testify as a witness and give summarized
- statements of what the books show as a result of his
- investigation, provided the books themselves are accessible to
- the court and to the parties."160 Under this precedent,
- plaintiff user would only need to produce the pertinent parts of
- the computerized records, as determined by an impartial auditor.
- IV. CONCLUSION
-
- It is difficult to overestimate the ease with which
- computers now enable us to compile and exchange information.
- Computerized "bulletin boards" run on personal microcomputers by
- private persons and businesses are examples of this enhanced
- form of communication. Users can trade computer programs and
- exchange a wealth of ideas, opinions, and personal information
- through such forums.
-
- The advantages of this process break down, however,
- when malicious users abuse the system and BBS SYSOPS
- intentionally or negligently allow this to occur. The nature of
- computerized data is such that tortious misinformation may
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 33
- ----------------------
-
- easily be spread to thousands of users before it is discovered.
- Because the potential for harm to reputation is so tremendous,
- appropriate standards of liability and methods of proof must be
- addressed.
-
- The requisite degree of fault in libelling private
- persons is less than that for libelling public officials/public
- figures, and may be established as against a SYSOP by a simple
- showing of his negligent failure to observe reasonably minimal
- computer security measures. The basis of liability for a
- masquerader who intentionally misappropriates another's private
- information is even less subject to debate.
-
- Two main evidentiary hurdles face the plaintiff seeking
- to link the masquerader with his libellous message through
- reliance on computer-generated records. First, the hearsay rule
- automatically excludes all evidence produced out-of-court that
- is being offered to prove the truth of the matter at hand.
- Second, the authentication requirement demands that the
- masquerader's connection to the entire body of proffered
- computer records be established.
-
- However, certain exception to both of these limitations
- ease the plaintiff's burden. First, the business records
- exception to the hearsay rule admits computer records into
- evidence if they (1) were made reasonably contemporaneously with
- the events they record; (2) were prepared/kept in the course of
- a regularly conducted business activity; and (3) the business
- entity creating these records relied on them in conducting its
- operations. Both BBS and telephone company records may come
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 34
- ----------------------
-
- under this exception. Second, the voluminous writings exception
- allows the contents of voluminous computerized records which
- cannot conveniently be examined in court to be presented in the
- form of a summary. So long as the original records or duplicates
- thereof are available for examination by other parties at
- reasonable times and places, the entire data compilation need
- not be produced. Plaintiff should employ both of these
- exceptions in an effort to convince a jury by a preponderance of
- the evidence that the masquerader has abused his computer skills
- and has damaged plaintiff's reputation.
-
- ==============================================
- Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU>
- id AA20305; Fri, 20 Apr 90 12:46:45 PDT
- ~Date: Fri, 20 Apr 90 12:42:02 PDT
- ~From: Lang Zerner <langz@ebay.sun.com>
- Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM>
- ~Subject: Sysops and libel liability -- endnotes
- Resent-Date: Sat, 21 Apr 90 0:05:23 CDT
- Resent-From: telecom@eecs.nwu.edu
- Resent-To: ptownson@gaak.LCS.MIT.EDU
- Status: RO
- Here are the endnotes to the paper I submitted in a separate message.
- Be seeing you...
- ==Lang
- =======
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 35
- ----------------------
-
- ENDNOTES
-
- 1. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
-
- 2. These interests can cover anything from science fiction
- to gourmet cooking. Uyehara, Computer Bulletin Boards:
- Let the Operator Beware, 14 Student Lawyer 28 (1986).
-
- 3. Id., at 30.
-
- 4. The data service Compuserve is one such national BBS
- run for profit by business organizations. Uyehara, at
- 28. Other examples of large databases of interest to
- the legal profession are computerized research services
- such as LEXIS and WESTLAW.
-
- 5. Uyehara, at 28; Manning, Bulletin Boards: Everybody's
- Online Services, Online, Nov. 1984, at 8,9. "Modem" is
- defined infra, note 17 and accompanying text.
-
- 6. "...computer bulletin boards offer their users
- important benefits. An individual can use a bulletin
- board to express his opinion on a matter of public
- interest. He may find a review of a product he is
- considering buying. He may find a useful piece of
- software. An individual might also use the bulletin
- board to ask a technical question about a specific
- computer program." Note, Computer Bulletin Board
- Operator Liability For User Misuse, 54 Fordham L.Rev.
- 439, 440 (1985) (Authored by Jonathan Gilbert); see
- also Lasden, Of Bytes And Bulletin Boards, N.Y.Times,
- August 4, 1985, sec. 6, at 34, col. 1, where the author
- notes computer users may now use BBSes to voice their
- opinions directly to State Senators' offices.
-
- 7. "Virus" Hits Nation's Research Computers, San Jose
- Mercury News, Nov. 4, 1988, at 1, col. 1.
-
- 8. "It is estimated that the theft of long-distance
- services and software piracy each approximate $100
- million a year; credit card fraud via computers costs
- about $200 million annually." Pittman, Computer
- Security In Insurance Companies, 85 Best's Rev. - Life-
- Health Ins. Edition, Apr. 1985 at 92.
-
- 9. Schiffres, The Shadowy World of Computer "Hackers,"
- U.S. News & World Report, June 3, 1985, at 58.
-
- 10. Pollack, Free Speech Issues Surround Computer Bulletin
- Board Use, N.Y. Times, Nov. 12, 1984, note 1, at D4,
- col. 6.
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 36
- ----------------------
-
- 11. Note, 54 Fordham L.Rev. 440-441 (1985).
-
- 12. Poore and Brockman, 8 Nat'l L.J. 14, (1985).
-
- 13. See infra, Topic III, Problems of Proof.
-
- 14. The uncertainty revolves around how to define BBSes.
- When viewed as analogous to newspapers and other media,
- SYSOPS would be responsible for any message posted on
- their systems, much as newspaper editors are
- responsible for articles appearing in their medium.
- Uyehara, 14 Student Lawyer 30 (1986). But when BBSes
- are compared to a bulletin board found in a public hall
- or supermarket, the liability issue is focused more on
- those actually posting the messages rather than on the
- board's owner. Id., at 30. This Comment suggests that
- BBS SYSOPs be held to a reasonable standard of care
- emerging specifically for their endeavors. See infra,
- Topic II.
-
- 15. Poore and Brockman, 8 Nat'l L.J. 14, (1985). Another
- writer has noted that Compuserve now has over 200,000
- users making use of nearly 100 diverse databases.
- Lasden, Of Bytes And Bulletin Boards, N.Y. Times,
- August 4, 1985, sec. 6, at 34, col. 1.
-
- 16. Poore and Brockman, 8 Nat'l L.J. 14 (1985).
-
- 17. 14 Am Jur. POF 2d Computer-Generated Evidence Sec. 11
- (1977).
-
- 18. Note, 54 Fordham L.Rev. 439, 446 (1985).
-
- 19. Id.
-
- 20. See "Account," infra, note 25 and accompanying text.
-
- 21. Garfinkel, An Introduction to Computer Security, 33
- Prac. Law.41-42 (1987).
-
- 22. Id.
-
- 23. See infra, notes 25 and 27 and accompanying text.
-
- 24. Some more sophisticated operating systems provide
- greater access control by (1) recording unauthorized
- attempts at entry; (2) recording those attempts and
- sending a warning to the perpetrator; and (3) keeping
- the perpetrartor off the system permanently until
- he/she is reinstated by the computer's security
- administrator or SYSOP. Balding, Computer Breaking and
- Entering: The Anatomy of Liability, 5 Computer Lawyer,
- Jan. 1988, at 6.
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 37
- ----------------------
-
- 25. Garfinkel, An Introduction to Computer Security, 33
- Prac. Law. 42 (1987).
-
- 26. Id.
-
- 27. Id. "A password is a secret word or phrase that should
- be known only to the user and the computer. When the
- user first attempts to use the computer, he must first
- enter the password. The computer then compares the
- typed password to the stored password and, if they
- match, allows the user access."
-
- 28. Id., at 42 and 46.
-
- 29. 14 Am. Jur. POF 2d Computer-Generated Evidence Sec. 11
- (1977).
-
- 30. 54 Fordham L.Rev. 439, note 2 (1985).
-
- 31. Restatement (Second) of Torts Sec. 568(1) (1976).
-
- 32. Restatement (Second) of Torts Sec. 577(1) (1976).
-
-
- 33. Restatement (Second) of Torts Sec.559 (1976).
-
- 34. Veeder, The History and Theory of the Law of
- Defamation, 3 Colum. L.Rev. 546, 569-571 (1903).
-
- 35. Restatement (Second) of Torts Sec. 622 (1976).
-
- 36. Restatement, Torts Sec. 568, comment d (1938).
-
- 37. Shor v. Billingley, 4 Misc.2d 857, 158 N.Y.S.2d 476
- (Sup. Ct. 1956), aff'd mem., 4 App.Div. 2d 1017, 169
- N.Y.S.2d 416 (1st Dep't. 1957).
-
- 38. Torts: Defamation: Libel-Slander Distinction:
- Extemporaneous Remarks Made on Television Broadcast:
- Shor v. Billingley, 4 Misc. 2d 857, 158 N.Y.S.2d 476
- (Sup.Ct. N.Y. County 1957), 43 Cornell L.Q. 320, 322
- (1957) (Authored by Stephen A. Hochman).
-
- 39. Id.
-
-
- 40. 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964),
- motion denied 376 U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d
- 83.
-
-
- 41. 376 U.S. 254, 273.
-
- 42. 376 U.S. 254, 280.
-
- 43. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 38
- ----------------------
-
- 44. Gertz v. Robert Welch, Inc., 418 U.S. 323, 326.
-
- 45. Id.
-
- 46. Id., at 327.
-
- 47. "...those who hold governmental office may recover for
- injury to reputation only on clear and convincing proof
- that the defamatory falsehood was made with knowledge
- of its falsity or with reckless disregard for the
- truth." Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
- "An individual who decides to seek governmental office
- must accept certain necessary consequences of that
- involvement in pubic affairs. He runs the risk of
- closer public scrutiny than might otherwise be the
- case." Id., at 344.
-
- 48. "...[A]n individual may attain such pervasive fame and
- notoriety that he becomes a public figure for all
- purposes and in all contexts. More commonly, an
- individual voluntarily injects himself or is drawn into
- a particular public controversy and thereby becomes a
- public figure for a limited range of issues. In either
- case such persons assume special prominence in the
- resolution of public questions." 418 U.S. 323, 351.
-
-
- 49. "Even if the foregoing generalities do not obtain in
- every circumstance, the communications media are
- entitled to act on the assumption that public officials
- and public figures have voluntarily exposed themselves
- to the increased risk of injury from defamatory
- falsehood concerning them. No such assumption is
- justified with respect to a private individual. He has
- not accepted public office or assumed an 'influential
- role in ordering society.' Curtis Publishing Co. v.
- Butts, 388 U.S., at 164 ...He has relinquished no part
- of his interest in the protection of his own good name,
- and consequently he has a more compelling call on the
- courts for redress of injury inflicted by the
- defamatory falsehood. Thus, private individuals are not
- only more vulnerable to injury than public officials
- and public figures; they are also more deserving of
- recovery." Id., at 345.
-
- 50. "...[P]etitioner was not a public figure. He ...
- plainly did not thrust himself into the vortex of this
- public issue, nor did he engage the public's attention
- in an attempt to influence its outcome." Id., at 352.
-
- 51. Justice Powell noted for the Court that
-
- "[T]he communications media are entitled to act on
- the assumption that public officials and public
- figures have voluntarily exposed themselves to
- increased risk of injury from defamatory falsehood
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 39
- ----------------------
- concerning them. No such assumption is justified
- with respect to a private individual. He has not
- accepted public office or assumed an 'influential
- role in ordering society....' He has relinquished
- no part of his interest in the protection of his
- own good name, and consequently he has a more
- compelling call on the courts for redress of injury
- inflicted be defamatory falsehood. Thus, private
- individuals are not only more vulnerable to injury
- than public officials and public figures; they are
- also more deserving of recovery." Id., at 345.
-
-
- 52. Id., at 347.
-
- 53. Keeton, Dobbs, Keeton and Owen, Prosser and Keeton on
- Torts, sec. 32, p.174. See also Vaughn v. Menlove, 3
- Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837).
-
- 54. 111 Cal. App. 2d 424, 244 P.2d 757, 28 ALR2d 451
- (1952).
-
-
- 55. 111 Cal. App. 2d 424, 427.
-
- 56. Id., at 426.
-
- 57. Id, at 427.
-
- 58. Restatement (Second) of Torts Sec. 577(2) (1976).
-
- 59. 22 Ohio App.2d 141, 259 N.E.2d 160 (1970).
-
-
- 60. Scott v. Hull, 259 N.E.2d 160, 162 (1970).
-
- 61. Id., at 161.
-
- 62. Id., at 162.
-
- 63. 836 F.2d 1042 (7th Cir. 1987).
-
-
- From kadie Sat Oct 12 09:54:35 1991
- To: cafb-mail
- ~Subject: Computers and Academic Freedom mailing list (batch edition)
- Status: R
-
-
- Computers and Academic Freedom mailing list (batch edition)
- Sat Oct 12 09:54:16 EDT 1991
-
- [For information on how to get a much smaller edited version of the
- list, send email to archive-server@eff.org. Include the line:
- send acad-freedom caf
- - Carl ]
-
- In this issue:
-
- :
-
- The addresses for the list are now:
- comp-academic-freedom-talk@eff.org - for contributions to the list
- or caf-talk@eff.org
- listserv@eff.org - for automated additions/deletions
- (send email with the line "help" for details.)
- caf-talk-request@eff.org - for administrivia
-
- -------------------
-
-
- 64. Id., at 1047.
-
- 65. The Court of Appeals noted the Restatement view and
- observed that Indiana law had neither embraced nor
- rejected that approach. Id., at 1046.
-
- 66. Id.
-
- 67. Id.
-
- 68. Id., at 1046-47.
-
- 69. Id.
-
-
- 70. Recall that in our hypothetical a third user
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 40
- ----------------------
- masquerading as another is transmitting messages to
- others, revealing embarassing and false information.
-
-
- 71. BBS systems security and other preventative measures
- are discussed more fully infra, Topic 3.d.
-
-
- 72. Issues in proving the SYSOP's role in publishing the
- libellous statement are discussed more fully in Topic
- III. A., infra.
-
- 73. Sydney v. MacFadden Newspaper Publishing Corp., 242
- N.Y. 208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also
- Restatement (Second) of Torts Sec. 621 (1976) ("One who
- is liable for a defamatory communication is liable for
- the proved, actual harm caused to the reputation of the
- person defamed.")
-
- 74. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472
- U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985).
-
- 75. See supra, note 53 and accompanying text.
-
- 76. Note, Protecting the Subjects of Credit Reports, 80
- Yale L.J. 1035, 1051-52, n.88 (1971).
-
- 77. Gertz did not rule out an assumption of defendant's
- negligence. See Eaton, The American Law of Defamation
- Through Gertz V. Robert Welch, Inc., and Beyond: An
- Analytical Primer, 61 Va. L.Rev. 1349 (1975).
-
- 78. 15 U.S.C.A. Sec. 1681 et seq. (1974). Two standards are
- proposed there: the first, willful noncompliance, is
- defined as equivalent to the New York Times "actual
- malice" standard, and violators are liable for actual
- and punitive damages. Sec. 1681(n), supra. Presumably
- this would apply to the situation where the SYSOP is
- dilatory in removing the libellous message. The second
- proposed standard, negligent noncompliance, occurs in
- the absence of willfulness and results in liability
- only for actual damages. Sec. 1681(o), supra.
- Situations where the SYSOP failed to adopt reasonable
- computer security measures might come under this
- category.
-
- 79. 18 U.S.C.S. Sec. 2707(b),(c) (Law. Co-op 1979 & Supp.
- 1988) provides in pertinent part:
- (b) Relief. In a civil action under this section,
- appropriate relief includes -
- (1) Such preliminary and other equitable or
- declaratory relief as may be appropriate;
- (2) damages under subsection (c); and
- (3) a reasonable attorney's fee and other
- litigation costs reasonably incurred.
- (c) Damages. The court may assess as damages in a
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 41
- ----------------------
- civil action under this section the sum of the
- actual damages suffered by the plaintiff and
- any profits made by the violator as a result
- of the violation, but in no case shall a
- person entitled to recover receive less than
- the sum of $1,000.
-
- 18 U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988)
- limits the civil action under this section to two years
- after the date upon which the claimant first discovered
- or had a reasonable opportunity to discover the
- violation.
- As to damage provisions supplied by state law, see
- California Penal Code 502(e)(1),(2) (West Pub. 1988):
- (e)(1) In addition to any civil remedy available,
- the owner or lessee of the computer, computer
- system, computer network, computer program, or data
- may bring a civil action against any person
- convicted under this section for compensatory
- damages, including any expenditure reasonably and
- necessarily incurred by the owner or lessee to
- verify that a computer system, computer network,
- computer program, or data was not altered, damaged,
- or deleted by the access. For purposes of actions
- authorized by this subdivision, the conduct of an
- unemancipated minor shall be imputed to the parent
- or legal guardian having control or custody of the
- minor, pursuant to the provisions of Section 1714.1
- of the Civil Code.
- (2) In any action brought pursuant to this
- subdivision the court may award reasonable
- attorney's fees to a prevailing party.
-
-
- 80. A lawsuit recently filed in the United States District
- Court for the Southern District of Indiana may break
- new ground in enunciating precisely what BBS SYSOPs'
- reasonable duties of care are. Thompson v. Predaina,
- Civil Action #IP-88 93C (S.D. Ind. filed 1988). The
- complaint alleges, inter alia, invasion of plaintiff
- user's privacy, libel, and wrongful denial of access to
- the BBS in violation of U.S.C. Title 18, ss 2701
- (a)(2). As to statutory damages available, see infra,
- note 105.
-
- 81. Gemignani, Computer Law 33:7 (Lawyers Co-op 1985, Supp.
- 1988) (quoting Capitol PC Users Group Minimum Code of
- Standards for electronic Bulletin Board Systems,
- reprinted in 4 Computer Law Reptr. 89).
-
- 82. Note, 54 Fordham L.Rev. 439, 449 (1985) (Authored by
- Jonathan Gilbert).
-
- 83. Id., at 449.
-
- 84. Id., at 449-50.
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 42
- ----------------------
-
- 85. A "trojan horse" program takes control of the BBS and
- allows its sender to access and steal its most
- sensitive information. Fites, Johnston and Kratz, The
- Computer Virus Crisis, Van Nortrand/Reinhold (1989), at
- 39 and 45.
-
- 86. Balding, Computer Breaking and Entering: The Anatomy of
- Liability, 5 Computer Law. (January 1988), at 6.
-
- 87. Id.
-
- 88. Hellar v. Bianco, 244 P.2d 757. See supra, note 54 and
- accompanying text.
-
- 89. Restatement (Second) of Torts Sec. 577(2) (1976). See
- supra, note 58 and accompanying text.
-
- 90. Tackett v. General Motors Corporation, 836 F.2d 1042
- (7th Cir. 1987). See supra, note 63 and accompanying
- text.
-
- 91. See note 53, supra, and accompanying text.
-
-
- 92. It has been suggested that this would be the rough
- equivalent of a newspaper publishing a retraction after
- discovering what it had printed was defamatory. Note,
- 54 Fordham L.Rev. 439, note 55 (1985). BBS operators
- should not be held liable in this situation insofar as
- they did not know of the nature of the statement at the
- time it was made. Restatement (Second) of Torts Sec.
- 581 (1977).
-
- 93. Proving the masquerader's actions is discussed more
- fully infra, Topic III. B.
-
- 94. Stipp, Computer Bulletin Board Operators Fret Over
- Liability for Stolen Data, Wall St. J. Nov. 9, 1984, at
- 33, col. 1.
-
- 95. Id.
-
- 96. See Topic I., supra, where the masquerader has
- discovered and uses the password and name of the
- regular user; he appears for all intents and purposes
- to be that regular user.
-
- 97. 836 F.2d 1042 (7th Cir. 1987).
-
- 98. Id., at 1047.
-
- 99. Id.
-
- 100. Indeed, U.S.C. Title 18, Sec. 2702 (Law. Co-op 1979 &
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 43
- ----------------------
- Supp. 1988) proscribes the knowing dissemination of an
- electronically stored communication by the SYSOP:
- Sec. 2702. Disclosure of contents
- (a) Prohibitions. Except as provided in subsection
- (b)-
- (1) a person or entity providing an
- electronic communication service to the
- public shall not knowingly divulge to any
- person or entity the contents of a
- communication while in electronic storage
- on that service; and
- (2) a person or entity providing remote
- computing service to the public shall not
- knowingly divulge to any person or entity
- the contents of any communication which
- is carried or maintained on that service-
- (A) on behalf of, and received by means
- of electronic transmission from (or
- created by means of computer
- processing of communications
- received by means of electronic
- transmissions from), a subscriber or
- customer of such service; and
- (B) solely for the purpose of providing
- storage or computer processing
- services to such subscriber or
- customer, if the provider is not
- authorized to access the contents of
- any such communications for purposes
- of providing any services other than
- storage or computer processing.
-
- A similar provision is embodied in Cal. Pen. Code sec.
- 502(c)(6) (West Pub. 1988), which provides:
-
- (c) Except as provided in subdivision (i),
- any person who commits any of the
- following acts is guilty of a public
- offense:
- (6) Knowingly and without permission
- provides or assists in providing a
- means of accessing a computer,
- computer system, or computer network
- in violation of this section.
-
-
-
- 101. The doctrine of res ipsa loquitor, or "the thing speaks
- for itself" warrants the inference of the SYSOP's
- negligence, which the jury may draw or not as its
- judgement dictates. See Sullivan v. Crabtree, 36
- Tenn.App. 469, 258 S.W.2d 782 (1953).
-
- 102. See discussion under Topic II. B., supra.
-
- 103. As someone who intentionally accesses confidential
- password information to masquerade as other users on
- other BBSes, the masquerader falls well within the pale
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 44
- ----------------------
- of "actual malice" defined in Gertz v. Robert Welch,
- Inc., 418 U.S. 323, 342, supra, note 43 and
- accompanying text (a defamatory falsehood was made with
- knowledge of its falsity or with reckless disregard for
- the truth).
-
- 104. Evidentiary problems involved with proving the
- masquerader's actions are discussed more in Topic III.
- B., infra.
-
- 105. 18 U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988)
- describes the masquerader's fault thus:
- (a) Cause of action. Except as provided in section
- 2703(e), any provider of electronic
- communication service, subscriber, or customer
- aggrieved by any violation of this chapter in
- which the conduct constituting the violation
- is engaged in with a knowing or intentional
- state of mind may, in a civil action, recover
- from the person or entity which engaged in
- that violation such relief as may be
- appropriate.
-
- California Penal Code sec. 502(c) et seq. (West Pub.
- 1988) is even more specific:
- (c) Except as provided in subdivision (i), any
- person who commits any of the following acts
- is guilty of a public offense:
- (1) Knowingly accesses and without permission
- alters, damages, deletes, destroys, or
- otherwise uses any data, computer,
- computer system, or computer network in
- order to either
- (A) devise or execute any scheme or
- artiface to defraud, deceive, or
- extort, or
- (B) wrongfully control or obtain money,
- property or data.
- * * *
- (3) Knowingly and without permission uses or
- causes to be used computer services.
- (4) Knowingly accesses and without permission
- adds, alters, damages, deletes, or
- destroys any data, computer software, or
- computer programs which reside or exist
- internal or external to a computer,
- computer system, or computer network.
- * * *
- (7) Knowingly and without permission accesses
- or causes to be accessed any computer,
- computer system, or computer network.
-
-
- 106. Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
-
- 107. In addition to the remedies set forth in note 105,
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 45
- ----------------------
- supra, the following federal and state penalties may
- apply:
- 18 U.S.C.S. Sec. 2701(b),(c) (Law. Co-op 1979 & Supp.
- 1988):
- (b) Punishment. The punishment for an offense
- under subsection (a) of this seciton is -
- (1) if the offense is committed for purposes
- of commercial advantage, malicious
- destruction or damage, or private
- commercial gain -
- (A) a fine not more than &250,000 or
- imprisonment for not more than one
- year, or both, in the case of a
- first offense under this
- subparagraph; and
- (B) a fine under this title or
- imprisonment for not more than two
- years, or both, for any subsequent
- offense under this subparagraph; and
- (2) a fine of not more than $5,000 or
- imprisonment for not more than six
- months, or both, in any other case.
- (c) Exceptions. Subsection (a) of this section
- does not apply with respect to conduct
- authorized-
- (1) by the person or entity providing a wire
- or electronic communications service;
- (2) by a user of that service with respect to
- a communication of or intended for that
- user; or
- (3) in section 2703, 2704, or 2518 of this
- title.
-
- For an example of state-mandated damages provisions on
- this subject, see California Penal Code sec. 502(d) et
- seq. (West Pub. 1988).
-
- 108. See discussion under Topic II. B., supra.
-
- 109. See note 101, supra.
-
- 110. "Custom...bears upon what other will expect the actor
- to do, and what, therefore, reasonable care may require
- the actor to do, upon the feasibility of taking
- precautions, the difficulty of change, and the actor's
- opportunity to learn the risks and what is called for
- to meet them. If the actor does only what everyone else
- has done, there is at least an inference that the actor
- is conforming to the community's idea of reasonable
- behavior." Keeton, Dobbs, Keeton and Owen, Prosser and
- Keeton on Torts, sec. 33, p.194. See also James,
- Particularizing Standards of Conduct in Negligence
- Trials, 5 Vand. L. Rev. 697, 709-714 (1952); Ploetz v.
- Big Discount Panel Center, Inc., 402 So.2d 64 (Fla.
- App. 1981).
-
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 46
- ----------------------
-
- 111. See notes 80-93, supra, and accompanying text.
-
- 112. See note 103, supra.
-
- 113. See Pfau and Keane, Computer Logs Can Pinpoint Illegal
- Transactions, Legal Times of Washington, vol. 6, p.16
- (May 14, 1984): "Computers can monitor their own use.
- Unlike other such forms of physical evidence such as
- guns, computers can keep track of individual users and
- other identifying data. Imagine a gun that logs every
- instance it is fired or even handled, and shows the
- date, time, and activity. Recovery of such a weapon
- would be essential to the prosecution.
- "Most computers have long had built-in logging
- capabilities....The log function was designed to
- facilitate billing for the use of computer resources
- rather than to assist crime detection. To the extent
- that the owner of a smaller computer does not charge
- for its use, he or she has no incentive to purchase a
- self-executing log. Still, such logs keep surprisingly
- accurate records of who is using the computer."
-
- 114. Fed. R. Evid. 801(c).
-
- 115. Fed. R. Evid. 802: "Hearsay is not admissible except as
- provided by these rules or by other rules precribed by
- the Supreme Court pursuant to statutory authority or by
- Act of Congress." Exclusion of hearsay evidence is
- grounded on: (1) nonavailability of the declarant for
- cross-examination and observance of demeanor; (2)
- absence of an oath by the person making the statement;
- amd (3) significant risk that the person that the
- witness may report proffered statements inaccurately. 2
- Bender, Computer Law, sec. 6.01[2].
-
- 116. Gemignani, The Data Detectives: Building A Case From
- Computer Files, 3 Nat'l L.J. 29 (1981).
-
- 117. Fed. R. Evid. 803(6). See also 2 Bender, Computer Law,
- sec. 6.01[4] (1988).
-
- 118. Fed. R. Evid. 803(6).
-
- 119. Id. In current practice records kept by nonprofit
- organizations, such as churches, have long been held to
- be admissible. Ford v. State, 82 Tex.Cr.R. 638, 200
- S.W. 841 (1918). It is at least arguable that a
- computerized BBS, although run as a hobby, falls under
- the same classification.
-
- 120. See Iowa Code Ann. Sec. 622.28; People v. Lugashi, 252
- Cal.Rptr 434 (Cal.App. 2 Dist. 1988).
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 47
- ----------------------
-
- 121. See 14 Am.Jur. POF2d Sec. 15 (1977, Supp. 1988). Cf.
- United States v. De Georgia, 420 F.2d 889, 2 CLSR 479,
- 484 (1969, CA9 Ariz), where it was held that it is
- immaterial whether a business record is maintained in a
- computer rather than in company books regarding
- admissibility of those records, so long as (1) the
- trial court requires the proponent of the computerized
- records to lay a foundation as to their
- trustworthiness, and (2) the opposing party is given
- the same opportunity to inquire into the computer's
- accuracy as he would have to inquire into the accuracy
- of written business records.
-
- 122. The BBS program run on the SYSOP's computer ordinarily
- "stamps" the date and time of day each user logs onto
- the BBS. A corresponding record is automatically
- affixed to each piece of electronic mail posted so that
- the reader knows when it was added to the database.
- Similarly, the telephone company maintains copious
- records of the date and time each phone call is
- connected in its dialing area. The caller has no
- control over either of these processes.
-
- 123. 252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988).
-
- 124. Id., at 437.
-
- 125. Id.
-
- 126. Id.
-
- 127. Id., at 439.
-
- 128. Id., at 437.
-
- 129. Id., at 440.
-
- 130. Id., at 442. See also United States v. Russo, 480 F.2d
- 1228 (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct.
- 915, 39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V
- Roland Thomas II, 719 F.2d 104 (1983 CA5 La), 104 Fed
- Rules Evid Serv 731; Peoples Cas & Coke Co. v. Barrett,
- 118 Ill.App.3d 52, 73 Ill. Dec. 400, 455 N.E.2d 829
- (1983).
-
- 131. 432 So.2d 837 (La., 1983).
-
- 132. Id., at 839-40.
-
- 133. Id., at 839.
-
- 134. United States v. Verlin, 466 F.Supp. 155 (ND Tex,
- 1979).
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 48
- ----------------------
-
- 135. Id., at 158.
-
- 136. The reasonable SYSOP should offer his full cooperation
- in aiding the maligned user to regain her good name by
- providing her with his BBS' phone-in records made at
- the time the libellous message appeared. See note 93,
- supra.
-
- 137. See note 123, supra.
-
- 138. Cf. note 118, supra. As to an electronic BBS being
- classified as a "business" for hearsay purposes, see
- note 120, supra.
-
- 139. See note 128, supra.
-
- 140. Authentication has been broadly described thus: "[W]hen
- a claim or offer involves impliedly or expressly any
- element of personal connection with a corporeal object,
- that connection must be made to appear...." Wigmore,
- Evidence, Sec. 2129 at 564 (2d ed. 1972). This
- requirement is also known as the "Best Evidence Rule."
-
- 141. Fed. R. Evid. 901(a),(b)(6).
-
- 142. 2 Bender, Computer Law, sec. 5.03[1][a] (1988).
-
- 143. Id.
-
- 144. See Fed. R. Evid. 901(b)(6): "(6) Telephone
- conversations. Telephone conversations, by evidence
- that a call was made to the number assigned at the time
- by the telephone company to a particular person or
- business, if *** (B) in the case of a business, the
- call was made to a place of business and the
- conversation related to business reasonably transacted
- over the telephone...." (emphasis added).
-
- 145. Fed. R. Evid. 1002.
-
-
- 146. E.W. Cleary, McCormick on Evidence, sec. 231 (2nd. Ed.
- 1972).
-
-
- 147. Id. Further rationales for the rule are risks of
- inaccuracy contained in commonly used copying
- techniques and heightened chances of witness'
- forgetfulness through oral testimony. Id., sec. 231.
-
-
- 148. 305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974).
-
- 149. 305 So.2d 421, 427.
-
- 150. Id., at 428.
- ---
- Defamation Liability of Computerized BBS Operators
- & Problems of Proof (C) 1989 John R. Kahn 49
- ----------------------
-
- 151. Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979).
-
- 152. Id., at 370.
-
- 153. See note 121, supra, and accompanying text.
-
- 154. Other circumstantial evidence might include, among
- other things: possible motive for the masquerader to
- defame plaintiff; plaintiff's own inability to call
- from the phone number from which the defamatory message
- is shown to have originated; or even an electronic
- "fingerprint" left by the particular computer from
- which the defamatory message originated. Pfau and
- Keane, Computer Logs Can Pinpoint Illegal Trasactions,
- Legal Times of Washington, vol. 6, p.16 (May 14, 1984).
-
- 155. Fed. R. Evid. 1002 provides:
- REQUIREMENT OF ORIGINAL. To prove the content of
- a writing, recording, or photograph, the original
- of that writing, recording or photograph is
- required, unless provided otherwise in these
- rules or by an Act of Congress.
-
-
- 156. Examples of this situation are the telephone company's
- keeping of hundreds of thousands of individual
- computerized records of each telephone call made within
- a certain dialing area, or a BBS' extensive history of
- subscriber use compiled for billing purposes.
-
- 157. See Harned v. Credit Bureau of Gilette, 513 P2d 650, 5
- CLSR 394 (1973).
-
- 158. Fed. R. Evid. 1006.
-
-
- 159. 137 Ga.App. 360, 223 S.E.2d 757 (1976).
-
- 160. 223 S.E.2d 757, 760.
-