💾 Archived View for spam.works › mirrors › textfiles › law › bbslaws.txt captured on 2023-06-16 at 18:54:25.

View Raw

More Information

-=-=-=-=-=-=-



                 THE LEGAL ASPECTS OF TELECOMMUNICATIONS AND
                     ELECTRONIC BULLETIN BOARD SYSTEMS

                   By:   James J. Spinelli, President
                       VITRON Management Consulting, Inc.

              Sysop: Activity Bulletin Board Service (914) 779-4273
                           Compuserve: 76530,125

             (c) Copyright 1989, VITRON Management Consulting, Inc.
                           All Rights Reserved.


=============================================================================

The easy access, low cost, and distributed intelligence of our modern
means of communications present us with reasons for hope and for
matters of concern. The lack of technical grasp by policy makers and
law makers and their propensity to solve problems of conflict,
privacy, and intellectual property by accustomed bureaucratic routines
are the main reasons for concern. But, our commitment to pluralism,
individual rights, and integrity provide reason for optimism, as do
the pliancy and profusion of our electronic technology and those who
provide it.

We are about to embark on a journey, one that will take us into the
forest of computer law. This forest is as interesting as it is
elusive, as impressive as it is relatively unknown and unexplored, as
evolving as it is potentially perilous. This forest is filled with
many paths upon which we may traverse; yet, only recently, have we
begun to attempt to determine just where all the paths may potentially
lead. We need to view whatever it is that we do in a specific
framework. It is the establishment of this framework that this report
is intended to achieve.

Each of us is engaged in an endeavor that has inherent
responsibilities, accountabilities and, I dare say, liabilities. Sine
the introduction of the first commercial computer in the 1950s, we
humans have been striving to develop a symbiosis between ourselves and
the enigmatic computer. From its embryonic stage to the present time,
the computer has presented us with numerous opportunities and
ever-expanding ingenious methods for doing things.



However, nowhere else has this technological marvel made greater
impact in our lives than in the area of communication. When we
communicate, we partake in an interchange of ideas, with the objective
of being understood and to understand -- we seek a connection between
ourselves and others. Microcomputers have had a major impact in this
area of connectivity. They bridge the gap between the availability of
information and it dissemination. Geography and logistics are no
longer constraints in our efforts to "reach out and touch someone."

In time past, computer-based communications were typically performed
by experienced programmers or very dedicated computer hobbyists who
had both the knowledge and tenacity to forge ahead, sometimes armed
with only a strong sense of adventure. Today, much has changed.
Microcomputers are in the hands of non-experts, ordinary people. Many
of these people do not possess the knowledge or understanding of the
total scope and potential represented by the very machines they use
for business and pleasure. Many of these people take great pleasure in
communicating with others through their computers, and they do so
readily and frequently, often times completely unaware of the
underlying legal consequences involved.

THE SYSOP
---------
In order to meet both the demand and the need for such prolific
communication, computerized information services -- information
"utilities" -- have mushroomed. One of the most pervasive of these is
the electronic bulletin board -- the BBS.

Many of these services are owned and operated by home computer users.
For many of these people, the extent of their computer knowledge is
limited to their understanding of BBS operation only.

Who and what is this individual who owns and operates the BBS? We call
him the Systems Operators -- Sysop, for short. But, this Sysop is more
than just a computer operator. He is:

        1. An information broker;
        2. A data center manager, and
        3. An information resource manager.

As an information broker, the Sysop obtains information from a variety
of sources, stores it, and provides others access to it. He is
responsible for updating the information and for maintaining the
hardware and software needed for its storage and its access.



As a data center manager, the Sysop provides assurances to users that
the information, along with the hardware and software used to store
and maintain it, are reliable, safe, and secure. One aspect that
cannot be ignored in his role as data center manager is that which
necessitates his providing for the integrity of not only the service
itself, but of all who access it. What the Sysop provides is a
service, one that is expected to promote a healthy, constructive,
legal environment, from all users may derive information and
enjoyment.


As an information resource manager, the Sysop has the underlying
commitment to integrate his role of information broker with his role
as data center manager. This responsibility deals with the BBS in its
totality, i.e., an information system that combines hardware,
software, information, users, and Sysop into an integrated whole.

We frequently make reference to the term, "Bulletin Board System,"
without fully comprehending just what such a system truly represents.
A BBS, just like any other system, is a series, or group of integrated
parts, elements, components, functions, that TOGETHER (hence the term
"integrated") perform a specific function or achieve a specific
purpose. Whether or not we are able to define or even understand what
that purpose or function happens to be, may have little to do with the
fact the we're taking about a system.

Every system is composed of five integrated components. These are
illustrated by the diagram below.

     ???????????????????????????????????????????????????????????????????????
     ?                                                                     ?
     ?                           ?????????????                             ?
     ?                           ?           ?                             ?
     ?                           ?  Control  ?                             ?
     ?                           ?           ?                             ?
     ?                           ?????????????                             ?
     ?                                                                     ?
     ?          ?????????????    ?????????????    ?????????????            ?
     ?          ?           ?    ?           ?    ?           ?            ?
     ?          ?   Input   ?? ???  Process  ?? ???  Output   ?            ?
     ?          ?           ?    ?           ?    ?           ?            ?
     ?          ?????????????    ?????????????    ?????????????            ?
     ?                                                                     ?
     ?                ?          ?????????????          ?                  ?
     ?                           ?           ?                             ?
     ?                ?? ? ? ? ? ? Feedback  ? ? ? ? ? ??                  ?
     ?                           ?           ?                             ?
     ?                           ?????????????                             ?
     ?                                                                     ?
     ?                     The FIVE System Components                      ?
     ?                                                                     ?
     ???????????????????????????????????????????????????????????????????????



Each component is an integral part of the overall system.  Such a view
can interpret Input as a stimulus, Output as a response, Process as
that which "converts" the stimulus to a response. The Feedback
component is the way in which we can evaluate the Output, and
determine if it meet expectations.

In many instances, the Output component is referred to as the system's
overall objective. As such, Feedback permits us to inspect the
output/objective, and make appropriate adjustments should the
objectives not meet expectations, or should we find that we have set
our sights too high, given the nature of the Input and Process
components.

The Control component is that which governs the overall system,
allowing it to be the system that it is intended to be. Control may
include such sub-components as policies, procedures, rules,
guidelines, etc.

What is significant about this representation is that should any of
the components break down, the system becomes dysfunctional, i.e., it
does not continue to operate properly, if it, indeed, operates at all.

It is under this umbrella that Sysop performs his major tasks,
recognizing that his BBS, in its entirety, is, indeed, an information
system. As a result, the Sysop is also in the "construction" business,
i.e., he builds the framework and foundation from which his BBS (a
system in the true sense of the word) operates. He recognizes that all
components are necessary, and must perform as intended. He inspects
the results, and makes adjustments accordingly. The Control mechanism
represents the entire legal, social and economic environment under
which the system performs.

In order to adequately fulfill his role as an information resource
manager, the Sysop needs to recognize the many aspects of the total
system he operates. However, many of the aspects are beyond the scope
of this document. As result, we shall examine the legal aspects only.
The first of these involves a brief encounter with the methods by
which users access the information system.

Our first method is the INVITATION.

In a legal sense, an invitation to participate in a BBS may be defined
as an act by which the Sysop solicits or incites others to make use of
his system for the purposes he intends. An invitation may also include
an inducement on the part of the Sysop to others that provide them
with a reasonable belief that the Sysop expects them to access his
system.



As the INVITER, in legal terms, the Sysop owes reasonable care to all
of his lawful visitors. In fulfilling his role as inviter, the Sysop
should be aware of at least three legal concepts:

        1. The Attractive Nuisance Doctrine
        2. The Nature of the Invitee (the person invited)
        3. Trespass

1. Attractive Nuisance Doctrine
-------------------------------
Briefly put, this doctrine deals with the perception of the BBS as
being a source of danger or harm to children. The Sysop, as an
inviter, is under a legal duty to take appropriate precautions to
prevent injury or harm to the children who he knows can or will access
his system, or the children who will be attracted to access his
system. A Sysop should consider this doctrine if and when he invites
others to visit by expressing or implying the availability of
pornography or "adult-only" material available on his BBS.

2. Nature of the Invitee
------------------------
The law defines an invitee condition when the following conditions are met:

    a.  The visitor entered by invitation;
    b.  The entry itself is connected with, in this instance, the
        BBS or connected with what the Sysop permits to be conducted
        on his BBS; and,
    c.  Both the invitee and the Sysop derive a benefit, or, more
        importantly, just the Sysop derives a benefit from the
        invitation.

Legal experts are in basic agreement that if and when the Sysop
encourages others to access his system, particularly if it is intended
to further the Sysop's own purposes -- as both hobbyist- and
business-type-systems tend to do -- that the Sysop has exercised
reasonable care to make the place safe and secure for all who visit.

3. Trespass
-----------
Trespass provides for some interesting implications. The courts have
generally interpreted trespass to be an "unlawful interference with
one's person, property, or rights." In view of a BBS, trespass may be
regarded as any unlawful act that damages the system itself, the
reputation of the Sysop, or the reputation (or even the property,
i.e., computer) of the user. The unlawful act may include actual or
implied violence, such that the result caused injury or harm to befall
a person, a person's property, or a person's relative rights.



Consider this should the Sysop cause damage to a user's property,
etc., by causing or permitting something harmful to be encountered by
the user during the acceptance of the invitation. Of course, the same
be said for the user as causing harm to the Sysop's, property, etc.,
during the exercise of the invitation.


Our second alternative involving BBS access is the SUBSCRIPTION.

Many of the concepts involved in an invitation are also encountered in
a subscription access, with some important differences. A subscription
is a contract.

The Restatement of the Law of Contracts, Section 1, states that, "A
contract is a promise or a set of promises for the breach of which the
law gives a remedy, or the performance of which the law in some way
recognizes a duty." The contract may be an express contract, in which
both the Sysop and user demonstrate their mutual agreement through
words, which may be either written or spoken. In addition, the
contract may be implied-in-fact, in which both the Sysop and user
demonstrate their mutual agreement based upon their conduct.

In many instances, the act of inviting users to subscribe, i.e., pay
for, a subscription BBS presents a clear intention on the part of the
Sysop to contract. This is referred to as an "invitation to trade."
This special type of invitation may be accepted in one of several way.
A common approach is referred to as the "deposited-acceptance rule."
Under this rule, an offer is considered accepted the moment the user,
for example, places his acceptance into the same or better channel of
communication as used by the Sysop to place the offer. The offer is
considered accepted as soon as the acceptance leaves the control of
the user. This may include the mailing of a check, or the sending of a
message.

Our third, and final access alternative is the LICENSE.

A license is defined as the permission by a competent "authority" for
someone else to do something, which, without such permission, would be
illegal, a trespass, or a tort.

This alternative is typical in many situations, though it may not be
recognized as such. However, it is particularly appropriate in a
network configuration. Under the network approach, a Sysop is granted
"permission" to access another BBS system directly, for the purpose
defined by the "license agreement." Such purposes typically include
the exchange and transfer of mail and messages. The license agreement
usually contains a set of procedures or guidelines that define the
boundaries and policies of the network, and, in a sense, govern the
manner in which the network is operated and accessed in at least an
administrative sense. Violations of this agreement by a licensee may
serve cause for the administrators of the network (the licensors) to
seek various remedies.



However, at least one area that is a bit muddy in a license
arrangement for network access is the issue of liability, i.e., as
pertains to the effects of malfeasance on the part of one network node
and the exposure of the other network nodes. Some questions that arise
include:

    a.  Is the liability of one node assumable by another node?

    b.  Are there possible or potential class actions that the
        network and nodes are exposed to?

    c.  How does an identity relationship define the extent to
        which a node may lose its unique identity and be classified
        as merely a member of an overall networked system? For
        example, how does the user perceive the node's identity?
        Is it considered an individual BBS? Is it merely one area
        of contact, whereby one node is merely an extension of the
        overall network system? Or, something in between? In this
        regard, the Sysop's view and the user's view may not converge.
        In other words, is the node truly a node? Or is it merely an
        individual BBS that happens to be temporarily "plugged into"
        a larger structure or configuration? And, of course, what is
        used to define that structure and/or configuration?

THE RESOURCES
-------------
Now that we have briefly examined the idea of the Sysop as an
information resource manager, we need to take a brief tour of those
resources which the Sysop is managing.

Our first resource is SOFTWARE.

For legal purposes, software is defined as "the collection of
materials that contains, expresses, and explains a computer program."
This definition includes a program in machine-readable form contained
on magnetic media, the printouts containing the source and object
code, the programmer's notes and working papers, and the user manual.

The rather unique nature of software has been a constant source of
problems for the courts, who can't seem to decide consistently whether
software is tangible or intangible, or something in between. If it is
tangible, it is covered by the Uniform Commercial Code; otherwise, it
is not. To date, the courts have defined software as tangible for some
purposes and intangible for others, with different courts sometimes
adopting conflicting positions.

Another source of confusion is whether software is considered an
artistic expression, something like a book, or a product of an
engineering process. The courts seem to continue to have trouble
deciding how to regard the process of software development. The result
has been much debate and confusion over copyright and patent
protection of software.



In spite of these issues, computer software is still regarded by law
as property that can be owned and transferred, like any product.
Software is categorized as intellectual property since it is the
result more of mental effort rather than a manufacturing process.
However, additional confusion will no doubt ensue as the field of
computer-assisted software engineering proliferates.

It is important for Sysops to understand the nature of software and
the various methods available to protect this resource. It is
important because, in many instances, the Sysop is regarded as the
provider and guardian of software stored in his BBS. In addition, many
Sysops themselves are software authors. (In the world of the BBS, we
call them "shareware" authors, among other things.)

The owner of software has the exclusive right to control and use the
software he produces. Any infringement of this right can be stopped
through legal means. However, a software author will not make any
money from his software unless he gives up some control. The author
gives up control in one of two ways:

        1.  By the assignment of rights
        2.  By license

On the one hand, it may be rather easy to determine who owns a
particular piece of software. Let's say that you are unemployed or
self-employed, and you develop a program entirely by yourself, in your
own home. Here, it is clear who the owner is. However, if your friend
is helping you with the programming, it is no longer so clear that you
are the sole owner.

There is an interesting sideline in the BBS arena. Many software
authors use a select group of systems (and, therefore, other Sysops)
to test and validate software. Some of these test sites respond by
providing alternatives for program operation and ideas for additional
features. Such enhancements and ideas may only serve to confuse the
ownership issue, particularly if they are in writing and are
well-documented, and are included in the finished product. Simple
acknowledgments may not suffice for attributing possible or potential
ownership rights. The key is that the particular method of expression
is what is potentially copyrightable, not the ideas themselves. So, if
a test site actually writes changes, such may be considered the
expression of the ideas.

In order to prevent possible problems, all agreements and
understanding need to be defined and agreed to BEFORE a project
commences. Here is where the assignment of rights and licenses come
into play.

The assignment of rights transfers all rights in the software to
someone else. This can be done either by selling the software
outright, for a price, or through a royalty arrangement.



License for use, on the other hand, does not involve the transfer of
ownership rights, but rather only the rights necessary for a more
restricted purpose. Such purpose include the use of the software,
under possible specific constraints. As such, the owner does maintain
all of the rights that are not specifically granted or transferred by
the actual license agreement.

The ownership of software also concerns the right to protect against
the infringement of rights. At times it may be suggested that this may
be viewed to be more of an obligation rather than a right. However, in
the legal sense, it is a right because no one else may intervene and
do it for the owner.

There are four methods that are used to protect software ownership:

        1. Trade Secrets
        2. Copyrights
        3. Trademarks
        4. Patents

TRADE SECRET: this area of the law protects the information, devices,
and processes that give the owner a competitive advantage over those
who don't know what the owner knows about something. With software,
this is usually applied during both the development and marketing
stages. However, in order to be considered for a trade secret, the
software needs to contain some unique aspect. A unique aspect is
usually some method or group of methods that may be considered unique
to the program's functioning. Some of the other items that may be
subject to the trade secret include: customer lists, testing results,
and even the names of the programmers who developed the program.

COPYRIGHT: whereas trade secrets typically protect commercial ideas,
regardless of the manner in which they are expressed, copyrights
protect only the expression of the ideas, and not the ideas
themselves.

Before software can be copyrighted:

        a.  it must be expressed in a tangible form
        b.  it must be an original work by the author
        c.  it must not be part of the public domain

In this latter case, there are two ways in which software falls into
the public domain:

        a.  intentionally
        b.  through negligence

This negligence includes publishing the ideas without a copyright
notice. It will remain in the public domain should the author not
correct his error within five years from the date of original
publication.



Copyrights last for the life of the author plus 50 years. However, if
the expression of ideas is classified as a "made for hire" work, the
copyright lasts for 75 years from the date of first publication. If
an owner can prove that someone infringed on his copyright, then he
can take the violator to court, but ONLY IF the copyright is a
registered copyright, i.e., on file with the Library of Congress.

TRADEMARK: this is a word, symbol or phrase that is used to identify a
product and that which sets it apart from other products. Yet, not
every word or phrase or symbol qualifies for a trademark. Words,
symbols or phrases that are deemed to be "of general use" that
describe the nature of a product generally do not qualify. For
example, recent concern over the possibility of applying a trademark
to the term "shareware" may be successfully contested since it would
appear to represent a term "of general use" that describes the nature
of a product, i.e., software obtainable via the BBS arena for a
"nominal" registration fee.

Another important aspect that pertains to trademarks is that software
trademarks cannot be considered too generic or too universally
descriptive either.

To establish a trademark, you select a name, but also make sure that
the name is not being used by someone else. Yet, duplication of names
may be permitted in certain instances, provided, for example, that
confusion does not result, and/or the products are in different
industries.

Then, there's the LAW OF UNFAIR COMPETITION. These "laws" are defined
on the state level, not the federal level. They protect honest
business people from unscrupulous competitors, and also protect the
general public from "intentional" deception. There are times when such
laws may be applied in situations where one cannot apply the federal
laws of trade secret, copyright, trademark and, of course, patent law.

PATENT: of all of the various methods to protect one's property,
patent law does provide the best protection. If one holds a patent, it
is applicable for 17 years. Within this period, no one can duplicate
you "creation." Unlike the other protection methods, patents protect
against what is called "independent development of an invention."
Regardless of whether someone else knows about the idea or not, if a
person has a patent, the invention cannot be duplicated. But, there is
a kicker: many, if not most, computer programs are not eligible for a
patent. According to the Patent Office, you cannot patent something
that is "based either on the laws of nature or upon mental processes."
Computer programs contain algorithms -- mathematical formulas -- which
are mental processes, and, therefore, may not be patentable.



Yet, there are exceptions. The Supreme Court, in the Diamond v. Diehr
case in 1981, stated that "programs may be patentable when they are
an inseparable part of the process or device that is itself
patentable." In addition, in 1981, Merill Lynch applied for and
received a patent on their Cash Management System. (Most recently,
Quarterdeck Software applied for and received a patent on their
"windowing" product, DESQView.)

There is another side of this coin. Programs on ROM chips are usually
patentable since the program is considered part of the hardware (on
the chip). But, such logic may be suspect because a program on ROM
that may be replaced by a program on disk that is read into RAM, may
not be patentable. The Patent Office states that a person cannot
patent something "unless it is considered 'novel' or at least 'not
obvious.'" Programs that are used to automate typical office functions
previously performed manually, for example, generally do not qualify
because the Patent Office does not consider them to be novel enough,
or that they tend to be rather obvious.

What about the methods available for distributing the software? There
are several ways in which software may be marketed and distributed. As
far as the BBS arena is concerned, the most prolific method is "direct
distribution" to users.

We are quite familiar with this method. But, what are the legal
consequences involved, if any? Is a BBS that distributes software
under any legal obligation? At first, one may respond, "Nope, no way."
Yet, the issue may not be so cut and dry.

Virtually all of the systems we are familiar with, for example, tend
to designate a specific file area (directory) that contains "recent
file uploads." These directories usually contain a "disclaimer" in the
so-called "directory header" that states something like, "Untested" or
"Not yet tested." One system that this writer observed had the
following statement in the upload directory's header: "Programs in
this directory have not yet been tested by the Sysop."

What is interesting about this scenario is that rarely do we see, if
at all, such a disclaimer in any of the other file areas (directories)
on a BBS, i.e., the "download" directories. As such, there may very
well be a legal implication in that the files in all of these other
directories have, indeed, been tested. If there is an implied nature
of having been tested, it might also be reasonable for the user to
infer that such "tested" files pose no threat and/or will cause no
problem.



The next question is whether the Sysop is under any legal obligation
to test all programs. Probably not. Yet, if the Sysop is making either
an express or an implied statement that files in all of the download
directories have been tested, there very well may be a legal
obligation. Such a condition may be deemed to at least imply a
difference between the files in the upload directory and those in the
download directories. A reasonably prudent user may, therefore,
believe that the Sysop is providing, if not an express warranty (or
suitability), then possibly an implied warranty regarding the
condition of the files available.

Sysops generally recognize that reasonable care must be exercised
whenever one downloads a file. However, many users are not Sysops, and
will tend to be viewed as having less experience and expertise in such
matters. Sysops must not assume that their users are well-versed in
proper data security and integrity matters. In addition, Sysops, as
mentioned earlier, are providing a service through some method of
invitation, subscription, or license. As such, they may be under a
legal obligation to ensure that the environment is safe and secure for
all visitors. The key here is that Sysops need to protect all of their
visitors from not only all dangers that the Sysops already know about,
but also from dangers that, should the Sysops exercise reasonable
care, they will discover. If a Sysop expresses or implies that files
are tested, then it may be reasonably expected that such a procedure
will uncover problems. As a result, the Sysop may be legally
responsible for such an express or implied "warranty" regarding the
files stored on and accessible through his BBS.

OUTSIDE FORCES
--------------

At this point in our tour of the forest of computer law, it is appropri-
ate to devote a brief period to a discussion pertaining to taxes, and how
they may impact the nature of your BBS, particularly if you are also a
shareware author.

Beginning in the 1985 tax year, the government began to tighten the
screws a bit. First of all, there were new tax laws that limited the
eligibility of home computer owners to take deductions for their home
systems. If a person operates a separate business from his home, even if
it is just a sideline to his regular job, he can still deduct all or part
of the cost of the computer and of the supplies required to maintain and
use it. But, deductions cannot be taken by employees who buy computers to
do work they take home from the office, unless the computer is required
by the employer. Computers and their associated expenses are precluded
from any tax benefits for those people who operate their BBS as a hobby.



The laws also crack down on mixed business and personal use of home com-
puters. If you fall into this category, you must keep a log of computing
time spent on different activities. Logs may be kept either manually or
compiled by the computer. However, you will have to certify, in writing,
that you are keeping the log. If you are audited, the IRS will request to
examine your log. If everything is not in proper order, your deductions
could be disallowed and penalties may be imposed.

One additional items regarding taxes deserves mention -- that of sales
taxes, particularly if you are a shareware author. When you sell your
software, you may have to collect sales taxes from the buyers. There has
been a lot of legislation, and many lawsuits, over the last several years
concerning both sales and use taxes. State laws still vary a bit on
whether to impose sales and use taxes on computer software, although the
trend is toward a more uniform treatment of the issue. You are advised
to consult an attorney, or your appropriate state agency, to learn about
the rules in your own state.

MAIL AND MESSAGING
------------------

We have now arrived at a very important juncture in the forest, that
which concerns the next major resource that must be managed by the Sysop
-- what one Sysop has called, "Our Information Bases," i.e., electronic
mail and messaging. We shall examine this resource in a manner that is
consistent with the Sysop being an information resource manager, and that
views the BBS as a true information and communications medium.

Not only is electronic communication growing faster than the traditional
media of "publication," but also this mode of delivery is bringing the
press, journals, and books into the electronic world.

One question raised by these changes is whether some social features are
inherent in the electronic character of the emerging media. Are electro-
magnetic pulses simply an alternative conduit to delivery of whatever is
wanted, or are there aspects of electronic technology that make it dif-
ferent from print -- more centralized or more decentralized, more banal
or more profound, more private or more government dependent?

The electronic transformation of the media occurs not in a vacuum, but in
a specific historical and legal context. Freedom for communication has
been one of our proudest traditions, but, just what is it that the courts
will protect, and how does it differ from how the courts will act when
the media through which ideas flow are computers? What images do policy
makers have of how computers work? How far are these images valid? What
will happen to these images when the facts change?



In each of the three parts of our communications system -- print, common
carriers, and broadcasting -- the law has rested on a perception of tech-
nology that is sometimes accurate, often inaccurate, and which changes as
slowly as technology changes fast. Each new advance in the technology of
communications disturbs a status quo. It meets resistance from those
whose dominance it threatens. Initially, because it is new, the invention
comes into use in a rather clumsy form. Technical laymen, such as judges
and politicians, perceive the new technology in that early, clumsy form,
which then becomes their image of its nature, possibilities, and use. The
perception becomes an incubus on later understanding.

The courts and regulatory agencies in our system enter as arbiters of the
conflicts among entrepreneurs, interest groups, and political organiza-
tions, all battling for control of the new technology. These arbiters,
applying the familiar analogies from the past to their lay image of the
new technology, create a partly old, partly new structure of rights and
obligations. The legal system thus invented may in some instances be a
tour de force of political creativity, but in other instances is much
less worthy. In many instances, the system thus created turns out to be
inappropriate to the more habile forms of the technology that gradually
emerge as the technology progresses.

Yet, within this context, and within the boundaries applicable to our BBS
environment, two important legal issues are ever-present: libel and pri-
vacy.

(NOTE: A detailed discussion of libel is beyond the scope of this paper.
However, it is the subject of a subsequent paper due out in approximately
one month.)

Libel, in it most fundamental form, deals with injury done to a person's
reputation via the written word. Any study of libel will create a picture
in the mind of the observer -- one that is heartening and at the same
time appalling. We are heartened by the trend in law toward more freedom
to speak out, particularly on public affairs. However, we are appalled by
the possible use of that freedom to wreck havoc on an innocent person's
reputation.

There is no question that the danger of abuse exists, and that the BBS
arena provides a forum that may be used to proliferate the potential for
abuse. The New York Times rule arms the irresponsible as well as the re-
sponsible "journalist" with a weapon of awesome power. The privilege of
"publishing" is constantly being expanded. Fair comment is becoming
easier and easier to invoke. Malice is harder and harder to prove.

Undoubtedly, some people misuse their power. Untruths can lead to per-
sonal injury; misstatements of facts do result in the adoption of unwise
policies. Good people are sometimes maligned and bad people do sometimes
prevail. Without question, writers, journalists (and Sysops) who want to
destroy a person may have a good chance of doing so and getting away with
it. But, the trend toward freedom must be considered in proper legal con-
text.



From its beginnings, the law of defamation has evolved by the balancing
of conflicting interests -- the interest of the individual in the protec-
tion of his reputation, the interest of the writer in communicating facts
and ideas to his readers, and the interest of the public in information.

However, we are not home free just because we may decide to erect a de-
fense against libel. There is a growing trend in law that poses increas-
ing dangers: the concept of privacy.

Privacy of personal information, far from being an esoteric, intangible
issue, is one that could significantly change your BBS operation. When it
does, its effects will be felt throughout the BBS community.

Information about a person is at the hear of the problem. Because of the
special nature of personal information, it may be looked upon as having a
new status. The most important attribute of this new class of data is
that it may no longer be fully under your control. Underlying most of the
privacy legislation is the realization that the individual has a propri-
etary interest in this information. You cannot unilaterally decide what
to do with it. Society, and the law, are there, leaning over your shoul-
der, each and every time you access or use someone's personal informa-
tion.

Modern technology seems to be exhibiting all of the foibles that its de-
tractors had hoped for. The result: a somewhat skeptical public. Users
may have legitimate concerns about the amount and quality of personal in-
formation you maintain in your system, and what you are doing with it.
What seems to be more and more apparent is the reticence on the part of
users to take part in an arrangement where they feel that the information
collection process is infringing on their privacy. What happens if and
when a user is dissatisfied with the way you are treating their informa-
tion? You need to get personally involved, and unless you address the
problem head on, you may end up fighting it out in court.

Information is power. The leverage provided by information can be demon-
strated in many ways. Therefore, a simplistic rule is that the more in-
formation you have about someone, the more power you have over them. Of
course, running contrary to this is the issue of privacy -- often viewed
as diminishing one's power.

Adding this all up, what it means is that more and more the individual is
being perceived as a passive source of information for the automated sys-
tem. With each new development or application put in place for the good
of individuals will also come an assault on their personal freedoms. All
of this represents new challenges to our current concepts and controls
for privacy.

A simple story will emphasize the point. Back in September, 1985, one of
the computer trade journals, COMPUTERWORLD, reported the following:



          In an effort to identify people who fail to file tax
          returns, the Internal Revenue Service is matching its
          files against available lists of names and addresses of
          U.S. citizens who have purchased computers for home use.
          The IRS continues to seek out sources for such information.
          This information is matched against the IRS master file of
          taxpayers to see if those who have not filed can be identi-
          fied.

Individuals who purchase computers for home use tend to represent a seg-
ment of the population that may be classified as middle- to upper-class.
In addition, the IRS wishes to "monitor" the deductions taken by these
people.

This plan raises a great deal of concern among privacy advocates who fear
that this method of information-gathering, while perfectly legal, may
dangerously increase IRS capabilities and put citizens in jeopardy of
government investigation solely because of unverified life-style data
supplied by third parties. As a Sysop, you maintain user files. Who is to
say that the IRS will not approach you and somehow obtain your user-file
data? What would you do? What may other, less scrupulous Sysops do?

The right of privacy has been defined as the right to be let alone; the
right of a person to be free from unwarranted publicity about his per-
sonal life; the right to live without unwarranted interference by the
public regarding matters that the public has no need to know.

Victor Fredericks, a noted privacy expert, refers to the right of privacy
as a principle designed to fill the breach in social justice formerly oc-
cupied by the horsewhip. Though somewhat melodramatic, this description
does provide a rather clear indication of the origins of privacy. Many
Sysops have the presence of mind to compare their system with freedom of
the press -- or at least with the rights inherent in publication. A
little history, however, may provide a rather interesting parallel.

It was not until the year 1890, when so-called yellow-journalism, with
its sensationalized human interest stories, obsession with gossip, sex
and murder, and unrestrained emotional advertising, was dominating the
American press. At that time the privacy doctrine was given its philo-
sophic underpinnings. The authors of the doctrine were Charles Warren and
Louis Brandeis. They wrote a brilliant article in an early edition of the
Harvard Law Review. Their thesis was that all the cases which they col-
lected could be rationalized only through a privacy doctrine and they
vigorously contended that public policy required a forthright recognition
of a right to privacy. To buttress their argument, they criticized the
press and, among other, things wrote:



          The press is overstepping in every direction the obvious
          bounds of propriety and decency. Gossip is no longer the
          resource of the idle and of the vicious, but has become a
          trade which is pursued with industry as well as effrontery.
          To satisfy a prurient taste, the details of...relations
          are spread broadcast in the columns of the daily paper.
          To occupy the indolent, column upon column is filled with
          idle gossip which can only be procured by intrusion upon
          the domestic circle.

Sounds all too familiar. The full impact of this article was not felt for
over half a century; but no law review article has had a greater cumula-
tive effect on the law.

The dangers we face are not of an electronic nightmare, but of human er-
ror. It is not computers but policy that looms as a threat to freedom.
The regulation of electronic communication is not entailed in its tech-
nology, but is a reaction to it.

THE PROFESSIONAL SYSOP
----------------------
The ranks of BBS service providers are expanding rapidly. Since a Sysop
is a provider of computer services and products through his BBS, he is
perceived by many to be a computer professional, or at least some sort of
computer specialist. As such, the Sysop needs to be familiar with the
circumstances under which he could be exposed to legal liability, and how
he may limit that exposure.

For subscription Sysops and for shareware authors, giving people their
money back when they are dissatisfied with your product or your service
may be a relatively minor concern. For all Sysops and authors, however, a
much more potentially serious problem is the possibility of being forced
to compensate a user for losses or injuries.

There are four important legal conditions under which you might be con-
sidered liable for a user's loss or injury:

          1. Breach of warranty
          2. Breach of contract
          3. Ordinary negligence
          4. Professional negligence (malpractice)

Let's look at each of these briefly.

What is breach of warranty? A warranty is a promise that a fact or state-
ment about a product will turn out to be true. Warranties are governed by
the Uniform Commercial Code, adopted in all states except Louisiana. The
UCC-governed warranties apply only to the sale of goods, not to any pro-
visions of services. How does breach of warranty effect you as a Sysop?
If you are a shareware author, its implications are rather clear. How-
ever, many of the BBSes carry a "For Sale" conference, where all sorts of
products are offered to member of the public.



Should you, by an express or implied statement, condone, sponsor or cer-
tify the validity of legitimacy of items posted in your "For Sale"
conference, you may share the liability along with the actual seller for
breach of warranty. Custom software may or may not fit under the UCC war-
ranty, depending on how closely the transaction resembles a sale of pack-
aged software and on the decisions of the courts of the particular state.
There are different types of warranties, and they can lead to some seri-
ous liability issues.

Warranties are either express or implied. Express warranties are promises
made by the seller about the quality or characteristics of the product.
For example, if you give a prospective customer a demonstration in which
the program prepares a complete set of reports, or functions in a spe-
cific way, there is an express warranty that the copy of the software
purchased by the customer will do the same.

For an implied warranty to be created, it is unnecessary for the seller
to make a promise. Under the UCC, every sale of goods creates an implied
warranty of merchantability. This warranty requires that the product per-
forms as it would ordinarily be expected to perform. Another version of
the implied warranty is the warranty of fitness for a particular purpose.
This is created when a seller recommends a product as suitable for the
buyer's needs.

When a warranty is breached, the buyer can take legal action against the
seller. Should consequential damages be involved, they can be quite high.
(Note: We'll look at warranty disclaimers later. However, bear in mind
that in several states, such disclaimers, particularly regarding soft-
ware, may be precluded, i.e., may be disallowed regardless of their pre-
sentment.)

Our second legal condition, under which you might be considered liable
for any loss to a user, is the breach of contract. When you are not sell-
ing a product, UCC warranties do not apply. This legal theory is more ap-
plicable to subscription systems, but even hobbyist systems may form the
basis of a contract given that the four elements of a contract are
present:

          a. offer and acceptance
          b. consideration
          c. legal competency of the parties
          d. legality of purpose

If you are a Sysop, you should take care that your contracts do not con-
tain vague promises that could be used against you in a dispute. You
should also provide a detailed description of what is expected from you
and your users. If you have any doubts, these doubts need to be communi-
cated.

Our third legal theory is ordinary negligence. Everyone needs to exercise
reasonable care in his or her work. Careless mistakes can be the basis of
a lawsuit. As long as you are reasonably careful in your role as a Sysop,
chances are that mistakes or oversights will be forgiven.



Last, but not least, is the legal theory of professional negligence,
i.e., malpractice. If an injured party sues for professional negligence,
the courts will not be so forgiving if you are found to be professionally
negligent.

Generally speaking, advice given and activities performed by certain pro-
fessionals regarding their field of speciality are subject to a high
standard of care. Up to now, for the most part, computer specialists as
professionals were not held to a professional standard of care because at
least two necessary elements in defining a professional for malpractice
purposes were missing:

          1.   The computer professional did not have a standardized,
               well-defined body of knowledge that all members must
               know.

          2.   Examination and licensing procedures were not
               available.

However, these missing elements are beginning to appear as part of the
computer professional's stock-in-trade. For example, there are organiza-
tions for shareware authors that claim to establish a standard of prac-
tice for members; some computer professionals have become "certified."
Colleges and universities are establishing a more standardized curriculum
for computer studies. All of this may not necessarily lead to actual li-
censing of all computer professionals, but it needs to be viewed as a
step for creating a professional for legal purposes.

Regardless, computer professionals do have knowledge and skills that
other people do not have. Customers, clients, users often know little
about computers, software, services, and such. They tend to rely on the
advice of the computer specialist. Under such circumstances, the courts
may begin to impose malpractice liability upon the computer professional.
At the very least, all Sysops should be prepared to be held to a higher
standard of care in their efforts than the ordinary person. This view is
suggested because it appears likely that the courts will expand the con-
ditions of liability in the electronic arena in the future.

THE JOURNEY'S END
-----------------
As we approach the end of our journey through the forest of computer law,
we are left to address the means by which you can take appropriate steps
to, if not eliminate entirely, at least substantially reduce your poten-
tial exposure to liability. Here are some suggestions of the methods that
are available to you.



Quality Control
---------------
Indeed, the best way to avoid legal liability is to make sure that noth-
ing goes wrong in the first place. If you claim to maintain the privacy
of private messages and of user data, you had better do just that. If you
claim to monitor all conferences for inappropriate or illegal communica-
tions (posts), you may need to be able to demonstrate that that is ex-
actly what you do. If you claim, either expressly or by implication, that
you test all programs uploaded to your system, you need to make sure that
you do so. If you claim to verify the authenticity of all users, it may
be something that you need to do. You will not have to worry about law-
suits if there are no problems with what you do or with what you promise
or imply that you do.

Promises
--------
Do not make promises that you cannot or will not keep. If you make a
statement about results or conditions, it could be interpreted as a con-
tractual obligation, or, if it involves a product, that you are express-
ing or implying a warranty. If you advertise certain capabilities, you
may be held bound by express or implied statements that you may not have
really intended to make.

Disclosure
----------
Disclose necessary information. There is little else that angers the
courts more than a situation where an informed person has taken unfair
advantage of an uninformed person. You may be held accountable for not
only malpractice but also for fraud.

Disclaimers
-----------

To be effective, disclaimers have to be clear and conspicuous. If you put
your disclaimers at the end of the manual, or off in some corner of your
system, a court could consider them invalid. Disclaimers cannot be put
just anywhere it is convenient, and especially not as an "afterthought,"
or as a "by-the-way."

In addition, besides disclaiming warranties, Sysops should also disclaim
responsibility for incidental or consequential damages. Remember that
even if all warranties are disclaimed, you may still be sued for negli
gence or malpractice.

CONCLUSION
-----------
We have arrived. Our brief journey is ended. We have explored a new con-
cept in the nature of being a Sysop: you are an information resource man-
ager. We have seen some of the resources under your tutelage. We have re-
viewed the major methods available to protect intellectual property, and
the best means for allocating and disseminating your software and your
services.



One final thought: In some times and places, the capacious new media will
open wider the floodgate for discourse. But, in other times and places,
in fear of that flood, attempts will be made to shut the gates. What will
you words and actions do -- open the gates, or close them?




X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

 Another file downloaded from:                               NIRVANAnet(tm)

 & the Temple of the Screaming Electron   Jeff Hunter          510-935-5845
 Salted Slug Systems                      Strange              408-454-9368
 Burn This Flag                           Zardoz               408-363-9766
 realitycheck                             Poindexter Fortran   415-567-7043
 Lies Unlimited                           Mick Freen           415-583-4102
 Tomorrow's 0rder of Magnitude            Finger_Man           415-961-9315
 My Dog Bit Jesus                         Suzanne D'Fault      510-658-8078

   Specializing in conversations, obscure information, high explosives,
       arcane knowledge, political extremism, diversive sexuality,
       insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.

  Full access for first-time callers.  We don't want to know who you are,
   where you live, or what your phone number is. We are not Big Brother.

                          "Raw Data for Raw Nerves"

X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X