Pace Law Review
Fall, 1998
Internet Law Symposium
Symposium Articles
WHY SHOULD THE INTERNET BE ANY DIFFERENT? [FNa1]
Jonathan D. Bick [FNaa1]
Copyright © 1998 Pace Law Review; Jonathan D. Bick
Introduction
Economic activity in the United States and other
countries in the developed world relies on the production and
dissemination of information. Some of that information
has intrinsic value and is likely to be protected by certain
property rights. Other types of information form
the contractual basis for America's, and much of the world's
commercial system. The communication of both
types of information is subject to existing law. Existing American
laws, which govern the communication of these
types of information, are based on the concept of geographical
sovereignty. Due in part to the digitization
of information, [FN1] the availability of personal computers, and the
existence of the Internet, the flow of information
defies geographical boundaries. Therefore, the application of existing
American law may have to be applied to Internet
transactions differently than in any prior transactions.
What began several decades ago as a technological
undertaking [FN2] by the United States Defense Department and
a small number of research oriented American
universities, [FN3] has developed into the leading edge of an
information tidal wave [FN4] known as the Internet.
[FN5] What was once an arcane communication method is now
commonly thought of as a public utility. [FN6]
Some Internet service providers [FN7] have even sought protection
from liability under the privilege afforded communication
common carriers. This plea for protection is
substantiated by the commonly expressed view
that the Internet is now "an appliance of every day life." [FN8]
Contrary to the "Wild West" comparisons [FN9]
and other hype published by the popular press, [FN10] the Internet
has yet to wreak havoc on existing law in the
United States. The American judicial system seems to have taken
Internet transactions in stride and adjudicated
Internet matters on a significant number of occasions. [FN11] Still,
Internet transactions should be treated differently
from other transactions because the Internet allows interactions that
have previously been impossible. Those unprecedented
interactions have inevitably unveiled numerous, previously
unforeseen difficulties. [FN12]
Suggestions that the Internet has created an artificial
economic environment and a synthetic society without law have
proved to be merely myth. In fact, the Securities
and Exchange Commission, [FN13] the Food and Drug
Administration, [FN14] and other agencies have
successfully claimed jurisdiction over parts of the Internet as a part
of their mandate. Also, a petition has been filed
with the Federal Communications Commission (FCC), "requesting the
initiation of rulemaking proceedings 'defining
permissible communications over the Internet.' " [FN15] Nevertheless,
an argument can be made that the American legal
system in general, and government agencies in particular, should
treat transactions involving the Internet in
a unique manner.
The Internet penetrates many aspects of business
and personal life. For example, in preparation for a recent trip to
Europe, I used the Internet to review transportation
schedules, acquire airline tickets, request car rentals, and make
train, ferry, restaurant, and hotel reservations.
During the trip, I also used the Internet to set up, confirm, and
reschedule meetings with friends and business
acquaintances in five countries. The Internet also provided a source of
entertainment and news. Upon returning home,
I bought a Volvo directly from the factory, sent thank you notes, and
paid trip-related bills using the Internet.
The Internet has also changed the way businesses
do business. For instance, the International Business Machines
Credit Corporation (ICC) abandoned its paper
law books in favor of an Internet legal database. [FN16] Additionally,
since some songs are now free from physical form,
there may be no need to visit a record store or handle a compact
disc in order to listen to new music. Well-known
artists, such as David Bowie and Duran Duran, have released
songs through the Internet. Thus, the dissemination
of strings of 1's and 0's has joined records, tapes, and discs as a
channel of music distribution.
From an advanced legal perspective, the Internet
has raised novel questions with respect to the application of criminal
law, contracts, torts, intellectual property,
and other areas of the law. The Internet was built to be a communication
system [FN17] and is now used by an immense number
of people to create seemingly binding obligations. The validity
of those contracts is yet to be analyzed, particularly
from the standpoint of which laws, and especially, whose laws, are
applicable. [FN18]
The accessible nature of the Internet allows individuals
to communicate with a vast number of people, whether such
communication is intentional or not. Thus, a
defamatory statement or a file containing a computer virus can be
distributed worldwide in a matter of minutes.
The law of torts, which is generally understood to make people
responsible for their actions and inactions,
must invent new duties of care, and possibly new remedies with respect
to
the Internet. [FN19]
The Internet is populated by protected intellectual
property. The most important are those intangible assets that enjoy
trademark and copyright protection. Until now,
no definitive relationship has been established between trademarks
and the unique Internet addresses known as "domain
names." In addition, since copying information and data from
one intermediary computer to another is the essence
of the Internet's communication technology, existing copyright
laws that make such copying a potential form
of infringement must be reexamined.
Similarly, while crimes of trespass, wire fraud,
unauthorized access, obscenity, transportation of stolen goods, and
threatening communications are all covered by
existing criminal statutes, the Internet still raises challenges
regarding how these crimes fit into the criminal
justice system. For example, how can a crime be sufficiently localized
for prosecution when the Internet is part of
a criminal transaction? The lack of locality makes criminal judgments
involving the Internet more difficult to enforce.
The ability to use the Internet to "project" an
activity into a jurisdiction presents another opportunity to circumvent
criminal statutes. For instance, the French government
banned a book describing the decline in health of French
President Mitterand, but French citizens were
able to access the book on the Internet. The Japanese government
prohibits certain types of gambling, but British
bookmakers have used the Internet to allow Japanese citizens to
participate in prohibited wagering. The German
government restricts neo-Nazi propaganda that can nevertheless be
found on the Internet.
Additionally, the Internet allows individuals
to commit crimes not previously considered possible. In United States v.
Morris, [FN20] a computer program was sent across
the Internet to thousands of computers worldwide. The program
caused those computers which accepted it to shut
down. [FN21] In United States v. Baker, [FN22] a student was
jailed for violating Federal law [FN23] after
posting a story accessible by millions, which graphically described the
torture, rape, and murder of a woman who was
thought to be a classmate. [FN24] It should be noted that the District
Court subsequently dismissed the charges. [FN25]
There is public opinion that the Internet is beyond
existing laws; such opinion springs from the underlying concept that
the Internet is new and somehow different. However,
the Internet has been fully commercialized for more than five
years. [FN26] During that time, attorneys throughout
the United States and the world have been able to give
clients a good idea of what to do and how to
proceed as clients' concerns arose. They were able to do so by identifying
underlying legal principles and by resorting
to the development of appropriate analogies. Much of the difficulty
associated with Internet law arises when an attorney
attempts to reconcile the disparate advice given to various clients
relating to Internet matters. Universal Internet
legal principles are still elusive.
Clearly, the Internet has given birth to a spade
of cases that have raised a range of legal doctrinal issues. The United
States' anti-trust lawsuit against Microsoft,
[FN27] as well as threats of additional anti-trust litigation against
Microsoft [FN28] by twelve state attorney generals,
begs the question: Can a company monopolize Internet access?
White House aide Sidney Blumenthal's libel suit
against Internet gossip columnist Matt Drudge, [FN29] required that
we ask what libel standards should be used regarding
the Internet where anyone can possibly be a publisher. [FN30]
Several recording companies have filed civil
copyright infringement suits against Internet sites that allow users to
download music without permission from the copyright
holders. These actions were undoubtedly brought to test the
existing copyright law's ability to deal with
the Internet.
Likewise, America Online's trespass and violation
of privacy suits against several junk e-mail distributors raises the
question: Do attempts to block electronic mail
violate the First Amendment? The case of McVeigh v. Cohen
[FN31] involved a sailor who was discharged from
the Navy after he posted a note on the Internet in which he
identified his marital status as "gay." The McVeigh
court suggested that the Navy and America Online violated a 1986
Federal law barring computer service companies
from releasing confidential information about customers without the
person's permission or a court order. [FN32]
Consequently, it is difficult to argue that American courts have not been
able to cope with these new, previously undecided
issues.
Attorneys who evaluate Internet transactions on
a regular basis have typically found that once speculative and
hypothetical controversies are now replaced by
real ones, and they tend to find that the results seem reasonable and
predictable. In short, Internet matters usually
do not require new modes of thought, rather Internet transactions need
only be treated differently. To be specific,
the Internet is the quintessential product of the digitization phenomenon.
It is
a phenomenon that has collapsed the boundaries
among communication technologies. The toppling of the ambits
between communication technologies is significant
because the American legal system relies almost exclusively on
transmission technology to determine the nature
of the legal rights and obligations associated with a communication
related activity. Consequently, a single Internet
transaction may be subject to a number of arguably conflicting legal
rights and obligations.
I. A Longer Answer
From a legal perspective, tomes can be written
describing why Internet transactions might be treated differently from
non-Internet transactions. This writing will
be limited to three areas: (1) identifying certain transactions that are
unique to the Internet; (2) recognizing several
special problems that have arisen which have been perceived to be
caused by the Internet's use of digital communications;
and (3) pinpointing a limited number of uniquely Internet
related legal issues.
In order to best identify which transactions are
unique to the Internet, this writing will attempt to define the
Internet. This definition, though, will not speak
in terms of technological concepts and terminology. There are many
excellent Internet "how to" books and magazines
on that topic. [FN33] Rather, the definition of the Internet will be
phrased in terms of what the Internet can do.
Legal practitioners have found that while one
can practice Internet law dependably without the benefit of advanced
training in computer science, an attorney's ability
to give competent legal advice regarding Internet transactions is
dramatically enhanced by an understanding of
the Internet. This is particularly true when such comprehension is
combined with a working knowledge of the Internet's
limitations and potential.
The 1998 participants in the Internet Law Symposium
at Pace University School of Law ("the Symposium") have
unearthed example after example of Internet transactions
which, on first blush, purportedly exposed blatant
inadequacies in the existing American legal system.
Generally, these perceived inadequacies consisted of two types: i)
either an Internet transaction was apparently
not subject to any existing law, or ii) any attempt to apply existing laws
to a particular type of Internet transaction
resulted in an obvious violation of certain basic legal concepts. Both
inadequacies were illustrated by the application
of the First Amendment to the Internet. [FN34]
Consider the following: certain information is
deemed obscene in New York, but not in Ohio or New Jersey. An Ohio
Internet user using a home computer posts such
material on a server located in New Jersey. Sometime later, a
seven-year-old Internet user, located in New
York, uses a home computer to access the Internet via a New York ISP.
He seeks out and reads the material in question.
At first glance, the purveyor of the allegedly obscene material appears
to be beyond the reach of New York authorities.
Alternatively, if the parents of the New York minor complained to the
appropriate New York authorities, who in turn
prosecuted the New York ISP for trafficking of obscene material,
initially it would seem that the New York ISP
was being held responsible for actions beyond its control. This presumes
that the New York ISP had no knowledge of the
obscene nature of the content it was passing.
After some ringing of hands, in almost every case
the members of the Symposium saw that the legal gaps and the
mismatches disappeared when exposed to the light
of an appropriate analogy. Symposium speakers and students alike
have found that even the most novel Internet
questions can be handled by analogy if one understands the similarities
among the new and existing technologies.
In the above example, the actions in Ohio and
New Jersey were legal (i.e., the posting of certain material on an
Internet server). However, they resulted in a
potentially unlawful act in New York (i.e., exposing a minor to material
considered obscene), resulting in the New York
court's ability to prosecute the Ohio Internet user. While the Internet
allows actors from different jurisdictions to
raise challenges as to the appropriateness of the jurisdiction of foreign
criminal justice systems, their actions have
reasonably foreseeable consequences, for which the application of long
arm statutes may result in criminal culpability.
In considering the above hypothetical, the Symposium
concentrated on analogies equating ISPs to common carriers
and concluded that the ISP common carrier privilege
would provide an appropriate liability shield. This analogy is
firmly based on the technical understanding that
an ISP is one layer of a multi-layered Internet communication
infrastructure and has the two most obvious components,
as its name implies. [FN35] Specifically, it is available to a
broad range of the public for hire, [FN36] and
it is in the business of communicating messages over which it has
limited or no content control. [FN37]
The Symposium's search for appropriate analogies
concerning the question of intermediary liability for a
potentially obnoxious or offensive communication,
with respect to ISPs, was aided by researching cases concerning
pre-1900 telegraph industry activity [FN38] and
the mechanics of telephone, [FN39] radio, television, [FN40] cable
television, [FN41] and telefacsimile (better
known as telefaxes, or simply, faxes) machinery. [FN42] The discussion
set forth in Cubby, Inc. v. CompuServe, Inc.,
[FN43] concerning the relative responsibility of conduits for harmful
information in light of a claim of defamation,
was also useful in solidifying the analogy.
Generally, historical analogies have been useful
guides. [FN44] However, contemporary perceptions of the role of
emerging technologies, including the telegraph,
telephone, radio, and television, have often been vehemently amiss.
[FN45] Since it is unlikely that the ultimate
development of the Internet can be predicted, it would be a mistake to
formulate rules based on its present state. Symposium
members found that rather than developing a fixed set of black
letter laws, which could be used to understand
the regulation of Internet related transactions, the adaptation of
existing laws and precedent would be sufficient.
[FN46]
The pace of legal developments regarding the Internet
was found to be frantic. [FN47] For example, it is anticipated
that before a federal appeals court can consider
the fate of Microsoft's Windows 95 Internet access software, Windows
95 will be replaced by Microsoft's Windows 98.
Thus, it behooves Internet practitioners to stay abreast of
contemporaneous court findings, as well as technological
changes in the Internet as they develop advice based on
analogies.
Digital phenomena, that is, the use of digital
technology rather than analog technology, has made certain Internet
related transactions legally unique. This writing
will attempt to identify the perceived problems which have arisen due
to the Internet's use of digital communications.
The digitalization phenomenon has collapsed old boundaries of
communication. Unlike the past, specific transmission
channel technologies are no longer a reliable guide to the legal
nature of the activity.
While some communication laws may need to be changed,
the core ideas of the legal subjects, which are affected by
the Internet, remain sound and viable. The Internet
is not so revolutionary that all existing legal precepts must be
abandoned and replaced with new legal principles
in a completely separate Internet jurisdiction. [FN48] It is evident
that the American legal values that have evolved
over the past two centuries and that have been incorporated into
American jurisprudence will apply to Internet
transactions.
Because the Internet allows certain unique types
of communication, some Internet transactions pose potentially novel
challenges for legal practitioners. For example,
the application of liability to an Internet communication intermediary
is a unique Internet matter, whereas the originator
of an Internet electronic mail message is not. The originator will
generally be in the same legal position as he
or she would be if the content were on paper. Other uniquely Internet
related issues include the appropriate determination
of jurisdiction for Internet related civil and criminal matters, as
well as a proper nexus for tax matters. This
is primarily because the American legal system's tradition is based on
geographically defined sovereign boundaries.
II. What Are the Characteristics That Made the Internet Special?
In order to understand why Internet transactions
should be treated differently, one must first consider what the
Internet is. I am the father of three young children,
all of whom are more Internet literate than me. Therefore, I need
only draw on my personal experience at home to
give a working definition of the Internet, not based on what it is, but
what it does.
Recently, my nine-year-old son was explaining
the Internet to my six- year-old daughter. This is the same
nine-year-old who, when angered by his mother,
sought his revenge by using the Internet to circumvent the DuPont
Corporation security system. He changed the password
on her Du Pont issued computer, thereby locking her out of her
PC for several hours. Since Alexander is nine,
needless to say, he did not tell six-year-old Emily that the Internet is
an
international plexus of computer networks connected
to each other through common routers, using Transport Control
and Internet Protocols (TCP/IP) and sharing common
name and address space conventions. Although true, this
information is not very useful to most attorneys
or six-year-old sisters. Rather, Alexander told Emily that the Internet
is like a book because you can look things up
in it; but, it is more. It is like a fax because you can send and get
pictures, like Aunt Julie does of her new baby;
but, it does more. It is like a newspaper because once you put something
in it, you don't know who will read it or how
many times it will be copied; and yet it is still more. It is like television
and radio because it does not cost anything extra
to send a message to five or five million people, and it is like the mail
or the telephone because you can send or receive
a private message. Alexander summed it up by telling Emily the
Internet is like a Swiss Army knife, a single
tool that can do the same job as many other tools.
After hearing Alexander's explanation, it has
been instructional to treat the Internet as a book, a fax, a letter system,
a
newspaper, a phone system, a radio, and a television
system. This treatment has allowed the use of a cornucopia of
potentially useful analogies. By defining the
Internet in terms of what it can do, instead of what it is, a practitioner
can
immediately identify potential legal issues and
the sources of potential analogies.
A working definition of the Internet based on
what it does, rather than what it is, highlights two major reasons why
the
American legal system should treat the Internet
differently. First, the Internet involves potentially the same
transactions as many existing communication technologies
(i.e., books, faxes, letters, newspapers, phones, radio, and
television). Thus, the Internet potentially allows
people to act like and share the same rights and obligations as a
publisher, a common carrier, and a broadcaster.
This definition also highlights the fact that the Internet does the
same thing as many communication technologies,
but due to a technological change, does not do it the same way.
Second, the Internet appears to be able to do
what a combination of many existing technologies already do today. This
is important to note because each one of these
existing technologies has a nearly complete set of legal principles, based
on different underlying assumptions, precedents,
and rules and regulations. Because our legal system reveres precedent
and relies on analogy, the legal doctrines that
define the rights and obligations of a given communication technology,
such as print or broadcast, can each be visualized
as a separate monolith or ionic column. Each monument or column
is planted on a different base and is pointed
upward to a different point in space.
Consequently, the principles and legal doctrines
that have evolved for different technologies may conflict. As evidence
of this, one need only look as far as the Communications
Act of 1934, [FN49] which governs radio and television
transmissions, and cable communications. There
was no attempt to intellectually integrate the governing doctrines.
Additionally, the regulations came from completely
different places. The doctrines governing terrestrial
telecommunication common carriers were adopted
wholesale from the Interstate Commerce Act of 1887. [FN50]
The regulation of the telephone common carrier
was based on market entry price controls imposing a duty to furnish
communication services upon reasonable request.
The doctrines governing radio and television came from the Radio
Act of 1927. [FN51] The original theme of broadcast
regulation was to ration the public spectrum's use and impose a
public service obligation: that the public interest
and necessity would be served.
Until the Internet sprang into existence, separate
legal doctrines concerning communication transactions could
co-exist. However, the digital phenomena has
led to the destruction of existing communication technology boundaries.
The very nature of the Internet is forcing the
American legal community to re-evaluate substantial amounts of
substantive law.
As indicated previously, the Internet penetrates
many aspects of American life, and consequently, many aspects of
American law. While it may be beneficial to address
a large number of Internet related transactions, addressing
Internet transactions in a general way tends
to lead to conclusions with little relevancy. Therefore, the implications
of
only two Internet transactions are considered
below: Internet transactions related to the First Amendment and
copyright protection.
First Amendment concerns and Internet matters
are intertwined. Internet transactions have special value because they
are part of a technology that allows the free
flow of information, which is a central concern of the First Amendment.
[FN52] The First Amendment exerts itself by limiting
liability on tort actions like defamation, which limits efforts of
federal, state, and local governments to restrict
access to public information and limits governmental efforts to control
content. This exertion is readily and directly
applicable to the Internet.
The Internet represents the convergence of different
technologies and economic markets. Specifically, the Internet
combines common carrier, broadcasting, and print
transactions. Each technology and associated market has a very
different First Amendment legal tradition. For
example, telephone companies and media broadcasting firms have been
heavily regulated, while newspapers and magazines
have enjoyed broad First Amendment immunity from regulation.
Moreover, while newspaper publishers have strong
First Amendment protections, telephone firms waived their First
Amendment privileges to assume common carrier
status. Consequently, in the case of the Internet, we find a
juxtaposition of interests where a publisher's
content control, arguably the most critical characteristic of a publisher's
First Amendment privilege, is inconsistent with
regulations necessary for a telephone common carrier. [FN53] Thus,
Internet transactions will most likely be treated
differently from other First Amendment transactions.
The area of copyright protection presents another
set of perplexing issues when existing law is applied to Internet
transactions. Among the most interesting concerns
is the use of "caching" [FN54] of information by Internet
applications. [FN55] In a nutshell, it can be
argued that since caching requires that data is copied, and since the
Internet extensively relies on caching, [FN56]
Internet users are engaged in the most pernicious infringement of
copyrighted material in history. While this conclusion
is often cited, the conclusions that may be drawn from this set of
facts vary. [FN57]
Under existing law, a copy, even if temporary,
is a copy for the purpose of applying copyright law. In the area of
computers, the courts have found that copying
computer data or software into a computer constitutes the production
of a copy for copyright purposes. [FN58] Most
users (infringers) are unaware of the cached copies, which are created
by merely using an Internet browser such as Netscape's
Navigator or Microsoft's Internet Explorer.
The existing law could respond in a number of
ways. Caching, which is preventable, may be deemed infringement.
However, the Fair Use Doctrine [FN59] of the
U.S. Copyright law will likely be applied in an expansive way to cover
unintentional copying on a case by case basis.
Alternatively, the courts could find an implied license created by
Internet content suppliers which permit caching.
In short, it is likely that Internet transactions will be treated
differently than other copyright transactions.
The digital phenomena made the Internet specialbecause
it collapsed old boundaries of communication technologies.
The digital phenomena [FN60] is at the heart
of the technological change that made the Internet unique among
communication technologies. The Internet, like
other forms of publication, provides value by providing content.
Content is the basic message or data with nothing
provided to help a user find, get, file or look at information.
Most information providers add value to the content
by dividing it into pages and by identifying the order and nature
of the content. More sophisticated information
products have cross-references, like indexes or tables of contents, that
internally point to another part of the product.
The Internet has pointers called "hyperlinks," which add a new
dimension to cross- referencing. They not only
point to new material, but also enable the user to procure an original
copy of an information source. The user may then
distribute it all with the click of a mouse.
Hyperlinking and the other results of the convergence
of different communication technologies are principally due to
the effects of the digital phenomena. That is,
the movement of most forms of electronic communication from analog
representation to digital representation. Understanding
the distinction between analog and digital communications is
pivotal in understanding why the Internet must
be treated differently. Analog communication involves waves. Analog
technology works by copying the sound wave or
the light wave with an electronic wave and sending it. The prime
example is the airwave created when a person
speaks. Technological analog communication is exemplified by the
original method used by Alexander Graham Bell
in the telephone, a method that has remained dominant in the
telecommunications field until recently. Analog
techniques are also used for the vast majority of radio and television
broadcasts.
Digital communication technology works by taking
millions of static samples of sound or light waves each minute
and reducing them to computer bits. These bits
are sent to machines that combine them to make pictures and sounds.
Digital data technology makes it possible to
use information in the digital content to permit routing and addressing.
Only a single channel is required by digital
technology to be sent on parallel paths. Analog technology requires a
separate and parallel channel to be established
for routing and addressing purposes, a channel that must remain intact
during the entire duration of the analog transmission.
Digital technology reduces text, image, and audio
to a common transmission media. This allows the easy combination
of various types of information representations.
Digital information or data, as embodied in the Internet, also has the
characteristic of being quick and easy to replicate.
These characteristics are not present in other static [FN61] or
dynamic [FN62] communication technologies.
Another central feature of digital information
or data is that each copy is as good as the original. These characteristics
are not found in either analog or print technologies.
If each copy is in all respects identical to the original, and if we
accept the traditional privilege - that anyone
can read a copyrighted work when one possesses it - then a copyright
holder's reproduction right has no value. This
follows from the fact that the traditional distinction between reading
(never within the copyright monopoly) and reproducing
it (always within the copyright monopoly) vanishes.
It can be argued that Internet transactions need
to be treated in the same "revolutionary" manner that, for example,
torts have been. That is to say, Internet transactions
like tort transactions should be separately grouped and taught as
a unit. In support of this contention, one need
only look at the cases that have dealt with the application of existing
law to the Internet. It appears that the courts
have had a difficult time squaring their Internet related decisions with
existing decisions. Proponents of the "Internet
requiring revolutionary treatment" position might point to the
newly established tort law, which was developed
because the courts had a difficult time squaring tort related decisions
with then existing decisions. During the hundreds
of years prior to the development of modern tort law, people were
still liable for their actions, but the liability
arose under a wide variety of legal theories. [FN63]
Proponents of the position that the Internet must
be treated in a revolutionary manner might also point out that prior
to Justice Louis Brandeis' establishment of the
"revolutionary" right to privacy, [FN64] courts experienced some
difficulty articulating the basis for certain
decisions. It can be argued that Internet rights, like the right of privacy,
must be discovered. It may ultimately be determined
that the use of the Internet gives rise to one or more new forms of
rights or obligations. Yet another possibility
is the "revolutionary" redefining of existing legal concepts. For example,
changing the word "copying" from "tangible reproduction"
to something more abstract would be more applicable to
the transient appearance of data or information
in a computer. This might lead to the development of new copyright
laws. [FN65]
There is a division between those who would like
to see incremental change and those who prefer radical change.
[FN66] The more radical group indicates that
due to the Internet, America is entering a shift from an industrial based
economy to a knowledge and information based
economy. They argue that this change will be as radical as the change
of the American society from agrarian to industrial.
They point out that the American legal system is strongly based on
geographically defined entities and that Internet
information flows freely across geographical boundaries. This
presents problems for determining both civil
and criminal jurisdiction. They further argue that this information flow
causes irreconcilable jurisdictional difficulties. In addition, they contend
that Internet technology has produced
new types of disputes while diminishing the feasibility
of traditional methods for discovering unlawful conduct and
enforcing traditional legal remedies. Some adherents
to this line of thought maintain that a separate Internet
jurisdiction must be established and that all
new legal principles be created. Others have argued that since the Internet
is limited by existing protocol and technology,
it necessarily creates its own rules. [FN67] Still, others have suggested
that a body of private international law that
incorporates centuries of trade law practice should apply. [FN68]
Nevertheless, most practitioners and commentators
do not deny that technological change has always been a source of
problems that the American legal system has successfully
addressed. One need only look at the legal changes wrought
in employment relations by the Industrial Revolution,
or how the automobile altered the nature of personal injury
claims. A quick read of the American legal system's
handling of past technological advances demonstrates that the
challenges presented by the Internet may be evolutionary,
although not revolutionary. [FN69] Previously, the
American legal system has neatly accommodated
the telegraph, telephone, television, and fax.
In fact, many of the ideas presented in the legal
integration of those technologies into the then existing American legal
system are still valid today. The Symposium students
have often consulted law review articles of the past to help them
formulate legal models for the Internet law challenges
of today. For example, a 1920 Columbia Law Review article
considered the difficulties faced by a telegraph
operator who had to determine whether a message was defamatory,
and thus decide whether to send it or not. [FN70]
The concerns expressed in this article are as relevant today to
Internet intermediary computer providers, Internet
bulletin board service providers, and Internet service providers
in general, as they were to telegraph firms and
telegraph operators shortly after the turn of the century.
The same quandary is presumably faced today by
Internet service providers who are at peril for transmitting or
posting potentially defamatory material. Because
legal changes lag behind technological changes, it comes as no
surprise that the American legal system has not
already resolved all the difficulties presented by the Internet. The
American market system has thrived in part because
our system tries not to predetermine the course of technological
change. It merely makes itself available for
dispute resolution when private accommodation and market mechanisms
fail. While our existing legal system will most
likely be able to accommodate Internet law, it should concentrate on the
application of law to new classes of litigants
such as Internet intermediaries of Internet publishers. Since neither of
these classes previously existed, it is only
natural that no legal precedent is available to guide them.
III. Uniquely Internet Issues
The Internet has bred a new, unique class of litigants
and judicial matters. One new issue involves novel jurisdiction.
For example, in U.S. v. Thomas, [FN71] a California
couple violated a federal obscenity criminal statute and was
convicted in Tennessee, even though their obscene
posting was on a server in California. A second type of uniquely
Internet related matter involves copyright protection
and caching. This is particularly important because existing
infringement laws do not require intent or knowledge
in order to find infringement.
A less obvious class of uniquely Internet litigants
is a particular type of Internet service providers that can be
divided into three basic groups. The first two
groups, conduits and content providers, fit comfortably within
established legal categories. The third group,
store-and- forward Internet services providers, do not.
Conduits are Internet service providers that provide
services involving little or no content alteration. They look and
act like telephone and telegraph companies, which
historically have had common carrier obligations and benefitted
from judicially acknowledged privileges. These
privileges have resulted in favorable treatment under the law of torts,
either because of their common carrier duties
or because of the fiction that they merely provide communication links
and do not actually republish information.
In short, courts have regularly limited the liability
of common carriers for the transmission of defamatory
communications and have often found that telephone
companies merely provide facilities, not reproductions. They are
usually asked to implement electronic eavesdropping,
and typically have an obligation to do so. They also normally
have common law nondisclosure obligations and
must take reasonable steps to prevent third parties from intercepting
communications. In defamation law, conduits can
escape liability under the "sealed container" doctrine, unless there is
no upstream producer available to pay a judgment.
In such cases, even a faultless conduit may be liable in order to
avoid placing the loss on an innocent consumer.
Content providers are the Internet service providers
who own the content. They are almost like publishers, and enjoy a
publisher's First Amendment rights, which limit
their tort and criminal liabilities with respect to the content they
publish. This makes them much more vulnerable
than the conduits. Store-and-forward Internet service providers do
both, and can arguably be governed by both sets
of doctrines.
Internet law should concentrate on the liability
of intermediaries because originators of electronic information content
are in the same legal position they would be
if their content were on paper. The Internet structure is composed of many
layers. Even the simplest Internet transaction
usually involves a user's computer, an Internet service provider's access
computer, a regional router, a governmental backbone
computer, another regional router, another Internet
service provider's computer, and a content provider'scomputer.
So, even in the simplest transactions, there are many
more intermediaries than users or content providers.
In most of the potential intermediary liability
areas the finding of fault is a necessary element in the assessment of
liability. In copyright law, fault is not a prerequisite
to liability. Consequently, an intermediary, who is only acting as a
conduit and has neither control over the content
nor vouches for its quality, is exposed to a great deal of liability. This
lack of fault required for liability could have
significant impact for Internet intermediaries.
There are some cases that address the liability
of Internet intermediaries. However, their message is not clear.
Consider Cubby, Inc. v. CompuServe Inc., [FN72]
where a federal district court, clearly interested in maintaining
information flow, found that an Internet intermediary
was not liable for defamation in the absence of evidence that it
knew or should have known about the harmful information
flowing through its service. In Cubby, a newsletter that
allegedly defamed the plaintiffs was uploaded
by its publisher onto a database maintained on CompuServe's
computers. [FN73] The court characterized CompuServe's
service as a for-profit library. [FN74] It indicated that
CompuServe had no general duty to inspect the
content it was carrying. [FN75] This position is completely in accord
with generally accepted tort law. [FN76]
The Internet has given birth to a new type of
intermediary between the content creator and the user, who will
ultimately consume the information. The earliest
examples of this new type of intermediary are the Internet electronic
bulletin boards. While it appears to the end
user that he or she is getting his or her information directly from the
content creator, it is actually being delivered
by one or more intermediaries.
An Internet page usually presents a user with
a highlighted text string, called a hyperlink. A user gets the information
by clicking on the hyperlink. The user's action
causes the server displaying the pointer to download special
computer information, known as a universal resource
locator, to the user's computer and then disconnects. The user's
computer, running Internet software, connects
to another computer and receives more information, and so on and so
forth. Thus, information allegedly infringing
upon another's copyright may move through several intermediaries in this
distribution system. The potential liability
of various intermediaries for copyright infringement is a matter of obvious
interest both to the intermediaries and to the
copyright owner alleging infringement.
The copyright holder is more likely to find intermediaries,
such as IBM, America On-line, or CompuServe, more eligible
candidates to sue than end users, because they
have deeper pockets and are more amenable to personal jurisdiction.
For example, in Playboy Enterprises v. Frena,
[FN77] the District Court found that an Internet intermediary, which
ran a dial-up electronic bulletin board service,
was liable for copyright and trademark infringement for material
available through its service, without the plaintiff
having to prove that the intermediaries knew of the infringing
nature of the content. [FN78] Moreover, copyright
infringement claims arose from the on- line use of copyrighted
photographs owned by the plaintiff. [FN79] The
photos in question were claimed to have been downloaded by one or
more of the defendant's customers. [FN80] However,
because the plaintiff's trademarks were replaced by the
defendant's advertising, this claim was questionable.
Based on the standard of strict liability for direct infringement,
the court disregarded Frena's defense of lack
of actual knowledge. [FN81]
IV. Conclusion
The Internet causes tension among many elements
worldwide. Such tension exists between intellectual property owners
who need a stable set of rules to make appropriate
business decisions and the worldwide need for broad freedoms of
speech to ensure fundamental human rights. The
Internet cases that arose in 1998 and in prior years can be read
to imply there is a stable set of expectations
which will lead to predictable results in the near future with respect
to the
Internet. Consequently, Internet attorneys must
recognize that the Internet is a new medium for sharing information
and must treat Internet transactions differently
than any other prior transactions.
While the Internet does represent an evolutionary
convergence of technologies as a result of expanded use of
digitization, it is not a revolutionary change.
It is premature to suggest that America scrap the legal doctrines created
to deal with other information technologies.
Rather, legal issues of derivative works, rights of privacy, theory of
trademark dilution, and others are adequately
addressed by existing legal theories if applied correctly.
Most legal precepts can be adopted without much
difficulty to deal with the novel challenges posed by the Internet.
Media reports highlighting the vulnerability
of privacy and intellectual property on the Internet tend to be
sensationalistic rather that scholarly. For example,
adequate laws already exist to punish intellectual property
infringers and those who initiate damage while
using the Internet.
While legislatures should focus on real problems,
such as whether a server located in a jurisdiction constitutes a valid
nexus for jurisdictional purposes, or whether
access to the Internet is a taxable activity, they need not criminalize
what
is already criminal activity or make a special
tort for what is already tortious conduct. Legislatures may want to act
to
restrain frivolous suits as Congress has protected
Internet intermediaries such as Internet service providers with the
Telecommunication Act of 1996. [FN82] Technological
fixes have evolved to address issues as well, such as the
problem of one Internet site using the pages
of another site without permission. [FN83]
Suggestions that the American legal system will
be crushed by the worldwide infrastructure of the Internet are
alarmist. As in the past, America can enforce
legal obligations and a standard of conduct against natural persons
within the United States and against corporations
with physical assets located within its boundaries. This has always
been the cornerstone of legal jurisdiction.
[FNa1]. This paper is adopted from a lecture given
at the 1998 Pace Law Review Symposium, Untangling the Web:
The Legal Implications of the Internet at Pace
University School of Law on March 20, 1998. Please note that several
of the footnotes have subsequently been updated.
This paper does not attempt to present a complete analysis of why
the Internet should be treated in a special manner.
Rather, it is only concerned with justifying the position that current
law must be applied in a special manner to accommodate
a new communication medium. To do so, it attempts to
highlight pragmatic issues and identify existing
applications of law that impinge upon the Internet.
[FNaa1]. Jonathan D. Bick, Esq. has served as
an attorney with IBM for the last sixteen years focusing on commercial
and tax law including customer agreements, acquisitions,
divestitures, joint ventures, federal and state income tax,
non-income tax, and international taxation. Mr.
Bick is the author of the chapter Computer Software in Property
Taxation (2d ed.) published by the Institute
of Property Taxation, and the article Internet Access Services Not Subject
to New York Sales Tax, recently published in
the New York Law Journal. In addition to his duties at IBM, Mr. Bick is
an Adjunct Professor of Law at Pace University
School of Law where he has taught courses in computer law and
presently teaches a course in Internet Law. He
received an L.L.M. in taxation from the Georgetown Law Center, and
his J.D. from Seton Hall. He also holds an M.B.A.
from Cornell University.
[FN1]. Digitization of information means the encoding of information into a series of 1's and 0's.
[FN2]. To be specific, the task was simply the
creation of a "set of connections among university and research lab
computers." Henry H. Perritt, Law and the Information
Superhighway 13 (1996).
[FN3]. See Kluwer Law International, The Electronic
Superhighway 8-10 (Ejan Mackaay et al. eds., 1995) (stating
that in the mid-sixties, a United States Defense
Department organization asked university researchers to develop a
computer telecommunications network. The network
that they developed ultimately became the Internet). For more
details related to the historical development
of the Internet, see Douglas Dangerfield, Web Surfing, or The Internet
for
the Uniformed, 15 Am. Bankr. Inst. J., Mar. 1996,
at 12 and Ken D. Stuckey, Internet and Online Law, xv-xvi (1997).
[FN4]. See ACLU v. Reno, 929 F. Supp. 824, 881
(E.D. Pa. 1996), aff'd, 117 S. Ct. 2329 (1997) (Dalzell, J.,
concurring) (stating that "[i]t is no exaggeration
to conclude that the Internet has achieved, and continues to achieve,
the most participatory marketplace of mass speech
that this country-- and indeed the world--has yet seen."); see also
Org. For Econ. Co-operation and Dev., Dismantling
the Barriers to Global Electronic Commerce 3-4 (1997); Amy
Harmon, U.S. in Shift, Drops Its Effort to Manage
Internet Addresses, N.Y. Times, June 7, 1998, at A1.
[FN5]. The Internet (interconnected networks)
is a global grid of conversing computers. The terms "Internet,"
"information superhighway," and "World Wide Web"
(WWW or the Web) are generally used interchangeably
according to Howard E. Abrams and Richard L.
Doernberg, How Electronic Commerce Works, Tax Notes Int'l, May
12, 1997, at 1574.
[FN6]. See Lizette Alvarez, Internet is New Pet
Issue in Congress, N.Y. Times, June 28, 1998, s 1, at 4; Jeffrey Rose,
So What do the Internet and the World Wide Web
Mean to Me and How Can I Use Them in My Practice?, 39 Orange
County Lawyer 10 (Apr. 1998).
[FN7]. An Internet Service Provider (ISP) is usually a firm offering telephone access to the Internet.
[FN8]. The Clinton Administration published a
White House Paper shortly after the ACLU decision was rendered by
the Supreme Court. That report described the
Internet as a communication arrangement, which "empowers citizens
and democratizes societies." The Administration's
assessment of the Internet extolled the emergence of the Internet,
stating:
Once a tool reserved for scientific and academic
exchange, the Internet has emerged as an appliance of every day life,
accessible from almost every point on the planet.
Students across the world are discovering vast treasure troves of
data via the World Wide Web. Doctors are utilizing
tele-medicine to administer off-site diagnoses to patients in need.
Citizens of many nations are finding additional
outlets for personal and political expression. The Internet is being used
to reinvent government and reshape our lives
and our communities in the process.
[FN9]. See, e.g., Crimes of the 'Net', Newsweek,
Nov. 14, 1994, at 46; John W. Verity, The Internet, Bus. Wk., Nov.
14, 1994, at 80; Net Watch, Time, Sept. 5, 1994,
at 20.
[FN10]. See Amy Harmon, The Law Where There is
No Land, N.Y. Times, Mar. 16, 1998, at D1 (referring to the
Internet as the "Wild West of the information
age"); Jerry W. Thomas, Brave New World, 70 N.Y. St. B. J., Jan. 1998,
at 8-9 (stating that the "impact of the Internet
... [is] ... clouded by the confusion ... attendant to the birth of a new
technology ").
[FN11]. A recent LEXIS search on the term "Internet"
revealed 345 federal cases involving that term. The search
included two Supreme Court cases (Reno v. ACLU,
117 S. Ct. 2329 (1997); Denver Area Education
Telecommunications Consortium v. Federal Communications
Commission, 518 U.S. 727 (1996)), fifty-two United
States Court of Appeals cases, and nearly three
hundred district court cases.
[FN12]. See David G. Post, Anarchy, State and
the Internet: An Essay on Law- Making in Cyberspace (visited Apr.
30, 1998) <http:// www.wm.edu/law/publications/jol/post.html>.
[FN13]. The Security and Exchange Commission (SEC)
granted Real Goods Trading Corporation its approval to
trade stock on the Internet by issuing them a
no-action letter dated June 24, 1996, and Spring Street Brewery made an
initial public offering of its stock over the
Internet in 1996 with the SEC's concurrence. See Christina K. McGlosson,
Who Needs Wall Street? The Dilemma of Regulating
Securities Trading in Cyberspace, 5 CommLaw Conspectus 43
(1997) (providing more information regarding
the SEC's claim of jurisdiction over part of the Internet).
[FN14]. See Wayne L. Pines, New Challenges for
Medical Product Promotion and Its Regulation, 52 Food & Drug
L.J. 61 (1997).
[FN15]. Henry E. Crawford, Internet Calling: FCC
Jurisdiction Over Internet Telephony, 5 Commlaw Conspectus 43
(1997) (quoting America's Carriers Telecommunication
Association Petition, In re Provision of Interstate and
International Interexchange Telecommunication
Service (visited Mar. 4, 1996) <
http://www.FCC.gov/Bureaus/Common_Carrier/other/acta.pet.html>).
[FN16]. The author was personally involved in this transaction.
[FN17]. See Kluwer Law International, supra note 3, at 8-10.
[FN18]. Some obvious choices are the plaintiff's
domicile, the defendant's domicile, the Internet server's location, the
place the contract was performed, or a place
agreed upon by contract. Another option might be anywhere the
transmission is received.
[FN19]. Potential issues include: extent of liability
for spreading an Internet computer virus accidentally; determining
if attaching vital systems to the Internet or
the failure to back up computer systems connected to the Internet is
tantamount to contributory negligence; and what,
if any, disclaimers absolve Internet users from tort liability.
[FN20]. 928 F.2d 504 (2d Cir. 1991).
[FN21]. See id. at 506.
[FN22]. 890 F. Supp. 1375 (E.D. Mich. 1995).
[FN23]. 18 U.S.C. s 875(c) (1998).
[FN24]. See Baker, 890 F. Supp. at 1379.
[FN25]. See id.
[FN26]. See Kluwer Law International, supra note
3, at 10. On a more humorous and perhaps telling note, the July 5,
1993 edition of New Yorker magazine contained
a cartoon portraying a dog and a computer with the caption, "On the
Internet, nobody knows you're a dog." Id. at
57. This cartoon was cited as an indication that "[t]he Internet had risen
far enough into the popular consciousness to
be laughed at," and thus marked a high degree of public awareness. Id.
Similar conclusions concerning the New Yorker
magazine cartoon have been made by The Harvard Business Review,
Business Week, and the American Bar Association.
See Debora Spar and Jeffrey J. Bussgang, The Net, 74 Harv. Bus.
Rev. 125 (1996); Paul Eng and Julie Tilsner,
Up All Night With the Internet, Bus. Wk., Feb. 7, 1994, at 14; G. Burgess
Allison, Technology Update, 19 A.B.A. Law Practice
Mgmt. 8 (1993).
[FN27]. See Cliff Saran, US Software Group Forces
Windows 98 Reshuffle on Gates, Computer Wkly., Apr. 23, 1998,
at 4; David Lawsky, US: Judges Sharply Question
Government Lawyer on Microsoft, AAP Newsfeed, Apr. 22, 1998,
at 4-5; Ann Davis, Microsoft Judge Taps a Pioneer
of Internet Law, Wall St. J., Dec. 15, 1997, at B1.
[FN28]. See Saran, supra note 27, at 4.
[FN29]. See Edward Felsenthal, A Web of Intrigue:
The Internet's Bad Boy Has His Day in Court, Wall St. J., Mar. 11,
1998, at 1.
[FN30]. See David Stout, Suit Against Internet
Service by Clinton Aide is Dismissed, N.Y. Times, Apr. 23, 1998, at
A21. According to Stout, a Federal court dismissed
a libel suit against the Internet provider (America Online), but let
stand a libel suit against Matt Drudge, the Internet
content writer. See id.
[FN31]. 983 F. Supp. 215 (D.D.C. 1998).
[FN32]. See id. at 220 (citing Electronic Communication Privacy Act of 1986, 18 U.S.C. s 2701 et seq. (1998)).
[FN33]. See, e.g., Perritt, supra note 2, at 13; Stuckey, supra note 5, at xv-xvi.
[FN34]. See Fred Cate, Indecency, Ignorance, and
Intolerance: The First Amendment and the Regulation of
Electronic Expression (article 5)-Part II (visited
Apr. 30, 1998) <http://www.wm.edu/law/publications/jol/cate2.html>.
[FN35]. These "common carrier" characteristics
are not based on any single court finding. Rather, they are the
combination of findings of several prominent
cases that dealt with the definition of "common carrier."
[FN36]. Thus, satisfying the traditional "holding-out" test defined in Black's Law Dictionary 249 (5th ed. 1979).
[FN37]. See National Association of Regulatory
Utility Commissioners v. Federal Communications Commission, 525
F.2d 630 (D.C. Cir. 1976) (considering services
operated by a common carrier and made available to the public).
[FN38]. See, e.g., Howley v. Whipple, 48 N.H.
487 (1869) (finding that offers and acceptances by telegraph were as
effective as offers and acceptances made by pen
for the purpose of satisfying the Statute of Frauds).
[FN39]. See, e.g., Sable Communications of California,
Inc. v. Federal Communications Commission, 492 U.S. 115,
131 (1989) (holding that a legislative ban on
certain speech was not constitutional because "the statute's denial of
adult access to telephone messages which are
indecent but not obscene far exceeds that which is necessary to limit the
access of minors to such messages"). Note that
the disputed statute, section 223(b) of the Communications Act of
1934, Ch. 652, 48 Stat. 1064 (1834) (codified
as amended at 47 U.S.C. s 151 et seq. (amended 1988)) prohibited both
indecent and obscene commercial telephone messages.
See Sable, 492 U.S. at 123.
[FN40]. Much like the Internet today, the emergence
of radio and television broadcasting earlier this century brought
a new technology into the world of mass media,
and with it, new challenges of regulating within the boundaries of the
First Amendment. In the seminal case of Federal
Communications Commission v. Pacifica Foundation, 438 U.S. 726
(1978), the Court considered whether the Federal
Communications Commission had the power to regulate radio
broadcast that was indecent but was not obscene.
The Court deliberated over whether a radio broadcast of a George
Carlin record, which included a number of objectionable
words, violated a federal statute that prohibited the
broadcasting of certain material. See id. at
729-30. The Court established the extent to which the Federal government
may go to limit free speech broadcast on television
and radio. See id. at 778-80.
[FN41]. In cases dealing with cable television,
the Supreme Court reiterated its intent to apply First Amendment
protection standards based on the characteristics
of the communication medium. See, e.g., City of Los Angeles v.
Preferred Communications, Inc., 476 U.S. 488,
494-95 (1986) (endorsing different standards for different media);
Quincy Cable TV, Inc. v. Federal Communications
Commission, 768 F.2d 1434 (D.C. Cir. 1985) (indicating that the
communication medium should be assessed for First
Amendment purposes by appropriate standards).
[FN42]. See, e.g., Jan Fritchard, Keeping the Fax Private, 52 J. Mo. B. 279 (1996).
[FN43]. 776 F. Supp. 135 (S.D.N.Y. 1991) (concerning
the free flow of information and highlighting the need to have
knowledge of the defamation in order to implicate
an intermediary and find liability).
[FN44]. For example, what William M. Martin wrote
in 1940 concerning telegraph operators is applicable to Internet
service providers: "The difficulty and inconvenience
of requiring operators to analyze either the message or the
senders from either a factual or legal standpoint
is manifest. The indispensability of the telegraph, on the other hand,
is
as unchallenged as the realization that speed
is the essence of its worth." William M. Martin, Telegraphs and
Telephones, 2 Wash. & Lee L. Rev. 141, 147
(1940).
[FN45]. See I. Trotter Hardy, Copyright Owners'
Rights and Users' Privileges on the Internet, 22 U. Dayton L. Rev.
423 (1997) (pointing out examples of how predictions
of the future of a particular communication technology were
inaccurate, including the prediction that the
telephone was too delicate an instrument for general use, or that closed
circuit television would be a more commonly used
commodity).
[FN46]. This approach mimicked the finding in
the plurality opinion set forth in Denver Area Education
Telecommunications Consortium v. Federal Communications
Commission, 518 U.S. 727, 741-742 (1996) (stating that
no single analogy was so appropriate as to allow
the court to find a rigid standard that would be applicable to all
future media).
[FN47]. A similar finding was expressed in Kathy
Rebello, Inside Microsoft, Bus. Wk., July 15, 1996, at 56 (stating,
"Internet time: a pace so frenetic it's like
living dog years--each jammed with the events of seven normal ones").
[FN48]. See Stephan Wilske et al., International
Jurisdiction in Cyberspace, 50 Fed. Comm. L.J. 117 (1997); Jonathan
I. Edelstein, Anonymity and International Law
Enforcement in Cyberspace, 7 Fordham Intell. Prop. Media & Ent. L.J.
231 (1996).
[FN49]. Ch. 652, 48 Stat. 1064 (1934) (codified as amended at 45 U.S.C. s 151 et seq. (1998)).
[FN50]. Ch. 104, 24 Stat. 379 (codified as amended in scattered sections of 49 U.S.C.).
[FN51]. Ch. 169, 44 Stat. 1162 (1927).
[FN52]. See U.S. Const. amend. I.
[FN53]. Telephone and telegraph services were
declared to be common carriers by the Mann-Elkins Act, ch. 309, sec.
7, s1, 36 stat. 539, 544-45 (1910).
[FN54]. Caching is the temporary storage of network
data and information that is made in order to improve the
overall performance of the network. It is used
by many Internet applications to reduce the access time for subsequent
use of Internet files.
[FN55]. It should be noted that the Internet relies
upon copying information and data in other ways as well. The
Internet is composed of a network of computers.
In order for data to travel to its ultimate destination, it is generally
broken up into data "packets" and routed through
many computers. Each computer en route makes a copy as part of
the transmission process.
[FN56]. An argument can be made that caching is
not essential for the productive use of the Internet and that caching
is merely a temporary response to the existing
Internet network. See Hardy, supra note 45, at 429. However, existing
Internet technology relies on caching.
[FN57]. See id. at 452-53.
[FN58]. See MAI Systems Corp. v. Peak Computer,
Inc., 991 F.2d 511, 518 (9th Cir. 1993), cert. dismissed, 510 U.S.
1033 (1994); see also Triad Systems Corp. v.
Southeastern Express Co., 64 F.3d 1330, 1334 (9th Cir. 1995).
[FN59]. See 17 U.S.C. s 107 (1995).
[FN60]. The digital phenomena, sometimes referred
to as "convergence," is the confluence of all significant media
streams. It exists due to the maintenance of
a communication transport mechanism that reduces every major sort of
media (including text, image, audio, and video)
to a common communication channel.
[FN61]. Such as newspapers or other print technologies.
[FN62]. Such as standard telephone, radio, television, or analog technologies.
[FN63]. See Prosser et al., Cases and Materials
on Torts 1-16 (9th ed. 1994). Prosser also points out that separate
rules of liability developed around specific
types of action (such as different forms of trespass) because various torts
which are recognized today grew out of different
historical common law forms of action. See id.
[FN64]. See Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193, 195 (1890).
[FN65]. See Hardy, supra note 45, at 462.
[FN66]. See Amy Harmon, We, the People of the Internet, N.Y. Times, June 29, 1998, at B1.
[FN67]. See Post, supra note 12.
[FN68]. See Restatement (Second) of Judgments ss10, 81, 82 (1982).
[FN69]. The Internet is often referred to as being
a "revolutionary" change in communication or as a part of a
communications revolution. See Ilene Gotts, Communications
Law, Nat'l L.J., June 14, 1994, at B6.
[FN70]. See Y.B. Smith, Liability for a Telegraph
Company for Transmitting a Defamatory Message, 20 Colum. L.
Rev. 369 (1920); see also Perritt, supra note
2,at 18-21.
[FN71]. 113 F.3d 1247 (10th Cir. 1997). Mr. Thomas
owned and operated a bulletin board service which relied upon
a computer located in California, from which
users could download pornographic images. See id. In 1994, Mr. Thomas
was arrested and convicted by a jury in Tennessee
on several counts of distributing obscene material via his bulletin
board in violation of 18 U.S.C. s 1465. See id.
He was subsequently indicted in Utah for several counts relating to the
distribution of child pornography via his bulletin
board in violation of 18 U.S.C. ss 2252(a)(1) and (2). See id. Mr.
Thomas moved to dismiss the Utah indictment on
the grounds of double jeopardy arising out of his Tennessee
prosecution and sentencing. See id. After the
denial of his motions to dismiss, Mr. Thomas entered a guilty plea on one
of the counts and was sentenced to a prison term,
which ran concurrently with his Tennessee sentence. See Thomas,
113 F.3d at 1247.
[FN72]. 776 F. Supp. 135 (S.D.N.Y. 1991).
[FN73]. See id. at 138.
[FN74]. See id. at 140.
[FN75]. See id.
[FN76]. See Restatement (Second) of Torts s 12 (1995).
[FN77]. 839 F. Supp. 1552 (M.D. Fla. 1993).
[FN78]. See id. at 1556.
[FN79]. See id. at 1554.
[FN80]. See id.
[FN81]. See id. at 1560.
[FN82]. Pub. L. No. 104-104, 110 Stat. 56 (1996).
[FN83]. One example is the use of programming
techniques which force Internet site users to enter a site at a
designated domain name. See Bradley J. Hillis,
Thinking about Linking, (visited May 19, 1998) <http://
www.llrx.com/features/weblink2.htm>.
END OF DOCUMENT