Protecting the Digital Consumer: the Limits of Cyberspace Utopianism

Total Page:16

File Type:pdf, Size:1020Kb

Protecting the Digital Consumer: the Limits of Cyberspace Utopianism Indiana Law Journal Volume 74 Issue 3 Article 5 Summer 1999 Protecting the Digital Consumer: The Limits of Cyberspace Utopianism John Rothchild University of Chicago Law School Follow this and additional works at: https://www.repository.law.indiana.edu/ilj Part of the Consumer Protection Law Commons, and the Internet Law Commons Recommended Citation Rothchild, John (1999) "Protecting the Digital Consumer: The Limits of Cyberspace Utopianism," Indiana Law Journal: Vol. 74 : Iss. 3 , Article 5. Available at: https://www.repository.law.indiana.edu/ilj/vol74/iss3/5 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Indiana Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Protecting the Digital Consumer: The Limits of Cyberspace Utopianism JoHN ROTHCHILD I. INTRODUCTION .............................................. 895 II. NAT=U OF ONLINE COMMERCIAL AcTIvITIEs ................... 899 A. World Wide Web ......................................... 900 B. Newsgroups ............................................. 901 C. ElectronicM ail .......................................... 902 D. Chat Sessions ........................................... 903 III. VARIETIEs OF ONLINE DECEPTIVE MARKETING PRACTICES ........ 903 A. FraudulentOnline Conduct ................................ 904 B. Misleading Online Conduct ................................ 910 IV. SPECIAL CHARACTERISTICS OF THE ONLINE MEDIUM ............. 911 A. Increased Volume of Cross-BorderTransactions ............. 912 1. Extraterritorial Assertion of Jurisdiction ................... 912 a. Jurisdiction to Prescribe .............................. 913 b. Jurisdiction to Adjudicate ............................ 914 c. Location and Foreseeability in the Online Context ........ 916 d. Summary: Jurisdiction over Online Conduct ............. 916 2. Establishment of Jurisdiction ............................ 917 3. Choice of Law ......................................... 918 4. Enforcement of Judgments .............................. 919 5. Evasion of Law Enforcement Through Cross-Border Targeting ............................................. 921 6. Difficulty in Obtaining Pre-Judgment Freezes of Assets Located Outside the Forum Country ...................... 922 7. International Comity ................................... 923 8. Restrictions on International Information-Sharing Among Law Enforcement Agencies ............................. 923 9. Impediments to Efforts by Consumers to Protect Themselves . 925 B. Ease of Evading Detection: Portabilityof Fraudulent Operations, and Disguisingof Identity ...................... 926 C. New Entrepreneurs ....................................... 929 D. GeographicIndeterminacy ................................ 930 1. Limitations Imposed by Technology ...................... 930 2. Implications for Online Sellers ........................... 933 3. Home-Country Control ................................. 937 4. Opting Out ........................................... 939 * Victor Kramer Fellow, University of Chicago Law School. AB., Princeton University, 1979; JD., University of Pennsylvania Law School, 1986. In 1997-98, 1 chaired a project ofthe Organisation for Economic Co-operation and Development ("OECD') that developed guidelines for consumer protection in electronic commerce. This Article builds on the work done in that project and Iwish to acknowledge the helpful comments I received from the project participants. The view expressed in this Article are my own, and not necessarily those of the OECD or any of the project participants. INDIANA LAW JOURNAL [Vol. 74:893 E. UnclearRegulatory Environment ........................... 940 F. Summary: Barriersto the Development of Electronic Commerce Raised.by the Special Characteristicsof Online Communications ......................................... 942 V. ROLE OF GoVERNMENT IN CONTROLLING DECEPTIVE MARKETING PRACTICES IN ELECTRONIC COMMERCE ......................... 942 A. Market Forces and Government Regulation .................. 943 B. The Need for Government Intervention to Control Deceptive Conduct in Electronic Commerce ........................... 952 C. Four Dogmas of Cyberspace Utopianism: The Argument Against GovernmentRegulation of Electronic Commerce ...... 953 1. "Cyberspace Is a Self-Contained Jurisdiction, over Which Territorially Based Sovereigns Have No Legitimate Authority.".......................... 953 2. "Attempts by Territorially Based Sovereigns to Exert Control over Online Transactions Will Inevitably Prove Futile." ..... 954 3. "If One Government May Apply Its Laws Extraterritorially, So May All Others, Resulting in a Clash of Jurisdictions and a Requirement to Comply with All Nations' Laws Simultaneously.". ..................................... 955 4. "Online Conduct Can Be Effectively Regulated by Those Who Engage in It."..... ................................ 955 D. The Dogmas Dissected: Cyberspace UtopianismHas No Clothes .............................................. 955 1. The Special Characteristics of Online Communications Do Not Undermine the Legitimacy of Territorially Based Jurisdiction ........................................... 956 a. Online Communications, Though Universally Accessible, Have Locally Differentiated Impact .................... 957 b. Cost and Speed Advantages of Online Communications Create Only Practical Issues .......................... 957 c. Virtual Addressing Does Not Undermine Territorial Sovereignty ........................................ 958 d. Physical Location of Online Interlocutors Is Not Unknowable ....................................... 958 e. The Relevant Factor Is the Location of the Communicators, Not the Location of the Communication ................ 960 2. The Argument from Futility Refutes Only One, Particularly Poor, Enforcement Approach ............................ 960 3. The Problem of Overlapping Jurisdiction Can Be Addressed Through Approaches Less Drastic Than Abdication ......... 961 4. Deceptive Marketing Practices Are Not Likely To Be Adequately Controlled by Market Forces Alone ............ 962 5. Summ ary ............................................. 968 VI. LEriNG ONLINE COMMERCE GROW ............................ 968 A. Improving the Transparencyof the Legal Framework, and Adapting It to the Online Environment ...................... 969 1. General Rule of Parity .................................. 969 1999]. PROTECTING THE DIGITAL CONSUMER 2. Reasoning from Analogy with Other Means of Communication ..................................... 970 3. Clarification and Updating of Regulatory Regimes .......... 971 4. Educating Online Entrepreneurs ......................... 971 5. Negotiating an International Baseline Consumer Protection Regime ..................................... 972 6. Protecting Online Privacy ............................... 972 B. Enhancing the Effectiveness of Market-BasedSolutions to the Problem of Online Deceptive Marketing Practices ....... 973 1. Facilitating Consumer Sovereignty ....................... 973 2. Industry Self-Regulation ................................ 974 3. Adapting Existing Alternative Dispute Resolution Mechanisms .......................................... 976 4, Developing New Alternative Dispute Resolution Mechanisms .......................................... 976 C. Restraint in ExtraterritorialAssertions of Jurisdiction ........ 978 1. Limiting What Is Deemed to Constitute Foreseeable Extraterritorial Effects .................................. 978 2. Focus on Location of People, Not of Computers ............ 981 D. InternationalCooperation Among Law Enforcement Authorities .............................................. 983 1. Mechanisms to Improve International Cooperation .......... 983 2. Positive Comity ....................................... 985 3. Recognition of Foreign Judgments ........................ 986 4. Removing Obstacles to Cross-Border Investigations ........ 986 VII. CoNcLusIoN ............................................. 988 I. INTRODUCTION Business-to-consumer commerce conducted via online means of communication,' though at present relatively modest in volume, is expected to grow exponentially over the next few years. According to one report, consumer purchases made over the Internet will rise from $289 million in 1996 to $26 billion in 2001.2 With an 1. For purposes ofthis Article, "online communications" refers to communications by means of data interchange across computer networks. This includes communications occurring via open networks, such as the Internet, as well as proprietary online services, such as America Online, CompuServe, Microsoft Network, and Prodigy. "Online commerce" and "electronic commerce" refer to commercial transactions in which online communications play a significant role. 2. See BmLBuRNHAM TiE ELECTRONIC COMMERCE REPoRT 238 (1997). These figures are for purchases by U.S. households that are paid for via the Internet See id. Other estimates of the annual volume ofIntemet retailing within the next few years range from $7 billion to $115 billion. See DEPARTmENr OF COMMERCE, THE EMERGING DIGrAL ECONOMY 38 (1998). A much larger volume of electronic commerce-$202 billion in the year 2001-ilU consist of business-to- business transactions. See BURNHAM, supra,at 239. Some of the business entities involved in these transactions, in view of their small size and limited
Recommended publications
  • Memetic Proliferation and Fan Participation in the Simpsons
    THE UNIVERSITY OF HULL Craptacular Science and the Worst Audience Ever: Memetic Proliferation and Fan Participation in The Simpsons being a Thesis submitted for the Degree of PhD Film Studies in the University of Hull by Jemma Diane Gilboy, BFA, BA (Hons) (University of Regina), MScRes (University of Edinburgh) April 2016 Craptacular Science and the Worst Audience Ever: Memetic Proliferation and Fan Participation in The Simpsons by Jemma D. Gilboy University of Hull 201108684 Abstract (Thesis Summary) The objective of this thesis is to establish meme theory as an analytical paradigm within the fields of screen and fan studies. Meme theory is an emerging framework founded upon the broad concept of a “meme”, a unit of culture that, if successful, proliferates among a given group of people. Created as a cultural analogue to genetics, memetics has developed into a cultural theory and, as the concept of memes is increasingly applied to online behaviours and activities, its relevance to the area of media studies materialises. The landscapes of media production and spectatorship are in constant fluctuation in response to rapid technological progress. The internet provides global citizens with unprecedented access to media texts (and their producers), information, and other individuals and collectives who share similar knowledge and interests. The unprecedented speed with (and extent to) which information and media content spread among individuals and communities warrants the consideration of a modern analytical paradigm that can accommodate and keep up with developments. Meme theory fills this gap as it is compatible with existing frameworks and offers researchers a new perspective on the factors driving the popularity and spread (or lack of popular engagement with) a given media text and its audience.
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • A Proposed Technique for Tracing Origin of Spam on the Usenet
    A proposed technique for tracing origin of spam on the Usenet by Dirk Bertels, BComp A dissertation submitted to the School of Computing in partial fulfillment of the requirements for the degree of Bachelor of Computing with Honours University of Tasmania June 2006 This thesis contains no material which has been accepted for the award of any other degree or diploma in any tertiary institution. To the candidate’s knowledge and belief, the thesis contains no material previously published or written by another person except where due reference is made in the text of the thesis. Signed Dirk Bertels Hobart, June 2006 Abstract The Usenet, a worldwide distributed decentralized conferencing system, is widely targeted by spammers who use a variety of techniques in order to obscure their identity. One of these techniques is called path preload, in which the path header is spoofed by means of attaching a false section at the beginning of this path. The process of detecting and confirming path preload is laborious and requires a thorough understanding of the Usenet. A technique which downloads a particular article from several servers, and compares their path headers is explored as to its usefulness regarding path preload detection. This document begins with a general background on the Usenet, highlighting those aspects that are relevant to the research, especially the topics of Usenet headers and spam. This leads to a description of the proposed technique and the development of a tool capable of implementing this technique. The tool essentially downloads a spam article from different servers, and analyses their headers.
    [Show full text]
  • Newsreaders.Com: Getting Started: Netiquette
    Usenet Netiquette NewsReaders.com: Getting Started: Netiquette I hope you will try Giganews or UsenetServer for your news subscription -- especially as a holiday present for your friends, family, or yourself! Getting Started (Netiquette) Consult various Netiquette links The Seven Don'ts of Usenet Google Groups Posting Style Guide Introduction to Usenet and Netiquette from NewsWatcher manual Quoting Style by Richard Kettlewell Other languages: o Voila! Francois. o Usenet News German o Netiquette auf Deutsch! Some notes from me: Read a newsgroup for a while before posting o By reading the group without posting (known as "lurking") for a while, or by reading the group archives on Google, you get a sense of the scope and tone of the group. Consult the FAQ before posting. o See Newsgroups page to find the FAQ for a particular group o FAQ stands for Frequently Asked Questions o a FAQ has not only the questions, but the answers! o Thus by reading the FAQ you don't post questions that have been asked (and answered) ad infinitum See the configuring software section regarding test posts (only post tests to groups with name ending in ".test") and not posting a duplicate post in the mistaken belief that your initial post did not go through. Don't do "drive through" posts. o Frequently someone who has an urgent question will post to a group he/she does not usually read, and then add something like "Please reply to me directly since I don't normally read this group." o Newsgroups are meant to be a shared experience.
    [Show full text]
  • Crypto Anarchy, Cyberstates, and Pirate Utopias Edited by Peter Ludlow
    Ludlow cover 7/7/01 2:08 PM Page 1 Crypto Anarchy, Cyberstates, and Pirate Utopias Crypto Anarchy, Crypto Anarchy, Cyberstates, and Pirate Utopias edited by Peter Ludlow In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflect the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow views virtual communities as laboratories for conducting experiments in the Peter Ludlow construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of the online world, new and superior governance structures may emerge. Indeed, utopian visions are not out of place, provided that we understand the new utopias to edited by be fleeting localized “islands in the Net” and not permanent institutions. The book is organized in five sections. The first section considers the sovereignty of the Internet. The second section asks how widespread access to resources such as Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto Anarchy”—essentially carving out space for activities that lie outside the purview of nation-states and other traditional powers. The Crypto Anarchy, Cyberstates, third section shows how the growth of e-commerce is raising questions of legal jurisdiction and taxation for which the geographic boundaries of nation- states are obsolete. The fourth section looks at specific experimental governance and Pirate Utopias structures evolved by online communities.
    [Show full text]
  • The Good Samaritan Exemption and the Cda
    THE GOOD SAMARITAN EXEMPTION AND THE CDA Excerpted from Chapter 37 (Defamation and Torts) of E-Commerce and Internet Law: A Legal Treatise With Forms, Second Edition, a 4-volume legal treatise by Ian C. Ballon (Thomson/West Publishing 2015) SANTA CLARA UNIVERSITY LAW PRESENTS “HOT TOPICS IN INTERNET, CLOUD, AND PRIVACY LAW” SANTA CLARA UNIVERSITY LAW SCHOOL APRIL 23, 2015 Ian C. Ballon Greenberg Traurig, LLP Silicon Valley: Los Angeles: 1900 University Avenue, 5th Fl. 1840 Century Park East, Ste. 1900 East Palo Alto, CA 914303 Los Angeles, CA 90067 Direct Dial: (650) 289-7881 Direct Dial: (310) 586-6575 Direct Fax: (650) 462-7881 Direct Fax: (310) 586-0575 [email protected] <www.ianballon.net> Google+, LinkedIn, Twitter, Facebook: IanBallon This paper has been excerpted from E-Commerce and Internet Law: Treatise with Forms 2d Edition (Thomson West 2015 Annual Update), a 4-volume legal treatise by Ian C. Ballon, published by West LegalWorks Publishing, 395 Hudson Street, New York, NY 10014, (212) 337-8443, www.ianballon.net. Ian C. Ballon Silicon Valley 1900 University Avenue Shareholder 5th Floor Internet, Intellectual Property & Technology Litigation East Palo Alto, CA 94303 T 650.289.7881 Admitted: California, District of Columbia and Maryland F 650.462.7881 JD, LLM, CIPP Los Angeles 1840 Century Park East [email protected] Los Angeles, CA 90067 Google+, LinkedIn, Twitter, Facebook: Ian Ballon T 310.586.6575 F 310.586.0575 Ian Ballon represents Internet, technology, and entertainment companies in copyright, intellectual property and Internet litigation, including the defense of privacy and behavioral advertising class action suits.
    [Show full text]
  • Handling Information Overload on Usenet
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Department of Informatics Handling Information Overload on Usenet Advanced Caching Methods for News Jan Ingvoldstad Cand Scient Thesis 4th August 2001 Abstract Usenet is the name of a world wide network of servers for group communica- tion between people. From 1979 and onwards, it has seen a near exponential growth in the amount of data transported, which has been a strain on band- width and storage. There has been a wide range of academic research with focus on the WWW, but Usenet has been neglected. Instead, Usenet’s evolu- tion has been dominated by practical solutions. This thesis describes the history of Usenet in a growth perspective, and introduces methods for collection and analysis of statistical data for testing the usefulness of various caching strategies. A set of different caching strategies are proposed and examined in light of bandwidth and storage demands as well as user perceived performance. I have shown that advanced caching methods for news offers relief for reading servers’ storage and bandwidth capacity by exploiting usage patterns for fetching or prefetching articles the users may want to read, but it will not solve the problem of near exponential growth nor the problems of Usenet’s backbone peers. Preface When I first started my studies at the University in Oslo in the autumn of 1991, I thought I was going to be a mathematician, and followed my first class in university level mathematics with vigor.
    [Show full text]
  • The Good Samaritan Exemption — Section 230 of the Cda
    THE GOOD SAMARITAN EXEMPTION — SECTION 230 OF THE CDA Excerpted from Chapter 37 (Defamation, Torts and the Good Samaritan Exemption (47 U.S.C.A. § 230)) from the April 2020 updates to E-Commerce and Internet Law: Legal Treatise with Forms 2d Edition A 5-volume legal treatise by Ian C. Ballon (Thomson/West Publishing, www.IanBallon.net) Ian C. Ballon Greenberg Traurig, LLP Silicon Valley: Los Angeles: 1900 University Avenue, 5th Fl. 1840 Century Park East, Ste. 1900 East Palo Alto, CA 914303 Los Angeles, CA 90067 Direct Dial: (650) 289-7881 Direct Dial: (310) 586-6575 Direct Fax: (650) 462-7881 Direct Fax: (310) 586-0575 [email protected] <www.ianballon.net> LinkedIn, Twitter, Facebook: IanBallon This paper has been excerpted from E-Commerce and Internet Law: Treatise with Forms 2d Edition (Thomson West April 2020 Annual Update), a 5-volume legal treatise by Ian C. Ballon, published by West, (888) 728-7677 www.ianballon.net Ian C. Ballon Silicon Valley 1900 University Avenue Shareholder 5th Floor Internet, Intellectual Property & Technology Litigation East Palo Alto, CA 94303 T 650.289.7881 Admitted: California, District of Columbia and Maryland F 650.462.7881 Second, Third, Fourth, Fifth, Seventh, Ninth, Eleventh and Federal Circuits Los Angeles U.S. Supreme Court 1840 Century Park East JD, LLM, CIPP/US Suite 1900 Los Angeles, CA 90067 [email protected] T 310.586.6575 LinkedIn, Twitter, Facebook: IanBallon F 310.586.0575 Ian C. Ballon is Co-Chair of Greenberg Traurig LLP’s Global Intellectual Property & Technology Practice Group and represents companies in intellectual property litigation (including copyright, trademark, trade secret, patent, right of publicity, DMCA, domain name, platform defense, fair use, CDA and database/screen scraping) and in the defense of data privacy, cybersecurity breach and TCPA class action suits.
    [Show full text]
  • No Regulation, Government Regulation, Or Self-Regulation
    Cornell Journal of Law and Public Policy Volume 6 Article 1 Issue 3 Spring 1997 No Regulation, Government Regulation, or Self- Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace Llewellyn Joseph Gibbons Follow this and additional works at: http://scholarship.law.cornell.edu/cjlpp Part of the Law Commons Recommended Citation Gibbons, Llewellyn Joseph (1997) "No Regulation, Government Regulation, or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace," Cornell Journal of Law and Public Policy: Vol. 6: Iss. 3, Article 1. Available at: http://scholarship.law.cornell.edu/cjlpp/vol6/iss3/1 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Journal of Law and Public Policy by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. NO REGULATION, GOVERNMENT REGULATION, OR SELF-REGULATION: SOCIAL ENFORCEMENT OR SOCIAL CONTRACTING FOR GOVERNANCE IN CYBERSPACE Llewellyn Joseph Gibbonst I DIDN'T READ AL.LOF THE APPARENTLY I AGREED TO AE.6 rMur SHRiNK-WRAP LICENSE E. 10 SPEND THE REST OF HE OPENE DANGEROUS AGREEMENT ON M,\YNEW II MY LIFE AS A "TOWEL I SOFTWARE FOP, LAWYERS SOFTWARE. UNTL AFTER BOY IN BILL GATES' STERDAY. TO IRON PANMt I OPENED 1T. NEW MANSION. I NOLO HE'S THEY'DALC'AS KLAUNRrCALL7OUR) "IWSAE ONE ) -- LAWdYER. ) N~ HAN) INk BOY. POCKET. Reprinted with permission. I. INTRODUCTION "Cyberians"' are present at the creation of the jurisdiction of cyber- space and at the closing of the electronic frontier.2 The concept of the f Assistant Professor, University of Orlando School of Law.
    [Show full text]
  • Enforcement of Use Limitations by Internet Services Providers: How to Stop That Hacker, Cracker, Spammer, Spoofer, Flamer, Bomber Keith J
    Hastings Communications and Entertainment Law Journal Volume 19 | Number 3 Article 4 1-1-1997 Enforcement of Use Limitations by Internet Services Providers: How to Stop That Hacker, Cracker, Spammer, Spoofer, Flamer, Bomber Keith J. Epstein Bill Tancer Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Keith J. Epstein and Bill Tancer, Enforcement of Use Limitations by Internet Services Providers: How to Stop That Hacker, Cracker, Spammer, Spoofer, Flamer, Bomber, 19 Hastings Comm. & Ent. L.J. 661 (1997). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol19/iss3/4 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Enforcement of Use Limitations by Internet Services Providers: "How to Stop that Hacker, Cracker, Spammer, Spoofer, Flamer, Bomber'". by KEITH J. EPSTEIN* & BILL TANCER* Table of Contents I. Historical Perspective on Acceptable Use ............................ 666 II. What is Unacceptable Use? ............................. ....................... 667 III. ISPs' Liability for Subscribers' Abuse of the Internet ....... 671 A
    [Show full text]