18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 26] 26.4 Other Liability<br />

We won't comment on the nature of the laws involved, or the fanatic zeal with which some people pursue<br />

prosecution under these statutes. We will observe that if you or your users have images or text online (for<br />

FTP, WWW, Usenet, or otherwise) that may be considered "indecent" or "obscene," you may wish to<br />

discuss the issue with legal counsel. In general, the U.S. Constitution protects most forms of expression<br />

as "free speech." However, prosecution may be threatened or attempted simply to intimidate and cause<br />

economic hardship: this is not prohibited by the Constitution.<br />

We should also point out that as part of any sensible security administration, you should know what you<br />

have on your computer, and why. Keep track of who is accessing material you provide, and beware of<br />

unauthorized use.<br />

26.4.6 Liability for Damage<br />

Suppose that one of your users puts up a nifty new program on your anonymous FTP site for people to<br />

use. It claims to protect any system against some threat, or fixes a vendor flaw. Someone at the Third<br />

National Bank of Hoople downloads it and runs the program, and the system then crashes, leading to<br />

thousands of dollars in damages.<br />

Or perhaps you are browsing the WWW and discover an applet in a language such as Java that you find<br />

quite interesting. You install a link to it from your home page. Unfortunately, someone on the firewall<br />

machine at Big Whammix, Inc. clicks on the link and the applet somehow interacts with the firewall code<br />

to open an internal network to hackers around the world.<br />

If your response to such incidents is, "Too bad. Software does that sometimes," then you are living<br />

dangerously. Legal precedent is such that you might be liable, at least partially, for damages in cases<br />

such as these. You could certainly be sued and need to answer in court to such charges, and that is not a<br />

pleasant experience. Think about explaining how you designed and tested the code, how you documented<br />

it, and how you warned other users about potential defects and side effects. How about the implied<br />

warranty?<br />

Simply because "everyone on the net" does an action, does not mean that the action will convince a judge<br />

and jury that you aren't responsible for some of the mess that action causes. There have been many times<br />

in the history of the United States that people have been successfully sued for activity which was<br />

widespread. The mere fact that "everybody was doing it" did not stop some particular individuals from<br />

being found liable.<br />

In general, you should get expert legal advice before providing any executable code to others, even if you<br />

intend to give the code away.<br />

26.4.7 Harassment, Threatening Communication, and Defamation<br />

Computers and networks give us great opportunities for communicating with the world. In a matter of<br />

moments, our words can be speeding around the world destined for someone we have never met in<br />

person, or for a large audience. Not only is this ability liberating and empowering, it can be very<br />

entertaining. Mailing lists, "chat rooms," MUDS, newsgroups, and more all provide us with news and<br />

entertainment.<br />

Unfortunately, this same high-speed, high-bandwidth communications medium can also be used for<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch26_04.htm (6 of 7) [2002-04-12 10:44:19]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!