O F
C O M P U T E R I Z E D
B U L L E T I N B O A R D O P E R A T O R S
A N D P R O B L E M S O F P R O O F
John R. Kahn
CHTLJ Comment
Computer Law Seminar
Upper Division Writing
February, 1989
---
D E F A M A T I O N L I A B I L I T Y
O F
C O M P U T E R I Z E D
B U L L E T I N B O A R D O P E R A T O R S
A N D P R O B L E M S O F P R O O F
John R. Kahn
CHTLJ Comment/Upper Division Writing/Computer Law Seminar
February, 1989
_________________________________________________________________
I. INTRODUCTION
A computer user sits down at her personal computer,
turns it on, and has it dial the number of a local computerized
bulletin board service (BBS) where she has been exchanging
opinions, information, electronic mail, and amicable
conversation with other users. Upon connecting with the BBS, she
enters a secret "password", presumably known only to herself and
to the bulletin board operator, so as to gain access to the
system.
To her surprise, she finds herself deluged with lewd
electronic mail from complete strangers and hostile messages
from persons with whom she believed she was on friendly terms.
The messages read: "Why did you call me a worthless son-of-a ----
- yesterday? I really thought we could be friends, but I guess I
was wrong"; "Hey, baby, I liked your fetish you were telling me
about yesterday: call me at home, or I'll call YOU"; and, "Why
didn't you get around to telling me about your venereal disease
sooner?". Yet our user has not called this BBS in weeks and has
never made any of these statements. Dismayed and angered, the
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 2
----------------------
user comes to realize that she is the victim of computerized
bulletin board abuse.
A personal computer hobbyist (hereafter "SYSOP") who
operates a computerized bulletin board system notices a rash of
heated arguments, profanity and complaints being reported to him
by users on what had been a forum for the peaceful exchange of
ideas. Investigating the complaints, he discovers that
previously responsible users have suddenly and
uncharacteristically been leaving insulting, rude and false
messages about other users on the bulletin board. One user is so
enraged about a public message accusing her of sexual
misadventures that she is threatening to sue the computer
hobbyist in libel for having permitted the message to appear.
The SYSOP realizes that both he and his subscribers have
suffered computerized bulletin board abuse.
The aggravating force behind both the above situations
is most likely a third user (known hereafter as "the
masquerader") who maliciously exploits both his computer
knowledge and his access to BBSes. Since the masquerader has
discovered the password and name of the regular user, and uses
them to access bulletin boards, he appears for all intents and
purposes to be that regular user. The computer thus believes it
has admitted a legitimate subscriber to its database when it has
in fact given almost free reign to a reckless hacker. The
masquerader, posing as another legitimate user, is then free to
portray that user in whatever light he pleases and also to
harass other users of the bulletin board.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 3
----------------------
When validated users later discover that someone else
has been impersonating them, they invariably cancel their
subscriptions to that BBS and often bring a defamation action
against its SYSOP for the smearing of their good names.
Conversely, the SYSOP, in an effort to avoid liability,
reluctantly engages in monitoring each and every piece of
information posted daily by hundreds of users. If the SYSOP
chooses instead to stop running his BBS altogether, another
efficient and valuable forum for ideas is lost.
What sort of defamation action may be maintained by the
wrongfully disparaged user? Is the computerized bulletin board
offered by the SYSOP subject to the stricter self-scrutiny of
newspapers, or does it operate under some lesser standard? How
may the initial party at fault - the masquerader - be held
accountable for his computerized torts?
The scope of this Comment will be to examine the
defamation liability of computerized BBS operators and
evidentiary proof issues that arise in tracing computerized
defamation to its true source. Other possible Tort causes of
action - intentional infliction of emotional distress, invasion
of privacy, trespass to chattels - are not addressed. It is
assumed throughout that the plaintiff is a private person and
that the issues involved are not matters of "public interest" as
defined in Gertz v. Robert Welch, Inc.1
A. Background
Computerized BBSes exist as a quick, easy and efficient
way to acquire and exchange information about the entire
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 4
----------------------
spectrum of interests.2 The growing popularity of these
electronic forums was demonstrated in a recent study which
numbered BBSes at more than 3,500 nationwide.3 The size and
complexity of computerized BBSes range from relatively simple
programs, run on privately-owned microcomputers with a few
hundred subscribers, to vast, multi-topic database systems with
nationwide lists of subscribers and operated for profit.4
The process of reaching, or "accessing" one of these
bulletin boards is quite simple: all that is required is a
computer, a computer program that allows the computer to
communicate over the phone lines, and a "modem" (a device which
converts the computer's electrical signals into acoustic
impulses, defined infra).5 Once she has accessed the BBS, the
caller is free to trade useful non-copyrighted computer
programs, exchange ideas on a host of topics, post electronic
mail for later reading by others, and much more.6 The ease with
which most BBSes may be accessed and the wealth of interests to
be found there ensure that they will continue to be important
sources of information and discourse.
However, the speed and efficiency of computerized BBSes
also subject them to serious, wide-ranging civil and criminal
abuse. Recently a young computer user paralyzed several major
computer systems across the nation by sending a harmful computer
program (or "worm") to them over telephone lines. The worm
quickly replicated itself in the computers' memories and thus
decreased their output capacities.7 Further, certain computer
abusers (known as "hackers") use the power of the computerized
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 5
----------------------
forum to ply illegal copies of copyrighted programs, bilk
hundreds of millions of dollars annually from credit card and
phone companies, and to wrongfully access others' data files.8 A
minority of other BBSes exist mainly to circulate racist
ideologies.9
What is more, it now appears that the ancient tort of
defamation is actively being practiced through the use of
computerized BBSes.10 Due to the almost ethereal way
computerized BBSes operate - one person may conveniently leave
an electronic message for others to respond to at their leisure
and there is no need for the parties to converse directly or
even to know each other11 - the risk of detection when the BBS
is abused is lower than that for defamation practiced in the
print media.12 Difficulties arise with identifying the true
party at fault and with authenticating the computer records as
evidence of the defamation.13 Adding to this problem is an
uncertainty in the laws concerning the appropriate liability of
SYSOPs for defamatory messages on their BBSes of which they were
unaware.14
B. Definitions
The following are brief definitions of some important
technical terms connected with electronic BBSes:
SYSOP: An abbreviation for "System Operator", this is
the individual generally responsible for organizing information
and for trouble-shooting on a computerized bulletin board. On
larger bulletin boards covering hundreds of topics, several
SYSOPS may be in charge of maintaining information contained in
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 6
----------------------
separate discrete fields.15 But when the BBS is privately owned
and operated, a single SYSOP may very well oversee all aspects
of the board's operations, in addition to being able to access
all his users' passwords and personal information.16
Modem: An abbreviation for "Modulator/Demodulator".
This is a device which links a computer to an ordinary phone
line and converts computer signals to auditory phone signals. A
computer modem on the other end of the transmission then
reverses the process. Computers using modems transfer data
rapidly across phone lines and thus share information.17
Validation: Basically this is a set of procedures used
by responsible SYSOPs to do everything reasonably possible to
verify that the personal information supplied by a user is true
and correct. Common sense and emerging legal standards dictate
that the SYSOP should not merely rely on the name provided by a
potential user when the SYSOP does not personally know that
individual. The SYSOP may be required to independently
corroborate the prospective subscriber's information by first
asking the potential user's name, address and phone number and
then by checking that information with directory assistance.18
These procedures will hopefully aid the operator in identifying
wrongdoers if misuse occurs;19 however, as will be seen, these
procedures are by no means foolproof.
Database: Any collection of data in a computer for
purposes of later retrieval and use, i.e., names, addresses,
phone numbers, membership codes, etc.
User: Anyone who accesses a computerized bulletin board
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 7
----------------------
system and is exposed to the information stored there. Users may
be identified by their true names, by an assigned numerical
code, or by colorful "handles", or "usernames."20
Operating System: This is a program which controls the
computer's basic operations and which recognizes different
computer users so that their actions do not interfere with one
another.21 For example, most multi-user operating systems will
not allow one user to delete another's data unless the second
user gives explicit permission.22 BBS system software programs
perform this function through their use of "accounts" and
"passwords":23 private electronic mail sent to a particular user
may not be read or deleted by others. The BBS' operating system
is also designed to deny access to those attempting to log on
under an unvalidated or unrecognized name.24
Account/Username: As another part of BBS system
security, each user chooses an "account", or "username",
consisting of one to eight letters or numbers.25 The BBS'
operating system then will not allow commands issued by one user
of one account to modify data created by another account;26 nor
will it grant access to an account that has been terminated or
invalidated.
Password: Yet another aspect of BBS system security is
the use of "passwords" as a prerequisite to accessing the
computer system. Most operating systems require the user to
enter both her account name and password to use the account.27
Because electronic mail cannot be sent without the username to
which it is being addressed, and because the account cannot be
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 8
----------------------
used without knowledge of the password, usernames are generally
public knowledge while passwords are a closely-guarded secret,
known only to the user and the operating system.28
Teleprocessing: This is defined as accessing a computer
from a remote location, usually over a telephone line or similar
communications channel.29
Uploading/Downloading: For purposes of exchanging
computer programs or electronic mail over the phone lines, the
process of transferring information from one's personal computer
to the bulletin board is called uploading. The reverse process -
transferring information from a bulletin board to a personal
computer - is known as downloading.30
II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS
A. Computerized Defamation: Libel or Slander?
Libel is the "publication of defamatory matter by
written or printed words, by its embodiment in physical form, or
by any other form of communication that has the potentially
harmful qualities characteristic of written or printed words."31
Publication of a defamatory matter is "its communication
intentionally or by a negligent act to one other than the person
defamed."32 A communication is defamatory if it "tends to so
harm the reputation of another as to lower him in the estimation
of the community or to deter third persons from associating or
dealing with him."33 The difference between libel and slander
has traditionally depended upon the form of the communication:
oral defamation generally is considered slander, while written
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 9
----------------------
defamation is generally considered libel.34 The distinction is
important, because libel requires no proof of special damages
and is actionable by itself, while slander generally requires
proof of special damages in order to be actionable.35
However, with the advent of electronic media, the
traditional libel/slander distinctions as they apply to sight
and hearing are no longer valid. For example, passing defamatory
gestures and signals, though visible to sight, were considered
slander;36 an ad-libbed statement on a telecast impugning a
person's financial status was found to be libel.37
It has been suggested that the real distinction between
libel and slander is the threat and magnitude of harm to
reputation inherent in the form of publication.38 Libel has been
historically associated with writings because (1) a writing is
made more deliberately than an oral statement; (2) a writing
makes a greater impression to the eye than does an oral
statement to the ear; (3) a writing is more permanent than
speech; and (4) a writing has a wider area of dissemination than
speech.39 These four qualities inherent in a writing made the
possible harm to reputation greater than mere spoken words. In
applying libel to the new form of computerized communication
used on BBSes, the potentiality for harm to reputation is
significant, and should again be considered the controlling
factor.
In our hypothetical situation, the user discovered that
another user (the masquerader) had usurped her account name and
password, causing her great embarrassment and humiliation. The
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 10
----------------------
act of prying into and taking another's computer information to
misuse it elsewhere would indicate a certain deliberation on the
actor's part to spread defamatory messages. Secondly, the
defamatory message is displayed to other users on their computer
monitors in the form of electronic characters, making a visual
impression. Third, this electronic defamation is more permanent
than mere words because it is stored in the BBS' memory until
erased by the user or SYSOP. Finally, the message arguably has a
wider area of dissemination than a one-to-one spoken defamation
because, as a message on an electronic BBS, it has the potential
of being viewed by hundreds, perhaps thousands, of users each
day. Based on these four criteria, the capacity for harm to our
user's reputation due to the masquerader's activities is indeed
great enough to be considered libellous.
B. Defamation Liability of the SYSOP
Having established the electronic message as being
libellous, the next issue is to determine the extent of
liability for the SYSOP who unknowingly permits the message to
be communicated over his BBS. Case law indicates that the
SYSOP's liability depends upon the type of person defamed and on
the subject matter of the defamation.
1. Degree of fault required
The United States Supreme Court has addressed modern
defamation liability in two major decisions. Both conditioned
the publisher's liability on the type of person defamed and on
the content of the defamation. In New York Times v. Sullivan,40
the Court determined that in order for a public official to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 11
----------------------
recover damages in a defamation action, the statement must be
shown to have been made with "actual malice", i.e., with
knowledge of its falsity or with reckless disregard for its
truth.41 Due to society's interest in "uninhibited, robust and
wide-open" debate on public issues, neither factual error nor
defamatory content sufficed to remove the First Amendment's
shield from criticism of an official's conduct.42
The Supreme Court further elaborated on defamation
liability standards in the private and quasi-private sphere when
it decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher
of a John Birch Society newsletter made certain false and
inaccurate accusations concerning an attorney who represented a
deceased boy's family. The family had civilly sued the policeman
who murdered the boy. In rebutting what he perceived to be a
secret campaign against law and order, the publisher labelled
the family's attorney a "Leninist" and "Communist-fronter".44 In
addition, the publisher asserted that the attorney had been a
member of the National Lawyers Guild, which "'probably did more
than any other outfit to plan the Communist attack on the
Chicago police during the 1968 Democratic Convention.'"45 In
publishing these statements throughout Chicago, the managing
editor of the Birch Society newsletter made no effort to verify
or substantiate the charges against the attorney.46
The Supreme Court held in Gertz that while First
Amendment considerations protect publications about public
officials47 and about "public figures"48, requiring a showing of
"actual malice" before defamation damages could be recovered,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 12
----------------------
the same was not true for defamation suits brought by private
citizens49, a group to which the attorney was held to belong.50
Private citizens were seen as deserving more protections from
defamation than public officials or public figures, so they were
not required to show "actual malice" as a precondition to
recovery.51 The Court then left it to the states to decide the
precise standard of liability for defamation of private
individuals, so long as liability without fault was not the
standard.52
By Gertz, then, the appropriate standard of liability
for publicizing defamation of private parties falls somewhere
below actual malice and above strict liability. The problem with
defining the defamation standard for computerized BBS operators,
however, is a lack of uniform standards. In such circumstances,
the objective "reasonable person" standard will likely be
applied to the SYSOP's actions.53 Several cases may be usefully
applied by analogy.
The court in Hellar v. Bianco54 held that a bar
proprietor could be responsible for not removing a libellous
message concerning the plaintiff's wife that appeared on the
wall of the bar's washroom after having been alerted to the
message's existence.55 The court noted that "persons who invite
the public to their premises owe a duty to others not to
knowingly permit their walls to be occupied with defamatory
matter.... The theory is that by knowingly permitting such
matter to remain after reasonable opportunity to remove [it],
the owner of the wall or his lessee is guilty of republication
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 13
----------------------
of the libel."56 The Hellar court then left the ultimate
determination of the bar owner's negligence to the jury.57 This
holding seems to be in accord with the Restatement of Torts,
which provides:
PUBLICATION:
(2) One who intentionally and unreasonably
fails to remove defamatory matter that
he knows to be exhibited on land or
chattels in his possession or under his
control is subject to liability for its
continued publication.58
Contrarily, however, the Ohio court of appeals in Scott
v. Hull59 found that the building owner and agent who had
control over a building's maintenance were not responsible for
libel damages for graffiti inscribed by an unknown person on an
exterior wall.60 The court distinguished Hellar by noting that
in Hellar the bartender constructively adopted the defamatory
writing by delaying in removing it after having been expressly
asked to do so:
"It may thus be observed from these cases
that where liability is found to exist it is
predicated upon actual publication by the
defendant or on the defendant's ratification
of a publication by another, the ratification
in Hellar v. Bianco...consisting of at least
the positive acts of the defendants in
continuing to invite the public into their
premises where the defamatory matter was on
view after the defendants had knowledge of
existence of same."61
The Scott court held that defendants could only be
responsible for publishing a libellous remark through a positive
act, not nonfeasance; thus, their mere failure to remove the
graffiti from the building's exterior after having it called to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 14
----------------------
their attention was held not to be a sufficient basis of
liability.62
A situation similar to Scott arose recently in Tackett
v. General Motors Corporation.63 There, an employee brought a
libel suit against his employer for, inter alia, failing to
remove allegedly defamatory signs from the interior wall of its
manufacturing plant after having notice of their existence. One
large sign remained on the wall for two to three days while a
smaller one remained visible for seven to eight months.64
Instead of focussing on the Scott malfeasance/nonfeasance
test,65 the Tackett court considered defendant's implied
adoption of the libellous statement to be the correct basis of
liability.66 While saying that failure to remove a libellous
message from a publicly-viewed place may be the equivalent of
adopting that statement, and noting that Indiana would follow
the Restatement view "when the time comes,"67 the Tackett court
held that the Restatement view could be taken too far. Citing
Hellar, the court wrote:
The Restatement suggests that a tavern owner
would be liable if defamatory graffiti
remained on a bathroom stall a single hour
after the discovery [Citation to Hellar]. The
common law of washrooms is otherwise, given
the steep discount that readers apply to such
statements and the high cost of hourly
repaintings of bathroom stalls [Citation to
Scott]. The burden of constant vigilance
exceeds the benefits to be had. A person is
responsible for statements he makes or
adopts, so the question is whether a reader
may infer adoption from the presence of a
statement. That inference may be unreasonable
for a bathroom wall or the interior of a
subway car in New York City but appropriate
for the interior walls of a manufacturing
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 15
----------------------
plant, over which supervisory personnel
exercise greater supervision and control. The
costs of vigilance are small (most will be
incurred anyway), and the benefits
potentially large (because employees may
attribute the statements to their employer
more readily than patrons attribute graffiti
to barkeeps).68
According to this reasoning, then, the location and
length of time the libel is allowed to appear plays an integral
part in determining whether a given defendant has adopted the
libel, and thus has published it.
An application of the foregoing analysis to the issue
at hand highlights the need for greater care in allowing the
posting of electronic mail messages on a BBS. The Tackett court
noted that while the content of graffitti scrawled on bathroom
walls might be subject to healthy skepticism by its readers, the
same might not be true for other locations such as interiors of
subway cars or manufacturing plant walls.69 If this is true,
then it is reasonable to assume that a defamatory message
displayed in a forum for the exchange of ideas is more apt to be
taken seriously by its readers - especially when the libellous
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 16
----------------------
message purports to be written by the subject of the libel.70
Further, the Tackett court indicated that the high cost
of repainting bathroom stalls by the hour outweighed its
perceptible benefits. The same is not true for electronic BBSes,
where the costs of prevention are minimal in light of the threat
of widespread harm to users' reputations.71
2. Damages
Once the plaintiff establishes that the SYSOP failed to
act reasonably in removing statements known to be libellous from
his BBS or in negligently failing to prevent their appearance
there,72 no proof of special damages is necessary as libel is
actionable per se.73 The state's interest in protecting private
reputations has been held to outweigh the reduced constitutional
value of speech involving matters of no public concern such that
presumed and punitive damages may be recovered absent a showing
of actual malice.74
The proper gauge of liability has again raised some
questions.75 One writer has noted that if the burden of proof is
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 17
----------------------
to rest on the plaintiff, she may be at a disadvantage in
producing sufficient evidence to demonstrate negligent conduct
on the part of the SYSOP.76 Solutions to this problem have
ranged from a rebuttable presumption of negligence in favor of
the plaintiff77 to adoption of a set of standards similar to
those set out in the Federal Fair Credit Reporting Act.78 In
either event, damage awards for computer abuse have been
addressed both by federal and state law.79
3. Suggestions
Because computerized BBSes are still a relatively new
technological phenomena, consistent standards for SYSOPs' duties
have yet to be developed.80 However, at least one users' group
has adopted a voluntary code of standards for electronic BBSes,
applicable to both users and SYSOPs of boards open to the
general public:
SCOPE:
This Minimum Code of Standards applies to
both users and SYStem Operators (SYSOPs) of
electronic bulletin boards available to the
general public.
FREEDOM OF SPEECH AND IDEAS
Each user and SYSOP of such systems shall
actively encourage and promote the free
exchange and discussion of information,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 18
----------------------
ideas, and opinions, except when the content
would:
- Compromise the national security of the
United States.
- violate proprietary rights.
- violate personal privacy,
- constitute a crime,
- constitute libel, or
- violate applicable state, federal or
local laws and regulations affecting
telecommunications.
DISCLOSURE
Each user and SYSOP of such system will:
- disclose their real name, and
- fully disclose any personal, financial,
or commercial interest when evaluation
any specific product or service.
PROCEDURES
SYSOPS shall:
- review in a timely manner all publicly
accessible information, and
- delete any information which they know
or should know conflicts with this code
of standards.
A 'timely manner' is defined as what is
reasonable based on the potential harm that
could be expected. Users are responsible for:
- ensuring that any information they
transmit to such systems adheres to this
Minimum Code of Standards, and
- upon discovering violations of the
Minimum Code of Standards, notifying the
SYSOP immediately.
IMPLEMENTATION
Electronic bulletin board systems that choose
to follow this Minimum Code of Standards
shall notify their users by publishing this
Minimum Code, as adopted by the [Capitol PC
Users Group], and prominently display the
following:
'This system subscribes to the Capitol PC
Users Group Minimum Code of Standards for
electronic bulletin board systems.'81
While non-binding on publicly-accessible BBSes, the
above guidelines furnish sound basic policies that all SYSOPs
might use in shielding themselves from defamation liability. Our
hypothetical at the beginning of this Comment described a
situation where a malicious intruder was able to access and
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 19
----------------------
masquerade as a validated user on a BBS; the following are some
additional computer security measures that the reasonable SYSOP
could conduct to avoid that situation:
a. Special "screening" software: One writer has
suggested discouraging potential BBS misuse through programming
the BBS to reject those messages containing common defamatory
and obscene language;82 such a program would discard a message
containing any of those terms and would presumably notify the
SYSOP of their presence. Drawbacks to this procedure are that
computer programs cannot understand all the nuances of libellous
messages83 and would thus lead to the rigid deletion of many
otherwise legitimate messages.84
b. Unique passwords: A more fundamental and
economical approach would be for the SYSOP to both notify all
new users about the potential for computerized BBS abuse and to
encourage their use of a unique password on each BBS they call.
This would have the practical effect of keeping a masquerader
from using the names and passwords found on one BBS to
wrongfully access and masquerade on other BBSes. A drawback to
this procedure is that the truly malicious masquerader may still
discover a BBS' most sensitive user records by way of a renegade
computer program called a "trojan horse".85 However, one could
speculate that the SYSOP acts reasonably in informing potential
users of the existing threat and in helping them avoid it.
c. Encryption: This is essentially a way for the
SYSOP to make the users' passwords unique for them. The power of
the computer allows complex algorithms to be applied to data to
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 20
----------------------
encode it in such a way that, without the key to the code, it is
virtually impossible to decode the information.86 This technique
would have the added benefit of forcing the masquerader, upon
accessing the BBS with a trojan horse program, to search for the
secret decoding algorithm in addition to the BBS' secret user
files. Indeed, it is conceivable that a special encryption or
password could be devised to allow only the SYSOP access to the
BBS' decoding algorithm. However, encryption involves a
significant overhead - impractical for most small, privately-
operated BBSes - and is more frequently used to protect messages
from one system to another where the data is vulnerable to
interception as it passes over transmission lines.87
d. Prompt damage control: In accord with Hellar,88
the Restatement (Second) of Torts,89 and possibly Tackett,90 a
SYSOP acts reasonably in promptly assisting the libelled user to
partially reverse the effects of the masquerader's actions.
Recall that in those instances a defendant was held to have
impliedly adopted a defamatory statement by acting unreasonably
slowly in removing it from his property once having been made
aware of it.91 While it may be unreasonable to expect the SYSOP
to monitor each message posted every day - especially where the
defamatory message appears to have been left by the true user -
it is not too much to require the SYSOP to quickly remedy
security flaws in his BBS as they are pointed out to him.92 To
this end, the SYSOP has several options. In situations where the
defaming user libels another without masquerading as the
libelled party, the SYSOP could simply delete the defamer's
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 21
----------------------
account. In situations where a user masquerading as another
posts a libellous message, the SYSOP could publish a retraction
to all his subscribers, urging them to use a different password
on each BBS they call. Further, where a masquerader published
the libel, the SYSOP should offer his full cooperation to the
maligned user in tracking down the time and date the libellous
message was posted93 in order to better limit the SYSOP's
liability.
Certain BBS SYSOPs claim that holding them liable for
information appearing on their BBSes violates their First
Amendment rights by restricting their right to free speech94 and
by holding them responsible for the libel perpetrated by the
From kadie Sat Oct 12 09:53:46 1991
To: cafb-mail
~Subject: Computers and Academic Freedom mailing list (batch edition)
Status: R
Computers and Academic Freedom mailing list (batch edition)
Sat Oct 12 09:53:27 EDT 1991
[For information on how to get a much smaller edited version of the
list, send email to archive-server@eff.org. Include the line:
send acad-freedom caf
- Carl ]
In this issue:
:
The addresses for the list are now:
comp-academic-freedom-talk@eff.org - for contributions to the list
or caf-talk@eff.org
listserv@eff.org - for automated additions/deletions
(send email with the line "help" for details.)
caf-talk-request@eff.org - for administrivia
-------------------
masquerader. It has been suggested that the SYSOP should be held
to the same standard of liability as a neighborhood supermarket
which furnishes a public bulletin board:95 just as the
supermarket would not be liable for posting an advertisement for
illicit services, so should the BBS SYSOP escape liability for
libellous messages left on his board, especially when its poster
appears to be a validated user.96
However, this comparison lacks merit for the reasons
given by the Seventh Circuit in Tackett v. General Motors
Corporation.97 The defendant's liability in that case rested on
its publication of libel by implicitly adopting the statement.98
Defendant's failure to remove a defamatory sign painted on one
of the interior walls of its factory for seven or eight months
after discovering its presence was such that "[a] reasonable
person could conclude that Delco 'intentionally and unreasonably
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 22
----------------------
fail[ed] to remove' this sign and thereby published its
contents."99
There would certainly be accomplice liability if the
supermarket unreasonably delayed removing an advertisement for
illegal services from its bulletin board once it was made aware
of it. The market could be seen as having adopted the ad's
statements by not acting responsibly to its viewing public.
Similarly, a SYSOP would be liable for defamatory messages
posted on his BBS - even by what appears to be the true user -
if he fails to act reasonably by using his computer skill to
eviscerate the libel.100 While the computerized BBS may be
nothing more than a hobby of the SYSOP, the speed with which it
can disseminate potentially damaging information among its users
demands the standards of responsibility described above.
C. Defamation Liability of the Masquerader
1. Degree of fault required
It should be noted that the liability and proof issues
concerning the SYSOP and masquerader are inverse. As to the
SYSOP who allows libellous messages to be posted on his BBS, his
liability may be inferred simply by those messages having
appeared there;101 however, his degree of fault - actual malice
or simple negligence - is subject to debate.102 Conversely,
while the masquerader's degree of fault is clearly evident,103
tracing that fault back to him is a more elusive matter.104 The
requisite degree of fault for masqueraders is set out in federal
and state law.105
2. Damages
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 23
----------------------
Assuming arguendo that the masquerader's defamatory
publications have been successfully traced back to him by the
plaintiff, actual and punitive damages may then be recovered
from him based on his knowledge of the publication's falsity or
reckless disregard for its truth.106 Federal and state law have
also specified certain remedies.107
III PROBLEMS OF PROOF
A. Proof of SYSOP's Actions
We have seen that while the appropriate degree of fault
for a SYSOP to be liable for defamatory messages appearing on
his BBS is subject to dispute,108 a showing that the defamation
appeared there due to the SYSOP's negligence is much more
capable of resolution.109 The jury should be made aware of the
actual validation/security procedures practiced by the SYSOP and
should weigh them in light of the prevailing practice.110
Several facets of an emerging standard of care for SYSOPs have
already been suggested in this Comment,111 and the SYSOP's
adherence to them could be shown through users' testimony.
B. Proof of Masquerader's Actions
In contrast with the degree of fault required to
establish the SYSOP's publication of the libellous message, the
degree of fault for the masquerader is much less subject to
debate. The masquerader's actions are not likely to be
considered merely inadvertent or negligent.112 However, because
the masquerader has intentionally discovered and usurped the
user's name and password, he appears to be that user on all
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 24
----------------------
computer records. Tracing the masquerader's defamatory
publication back to him thus encounters some important
evidentiary barriers: the maligned user is forced to rely on
computerized records produced by the BBS and phone company in
trying to link the masquerader's libellous publication back to
him.113 We turn now to consider the evidentiary hurdles to be
overcome in tracing the libellous communication to its true
source.
1. The Hearsay Rule & Business Records Exception
The first evidentiary obstacle to connecting the
masquerader with his libellous publication is the hearsay rule.
As defined by the Federal Rules of Evidence, hearsay is "a
statement, other than one made by the declarant while testifying
at the trial or hearing, offered in evidence to prove the truth
of the matter asserted";114 as such, it is inadmissible as
evidence at trial.115 Computer-generated evidence is subject to
the hearsay rule, not because it is the "statement of a
computer", but because it is the statement of a human being who
entered the data.116 To the extent the plaintiff user relies on
computer-generated records to show that a call was placed from
the masquerader to the BBS at the time and date in question,
then, her evidence may be excluded.
However, numerous exceptions to the hearsay rule have
developed over the years such that evidence which might
otherwise be excluded is deemed admissible. The most pertinent
hearsay exception as applied to computerized evidence is the
"business records exception", which admits into evidence any
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 25
----------------------
records or data compilations, so long as (1) they were made
reasonably contemporaneously with the events they record; (2)
they were prepared/kept in the course of a regularly conducted
business activity; and (3) the business entity creating these
records relied on them in conducting its operations.117 The
veracity of the computer records and of the actual business
practices are shown by the record custodian's or other qualified
witness' testimony, unless the circumstances indicate lack of
trustworthiness.118 The term "business" as used in this rule
includes callings of every kind, whether or not conducted for
profit.119
Statutes and judicial decisions in several states have
gradually recognized that the business records exception extends
to include computer-generated records.120 This is largely due to
(1) modern business' widespread reliance on computerized record-
keeping, (2) the impracticability of calling as witnesses every
person having direct personal knowledge of the records'
creation, and (3) the presumption that if a business was willing
to rely on such records, there is little reason to doubt their
accuracy.121
Using this exception to the hearsay rule, plaintiff
user would most likely seek to admit the BBS' computer-generated
username/password log-in records plus the phone company's call
records to establish the connection between the masquerader's
telephone and the BBS at the precise instant the libellous
message was posted.122 As an initial matter, however, plaintiff
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 26
----------------------
must first lay a foundation for both the BBS' and phone
company's computer-generated business records.
A sufficient foundation for computer-generated records
was found recently to exist in People v. Lugashi.123 There, the
California Court of Appeal affirmed a conviction of grand theft
based on evidence adduced from computer-generated bank records.
Defendant, an oriental rug store owner, had been convicted of
fraudulently registering thirty-seven sales on counterfeit
credit cards. The issuing banks became suspicious of criminal
activity when charge card sales data from defendant's store
showed 44 fraudulent uses of charge cards at defendant's store
within only five weeks.124 As each fraudulent credit card
transaction was completed, defendant registered the sale
simultaneously with the banks' computers.125 Each night, as
standard bank practice, the banks then reduced the computer
records of credit card transactions to microfiche. Information
gleaned from these microfiche records was entered against
defendant at trial.126
The California Court of Appeal recognized the trial
court judge's wide discretion in determining whether a
sufficient foundation to qualify evidence as a business record
has been laid.127 It held that defendant's allocations of error
were without merit since defendant himself had acknowledged that
the bank's computer entries memorialized in the microfiche
record were entered simultaneously as they occurred in the
regular course of business.128 Further, the Court of Appeals
dismissed defendant's claim that only a computer expert could
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 27
----------------------
supply testimony concerning the reliability of the computer
record:
Appellant's proposed test incorrectly presumes computer
data to be unreliable, and, unlike any other business
record, requires its proponent to disprove the
possibility of error, not to convince the trier of fact
to accept it, but merely to meet the minimal showing
required for admission....
The time required to produce this additional [expert]
testimony would unduly burden our already crowded trial
courts to no real benefit.129
The Lugashi court then followed the bulk of other
jurisdictions adopting similar analyses and upholding admission
of computer records with similar or less foundational showings
over similar objections.130
As to admission into evidence of telephone companies'
computer-generated call records under the business records
exception, courts have evinced a similar attitude to that in
Lugashi. In State v. Armstead,131 a prosecution for obscene
phone calls, the trial court was held to have properly admitted
computer printouts showing that calls had been made from
defendant's mother's telephone, despite defendant's contention
that the witness who was called to lay the foundation had not
been personally responsible for making the record.132 Because
the printout represented a simultaneous self-generated record of
computer operation, the court held it was therefore not
hearsay.133
In an Ohio prosecution for interstate telephone
harassment, it was held no error was committed in admitting
defendant's computerized phone statement under the Business
Records exception which showed that telephone calls had been
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 28
----------------------
made from defendant's phone in Ohio to various numbers in
Texas.134 A sufficient foundation for the admission of business
records under Federal Rules of Evidence 803(6) was established
when a telephone company witness identified the records as
authentic and testified they were made in the regular course of
business.135
Applying the foregoing analyses to BBSes, the plaintiff
user would establish a foundation for the correlated BBS136 and
telephone company phone logs by showing that (1) they were made
contemporaneously with the posting of the libellous message;137
(2) they were prepared/kept in the course of a regularly
conducted business activity, since both the BBS and telephone
company consistently maintain accounts of all persons who use
their services; and (3) the BBS and telephone company relied on
those records for billing purposes.138 Once such a foundation is
laid, the trial court has wide discretion in admitting business
records into evidence.139
2. Authentication & the Voluminous Records Exception
The second evidentiary barrier encountered in tracing
the masquerader's libellous messages back to him is proving his
authorship of the libel, or "authenticating" the computerized
records.140 The computer-generated phone and BBS records showing
that a call from a certain phone number at a particular date and
time resulted in a libellous message being published must
somehow be linked to the masquerader.
The Federal Rules of Evidence provide in pertinent
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 29
----------------------
part:
(a) General provision. The requirement of
authentication or identification as a condition
precedent to admissibility is satisfied by
evidence sufficient to support a finding that the
matter in question is what its proponent claims.
(b) Illustrations. By way of illustration only, and
not by way of limitation, the following are
examples of authentication or identification
conforming with the requirements of this rule:...
(6) Telephone conversations. Telephone
conversations, by evidence that a call was
made to the number assigned at the time by
the telephone company to a particular person
or business, if
(A) in the case of a person, circumstances,
including self-identification, show the
person answering to be the one called,
or
(B) in the case of a business, the call was
made to a place of business and the
conversation related to business
reasonably transacted over the
telephone....141
The question of whether a writing is properly
authenticated is primarily one of law for the court; if the
court decides the question affirmatively, it is ultimately for
the jury.142 The court will make no assumptions as to the
authenticity of documents in deciding their initial
admissibility.143 The difficulty presented here is that the
Federal Rules of Evidence seem to require authentication of
telephone calls by reference to their specific content.144 The
specific content of a given phone call is not demonstrated by
phone logs showing merely the date and time the call occurred.
The authentication of extrinsic documents may be
subject to a "best evidence rule" objection. As stated in
Federal Rule of Evidence 1002:
REQUIREMENT OF ORIGINAL: To prove the contents of a
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 30
----------------------
writing, recording, or photograph, the original of that
writing, recording, or photograph is required, unless
provided otherwise in these rules or by an act of
Congress.145
Since its introduction in the 18th century, various
rationales have been posited for this rule.146 While earlier
writers asserted that the rule is intended to prevent fraud,
most modern commentators agree that the rule's main purpose is
to convey to the court the exact operative effect of the
writing's contents.147
However, at least one jurisdiction has implicitly
equated compliance with the business records exception with the
Best Evidence Rule. In Louisiana v. Hodgeson,148 the defendant
in a manslaughter trial contended that a printout of her
telephone bill, offered to show communications between her and a
third party, was not authenticated.149 The court, while making
no specific reference to the authentication point, rejected
defendant's contention, noting that the information from the
computer's storage was the company's business record and that it
was accessible only by printout.150
Similarly, in an Indiana bank robbery prosecution,151
the state offered microfiche copies of the telephone company's
computerized records showing certain telephone calls from
defendant. On appeal, defendant argued that these documents were
not authenticated because they were not the "original or first
permanent entry," and that they therefore should not have been
admitted into evidence. The court disagreed, saying that a
duplicate was admissible to the same extent as an original
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 31
----------------------
unless a "genuine issue" were raised as to the authenticity of
the original.152
By these precedents, then, provided plaintiff user
establishes that both the telephone and BBS user records were
prepared in accordance with the business records exception,153
the fact that a call from the masquerader's phone is shown to
have occurred at the same instant the libellous message was
posted may be sufficient to authenticate that the call was made
by the masquerader. Other circumstantial evidence adduced by
plaintiff user would strengthen this inference.154
Another authentication hurdle in plaintiff's case is
the requirement that the entire original record sought to be
authenticated be produced.155 This requirement can prove highly
impractical in situations where there are vast numbers of
individual records extending over long periods of time.156
Requiring plaintiff to produce the entire body of these records
would be unduly expensive and time-consuming. What is more, if
plaintiff were to attempt to summarize vast computerized
business data compilations so as to introduce those summaries
into evidence without producing the complete body of computer
records, such summaries might not be admissible on the grounds
that they were not made "in the regular course of business."157
However, an exception to strict authentication
requirements of the Federal Rules of Evidence has been
developed. Rule 1006 provides:
The contents of voluminous writings, recordings, or
photographs which cannot conveniently be examined in
court may be presented in the form of a chart, summary,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 32
----------------------
or calculation. The originals, or duplicates, shall be
made available for examination or copying, or both, by
other parties at reasonable time and place. The court
may order that they be produced in court.158
In Cotton v. John W. Eshelman & Sons, Inc.,159
summaries of certain computerized records were held properly
admitted into evidence on the theory that "[w]hen pertinent and
essential facts can be ascertained only by an examination of a
large number of entries in books of account, an auditor or
expert examiner who has made an examination and analysis of the
books and figures may testify as a witness and give summarized
statements of what the books show as a result of his
investigation, provided the books themselves are accessible to
the court and to the parties."160 Under this precedent,
plaintiff user would only need to produce the pertinent parts of
the computerized records, as determined by an impartial auditor.
IV. CONCLUSION
It is difficult to overestimate the ease with which
computers now enable us to compile and exchange information.
Computerized "bulletin boards" run on personal microcomputers by
private persons and businesses are examples of this enhanced
form of communication. Users can trade computer programs and
exchange a wealth of ideas, opinions, and personal information
through such forums.
The advantages of this process break down, however,
when malicious users abuse the system and BBS SYSOPS
intentionally or negligently allow this to occur. The nature of
computerized data is such that tortious misinformation may
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 33
----------------------
easily be spread to thousands of users before it is discovered.
Because the potential for harm to reputation is so tremendous,
appropriate standards of liability and methods of proof must be
addressed.
The requisite degree of fault in libelling private
persons is less than that for libelling public officials/public
figures, and may be established as against a SYSOP by a simple
showing of his negligent failure to observe reasonably minimal
computer security measures. The basis of liability for a
masquerader who intentionally misappropriates another's private
information is even less subject to debate.
Two main evidentiary hurdles face the plaintiff seeking
to link the masquerader with his libellous message through
reliance on computer-generated records. First, the hearsay rule
automatically excludes all evidence produced out-of-court that
is being offered to prove the truth of the matter at hand.
Second, the authentication requirement demands that the
masquerader's connection to the entire body of proffered
computer records be established.
However, certain exception to both of these limitations
ease the plaintiff's burden. First, the business records
exception to the hearsay rule admits computer records into
evidence if they (1) were made reasonably contemporaneously with
the events they record; (2) were prepared/kept in the course of
a regularly conducted business activity; and (3) the business
entity creating these records relied on them in conducting its
operations. Both BBS and telephone company records may come
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 34
----------------------
under this exception. Second, the voluminous writings exception
allows the contents of voluminous computerized records which
cannot conveniently be examined in court to be presented in the
form of a summary. So long as the original records or duplicates
thereof are available for examination by other parties at
reasonable times and places, the entire data compilation need
not be produced. Plaintiff should employ both of these
exceptions in an effort to convince a jury by a preponderance of
the evidence that the masquerader has abused his computer skills
and has damaged plaintiff's reputation.
==============================================
Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU>
id AA20305; Fri, 20 Apr 90 12:46:45 PDT
~Date: Fri, 20 Apr 90 12:42:02 PDT
~From: Lang Zerner
Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM>
~Subject: Sysops and libel liability -- endnotes
Resent-Date: Sat, 21 Apr 90 0:05:23 CDT
Resent-From: telecom@eecs.nwu.edu
Resent-To: ptownson@gaak.LCS.MIT.EDU
Status: RO
Here are the endnotes to the paper I submitted in a separate message.
Be seeing you...
==Lang
=======
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 35
----------------------
ENDNOTES
1. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
2. These interests can cover anything from science fiction
to gourmet cooking. Uyehara, Computer Bulletin Boards:
Let the Operator Beware, 14 Student Lawyer 28 (1986).
3. Id., at 30.
4. The data service Compuserve is one such national BBS
run for profit by business organizations. Uyehara, at
28. Other examples of large databases of interest to
the legal profession are computerized research services
such as LEXIS and WESTLAW.
5. Uyehara, at 28; Manning, Bulletin Boards: Everybody's
Online Services, Online, Nov. 1984, at 8,9. "Modem" is
defined infra, note 17 and accompanying text.
6. "...computer bulletin boards offer their users
important benefits. An individual can use a bulletin
board to express his opinion on a matter of public
interest. He may find a review of a product he is
considering buying. He may find a useful piece of
software. An individual might also use the bulletin
board to ask a technical question about a specific
computer program." Note, Computer Bulletin Board
Operator Liability For User Misuse, 54 Fordham L.Rev.
439, 440 (1985) (Authored by Jonathan Gilbert); see
also Lasden, Of Bytes And Bulletin Boards, N.Y.Times,
August 4, 1985, sec. 6, at 34, col. 1, where the author
notes computer users may now use BBSes to voice their
opinions directly to State Senators' offices.
7. "Virus" Hits Nation's Research Computers, San Jose
Mercury News, Nov. 4, 1988, at 1, col. 1.
8. "It is estimated that the theft of long-distance
services and software piracy each approximate $100
million a year; credit card fraud via computers costs
about $200 million annually." Pittman, Computer
Security In Insurance Companies, 85 Best's Rev. - Life-
Health Ins. Edition, Apr. 1985 at 92.
9. Schiffres, The Shadowy World of Computer "Hackers,"
U.S. News & World Report, June 3, 1985, at 58.
10. Pollack, Free Speech Issues Surround Computer Bulletin
Board Use, N.Y. Times, Nov. 12, 1984, note 1, at D4,
col. 6.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 36
----------------------
11. Note, 54 Fordham L.Rev. 440-441 (1985).
12. Poore and Brockman, 8 Nat'l L.J. 14, (1985).
13. See infra, Topic III, Problems of Proof.
14. The uncertainty revolves around how to define BBSes.
When viewed as analogous to newspapers and other media,
SYSOPS would be responsible for any message posted on
their systems, much as newspaper editors are
responsible for articles appearing in their medium.
Uyehara, 14 Student Lawyer 30 (1986). But when BBSes
are compared to a bulletin board found in a public hall
or supermarket, the liability issue is focused more on
those actually posting the messages rather than on the
board's owner. Id., at 30. This Comment suggests that
BBS SYSOPs be held to a reasonable standard of care
emerging specifically for their endeavors. See infra,
Topic II.
15. Poore and Brockman, 8 Nat'l L.J. 14, (1985). Another
writer has noted that Compuserve now has over 200,000
users making use of nearly 100 diverse databases.
Lasden, Of Bytes And Bulletin Boards, N.Y. Times,
August 4, 1985, sec. 6, at 34, col. 1.
16. Poore and Brockman, 8 Nat'l L.J. 14 (1985).
17. 14 Am Jur. POF 2d Computer-Generated Evidence Sec. 11
(1977).
18. Note, 54 Fordham L.Rev. 439, 446 (1985).
19. Id.
20. See "Account," infra, note 25 and accompanying text.
21. Garfinkel, An Introduction to Computer Security, 33
Prac. Law.41-42 (1987).
22. Id.
23. See infra, notes 25 and 27 and accompanying text.
24. Some more sophisticated operating systems provide
greater access control by (1) recording unauthorized
attempts at entry; (2) recording those attempts and
sending a warning to the perpetrator; and (3) keeping
the perpetrartor off the system permanently until
he/she is reinstated by the computer's security
administrator or SYSOP. Balding, Computer Breaking and
Entering: The Anatomy of Liability, 5 Computer Lawyer,
Jan. 1988, at 6.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 37
----------------------
25. Garfinkel, An Introduction to Computer Security, 33
Prac. Law. 42 (1987).
26. Id.
27. Id. "A password is a secret word or phrase that should
be known only to the user and the computer. When the
user first attempts to use the computer, he must first
enter the password. The computer then compares the
typed password to the stored password and, if they
match, allows the user access."
28. Id., at 42 and 46.
29. 14 Am. Jur. POF 2d Computer-Generated Evidence Sec. 11
(1977).
30. 54 Fordham L.Rev. 439, note 2 (1985).
31. Restatement (Second) of Torts Sec. 568(1) (1976).
32. Restatement (Second) of Torts Sec. 577(1) (1976).
33. Restatement (Second) of Torts Sec.559 (1976).
34. Veeder, The History and Theory of the Law of
Defamation, 3 Colum. L.Rev. 546, 569-571 (1903).
35. Restatement (Second) of Torts Sec. 622 (1976).
36. Restatement, Torts Sec. 568, comment d (1938).
37. Shor v. Billingley, 4 Misc.2d 857, 158 N.Y.S.2d 476
(Sup. Ct. 1956), aff'd mem., 4 App.Div. 2d 1017, 169
N.Y.S.2d 416 (1st Dep't. 1957).
38. Torts: Defamation: Libel-Slander Distinction:
Extemporaneous Remarks Made on Television Broadcast:
Shor v. Billingley, 4 Misc. 2d 857, 158 N.Y.S.2d 476
(Sup.Ct. N.Y. County 1957), 43 Cornell L.Q. 320, 322
(1957) (Authored by Stephen A. Hochman).
39. Id.
40. 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964),
motion denied 376 U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d
83.
41. 376 U.S. 254, 273.
42. 376 U.S. 254, 280.
43. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 38
----------------------
44. Gertz v. Robert Welch, Inc., 418 U.S. 323, 326.
45. Id.
46. Id., at 327.
47. "...those who hold governmental office may recover for
injury to reputation only on clear and convincing proof
that the defamatory falsehood was made with knowledge
of its falsity or with reckless disregard for the
truth." Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
"An individual who decides to seek governmental office
must accept certain necessary consequences of that
involvement in pubic affairs. He runs the risk of
closer public scrutiny than might otherwise be the
case." Id., at 344.
48. "...[A]n individual may attain such pervasive fame and
notoriety that he becomes a public figure for all
purposes and in all contexts. More commonly, an
individual voluntarily injects himself or is drawn into
a particular public controversy and thereby becomes a
public figure for a limited range of issues. In either
case such persons assume special prominence in the
resolution of public questions." 418 U.S. 323, 351.
49. "Even if the foregoing generalities do not obtain in
every circumstance, the communications media are
entitled to act on the assumption that public officials
and public figures have voluntarily exposed themselves
to the increased risk of injury from defamatory
falsehood concerning them. No such assumption is
justified with respect to a private individual. He has
not accepted public office or assumed an 'influential
role in ordering society.' Curtis Publishing Co. v.
Butts, 388 U.S., at 164 ...He has relinquished no part
of his interest in the protection of his own good name,
and consequently he has a more compelling call on the
courts for redress of injury inflicted by the
defamatory falsehood. Thus, private individuals are not
only more vulnerable to injury than public officials
and public figures; they are also more deserving of
recovery." Id., at 345.
50. "...[P]etitioner was not a public figure. He ...
plainly did not thrust himself into the vortex of this
public issue, nor did he engage the public's attention
in an attempt to influence its outcome." Id., at 352.
51. Justice Powell noted for the Court that
"[T]he communications media are entitled to act on
the assumption that public officials and public
figures have voluntarily exposed themselves to
increased risk of injury from defamatory falsehood
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 39
----------------------
concerning them. No such assumption is justified
with respect to a private individual. He has not
accepted public office or assumed an 'influential
role in ordering society....' He has relinquished
no part of his interest in the protection of his
own good name, and consequently he has a more
compelling call on the courts for redress of injury
inflicted be defamatory falsehood. Thus, private
individuals are not only more vulnerable to injury
than public officials and public figures; they are
also more deserving of recovery." Id., at 345.
52. Id., at 347.
53. Keeton, Dobbs, Keeton and Owen, Prosser and Keeton on
Torts, sec. 32, p.174. See also Vaughn v. Menlove, 3
Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837).
54. 111 Cal. App. 2d 424, 244 P.2d 757, 28 ALR2d 451
(1952).
55. 111 Cal. App. 2d 424, 427.
56. Id., at 426.
57. Id, at 427.
58. Restatement (Second) of Torts Sec. 577(2) (1976).
59. 22 Ohio App.2d 141, 259 N.E.2d 160 (1970).
60. Scott v. Hull, 259 N.E.2d 160, 162 (1970).
61. Id., at 161.
62. Id., at 162.
63. 836 F.2d 1042 (7th Cir. 1987).
From kadie Sat Oct 12 09:54:35 1991
To: cafb-mail
~Subject: Computers and Academic Freedom mailing list (batch edition)
Status: R
Computers and Academic Freedom mailing list (batch edition)
Sat Oct 12 09:54:16 EDT 1991
[For information on how to get a much smaller edited version of the
list, send email to archive-server@eff.org. Include the line:
send acad-freedom caf
- Carl ]
In this issue:
:
The addresses for the list are now:
comp-academic-freedom-talk@eff.org - for contributions to the list
or caf-talk@eff.org
listserv@eff.org - for automated additions/deletions
(send email with the line "help" for details.)
caf-talk-request@eff.org - for administrivia
-------------------
64. Id., at 1047.
65. The Court of Appeals noted the Restatement view and
observed that Indiana law had neither embraced nor
rejected that approach. Id., at 1046.
66. Id.
67. Id.
68. Id., at 1046-47.
69. Id.
70. Recall that in our hypothetical a third user
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 40
----------------------
masquerading as another is transmitting messages to
others, revealing embarassing and false information.
71. BBS systems security and other preventative measures
are discussed more fully infra, Topic 3.d.
72. Issues in proving the SYSOP's role in publishing the
libellous statement are discussed more fully in Topic
III. A., infra.
73. Sydney v. MacFadden Newspaper Publishing Corp., 242
N.Y. 208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also
Restatement (Second) of Torts Sec. 621 (1976) ("One who
is liable for a defamatory communication is liable for
the proved, actual harm caused to the reputation of the
person defamed.")
74. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472
U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985).
75. See supra, note 53 and accompanying text.
76. Note, Protecting the Subjects of Credit Reports, 80
Yale L.J. 1035, 1051-52, n.88 (1971).
77. Gertz did not rule out an assumption of defendant's
negligence. See Eaton, The American Law of Defamation
Through Gertz V. Robert Welch, Inc., and Beyond: An
Analytical Primer, 61 Va. L.Rev. 1349 (1975).
78. 15 U.S.C.A. Sec. 1681 et seq. (1974). Two standards are
proposed there: the first, willful noncompliance, is
defined as equivalent to the New York Times "actual
malice" standard, and violators are liable for actual
and punitive damages. Sec. 1681(n), supra. Presumably
this would apply to the situation where the SYSOP is
dilatory in removing the libellous message. The second
proposed standard, negligent noncompliance, occurs in
the absence of willfulness and results in liability
only for actual damages. Sec. 1681(o), supra.
Situations where the SYSOP failed to adopt reasonable
computer security measures might come under this
category.
79. 18 U.S.C.S. Sec. 2707(b),(c) (Law. Co-op 1979 & Supp.
1988) provides in pertinent part:
(b) Relief. In a civil action under this section,
appropriate relief includes -
(1) Such preliminary and other equitable or
declaratory relief as may be appropriate;
(2) damages under subsection (c); and
(3) a reasonable attorney's fee and other
litigation costs reasonably incurred.
(c) Damages. The court may assess as damages in a
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 41
----------------------
civil action under this section the sum of the
actual damages suffered by the plaintiff and
any profits made by the violator as a result
of the violation, but in no case shall a
person entitled to recover receive less than
the sum of $1,000.
18 U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988)
limits the civil action under this section to two years
after the date upon which the claimant first discovered
or had a reasonable opportunity to discover the
violation.
As to damage provisions supplied by state law, see
California Penal Code 502(e)(1),(2) (West Pub. 1988):
(e)(1) In addition to any civil remedy available,
the owner or lessee of the computer, computer
system, computer network, computer program, or data
may bring a civil action against any person
convicted under this section for compensatory
damages, including any expenditure reasonably and
necessarily incurred by the owner or lessee to
verify that a computer system, computer network,
computer program, or data was not altered, damaged,
or deleted by the access. For purposes of actions
authorized by this subdivision, the conduct of an
unemancipated minor shall be imputed to the parent
or legal guardian having control or custody of the
minor, pursuant to the provisions of Section 1714.1
of the Civil Code.
(2) In any action brought pursuant to this
subdivision the court may award reasonable
attorney's fees to a prevailing party.
80. A lawsuit recently filed in the United States District
Court for the Southern District of Indiana may break
new ground in enunciating precisely what BBS SYSOPs'
reasonable duties of care are. Thompson v. Predaina,
Civil Action #IP-88 93C (S.D. Ind. filed 1988). The
complaint alleges, inter alia, invasion of plaintiff
user's privacy, libel, and wrongful denial of access to
the BBS in violation of U.S.C. Title 18, ss 2701
(a)(2). As to statutory damages available, see infra,
note 105.
81. Gemignani, Computer Law 33:7 (Lawyers Co-op 1985, Supp.
1988) (quoting Capitol PC Users Group Minimum Code of
Standards for electronic Bulletin Board Systems,
reprinted in 4 Computer Law Reptr. 89).
82. Note, 54 Fordham L.Rev. 439, 449 (1985) (Authored by
Jonathan Gilbert).
83. Id., at 449.
84. Id., at 449-50.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 42
----------------------
85. A "trojan horse" program takes control of the BBS and
allows its sender to access and steal its most
sensitive information. Fites, Johnston and Kratz, The
Computer Virus Crisis, Van Nortrand/Reinhold (1989), at
39 and 45.
86. Balding, Computer Breaking and Entering: The Anatomy of
Liability, 5 Computer Law. (January 1988), at 6.
87. Id.
88. Hellar v. Bianco, 244 P.2d 757. See supra, note 54 and
accompanying text.
89. Restatement (Second) of Torts Sec. 577(2) (1976). See
supra, note 58 and accompanying text.
90. Tackett v. General Motors Corporation, 836 F.2d 1042
(7th Cir. 1987). See supra, note 63 and accompanying
text.
91. See note 53, supra, and accompanying text.
92. It has been suggested that this would be the rough
equivalent of a newspaper publishing a retraction after
discovering what it had printed was defamatory. Note,
54 Fordham L.Rev. 439, note 55 (1985). BBS operators
should not be held liable in this situation insofar as
they did not know of the nature of the statement at the
time it was made. Restatement (Second) of Torts Sec.
581 (1977).
93. Proving the masquerader's actions is discussed more
fully infra, Topic III. B.
94. Stipp, Computer Bulletin Board Operators Fret Over
Liability for Stolen Data, Wall St. J. Nov. 9, 1984, at
33, col. 1.
95. Id.
96. See Topic I., supra, where the masquerader has
discovered and uses the password and name of the
regular user; he appears for all intents and purposes
to be that regular user.
97. 836 F.2d 1042 (7th Cir. 1987).
98. Id., at 1047.
99. Id.
100. Indeed, U.S.C. Title 18, Sec. 2702 (Law. Co-op 1979 &
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 43
----------------------
Supp. 1988) proscribes the knowing dissemination of an
electronically stored communication by the SYSOP:
Sec. 2702. Disclosure of contents
(a) Prohibitions. Except as provided in subsection
(b)-
(1) a person or entity providing an
electronic communication service to the
public shall not knowingly divulge to any
person or entity the contents of a
communication while in electronic storage
on that service; and
(2) a person or entity providing remote
computing service to the public shall not
knowingly divulge to any person or entity
the contents of any communication which
is carried or maintained on that service-
(A) on behalf of, and received by means
of electronic transmission from (or
created by means of computer
processing of communications
received by means of electronic
transmissions from), a subscriber or
customer of such service; and
(B) solely for the purpose of providing
storage or computer processing
services to such subscriber or
customer, if the provider is not
authorized to access the contents of
any such communications for purposes
of providing any services other than
storage or computer processing.
A similar provision is embodied in Cal. Pen. Code sec.
502(c)(6) (West Pub. 1988), which provides:
(c) Except as provided in subdivision (i),
any person who commits any of the
following acts is guilty of a public
offense:
(6) Knowingly and without permission
provides or assists in providing a
means of accessing a computer,
computer system, or computer network
in violation of this section.
101. The doctrine of res ipsa loquitor, or "the thing speaks
for itself" warrants the inference of the SYSOP's
negligence, which the jury may draw or not as its
judgement dictates. See Sullivan v. Crabtree, 36
Tenn.App. 469, 258 S.W.2d 782 (1953).
102. See discussion under Topic II. B., supra.
103. As someone who intentionally accesses confidential
password information to masquerade as other users on
other BBSes, the masquerader falls well within the pale
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 44
----------------------
of "actual malice" defined in Gertz v. Robert Welch,
Inc., 418 U.S. 323, 342, supra, note 43 and
accompanying text (a defamatory falsehood was made with
knowledge of its falsity or with reckless disregard for
the truth).
104. Evidentiary problems involved with proving the
masquerader's actions are discussed more in Topic III.
B., infra.
105. 18 U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988)
describes the masquerader's fault thus:
(a) Cause of action. Except as provided in section
2703(e), any provider of electronic
communication service, subscriber, or customer
aggrieved by any violation of this chapter in
which the conduct constituting the violation
is engaged in with a knowing or intentional
state of mind may, in a civil action, recover
from the person or entity which engaged in
that violation such relief as may be
appropriate.
California Penal Code sec. 502(c) et seq. (West Pub.
1988) is even more specific:
(c) Except as provided in subdivision (i), any
person who commits any of the following acts
is guilty of a public offense:
(1) Knowingly accesses and without permission
alters, damages, deletes, destroys, or
otherwise uses any data, computer,
computer system, or computer network in
order to either
(A) devise or execute any scheme or
artiface to defraud, deceive, or
extort, or
(B) wrongfully control or obtain money,
property or data.
* * *
(3) Knowingly and without permission uses or
causes to be used computer services.
(4) Knowingly accesses and without permission
adds, alters, damages, deletes, or
destroys any data, computer software, or
computer programs which reside or exist
internal or external to a computer,
computer system, or computer network.
* * *
(7) Knowingly and without permission accesses
or causes to be accessed any computer,
computer system, or computer network.
106. Gertz v. Robert Welch, Inc., 418 U.S. 323, 342.
107. In addition to the remedies set forth in note 105,
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 45
----------------------
supra, the following federal and state penalties may
apply:
18 U.S.C.S. Sec. 2701(b),(c) (Law. Co-op 1979 & Supp.
1988):
(b) Punishment. The punishment for an offense
under subsection (a) of this seciton is -
(1) if the offense is committed for purposes
of commercial advantage, malicious
destruction or damage, or private
commercial gain -
(A) a fine not more than &250,000 or
imprisonment for not more than one
year, or both, in the case of a
first offense under this
subparagraph; and
(B) a fine under this title or
imprisonment for not more than two
years, or both, for any subsequent
offense under this subparagraph; and
(2) a fine of not more than $5,000 or
imprisonment for not more than six
months, or both, in any other case.
(c) Exceptions. Subsection (a) of this section
does not apply with respect to conduct
authorized-
(1) by the person or entity providing a wire
or electronic communications service;
(2) by a user of that service with respect to
a communication of or intended for that
user; or
(3) in section 2703, 2704, or 2518 of this
title.
For an example of state-mandated damages provisions on
this subject, see California Penal Code sec. 502(d) et
seq. (West Pub. 1988).
108. See discussion under Topic II. B., supra.
109. See note 101, supra.
110. "Custom...bears upon what other will expect the actor
to do, and what, therefore, reasonable care may require
the actor to do, upon the feasibility of taking
precautions, the difficulty of change, and the actor's
opportunity to learn the risks and what is called for
to meet them. If the actor does only what everyone else
has done, there is at least an inference that the actor
is conforming to the community's idea of reasonable
behavior." Keeton, Dobbs, Keeton and Owen, Prosser and
Keeton on Torts, sec. 33, p.194. See also James,
Particularizing Standards of Conduct in Negligence
Trials, 5 Vand. L. Rev. 697, 709-714 (1952); Ploetz v.
Big Discount Panel Center, Inc., 402 So.2d 64 (Fla.
App. 1981).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 46
----------------------
111. See notes 80-93, supra, and accompanying text.
112. See note 103, supra.
113. See Pfau and Keane, Computer Logs Can Pinpoint Illegal
Transactions, Legal Times of Washington, vol. 6, p.16
(May 14, 1984): "Computers can monitor their own use.
Unlike other such forms of physical evidence such as
guns, computers can keep track of individual users and
other identifying data. Imagine a gun that logs every
instance it is fired or even handled, and shows the
date, time, and activity. Recovery of such a weapon
would be essential to the prosecution.
"Most computers have long had built-in logging
capabilities....The log function was designed to
facilitate billing for the use of computer resources
rather than to assist crime detection. To the extent
that the owner of a smaller computer does not charge
for its use, he or she has no incentive to purchase a
self-executing log. Still, such logs keep surprisingly
accurate records of who is using the computer."
114. Fed. R. Evid. 801(c).
115. Fed. R. Evid. 802: "Hearsay is not admissible except as
provided by these rules or by other rules precribed by
the Supreme Court pursuant to statutory authority or by
Act of Congress." Exclusion of hearsay evidence is
grounded on: (1) nonavailability of the declarant for
cross-examination and observance of demeanor; (2)
absence of an oath by the person making the statement;
amd (3) significant risk that the person that the
witness may report proffered statements inaccurately. 2
Bender, Computer Law, sec. 6.01[2].
116. Gemignani, The Data Detectives: Building A Case From
Computer Files, 3 Nat'l L.J. 29 (1981).
117. Fed. R. Evid. 803(6). See also 2 Bender, Computer Law,
sec. 6.01[4] (1988).
118. Fed. R. Evid. 803(6).
119. Id. In current practice records kept by nonprofit
organizations, such as churches, have long been held to
be admissible. Ford v. State, 82 Tex.Cr.R. 638, 200
S.W. 841 (1918). It is at least arguable that a
computerized BBS, although run as a hobby, falls under
the same classification.
120. See Iowa Code Ann. Sec. 622.28; People v. Lugashi, 252
Cal.Rptr 434 (Cal.App. 2 Dist. 1988).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 47
----------------------
121. See 14 Am.Jur. POF2d Sec. 15 (1977, Supp. 1988). Cf.
United States v. De Georgia, 420 F.2d 889, 2 CLSR 479,
484 (1969, CA9 Ariz), where it was held that it is
immaterial whether a business record is maintained in a
computer rather than in company books regarding
admissibility of those records, so long as (1) the
trial court requires the proponent of the computerized
records to lay a foundation as to their
trustworthiness, and (2) the opposing party is given
the same opportunity to inquire into the computer's
accuracy as he would have to inquire into the accuracy
of written business records.
122. The BBS program run on the SYSOP's computer ordinarily
"stamps" the date and time of day each user logs onto
the BBS. A corresponding record is automatically
affixed to each piece of electronic mail posted so that
the reader knows when it was added to the database.
Similarly, the telephone company maintains copious
records of the date and time each phone call is
connected in its dialing area. The caller has no
control over either of these processes.
123. 252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988).
124. Id., at 437.
125. Id.
126. Id.
127. Id., at 439.
128. Id., at 437.
129. Id., at 440.
130. Id., at 442. See also United States v. Russo, 480 F.2d
1228 (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct.
915, 39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V
Roland Thomas II, 719 F.2d 104 (1983 CA5 La), 104 Fed
Rules Evid Serv 731; Peoples Cas & Coke Co. v. Barrett,
118 Ill.App.3d 52, 73 Ill. Dec. 400, 455 N.E.2d 829
(1983).
131. 432 So.2d 837 (La., 1983).
132. Id., at 839-40.
133. Id., at 839.
134. United States v. Verlin, 466 F.Supp. 155 (ND Tex,
1979).
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 48
----------------------
135. Id., at 158.
136. The reasonable SYSOP should offer his full cooperation
in aiding the maligned user to regain her good name by
providing her with his BBS' phone-in records made at
the time the libellous message appeared. See note 93,
supra.
137. See note 123, supra.
138. Cf. note 118, supra. As to an electronic BBS being
classified as a "business" for hearsay purposes, see
note 120, supra.
139. See note 128, supra.
140. Authentication has been broadly described thus: "[W]hen
a claim or offer involves impliedly or expressly any
element of personal connection with a corporeal object,
that connection must be made to appear...." Wigmore,
Evidence, Sec. 2129 at 564 (2d ed. 1972). This
requirement is also known as the "Best Evidence Rule."
141. Fed. R. Evid. 901(a),(b)(6).
142. 2 Bender, Computer Law, sec. 5.03[1][a] (1988).
143. Id.
144. See Fed. R. Evid. 901(b)(6): "(6) Telephone
conversations. Telephone conversations, by evidence
that a call was made to the number assigned at the time
by the telephone company to a particular person or
business, if *** (B) in the case of a business, the
call was made to a place of business and the
conversation related to business reasonably transacted
over the telephone...." (emphasis added).
145. Fed. R. Evid. 1002.
146. E.W. Cleary, McCormick on Evidence, sec. 231 (2nd. Ed.
1972).
147. Id. Further rationales for the rule are risks of
inaccuracy contained in commonly used copying
techniques and heightened chances of witness'
forgetfulness through oral testimony. Id., sec. 231.
148. 305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974).
149. 305 So.2d 421, 427.
150. Id., at 428.
---
Defamation Liability of Computerized BBS Operators
& Problems of Proof (C) 1989 John R. Kahn 49
----------------------
151. Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979).
152. Id., at 370.
153. See note 121, supra, and accompanying text.
154. Other circumstantial evidence might include, among
other things: possible motive for the masquerader to
defame plaintiff; plaintiff's own inability to call
from the phone number from which the defamatory message
is shown to have originated; or even an electronic
"fingerprint" left by the particular computer from
which the defamatory message originated. Pfau and
Keane, Computer Logs Can Pinpoint Illegal Trasactions,
Legal Times of Washington, vol. 6, p.16 (May 14, 1984).
155. Fed. R. Evid. 1002 provides:
REQUIREMENT OF ORIGINAL. To prove the content of
a writing, recording, or photograph, the original
of that writing, recording or photograph is
required, unless provided otherwise in these
rules or by an Act of Congress.
156. Examples of this situation are the telephone company's
keeping of hundreds of thousands of individual
computerized records of each telephone call made within
a certain dialing area, or a BBS' extensive history of
subscriber use compiled for billing purposes.
157. See Harned v. Credit Bureau of Gilette, 513 P2d 650, 5
CLSR 394 (1973).
158. Fed. R. Evid. 1006.
159. 137 Ga.App. 360, 223 S.E.2d 757 (1976).
160. 223 S.E.2d 757, 760.
1 Komentar untuk "D E F A M A T I O N L I A B I L I T Y"
What is this freedom your professors and doctors are so adamant about? The freedom to molest students and patients without their families being able to utter any protest? Is this what privacy is all about? Democracy is based on transparency. The word idiot is cognate with the Greek for privacy. Your voter registration is public so labor can prevent a Republican from getting a union job. Your property deed is public so you can be held accountable. Swiss Bank privacy only was created during the nazi era.
Informasi Pilihan Identitas:
Google/Blogger : Khusus yang punya Account Blogger.
Lainnya : Jika tidak punya account blogger namun punya alamat Blog atau Website.
Anonim : Jika tidak ingin mempublikasikan profile anda (tidak disarankan).