[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Is ths legal?.. (fwd)



On Sun, 17 Dec 1995, Jay Holovacs wrote:

> 
> On Sun, 17 Dec 1995, Black Unicorn wrote:
> > 
> > I disagree.  Instead it implies that interception and administrative 
> > review of content will be tolerated where it is "a necessary incident to 
> > the rendition of his service or to the protection of the rights or 
> > property of the provider of that service."  Note that it will be the 
> > provider who makes the definition in the ex ante application.
> > 

> The provider is allowed access ONLY for QC purposes.

This is only explicit with regards to public providers.

 Getting back to thhe 
> original point, the provider's ability to interpret the contents of the 
> message is in no way required to monitor the system and cannot be used as 
> a justification in itself for prohibiting use of crypto. 

Oh?  What if I say that I need to monitor e-mail for data corruption?
Also, you might consider the definition of "intercept."  I suspect it's a 
bit wider than you are accounting for.


> Also, what if someone outside the system emails encrypted messages to the 
> user. What authority would the sys admin have there??

Entirely unrelated to the statute you cite.

> Jay Holovacs <[email protected]>
> PGP Key fingerprint =  AC 29 C8 7A E4 2D 07 27  AE CA 99 4A F6 59 87 90 
>  (KEY id 1024/80E4AA05) email for key
> 
> 

---
My prefered and soon to be permanent e-mail address: [email protected]
"In fact, had Bancroft not existed,       potestas scientiae in usu est
Franklin might have had to invent him."    in nihilum nil posse reverti
00B9289C28DC0E55  E16D5378B81E1C96 - Finger for Current Key Information