decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Arrons Law suggestion | 129 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Arrons Law suggestion
Authored by: kuroshima on Sunday, February 03 2013 @ 12:55 PM EST
This message is encoded in rot26. If you are in the US, you
would be breaking the DMCA and the CFAA by reading it, except
I am not evil, and so authorize you to crack it.

[ Reply to This | Parent | # ]

Arrons Law suggestion
Authored by: Anonymous on Sunday, February 03 2013 @ 06:03 PM EST
I am the OP for this thread

I thought about going down the same path that you did, but the problem is
defining what an 'effective' security control is.

That's why I went with the much more basic items.

1. it should not be a crime to violate a ToS statment.

It's not a crime to violate a negotiated and signed contract, it's a civil
matter, why should violating a ToS statement (which can be changed at any time,
without notice in most cases) be a crime?

2. it should not be a crime to provide false or misleading information to a
site

the one exception to this is if you are providing information that you know
makes to seem to be someone else, this does not need to be covered in this law,
identity theft laws can take care of this.

providing fake DoB, pet's name, mother's maiden name, etc is a legitimate
thing to do because it prevents someone who breaks into one site (or an insider
at that site) from accessing other sites that ask for the same information

any e-mail address that you provide should be acceptable, as long as you
actually have access or control of that e-mail address. providing someone else's
e-mail address falls back under the identity theft category

3. using a different computer to access a site, or doing something that makes a
computer you have look like a different computer to a site should not be a
crime.

There are lots of legitimate reasons to switch from one computer to another,
or to run a VM and create a new one, etc. Having the law consider making the
computer look like another one a crime would be like making it a crime to grow a
beard because sometimes criminals grow a beard to disguise themselves.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )