[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Is ths legal?.. (fwd)
On Sun, 17 Dec 1995, Jay Holovacs wrote:
>
> On Sun, 17 Dec 1995, Black Unicorn wrote:
> >
> > I disagree. Instead it implies that interception and administrative
> > review of content will be tolerated where it is "a necessary incident to
> > the rendition of his service or to the protection of the rights or
> > property of the provider of that service." Note that it will be the
> > provider who makes the definition in the ex ante application.
> >
> The provider is allowed access ONLY for QC purposes.
This is only explicit with regards to public providers.
Getting back to thhe
> original point, the provider's ability to interpret the contents of the
> message is in no way required to monitor the system and cannot be used as
> a justification in itself for prohibiting use of crypto.
Oh? What if I say that I need to monitor e-mail for data corruption?
Also, you might consider the definition of "intercept." I suspect it's a
bit wider than you are accounting for.
> Also, what if someone outside the system emails encrypted messages to the
> user. What authority would the sys admin have there??
Entirely unrelated to the statute you cite.
> Jay Holovacs <[email protected]>
> PGP Key fingerprint = AC 29 C8 7A E4 2D 07 27 AE CA 99 4A F6 59 87 90
> (KEY id 1024/80E4AA05) email for key
>
>
---
My prefered and soon to be permanent e-mail address: [email protected]
"In fact, had Bancroft not existed, potestas scientiae in usu est
Franklin might have had to invent him." in nihilum nil posse reverti
00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information