亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cyberspace and the legal matrix- laws or confusion.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
personally checks out, for fear that he could be accused of assistingin distributing viruses, trojans or pirated software; and so on.In this way, the most restrictive criminal laws that might apply to agiven on-line service (which could emanate, for instance, from onevery conservative state within the system's service area) could end uprestricting the activities of system operators all over the nation, ifthey happen to have a significant user base in that state.  Thisresults in less freedom for everyone in the network environment.2.  Federal vs. State Rights of Privacy.Few words have been spoken in the press about network privacy laws ineach of the fifty states (as opposed to federal laws).  However, whatthe privacy protection of the federal Electronic CommunicationsPrivacy Act ("ECPA") does not give you, state laws may.This was the theory of the recent Epson e-mail case.  An ex-employeeclaimed that Epson acted illegally in requiring her to monitor e-mailconversations of other employees.  She did not sue under the ECPA, butunder the California Penal Code section prohibiting employeesurveillance of employee conversations.The trial judge denied her claim.  In his view, the California lawonly applied to interceptions of oral telephone discussions, and notto visual communication on video display monitors.  Essentially, heheld that the California law had not caught up to modern technology -making this law apply to e-mail communications was a job for the statelegislature, not local judges.Beyond acknowledging that the California law was archaic and notapplicable to e-mail, we should understand that the Epson case takesplace in a special legal context - the workplace.  E-mail user rightsagainst workplace surveillance are undeniably important, but in ourlegal and political system they always must be "balanced" (ie.,weakened) against the right of the employer to run his shop his ownway.  Employers' rights may end up weighing more heavily againstworkers' rights for company e-mail systems than for voice telephoneconversations, at least for employers who use intra-company e-mailsystems as an essential backbone of their business.  Fortunately, thisparticular skewing factor does not apply to *public* communicationssystems.I believe that many more attempts to establish e-mail privacy understate laws are possible, and will be made in the future.  This is goodnews for privacy advocates, a growing and increasingly vocal groupthese days.It is mixed news, however, for operators of BBS's and other on-lineservices.  Most on-line service providers operate on an interstatebasis - all it takes to gain this status is a few calls from otherstates every now and then.  If state privacy laws apply to on-linesystems, then every BBS operator will be subject to the privacy lawsof every state in which one or more of his users are located!  Thiscan lead to confusion, and inability to set reasonable or predictablesystem privacy standards.It can also lead to the effect described above in the discussion ofcriminal liability.  On-line systems might be set up "defensively", tocope with the most restrictive privacy laws that might apply to them.This could result in declarations of *absolutely no privacy* on somesystems, and highly secure setups on others, depending on theindividual system operator's inclinations.3.   Pressure on Privacy Rights Created by Risks to Service Providers.There are two main kinds of legal risks faced by a system operator.First, the risk that the system operator himself will be foundcriminally guilty or civilly liable for being involved in illegalactivities on his system, leading to fines, jail, money damages,confiscation of system, criminal record, etc.Second, the risk of having his system confiscated, not because he didanything wrong, but because someone else did something suspicious onhis system.  As discussed above, a lot of criminal activity can takeplace on a system when the system operator isn't looking.  Inaddition, certain non-criminal activities on the system could lead tosystem confiscation, such copyright or trade secret infringement.This second kind of risk is very real.  It is exactly what happened toSteve Jackson Games last year.  Law enforcement agents seized Steve'scomputer (which ran a BBS), not because they thought he did anythingwrong, but because they were tracking an allegedly evil computerhacker group called the "Legion of Doom".  Apparently, they thoughtthe group "met" and conspired on his BBS.  A year later, much of thedust has cleared, and the Electronic Frontier Foundation is funding alawsuit against the federal agents who seized the system.Unfortunately, even if he wins the case Steve can't get back thebusiness he lost.  To this day, he still has not regained all of hispossessions that were seized by the authorities.For now, system operators do not have a great deal of control overgovernment or legal interference with their systems.  You can be asolid citizen and report every crime you suspect may be happeningusing your system.  Yet the chance remains that tonight, the feds willbe knocking on *your* door looking for an "evil hacker group" hidingin your BBS.This Keystone Kops style of "law enforcement" can turn systemoperators into surrogate law enforcement agents.  System operators whofear random system confiscation will be tempted to monitor privateactivities on their systems, intruding on the privacy of their users.Such intrusion can take different forms.  Some system operators maydeclare that there will be no private discussions, so they can reviewand inspect everything.  More hauntingly, system operators may indulgein surreptitious sampling of private e-mail, just to make sure noone's doing anything that will make the cops come in and haul awaytheir BBS computer systems (By the way, I personally don't advocateeither of these things).This situation can be viewed as a way for law enforcement agents to doan end run around the ECPA's bar on government interception ofelectronic messages.  What the agents can't intercept directly, theymight get through fearful system operators.  Even if you don't go forsuch conspiracy theories, the random risk of system confiscation putsgreat pressure on the privacy rights of on-line system users.4.   Contracts Versus Other Rights.Most, perhaps all, of the rights between system operators and systemusers can be modified by the basic service contract between them.  Forinstance, the federal ECPA gives on-line service users certain privacyrights.  It conspicuously falls short, however, by not protectingusers from privacy intrusions by the system operator himself.Through contract, the system operator and the user can in effectoverride the ECPA exception, and agree that the system operator willnot read private e-mail.  Some system operators may go the oppositedirection, and impose a contractual rule that users should not expectany privacy in their e-mail.Another example of the power of contracts in the on-line environmentoccurred recently on the Well, a national system based in SanFrancisco (and highly recommended to all those interested indiscussing on-line legal issues).  A Well user complained that amessage he had posted in one Well conference area had beencross-posted by other users to a different conference area without hispermission.A lengthy, lively discussion among Well users followed, debating theproblem.  One of the major benchmarks for this discussion was thebasic service agreement between the Well and its users.  And aproposed resolution of the issue was to clarify the wording of thatfundamental agreement.  Although "copyrights" were discussed, theagreement between the Well and its users was viewed as a moreimportant source of the legitimate rights and expectations of Wellusers.Your state and federal "rights" against other on-line players may notbe worth fighting over if you can get a contract giving you the rightsyou want.  In the long run, the contractual solution may be the bestway to set up a decent networked on-line system environment, exceptfor the old bogeyman of government intrusion (against whom we will allstill need our "rights", Constitutional and otherwise).CONCLUSIONThere are many different laws that system operators must heed inrunning their on-line services.  This can lead to restricting systemactivities under the most oppressive legal standards, and tounpredictable, system-wide interactions between the effects of thedifferent laws.The "net" result of this problem can be undue restrictions on theactivities of system operators and users alike.The answers to this problem are simple in concept, but not easy toexecute.  First, enact (or re-enact) all laws regarding electronicservices on a national level only, overriding individual state controlof system operators activities in cyberspace.  It's time to realizethat provincial state laws only hinder proper development ofinterstate electronic systems.As yet, there is little movement in enacting nationally effectivelaws.  Isolated instances include the Electronic CommunicationsPrivacy Act and the Computer Fraud and Abuse Act, which place federal"floors" beneath privacy protection and certain types of computercrime, respectively.  On the commercial side, the new Article 4A ofthe Uniform Commercial Code, which normalizes on-line commercialtransactions, is ready for adoption by the fifty states.Second, all laws regulating on-line systems must be carefully designedto interact well with other such laws.  The goal is to create awell-defined, reasonable legal environment for system operators andusers.The EFF is fighting hard on this front, especially in the areas offreedom of the press, rights of privacy, and rights against search andseizure for on-line systems.  Reducing government intrusion in theseareas will help free up cyberspace for bigger and better things.However, the fight is just beginning today._ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Lance Rose is an attorney who works primarily in the fields ofcomputer and high technology law and intellectual property.  Hisclients include on-line publishers, electronic funds transfernetworks, data transmission services, individual system operators, andshareware authors and vendors.  He is currently revising SYSLAW, TheSysop's Legal Manual.  Lance is a partner in the New York City firm ofGreenspoon, Srager, Gaynin, Daichman & Marino, and can be reached byvoice at (212)888-6880, on the Well as "elrose", and on CompuServe at72230,2044.Copyright 1991 Lance RoseThe above article was originally published in Boardwatch, June, 1991

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久久久久97三级| 夜夜夜精品看看| 欧美视频第二页| 国产91色综合久久免费分享| 亚洲大型综合色站| 亚洲欧美在线另类| 久久久一区二区| 日韩视频中午一区| 欧美性xxxxxxxx| www.亚洲色图.com| 国产乱子轮精品视频| 婷婷丁香激情综合| 亚洲人成在线播放网站岛国| 久久精品夜夜夜夜久久| 欧美日韩一区二区三区四区五区| 国产盗摄精品一区二区三区在线| 男男成人高潮片免费网站| 亚洲精品视频免费看| 中文字幕精品一区 | 欧美岛国在线观看| 欧美在线免费观看亚洲| 成人国产精品免费观看动漫| 精品亚洲国产成人av制服丝袜| 亚洲成人一二三| 亚洲福利视频一区| 亚洲免费av在线| 国产精品国产三级国产普通话99| 国产婷婷一区二区| 久久夜色精品国产噜噜av| 日韩欧美一区二区久久婷婷| 91精品在线麻豆| 欧美一区日韩一区| 91精品国产91综合久久蜜臀| 777午夜精品视频在线播放| 欧美三级中文字幕| 欧美日韩一级二级三级| 欧美三级视频在线观看| 欧美三级日韩三级| 欧美日韩情趣电影| 欧美丰满嫩嫩电影| 7777精品伊人久久久大香线蕉超级流畅 | 中日韩免费视频中文字幕| 久久精品免费在线观看| 国产人成亚洲第一网站在线播放| 久久精品欧美日韩| 国产精品沙发午睡系列990531| 亚洲国产高清aⅴ视频| 国产精品久久午夜夜伦鲁鲁| 最新中文字幕一区二区三区| 亚洲日本va午夜在线电影| 亚洲色图制服诱惑| 五月婷婷色综合| 麻豆91免费观看| 国产伦精品一区二区三区在线观看| 国产suv精品一区二区三区| 成人福利在线看| 91在线你懂得| 欧美乱熟臀69xxxxxx| 日韩欧美精品在线视频| 国产色综合久久| 亚洲天堂久久久久久久| 亚洲观看高清完整版在线观看| 日本成人在线不卡视频| 国产高清一区日本| 色天使久久综合网天天| 91精品国产入口| 国产日韩欧美精品综合| 亚洲精品欧美在线| 日日摸夜夜添夜夜添国产精品 | 国产精品久久久久影视| 亚洲精品菠萝久久久久久久| 日本成人在线看| 成人黄色小视频| 欧美视频一区二区三区四区| 精品国产a毛片| 亚洲人亚洲人成电影网站色| 美女任你摸久久| 99久久99久久精品免费观看| 91精品国产欧美日韩| 国产精品热久久久久夜色精品三区 | 国产亚洲va综合人人澡精品| 亚洲欧美偷拍三级| 日韩国产在线观看一区| 国产.欧美.日韩| 欧美日韩一区中文字幕| 亚洲免费观看高清完整版在线 | 日本欧美一区二区三区乱码| 国产精品久久久久天堂| 亚洲国产综合人成综合网站| 蜜臀av性久久久久蜜臀aⅴ| 国产成人av一区二区| 在线观看网站黄不卡| 国产精品区一区二区三区| 毛片av中文字幕一区二区| 这里只有精品视频在线观看| 亚洲欧美电影一区二区| 伊人一区二区三区| 久久狠狠亚洲综合| 7777精品伊人久久久大香线蕉经典版下载 | 丝袜国产日韩另类美女| 高清免费成人av| 欧美大尺度电影在线| 亚洲高清视频在线| 国产91在线观看| 精品1区2区在线观看| 久久亚洲春色中文字幕久久久| 亚洲精品视频观看| 国产在线视视频有精品| 欧美日韩国产a| 18涩涩午夜精品.www| 久久99久国产精品黄毛片色诱| 国产精品一品二品| 精品sm在线观看| a亚洲天堂av| 亚洲地区一二三色| 欧美性高清videossexo| 亚洲成av人片在线| 久久亚洲精品国产精品紫薇| 成人免费毛片嘿嘿连载视频| 日韩毛片在线免费观看| 欧美色手机在线观看| 91尤物视频在线观看| 2022国产精品视频| 久久综合av免费| 欧美日本精品一区二区三区| 樱桃视频在线观看一区| 国产欧美日韩精品一区| 国产日韩欧美高清| 久久国产免费看| 欧美一区二区在线看| 亚洲成av人片在线观看无码| 欧日韩精品视频| 亚洲男同性恋视频| 91麻豆6部合集magnet| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 国产福利一区二区| ww亚洲ww在线观看国产| 久久国产精品第一页| 91精品一区二区三区久久久久久| 五月婷婷久久综合| 日韩一区二区精品在线观看| 精品综合久久久久久8888| 精品国产污网站| 国产二区国产一区在线观看| 国产拍揄自揄精品视频麻豆| 99综合影院在线| 亚洲午夜久久久久久久久久久| 欧美三级电影在线看| 日本伊人午夜精品| 久久久久久久国产精品影院| 福利视频网站一区二区三区| **欧美大码日韩| 欧美日韩二区三区| 久久99国产精品成人| 国产蜜臀av在线一区二区三区| 不卡一区在线观看| 亚洲国产精品久久一线不卡| 欧美一级在线视频| 精品在线免费观看| 国产精品卡一卡二卡三| 欧美色图片你懂的| 久久99精品国产91久久来源| 国产精品色眯眯| 欧美日韩国产美女| 国产一区二区视频在线播放| 《视频一区视频二区| 在线观看91av| 国产 欧美在线| 亚洲国产人成综合网站| 2023国产精品视频| 欧美亚洲尤物久久| 激情六月婷婷综合| 亚洲精品国产一区二区精华液| 4438x成人网最大色成网站| 国产成人精品一区二| 亚洲图片一区二区| 国产亚洲综合av| 欧美午夜精品久久久| 国产精品一二三四五| 亚洲影视资源网| 久久精品这里都是精品| 欧美日韩国产影片| 成人性视频网站| 蜜桃在线一区二区三区| 中文字幕亚洲综合久久菠萝蜜| 91精品国产手机| 色婷婷精品久久二区二区蜜臀av| 国内成人免费视频| 亚洲高清中文字幕| 亚洲视频免费在线| 精品乱码亚洲一区二区不卡| 色婷婷激情综合| 国产凹凸在线观看一区二区| 日韩精品一级中文字幕精品视频免费观看| 国产丝袜美腿一区二区三区| 这里只有精品99re| 在线视频国内自拍亚洲视频| 国产成人高清在线| 伦理电影国产精品| 亚洲成人av电影|