[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Is ths legal?.. (fwd)




On Sun, 17 Dec 1995, Black Unicorn wrote:
> 
> I disagree.  Instead it implies that interception and administrative 
> review of content will be tolerated where it is "a necessary incident to 
> the rendition of his service or to the protection of the rights or 
> property of the provider of that service."  Note that it will be the 
> provider who makes the definition in the ex ante application.
> 
The provider is allowed access ONLY for QC purposes. Getting back to thhe 
original point, the provider's ability to interpret the contents of the 
message is in no way required to monitor the system and cannot be used as 
a justification in itself for prohibiting use of crypto. 

Also, what if someone outside the system emails encrypted messages to the 
user. What authority would the sys admin have there??

Jay Holovacs <[email protected]>
PGP Key fingerprint =  AC 29 C8 7A E4 2D 07 27  AE CA 99 4A F6 59 87 90 
 (KEY id 1024/80E4AA05) email for key