Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 09 Issue 34
Computer underground Digest Sun May 4, 1997 Volume 9 : Issue 34
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Field Agent Extraordinaire: David Smith
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #9.34 (Sun, May 4, 1997)
File 1--Legal Bytes 5. - CyberLaw Info
File 2--Cu Digest Header Info (unchanged since 13 Dec, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Wed, 9 Apr 1997 10:07:58 -0500 (CDT)
From: pkennedy <pkennedy@IO.COM>
Subject: File 1--Legal Bytes 5. - CyberLaw Info
(MODERATORS' NOTE: We originally intended to distribute Legal
Bytes over several issues, but that would disrupt the articles'
continuity. Readers might also enjoy seeing what the full issue
looks like. It's worth subbing to--another great Net resource!!))
**********************************************
** LEGAL BYTES **
**********************************************
Spring 1997, Volume 5, Number 1
George, Donaldson & Ford, L.L.P.
Attorneys at Law
114 West 7th Street, Suite 1100
Austin, Texas 78701
(512) 495-1400
(512) 499-0094 (Fax)
gdf@gdf.com
http://www.gdf.com
----------
Copyright 1997, George, Donaldson & Ford, L.L.P.
(These articles may be re-distributed electronically,
without editing and with proper attribution)
----------
David H. Donaldson, Jr., Publisher, dhdonald@gdf.com
Peter D. Kennedy, Editor, pkennedy@gdf.com
----------
IN THIS ISSUE:
1. THE SUPREME COURT AND CYBERSPACE --
THE PENDING COMMUNICATIONS DECENCY ACT CHALLENGES.
2. OPEN GOVERNMENT AND ELECTRONIC COMMUNICATIONS:
IS E-MAIL A PUBLIC RECORD ... AND OTHER QUESTIONS.
3. NBA LOSES FIGHT TO CONTROL "REAL-TIME" SPORTS INFORMATION.
_________________________________________________________________
1. THE SUPREME COURT AND CYBERSPACE --
THE PENDING COMMUNICATIONS DECENCY ACT CHALLENGES
(This article was first published in Communications Lawyer,
Vol.14, No.3 (Fall 1996)).
This year's term will see the Supreme Court's maiden voyage
into cyberspace. On March 19, 1997, the Court heard oral argument
in a case dealing with Congress' own first stumbling steps to
regulate speech on the Internet. Fresh from its trip through the
wilds of regulating indecency on cable television, in the Denver
Area Consortium case, 116 S.Ct. 2374 (1996), the members of the
Court must now define constitutional boundaries in a decentralized,
anarchic, expanding and ever-changing communications technology
that no Founding Father could have envisioned. How will the
Justices fare?
The Communications Decency Act of 1996.
Spurred by torrid and exaggerated reports of pervasive on-line
pornography, Congress drafted, and then grafted onto the
Telecommunications Act of 1996, the "Communications Decency Act"
(CDA). A candidly content-based regulation of speech, the CDA
prohibits transmitting obscenity and child pornography via computer
communications -- something already illegal under federal and most
state laws. The CDA ventures further, however, by prohibiting the
transmission of "patently offensive" and "indecent" material over
computer networks. Modeled after the "dial-a-porn" laws, the CDA
sanctions violators with fines and up to two years in prison, but
provides several "safe harbor" affirmative defenses to prosecution,
discussed below.
No one -- not even its defenders -- claims the CDA was
elegantly or even consistently drafted. Its provisions regarding
obscene material have so far gone unchallenged; the disputes have
centered on its regulation of indecency. Two provisions are at
stake. The first is section 223(a), which prohibits using, or
knowingly permitting the use of, a telecommunications device to
knowingly make, create, or solicit any "comment, request,
suggestion, proposal, image or other communication which is obscene
or indecent, knowing that the recipient of the communication is
under 18 years of age." 47 U.S.C. s 223(a)(1)(B) & (2). The CDA
supplies no definition of "indecent." The second is section
223(d), which does not use the term "indecent," but prohibits
using, or knowingly permitting the use of,
an interactive computer service to display in a manner
available to a person under 18 years of age, any comment,
request, suggestion, proposal, image or other communication
that in context, depicts, or describes, in terms patently
offensive as measured by contemporary community standards,
sexual or excretory activities or organs.
47 U.S.C. s 223(d).
As anyone who has spent time online knows, Internet
communications do not easily lend themselves to confirmation of the
participants' ages. World Wide Web home pages and Usenet
newsgroups, for example, are generally available to anyone online;
they neither target communications to subscribers, nor admit to
easy methods of filtering out minors. On the other hand, unlike
broadcast communications, most Internet communications are not
pervasive. A user must take affirmative steps to receive or view
information (unlike simply turning a radio or television dial),
thus reducing the risk of inadvertent exposure to material that
might offend. And most significantly, unlike other mass media,
online publishing is not concentrated; it is radically
decentralized, where everyone on the Internet is both audience and
publisher -- to millions. Content-based regulations that impose
liability depending on whether material is made "in a manner
available" to seventeen-year-olds just do not sit well with the
Internet's structure, nor with most of its denizens.
The Legal Challenges.
The Internet culture -- libertarian by nature -- reacted to
the CDA's passage in predictable fashion. Usenet blistered with
attacks on Congress and the President, and thousands of World Wide
Web sites turned their backgrounds black and added blue ribbons in
protest. The American Civil Liberties Union, initially slow to
appreciate the Internet, teamed up with the on-line civil liberties
pioneer, the Electronic Frontier Foundation, and sued to enjoin the
CDA in Philadelphia federal court on February 8, 1996, the very day
President Clinton signed the bill into law. Eighteen other
plaintiffs joined the ACLU and EFF in the case, entitled ACLU v.
Reno. On February 15, District Judge Ronald L. Buckwalter issued
a temporary injunction restraining enforcement of the indecency
provision of the Act.[fn.1] Shortly thereafter, the American
Library Association and twenty-five others filed suit in the same
court, and their case was consolidated with ACLU v. Reno.[fn.2] On
the same date that ACLU v. Reno was filed, Joe Shea, the editor and
publisher of an electronic daily newspaper, filed a separate suit
in the Southern District of New York (Shea v. Reno).[fn.3]
Conservative groups such as Morality in Media lined up with the
Justice Department, and during the Spring of 1996 the Philadelphia
and New York federal courthouses rang with testimony about Web
surfing and crawling, Internet search engines and indexes,
cybersmut, anonymous remailers and blocking software with names
like "NetNanny" and "SurfWatch."
Under special provisions for expedited review included in the
Act, three-judge District Court panels were convened to hear the
ACLU and Shea cases. In Philadelphia, Judge Buckwalter, joined by
Third Circuit Chief Judge Dolores K. Sloviter and District Judge
Stewart Dalzell, heard evidence over a number of days on the ACLU's
request for a temporary injunction, and ruled on June 11. The
court's ruling consisted of joint findings of fact and three
separate opinions, each finding both challenged sections of the CDA
unconstitutional. All three judges concluded that the CDA
effectively prohibited constitutionally-protected speech among
adults, and was not narrowly tailored to justify the government's
interest in protecting minors from indecent speech. Judges
Buckwalter and Sloviter additionally concluded that the CDA's use
of "indecent" and "patently offensive" was inherently vague and
unconstitutional as well.
The New York District Court followed suit on July 29, in a
single opinion written by Second Circuit Judge Jose Cabranes,
joined by District Judges Leonard Sand and Denise Cote. [fn.4]
While the New York court did not conclude that the CDA was
unconstitutionally vague, it agreed that the law's restrictions on
indecent speech were overly broad, and were not saved by the
government's attempt to limit the CDA's reach or by its safe harbor
defenses. The Internet rang with celebration; the CDA's proponents
declared that the Supreme Court would have the final word, and
indeed it will.
The Key Questions Facing the Supreme Court.
The Supreme Court was almost certain to hear the government's
appeal, as section 561(a) of the CDA specifically provides for
expedited review "as a matter of right by direct appeal to the
Supreme Court." These are the key questions it will likely face.
1. Is the CDA Void for Vagueness?
Judge Buckwalter, with Judge Sloviter joining, concluded that
the CDA's definition of the speech at issue was too vague to
enforce, particularly with criminal sanctions. Judge Buckwalter
was skeptical of the government's claim that section 223(a)'s
"patently offensive" language meant the same thing as section
223(d)'s undefined use of "indecent," but even assuming they did,
he concluded that this still left the regulated speech too poorly
defined to be subject to criminal penalties under the Act. In FCC
v. Pacifica Foundation, 438 U.S. 726 (1978), the Supreme Court had
found the application of the FCC's indecency definition to George
Carlin's seven dirty words routine constitutional. Judge
Buckwalter distinguished Pacifica by noting that the Court had not
considered a facial challenge to the FCC's definition of indecency.
Is it likely that the Supreme Court will reject the similar
definition of proscripted material in section 223(d) of the CDA?
The New York District Court in Shea v. Reno ruled that the CDA
was not unconstitutionally vague. Unlike the judges in ACLU v.
Reno, Judge Cabranes had access to the Supreme Court's June 28
ruling in Denver Area Consortium, where the justices struggled with
the constitutionality of, among other things, the Cable Television
Consumer Protection and Competition Act's regulation of indecent
programming. While the Court did not produce a majority in that
case, Justice Breyer's plurality opinion (joined by Justices
Stevens, O'Connor and Souter) rejected an argument that the Cable
Act's regulation of "patently offensive" materials was
unconstitutionally vague. The other justices did not discuss
vagueness, and even the plurality decision does not foreclose the
issue, as the CDA carries criminal prohibitions -- which require
the greatest definitional precision -- while the Cable Act's
regulations only determined what material cable companies could
keep off their leased access channels.
2. What Level of Scrutiny Applies in Cyberspace?
Whether an enactment is subject to "strict," "intermediate" or
"rationality" review often predetermines its fate. Content-based
regulations of speech are ordinarily subject to close scrutiny by
the Court, but this has sometimes varied depending on the nature of
the medium. Could the nature of the Internet permit a lower
standard of review? The Justice Department at first appeared to
think so, initially asserting in ACLU v. Reno that an
intermediate-level scrutiny applied, similar to the standard used
to evaluate indecency regulation of broadcast media in FCC v.
Pacifica Foundation. Eventually, however, the government
apparently did not contest that a stricter scrutiny along the lines
of Sable Communications v. FCC, 492 U.S. 115 (1989), was
appropriate, requiring proof that the regulations are narrowly
tailored to advance a compelling governmental interest, and that
was the standard applied in ACLU v. Reno.7 In Shea v. Reno, the
court "easily" concluded that strict scrutiny under Sable
Communications applied to regulation of the Internet.8
It seems likely that some form of "strict" scrutiny will
apply, although the exact formulation of the standard may be
subject to debate. In Denver Area Consortium, a clear majority
applied a strict standard to the FCC's indecency regulations, but
did not settle on a particular formulation of that standard.
Justice Breyer's plurality concluded that the regulations
permitting cable operators to prohibit indecent material on public
access channels failed to "satisfy this Court's formulations of the
First Amendment's `strictest,' as well as its somewhat less
`strict,' requirements." Justice Kennedy, joined by Justice
Ginsburg, concluded that "at a minimum" the proper standard of
review was "strict scrutiny," and expressed fear about setting
adrift from recognized standards of review:
When confronted with a threat to free speech in the context of
an emerging technology, we ought to have the discipline to analyze
the case by reference to existing elaborations of constant First
Amendment principles. This is the essence of the case-by-case
approach to ensuring protection of speech under the First
Amendment, even in novel settings. The CDA rulings may provide the
Court the opportunity to define, or retreat from, the common
understanding that Pacifica and Turner Broadcasting System Inc. v.
FCC indicate that the standard of review in content-based
regulations depends upon the nature of the underlying technology.
What relevance will such a rule have, anyway, in ten or even five
years down the road, as meaningful distinctions between
"broadcast," "cable" and "the Internet" become harder and harder to
draw?
3. What Is the Compelling Government Interest?
Neither the challengers nor the three-judge panels questioned
that the government had a compelling interest in keeping
pornography away from minors; Judge Buckwalter did question,
however, whether there was a compelling governmental interest in
protecting minors from much of the material that falls within the
corners of the CDA's prohibitions - such as graphic AIDS prevention
education, news reports on genital mutilation or artistic but
graphic portrayals of sexual topics. The Shea court treated
essentially the same issue under its general "substantial
overbreadth" analysis, and agreed that a compelling interest could
be shown in restricting the distribution of at least some of the
material prohibited by the CDA.
4. Is the CDA Narrowly Tailored?
Much of the evidence before the three-judge panels concerned
the likely impact of the CDA on Internet communications. While the
Justice Department argued that the CDA did not effect a "ban" on
indecent communications between consenting adults, substantial
evidence supported the challengers' contention that significant
amounts of constitutionally-protected speech would evaporate from
the Internet on account of the CDA. Judge Sloviter concluded that
A wealth of persuasive evidence ... provided that it is either
technologically impossible or economically prohibitive for many of
the plaintiffs to comply with the CDA without seriously impeding
their posting of online material which adults have a constitutional
right to access. ... If it is not feasible for speakers who
communicate via these forms of communication to conduct age
screening, they would have to reduce the level of communication to
that which is appropriate for children in order to be protected
under the statute. The ACLU v. Reno court's factual findings about
the nature of on-line communications, and the potential effect on
those communications by the CDA, are particularly detailed.14
The Justice Department attempted to minimize the CDA's impact,
and defend its "narrow tailoring" on several grounds. The
government first argued, relying on Congressional reports, that the
CDA's scope was only meant to reach "commercial pornographers."
None of the judges accepted this argument, as the CDA's language
contains no such restrictions. Next, the government argued that
the CDA only applied to material that met the legal definition of
obscenity, which can be banned. The court declined the suggested
judicial narrowing of the CDA's based on its language: the Act
refers to both obscene and indecent material, and so the words
cannot logically be read to have the same meaning, and the Act's
"patently offensive" provision did not include two of the three
essential elements of obscenity the obscenity test -- appeal to
prurient interest and lack of serious artistic, literary, political
and scientific value.
Aside from these attempts at interpretive narrowing, the
government's chief position was that two statutory defenses found
in section 223(e) saved the CDA from constitutional infirmity.
Section 223(e)(5)(A) provides a defense for those who, "in good
faith," take "reasonable, effective, and appropriate actions under
the circumstances," including any steps "feasible under available
technology" to prevent minors' access to communications regulated
by the CDA. Section 223(e)(5)(B) provides a defense for those who
employ age-verification through use of a verified credit card,
debit account, adult access code, or adult identification number.
Neither the ACLU v. Reno nor the Shea v. Reno court found
these defenses compelling; both concluded that substantial amounts
of constitutionally-protected speech would remain subject to
prosecution, even when the defenses applied. Judge Dalzell noted
that while age-verification might be effective on the World Wide
Web, such verification simply is not available for many unique ways
of communicating on the Internet, such as Usenet newsgroups or
bulletin boards, IRC ("chat") discussion channels, mail exploders
and mailing lists. Judge Buckwalter emphasized the wide latitude
the CDA's language would give prosecutors, and that the potential
availability to some of affirmative defenses would not preclude
prosecution. Both courts likewise concluded that other possible
technological methods of screening information or recipients would
be too unreliable, costly, or burdensome.
Interestingly, both sides argued to some degree that the
Internet would develop technology that would solve the other side's
objections. The plaintiffs pointed out the burgeoning market in
screening software for the audience, such as "NetNanny" and
"SurfWatch." This software empowers parents to screen out Web
sites and newsgroups from their children's access, without
restricting their own (or others') access. While these software
blockers may be imperfect, because they are always trying to keep
up with new Internet sites with adult material, they do not
restrict the ability of adults to reach each other with indecent,
but constitutionally-protected, speech.
The government stressed the development of speaker screening
technology, including adult-registration procedures for Web sites,
segregation of material into restricted directories, and
yet-to-be-implemented "tagging" technology, which like the
controversial "V-Chip," would enable those publishing "indecent"
speech to implant codes in their communications. Sites and
communications with such codes could be made inaccessible to
minors.
Can Developing Technology Save an Otherwise Unconstitutional
Content-Based Law?
At this stage, anyway, the Internet's own decentralized,
anarchic structure has helped defeat the attempts to regulate it.
Government regulations of on-line speech are particularly intrusive
now, because the current methods of on-line communication do not
lend themselves to identifying and targeting particular audiences.
The state of current technology therefore helps protect freedom of
speech on the Internet. As John Gilmore's famous quote says, "the
Internet interprets censorship as damage and routes around it."
But will a technology-grounded attack on government regulation
invite a technology-based defense of those regulations? Soon after
the ACLU v. Reno decision, CDA proponent Bruce Taylor of the
National Law Center for Children and Families was confidently
predicting that new and better software would reduce the cost of
self-censorship to the point where the CDA (or its successor) would
survive constitutional scrutiny -- an argument the three-judge
panel's focus on technology may have invited.18 Is the Court
entering an arena where the technology might permit more
restrictions on speech?
The Supreme Court ought to be bound by the record before it --
a record that strongly supports the extensive impact on free debate
the CDA would have on the Internet. But does a legal analysis that
turns too finely on the nature of particular technology foretell a
forever-evolving challenge to laws restricting free speech? Could
a censorship law that is unconstitutional today become permissible
as technology provides ways to more finely target "indecent"
speech? Wouldn't this diminish the greatest benefit of the
Internet: the ability of everyone, not just the wealthy or
sophisticated, to reach a mass audience? Wouldn't it be ironic if
continued technical developments became the reason for regulating
the explosion of "robust, wide open debate" that the Internet's
technology has itself spawned?
As the Supreme Court surfs into cyberspace this Fall, it will
do well to keep Justice Souter's advice in Denver Consortium in
mind -- advice contained in a passage that easily could have been
written about the Internet:
I cannot guess how much time will go by until the technologies
of communication before us today have matured and their
relationships become known. But until a category of indecency
can be defined both with reference to the new technology and
with a prospect of durability, the job of the courts will be
just what Justice Breyer does today: recognizing established
First Amendment interests through a close analysis that
constrains the Congress, without wholly incapacitating it in
all matters of the significance apparent here, maintaining the
high value of open communication, measuring the costs of
regulation by exact attention to fact, and compiling a
pedigree of experience with the changing subject. These are
familiar judicial responsibilities in times when we know too
little to risk the finality of precision, and attention to
them will probably take us through the communications
revolution. Maybe the judicial obligation to shoulder these
responsibilities can itself be captured by a much older rule,
familiar to every doctor of medicine, "First, do no harm."
Footnote 1: American Civil Liberties Union v. Reno, No. 96-963, 24
Media Law Rep. 1379, 1996 Westlaw 65464 (E.D. Pa. February 15,
1996).
Footnote 2: American Library Association v. U.S. Department of
Justice, No. 96-1458 (E.D. Pa.).
Footnote 3: Shea v. Reno, No. 96 Civ. 0976 (S.D.N.Y.).
Footnote 4: Shea v. Reno, 930 F. Supp. 916 (S.D.N.Y. 1996).
_________________________________________________________________
2. OPEN GOVERNMENT AND ELECTRONIC COMMUNICATIONS:
IS E-MAIL A PUBLIC RECORD? ... AND OTHER QUESTIONS.
The federal government and every state has some form of open
records and open meetings law. These "government in the sunshine"
acts generally provide for three things: (1) they declare what
government records are open to public inspection and copying; (2)
they require public documents to be retained under a schedule; and
(3) they require government agencies to meet publicly, with prior
notice, rather than unannounced or behind closed doors.
Although we in the United States have had a long tradition of
open government, these sunshine statutes are relatively new, and
have been the subject of many hard legal fights. There is a
tension between the need to keep our public officials accountable
and the need to protect the privacy of some information in
government hands, particularly information about private citizens.
There is also the less legitimate desire of public officials to
work without the oversight and the inconvenience that come with
holding public meetings and disclosing records and information to
the public. These conflicting interests are still being worked out
in court decisions and in rulings by state attorneys general (who
are often charged with making the initial interpretation of a
state's open government laws).
Even as the contours of sunshine statutes continue to be
hammered out, changing technology has added a new twist: how to
deal with the advent of computerized records and electronic
communications. The widespread use of computers in government
offices raises new, interesting questions in all three core areas
of open government laws: public records, record retention and open
meetings. For instance:
Is Government Employee E-mail Really a Public Record?
Most open records laws define "public" documents very broadly.
Texas' provision, for example, is not atypical and declares
"information that is collected, assembled, or maintained under a
law or ordinance or in connection with the transaction of official
business" to be public information. Tex. Govt. Code s 552.002(a).
While the law provides for many exceptions, whether a document is
exempt from disclosure turns on its content, not its form; the
medium doesn't matter. Public information can be stored on paper,
or on "a magnetic, optical, or solid state device that can store an
electronic signal." Tex. Gov. Code s 552.002(b). Even if public
information is stored only in electronic form, it is still an open
record.
If electronic records can be public information, what keeps
e-mail between government employees from becoming "public
information"? Nothing, so long as the communication is the type
that would be subject to the open government laws if it was on
paper. Unlike the phone call that is not recorded, e-mail always
creates at least one electronic record on the mail server, often
more than one if there are intermediate servers, or the sender or
recipient keep copies. Although Texas has seen no official ruling
declaring government e-mail to be public, under its law the
conclusion seems inescapable that when a government employee's
e-mail relates to the "transaction of official business," it is
public information unless covered by one of the law's exemptions.
In Florida, this question was decided way back in 1989 --
ancient history, relatively speaking. A county commission was
computerizing its operation, and asked whether computer records and
e-mail between commissioners would be subject to the state's
government in the sunshine laws. The Florida Attorney General,
undoubtedly correctly, responded that computer-stored documents are
public and that electronic communications between public officials
would be subject to that state's open records laws. See 1980 Fla.
Op. Gen. 101, AGO 89-39.
While personal e-mail of government employees may not be
covered by the open records laws, e-mail reflecting official
business may well be, which is a good reason to be familiar with
your state's laws and to be careful what you "say" when dashing off
those quick electronic notes.
How Long Do We Have to Keep the Records?
Along with making public records available for inspection and
copying, government agencies also have to concern themselves with
maintaining public records. For instance, in Texas the Public
Information Act requires government agencies to determine a time
for keeping records, and to maintain document retention schedules.
Although it might take some work and space, maintaining paper files
is a fairly simple matter.
However, when it comes to electronically-stored documents, new
issues arise. The Texas act does not make exception for
electronically-stored records, so each agency responsible for
retaining and destroying public documents should consider reviewing
its treatment of stored computer data. Where are its records kept?
Are electronic documents stored for the requisite period of time?
Does the agency's document retention schedule deal with electronic
documents? Who makes sure (and who's going to answer for complying
with the law)? When requesting public information from an agency,
don't forget to ask for -- and insist upon -- a review of
electronic document storage as well as paper.
Why Can't the School Board Meet in a Chat Room?
Sunshine is a disinfectant -- for governments as well as
wounds. Another open government battleground are open meetings
acts: legal requirements that public business be transacted in
public meetings, with an agenda posted publicly some time prior to
the meeting. Typically, an open meetings statute prohibits a quorum
of a decision-making body from discussing policy outside a public
meeting and without prior notice of that meeting. Some officials
consider these requirements to be cumbersome, and the effect of a
violation can be drastic, resulting in the nullification of
business conducted, and even criminal penalties. As a result, open
meetings laws are strewn with clever attempts to conduct business
without complying with the laws..
All sorts of short-cuts have been tried to avoid a "meeting"
that might invoke the act's requirements: circulating memos;
round-robin discussions between individual government
representatives without a quorum ever being present at one time;
conference calls, and down the line. Generally, the courts and
attorneys general have spotted these tactics for what they are, and
held them to be violations of the open meetings laws.
As with government records, computers present a new issue and a new
temptation: does a government body "meet" under an open meetings
act when its members communicate by computer -- whether by e-mail
communications, postings on bulletin boards, or even through live
chat? Why should the members of a school board physically get
together when they can set up a chat room on America Online to
conduct business? Because it is probably illegal in most states.
Texas' Open Meetings Act would clearly prohibit a quorum of a
government body from discussing public business by computer,
because that discussion would not be "open to the public." In
fact, after the Texas Attorney General ruled that telephone
conference call meetings would violate the Open Meetings Act, it
required a special amendment to permit such meetings, and they
remain limited to emergencies. Florida's prescient Attorney
General in 1989 came to the same conclusion about computers,
declaring that electronic communications between commissioners
would be subject to that state's open meetings act, effectively
prohibiting a quorum from discussing official business on-line.
See 1980 Fla. Op. Gen. 101, AGO 89-39.
Even for computerphiles, this should not be thought of as a
bad thing. A public body "meeting" by computer raises the same
objections as "meeting" by conference call, and more: e-mail
leaves the public entirely out of the loop, and avoids the true
deliberation that our government bodies are supposed to be engaging
in. Even when a chat room is open, the public cannot easily attend
a "virtual meeting," and those without the technology or the
know-how of course are entirely left out. The deliberative process
and face-to-face contact is lost.
Computers are a terrific supplement to providing public access
to government information, and promise a similar advantage to
public participation in the democratic process. But they can't
supplant face-to-face deliberation, and most citizens still do not
have computers or on-line access. In the meantime -- and perhaps
forever -- all government agencies will have to concern themselves
both with paper and with electrons, and make sure that the
government does not become less open and responsive as it becomes
more efficient by using new technologies.
_________________________________________________________________
3. NBA LOSES FIGHT TO CONTROL "REAL-TIME" SPORTS INFORMATION.
Last issue, we reported on a startling legal ruling from the
federal court in New York City: the National Basketball
Association "owned" the "essence" of its professional basketball
games, and could prohibit the unauthorized publishing of
"real-time" basketball scores and statistics by others -- even
though that information cannot be copyrighted, and even though the
games were being broadcast live on television and radio. See It's
All in the Game: Who Owns "Real-Time" Sports Information?, Legal
Bytes Vol. 4, No. 2. The ruling startled many legal observers who
saw it as significantly expanding a narrow state law prohibition
against unfair competition. The NBA used the ruling to prohibit a
small company called STATS from contracting with Motorola to
provide real-time NBA game statistics through a pager system -- at
least without a paid license from the NBA.
The court's legal ruling raised some troubling questions: If
sports statistics cannot be copyrighted, as the NBA admitted, why
didn't the U.S. Copyright Act pre-empt and preclude a state-law
claim for "copying" of that information? How could the NBA control
the distribution of public information, which is almost universally
considered to be free to anyone who can put it to use? Why was the
considerable energy that STATS and Motorola put into compiling and
distributing the NBA statistics discounted? And what would be the
scope of this new intellectual property right, if it was indeed
there was a new right to own the "essence" of a live performance?
The Second Circuit Court of Appeals answered a number of these
questions on January 30, 1997, when it reversed the trial court
injunction. On appeal, the NBA lost, decisively. The Second
Circuit freed STATS to continue its pager service and to re-open
its "real-time" sports information site on America Online, and
wrote an opinion that is likely to set the pace in similar battles
over the ownership of valuable information.
First, the Court agreed with the trial judge that the NBA
games themselves could not be copyrighted under federal law. No
court has ever held otherwise, and the Second Circuit firmly held
that live, unrehearsed and participatory events like a basketball
game are not "works" that are "authored" under the Copyright Act.
The Court saw less legal significance in this conclusion than did
the trial judge, though. While Judge Preska had held that because
the games could not be copyrighted the Copyright Act did not
preclude New York law from stepping in to protect the
uncopyrightable "essence" of the game, the Court of Appeals
concluded that the Copyright Act still pre-empted state law
because, as applied to STATS, the interest that the New York
"unfair competition" law was protecting was the same as that
covered by the Copyright Act. Because the Copyright Act is
exclusive, state law protection is preempted: for those elements
of a sports contest - like statistics - that cannot be copyrighted,
there is no legal protection at all.
Or perhaps not quite none. The Second Circuit carefully left
room in New York law to prohibit the appropriation of "hot news."
Constrained to do so by the U.S. Supreme Court's 1918 ruling in
International News Service v. Associated Press, the Second Circuit
held that state law was not pre-empted under the Copyright Act, and
could be violated when (1) a person gathers or generates
information at a cost; (2) the information is time-sensitive; (3)
another person uses that information by "free riding" the first
person's efforts; (4) the second user is in direct competition with
the first; and (5) the ability of others to "free ride" on the
first person's efforts would "so reduce the incentive to produce
the product or service that its existence or quality would be
substantially threatened."
This limitation to New York's unfair competition law doomed
the NBA, but saved the Associated Press, which depends upon the old
INS v. AP decision to keep competitors from simply re-writing and
re-selling its news stories. The Court held that, unlike a
competing "hot news" service, STATS was not competing directly with
the NBA's live games, it was not providing a substitute for NBA
games live, and was not going to threaten the existence of the NBA
or reduce the NBA's incentive to continue to sponsor professional
basketball.
The Court's ruling now opens the field for competition in
providing "real-time" sports information, but leaves some lingering
questions. How far can a service go in reproducing the "facts" of
a live basketball game? Can the service show a court, and players
moving on the court, even simulating plays? Can the service use
"avatars" to represent the players? At some point, won't the
evolving technology allow for a product that in fact does compete
with the experience of watching a game? And would the STATS ruling
have been different if the sport at issue were baseball instead of
basketball, where statistics and strategy are a far bigger portion
of the enjoyment of the game?
=================================================================
ABOUT THIS NEWSLETTER
LEGAL BYTES is a service to the public. These articles are
summaries and brief discussions of current legal issues. They are
not exhaustive discussions of the topics, and by their nature
should not be relied upon as legal advice or used as a basis for
reaching a conclusion. If you have ideas or topics you would like
to see discussed in LEGAL BYTES, drop us a line.
All current and back issues of Legal Bytes are available at
George, Donaldson & Ford, LLP's home page at
http://www.gdf.com/lbytes.htm
For an electronic subscription to Legal Bytes:
Send an e-mail to legal-bytes-Request@io.com and include the
words "subscribe legal-bytes" in the _body_ of the message.
ABOUT GEORGE, DONALDSON & FORD, L.L.P.
George, Donaldson & Ford, L.L.P., is a Texas registered
limited liability partnership litigating and counseling clients in
a broad range of practice areas, including general business
litigation, intellectual property, trade secret, libel, invasion of
privacy, media and constitutional law.
Renea Hicks is Board Certified, Civil Appellate Law -- Texas
Board of Legal Specialization. All other attorneys in George,
Donaldson & Ford, L.L.P., are Not Certified by the Texas Board of
Legal Specialization.
------------------------------
Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 2--Cu Digest Header Info (unchanged since 13 Dec, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
Web-accessible from: http://www.etext.org/CuD/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #9.34
************************************