Cyberspace and the Legal Matrix: Laws or Confusion?


SUBMITTED BY: mschosting

DATE: Feb. 27, 2016, 12:07 p.m.

FORMAT: Text only

SIZE: 21.2 kB

HITS: 701

  1. Cyberspace, the "digital world", is emerging as a global arena of
  2. social, commercial and political relations. By "Cyberspace", I mean
  3. the sum total of all electronic messaging and information systems,
  4. including BBS's, commercial data services, research data networks,
  5. electronic publishing, networks and network nodes, e-mail systems,
  6. electronic data interchange systems, and electronic funds transfer
  7. systems.
  8. Many like to view life in the electronic networks as a "new frontier",
  9. and in certain ways that remains true. Nonetheless, people remain
  10. people, even behind the high tech shimmer. Not surprisingly, a vast
  11. matrix of laws and regulations has trailed people right into
  12. cyberspace.
  13. Most of these laws are still under construction for the new electronic
  14. environment. Nobody is quite sure of exactly how they actually apply
  15. to electronic network situations. Nonetheless, the major subjects of
  16. legal concern can now be mapped out fairly well, which we will do in
  17. this section of the article. In the second section, we will look at
  18. some of the ways in which the old laws have trouble fitting together
  19. in cyberspace, and suggest general directions for improvement.
  20. LAWS ON PARADE
  21. - Privacy laws. These include the federal Electronic Communications
  22. Privacy Act ("ECPA"), originally enacted in response to Watergate, and
  23. which now prohibits many electronic variations on wiretapping by both
  24. government and private parties. There are also many other federal and
  25. state privacy laws and, of course, Constitutional protections against
  26. unreasonable search and seizure.
  27. - 1st Amendment. The Constitutional rights to freedom of speech and
  28. freedom of the press apply fully to electronic messaging operations of
  29. all kinds.
  30. - Criminal laws. There are two major kinds of criminal laws. First,
  31. the "substantive" laws that define and outlaw certain activities.
  32. These include computer-specific laws, like the Computer Fraud and
  33. Abuse Act and Counterfeit Access Device Act on the federal level, and
  34. many computer crime laws on the state level. Many criminal laws not
  35. specific to "computer crime" can also apply in a network context,
  36. including laws against stealing credit card codes, laws against
  37. obscenity, wire fraud laws, RICO, drug laws, gambling laws, etc.
  38. The other major set of legal rules, "procedural" rules, puts limits on
  39. law enforcement activities. These are found both in statutes, and in
  40. rulings of the Supreme Court and other high courts on the permissible
  41. conduct of government agents. Such rules include the ECPA, which
  42. prohibits wiretapping without a proper warrant; and federal and state
  43. rules and laws spelling out warrant requirements, arrest requirements,
  44. and evidence seizure and retention requirements.
  45. - Copyrights. Much of the material found in on-line systems and in
  46. networks is copyrightable, including text files, image files, audio
  47. files, and software.
  48. - Moral Rights. Closely related to copyrights, they include the
  49. rights of paternity (choosing to have your name associated or not
  50. associated with your "work") and integrity (the right not to have your
  51. "work" altered or mutilated). These rights are brand new in U.S. law
  52. (they originated in Europe), and their shape in electronic networks
  53. will not be settled for quite a while.
  54. - Trademarks. Anything used as a "brand name" in a network context
  55. can be a trademark. This includes all BBS names, and names for
  56. on-line services of all kinds. Materials other than names might also
  57. be protected under trademark law as "trade dress": distinctive sign-on
  58. screen displays for BBS's, the recurring visual motifs used throughout
  59. videotext services, etc.
  60. - Right of Publicity. Similar to trademarks, it gives people the
  61. right to stop others from using their name to make money. Someone
  62. with a famous on-line name or handle has a property right in that
  63. name.
  64. - Confidential Information. Information that is held in secrecy by
  65. the owner, transferred only under non-disclosure agreements, and
  66. preferably handled only in encrypted form, can be owned as a trade
  67. secret or other confidential property. This type of legal protection
  68. is used as a means of asserting ownership in confidential databases,
  69. >from mailing lists to industrial research.
  70. - Contracts. Contracts account for as much of the regulation of
  71. network operations as all of the other laws put together.
  72. The contract between an on-line service user and the service provider
  73. is the basic source of rights between them. You can use contracts to
  74. create new rights, and to alter or surrender your existing rights
  75. under state and federal laws.
  76. For example, if a bulletin board system operator "censors" a user by
  77. removing a public posting, that user will have a hard time showing his
  78. freedom of speech was violated. Private system operators are not
  79. subject to the First Amendment (which is focused on government, not
  80. private, action). However, the user may have rights to prevent
  81. censorship under his direct contract with the BBS or system operators.
  82. You can use contracts to create entire on-line legal regimes. For
  83. example, banks use contracts to create private electronic funds
  84. transfer networks, with sets of rules that apply only within those
  85. networks. These rules specify on a global level which activities are
  86. permitted and which are not, the terms of access to nearby systems and
  87. (sometimes) to remote systems, and how to resolve problems between
  88. network members.
  89. Beyond the basic contract between system and user, there are many
  90. other contracts made on-line. These include the services you find in
  91. a CompuServe, GEnie or Prodigy, such as stock quote services, airline
  92. reservation services, trademark search services, and on-line stores.
  93. They also include user-to-user contracts formed through e-mail. In
  94. fact, there is a billion-dollar "industry" referred to as "EDI" (for
  95. Electronic Data Interchange), in which companies exchange purchase
  96. orders for goods and services directly via computers and computer
  97. networks.
  98. - Peoples' Rights Not to be Injured. People have the right not to be
  99. injured when they venture into cyberspace. These rights include the
  100. right not to be libelled or defamed by others on-line, rights against
  101. having your on-line materials stolen or damaged, rights against having
  102. your computer damaged by intentionally harmful files that you have
  103. downloaded (such as files containing computer "viruses"), and so on.
  104. There is no question these rights exist and can be enforced against
  105. other users who cause such injuries. Currently, it is uncertain
  106. whether system operators who oversee the systems can also be held
  107. responsible for such user injuries.
  108. - Financial Laws. These include laws like Regulations E & Z of the
  109. Federal Reserve Board, which are consumer protection laws that apply
  110. to credit cards, cash cards, and all other forms of electronic
  111. banking.
  112. - Securities Laws. The federal and state securities laws apply to
  113. various kinds of on-line investment related activities, such as
  114. trading in securities and other investment vehicles, investment
  115. advisory services, market information services and investment
  116. management services.
  117. - Education Laws. Some organizations are starting to offer on-line
  118. degree programs. State education laws and regulations come into play
  119. on all aspects of such services.
  120. The list goes on, but we have to end it somewhere. As it stands, this
  121. list should give the reader a good idea of just how regulated
  122. cyberspace already is.
  123. LAWS OR CONFUSION?
  124. The legal picture in cyberspace is very confused, for several reasons.
  125. First, the sheer number of laws in cyberspace, in itself, can create a
  126. great deal of confusion. Second, there can be several different kinds
  127. of laws relating to a single activity, with each law pointing to a
  128. different result.
  129. Third, conflicts can arise in networks between different laws on the
  130. same subject. These include conflicts between federal and state laws,
  131. as in the areas of criminal laws and the right to privacy; conflicts
  132. between the laws of two or more states, which will inevitably arise
  133. for networks whose user base crosses state lines; and even conflicts
  134. between laws from the same governmental authority where two or more
  135. different laws overlap. The last is very common, especially in laws
  136. relating to networks and computer law.
  137. Some examples of the interactions between conflicting laws are
  138. considered below, from the viewpoint of an on-line system operator.
  139. 1. System operators Liability for "Criminal" Activities.
  140. Many different activities can create criminal liabilities for service
  141. providers, including:
  142. - distributing viruses and other dangerous program code;
  143. - publishing "obscene" materials;
  144. - trafficking in stolen credit card numbers and other unauthorized
  145. access data;
  146. - trafficking in pirated software;
  147. - and acting as an accomplice, accessory or conspirator in these and
  148. other activities.
  149. The acts comprising these different violations are separately defined
  150. in statutes and court cases on both the state and federal levels.
  151. For prosecutors and law enforcers, this is a vast array of options for
  152. pursuing wrongdoers. For service providers, it's a roulette wheel of
  153. risk.
  154. Faced with such a huge diversity of criminal possibilities, few
  155. service providers will carefully analyze the exact laws that may
  156. apply, nor the latest case law developments for each type of criminal
  157. activity. Who has the time? For system operators who just want to
  158. "play it safe", there is a strong incentive to do something much
  159. simpler: Figure out ways to restrict user conduct on their systems
  160. that will minimize their risk under *any* criminal law.
  161. The system operator that chooses this highly restrictive route may not
  162. allow any e-mail, for fear that he might be liable for the activities
  163. of some secret drug ring, kiddie porn ring or stolen credit card code
  164. ring. The system operator may ban all sexually suggestive materials,
  165. for fear that the extreme anti-obscenity laws of some user's home town
  166. might apply to his system. The system operator may not permit
  167. transfer of program files through his system, except for files he
  168. personally checks out, for fear that he could be accused of assisting
  169. in distributing viruses, trojans or pirated software; and so on.
  170. In this way, the most restrictive criminal laws that might apply to a
  171. given on-line service (which could emanate, for instance, from one
  172. very conservative state within the system's service area) could end up
  173. restricting the activities of system operators all over the nation, if
  174. they happen to have a significant user base in that state. This
  175. results in less freedom for everyone in the network environment.
  176. 2. Federal vs. State Rights of Privacy.
  177. Few words have been spoken in the press about network privacy laws in
  178. each of the fifty states (as opposed to federal laws). However, what
  179. the privacy protection of the federal Electronic Communications
  180. Privacy Act ("ECPA") does not give you, state laws may.
  181. This was the theory of the recent Epson e-mail case. An ex-employee
  182. claimed that Epson acted illegally in requiring her to monitor e-mail
  183. conversations of other employees. She did not sue under the ECPA, but
  184. under the California Penal Code section prohibiting employee
  185. surveillance of employee conversations.
  186. The trial judge denied her claim. In his view, the California law
  187. only applied to interceptions of oral telephone discussions, and not
  188. to visual communication on video display monitors. Essentially, he
  189. held that the California law had not caught up to modern technology -
  190. making this law apply to e-mail communications was a job for the state
  191. legislature, not local judges.
  192. Beyond acknowledging that the California law was archaic and not
  193. applicable to e-mail, we should understand that the Epson case takes
  194. place in a special legal context - the workplace. E-mail user rights
  195. against workplace surveillance are undeniably important, but in our
  196. legal and political system they always must be "balanced" (ie.,
  197. weakened) against the right of the employer to run his shop his own
  198. way. Employers' rights may end up weighing more heavily against
  199. workers' rights for company e-mail systems than for voice telephone
  200. conversations, at least for employers who use intra-company e-mail
  201. systems as an essential backbone of their business. Fortunately, this
  202. particular skewing factor does not apply to *public* communications
  203. systems.
  204. I believe that many more attempts to establish e-mail privacy under
  205. state laws are possible, and will be made in the future. This is good
  206. news for privacy advocates, a growing and increasingly vocal group
  207. these days.
  208. It is mixed news, however, for operators of BBS's and other on-line
  209. services. Most on-line service providers operate on an interstate
  210. basis - all it takes to gain this status is a few calls from other
  211. states every now and then. If state privacy laws apply to on-line
  212. systems, then every BBS operator will be subject to the privacy laws
  213. of every state in which one or more of his users are located! This
  214. can lead to confusion, and inability to set reasonable or predictable
  215. system privacy standards.
  216. It can also lead to the effect described above in the discussion of
  217. criminal liability. On-line systems might be set up "defensively", to
  218. cope with the most restrictive privacy laws that might apply to them.
  219. This could result in declarations of *absolutely no privacy* on some
  220. systems, and highly secure setups on others, depending on the
  221. individual system operator's inclinations.
  222. 3. Pressure on Privacy Rights Created by Risks to Service Providers.
  223. There are two main kinds of legal risks faced by a system operator.
  224. First, the risk that the system operator himself will be found
  225. criminally guilty or civilly liable for being involved in illegal
  226. activities on his system, leading to fines, jail, money damages,
  227. confiscation of system, criminal record, etc.
  228. Second, the risk of having his system confiscated, not because he did
  229. anything wrong, but because someone else did something suspicious on
  230. his system. As discussed above, a lot of criminal activity can take
  231. place on a system when the system operator isn't looking. In
  232. addition, certain non-criminal activities on the system could lead to
  233. system confiscation, such copyright or trade secret infringement.
  234. This second kind of risk is very real. It is exactly what happened to
  235. Steve Jackson Games last year. Law enforcement agents seized Steve's
  236. computer (which ran a BBS), not because they thought he did anything
  237. wrong, but because they were tracking an allegedly evil computer
  238. hacker group called the "Legion of Doom". Apparently, they thought
  239. the group "met" and conspired on his BBS. A year later, much of the
  240. dust has cleared, and the Electronic Frontier Foundation is funding a
  241. lawsuit against the federal agents who seized the system.
  242. Unfortunately, even if he wins the case Steve can't get back the
  243. business he lost. To this day, he still has not regained all of his
  244. possessions that were seized by the authorities.
  245. For now, system operators do not have a great deal of control over
  246. government or legal interference with their systems. You can be a
  247. solid citizen and report every crime you suspect may be happening
  248. using your system. Yet the chance remains that tonight, the feds will
  249. be knocking on *your* door looking for an "evil hacker group" hiding
  250. in your BBS.
  251. This Keystone Kops style of "law enforcement" can turn system
  252. operators into surrogate law enforcement agents. System operators who
  253. fear random system confiscation will be tempted to monitor private
  254. activities on their systems, intruding on the privacy of their users.
  255. Such intrusion can take different forms. Some system operators may
  256. declare that there will be no private discussions, so they can review
  257. and inspect everything. More hauntingly, system operators may indulge
  258. in surreptitious sampling of private e-mail, just to make sure no
  259. one's doing anything that will make the cops come in and haul away
  260. their BBS computer systems (By the way, I personally don't advocate
  261. either of these things).
  262. This situation can be viewed as a way for law enforcement agents to do
  263. an end run around the ECPA's bar on government interception of
  264. electronic messages. What the agents can't intercept directly, they
  265. might get through fearful system operators. Even if you don't go for
  266. such conspiracy theories, the random risk of system confiscation puts
  267. great pressure on the privacy rights of on-line system users.
  268. 4. Contracts Versus Other Rights.
  269. Most, perhaps all, of the rights between system operators and system
  270. users can be modified by the basic service contract between them. For
  271. instance, the federal ECPA gives on-line service users certain privacy
  272. rights. It conspicuously falls short, however, by not protecting
  273. users from privacy intrusions by the system operator himself.
  274. Through contract, the system operator and the user can in effect
  275. override the ECPA exception, and agree that the system operator will
  276. not read private e-mail. Some system operators may go the opposite
  277. direction, and impose a contractual rule that users should not expect
  278. any privacy in their e-mail.
  279. Another example of the power of contracts in the on-line environment
  280. occurred recently on the Well, a national system based in San
  281. Francisco (and highly recommended to all those interested in
  282. discussing on-line legal issues). A Well user complained that a
  283. message he had posted in one Well conference area had been
  284. cross-posted by other users to a different conference area without his
  285. permission.
  286. A lengthy, lively discussion among Well users followed, debating the
  287. problem. One of the major benchmarks for this discussion was the
  288. basic service agreement between the Well and its users. And a
  289. proposed resolution of the issue was to clarify the wording of that
  290. fundamental agreement. Although "copyrights" were discussed, the
  291. agreement between the Well and its users was viewed as a more
  292. important source of the legitimate rights and expectations of Well
  293. users.
  294. Your state and federal "rights" against other on-line players may not
  295. be worth fighting over if you can get a contract giving you the rights
  296. you want. In the long run, the contractual solution may be the best
  297. way to set up a decent networked on-line system environment, except
  298. for the old bogeyman of government intrusion (against whom we will all
  299. still need our "rights", Constitutional and otherwise).
  300. CONCLUSION
  301. There are many different laws that system operators must heed in
  302. running their on-line services. This can lead to restricting system
  303. activities under the most oppressive legal standards, and to
  304. unpredictable, system-wide interactions between the effects of the
  305. different laws.
  306. The "net" result of this problem can be undue restrictions on the
  307. activities of system operators and users alike.
  308. The answers to this problem are simple in concept, but not easy to
  309. execute. First, enact (or re-enact) all laws regarding electronic
  310. services on a national level only, overriding individual state control
  311. of system operators activities in cyberspace. It's time to realize
  312. that provincial state laws only hinder proper development of
  313. interstate electronic systems.
  314. As yet, there is little movement in enacting nationally effective
  315. laws. Isolated instances include the Electronic Communications
  316. Privacy Act and the Computer Fraud and Abuse Act, which place federal
  317. "floors" beneath privacy protection and certain types of computer
  318. crime, respectively. On the commercial side, the new Article 4A of
  319. the Uniform Commercial Code, which normalizes on-line commercial
  320. transactions, is ready for adoption by the fifty states.
  321. Second, all laws regulating on-line systems must be carefully designed
  322. to interact well with other such laws. The goal is to create a
  323. well-defined, reasonable legal environment for system operators and
  324. users.
  325. The EFF is fighting hard on this front, especially in the areas of
  326. freedom of the press, rights of privacy, and rights against search and
  327. seizure for on-line systems. Reducing government intrusion in these
  328. areas will help free up cyberspace for bigger and better things.
  329. However, the fight is just beginning today.
  330. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
  331. Lance Rose is an attorney who works primarily in the fields of
  332. computer and high technology law and intellectual property. His
  333. clients include on-line publishers, electronic funds transfer
  334. networks, data transmission services, individual system operators, and
  335. shareware authors and vendors. He is currently revising SYSLAW, The
  336. Sysop's Legal Manual. Lance is a partner in the New York City firm of
  337. Greenspoon, Srager, Gaynin, Daichman & Marino, and can be reached by
  338. voice at (212)888-6880, on the Well as "elrose", and on CompuServe at
  339. 72230,2044.

comments powered by Disqus