home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky alt.comp.acad-freedom.talk:3794 comp.org.eff.talk:7750 comp.security.misc:2320 alt.privacy:2676
- Newsgroups: alt.comp.acad-freedom.talk,comp.org.eff.talk,comp.security.misc,alt.privacy
- Path: sparky!uunet!haven.umd.edu!ames!agate!boulder!tigger!bear
- From: bear@tigger.cs.Colorado.EDU (Bear Giles)
- Subject: Re: CERT and the Dept. of Justice on keystroke monitoring
- Message-ID: <1992Dec17.160222.1313@colorado.edu>
- Sender: news@colorado.edu (The Daily Planet)
- Nntp-Posting-Host: tigger.cs.colorado.edu
- Organization: National Oceanic & Atmospheric Adminstration / Boulder Labs
- References: <j50qd7f@dixie.com> <1992Dec15.230407.17896@sun44.synercom.hounix.org> <b+arapg@dixie.com>
- Date: Thu, 17 Dec 1992 16:02:22 GMT
- Lines: 16
-
- In article <b+arapg@dixie.com> jgd@dixie.com (John De Armond) writes:
- >The
- >point is, it is the owner of the resource's right to set the rules
- >anyway he so chooses.
-
- If someone contracts for use of computer resources, does not that person
- _own_ in some sense those resources?
-
- What you're saying implies that if I rent time on a system, develop
- a commercial product, then get undercut by the owner of that system
- I have no recourse because he "owns" the system I rented and everything
- on it, even if I paid hard money in return for CPU cycles and mass storage?
-
- --
- Bear Giles
- bear@fsl.noaa.gov/cs.colorado.edu
-