💾 Archived View for spam.works › mirrors › textfiles › bbs › syslibli.txt captured on 2023-06-14 at 15:57:03.

View Raw

More Information

-=-=-=-=-=-=-

From langz@ebay.sun.com Mon Apr 23 21:05:51 1990
Received: from Sun.COM by gaak.LCS.MIT.EDU via TCP with SMTP
	id AA09583; Mon, 23 Apr 90 21:05:27 EDT
Received: from EBay.Sun.COM (male.EBay.Sun.COM) by Sun.COM (4.1/SMI-4.1)
	id AA21291; Mon, 23 Apr 90 18:03:56 PDT
Received: from khayyam.EBay.Sun.COM by EBay.Sun.COM (4.1/SMI-4.1)
	id AA04566; Mon, 23 Apr 90 18:02:40 PDT
Received: by khayyam.EBay.Sun.COM (4.0/SMI-4.0)
	id AA09346; Mon, 23 Apr 90 17:57:50 PDT
Date: Mon, 23 Apr 90 17:57:50 PDT
From: langz@ebay.sun.com (Lang Zerner)
Message-Id: <9004240057.AA09346@khayyam.EBay.Sun.COM>
To: ptownson@gaak.LCS.MIT.EDU
Subject: Defamation Liability of Sysops article
Status: R


             D E F A M A T I O N   L I A B I L I T Y 
                               O F 
                     C O M P U T E R I Z E D 
         B U L L E T I N   B O A R D   O P E R A T O R S 
            A N D   P R O B L E M S   O F   P R O O F 








                                       John R. Kahn
                                       CHTLJ Comment
                                       Computer Law Seminar
                                       Upper Division Writing
                                       February, 1989
                                       
                                       

             D E F A M A T I O N   L I A B I L I T Y 
                               O F 
                     C O M P U T E R I Z E D 
         B U L L E T I N   B O A R D   O P E R A T O R S 
            A N D   P R O B L E M S   O F   P R O O F 

John R. Kahn
CHTLJ Comment/Upper Division Writing/Computer Law Seminar

February, 1989

_________________________________________________________________

I.  INTRODUCTION
    

         A  computer  user  sits  down  at her personal computer, 

turns  it  on, and has it dial the number of a local computerized 

bulletin  board  service  (BBS)  where  she  has  been exchanging 

opinions,    information,    electronic    mail,   and   amicable 

conversation  with other users. Upon connecting with the BBS, she 

enters  a secret "password", presumably known only to herself and 

to  the  bulletin  board  operator,  so  as to gain access to the 

system.

         To  her  surprise,  she  finds herself deluged with lewd 

electronic  mail  from  complete  strangers  and hostile messages 

from  persons  with  whom she believed she was on friendly terms. 

The messages read: "Why did you call me a worthless son-of-a ----

-  yesterday? I really thought we could be friends, but I guess I 

was  wrong";  "Hey, baby, I liked your fetish you were telling me 

about  yesterday:  call  me at home, or I'll call YOU"; and, "Why 

didn't  you  get around to telling me about your venereal disease 

sooner?".  Yet  our user has not called this BBS in weeks and has 

never  made  any  of  these statements. Dismayed and angered, the 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              2

user  comes  to  realize  that  she is the victim of computerized 

bulletin board abuse.

         A  personal  computer  hobbyist  (hereafter "SYSOP") who 

operates  a  computerized bulletin board system notices a rash of 

heated  arguments, profanity and complaints being reported to him 

by  users  on  what had been a forum for the peaceful exchange of 

ideas.   Investigating   the   complaints,   he   discovers  that 

previously     responsible     users     have     suddenly    and 

uncharacteristically  been  leaving  insulting,  rude  and  false 

messages  about other users on the bulletin board. One user is so 

enraged   about   a   public   message  accusing  her  of  sexual 

misadventures  that  she  is  threatening  to  sue  the  computer 

hobbyist  in  libel  for  having permitted the message to appear. 

The  SYSOP  realizes  that  both  he  and  his  subscribers  have 

suffered computerized bulletin board abuse.

         The  aggravating  force behind both the above situations 

is   most   likely   a   third  user  (known  hereafter  as  "the 

masquerader")   who   maliciously   exploits  both  his  computer 

knowledge  and  his  access  to  BBSes. Since the masquerader has 

discovered  the  password  and name of the regular user, and uses 

them  to  access  bulletin boards, he appears for all intents and 

purposes  to  be that regular user. The computer thus believes it 

has  admitted a legitimate subscriber to its database when it has 

in  fact  given  almost  free  reign  to  a  reckless hacker. The 

masquerader,  posing  as another legitimate user, is then free to 

portray  that  user  in  whatever  light  he  pleases and also to 

harass other users of the bulletin board.



Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              3

         When  validated  users  later discover that someone else 

has   been  impersonating  them,  they  invariably  cancel  their 

subscriptions  to  that  BBS  and often bring a defamation action 

against   its  SYSOP  for  the  smearing  of  their  good  names. 

Conversely,   the   SYSOP,  in  an  effort  to  avoid  liability, 

reluctantly  engages  in  monitoring  each  and  every  piece  of 

information  posted  daily  by  hundreds  of  users. If the SYSOP 

chooses  instead  to  stop  running  his  BBS altogether, another 

efficient and valuable forum for ideas is lost.

         What  sort of defamation action may be maintained by the 

wrongfully  disparaged  user?  Is the computerized bulletin board 

offered  by  the  SYSOP  subject to the stricter self-scrutiny of 

newspapers,  or  does  it operate under some lesser standard? How 

may  the  initial  party  at  fault  -  the masquerader - be held 

accountable for his computerized torts?

         The  scope  of  this  Comment  will  be  to  examine the 

defamation   liability   of   computerized   BBS   operators  and 

evidentiary  proof  issues  that  arise  in  tracing computerized 

defamation  to  its  true  source.  Other possible Tort causes of 

action  -  intentional infliction of emotional distress, invasion 

of  privacy,  trespass  to  chattels  -  are not addressed. It is 

assumed  throughout  that  the  plaintiff is a private person and 

that  the issues involved are not matters of "public interest" as 

defined in Gertz v. Robert Welch, Inc.1

    A.   Background

         Computerized  BBSes exist as a quick, easy and efficient 

way   to  acquire  and  exchange  information  about  the  entire 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              4

spectrum   of   interests.2   The  growing  popularity  of  these 

electronic  forums  was  demonstrated  in  a  recent  study which 

numbered  BBSes  at  more  than  3,500  nationwide.3 The size and 

complexity  of  computerized  BBSes  range from relatively simple 

programs,  run  on  privately-owned  microcomputers  with  a  few 

hundred  subscribers,  to vast, multi-topic database systems with 

nationwide lists of subscribers and operated for profit.4

         The  process  of  reaching,  or "accessing" one of these 

bulletin  boards  is  quite  simple:  all  that  is required is a 

computer,   a  computer  program  that  allows  the  computer  to 

communicate  over  the phone lines, and a "modem" (a device which 

converts   the   computer's   electrical  signals  into  acoustic 

impulses,  defined  infra).5  Once  she has accessed the BBS, the 

caller   is   free   to  trade  useful  non-copyrighted  computer 

programs,  exchange  ideas  on  a host of topics, post electronic 

mail  for  later reading by others, and much more.6 The ease with 

which  most  BBSes may be accessed and the wealth of interests to 

be  found  there  ensure  that they will continue to be important 

sources of information and discourse.

         However,  the speed and efficiency of computerized BBSes 

also  subject  them  to  serious, wide-ranging civil and criminal 

abuse.  Recently  a  young  computer user paralyzed several major 

computer  systems across the nation by sending a harmful computer 

program  (or  "worm")  to  them  over  telephone  lines. The worm 

quickly  replicated  itself  in  the computers' memories and thus 

decreased  their  output  capacities.7  Further, certain computer 

abusers  (known  as  "hackers") use the power of the computerized 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              5

forum  to  ply  illegal  copies  of  copyrighted  programs,  bilk 

hundreds  of  millions  of  dollars annually from credit card and 

phone  companies, and to wrongfully access others' data files.8 A 

minority   of  other  BBSes  exist  mainly  to  circulate  racist 

ideologies.9

         What  is  more,  it now appears that the ancient tort of 

defamation  is  actively  being  practiced  through  the  use  of 

computerized   BBSes.10   Due   to   the   almost   ethereal  way 

computerized  BBSes  operate  - one person may conveniently leave 

an  electronic  message for others to respond to at their leisure 

and  there  is  no  need  for the parties to converse directly or 

even  to  know  each other11 - the risk of detection when the BBS 

is  abused  is  lower  than  that for defamation practiced in the 

print  media.12  Difficulties  arise  with  identifying  the true 

party  at  fault  and with authenticating the computer records as 

evidence  of  the  defamation.13  Adding  to  this  problem is an 

uncertainty  in  the laws concerning the appropriate liability of 

SYSOPs  for defamatory messages on their BBSes of which they were 

unaware.14

    B.   Definitions

         The  following  are  brief definitions of some important 

technical terms connected with electronic BBSes:

         SYSOP:  An  abbreviation  for "System Operator", this is 

the  individual  generally responsible for organizing information 

and  for  trouble-shooting  on  a computerized bulletin board. On 

larger  bulletin  boards  covering  hundreds  of  topics, several 

SYSOPS  may  be in charge of maintaining information contained in 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              6

separate  discrete  fields.15 But when the BBS is privately owned 

and  operated,  a  single SYSOP may very well oversee all aspects 

of  the  board's  operations, in addition to being able to access 

all his users' passwords and personal information.16

         Modem:   An  abbreviation  for  "Modulator/Demodulator". 

This  is  a  device  which  links a computer to an ordinary phone 

line  and  converts computer signals to auditory phone signals. A 

computer  modem  on  the  other  end  of  the  transmission  then 

reverses  the  process.  Computers  using  modems  transfer  data 

rapidly across phone lines and thus share information.17

         Validation:  Basically  this is a set of procedures used 

by  responsible  SYSOPs  to  do everything reasonably possible to 

verify  that  the personal information supplied by a user is true 

and  correct.  Common  sense and emerging legal standards dictate 

that  the  SYSOP should not merely rely on the name provided by a 

potential  user  when  the  SYSOP  does  not personally know that 

individual.   The   SYSOP   may   be  required  to  independently 

corroborate  the  prospective  subscriber's  information by first 

asking  the  potential  user's name, address and phone number and 

then  by  checking  that information with directory assistance.18 

These  procedures  will hopefully aid the operator in identifying 

wrongdoers  if  misuse  occurs;19 however, as will be seen, these 

procedures are by no means foolproof.

         Database:  Any  collection  of  data  in  a computer for 

purposes  of  later  retrieval  and  use, i.e., names, addresses, 

phone numbers, membership codes, etc.

         User:  Anyone who accesses a computerized bulletin board 



Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              7

system  and is exposed to the information stored there. Users may 

be  identified  by  their  true  names,  by an assigned numerical 

code, or by colorful "handles", or "usernames."20

         Operating  System:  This is a program which controls the 

computer's   basic  operations  and  which  recognizes  different 

computer  users  so  that their actions do not interfere with one 

another.21  For  example,  most multi-user operating systems will 

not  allow  one  user  to delete another's data unless the second 

user  gives  explicit  permission.22 BBS system software programs 

perform  this  function  through  their  use  of  "accounts"  and 

"passwords":23  private electronic mail sent to a particular user 

may  not  be read or deleted by others. The BBS' operating system 

is  also  designed  to  deny access to those attempting to log on 

under an unvalidated or unrecognized name.24

         Account/Username:   As   another   part  of  BBS  system 

security,   each   user  chooses  an  "account",  or  "username", 

consisting  of  one  to  eight  letters  or  numbers.25  The BBS' 

operating  system then will not allow commands issued by one user 

of  one  account to modify data created by another account;26 nor 

will  it  grant  access to an account that has been terminated or 

invalidated.

         Password:  Yet  another aspect of BBS system security is 

the  use  of  "passwords"  as  a  prerequisite  to  accessing the 

computer  system.  Most  operating  systems  require  the user to 

enter  both  her  account name and password to use the account.27 

Because  electronic  mail  cannot be sent without the username to 

which  it  is  being addressed, and because the account cannot be 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              8

used  without  knowledge of the password, usernames are generally 

public  knowledge  while  passwords are a closely-guarded secret, 

known only to the user and the operating system.28

         Teleprocessing:  This is defined as accessing a computer 

from  a remote location, usually over a telephone line or similar 

communications channel.29

         Uploading/Downloading:   For   purposes   of  exchanging 

computer  programs  or  electronic mail over the phone lines, the 

process  of transferring information from one's personal computer 

to  the bulletin board is called uploading. The reverse process - 

transferring  information  from  a  bulletin  board to a personal 

computer - is known as downloading.30



II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS

    A.   Computerized Defamation: Libel or Slander?

         Libel  is  the  "publication  of  defamatory  matter  by 

written  or printed words, by its embodiment in physical form, or 

by  any  other  form  of  communication  that has the potentially 

harmful  qualities characteristic of written or printed words."31 

Publication   of   a  defamatory  matter  is  "its  communication 

intentionally  or by a negligent act to one other than the person 

defamed."32  A  communication  is  defamatory  if it "tends to so 

harm  the reputation of another as to lower him in the estimation 

of  the  community  or to deter third persons from associating or 

dealing  with  him."33  The  difference between libel and slander 

has  traditionally  depended  upon the form of the communication: 

oral  defamation  generally  is considered slander, while written 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn              9

defamation  is  generally  considered libel.34 The distinction is 

important,  because  libel  requires  no proof of special damages 

and  is  actionable  by  itself, while slander generally requires 

proof of special damages in order to be actionable.35

         However,  with  the  advent  of  electronic  media,  the 

traditional  libel/slander  distinctions  as  they apply to sight 

and  hearing are no longer valid. For example, passing defamatory 

gestures  and  signals,  though visible to sight, were considered 

slander;36  an  ad-libbed  statement  on  a  telecast impugning a 

person's financial status was found to be libel.37

         It  has been suggested that the real distinction between 

libel  and  slander  is  the  threat  and  magnitude  of  harm to 

reputation  inherent in the form of publication.38 Libel has been 

historically  associated  with  writings because (1) a writing is 

made  more  deliberately  than  an  oral statement; (2) a writing 

makes  a  greater  impression  to  the  eye  than  does  an  oral 

statement  to  the  ear;  (3)  a  writing  is more permanent than 

speech;  and (4) a writing has a wider area of dissemination than 

speech.39  These  four  qualities  inherent in a writing made the 

possible  harm  to  reputation greater than mere spoken words. In 

applying  libel  to  the  new  form of computerized communication 

used  on  BBSes,  the  potentiality  for  harm  to  reputation is 

significant,  and  should  again  be  considered  the controlling 

factor.

         In  our hypothetical situation, the user discovered that 

another  user  (the masquerader) had usurped her account name and 

password,  causing  her  great embarrassment and humiliation. The 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             10

act  of  prying into and taking another's computer information to 

misuse  it elsewhere would indicate a certain deliberation on the 

actor's   part  to  spread  defamatory  messages.  Secondly,  the 

defamatory  message is displayed to other users on their computer 

monitors  in  the  form of electronic characters, making a visual 

impression.  Third,  this electronic defamation is more permanent 

than  mere  words  because  it is stored in the BBS' memory until 

erased  by the user or SYSOP. Finally, the message arguably has a 

wider  area  of dissemination than a one-to-one spoken defamation 

because,  as a message on an electronic BBS, it has the potential 

of  being  viewed  by  hundreds, perhaps thousands, of users each 

day.  Based  on these four criteria, the capacity for harm to our 

user's  reputation  due to the masquerader's activities is indeed 

great enough to be considered libellous.

    B.   Defamation Liability of the SYSOP

         Having  established  the  electronic  message  as  being 

libellous,   the  next  issue  is  to  determine  the  extent  of 

liability  for  the  SYSOP who unknowingly permits the message to 

be  communicated  over  his  BBS.  Case  law  indicates  that the 

SYSOP's  liability depends upon the type of person defamed and on 

the subject matter of the defamation.

         1.   Degree of fault required

         The  United  States  Supreme  Court has addressed modern 

defamation  liability  in  two  major decisions. Both conditioned 

the  publisher's  liability  on the type of person defamed and on 

the  content  of the defamation. In New York Times v. Sullivan,40 

the  Court  determined  that  in  order  for a public official to 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             11

recover  damages  in  a  defamation action, the statement must be 

shown  to  have  been  made  with  "actual  malice",  i.e.,  with 

knowledge  of  its  falsity  or  with  reckless disregard for its 

truth.41  Due  to  society's interest in "uninhibited, robust and 

wide-open"  debate  on  public  issues, neither factual error nor 

defamatory  content  sufficed  to  remove  the  First Amendment's 

shield from criticism of an official's conduct.42 

         The  Supreme  Court  further  elaborated  on  defamation 

liability  standards in the private and quasi-private sphere when 

it  decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher 

of  a  John  Birch  Society  newsletter  made  certain  false and 

inaccurate  accusations  concerning an attorney who represented a 

deceased  boy's family. The family had civilly sued the policeman 

who  murdered  the  boy.  In  rebutting what he perceived to be a 

secret  campaign  against  law  and order, the publisher labelled 

the  family's attorney a "Leninist" and "Communist-fronter".44 In 

addition,  the  publisher  asserted  that the attorney had been a 

member  of  the National Lawyers Guild, which "'probably did more 

than  any  other  outfit  to  plan  the  Communist  attack on the 

Chicago  police  during  the  1968  Democratic Convention.'"45 In 

publishing  these  statements  throughout  Chicago,  the managing 

editor  of  the Birch Society newsletter made no effort to verify 

or substantiate the charges against the attorney.46

         The  Supreme  Court  held  in  Gertz  that  while  First 

Amendment   considerations   protect  publications  about  public 

officials47  and about "public figures"48, requiring a showing of 

"actual  malice"  before  defamation  damages could be recovered, 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             12

the  same  was  not  true for defamation suits brought by private 

citizens49,  a  group to which the attorney was held to belong.50 

Private  citizens  were  seen  as deserving more protections from 

defamation  than public officials or public figures, so they were 

not  required  to  show  "actual  malice"  as  a  precondition to 

recovery.51  The  Court  then left it to the states to decide the 

precise   standard   of   liability  for  defamation  of  private 

individuals,  so  long  as  liability  without  fault was not the 

standard.52

         By  Gertz,  then,  the appropriate standard of liability 

for  publicizing  defamation  of  private parties falls somewhere 

below  actual malice and above strict liability. The problem with 

defining  the defamation standard for computerized BBS operators, 

however,  is  a lack of uniform standards. In such circumstances, 

the   objective  "reasonable  person"  standard  will  likely  be 

applied  to  the SYSOP's actions.53 Several cases may be usefully 

applied by analogy.

         The  court  in  Hellar  v.  Bianco54  held  that  a  bar 

proprietor  could  be  responsible  for  not removing a libellous 

message  concerning  the  plaintiff's  wife  that appeared on the 

wall  of  the  bar's  washroom  after  having been alerted to the 

message's  existence.55  The court noted that "persons who invite 

the  public  to  their  premises  owe  a  duty  to  others not to 

knowingly  permit  their  walls  to  be  occupied with defamatory 

matter....  The  theory  is  that  by  knowingly  permitting such 

matter  to  remain  after  reasonable opportunity to remove [it], 

the  owner  of  the wall or his lessee is guilty of republication 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             13

of  the  libel."56  The  Hellar  court  then  left  the  ultimate 

determination  of  the bar owner's negligence to the jury.57 This 

holding  seems  to  be  in  accord with the Restatement of Torts, 

which provides:



         PUBLICATION:
         (2)  One  who  intentionally  and unreasonably 
              fails  to  remove  defamatory matter that 
              he  knows  to  be  exhibited  on  land or 
              chattels  in  his possession or under his 
              control  is  subject to liability for its 
              continued publication.58
              
         
         Contrarily,  however, the Ohio court of appeals in Scott 

v.  Hull59  found  that  the  building  owner  and  agent who had 

control  over  a  building's maintenance were not responsible for 

libel  damages  for graffiti inscribed by an unknown person on an 

exterior  wall.60  The  court distinguished Hellar by noting that 

in  Hellar  the  bartender  constructively adopted the defamatory 

writing  by  delaying  in removing it after having been expressly 

asked to do so:



         "It  may  thus  be  observed  from these cases 
         that  where  liability is found to exist it is 
         predicated  upon  actual  publication  by  the 
         defendant  or  on the defendant's ratification 
         of  a publication by another, the ratification 
         in  Hellar  v. Bianco...consisting of at least 
         the   positive   acts  of  the  defendants  in 
         continuing  to  invite  the  public into their 
         premises  where  the  defamatory matter was on 
         view  after  the  defendants  had knowledge of 
         existence of same."61
         
         
         The  Scott  court  held  that  defendants  could only be 

responsible  for publishing a libellous remark through a positive 

act,  not  nonfeasance;  thus,  their  mere failure to remove the 

graffiti  from  the building's exterior after having it called to 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             14

their  attention  was  held  not  to  be  a  sufficient  basis of 

liability.62

         A  situation  similar to Scott arose recently in Tackett 

v.  General  Motors  Corporation.63  There, an employee brought a 

libel  suit  against  his  employer  for,  inter alia, failing to 

remove  allegedly  defamatory signs from the interior wall of its 

manufacturing  plant  after having notice of their existence. One 

large  sign  remained  on  the wall for two to three days while a 

smaller  one  remained  visible  for  seven  to  eight  months.64 

Instead   of   focussing  on  the  Scott  malfeasance/nonfeasance 

test,65   the   Tackett   court  considered  defendant's  implied 

adoption  of  the  libellous statement to be the correct basis of 

liability.66  While  saying  that  failure  to remove a libellous 

message  from  a  publicly-viewed  place may be the equivalent of 

adopting  that  statement,  and  noting that Indiana would follow 

the  Restatement  view "when the time comes,"67 the Tackett court 

held  that  the  Restatement  view could be taken too far. Citing 

Hellar, the court wrote:



         The  Restatement  suggests that a tavern owner 
         would   be   liable   if  defamatory  graffiti 
         remained  on  a  bathroom  stall a single hour 
         after  the discovery [Citation to Hellar]. The 
         common  law  of  washrooms is otherwise, given 
         the  steep discount that readers apply to such 
         statements   and   the  high  cost  of  hourly 
         repaintings  of  bathroom  stalls [Citation to 
         Scott].   The  burden  of  constant  vigilance 
         exceeds  the  benefits  to be had. A person is 
         responsible   for   statements   he  makes  or 
         adopts,  so  the  question is whether a reader 
         may  infer  adoption  from  the  presence of a 
         statement.  That inference may be unreasonable 
         for  a  bathroom  wall  or  the  interior of a 
         subway  car  in  New York City but appropriate 
         for  the  interior  walls  of  a manufacturing 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             15

         plant,   over   which   supervisory  personnel 
         exercise  greater supervision and control. The 
         costs  of  vigilance  are  small (most will be 
         incurred    anyway),    and    the    benefits 
         potentially   large   (because  employees  may 
         attribute  the  statements  to  their employer 
         more  readily  than patrons attribute graffiti 
         to barkeeps).68
         
         
         According  to  this  reasoning,  then,  the location and 


length  of  time the libel is allowed to appear plays an integral 


part  in  determining  whether  a given defendant has adopted the 


libel, and thus has published it.


         An  application  of  the foregoing analysis to the issue 


at  hand  highlights  the  need  for greater care in allowing the 


posting  of  electronic mail messages on a BBS. The Tackett court 


noted  that  while  the content of graffitti scrawled on bathroom 


walls  might be subject to healthy skepticism by its readers, the 


same  might  not be true for other locations such as interiors of 


subway  cars  or  manufacturing  plant  walls.69 If this is true, 


then  it  is  reasonable  to  assume  that  a  defamatory message 


displayed  in a forum for the exchange of ideas is more apt to be 


taken  seriously  by  its readers - especially when the libellous 


Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             16

message purports to be written by the subject of the libel.70


         Further,  the Tackett court indicated that the high cost 


of   repainting  bathroom  stalls  by  the  hour  outweighed  its 


perceptible  benefits. The same is not true for electronic BBSes, 


where  the costs of prevention are minimal in light of the threat 


of widespread harm to users' reputations.71


         2.   Damages


         Once  the plaintiff establishes that the SYSOP failed to 


act  reasonably in removing statements known to be libellous from 


his  BBS  or  in  negligently failing to prevent their appearance 


there,72  no  proof  of  special damages is necessary as libel is 


actionable  per  se.73 The state's interest in protecting private 


reputations  has been held to outweigh the reduced constitutional 


value  of speech involving matters of no public concern such that 


presumed  and  punitive damages may be recovered absent a showing 


of actual malice.74


         The  proper  gauge  of  liability  has again raised some 


questions.75  One writer has noted that if the burden of proof is 





Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             17

to  rest  on  the  plaintiff,  she  may  be  at a disadvantage in 


producing  sufficient  evidence  to demonstrate negligent conduct 


on  the  part  of  the  SYSOP.76  Solutions  to this problem have 


ranged  from  a  rebuttable presumption of negligence in favor of 


the  plaintiff77  to  adoption  of  a set of standards similar to 


those  set  out  in  the  Federal Fair Credit Reporting Act.78 In 


either   event,  damage  awards  for  computer  abuse  have  been 


addressed both by federal and state law.79


         3.   Suggestions


         Because  computerized  BBSes  are still a relatively new 


technological  phenomena, consistent standards for SYSOPs' duties 


have  yet  to  be developed.80 However, at least one users' group 


has  adopted  a voluntary code of standards for electronic BBSes, 


applicable  to  both  users  and  SYSOPs  of  boards  open to the 


general public:





         SCOPE:
         This  Minimum  Code  of  Standards  applies to 
         both  users  and  SYStem Operators (SYSOPs) of 
         electronic  bulletin  boards  available to the 
         general public.
         FREEDOM OF SPEECH AND IDEAS
         Each  user  and  SYSOP  of  such systems shall 
         actively   encourage   and  promote  the  free 
         exchange   and   discussion   of  information, 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             18

         ideas,  and  opinions, except when the content 
         would:
         -    Compromise  the  national security of the 
              United States.
         -    violate proprietary rights.
         -    violate personal privacy,
         -    constitute a crime,
         -    constitute libel, or
         -    violate   applicable  state,  federal  or 
              local   laws  and  regulations  affecting 
              telecommunications.
         DISCLOSURE
         Each user and SYSOP of such system will:
         -    disclose their real name, and
         -    fully  disclose  any personal, financial, 
              or  commercial  interest  when evaluation 
              any specific product or service.
         PROCEDURES
         SYSOPS shall:
         -    review  in  a  timely manner all publicly 
              accessible information, and
         -    delete  any  information  which they know 
              or  should  know conflicts with this code 
              of standards.
         A  'timely  manner'  is  defined  as  what  is 
         reasonable  based  on  the potential harm that 
         could be expected. Users are responsible for:
         -    ensuring   that   any   information  they 
              transmit  to such systems adheres to this 
              Minimum Code of Standards, and
         -    upon   discovering   violations   of  the 
              Minimum  Code of Standards, notifying the 
              SYSOP immediately.
         IMPLEMENTATION
         Electronic  bulletin board systems that choose 
         to  follow  this  Minimum  Code  of  Standards 
         shall  notify  their  users by publishing this 
         Minimum  Code,  as  adopted by the [Capitol PC 
         Users  Group],  and  prominently  display  the 
         following:
         'This  system  subscribes  to  the  Capitol PC 
         Users  Group  Minimum  Code  of  Standards for 
         electronic bulletin board systems.'81
         
         
         While  non-binding  on  publicly-accessible  BBSes,  the 

above  guidelines  furnish  sound  basic policies that all SYSOPs 

might  use in shielding themselves from defamation liability. Our 

hypothetical  at  the  beginning  of  this  Comment  described  a 

situation  where  a  malicious  intruder  was  able to access and 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             19

masquerade  as  a validated user on a BBS; the following are some 

additional  computer  security measures that the reasonable SYSOP 

could conduct to avoid that situation:

         a.   Special   "screening"   software:  One  writer  has 

suggested  discouraging  potential BBS misuse through programming 

the  BBS  to  reject  those messages containing common defamatory 

and  obscene  language;82  such a program would discard a message 

containing  any  of  those  terms and would presumably notify the 

SYSOP  of  their  presence.  Drawbacks to this procedure are that 

computer  programs cannot understand all the nuances of libellous 

messages83  and  would  thus  lead  to the rigid deletion of many 

otherwise legitimate messages.84

         b.   Unique    passwords:   A   more   fundamental   and 

economical  approach  would  be  for the SYSOP to both notify all 

new  users  about the potential for computerized BBS abuse and to 

encourage  their  use of a unique password on each BBS they call. 

This  would  have  the  practical effect of keeping a masquerader 

from   using  the  names  and  passwords  found  on  one  BBS  to 

wrongfully  access  and  masquerade on other BBSes. A drawback to 

this  procedure is that the truly malicious masquerader may still 

discover  a BBS' most sensitive user records by way of a renegade 

computer  program  called  a "trojan horse".85 However, one could 

speculate  that  the SYSOP acts reasonably in informing potential 

users of the existing threat and in helping them avoid it.

         c.   Encryption:  This  is  essentially  a  way  for the 

SYSOP  to make the users' passwords unique for them. The power of 

the  computer  allows complex algorithms to be applied to data to 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             20

encode  it in such a way that, without the key to the code, it is 

virtually  impossible to decode the information.86 This technique 

would  have  the  added  benefit of forcing the masquerader, upon 

accessing  the BBS with a trojan horse program, to search for the 

secret  decoding  algorithm  in  addition to the BBS' secret user 

files.  Indeed,  it  is  conceivable that a special encryption or 

password  could  be devised to allow only the SYSOP access to the 

BBS'   decoding   algorithm.   However,   encryption  involves  a 

significant  overhead  -  impractical  for most small, privately-

operated  BBSes - and is more frequently used to protect messages 

from  one  system  to  another  where  the  data is vulnerable to 

interception as it passes over transmission lines.87

         d.   Prompt  damage  control:  In  accord with Hellar,88 

the  Restatement  (Second)  of Torts,89 and possibly Tackett,90 a 

SYSOP  acts reasonably in promptly assisting the libelled user to 

partially  reverse  the  effects  of  the  masquerader's actions. 

Recall  that  in  those  instances  a  defendant was held to have 

impliedly  adopted  a defamatory statement by acting unreasonably 

slowly  in  removing  it  from his property once having been made 

aware  of  it.91 While it may be unreasonable to expect the SYSOP 

to  monitor  each message posted every day - especially where the 

defamatory  message  appears to have been left by the true user - 

it  is  not  too  much  to  require  the  SYSOP to quickly remedy 

security  flaws  in  his BBS as they are pointed out to him.92 To 

this  end, the SYSOP has several options. In situations where the 

defaming   user   libels  another  without  masquerading  as  the 

libelled  party,  the  SYSOP  could  simply  delete the defamer's 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             21

account.  In  situations  where  a  user  masquerading as another 

posts  a  libellous message, the SYSOP could publish a retraction 

to  all  his subscribers, urging them to use a different password 

on  each  BBS  they  call. Further, where a masquerader published 

the  libel,  the  SYSOP  should offer his full cooperation to the 

maligned  user  in  tracking down the time and date the libellous 

message  was  posted93  in  order  to  better  limit  the SYSOP's 

liability.

         Certain  BBS  SYSOPs  claim that holding them liable for 

information   appearing  on  their  BBSes  violates  their  First 

Amendment  rights by restricting their right to free speech94 and 

by  holding  them  responsible  for  the libel perpetrated by the 

masquerader.  It has been suggested that the SYSOP should be held 

to  the  same standard of liability as a neighborhood supermarket 

which   furnishes   a   public  bulletin  board:95  just  as  the 

supermarket  would not be liable for posting an advertisement for 

illicit  services,  so  should the BBS SYSOP escape liability for 

libellous  messages left on his board, especially when its poster 

appears to be a validated user.96

         However,  this  comparison  lacks  merit for the reasons 

given  by  the  Seventh  Circuit  in  Tackett  v.  General Motors 

Corporation.97  The  defendant's liability in that case rested on 

its  publication of libel by implicitly adopting the statement.98 

Defendant's  failure  to  remove a defamatory sign painted on one 

of  the  interior  walls of its factory for seven or eight months 

after  discovering  its  presence  was  such that "[a] reasonable 

person  could conclude that Delco 'intentionally and unreasonably 



Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             22

fail[ed]   to   remove'  this  sign  and  thereby  published  its 

contents."99

         There  would  certainly  be  accomplice liability if the 

supermarket  unreasonably  delayed  removing an advertisement for 

illegal  services  from its bulletin board once it was made aware 

of  it.  The  market  could  be  seen  as having adopted the ad's 

statements  by  not  acting  responsibly  to  its viewing public. 

Similarly,  a  SYSOP  would  be  liable  for  defamatory messages 

posted  on  his  BBS - even by what appears to be the true user - 

if  he  fails  to  act  reasonably by using his computer skill to 

eviscerate  the  libel.100  While  the  computerized  BBS  may be 

nothing  more  than a hobby of the SYSOP, the speed with which it 

can  disseminate potentially damaging information among its users 

demands the standards of responsibility described above.

    C.   Defamation Liability of the Masquerader

         1.   Degree of fault required

         It  should  be noted that the liability and proof issues 

concerning  the  SYSOP  and  masquerader  are  inverse. As to the 

SYSOP  who allows libellous messages to be posted on his BBS, his 

liability  may  be  inferred  simply  by  those  messages  having 

appeared  there;101  however, his degree of fault - actual malice 

or  simple  negligence  -  is  subject  to debate.102 Conversely, 

while  the  masquerader's  degree of fault is clearly evident,103 

tracing  that  fault back to him is a more elusive matter.104 The 

requisite  degree of fault for masqueraders is set out in federal 

and state law.105

         2.   Damages



Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             23

         Assuming  arguendo  that  the  masquerader's  defamatory 

publications  have  been  successfully  traced back to him by the 

plaintiff,  actual  and  punitive  damages  may then be recovered 

from  him  based on his knowledge of the publication's falsity or 

reckless  disregard  for its truth.106 Federal and state law have 

also specified certain remedies.107



III PROBLEMS OF PROOF

    A.   Proof of SYSOP's Actions

         We  have seen that while the appropriate degree of fault 

for  a  SYSOP  to  be liable for defamatory messages appearing on 

his  BBS  is subject to dispute,108 a showing that the defamation 

appeared  there  due  to  the  SYSOP's  negligence  is  much more 

capable  of  resolution.109  The jury should be made aware of the 

actual  validation/security procedures practiced by the SYSOP and 

should  weigh  them  in  light  of  the  prevailing  practice.110 

Several  facets  of  an emerging standard of care for SYSOPs have 

already  been  suggested  in  this  Comment,111  and  the SYSOP's 

adherence to them could be shown through users' testimony.

    B.   Proof of Masquerader's Actions

         In  contrast  with  the  degree  of  fault  required  to 

establish  the  SYSOP's publication of the libellous message, the 

degree  of  fault  for  the  masquerader  is much less subject to 

debate.   The   masquerader's   actions  are  not  likely  to  be 

considered  merely  inadvertent or negligent.112 However, because 

the  masquerader  has  intentionally  discovered  and usurped the 

user's  name  and  password,  he  appears  to be that user on all 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             24

computer    records.   Tracing   the   masquerader's   defamatory 

publication   back   to   him   thus  encounters  some  important 

evidentiary  barriers:  the  maligned  user  is forced to rely on 

computerized  records  produced  by  the BBS and phone company in 

trying  to  link  the masquerader's libellous publication back to 

him.113  We  turn  now  to consider the evidentiary hurdles to be 

overcome  in  tracing  the  libellous  communication  to its true 

source.

         1.   The Hearsay Rule & Business Records Exception

         The   first   evidentiary  obstacle  to  connecting  the 

masquerader  with  his libellous publication is the hearsay rule. 

As  defined  by  the  Federal  Rules  of  Evidence, hearsay is "a 

statement,  other than one made by the declarant while testifying 

at  the  trial or hearing, offered in evidence to prove the truth 

of  the  matter  asserted";114  as  such,  it  is inadmissible as 

evidence  at  trial.115 Computer-generated evidence is subject to 

the  hearsay  rule,  not  because  it  is  the  "statement  of  a 

computer",  but  because it is the statement of a human being who 

entered  the  data.116 To the extent the plaintiff user relies on 

computer-generated  records  to  show that a call was placed from 

the  masquerader  to  the  BBS  at the time and date in question, 

then, her evidence may be excluded.

         However,  numerous  exceptions  to the hearsay rule have 

developed   over   the  years  such  that  evidence  which  might 

otherwise  be  excluded  is deemed admissible. The most pertinent 

hearsay  exception  as  applied  to  computerized evidence is the 

"business  records  exception",  which  admits  into evidence any 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             25

records  or  data  compilations,  so  long  as (1) they were made 

reasonably  contemporaneously  with  the  events they record; (2) 

they  were  prepared/kept  in the course of a regularly conducted 

business  activity;  and  (3)  the business entity creating these 

records  relied  on  them  in  conducting  its operations.117 The 

veracity  of  the  compvter  seco0ds  and  of the actual business 

practices  are shown by the record custodian's or other qualified 

witness'  testimony,  unless  the  circumstances indicate lack of 

trustworthiness.118  The  term  "business"  as  used in this rule 

includes  callings  of  every  kind, whether or not conducted for 

profit.119

         Statutes  and  judicial decisions in several states have 

gradually  recognized that the business records exception extends 

to  include computer-generated records.120 This is largely due to 

(1)  modern business' widespread reliance on computerized record-

keeping,  (2)  the impracticability of calling as witnesses every 

person   having   direct   personal  knowledge  of  the  records' 

creation,  and (3) the presumption that if a business was willing 

to  rely  on  such records, there is little reason to doubt their 

accuracy.121

         Using  this  exception  to  the  hearsay rule, plaintiff 

user  would most likely seek to admit the BBS' computer-generated 

username/password  log-in  records  plus the phone company's call 

records  to  establish  the  connection between the masquerader's 

telephone  and  the  BBS  at  the  precise  instant the libellous 

message  was  posted.122 As an initial matter, however, plaintiff 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             26

must  first  lay  a  foundation  for  both  the  BBS'  and  phone 

company's computer-generated business records.

         A  sufficient  foundation for computer-generated records 

was  found  recently to exist in People v. Lugashi.123 There, the 

California  Court  of Appeal affirmed a conviction of grand theft 

based  on  evidence adduced from computer-generated bank records. 

Defendant,  an  oriental  rug  store owner, had been convicted of 

fraudulently   registering   thirty-seven  sales  on  counterfeit 

credit  cards.  The  issuing  banks became suspicious of criminal 

activity  when  charge  card  sales  data  from defendant's store 

showed  44  fraudulent  uses of charge cards at defendant's store 

within  only  five  weeks.124  As  each  fraudulent  credit  card 

transaction   was   completed,   defendant  registered  the  sale 

simultaneously  with  the  banks'  computers.125  Each  night, as 

standard  bank  practice,  the  banks  then  reduced the computer 

records  of  credit  card transactions to microfiche. Information 

gleaned   from  these  microfiche  records  was  entered  against 

defendant at trial.126

         The  California  Court  of  Appeal  recognized the trial 

court   judge's   wide   discretion   in  determining  whether  a 

sufficient  foundation  to  qualify evidence as a business record 

has  been  laid.127 It held that defendant's allocations of error 

were  without merit since defendant himself had acknowledged that 

the  bank's  computer  entries  memorialized  in  the  microfiche 

record  were  entered  simultaneously  as  they  occurred  in the 

regular  course  of  business.128  Further,  the Court of Appeals 

dismissed  defendant's  claim  that  only a computer expert could 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             27

supply  testimony  concerning  the  reliability  of  the computer 

record:



    Appellant's  proposed test incorrectly presumes computer 
    data  to  be  unreliable, and, unlike any other business 
    record,   requires   its   proponent   to  disprove  the 
    possibility  of error, not to convince the trier of fact 
    to  accept  it,  but  merely to meet the minimal showing 
    required for admission....
    The  time  required  to produce this additional [expert] 
    testimony  would unduly burden our already crowded trial 
    courts to no real benefit.129
    
    
         The  Lugashi  court  then  followed  the  bulk  of other 

jurisdictions  adopting  similar analyses and upholding admission 

of  computer  records  with similar or less foundational showings 

over similar objections.130

         As  to  admission  into evidence of telephone companies' 

computer-generated   call  records  under  the  business  records 

exception,  courts  have  evinced  a  similar attitude to that in 

Lugashi.  In  State  v.  Armstead,131  a  prosecution for obscene 

phone  calls,  the trial court was held to have properly admitted 

computer   printouts  showing  that  calls  had  been  made  from 

defendant's  mother's  telephone,  despite defendant's contention 

that  the  witness  who  was called to lay the foundation had not 

been  personally  responsible  for  making the record.132 Because 

the  printout represented a simultaneous self-generated record of 

computer   operation,   the  court  held  it  was  therefore  not 

hearsay.133

         In   an   Ohio   prosecution  for  interstate  telephone 

harassment,  it  was  held  no  error  was committed in admitting 

defendant's  computerized  phone  statement  under  the  Business 

Records  exception  which  showed  that  telephone calls had been 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             28

made  from  defendant's  phone  in  Ohio  to  various  numbers in 

Texas.134  A  sufficient foundation for the admission of business 

records  under  Federal  Rules of Evidence 803(6) was established 

when  a  telephone  company  witness  identified  the  records as 

authentic  and  testified they were made in the regular course of 

business.135

         Applying  the foregoing analyses to BBSes, the plaintiff 

user  would  establish a foundation for the correlated BBS136 and 

telephone  company  phone logs by showing that (1) they were made 

contemporaneously  with  the posting of the libellous message;137 

(2)  they  were  prepared/kept  in  the  course  of  a  regularly 

conducted  business  activity,  since  both the BBS and telephone 

company  consistently  maintain  accounts  of all persons who use 

their  services;  and (3) the BBS and telephone company relied on 

those  records for billing purposes.138 Once such a foundation is 

laid,  the  trial court has wide discretion in admitting business 

records into evidence.139

         2.   Authentication & the Voluminous Records Exception

         The  second  evidentiary  barrier encountered in tracing 

the  masquerader's  libellous messages back to him is proving his 

authorship  of  the  libel,  or "authenticating" the computerized 

records.140  The computer-generated phone and BBS records showing 

that  a call from a certain phone number at a particular date and 

time  resulted  in  a  libellous  message  being  published  must 

somehow be linked to the masquerader.

         The  Federal  Rules  of  Evidence  provide  in pertinent 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             29

part:



    (a)  General     provision.     The    requirement    of 
         authentication  or  identification  as  a condition 
         precedent   to   admissibility   is   satisfied  by 
         evidence  sufficient  to support a finding that the 
         matter in question is what its proponent claims.
    (b)  Illustrations.  By  way  of  illustration only, and 
         not   by  way  of  limitation,  the  following  are 
         examples   of   authentication   or  identification 
         conforming with the requirements of this rule:...
         (6)  Telephone       conversations.       Telephone 
              conversations,  by  evidence  that  a call was 
              made  to  the  number  assigned at the time by 
              the  telephone  company to a particular person 
              or business, if 
              (A)  in  the  case of a person, circumstances, 
                   including  self-identification,  show the 
                   person  answering  to  be the one called, 
                   or
              (B)  in  the  case of a business, the call was 
                   made  to  a  place  of  business  and the 
                   conversation    related    to    business 
                   reasonably     transacted     over    the 
                   telephone....141
    
    
         The   question   of   whether   a  writing  is  properly 

authenticated  is  primarily  one  of  law  for the court; if the 

court  decides  the  question affirmatively, it is ultimately for 

the  jury.142  The  court  will  make  no  assumptions  as to the 

authenticity    of    documents   in   deciding   their   initial 

admissibility.143  The  difficulty  presented  here  is  that the 

Federal  Rules  of  Evidence  seem  to  require authentication of 

telephone  calls  by  reference to their specific content.144 The 

specific  content  of  a  given phone call is not demonstrated by 

phone logs showing merely the date and time the call occurred.

         The   authentication   of  extrinsic  documents  may  be 

subject  to  a  "best  evidence  rule"  objection.  As  stated in 

Federal Rule of Evidence 1002:



    REQUIREMENT  OF  ORIGINAL:  To  prove  the contents of a 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             30

    writing,  recording, or photograph, the original of that 
    writing,  recording,  or  photograph is required, unless 
    provided  otherwise  in  these  rules  or  by  an act of 
    Congress.145
    
    
         Since  its  introduction  in  the  18th century, various 

rationales  have  been  posited  for  this rule.146 While earlier 

writers  asserted  that  the  rule  is intended to prevent fraud, 

most  modern  commentators  agree that the rule's main purpose is 

to  convey  to  the  court  the  exact  operative  effect  of the 

writing's contents.147

         However,   at  least  one  jurisdiction  has  implicitly 

equated  compliance  with the business records exception with the 

Best  Evidence  Rule.  In Louisiana v. Hodgeson,148 the defendant 

in  a  manslaughter  trial  contended  that  a  printout  of  her 

telephone  bill, offered to show communications between her and a 

third  party,  was  not authenticated.149 The court, while making 

no  specific  reference  to  the  authentication  point, rejected 

defendant's  contention,  noting  that  the  information from the 

computer's  storage was the company's business record and that it 

was accessible only by printout.150

         Similarly,  in  an  Indiana bank robbery prosecution,151 

the  state  offered  microfiche copies of the telephone company's 

computerized   records   showing  certain  telephone  calls  from 

defendant.  On appeal, defendant argued that these documents were 

not  authenticated  because  they were not the "original or first 

permanent  entry,"  and  that they therefore should not have been 

admitted  into  evidence.  The  court  disagreed,  saying  that a 

duplicate  was  admissible  to  the  same  extent  as an original 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             31

unless  a  "genuine  issue" were raised as to the authenticity of 

the original.152

         By  these  precedents,  then,  provided  plaintiff  user 

establishes  that  both  the  telephone and BBS user records were 

prepared  in  accordance  with the business records exception,153 

the  fact  that  a  call from the masquerader's phone is shown to 

have  occurred  at  the  same  instant  the libellous message was 

posted  may  be sufficient to authenticate that the call was made 

by  the  masquerader.  Other  circumstantial  evidence adduced by 

plaintiff user would strengthen this inference.154

         Another  authentication  hurdle  in  plaintiff's case is 

the  requirement  that  the  entire  original record sought to be 

authenticated  be  produced.155 This requirement can prove highly 

impractical  in  situations  where  there  are  vast  numbers  of 

individual  records  extending  over  long  periods  of  time.156 

Requiring  plaintiff  to produce the entire body of these records 

would  be  unduly  expensive and time-consuming. What is more, if 

plaintiff   were   to  attempt  to  summarize  vast  computerized 

business  data  compilations  so  as to introduce those summaries 

into  evidence  without  producing  the complete body of computer 

records,  such  summaries  might not be admissible on the grounds 

that they were not made "in the regular course of business."157

         However,   an   exception   to   strict   authentication 

requirements   of   the   Federal  Rules  of  Evidence  has  been 

developed. Rule 1006 provides:



    The  contents  of  voluminous  writings,  recordings, or 
    photographs  which  cannot  conveniently  be examined in 
    court  may be presented in the form of a chart, summary, 
    
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             32

    or  calculation.  The originals, or duplicates, shall be 
    made  available  for examination or copying, or both, by 
    other  parties  at  reasonable time and place. The court 
    may order that they be produced in court.158
    
    
         In   Cotton   v.  John  W.  Eshelman  &  Sons,  Inc.,159 

summaries  of  certain  computerized  records  were held properly 

admitted  into  evidence on the theory that "[w]hen pertinent and 

essential  facts  can  be ascertained only by an examination of a 

large  number  of  entries  in  books  of  account, an auditor or 

expert  examiner  who has made an examination and analysis of the 

books  and  figures  may testify as a witness and give summarized 

statements   of   what   the  books  show  as  a  result  of  his 

investigation,  provided  the  books themselves are accessible to 

the   court   and  to  the  parties."160  Under  this  precedent, 

plaintiff  user would only need to produce the pertinent parts of 

the computerized records, as determined by an impartial auditor.



IV. CONCLUSION

         It  is  difficult  to  overestimate  the ease with which 

computers  now  enable  us  to  compile and exchange information. 

Computerized  "bulletin boards" run on personal microcomputers by 

private  persons  and  businesses  are  examples of this enhanced 

form  of  communication.  Users  can  trade computer programs and 

exchange  a  wealth  of ideas, opinions, and personal information 

through such forums.

         The  advantages  of  this  process  break down, however, 

when   malicious   users   abuse   the   system  and  BBS  SYSOPS 

intentionally  or  negligently allow this to occur. The nature of 

computerized  data  is  such  that  tortious  misinformation  may 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             33

easily  be  spread to thousands of users before it is discovered. 

Because  the  potential  for harm to reputation is so tremendous, 

appropriate  standards  of liability and methods of proof must be 

addressed.

         The  requisite  degree  of  fault  in  libelling private 

persons  is  less than that for libelling public officials/public 

figures,  and  may  be established as against a SYSOP by a simple 

showing  of  his  negligent failure to observe reasonably minimal 

computer   security  measures.  The  basis  of  liability  for  a 

masquerader  who  intentionally misappropriates another's private 

information is even less subject to debate.

         Two  main evidentiary hurdles face the plaintiff seeking 

to  link  the  masquerader  with  his  libellous  message through 

reliance  on  computer-generated records. First, the hearsay rule 

automatically  excludes  all  evidence produced out-of-court that 

is  being  offered  to  prove  the  truth  of the matter at hand. 

Second,   the   authentication   requirement   demands  that  the 

masquerader's   connection   to  the  entire  body  of  proffered 

computer records be established.

         However,  certain exception to both of these limitations 

ease   the   plaintiff's  burden.  First,  the  business  records 

exception  to  the  hearsay  rule  admits  computer  records into 

evidence  if they (1) were made reasonably contemporaneously with 

the  events  they record; (2) were prepared/kept in the course of 

a  regularly  conducted  business  activity; and (3) the business 

entity  creating  these  records relied on them in conducting its 

operations.  Both  BBS  and  telephone  company  records may come 

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             34

under  this  exception. Second, the voluminous writings exception 

allows  the  contents  of  voluminous  computerized records which 

cannot  conveniently  be examined in court to be presented in the 

form  of a summary. So long as the original records or duplicates 

thereof  are  available  for  examination  by  other  parties  at 

reasonable  times  and  places,  the entire data compilation need 

not   be   produced.   Plaintiff  should  employ  both  of  these 

exceptions  in an effort to convince a jury by a preponderance of 

the  evidence that the masquerader has abused his computer skills 

and has damaged plaintiff's reputation.


           ==============================================

From telecom@eecs.nwu.edu Sat Apr 21 01:07:10 1990
Received: from delta.eecs.nwu.edu by gaak.LCS.MIT.EDU via TCP with SMTP
	id AA15278; Sat, 21 Apr 90 01:06:53 EDT
Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU>
Received: from Sun.COM by delta.eecs.nwu.edu id aa15095; 20 Apr 90 14:45 CDT
Received: from EBay.Sun.COM (male.EBay.Sun.COM) by Sun.COM (4.1/SMI-4.1)
	id AA20305; Fri, 20 Apr 90 12:46:45 PDT
Received: from khayyam.EBay.Sun.COM by EBay.Sun.COM (4.1/SMI-4.1)
	id AA06083; Fri, 20 Apr 90 12:46:36 PDT
Received: by khayyam.EBay.Sun.COM (4.0/SMI-4.0)
	id AA08069; Fri, 20 Apr 90 12:42:02 PDT
Date: Fri, 20 Apr 90 12:42:02 PDT
From: Lang Zerner <langz@ebay.sun.com>
Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM>
To: telecom@eecs.nwu.edu
Subject: Sysops and libel liability -- endnotes
Resent-Date:  Sat, 21 Apr 90 0:05:23 CDT
Resent-From: telecom@eecs.nwu.edu
Resent-To: ptownson@gaak.LCS.MIT.EDU
Status: RO

Here are the endnotes to the paper I submitted in a separate message.

Be seeing you...
==Lang

=======
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             35



                             ENDNOTES


1.       418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
         
2.       These  interests can cover anything from science fiction 
         to  gourmet  cooking. Uyehara, Computer Bulletin Boards: 
         Let the Operator Beware, 14 Student Lawyer 28 (1986).
         
3.       Id., at 30.
         
4.       The  data  service  Compuserve  is one such national BBS 
         run  for  profit  by business organizations. Uyehara, at 
         28.  Other  examples  of  large databases of interest to 
         the  legal profession are computerized research services 
         such as LEXIS and WESTLAW.
         
5.       Uyehara,  at  28;  Manning, Bulletin Boards: Everybody's 
         Online  Services,  Online, Nov. 1984, at 8,9. "Modem" is 
         defined infra, note 17 and accompanying text.
         
6.       "...computer   bulletin   boards   offer   their   users 
         important  benefits.  An  individual  can use a bulletin 
         board  to  express  his  opinion  on  a matter of public 
         interest.  He  may  find  a  review  of  a product he is 
         considering  buying.  He  may  find  a  useful  piece of 
         software.  An  individual  might  also  use the bulletin 
         board  to  ask  a  technical  question  about a specific 
         computer   program."   Note,   Computer  Bulletin  Board 
         Operator  Liability  For  User Misuse, 54 Fordham L.Rev. 
         439,  440  (1985)  (Authored  by  Jonathan Gilbert); see 
         also  Lasden,  Of  Bytes And Bulletin Boards, N.Y.Times, 
         August  4, 1985, sec. 6, at 34, col. 1, where the author 
         notes  computer  users  may now use BBSes to voice their 
         opinions directly to State Senators' offices.
         
7.       "Virus"  Hits  Nation's  Research  Computers,  San  Jose 
         Mercury News, Nov. 4, 1988, at 1, col. 1.
         
8.       "It   is  estimated  that  the  theft  of  long-distance 
         services  and  software  piracy  each  approximate  $100 
         million  a  year;  credit card fraud via computers costs 
         about   $200   million   annually."   Pittman,  Computer 
         Security  In Insurance Companies, 85 Best's Rev. - Life-
         Health Ins. Edition, Apr. 1985 at 92.
         
9.       Schiffres,  The  Shadowy  World  of  Computer "Hackers," 
         U.S. News & World Report, June 3, 1985, at 58.

10.      Pollack,  Free  Speech Issues Surround Computer Bulletin 
         Board  Use,  N.Y.  Times,  Nov. 12, 1984, note 1, at D4, 
         col. 6.
         

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             36

11.      Note, 54 Fordham L.Rev. 440-441 (1985).
         
12.      Poore and Brockman, 8 Nat'l L.J. 14, (1985).
         
13.      See infra, Topic III, Problems of Proof.
         
14.      The  uncertainty  revolves  around  how to define BBSes. 
         When  viewed as analogous to newspapers and other media, 
         SYSOPS  would  be  responsible for any message posted on 
         their   systems,   much   as   newspaper   editors   are 
         responsible  for  articles  appearing  in  their medium. 
         Uyehara,  14  Student  Lawyer  30 (1986). But when BBSes 
         are  compared to a bulletin board found in a public hall 
         or  supermarket,  the liability issue is focused more on 
         those  actually  posting the messages rather than on the 
         board's  owner.  Id.,  at 30. This Comment suggests that 
         BBS  SYSOPs  be  held  to  a reasonable standard of care 
         emerging  specifically  for  their endeavors. See infra, 
         Topic II.

15.      Poore  and  Brockman,  8  Nat'l L.J. 14, (1985). Another 
         writer  has  noted  that Compuserve now has over 200,000 
         users  making  use  of  nearly  100  diverse  databases. 
         Lasden,  Of  Bytes  And  Bulletin  Boards,  N.Y.  Times, 
         August 4, 1985, sec. 6, at 34, col. 1.

16.      Poore and Brockman, 8 Nat'l L.J. 14 (1985).

17.      14  Am  Jur.  POF 2d Computer-Generated Evidence Sec. 11 
         (1977).

18.      Note, 54 Fordham L.Rev. 439, 446 (1985).

19.      Id.

20.      See "Account," infra, note 25 and accompanying text.

21.      Garfinkel,  An  Introduction  to  Computer  Security, 33 
         Prac. Law.41-42 (1987).

22.      Id.

23.      See infra, notes 25 and 27 and accompanying text.

24.      Some   more   sophisticated  operating  systems  provide 
         greater  access  control  by  (1) recording unauthorized 
         attempts  at  entry;  (2)  recording  those attempts and 
         sending  a  warning  to the perpetrator; and (3) keeping 
         the   perpetrartor  off  the  system  permanently  until 
         he/she   is   reinstated   by  the  computer's  security 
         administrator  or  SYSOP. Balding, Computer Breaking and 
         Entering:  The  Anatomy of Liability, 5 Computer Lawyer, 
         Jan. 1988, at 6.


Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             37

25.      Garfinkel,  An  Introduction  to  Computer  Security, 33 
         Prac. Law. 42 (1987).

26.      Id.

27.      Id.  "A  password is a secret word or phrase that should 
         be  known  only  to  the user and the computer. When the 
         user  first  attempts to use the computer, he must first 
         enter  the  password.  The  computer  then  compares the 
         typed  password  to  the  stored  password  and, if they 
         match, allows the user access."

28.      Id., at 42 and 46.

29.      14  Am.  Jur. POF 2d Computer-Generated Evidence Sec. 11 
         (1977).

30.      54 Fordham L.Rev. 439, note 2 (1985).

31.      Restatement (Second) of Torts Sec. 568(1) (1976).

32.      Restatement (Second) of Torts Sec. 577(1) (1976).
         
33.      Restatement (Second) of Torts Sec.559 (1976).

34.      Veeder,   The   History   and   Theory  of  the  Law  of 
         Defamation, 3 Colum. L.Rev. 546, 569-571 (1903).

35.      Restatement (Second) of Torts Sec. 622 (1976).

36.      Restatement, Torts Sec. 568, comment d (1938).

37.      Shor  v.  Billingley,  4  Misc.2d  857, 158 N.Y.S.2d 476 
         (Sup.  Ct.  1956),  aff'd  mem., 4 App.Div. 2d 1017, 169 
         N.Y.S.2d 416 (1st Dep't. 1957).

38.      Torts:     Defamation:     Libel-Slander    Distinction: 
         Extemporaneous  Remarks  Made  on  Television Broadcast: 
         Shor  v.  Billingley,  4  Misc. 2d 857, 158 N.Y.S.2d 476 
         (Sup.Ct.  N.Y.  County  1957),  43 Cornell L.Q. 320, 322 
         (1957) (Authored by Stephen A. Hochman).

39.      Id.
         
40.      376  U.S.  254,  84  S.Ct.  710,  11 L.Ed.2d 686 (1964), 
         motion  denied  376  U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d 
         83.
         
41.      376 U.S. 254, 273.

42.      376 U.S. 254, 280.

43.      418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
         

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             38

44.      Gertz v. Robert Welch, Inc., 418 U.S. 323, 326.

45.      Id.

46.      Id., at 327.

47.      "...those  who  hold governmental office may recover for 
         injury  to reputation only on clear and convincing proof 
         that  the  defamatory  falsehood was made with knowledge 
         of  its  falsity  or  with  reckless  disregard  for the 
         truth."  Gertz v. Robert Welch, Inc., 418 U.S. 323, 342. 
         "An  individual  who decides to seek governmental office 
         must  accept  certain  necessary  consequences  of  that 
         involvement  in  pubic  affairs.  He  runs  the  risk of 
         closer  public  scrutiny  than  might  otherwise  be the 
         case." Id., at 344.

48.      "...[A]n  individual  may attain such pervasive fame and 
         notoriety  that  he  becomes  a  public  figure  for all 
         purposes   and   in  all  contexts.  More  commonly,  an 
         individual  voluntarily injects himself or is drawn into 
         a  particular  public  controversy and thereby becomes a 
         public  figure  for a limited range of issues. In either 
         case  such  persons  assume  special  prominence  in the 
         resolution of public questions." 418 U.S. 323, 351.
         
49.      "Even  if  the  foregoing  generalities do not obtain in 
         every   circumstance,   the   communications  media  are 
         entitled  to act on the assumption that public officials 
         and  public  figures have voluntarily exposed themselves 
         to   the   increased  risk  of  injury  from  defamatory 
         falsehood   concerning   them.  No  such  assumption  is 
         justified  with  respect to a private individual. He has 
         not  accepted  public  office or assumed an 'influential 
         role  in  ordering  society.'  Curtis  Publishing Co. v. 
         Butts,  388  U.S., at 164 ...He has relinquished no part 
         of  his interest in the protection of his own good name, 
         and  consequently  he  has a more compelling call on the 
         courts   for   redress   of   injury  inflicted  by  the 
         defamatory  falsehood. Thus, private individuals are not 
         only  more  vulnerable  to  injury than public officials 
         and  public  figures;  they  are  also more deserving of 
         recovery." Id., at 345.

50.      "...[P]etitioner   was  not  a  public  figure.  He  ... 
         plainly  did  not thrust himself into the vortex of this 
         public  issue,  nor did he engage the public's attention 
         in an attempt to influence its outcome." Id., at 352.

51.      Justice Powell noted for the Court that
         
           "[T]he  communications  media are entitled to act on 
           the  assumption  that  public  officials  and public 
           figures   have  voluntarily  exposed  themselves  to 
           increased  risk  of injury from defamatory falsehood 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             39

           concerning  them.  No  such  assumption is justified 
           with  respect  to  a  private individual. He has not 
           accepted  public  office  or assumed an 'influential 
           role  in  ordering  society....' He has relinquished 
           no  part  of  his  interest in the protection of his 
           own  good  name,  and  consequently  he  has  a more 
           compelling  call on the courts for redress of injury 
           inflicted  be  defamatory  falsehood.  Thus, private 
           individuals  are  not only more vulnerable to injury 
           than  public  officials and public figures; they are 
           also more deserving of recovery." Id., at 345.
           

52.      Id., at 347.

53.      Keeton,  Dobbs,  Keeton  and Owen, Prosser and Keeton on 
         Torts,  sec.  32,  p.174.  See also Vaughn v. Menlove, 3 
         Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837).

54.      111  Cal.  App.  2d  424,  244  P.2d  757,  28 ALR2d 451 
         (1952).
         
55.      111 Cal. App. 2d 424, 427.

56.      Id., at 426.

57.      Id, at 427.

58.      Restatement (Second) of Torts Sec. 577(2) (1976).

59.      22 Ohio App.2d 141, 259 N.E.2d 160 (1970).
         
60.      Scott v. Hull, 259 N.E.2d 160, 162 (1970).

61.      Id., at 161.

62.      Id., at 162.

63.      836 F.2d 1042 (7th Cir. 1987).
         
64.      Id., at 1047.

65.      The  Court  of  Appeals  noted  the Restatement view and 
         observed  that  Indiana  law  had  neither  embraced nor 
         rejected that approach. Id., at 1046.

66.      Id.

67.      Id.

68.      Id., at 1046-47.

69.      Id.
         
70.      Recall   that   in   our   hypothetical   a  third  user 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             40

         masquerading  as  another  is  transmitting  messages to 
         others, revealing embarassing and false information.
         
71.      BBS  systems  security  and  other preventative measures 
         are discussed more fully infra, Topic 3.d.
         
72.      Issues  in  proving  the  SYSOP's role in publishing the 
         libellous  statement  are  discussed more fully in Topic 
         III. A., infra.

73.      Sydney  v.  MacFadden  Newspaper  Publishing  Corp., 242 
         N.Y.  208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also 
         Restatement  (Second) of Torts Sec. 621 (1976) ("One who 
         is  liable  for a defamatory communication is liable for 
         the  proved, actual harm caused to the reputation of the 
         person defamed.")

74.      Dun  & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 
         U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985).

75.      See supra, note 53 and accompanying text.

76.      Note,  Protecting  the  Subjects  of  Credit Reports, 80 
         Yale L.J. 1035, 1051-52, n.88 (1971).

77.      Gertz  did  not  rule  out  an assumption of defendant's 
         negligence.  See  Eaton,  The American Law of Defamation 
         Through  Gertz  V.  Robert  Welch,  Inc., and Beyond: An 
         Analytical Primer, 61 Va. L.Rev. 1349 (1975).

78.      15  U.S.C.A. Sec. 1681 et seq. (1974). Two standards are 
         proposed  there:  the  first,  willful noncompliance, is 
         defined  as  equivalent  to  the  New York Times "actual 
         malice"  standard,  and  violators are liable for actual 
         and  punitive  damages.  Sec. 1681(n), supra. Presumably 
         this  would  apply  to  the situation where the SYSOP is 
         dilatory  in  removing the libellous message. The second 
         proposed  standard,  negligent  noncompliance, occurs in 
         the  absence  of  willfulness  and  results in liability 
         only   for   actual   damages.   Sec.   1681(o),  supra. 
         Situations  where  the  SYSOP failed to adopt reasonable 
         computer   security   measures  might  come  under  this 
         category.

79.      18  U.S.C.S.  Sec.  2707(b),(c) (Law. Co-op 1979 & Supp. 
         1988) provides in pertinent part:

           (b)  Relief.  In  a civil action under this section, 
                appropriate relief includes -
                (1)  Such  preliminary  and  other equitable or 
                     declaratory relief as may be appropriate;
                (2)  damages under subsection (c); and
                (3)  a  reasonable  attorney's  fee  and  other 
                     litigation costs reasonably incurred. 
           (c)  Damages.  The  court may assess as damages in a 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             41

                civil  action under this section the sum of the 
                actual  damages  suffered  by the plaintiff and 
                any  profits  made  by the violator as a result 
                of  the  violation,  but  in  no  case  shall a 
                person  entitled  to  recover receive less than 
                the sum of $1,000.
           
         18  U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988) 
         limits  the civil action under this section to two years 
         after  the date upon which the claimant first discovered 
         or   had   a  reasonable  opportunity  to  discover  the 
         violation.
         As  to  damage  provisions  supplied  by  state law, see 
         California Penal Code 502(e)(1),(2) (West Pub. 1988):

           (e)(1)  In  addition  to any civil remedy available, 
           the  owner  or  lessee  of  the  computer,  computer 
           system,  computer network, computer program, or data 
           may   bring   a  civil  action  against  any  person 
           convicted   under   this  section  for  compensatory 
           damages,  including  any  expenditure reasonably and 
           necessarily  incurred  by  the  owner  or  lessee to 
           verify  that  a  computer  system, computer network, 
           computer  program, or data was not altered, damaged, 
           or  deleted  by  the access. For purposes of actions 
           authorized  by  this  subdivision, the conduct of an 
           unemancipated  minor  shall be imputed to the parent 
           or  legal  guardian having control or custody of the 
           minor,  pursuant to the provisions of Section 1714.1 
           of the Civil Code.
           (2)   In   any   action  brought  pursuant  to  this 
           subdivision   the   court   may   award   reasonable 
           attorney's fees to a prevailing party.
           

80.      A  lawsuit  recently filed in the United States District 
         Court  for  the  Southern  District of Indiana may break 
         new  ground  in  enunciating  precisely what BBS SYSOPs' 
         reasonable  duties  of  care  are. Thompson v. Predaina, 
         Civil  Action  #IP-88  93C  (S.D.  Ind. filed 1988). The 
         complaint  alleges,  inter  alia,  invasion of plaintiff 
         user's  privacy, libel, and wrongful denial of access to 
         the  BBS  in  violation  of  U.S.C.  Title  18,  ss 2701 
         (a)(2).  As  to  statutory damages available, see infra, 
         note 105.

81.      Gemignani,  Computer Law 33:7 (Lawyers Co-op 1985, Supp. 
         1988)  (quoting  Capitol  PC Users Group Minimum Code of 
         Standards   for   electronic   Bulletin  Board  Systems, 
         reprinted in 4 Computer Law Reptr. 89).

82.      Note,  54  Fordham  L.Rev.  439, 449 (1985) (Authored by 
         Jonathan Gilbert).

83.      Id., at 449.

84.      Id., at 449-50.

Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             42


85.      A  "trojan  horse"  program takes control of the BBS and 
         allows   its   sender  to  access  and  steal  its  most 
         sensitive  information.  Fites,  Johnston and Kratz, The 
         Computer  Virus Crisis, Van Nortrand/Reinhold (1989), at 
         39 and 45.

86.      Balding,  Computer Breaking and Entering: The Anatomy of 
         Liability, 5 Computer Law. (January 1988), at 6.

87.      Id.

88.      Hellar  v.  Bianco, 244 P.2d 757. See supra, note 54 and 
         accompanying text.

89.      Restatement  (Second)  of  Torts Sec. 577(2) (1976). See 
         supra, note 58 and accompanying text.

90.      Tackett  v.  General  Motors  Corporation, 836 F.2d 1042 
         (7th  Cir.  1987).  See  supra, note 63 and accompanying 
         text.

91.      See note 53, supra, and accompanying text.
         
92.      It  has  been  suggested  that  this  would be the rough 
         equivalent  of a newspaper publishing a retraction after 
         discovering  what  it  had printed was defamatory. Note, 
         54  Fordham  L.Rev.  439,  note 55 (1985). BBS operators 
         should  not  be held liable in this situation insofar as 
         they  did not know of the nature of the statement at the 
         time  it  was  made.  Restatement (Second) of Torts Sec. 
         581 (1977).

93.      Proving  the  masquerader's  actions  is  discussed more 
         fully infra, Topic III. B.

94.      Stipp,  Computer  Bulletin  Board  Operators  Fret  Over 
         Liability  for Stolen Data, Wall St. J. Nov. 9, 1984, at 
         33, col. 1.

95.      Id.

96.      See   Topic   I.,   supra,  where  the  masquerader  has 
         discovered  and  uses  the  password  and  name  of  the 
         regular  user;  he  appears for all intents and purposes 
         to be that regular user.

97.      836 F.2d 1042 (7th Cir. 1987).

98.      Id., at 1047.

99.      Id.

100.     Indeed,  U.S.C.  Title  18, Sec. 2702 (Law. Co-op 1979 & 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             43

         Supp.  1988)  proscribes the knowing dissemination of an 
         electronically stored communication by the SYSOP:

           Sec. 2702. Disclosure of contents
           (a)  Prohibitions.  Except as provided in subsection 
                (b)-
                (1)  a    person   or   entity   providing   an 
                     electronic  communication  service  to the 
                     public  shall not knowingly divulge to any 
                     person   or   entity  the  contents  of  a 
                     communication  while in electronic storage 
                     on that service; and
                (2)  a   person   or  entity  providing  remote 
                     computing  service to the public shall not 
                     knowingly  divulge to any person or entity 
                     the  contents  of  any communication which 
                     is carried or maintained on that service-
                     (A)  on  behalf  of, and received by means 
                          of  electronic  transmission from (or 
                          created    by   means   of   computer 
                          processing      of     communications 
                          received   by   means  of  electronic 
                          transmissions  from), a subscriber or 
                          customer of such service; and
                     (B)  solely  for  the purpose of providing 
                          storage    or   computer   processing 
                          services   to   such   subscriber  or 
                          customer,  if  the  provider  is  not 
                          authorized  to access the contents of 
                          any  such communications for purposes 
                          of  providing any services other than 
                          storage or computer processing.
           
         A  similar  provision is embodied in Cal. Pen. Code sec. 
         502(c)(6) (West Pub. 1988), which provides:
         
                (c)  Except  as  provided  in  subdivision (i), 
                     any   person   who   commits  any  of  the 
                     following  acts  is  guilty  of  a  public 
                     offense:
                     (6)  Knowingly   and   without  permission 
                          provides  or  assists  in providing a 
                          means   of   accessing   a  computer, 
                          computer  system, or computer network 
                          in violation of this section.
           
           
101.     The  doctrine of res ipsa loquitor, or "the thing speaks 
         for  itself"  warrants  the  inference  of  the  SYSOP's 
         negligence,  which  the  jury  may  draw  or  not as its 
         judgement   dictates.   See  Sullivan  v.  Crabtree,  36 
         Tenn.App. 469, 258 S.W.2d 782 (1953).

102.     See discussion under Topic II. B., supra.

103.     As   someone  who  intentionally  accesses  confidential 
         password  information  to  masquerade  as other users on 
         other  BBSes, the masquerader falls well within the pale 
         
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             44

         of  "actual  malice"  defined  in Gertz v. Robert Welch, 
         Inc.,   418   U.S.   323,   342,   supra,  note  43  and 
         accompanying  text (a defamatory falsehood was made with 
         knowledge  of its falsity or with reckless disregard for 
         the truth).

104.     Evidentiary   problems   involved   with   proving   the 
         masquerader's  actions  are discussed more in Topic III. 
         B., infra.

105.     18  U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988) 
         describes the masquerader's fault thus:

           (a)  Cause  of action. Except as provided in section 
                2703(e),    any    provider    of    electronic 
                communication  service, subscriber, or customer 
                aggrieved  by  any violation of this chapter in 
                which  the  conduct  constituting the violation 
                is  engaged  in  with  a knowing or intentional 
                state  of  mind may, in a civil action, recover 
                from  the  person  or  entity  which engaged in 
                that   violation   such   relief   as   may  be 
                appropriate.
                
         California  Penal  Code  sec.  502(c) et seq. (West Pub. 
         1988) is even more specific:

           (c)  Except  as  provided  in  subdivision  (i), any 
                person  who  commits  any of the following acts 
                is guilty of a public offense:
                (1)  Knowingly  accesses and without permission 
                     alters,  damages,  deletes,  destroys,  or 
                     otherwise   uses   any   data,   computer, 
                     computer  system,  or  computer network in 
                     order to either
                     (A)  devise   or  execute  any  scheme  or 
                          artiface   to  defraud,  deceive,  or 
                          extort, or
                     (B)  wrongfully  control  or obtain money, 
                          property or data.
                                   * * *
                (3)  Knowingly  and  without permission uses or 
                     causes to be used computer services.
                (4)  Knowingly  accesses and without permission 
                     adds,   alters,   damages,   deletes,   or 
                     destroys  any  data, computer software, or 
                     computer  programs  which  reside or exist 
                     internal   or   external  to  a  computer, 
                     computer system, or computer network.
                                     * * *
                (7)  Knowingly  and without permission accesses 
                     or  causes  to  be  accessed any computer, 
                     computer system, or computer network.
           

106.     Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.

107.     In  addition  to  the  remedies  set  forth in note 105, 
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             45

         supra,  the  following  federal  and state penalties may 
         apply:
         18  U.S.C.S.  Sec.  2701(b),(c) (Law. Co-op 1979 & Supp. 
         1988):

           (b)  Punishment.   The  punishment  for  an  offense 
                under subsection (a) of this seciton is -
                (1)  if  the  offense is committed for purposes 
                     of    commercial    advantage,   malicious 
                     destruction    or   damage,   or   private 
                     commercial gain -
                     (A)  a  fine  not  more  dhan  &250,0
0 or 
                          imprisonment  for  not  more than one 
                          year,  or  both,  in  the  case  of a 
                          first      offense     under     this 
                          subparagraph; and
                     (B)  a    fine   under   this   title   or 
                          imprisonment  for  not  more than two 
                          years,  or  both,  for any subsequent 
                          offense under this subparagraph; and
                (2)  a   fine   of  not  more  than  $5,000  or 
                     imprisonment   for   not   more  than  six 
                     months, or both, in any other case. 
           (c)  Exceptions.  Subsection  (a)  of  this  section 
                does   not   apply   with  respect  to  conduct 
                authorized-
                (1)  by  the  person or entity providing a wire 
                     or electronic communications service;
                (2)  by  a user of that service with respect to 
                     a  communication  of  or intended for that 
                     user; or
                (3)  in  section  2703,  2704,  or 2518 of this 
                     title.
           
         For  an  example of state-mandated damages provisions on 
         this  subject,  see California Penal Code sec. 502(d) et 
         seq. (West Pub. 1988).

108.     See discussion under Topic II. B., supra.

109.     See note 101, supra.

110.     "Custom...bears  upon  what  other will expect the actor 
         to  do, and what, therefore, reasonable care may require 
         the   actor  to  do,  upon  the  feasibility  of  taking 
         precautions,  the  difficulty of change, and the actor's 
         opportunity  to  learn  the risks and what is called for 
         to  meet them. If the actor does only what everyone else 
         has  done, there is at least an inference that the actor 
         is  conforming  to  the  communit`'s  i`ea of reasonable 
         behavior."  Keeton,  Dobbs, Keeton and Owen, Prosser and 
         Keeton  on  Torts,  sec.  33,  p.194.  See  also  James, 
         Particularizing   Standards  of  Conduct  in  Negligence 
         Trials,  5  Vand. L. Rev. 697, 709-714 (1952); Ploetz v. 
         Big  Discount  Panel  Center,  Inc.,  402 So.2d 64 (Fla. 
         App. 1981).
         
Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             46


111.     See notes 80-93, supra, and accompanying text.

112.     See note 103, supra.

113.     See  Pfau  and Keane, Computer Logs Can Pinpoint Illegal 
         Transactions,  Legal  Times  of Washington, vol. 6, p.16 
         (May  14,  1984):  "Computers can monitor their own use. 
         Unlike  other  such  forms  of physical evidence such as 
         guns,  computers  can keep track of individual users and 
         other  identifying  data.  Imagine a gun that logs every 
         instance  it  is  fired  or  even handled, and shows the 
         date,  time,  and  activity.  Recovery  of such a weapon 
         would be essential to the prosecution.
         "Most   computers   have   long   had  built-in  logging 
         capabilities....The   log   function   was  designed  to 
         facilitate  billing  for  the  use of computer resources 
         rather  than  to  assist  crime detection. To the extent 
         that  the  owner  of  a smaller computer does not charge 
         for  its  use,  he or she has no incentive to purchase a 
         self-executing  log.  Still, such logs keep surprisingly 
         accurate records of who is using the computer."

114.     Fed. R. Evid. 801(c).

115.     Fed.  R. Evid. 802: "Hearsay is not admissible except as 
         provided  by  these rules or by other rules precribed by 
         the  Supreme Court pursuant to statutory authority or by 
         Act  of  Congress."  Exclusion  of  hearsay  evidence is 
         grounded  on:  (1)  nonavailability of the declarant for 
         cross-examination   and   observance  of  demeanor;  (2) 
         absence  of  an oath by the person making the statement; 
         amd  (3)  significant  risk  that  the  person  that the 
         witness  may report proffered statements inaccurately. 2 
         Bender, Computer Law, sec. 6.01[2].

116.     Gemignani,  The  Data  Detectives:  Building A Case From 
         Computer Files, 3 Nat'l L.J. 29 (1981).

117.     Fed.  R.  Evid. 803(6). See also 2 Bender, Computer Law, 
         sec. 6.01[4] (1988).

118.     Fed. R. Evid. 803(6).

119.     Id.  In  current  practice  records  kept  by  nonprofit 
         organizations,  such as churches, have long been held to 
         be  admissible.  Ford  v.  State,  82 Tex.Cr.R. 638, 200 
         S.W.  841  (1918).  It  is  at  least  arguable  that  a 
         computerized  BBS,  although run as a hobby, falls under 
         the same classification.

120.     See  Iowa  Code Ann. Sec. 622.28; People v. Lugashi, 252 
         Cal.Rptr 434 (Cal.App. 2 Dist. 1988).


Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             47

121.     See  14  Am.Jur.  POF2d  Sec. 15 (1977, Supp. 1988). Cf. 
         United  States  v. De Georgia, 420 F.2d 889, 2 CLSR 479, 
         484  (1969,  CA9  Ariz),  where  it  was held that it is 
         immaterial  whether a business record is maintained in a 
         computer   rather   than   in  company  books  regarding 
         admissibility  of  those  records,  so  long  as (1) the 
         trial  court  requires the proponent of the computerized 
         records    to    lay    a   foundation   as   to   their 
         trustworthiness,  and  (2)  the  opposing party is given 
         the  same  opportunity  to  inquire  into the computer's 
         accuracy  as  he would have to inquire into the accuracy 
         of written business records.

122.     The  BBS  program run on the SYSOP's computer ordinarily 
         "stamps"  the  date  and time of day each user logs onto 
         the   BBS.   A  corresponding  record  is  automatically 
         affixed  to each piece of electronic mail posted so that 
         the  reader  knows  when  it  was added to the database. 
         Similarly,   the  telephone  company  maintains  copious 
         records  of  the  date  and  time  each  phone  call  is 
         connected  in  its  dialing  area.  The  caller  has  no 
         control over either of these processes.

123.     252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988).

124.     Id., at 437.

125.     Id.

126.     Id. 

127.     Id., at 439.

128.     Id., at 437.

129.     Id., at 440.

130.     Id.,  at  442. See also United States v. Russo, 480 F.2d 
         1228  (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct. 
         915,  39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V 
         Roland  Thomas  II,  719 F.2d 104 (1983 CA5 La), 104 Fed 
         Rules  Evid Serv 731; Peoples Cas & Coke Co. v. Barrett, 
         118  Ill.App.3d  52,  73  Ill.  Dec. 400, 455 N.E.2d 829 
         (1983).

131.     432 So.2d 837 (La., 1983).

132.     Id., at 839-40.

133.     Id., at 839.

134.     United  States  v.  Verlin,  466  F.Supp.  155  (ND Tex, 
         1979).


Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             48

135.     Id., at 158.

136.     The  reasonable  SYSOP should offer his full cooperation 
         in  aiding  the maligned user to regain her good name by 
         providing  her  with  his  BBS' phone-in records made at 
         the  time  the  libellous message appeared. See note 93, 
         supra.

137.     See note 123, supra.

138.     Cf.  note  118,  supra.  As  to  an electronic BBS being 
         classified  as  a  "business"  for hearsay purposes, see 
         note 120, supra.

139.     See note 128, supra.

140.     Authentication  has been broadly described thus: "[W]hen 
         a  claim  or  offer  involves impliedly or expressly any 
         element  of personal connection with a corporeal object, 
         that  connection  must  be  made to appear...." Wigmore, 
         Evidence,   Sec.   2129  at  564  (2d  ed.  1972).  This 
         requirement is also known as the "Best Evidence Rule."

141.     Fed. R. Evid. 901(a),(b)(6).

142.     2 Bender, Computer Law, sec. 5.03[1][a] (1988).

143.     Id.

144.     See    Fed.   R.   Evid.   901(b)(6):   "(6)   Telephone 
         conversations.   Telephone  conversations,  by  evidence 
         that  a call was made to the number assigned at the time 
         by  the  telephone  company  to  a  particular person or 
         business,  if  ***  (B)  in  the case of a business, the 
         call   was   made   to  a  place  of  business  and  the 
         conversation  related  to business reasonably transacted 
         over the telephone...." (emphasis added).

145.     Fed. R. Evid. 1002.
         
146.     E.W.  Cleary,  McCormick on Evidence, sec. 231 (2nd. Ed. 
         1972).
         
147.     Id.  Further  rationales  for  the  rule  are  risks  of 
         inaccuracy    contained   in   commonly   used   copying 
         techniques    and   heightened   chances   of   witness' 
         forgetfulness through oral testimony. Id., sec. 231.
         
148.     305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974).

149.     305 So.2d 421, 427.

150.     Id., at 428.


Defamation Liability of Computerized BBS Operators
& Problems of Proof          (C) 1989 John R. Kahn             49

151.     Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979).

152.     Id., at 370.

153.     See note 121, supra, and accompanying text.

154.     Other   circumstantial  evidence  might  include,  among 
         other  things:  possible  motive  for the masquerader to 
         defame  plaintiff;  plaintiff's  own  inability  to call 
         from  the phone number from which the defamatory message 
         is  shown  to  have  originated;  or  even an electronic 
         "fingerprint"  left  by  the  particular  computer  from 
         which   the  defamatory  message  originated.  Pfau  and 
         Keane,  Computer  Logs Can Pinpoint Illegal Trasactions, 
         Legal Times of Washington, vol. 6, p.16 (May 14, 1984).

155.     Fed. R. Evid. 1002 provides:

             REQUIREMENT  OF  ORIGINAL. To prove the content of 
             a  writing, recording, or photograph, the original 
             of   that  writing,  recording  or  photograph  is 
             required,   unless  provided  otherwise  in  these 
             rules or by an Act of Congress.
             

156.     Examples  of  this situation are the telephone company's 
         keeping   of   hundreds   of   thousands  of  individual 
         computerized  records of each telephone call made within 
         a  certain  dialing area, or a BBS' extensive history of 
         subscriber use compiled for billing purposes.

157.     See  Harned  v. Credit Bureau of Gilette, 513 P2d 650, 5 
         CLSR 394 (1973).

158.     Fed. R. Evid. 1006.
         
159.     137 Ga.App. 360, 223 S.E.2d 757 (1976).

160.     223 S.E.2d 757, 760.