"Because It Is Wrong": an Essay on the Immorality and Illegality of The

Total Page:16

File Type:pdf, Size:1020Kb

JOURNAL OF LAW, TECHNOLOGY & THE INTERNET • VOL. 12 • NO. 1 • 2020 – 2021 “BECAUSE IT IS WRONG”: AN ESSAY ON THE IMMORALITY AND ILLEGALITY OF THE ONLINE SERVICE CONTRACTS OF GOOGLE AND FACEBOOK* Preston M. Torbert† This essay argues that the behavioral-advertising business model under which an internet platform, such as Google or Facebook, provides free services in exchange for the user’s personal data is immoral and illegal. It is immoral because it relies on addiction, surveillance, and manipulation of the user to deplete the user’s autonomy. The contract between the company and the user is immoral. It can also be plausibly argued that the contract is illegal under California law because it is contrary to good morals, is unconscionable, and is against public policy. As society becomes more aware of these moral and legal defects, courts in the future should be more willing to find these contracts illegal and thus void. In such case, the user’s consent to the contract would be nullified and the company would have no legal right to gather and monetize the personal data of the user. The companies should then be forced to convert to a subscription model with a fiduciary duty to users to restrict the gathering and monetizing of personal data. This essay employs perspectives not only from morality and law, but also from philosophy, history, political theory, and neuroscience. Part One covers morality, Part Two legality. * I am indebted to Harvard Law Professor Charles Fried and his son, Suffolk University Philosophy Professor Gregory Fried, for the phrase “Because it is Wrong.” See BECAUSE IT IS WRONG: TORTURE, PRIVACY AND PRESIDENTIAL POWER IN THE AGE OF TERROR (2010). I use the word “Essay” in the sense used by Michel de Montaigne—a trial or attempt, not something definitive. † Lecturer in Law, University of Chicago Law School, and Visiting Professor, Peking University School of Transnational Law. CONTENTS Part One: Morality .................................................................................................. 1 I. Introduction ................................................................................................. 1 II. Markets and Morals ................................................................................ 3 III. Advertising .............................................................................................. 6 A. Then and Now ..................................................................................... 6 B. The Advertising-based Business Model ............................................. 9 IV. The History of Google .......................................................................... 10 A. Before Advertising ............................................................................ 10 B. After Advertising .............................................................................. 12 V. The History of Facebook ...................................................................... 20 A. Before Advertising ............................................................................ 20 B. After Advertising .............................................................................. 26 1. Formation, 2004-2012: The Issue of Privacy ................................... 26 2. Consolidation, 2012-present: The Issue of Autonomy ..................... 30 a. Addiction ..................................................................................... 31 b. Surveillance ................................................................................. 34 c. Manipulation ............................................................................... 36 d. Loss of Autonomy ....................................................................... 38 C. The Behavioral-Advertising Business Model and Its Implications .. 41 1. The Economics of the Behavioral-Advertising Business Model ...... 41 2. The Morality of the Behavioral-Advertising Business Model .......... 42 3. Disregard for Moral Issues ................................................................ 43 4. Exploitation of Human Weakness..................................................... 48 5. Users as Lab Animals ....................................................................... 49 6. Unhappiness ...................................................................................... 50 7. Critical Silence .................................................................................. 51 8. Frictionless Sharing .......................................................................... 54 9. Data Exhaust ..................................................................................... 56 10. Threat to Democratic Practice ........................................................ 58 i Journal of Law, Technology & the Internet — Vol. 12 11. Threat to Rule of Law ..................................................................... 61 Part Two: Legality ................................................................................................ 63 I. Contract Law and the Behavioral-Advertising Business Model............... 63 A. Inalienable Rights ............................................................................. 63 B. Illegal Contracts: The Precedent of the Peonage Contract ............... 70 C. Types of Illegal Contracts ................................................................. 81 1. Contracts Contrary to Good Morals .................................................. 82 2. Unconscionable Contracts ................................................................ 90 3. Contracts Against Public Policy ....................................................... 96 D. Illegality .......................................................................................... 103 1. Factors Affecting A Decision on Illegality ..................................... 103 a. Federal Government Inaction .................................................... 103 b. Tradition of Judicial Activism................................................... 109 c. Procedural Issues ....................................................................... 111 d. Changing Mores ........................................................................ 115 e. Changes to the Business Model ................................................ 119 f. Threat to Personhood ................................................................ 123 g. Threats to Democratic Society and Theory ............................... 126 i. Democratic Society ................................................................ 126 ii. Democratic Theory ................................................................ 129 h. Paternalism ................................................................................ 131 i. Uncontrolled Experiment .......................................................... 133 j. Bad Beliefs and Bad Behavior .................................................. 136 2. Consequences of Illegality .............................................................. 142 a. Contract Unenforceable and Void ............................................. 142 b. Statutory Violation or Common Law Tort? .............................. 144 c. Alternative Business Model ...................................................... 149 d. Ownership of Data .................................................................... 153 e. Bankruptcy ................................................................................ 157 f. International Consequences....................................................... 158 ii Part Three: Conclusion ....................................................................................... 161 I. Morality................................................................................................... 161 II. Legality ............................................................................................... 167 iii “Because It Is Wrong”: Immorality and Illegality of Online Service Contracts PART ONE: MORALITY I. INTRODUCTION Many internet service companies have a business model that relies on advertising. A user enters into a contract with the company by accessing the appropriate web page and clicking on the consent button to confirm that the user agrees to the company’s Terms of Service. A contract between the user and the company is established.1 Under the contract, the user consents to the company’s collection, aggregation, and handling of the user’s personal data and the company sells the attention 2 of the user to advertisers, political parties, and others. Essentially, the user barters his or her personal information in exchange for free use of the service. Under this model, the users are not the company’s customers, the advertisers are.3 This has become the predominant business model for internet service companies. This business model has attracted criticism. Some say that the model will inevitably be misused; that it is harmful to the health of the public sphere and politics; that under it crucial decisions are made unilaterally, without recourse, and 1 The validity of the clickwrap license was first recognized in California in the case Hotmail Corp. v. Van$ Money Pie, Inc., No. C-98 JW PVT ENE, C 98-20064 JW 1998 WL388389 (N.D. Cal. 1998). For a discussion on clickwrap licenses see generally Nathan J. Davis, Presumed Assent: The Judicial Acceptance of Clickwrap, 22 BERKELEY TECH. L. J. 578, 579-81 (2007). See also, E. ALLAN FARNSWORTH, FARNSWORTH ON CONTRACTS § 4.26 (2004). More recently, courts have been moving away
Recommended publications
  • Transcript of Proceedings Held on 06/23/08, Before Judge Ware. Court
    The Facebook, Inc. v. Connectu, LLC et al Doc. 474 1 IN THE UNITED STATES DISTRICT COURT 2 FOR THE NORTHERN DISTRICT OF CALIFORNIA 3 SAN JOSE DIVISION 4 5 THE FACEBOOK, INC., ) C-07-01389-JW ) 6 PLAINTIFF, ) JUNE 23, 2008 ) UNSEALED AND REDACTED BY 7 V. ) SEALED ) THE COURT 8 CONNECTU, LLC, ET AL., ) PAGES 1-79 ) 9 DEFENDANTS. ) _______________________ ) 10 11 THE PROCEEDINGS WERE HELD BEFORE 12 THE HONORABLE UNITED STATES DISTRICT 13 JUDGE JAMES WARE 14 A P P E A R A N C E S: 15 FOR THE PLAINTIFF: ORRICK, HERRINGTON & SUTCLIFFE BY: I. NEEL CHATTERJEE 16 MONTE M.F. COOPER SUSAN D. RESLEY 17 1000 MARSH ROAD MENLO PARK, CALIFORNIA 94025 18 19 FOR THE DEFENDANTS: BOIES, SCHILLER & FLEXNER BY: DAVID A. BARRETT 20 EVAN ANDREW PARKE STEVEN C. HOLTZMAN 21 575 LEXINGTON AVENUE 7TH FLOOR 22 NEW YORK, NEW YORK 10022 23 (APPEARANCES CONTINUED ON THE NEXT PAGE.) 24 OFFICIAL COURT REPORTER: IRENE RODRIGUEZ, CSR, CRR 25 CERTIFICATE NUMBER 8074 1 U.S. COURT REPORTERS Dockets.Justia.com 1 A P P E A R A N C E S: (CONT'D) 2 3 FOR THE DEFENDANTS: FINNEGAN, HENDERSON, FARABOW, GARRETT & DUNNER 4 BY: SCOTT R. MOSKO JOHN F. HORNICK 5 STANFORD RESEARCH PARK 3300 HILLVIEW AVENUE 6 PALO ALTO, CALIFORNIA 94304 7 FENWICK & WEST BY: KALAMA LUI-KWAN 8 555 CALIFORNIA STREET 12TH FLOOR 9 SAN FRANCISCO, CALIFORNIA 94104 10 11 ALSO PRESENT: BLOOMBERG NEWS BY: JOEL ROSENBLATT 12 PIER 3 SUITE 101 13 SAN FRANCISCO, CALIFORNIA 94111 14 THE MERCURY NEWS 15 BY: CHRIS O'BRIEN SCOTT DUKE HARRIS 16 750 RIDDER PARK DRIVE SAN JOSE, CALIFORNIA 94190 17 18 THE RECORDER BY: ZUSHA ELINSON 19 10 UNITED NATIONS PLAZA SUITE 300 20 SAN FRANCISCO, CALIFORNIA 94102 21 CNET NEWS 22 BY: DECLAN MCCULLAGH 1935 CALVERT STREET, NW #1 23 WASHINGTON, DC 20009 24 25 2 U.S.
    [Show full text]
  • December 1992
    VOLUME 16, NUMBER 12 MASTERS OF THE FEATURES FREE UNIVERSE NICKO Avant-garde drummers Ed Blackwell, Rashied Ali, Andrew JEFF PORCARO: McBRAIN Cyrille, and Milford Graves have secured a place in music history A SPECIAL TRIBUTE Iron Maiden's Nicko McBrain may by stretching the accepted role of When so respected and admired be cited as an early influence by drums and rhythm. Yet amongst a player as Jeff Porcaro passes metal drummers all over, but that the chaos, there's always been away prematurely, the doesn't mean he isn't as vital a play- great discipline and thought. music—and our lives—are never er as ever. In this exclusive interview, Learn how these free the same. In this tribute, friends find out how Nicko's drumming masters and admirers share their fond gears move, and what's tore down the walls. memories of Jeff, and up with Maiden's power- • by Bill Milkowski 32 remind us of his deep ful new album and tour. 28 contributions to our • by Teri Saccone art. 22 • by Robyn Flans THE PERCUSSIVE ARTS SOCIETY For thirty years the Percussive Arts Society has fostered credibility, exposure, and the exchange of ideas for percus- sionists of every stripe. In this special report, learn where the PAS has been, where it is, and where it's going. • by Rick Mattingly 36 MD TRIVIA CONTEST Win a Sonor Force 1000 drumkit—plus other great Sonor prizes! 68 COVER PHOTO BY MICHAEL BLOOM Education 58 ROCK 'N' JAZZ CLINIC Back To The Dregs BY ROD MORGENSTEIN Equipment Departments 66 BASICS 42 PRODUCT The Teacher Fallacy News BY FRANK MAY CLOSE-UP 4 EDITOR'S New Sabian Products OVERVIEW BY RICK VAN HORN, 8 UPDATE 68 CONCEPTS ADAM BUDOFSKY, AND RICK MATTINGLY Tommy Campbell, Footwork: 6 READERS' Joel Maitoza of 24-7 Spyz, A Balancing Act 45 Yamaha Snare Drums Gary Husband, and the BY ANDREW BY RICK MATTINGLY PLATFORM Moody Blues' Gordon KOLLMORGEN Marshall, plus News 47 Cappella 12 ASK A PRO 90 TEACHERS' Celebrity Sticks BY ADAM BUDOFSKY 146 INDUSTRY FORUM AND WILLIAM F.
    [Show full text]
  • Uses of the Judeo-Christian Bible in the Anti-Abolitionist
    THIS FIERCE GEOMETRY: USES OF THE JUDEO-CHRISTIAN BIBLE IN THE ANTI-ABOLITIONIST AND ANTI-GAY RHETORIC OF THE UNITED STATES by Michael J. Mazza B. A., State University of New York at Buffalo, 1990 M. A., University of Pittsburgh, 1996 Submitted to the Graduate Faculty of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2009 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Michael J. Mazza It was defended on April 15, 2009 and approved by Nancy Glazener, University of Pittsburgh Moni McIntyre, Duquesne University William Scott, University of Pittsburgh Committee Chair: Jean Ferguson Carr, University of Pittsburgh ii THIS FIERCE GEOMETRY: USES OF THE JUDEO-CHRISTIAN BIBLE IN THE ANTI-ABOLITIONIST AND ANTI-GAY RHETORIC OF THE UNITED STATES Michael J. Mazza, PhD University of Pittsburgh, 2009 Copyright © by Michael J. Mazza 2009 iii Jean Ferguson Carr_______ THIS FIERCE GEOMETRY: USES OF THE JUDEO-CHRISTIAN BIBLE IN THE ANTI-ABOLITIONIST AND ANTI-GAY RHETORIC OF THE UNITED STATES Michael J. Mazza, Ph.D. University of Pittsburgh, 2009 This dissertation examines the citational use of the Judeo-Christian Bible in two sociopolitical debates within the United States: first, the debate over the abolition of slavery in the nineteenth century, and second, the contemporary debate over gay rights. This study incorporates two core theses. First, I argue that the contemporary religious right, in its anti-gay use of the Bible, is replicating the hermeneutical practices used by opponents of the abolitionist movement. My second thesis parallels the first: I argue that the contemporary activists who reclaim the Bible as a pro-gay instrument are standing in the same hermeneutical tradition as nineteenth-century Christian abolitionists.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • 1 Do We Still Want Privacy in the Information Age? Marvin Gordon
    Do we still want privacy in the information age? Marvin Gordon-Lickey PROLOGUE All those who can remember how we lived before 1970 can readily appreciate the many benefits we now enjoy that spring from the invention of digital computing. The computer and its offspring, the internet, have profoundly changed our lives. For the most part the changes have been for the better, and they have enhanced democracy. But we know from history that such large scale transformations in the way we live are bound to cause some collateral damage. And the computer revolution has been no exception. One particular casualty stands out starkly above the sea of benefits: we are in danger of losing our privacy. In the near future it will become technically possible for businesses, governments and other institutions to observe and record all the important details of our personal lives, our whereabouts, our buying habits, our income, our social and religious activities and our family life. It will be possible to track everyone, not just suspected criminals or terrorists. Even now, information about us is being detected, stored, sorted and analyzed by machine and on a vast scale at low cost. Information flows freely at light speed around the world. Spying is being automated. High tech scanners can see through our clothes, and we have to submit to an x-ray vision strip search every time we board an airplane. Although we have laws that are intended to protect us against invasion of privacy, the laws are antiquated and in most cases were written before the computer age.
    [Show full text]
  • From Notice-And-Takedown to Notice-And-Delist: Implementing Google Spain
    FINAL KUCZERAWY AND AUSLOOS 4.5.16 (DO NOT DELETE) 5/9/16 11:51 AM FROM NOTICE-AND-TAKEDOWN TO NOTICE-AND-DELIST: IMPLEMENTING GOOGLE SPAIN ALEKSANDRA KUCZERAWY AND JEF AUSLOOS* INTRODUCTION ...................................................................................... 220 A. Media Storm ........................................................................... 220 B. Internet Law Crossroads ........................................................ 221 I. HOW DID WE GET HERE? .............................................................. 223 A. Google Spain .......................................................................... 223 1. Facts of the Case ............................................................... 223 2. Scope ............................................................................... 224 3. Right to be Delisted .......................................................... 224 4. Balancing .......................................................................... 225 B. Implementation of Google Spain ............................................ 226 1. Online Form ...................................................................... 226 2. Advisory Council .............................................................. 227 3. Article 29 Working Party ................................................. 228 4. Emerging Body of Case Law ........................................... 228 II. HAVE WE MET BEFORE? ............................................................... 229 A. Dazed and Confused: Criticism of Google
    [Show full text]
  • June 2008 Vol
    June 2008 Vol. 39 No. 6 40p FOCUS MAGAZINE INFORMATION Chairman John Carter, Rewe. Tel. (01392) 841237 Vice Chairman Beryl Grace, Moss Bank, School Lane, Thorverton. Secretary Jane Lane, Stable House, 2 The Glebe, Thorverton. Tel. (01392) 861062 Treasurer Barbara Uglow, 14 Cleaves Close, Thorverton. Tel. (01392) 860614 Editor Neville Lane, Stable House, 2 The Glebe, Thorverton. Tel. (01392) 861062 Email: [email protected] Assistant editors Rob Purvis & Ward Crawford Printers Barrie Phillips & Peter Mason Focus deliveries John Carter, Rewe. Tel. (01392) 841237 Committee members Nominated by local organisations. At the present time Focus is produced each month except one (August) and is assembled by volunteers on the last working day of the month. The Editor welcomes interesting news items, reports etc. for publication. Items for inclusion in Focus should be accompanied by the name of the originator, which may be withheld from print if requested. Important note for contributors Items for publication, adverts, changes to adverts, Diary entries, changes to Thorverton Information lists should be sent to the Editor, preferably as plain text in an email, or as an OpenOffice odt file or a Word doc file or a pdf file email attachment (to [email protected]) normally by the 20th day of the month prior to publication. Computer file formats: We prefer plain text files, .ODT files, .DOC files, .RTF files and .WPS files because our production team have software that can read such files. BMP and JPEG files are preferred for advertisements and pictures. Photographs: colour photographs, without too much dark shadow, can be printed in black/white shades (enlarged or reduced) to a reasonably fair standard.
    [Show full text]
  • Social Network
    DEADLINE.com FROM THE BLACK WE HEAR-- MARK (V.O.) Did you know there are more people with genius IQ’s living in China than there are people of any kind living in the United States? ERICA (V.O.) That can’t possibly be true. MARK (V.O.) It is. ERICA (V.O.) What would account for that? MARK (V.O.) Well, first, an awful lot of people live in China. But here’s my question: FADE IN: INT. CAMPUS BAR - NIGHT MARK ZUCKERBERG is a sweet looking 19 year old whose lack of any physically intimidating attributes masks a very complicated and dangerous anger. He has trouble making eye contact and sometimes it’s hard to tell if he’s talking to you or to himself. ERICA, also 19, is Mark’s date. She has a girl-next-door face that makes her easy to fall for. At this point in the conversation she already knows that she’d rather not be there and her politeness is about to be tested. The scene is stark and simple. MARK How do you distinguish yourself in a population of people who all got 1600 on theirDEADLINE.com SAT’s? ERICA I didn’t know they take SAT’s in China. MARK They don’t. I wasn’t talking about China anymore, I was talking about me. ERICA You got 1600? MARK Yes. I could sing in an a Capella group, but I can’t sing. 2. ERICA Does that mean you actually got nothing wrong? MARK I can row crew or invent a 25 dollar PC.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • La Protección De La Intimidad Y Vida Privada En Internet La Integridad
    XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).
    [Show full text]
  • On Security and Privacy for Networked Information Society
    Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world.
    [Show full text]
  • March 21, 2021 Sermon
    Kerry Mansir March 21, 2021 Christ Church Gardiner Lent 5 In the parish news a couple of weeks ago, I shared the story of the Philadelphia 11 in honor of Women’s History Month. The Philadelphia 11 are the women who, in July of 1974, were ordained to the priesthood at Church of the Advocate in Philadelphia. This was remarkable because just a year before, at the General Convention of the Episcopal Church, women had been denied ordination to the priesthood. And nothing had changed regarding women’s ordination in that year. But these eleven women, and others like them, were tired of waiting. They had tried the legislative routes within the church, but they were weary of being put off so that the Church could continue to “study the matter.” Choosing to be ordained without the blessing of General Convention carried great risk in that the women could be deposed, in other words, permanently barred from the priesthood in the future, and possibly any role in the Church at all. Their ordination was an historic moment in the Church. Knowing the story of these women is important to understanding our church history. But as one of you pointed out to me, the press release from July 31, 1974 that I shared in the parish newsletter failed to name any but two of these women. The news release did name the three male retired or resigned Bishops who performed the ordination, the male Harvard professor who preached the sermon, and several of the male Bishops who opposed the ordinations, including the Presiding Bishop at that time.
    [Show full text]