Key Information Liability Issues Facing Managers: Software Piracy

KeyInformationLiability Issues
Key Information
Liability Issues Facing
Managers: Software
Piracy, Proprietary
Databases, and
Individual Rights to
1
Privacy
By: Detmar W. Straub Jr.
Rosann Webb Collins
Information and Decision Sciences
Department
Curtis L. Carlson School of
Management
University of Minnesota
271 19th Avenue South
Minneapolis,
Minnesota 55455
Abstract
Thelegal status of information in its electronic
forms of programsanddata and the rights of individuals to keep private someinformation about
themselvesis not clearly defined in the current
patchwork of old and new legislation on computer-basedinformation. As information usagein
organizations increases, there is a need to
minimize the information liabilities of managers
andtheir organizations.This article identifies key
issues, reviews relevant laws, andhighlights implications for information managers.The discussion centers on the protection of inteflectual
property rights concerning programs and data
andthe protection of individual rights to privacy
of information stored in computer-based
systems.
Specific methods can help an organization
establishing satisfactory legal postureto deal with
these issues.
1Funding
for thisworkwasprovided
by the Councilon
Library
Resources.
Keywords: Legal aspects of computing, protecting the information resource, copyright infringement, software piracy,
proprietary databases, commercial
databases, intellectual
property
rights, individual rights to privacy, informationliabilities
ACMCategories: K.4.1, K.5, K.5.1, K.5.m
Introduction
As organizations
become more information-intensive, managersfind themselves in a
fascinating but baffling world of sophisticatedinformation technologies(IT). It is a world increasingly characterized by technological advances
that stimulate exponential increases in knowledge, complexity, and turbulence (Huber, 1984;
Straub and Wetherbe, 1989).
Duringthe first three decadesof computerization,
the IT environment was muchsimpler. Programs
and data were internally producedand centrally
managed. Today, however, knowledge workers
mustlook beyondthe firm to satisfy their information needs. Developmentssuch as executive
information systems, computer networks, electronic bulletin boards, and end-user computing
demonstratethe scopeof this change. Also indicative of this transformationis the needof top
managersfor information external to the organization (Jones and McLeod, 1986; Sprague and
McNurlin, 1986). Table 1 showsthis diversity of
information and programsnowincluded in organizational information systems.
In responseto this technological change, laws
concerning information use have also undergone
dramatic change. Unfortunately, the evolving
legal environment has becomea patchwork of
newandreappliedlawsthat offer little clarity on
underlying issues. While public awarenessof the
vulnerability of information systemsto misuseis
periodically aroused by media coverageof specific incidents,there is a lack of persistentinterest
in this issue (Hoffer and Straub, 1989). To compound the problem, no broadly held ethical
framework for proper use of computer systems
exists.
Eventhough this environmentis ill-defined and
turbulent, organizations are still liable for the
MIS Quarterly~June
1990 143
KeyInformationLiability Issues
Table 1. Information Commodities
Commodities
Data,Text,
Images
Programs
DataFileson
Employees,
Customers,
etc.
Internal
Company-Owned
Correspondence
Commodities or Produced
Programs
Company-Owned
or Produced
Graphics
Commercial
Programs
-- Lotus1-2-3
--dBase
Ill Plus
External
-- dBase
Commodities programs
Public Domain
Programs
-- Freeware
Commercial
Data
-- DowJones
-- Graphics
Libraries
-- Dialog,BRS,
Medline
Public Domain
Data
-- Census
Data
misuse of information; management
is therefore
responsible for protecting the information resource. There is evidencethat the potential for
legal liability frommisuseis significant. Civil and
criminal suits for computer-relatedmisuseof information are on the rise, a trend that highlights
the extent of the problem.
This article identifies key issues andlaws relevant to information use in organizations and proposes specific methodsfor dealing with legal
liability.
Central amongthese recommendations
is the creation of a high-level committeeresponsible for setting policy and establishing specific
proceduresthat reduce the risk of information
liability.
Managerial Responsibility
for InformationLiability
In the past decadeor so organizations have been
held liable for improperuse of information technology and will undoubtedlybe subject to suits
in the future. Theincreasingthreat of liability from
improper use of information technology is indicated by the growth in numbers of computerrelated lawsuits from about 600 in 1981to 3,500
by mid-1984. Manyobservers expect the recent
court decisions have set precedents that will
engendera flood of lawsuits by individuals or
companiesin situations similar to those in the
144 MIS Quarterly/June
1990
precedent-setting cases (Goldstein, 1986). This
trend is also reflected in the growingsophistication of attorneys, prosecutors, andjudges in computer-related civil and criminal cases. The National Center for ComputerCrime Data (BloomBecker, 1988); for example, indicates that the
proportion of cases in somestates referred on
to prosecution tripled between1987 and 1988.
IS managershave had and will continue to have
oversightresponsibility for informationliability. IS
managerswho have failed to secure computerbased information have beenheld both accountable by the organizationandlegally liable (Bequai,
1984; Brickman, 1983; McKibben,1983). In some
organizations this responsibility is an explicit
charge. In others, becauseIS managersare the
corporate officers with the most extensive and
most intimate knowledgeof systems, programs,
and data, top management
looks informally to IS
to monitor policy and legal issues dealing with
information and computersystems(Freed, 1969).
To achieve these ends, IS managers maywork
closely with organizational legal staff in developing organizational policy for information technology use. IS managementresponsibility
also
extends to dissemination of the approvedinformation policy to the organization. For these
reasons, IS managersmust be aware of the legal
liabilities that can incur as a result of internal
misuse of data and programs.
General managers,too, have a responsibility to
protect information. Trends such as end-user
computing, the downsizing of computerapplications to departmental or end-user systems, and
increased access to external and corporate
databases dramatically increase the risk of
misuse of computer facilities
and resources.
Given the decentralization of information resourcesthat are reflected in these trends, it is
clear that general management,as well as IS
management,
will needto be better versed in the
possible negative legal consequencesof using
computers.
Three main areas of concern for all managers
are: (1) howto provide functionality while respecting the intellectual propertyrights of external program creators; (2) how to acquire and utilize
external information without violating licensing
contracts or infringing on copyrights; and(3) how
to collect and disseminate information on individuals while respecting individual rights to
privacy. This article outlines these three primary
KeyInformation
Liability Issues
sourcesof informationliability andrecommends
effective methods
for achievinga satisfactory
legal posture.Eachareaof concern
is illustrated
witha scenariodepictinga situationthat is typical
of whata manager
will face nowor in the future.
In eachscenario,the organizationandits managersareexposed
to significantlegalliability; i.e.,
civil lawsuitscouldbesuccessfully
pursued
to the
detriment of the organization by softwareand
databasevendorsor by private parties.
In addressing
theseissues,the intent is to confine the discussionto three majorproblems
that
confront managers.Unquestionablythere are
manyother circumstances
in whichthe organization canbeheldlegally liable for misuse
of information.Organizations
canbeheld legally liable
whenthey sell inaccurateinformation,especially whenthis informationis a primaryproduct,as
in the caseof online databases
or expertsystems
(Mykytyn,et al., 1990). Jeppensen-Sanderson,
Inc., a U.S.air navigationchart maker,for example, washeld liable for inaccuraciesin its maps
(LaPlante, 1986). Discussionof problemareas
like these, however,lies outside of the domain
of this article.
The Current Status of Ethics
and the Law
Therewouldbe less needfor an exactinglyclear
legal environment
if a long-standing
well-established set of ethics governed
the numerous
transactions betweenprovidersof informationproducts and consumers.
Concernsabout violations
of intellectualpropertyrights andindividualrights
of privacy are importantprecisely because
there
are no clear-cut ethical frameworks
in the computing professionsor in the workplace
to guide.
conduct. While both the ACMand DPMA
have
adoptedcodesof professional conductand the
curriculum committeesof those organizations
recommend
inclusion of ethics in coursework,
manyschoolsstill do not teachcomputer
ethics
(Couger,1989). Moreover,two national studies
haveestablishedthat few companies
provideemployeeswritten guidelineson "technoethics"
(Bequai, 1987). TheNational Association of Accountantsfoundthat only 52 percentof the companies surveyedhad guidelines on the use of
computers,
andof theseonly 22percenthadwritten guidelines(Bequai, 1987). TheEducational
Fundsfor Individual Rights foundthat over 90
percentof the companies
had no guidelines on
ethical use of computers(Bequai,1987). While
a written codeof conduct
doesnot carry the force
of legal sanction, sucha codedoesmorethan
define whatis right or wrong:it reducesthe
possibilities of ethical conflicts (Parker,1988).
Thereis also the same
lack of clarity in the law
of informationuse, whichhasevolvedpiecemeal
overthe last three decades.
Althoughrecentpublicity aboutcomputer
viruses andother computer
abuseincidents mayhave served to heighten
generalsocial awareness
of the potential dangers
associatedwith useof computers,
the lawin this
areasremainsin a formativestage. Theprivacy
of electroniccommunications
is a casein point.
In the legislative history of the ElectronicsCommunicationsPrivacyActs, critical distinctions
were madebetweenforms of information. The
1968act covered only voice communications,
havinga legislative intent whichspecifically excluded digital communications
betweenhumans
or computers.The1986act, though,explicitly
includeddigital, data, andvideocommunications
andhada sectiondevotedto electronic mail issues.Because
the 1986act still makes
distinctions amongforms of communication
basedon
differences in technology, each newcommunication technology
will requirerevisionof the law
(Burnside,1987).Theprivacy law for electronic
communications
is adequateonly until the next
technologicalinnovationoccurs.
In sum,the law is fragmented,and public concern over real andpotential computer
abuses
has
not coalescedinto widely held societal norms.
Ideally boththelawandethicsin this areashould
reflect generalsocial valuesandshouldinteract
to guidepractice (McFarlan,1988),but this has
not happened.
Managers
responsiblefor information usein an organization,therefore,mustdevelop an understandingof the current, albeit
ambiguous,
legal contextin order to proactively
respond
to identifiableliabilities.
Protection of Intellectual
Property Rights
Thefirst facet of informationliability of concern
to managers
is intellectual propertyrights. By
1789the Founding
Fathershadput into law a way
to protectoriginal worksthat areessentiallycreations of the intellect. Thepurposes
of this constitutional provision wasto allow creators of
original worksto enjoydueeconomic
returns. In
Article I, Section 8, the U.S. Constitution
MIS Quarterly/June 1990 145
KeyInformation/Liability
Issues
authorizes Congressto "promotethe progress
of scienceanduseful arts by securingfor limited
timesto authorsandinventorsthe exclusiveright
to their respective writings and discoveries."
Fromthis foundation,U.S. law guaranteeing
intellectual propertyrights hasevolved.
Whereasstatutes and case law surrounding
tangiblecreations(like inventions)andworks
original authorship(like literary expression)
have
stabilized in recentyears,a greatdeal of uncertainty still surrounds
the applicationof existing
law to computerized
informationthat is, by its
very nature, electronic in form. Creationssuch
as programsand databasesallow manipulation
or compilationof informationin newwaysthat are
useful to societyandshould,hence,beprotected.
Yetit is unclearhowsuchprotectioncancontinue
to be providedin a rapidly evolvinginformation
society. Currentlegal systemsandconceptssuch
as copyrights,patents,andtradesecretsprovide
only limited guidelinesfor the legal useof the
electronic information commodity
(Federal Library andInformationCenterCommittee,
1986).
Some
observerscontendthat specific computer
crimelegislation is not requiredandthat education of judgesandlawyersaboutcomputers
will
result in appropriateextensionof lawscovering
informationin moretraditional forms(VVharton,
1984).J urkat(1986)disagrees,arguingthat case
law andthe extent of computercrime showthat
specific legislation is needed.Thereis evidence
that the courtsare hesitantto automaticallyextendprotectionof information
in print formto that
in electronicform,especiallyfor statutesconcerning theft andinvasionof property.Computer
informationoften doesnot fit within the definition
of propertysinceit is separatefromthe medium
uponwhichit is stored(i.e., not tangible)and
doesnot needto be removedfrom the owner’s
possession
to be useful to someone
else. For example,in Wardv. SuperiorCourt of Cafifornia
(1972), the court foundthat intangible magnetic
impulsesdid not constitutean article that could
be stolen. In People v. HomeInsurance Co.
(1979)the Colorado
Supreme
Courtruled that the
accessto medical records over the phonewas
not theft becausethe records never left the
hospitalfile room.
Moreover,inherentcharacteristics of computerbasedinformation and programsmakenewlegislation difficult to specify.Machine-readable
information
is leaky,i.e., difficult to control.It is also
synergisticin that combinations
of piecesof in146 MIS Quarterly~June1990
formation maybe morevaluable than any piece
in isolation; irreversible,in that onceit is known
by an individual it is not easily returnedlike a
stolen or borrowed
physical item; andsharable,
in that morethan one personcan use the same
informationresourceat the sametime (Dreyfuss
andLeebron,1986).Informationin its traditional
forms has been viewed as both an economic
commodity
anda societal resource. Thereis no
consensuson howto measurethe value of informationor evaluatevalueaddedto an information-basedproductor service.
Bodiesof law that applyto the protectionof intellectual propertyrights are copyright,patent,
contract, andtrade secret law. Whileeachhas
limitations in dealingwith informationas a commodity, all providegroundwork
for the information managerin setting policy. Twocommon
areasof potential misuseof the informationcommodity,softwarepiracy (or unauthorized
copying
of software) and the downloading
of data from
commercial
databases,are usedhere to explore
the applicationof copyright,patent,contract,and
trade secret law to the use of information by
organizations.
Intellectual propertyrights and
softwarepiracy
Scenario
1. MaryMiles, the nutritionist at
Hilton Hospital,wasextremelypleasedwith
the diet analysis program
Nutri-7 shehad
downloaded
from the local bulletin board
system.MaryhasseenNutri-7for saleat the
vendor’sexhibit at last month’sconference
andknewit wouldbe useful for her weekly reports on the cafeteria andpatients’
menus.Evenwithout the manual, it was
easyto use. Maryenthusiastically recommended
the packageto other Hilton nutritionists andsharedcopieswith themvia the
intra-hospital network.
Employeeswhopirate software, such as Mary
Miles, place both themselvesand the organization at risk. Theorganizationincurs a potential
¯ liability if employees
gobeyond
the limits of the
law and infringe on the copyright of the owner
of the program.Theorganizationcould be held
liable for suchinfringementsundercertain conditions, such as management
knowledgeof an
infringement.It wouldalmostcertainly be held
KeyInformation
Liability Issues
liable if it in anywayaidedthe infringement
(Nimmer and Geller, 1988). Evenwhenmanagement
has no knowledge
of the infringement,the organizationmaystill beheldliable if it hadtheright
andability to controlthe activity that results in
infringementandhad somefinancial interest in
the infringing act (Hal RoachStudios, Inc. v.
RichardFeiner & Co., 1984).
Softwarepiracy, whichincludesboththe duplication of commercially
available softwareto avoid
fees and the unauthorizedcopyingof an organization’s owninternally developed
programs,is
a majorproblemtoday. Industrysourcesestimate
the lossesfrompiracy of commercial
softwareat
ov~er$1billion peryear,andmany
fear that rapidly increasinglosseswill threatenthe financial
viability of the wholesoftwareindustry(Bequai,
1987).
Of the legal issuesdiscussed
in this article, the
law and legal precedent concerningsoftware
piracy appearsto be the moststraightforward.
As wasclearly the congressional
intent, the 1976
CopyrightAct (17 U.S.C.101) definedworks
authorshipthat couldbe copyrightedin sucha
wayas to include computerprograms
fixed in a
tangible medium
(Beheshtian, 1988). The1980
revisionsto the CopyrightAct provideanexplicit
definition of a computerprogramas "a set of
statements
or instructionsto be useddirectly or
indirectly in a computer
in order to bring about
a certain result" (17 U.S.C.101)andalso establish tha the ownerof a copyof a programcan
copythat program
for archival purposes
and for
use, suchas in makinga copyonto a hard disk
(17 U.S.C.117).
Whilethere is still somedisagreement
in the
literature over the coverageof computerprogramsby copyright(especiallymicrocode),
recent
cases have supported such coverage across
types and aspects of computerprograms.The
disagreement.centers
on whethercomputerprogramsare either expressionsof an idea or the
ideaitself (Steinberg,1987).Thisdistinction
importantbecause
ideasare specifically excluded fromcopyrightprotection(17 U.S.C.101-102).
Thecourtshaveruled that evennon-literal elementsof a program,
suchas the program’sstructure, sequence,
andorganization,are protected
by copyright (WhelanAssociatesInc. v. Jaslow
DentalLaboratoryInc., 1986). Apple Computer
Inc. v. Franklin Computer
Corp. (1983) established that programs
in object code,programs
imbeddedin ROM,and operating systemsoftware
are coveredby the CopyrightAct. In NECCorporationv. Intel Corporation
(1989),a California
state court ruled that microcode
is copyrightable
eventhoughin this specific caseNEChad not
infringedonIntel’s copyright.Thecourt foundin
this casethat the similarities in the programs
underquestion were imposedby the microprocessor and hardwarearchitecture and werenot
a violation of copyright (Yochesand Levine,
1989).
Until the 1980s,computer
softwarewasnot consideredpatentable.In Diamond
v. DiehrandLutton (1981), however,the Supreme
Court ruled
that computerprogramsare patentable if they
meetthe tripartite criteria of beingnovel, unobvious, anddefinedin termsof the physicalelementsof a computer.Patents provide strong
protection because
they can be infringed by the
independentdevelopmentof equivalent programs,evenif thesedevelopment
efforts do not
produceexactcopies. Thepatentingof software
is increasingdespitethe drawbacks
of securing
a patent, i.e., considerable
expense
andthe full
disclosurerequirement,whicheliminates trade
secret protection (Jakesand Yoches,1989).
Contracts are often used to supplementthe
copyrightandpatent protectionof intellectual
property rights for computerprograms.Using
contract law to protect programs
hasthe advantageof flexibility in that well-writtenagreements
canbe tailored to governthe useof programs
by
interestedparties (Lautsch,1985).For example,
the arbitrationorderthat resolvedthe IBM-Fujitsu
dispute over use of operating systemsoftware
wasbasedon prior contractual agreements,
not
onthe copyrighted
status of the operatingsystem
(Software
Protection,1987).In the caseof SAS
Institute, Inc. v. S&H
Computer
Systems
(1985), the
court ruledthat S&Hhadviolatedits licensewith
SAS
by preparinga derivativeversionof the statistical programfor VAXcomputers.
Tradesecret law has also beenusedto protect
programs
becauseit canprotect ideas, information, andinnovations.Oftentrade secretprotection and copyright protection are usedsimultaneously for computer.software (Greguras,
1987). Tradesecret lawsare state lawsthat do
not require disclosure (as with a patent)
registration, but theyare enforcedby both state
andfederal courts(Lautsch,1985;Mylott, 1984).
U.S. courts have rules that even widely distributed computerprograms
do not forfeit trade
secret status whenthe license agreement
places
MIS Quarterly/June 1990 147
KeyInformation
Liability Issues
restrictions on useanddisclosureby the recipients (OECD,1988).
Intellectual property rights and
downloadingto databases
Scenario
2. At mostof the 50 hospitals in
the Hilton Hospitalgroup,there is active
researchon the preventionandtreatment
of diabetes.Dr. JohnPeters,a medicalinformationspecialist in CorporateInformation Services,knewthat the doctorsneeded up-to-dateinformationon the research
of other Hilton doctorsandfromthe medical community
at large. Dr. Petersset up
a diabetesdatabaseon the inter-hospital
networkandpopulatedthe databasein two
ways. All Hilton doctors reported their
researchfindings via entry into the database; in addition, eachweekDr. Peters
downloadedfrom the commercialdatabase, Medline,all citations on diabetes.
Theresearchers
at all the Hilton Hospitals
are enthusiastic users of the diabetes
database.
In this scenario, the long-term retention and
disseminationof informationcollected fromexternal sources--theresearchdata from Medline
along with internally created information-createsa potential informationliability for the
hospital. Lawsand legal precedentconcerning
the useof external informationare evolving as
moreand moreinformation becomes
available
online. Because
the lines betweenfair and unfair use of this information are not precisely
drawn,
this is anareaof potentialliability for the
organization.
Theterm "downloading"
generally refers to the
retrieval andindependent
useof informationfrom
external sources.Examples
of downloading
includecapturing bibliographic databaseseamhes
in machine-readable
form for later use. Usage
mayinclude editing andreformatting of search
results, combination
of searchresults with other
information,and/orinclusionof this information
in users’ personal databases. Subsequent
searchesof personaldatabases
rather than vendors’ online databases
result in savingsfor users
and loss of revenuefor databasevendors.
148 MIS Quarterly/June 1990
The ease with which downloadingcan be accomplishedcausesconcernfor publishers and
distributors of bibliographicinformation.2 Four
factors influencehowdata-base
distributors perceivethe downloading
of their information:(1) the
numberof databasesfrom whichinformation is
downloaded;
(2) the extent of value-added
reformattingor editing; (3) thedistributionof information to multipleusersor sites; and(4) the length
of retention of downloaded
information(Bysouth,
1985).
Existing U.S.copyrightlaw doesnot specifically
identify databases
as copyrightablenor are they
coveredin the international BerneandUniversal CopyrightConventions.
Thereare conflicting
interpretationsof the U.S.CopyrightAct concerning regulationof the useof electronic information, and "muchuncertainty surrounds the
questionof whichpracticesare legal, ethical, and
safe" (Demas,1987, p. 70). Someargue that
although bibliographic references are not
copyrightable,bibliographicdatabases
are clearly compilationsfixed in a tangible medium
and
thus covered(17 U.S.C.101; Weil andPolansky,
1986).
Lawand legal precedent are not clear as to
whetherthe retentionanddistribution of the diabetes databasedescribedin the scenariois an
infringement. Sucha database maybe considereda compilation,andthe CopyrightAct permitsa separatecopyrightfor a collectionof works
by others whenthe compiledwork constitutes
"an original workof authorship"(17 U.S.C.103).
But two recent court cases, RandMcNallyand
Company
v. Fleet Management
Systems(1986)
and WestPublishing Companyv. MeadData
Central (1986)appearto contravenethis interpretation. In thesecases,the courts ruled that
the inclusionof substantialcopyrightedmaterial
in a computer
database,evenif that information
is physicallyrearranged,
constitutesaninfringementof copyright(Koeni9, 1986).In the Westv.
MeadData Central case, WestcontestedMead’s
proposedinclusion of pagereferencesto West
legal referencebooksin Mead’sLEXISdatabase
since pagereferencesare a uniquearrangement
of cases, and therefore copyrightable (West
2 The
same
concern
is notfelt for thelaborious
copying
byhand
of bibliographic
information
fromvarious
printindexes
onto
notecards
for a personal
reference
file.
KeyInformation
Liability Issues
Publishing Companyv. MeadData Central,
1986). After lengthy state and district court
lawsuits andinjunctions prohibiting Mead’suse
of Westpagereferencesin LEXlS,the casewas
settled by a licensingagreement.
Whilethe terms
of the licensewerenot disclosed,Westofficials
reported a "sizable" fee waschargedMeadfor
the arrangement(Oberdorfer, 1988). Although
the settlementwithholdslegal opinion,the willingnessof Meadto license West’sarrangement
andthefact that the injunctionitself wasnot successfully challenged
tend to supportthe conservative view that databasesar.e copyrightable.
Therefore,substantial, unauthorizeddownloading froma commercial
copyrightedvendor,even
if that informationbecomes
part of a newcompilation, canbe consideredan infringementof
copyright (Mika and Shuman,
1988).
It is importantto add,however,
that downloading
of information for somepurposesmaybe legal.
TheFair UseExceptions
to the CopyrightStatute
of 1976state that "fair useof a copyrighted
work,
includingsuchuse[as]... reproductionin copies
or purposessuch as criticism, comment,news
reporting, teaching,scholarshipor research,is
not aninfringement
of copyright"(17 U.S.Co
107).
Fair useis establishedby the courtsandsubject
to the assessment
of relevant circumstances
and
fair useexceptions
by the court. Fourcriteria for
fair useare: (1) the useis for non-commercial
purposes;(2) the useis congruentwith the nature
of the medium;
(3) the amount
of material copied
fromthe original is not substantive;and(4) the
use doesnot damage
the marketfor the original
.work. For example,
downloading
for scientific or
researchpurposes,without long-termretention
of datafor reuse,is usuallyconsidered
fair use.
If files are transferred to create a personal
databaseandto avoidonline charges,downloading is illegal unlesscovered
by a specialarrangement betweenthe database owner and subscriber (Mika and Shuman,
1988).
In spite of the fair use criteria, inclusion of
downloadeddata in the diabetes database
scenariomaystill createaninformationliability.
Whilefair useis alwaysdetermined
by the courts
in individualsuits, the situationdescribed
in the
scenariois a researchendeavor
for non-commercial purposes
that doesnot copymostof the Medline databaseand does not damage
Medline’s
market(searchescontinueto be madeweekly).
Othercorporateuseof external data couldalso
befree fromliability. Asuseof externalinformation changesfrom the public domainto the domain of commercialprogramsand data (see
Table1), the chanceof incurring an information
liability increase.Downloading
andretention of
data from public domaindatabasesis clearly
legal, andthe censusdatabases
providedby the
government
havebeenwidely usedin this way.
But someuseof value-added
external data, such
as the downloading
andretention of the entire
full-text druginformationdatabases
fromDialog
for useby the Hilton Hospitalpharmacy,
with the
intentionof eliminatingfuture online searches
of
the database,wouldnot likely beconsidered
fair
use.
Inasmuch
as existing copyrightlaw and fair use
exceptionsare opento interpretation, contracts
havebecome
the preferred methodfor specifying terms and conditions for sale and use of
bibliographic information (Duchesne,
1986).
chain of parties is involved in the creation,
distribution, anduseof bibliographicdatabases,
including information providers, databasevendors, communications
networks,andusers (both
intermediaryanddirect users). Contractsgovern
transactionsat eachlink in the chain. Contracts
betweenusers anddatabaseproducersoften include clauses that prohibit any form of
downloading
fromdatabases
withoutspecific written consent,althoughthe producers
usually give
their permissionto download
for legitimateuses
(Demas,1987).
Becauseof such contracts betweendatabase
vendorsand subscribers, someargue that the
issue of downloading
froma centralizeddatabank
has beensettled (Garman,1986). A survey
databasevendorsmade
by the majorinformation
industryperiodicalOnlinein February
1986found
that mosthavea written downloading
policy for
subscribersand that "fair use" downloading
is
acceptableto nearly all database
vendors."Fair
use" wasdefined in the survey as downloading
informationfor one time useby or for oneperson. A majorreasonthe vendorsare willing to
acceptthis practice is that 87 percenthaveinstituted per-recordcharges.Theremainingunsettled issue concernsonly downloadingfor
multipledistributionor the retentionof downloaded data (Garman,1986).
MIS Quarterly~June 1990 149
KeyInformation
Liability Issues
ProtectingIndividual Rights
to Privacy
Scenario3. Researchon the prevention
andtreatmentof AIDSat Hilton Hospital
hadreceiveda lot of publicity from the
media.In a NewYork Timesarticle, Dr.
Judith Williams of Hilton Hospital noted
howthe computerization
of the recordsof
all patientsreceivingAIDStests andAIDS
patients’ histories helpedin understanding
commonalities
and differences in disease
symptoms.
LarryLitton, the Hilton personnel director, readthe article andthereafter
routinely usedthe databaseto screenout
job applicants whohad had an AIDStest.
Formany
people,the invasionof privacydescribed
in this scenario
constitutes
their greatestfearabout
the misuseof computer
technology.Thereis considerableconcernbecause
technologicalimprovementsgreatly increasethe capacityandeconomy
of storing andretrieving massive
amounts
of personal information in centralized databases.A
specific "right of informationprivacy,"whichextends the privacy of personal conductto data
storedabouta person,has beenadvanced,
namely that individualshavethe right tO exercisecontrol over the collection, storage,use,dissemination, andaccuracyof informationstored about
them(Freedman,
1982). Mason
(1986) identifies
four critical areasthat shouldbeprotectedby information
policies:(1) anindividual’sright to keep
dataabouthimor herselfprivate;(2) anindividual’s
right to assure
that it is accurate;
(3) anindividual’s
right to maintainownership
of it; and(4) anindividual’s right to haveaccessto it. Sincemost
organizationscreatefiles on peoplesuchas employeesandcustomers,attention shouldbe given
to the privacyrights of suchindividuals.
Thecomputer’suniquecapabilities for matching
andstatistical inferenceon large databases
increases
the threat to individual privacy. Computer
matchingis the electronic comparison
of two or
moredatabases
to reveal informationthat is commonto both data sets. Suchmatching
createsnew
information.A matchof draft registrationagainst
drivers’ license registration databases,for instance, mayidentify maledrivers whohavenot
registeredfor the draft. In government
suchmatching procedures
are limited by OMB
guidelines,but
150 MIS Quarter/y/June 1990
the" routine use" exemption
of the 1974Privacy
Act is widelyemployed
by agenciesto allowdisclosureof recordswithoutwritten consentof individuals (U.S. Congress,
OTA,1986).Surveys
determinethe extent of computermatchingproduceinconsistentresults: agenciesreported700
matches
between
19~80-1985
to the OTA,while the
OMBrecords showedonly 56 matchesbetween
1979-1984(Regan,1986). TheOTAstudy estimates
that over7 billion recordswerematched
during this period(Regan,1988).NationalSecurity
DecisionDirective145,in fact, acknowledges
the
threat fromsuchmatchingprocedures
andpermits
classifying documents
or recordsto preventelectronic combination(Simpson,1987).
Nor do statistical databases,whichare intendedto protectthe privacyof individualsby permitting queriesonlyon setsor groupsof individuals,
adequatelypreventinvasionsof privacy. As Denning, et al. (1979)prove,a very limited number
of relatively unsophisticated
queriescanelicit informationabouta specific personfrom eventhe
largest and mostcarefully securedstatistical
databases.Organizations,therefore, cannotrely on statistical databases
to protect individual
rights to privacy.
Peoplewhofeel their privacy hasin anywaybeen
violated do havelegal recourse. Althoughthe
Constitutiondoesnot explicitly definea right of
privacy, the Supreme
Courthas establishedthis
right by combining
severalconstitutional provisions, as in the Roev. Wade
(1973)decision.
a Supreme
Court case that consideredprivacy
with respect to information, Whalenv. Roe
(1977),the court uphelda New
Yorkstate statute
allowingthe retention of a database
of information aboutindividualswith prescriptionsfor certain classesof drugs.Whilethe court affirmed
that the right of privacyprotectsindividuals’interests in disclosureof personalinformation,it
held in this casethe government
couldmaintain
the information becausethe reasonwassufficiently important(a legitimateinterest in controlling dangerousdrugs) and there wasadequate
protection fromharmfuldisclosureof the data.
Besidestheseinterpretationsby the courts, there
hasalso beenlegislation to protect information
privacy rights of individuals. Lawssuchas the
PrivacyAct of 1974are specifically directed at
government
abuseof the right of privacy. However, it doesnot coverabusein the private sector (Bequai,1987),andthe Office of Technology
KeyInformation
Liability Issues
Assessment
(OTA)hasconcluded
that: (1) federal
agencyuseof newtechnologyin processingpersonal information haserodedthe protection of
the PrivacyAct; and(2) the Office of Management
andBudgetoversight is inadequateevenin protecting basic areassuchas accuracyof records
(U.S. Congress,OTA,1986).
There are legal provisions that address
unauthorizedaccessto customersand consumer
recordsstoredby federallyregulatedfinancial institutions andcredit reporting agencies
(Counterfeit AccessDevice and ComputerFraud and
AbuseAct of 1984, 1984). In addition, some
states haveenactedlawsgranting employees
accessto their personnelandmedicalrecords(Canning, 1984).
Computer
crimelegislation regardingprivacy is
particularlyinadequate.
When
it is covered
at all,
it is only protected underunauthorizedaccess
provisions, whichdo not establish a methodfor
definingprivacy(Jurkat, 1986).Sincethe Privacy
Protection Study Commission
report in 1977, a
number
of bills havebeenproposed
to createan
independent
federal privacyboard,but they have
receivedlittle attention or support(U.S. Congress, OTA,1986).
Unlike WesternEuropeancountries or Canada,
thereis no federal agency
specifically responsible for monitoringgovernment
andprivate-sector
informationPracticesandfor acting as ombudsmenfor individual citizens (Flaherty, 1984).For
example,in Sweden
the 1973Data Act protects
the confidentiality of all personalinformation
systemrecordsin both public and private sectors. (SeeU.S. Congress,OTA,1986,Appendix
F, for a reviewof severalcountries’information
policies and agencies.)
In somecases, abusive practices concerning
machine-readabledatabasesof information
aboutindividuals canbe considered
a tort, that
is, a harmfulact that doesnot involve a breach
of contract andfor Whicha civil action canbe
brought.Theright of privacyin torts is the right
of the individual to be let alone (Warrenand
Brandeis,1890).Thesetorts give individualsthe
right of action againstotherprivate individuals
for invasionof privacy. Particularly relevantto
organizationsthat collect andstore data on individualsis thetort of publicdisclosure
of private
facts, whichcoverssituations in whichprivate
facts are disclosedpublicly andin whichthe informationdisclosedis offensive andobjection-
ableto a personof ordinarysensibilities. If there
is nostatutory coverage
for a particular typeof
personalinformation held by anotherparty (as
thereis for financial andeducational
records),the
individual maynot makea claim concerninguse
of that information
(UnitedStatesv. Miller, 1976).
Thelegal situation for torts dealingwith computerizedinformation
is still unsettled,andchanging technology
will undoubtedly
result in newtorts
or rethinking of old ones(Gemignani,
1981).The
tort of negligentmisrepresentation,
for instance,
has beenapplied in Dun& Bradstreet, Inc. v.
Greenmoss
BuildersInc. (1985).In this case,the
publicationof erroneous
informationinvolvedthe
generation and disseminationof an incorrect
credit report. In court casesin OhioandGeorgia,
moreover,suppliersof computerized
information
wereheld liable for providingerroneous
information (Bequai,1984),andin 1985a police departmentwassuedbecause
of an illegal arrest based
on an inaccuracy in a computerizeddatabase
(Field andSchiller, 1986).
Theproblemof inaccurateinformationaboutindividuals storedin machine-readable
databases,
whichcanbe seenas a potential informationliability for organizations,is not trivial for two
reasons.
First, thereis evidence
that inaccuracies
are widespread.A study of commercialdatabases,in fact, hasfoundthat thereare novalidation or error-checkingprocedures
in one-fourth
of databases(VValton and Durham,1988). TRW
hasprocedures
for client reviewandcorrection
of its databases
andreportsthat of the 1 million
peoplewhoreviewtheir credit files eachyear,
350,000peoplechallengethe accuracyof their
files andabout100,000
files needto becorrected
(Bequai, 1987). A 1980study of the computerized databases
maintainedby the FBI’s Identification Divisionandthree state criminal justice
systems
foundthat only 24 percentof the records
in the FBI systemand between12 percent and
49 percent of the recordsof the state systems
werecompleteand accurate(Caporael, 1984).
Second,
the ability of individuals to detectsuch
errors is limited. Ricketts(1990)hasfoundthat
fewsubjectsin his experiments
wereableto find
evenlarge numericalerrors in computeroutput.
Implications for Managers
A variety of procedures
andpolicies are required
to reducepotentialcorporateinformationliabilities discussed
in this article. Authoritativeopinion
MIS Quarterly/June 1990 151
KeyInformation
Liability Issues
that suchpolicies and procedures
are effective
deterrents of computerabuse(Parker, 1983)
supported
by the results of a surveyof over1,200
DPMA
organizations, which foundthat information aboutpropersystemusageis a key deterrent to systemmisuse(Straub, 1987).3 Themix
of deterrentswill beuniqueto eachorganization,
varying by type and sourceof information commodityandassessed
risk of liability. Studieshave
shownthat thesepolicies are mosteffective when
they include assignments
of penalties and criminal liabilities to employees
whoviolate policies
for proper systemuse (McKibben,1983;Straub
and Nance,1990).
Protectionof intellectual property
rights
In order to providemaximum
accessto data from
commercial
databases
while protecting intellectual property rights of databasevendors,three
specific coursesof action maybe taken. First,
subscriptionsto commercial
databases
shouldbe
centrallycontrolled,not onlyfor economies
of scale
but also for monitoringemployee
useof databases.
Second,contract restrictions on downloading,
retention, anddistribution of datashouldbe provided to usersin a readableand understandable
form.Finally, organizational
informationpolicies
shouldrequireemployees
to abideby vendors’restrictions on downloading,and they should
stipulate penalties for violations of these
restrictions.
Organization-wideadoption and provision of
basicsoftwareapplicationscanhelppreventsoftwarepiracy by members
of the organization,and,
at the sametime, offer economies
of site licensing. A clearly articulatedorganizationalinformation policywill requireapproval
for acquisitionand
useof any softwarenot alreadyauthorized.The
approvalprocessshouldentail proof of purchase
or authorizationfor legitimate use. To prevent
unauthorizeduseof commercial
programsstored
on a network,networksoftwarecancontrol the
numberof users that can executea programand
record attemptsto copyprogramsfrom the net3Although Straub (1987) focused on internal information
liabilities andnot on the external, organization-to-organization
information liabilities,
empirical studies based on the
criminological theory of General Deterrence ~f~ers ample
evidenceforthe efficacyof policies and distributed information.
152 MIS Quarterly/June 1990
work(Boyer, 1988).The"isolation" of software
shouldbe closed, that is, the default condition
shouldbe "NoAccessAllowed"(Aalders,et al.,
1985).
Protection of individual rights to
privacy
Individualrights to privacycanbestbe protected
throughself-regulating policies andprocedures.
Managers
needto follow closely the development
of privacy legislation. A manager
should have
designated
responsibilityfor informationliability, andthat personshouldhavestrong connections with functional areamanagers
(Aalders,et
al., 1985).
As discussedearlier, the useof computer
matching andstatistical inferenceto retrieve personal
informationfromdatabases
is a particular threat
to privacy. Security techniquesmustbe beyond
the technological
internal securitycontrolsof access, flow, inference,andcryptography
(Denning
andDenning,
1979)to policy andtraining that encouragetrust and honestyin employees.
Personal data should be carefully stewarded
throughout
its organizational
life. In thefirst stage
of the datalife cycle, onlyinformation
that is absolutely necessary
shouldbe storedaboutstaff,
customers,andother persons.Individuals should
benotified aboutdatabeingstoredaboutthemand
its intendeduse, andtheir consentobtainedin
writing. Thedisclosureof personaldata, moreover, mustbe carefully monitoredandlimited to
authorizedpeopleusing the data for authorized
purposes.Thequality of the personaldata stored
andaudit trails of sources
anddisclosures
of data
shouldbe assured.Finally, personalinformation
can be deletedfrom the systemwhenthe information is no longer needed(Everest, 1986).
Whereappropriate, a formal mechanism
for reviewandcorrectionof informationmaybe established. In well-managedorganizations, such
administrative
activities will takeplacein anenvironmentof carefully articulated policies and
procedures.
Whileoneof the factors inhibiting policy making
in this area maybethecost and time required
for policy development,
there is evidenceof the
benefit of suchpolicies. AT&Tspent two years
developing
a policy that specifiesuniformpolicies
andpracticesonthe collection, storage,internal
KeyInformation
Liability Issues
use, andexternal disclosureof employee
information. Thepolicy, which includes a Codeof
Ethicsfor all employees,
is a voluntaryadoption
of fair information
practicesof the FederalPrivacy
Act of 1974(Canning,1984). Suchpolicies have
beenupheld by the courts. For example,the
courtssupported
the rights of Detroit Edisonand
NewJerseyBell to refuse the disclosureof employeeinformationto unionsbasedonrestrictions
in the companies’
carefully wordedprivacy policies (Finner, 1986).
Thesecasesillustrate the importanceof behaving in an anticipatorywayto informationliability
issues. Policy shouldbe morethan a reaction to
existinglawsandcasesor a checklistof requisite
procedures.It shouldbe basedon a technoethical frameworkthat addressesthree key issues:
1. Original worksof authorshiphavea sanctity
that protects their use andeconomic
rewards
to the originators
2. Majorchangesin expressionare required to
makeinformation acquiredfrom others a new
and legitimate "value-added"creation
3. Theright of information privacy should be
respectedand ensuredwith informedconsent
fromindividuals
Needfor heightened awareness
by IS and general managers
It behooves
IS managers
to be awareof the legal
environment
within whichtheir informationsystemsoperate, especially thoseareasthat pose
significant, probablerisks for the organization.
Some
of thesecircumstances,
in point of fact, are
goingto fall outsideof their managerial
control;
nevertheless,
knowledge
of the potentialliability
canallowIS managers
to disseminate
this informationto top management
and help the organization avoidcostly lawsuits. IS managers
should
seethemselvesas the key actors in monitoring
the changinglegal environment,assessingorganizationalrisk, coordinatingwith legal counsel,
and disseminating
information. IS professionals
haveboththe mentalmodelof the organization’s
information systemsand an understandingof
whatfunctions are technologicallypossible.
It is critical that general management
also
understands
the natureandpotential scopeof information
liability andthat it actsto limit organizational exposure.
Twospecific kindsof actionsare
needed:
(1) the establishment
of a high-levelcommitteeto monitorthe issueanddevelop
policy and
(2) the formulationof policies for all employees.
Committeemembers
should include IS management, legal staff, representativesfrom human
resources,andtop management.
Thepolicy seeking to limit information
liability should
behighlyvisible and widely disseminated.At the start of
employment,
eachemployee
shouldbe trained on
corporateregulationsonthe appropriateandlegal
usesof informationandinformationtechnology.
Employees
shouldcertify in writing their understandingand acceptance
of the policy. Periodic
retrainingof all employees,
inclusionof guidelines
in employeehandbooks,and discussion of new
andcontinuinginformationliability issuesin corporate communications
all serve to underscore
andmaintainthepolicy. It is particularlyimportant
that anyoffensesandresultingdiscipline bemade
knownthroughoutthe organization.Theseandthe
previoussuggestionsfor managing
information
liability are summarized
in Table2.
Valueof legal counsel
Whilethe legal postureof anysingle organization will differ fromcaseto case,whatis commonamongorganizations is the need for
managers’awareness
of the possible legal implications of their andtheir employees’
actions.
Suchawareness
of potentialliabilities shouldpromoteseekinglegal counselwhowill be able to
addressthe specifics of the caseenvironment
and the development
of suitable policies.
Theanalysisof keyareasof informationliability
in this article is only intendedto increasethe
awarenessof IS managers
and general management.It mustbe notedin the strongestpossible
termsthat this analysis is not intended as a
substitutefor legal counsel.Legalcounselshould
be retained for a variety of reasons.Theexact
statusof thelegal liability of a givenorganization
will behighly situation-specific;local andstate
lawsmaybeapplicableas well as certainindustry
regulations.Theorganization’s
legal advisorswill
be in the bestposition to assessthis liability.
Legalcounselwill also be invaluablein drawing
up internal policies that can reducethe legal
culpability of the organizationin casesof informationliability. Finally, legal counselcanhelp
keepthe organizationup to date on the expected
changes
overtimeof court interpretationsin this
area.
MIS Quarterly/June 1990 153
KeyInformation
Liability Issues
Table 2. Summary
of Organizational
Responses
to Limit InformationLiability
Overall Recommendations
for IS and
General Management
¯ Encourageheightened awareness of
potentialinformation
liabilities
¯ Establish a committee:
-- to monitorlegal developments
in this
area
-- to formulate policy for the
organization
-- to assuretraining in andenforcement
of the policy
¯ Seeklegal counselwheneverissues of
information
liability arise
Protection of Intellectual Property
Rights
¯ Adoptsoftwareon an organization-wide
basis wheneverpossible
¯ Requireauthorization for use of nonstandardsoftware
¯ Install networks
that limit useandcopying of software
¯ Establishcentralcontrolof subscriptions
to commercialdatabases
¯ Provide user training on contractual
limitations of use of databases
¯ Establishspecific penaltiesfor misuseof
software and databases
Protection of Individual Rights to
Privacy
¯ Encouragethe developmentof trusted
employees
throughpolicies and training
¯ Manage
personaldata throughoutits life
cycle
References
Aalders,J.C.H., Herschberg,
I.S. andVanZanten,
A. Handbook
for InformationSecurity(2 vols.),
North-Holland, Amsterdam,
1985.
AppleComputer
Inc. v. Frank/in Computer
Corp.,
714FederalReporter2d, 1983,pp. 1240-1255.
Beheshtian,M. "Computer
CopyrightLaw," Journal of SystemsManagement
(37:9), September
1986,pp. 6-11.
Bequai,A. Computers
+ Business= Liabilities:
A Preventive GuideforManagement,
Washington Legal Foundation,Washington,DC,1984.
154 MIS Quarterly/June 1990
Bequai,A. Technocrimes,
LexingtonBooks,Lexington, MA,1987.
BloomBecker,
J. ComputerCrime, ComputerSecurity, Computer
Ethics, National Centerfor
Computer
CrimeData, Los Angeles,CA, 1988.
Boyer, H.A. "Using Softwarein ComputerNetworks:AvoidingLiability for Copyright
Infringement,"JurimetricsJournalof Law,Scienceand
Technology
(28:3), Spring1988,pp. 275-288.
Brickman,B.K. "TheCorporateComputer:A Potential Timebomb,"
FinancialExecutive(51:4),
April 1983,p. 20.
Burnside, R.S. "TheElectronic Communications
PrivacyAct of 1986:TheChallenge
of Applying
Ambiguous
Statutory Languageto Intricate
"Telecommunication
Technologies," Rutgers
Computer& TechnologyLawJournal (13:2),
Winter 1987, pp. 451-517.
Bysouth,P.T. "StoneTabletsto FloppyDisksand
the Questionof Downloading,"
JournaloflnformationScience(1.1:3), 1985,pp. 139-142.
Canning,H.W.W.
"Protection of PersonalDatain
’the UnitedStates," TheInformationSociety
(3:2), 1984,pp. 113-130.
Caporael, L.R. "Computers,Prophecy,and Experience:A Historical Perspective,"Journalof
SocialIssues(40:3), Fall 1984,pp. 15-29.
Computer
SoftwareCopyrightAct of 1980.94Stat
3015,17 U.S.C., 1980.
CopyrightStatute of 1976.17 U.S.C., 1976.
Couger,J.D. "PreparingIS Studentsto DealWith
Ethical Issues," MISQuarterly (13:2), June
1989, pp. 211-218.
Counterfeit AccessDevicean~l ComputerFraud
andAbuseAct of 1984.18 U.S.C., 1984.
Demas,S.G. "Copyright and Legal Considerati0ns," in PublicAccess
Microcomputers
in AcademicLibraries, Howard
Curtis (ed;), American
Library Association, Chicago,iL, 1987, pp.
59-79.
Denning,D.E. andDenning,P.J." DataSecurity,"
Computing
Surveys(11:3), September
1979,pp.
227-249.
Denning,D.E., Denning,PoJ.andSchwartz,M.D.
"TheTracker:A Threatto Statistical Database
Security,"ACM
Transactionson DatabaseSystems(4:1), March1979,pp. 76-96.
Diamond
v. DiehrandLutton.450 U.S. 175, 101
S, Ct. 1048,1981.
Dreyfuss,R.C.andLeebron,D.W."Foreword:Privacy and Information Technology," Annual
SurveyofAmericanLaw1986, June 1987, pp.
495-509.
KeyInformation
Liability lssues
Duchesne,R. "Copyright, Ownershipof, in
Machine-Readable
BibliographicData," in Encyclopediaof Library andInformationScience,
Vol. 40, Allen Kent(ed.), MarcelDekker,New
York, NY, 1986,pp. 33-43.
Dun& BradstreetInc. v. Greenmoss
BuildersInc.
472 U.S. 749, 105 S. CT. 2939,1985.
Everest, G.C.DatabaseManagement:
Objectives,
System Functions, and Administration,
McGraw-Hill,NewYork, NY, 1986.
FederalLibrary andInformationCenterCommittee. "TheInternationalFlowof Scientific and
TechnicalInformation," Government
Information Quarterly(3:2), 1986,pp. 163-178.
Fields, A.R.andSchiller, Z."ElectronicDataCould
MakeTroublefor the Law," BusinessWeek,October 27, 1986,pp. 128, 132.
Finner, W."Privacyof Employment
Records
in the
Private Sector," AnnualSurveyof American
Law1986, June 1987, pp. 569-585.
Flaherty,D. H o Privacyand
DataProtection:An
ternational Bibliography,Knowledge
Industry,
WhitePlains, NY,1984.
Freed, R.N. "ComputerFraud--A Management
Trap," Business Horizons, June 1969, pp.
25-30.
Freedman,
R. "TheRight of Privacyin the Ageof
ComputerData andProcessing," TexasTech
LawReview(13), 1982, pp. 1361-1363.
Garman,
N. "Downloading...Still a Live Issue?"
Online(10:4), July 1986,pp. 15-25.
Gemignani,M.C. Lawand the Computer,CBI
Publishing, Boston,MA,1981.
Goldstein,M.L. "Information Law:Meetthe New
Entrepreneur,"Industry Week,April 28, 1986,
pp. 65-67.
Gregurgas,
F.M."Intellectual PropertyProtection
in the USA,"InformationAge(9:4), October
1987, pp. 215-219.
Hal RoachStudios,Inc. v. RichardFiener& Co.
1984CopyrightLawDecisions(CCH)para. 25,
709S.D.N.Y., 1984.
Hoffer, J. andStraub,D., Jr. "The9 to 5 Underground:Are YouPolicing ComputerCrimes?"
Sloan Management
Review (30:4), Summer
1989,pp. 35-44.
Huber,G.P. "TheNatureand Designof Post-Industrial Organizations,"Management
Science
(30:8), August1984,pp. 928-951.
J akes,J.M.andYoches, E.R."LegallySpeakin g:
BasicPrinciplesof PatentProtectionfor Computer Software," Communications
of the ACM
(32:8), August1989,pp. 922-924.
Jones,J.W. andMcLeod,
R., Jr. "TheStructure
of ExecutiveInformationSystems:AnExploratory Analysis," Decision Sciences(17:2),
Spring 1986,pp. 220-248.
Jurkat, M.A. "Computer
CrimeLegislation: Survey and Analysis," AnnualSurveyof American
Law1986, June 1987, pp. 511-544.
Koenig, C.F. "RecentCopyright Developments
Relating to ComputerSoftware and Databases,"Journalof the Computer
LawAssociation, Fall 1986,pp. 5-10.
LaPlante,A. "Liability in the InformationAge,"
InfoWorld, August18, 1986,pp. 37-38.
Lautsch, J.C. AmericanStandardHandbook
of
Software BusinessLaw, RestonPublishing,
Reston, VA, 1985.
Mason,R.O."Four Ethical Issuesof the Information Age," MISQuarterly (10:1), March
1986,pp. 4-12.
McFarlan,F.W."Editor’s Comments,"
MISQuarterly (12:1), March1988,pp. iii-vi.
McKibben,W.L. "WhoGets the Blamefor ComputerCrime?"Infosystems
(5:7), July 1983,pp.
34-36.
Mika, J.J. and Shuman,
B.A. "Legal IssuesAffecting Libraries and Librarians," American
Libraries (108), February1988,pp. 108-112.
Mylott, T.R. Computer
Lawfor Computer
Professionals, Prentice-Hall, Englewood
Cliffs, NJ,
1984.
Mykytyn,K., Mykytyn,P.P., Jr. and Slinkman,
C.W."Expert Systems:A Questionof Liability?" MISQuarterly (14;1), March1990, pp.
27-42.
NECCorporation v. Intel Corporation.
C-94-20799-WPG,
N.D. CA, 10 U.S.P.Q. 2d
1177, 1989.
Nimmer,M.B. and Geller, P.E. International
CopyrightLawandPractice, MatthewBender,
Albany; NY, 1988.
OECD
(Organisation for EconomicCo-Operation
and Development).Computer-Related
Crime:
Analysisof Legal Policy, OECD,
Paris, 1986.
Oberdorfer,D. "West,Mead
to Settle Disputes,"
Star Tribune(Minneapolis),July 22, 1988,
1D.
Crime,Scribner,
Parker,D.B. Fighting Computer
New York, NY, 1983.
Parker,D.B. "Ethicsfor InformationSystems
Personnel," Journalof InformationSystems
Management(5:3), Summer
1988, pp. 44-48.
Peoplev. HomeInsurance Co. 197 Colo. 260,
591 P.2d 1036, 1979.
MIS Quarterly/June 1990 155
KeyInformation
Liability Issues
RandMcNally & Co. v. Fleet Management
Systems,Inc. N.D.II1., 1986.
Regan,P.M. "Privacy, Government
Information,
and Technology," Public Administration
Review, November/December1986, pp.
629-634.
Regan,P.M. "FromPaperDossiersto Electronic
Dossiers:Gapsin the PrivacyAct of 1974,"Ofrice: Technologyand People(3), 1988, pp.
279-296.
Ricketts, J.A. "Powers-of-Ten Information
Biases,"MISQuarterly(14:1),March1990,pp.
63-77.
Roev. Wade.410U.So113, 153, 93 S. Ct. 705,
727, 1973.
SASInstitute Inc. vo S&HComputer
Systems.
605
F. Supp.816, 225 U.S.P.Q.916, 1985.
Simpson,J. "Information Management:
Issues
for the Late 80s," ASLIBInformation,September 1987, pp. 215-219.
Sprague,R.H. and McNurlin, B.C. Information
SystemsManagement
in Practice, PrenticeHall, Englewood
Cliffs, NJ, 1986.
Steinberg, R. "NECv. INTEL:TheBattle over
CopyrightProtection for Microcode,"Jurimetrics Journal (27:2), Winter 1987, pp.
173-199.
Straub, D.W.,Jr. "Controlling Computer
Abuse:
AnEmpiricalStudyof Effective SecurityCountermeasures," Proceedings of the Eighth
International Conference
on InformationSystems, December
6-9, 1987,Pittsburgh, PA,pp.
277-289.
Straub, D.W.,Jr. and Nance,W.D."Discovering
and Disciplining Computer
Abusein Organizations: A Field Study," MISQuarterly(14:1),
March1990, pp. 45-60.
Straub, D.W.,Jr. and Wetherbe,
J.C. "Information Technologies
for the 1990’s:AnOrganizational Impact Perspective," Communications
of the ACM(32:11), November1989, pp.
1328-1339,
U.S. Congress,Office of TechnologyAssessment. Federal Government Information
Technology:Electronic RecordSystemsand
Individual Privacy, OTA-CIT-296,
U.S. GovernmentPrinting Office, Washington,
D.C., June
1986.
UnitedStatesv. Miller. 425 U.S. 435, 1976.
Walton,C. and Durham,
A. "Information Systems
Liability," Journal of SystemsManagement
(39:10), October1988,pp. 36-41.
Wardv. SuperiorCourtof California. 3 Computer
L. Serv. Repo(Callahan)206Cal. Super.Ct.,
1972.
156 MIS Quarterly/June 1990
Warren,S.D. and Brandeis, L.D. "The.Rightto
Privacy," HarvardLawReview(4), December
15, 1890, pp° 193-220.
Well, B.H. andPolansky,B.F. "Copyright,Serials
and the Impacts of Technology," Serials
Review,Summer/Fall1986, pp. 25-32.
WestPublishing Company
v. MeadDataCentral
799 F.2d 1219, 1986.
Whalenv. Roe.429U.S. 589,595,97 S. Ct° 869,
874, 1977.
Wharton, L. "Legislative Issues in Computer
Crime," HarvardJournalon Legislation(21:1),
Winter 1984, pp. 239-254.
WhelanAssociatesInc. v. Jaslow Dental Lab.
oratorylnc. 797 F.2d 1222,230 U.S.P.Q.481,
1986.
Yoches,E°R. and Levine, A.J. "Legally Speaking: BasicPrinciples of CopyrightProtection
for ComputerSoftware," Communications
of
the ACM(32:5), May1989, pp. 544-545.
About the Authors
Detmar
W.StraubJr. is assistant professor of
management
information systemsat the Curtis
L. CarlsonSchoolof Management
at the University of Minnesota.Hehas publisheda number
of studies in the computersecurity management
arena,but his researchinterests extendas well
into emerginginformation technologies and
theory andmeasurement
of key IS concepts.Besides prior publicationin MISQuarterly,he has
also beenpublishedin Communications
of the
ACM,Sloan Management
Review, Journal of
MIS, and Computers
& Society. His professional
associationsandresponsibilities include: associate director, MISResearch
Center,University
of Minnesota;associatepublisher, MISQuarterly; editorial boardmemberships;
andconsulting
with the defenseand transportationindustries.
Rosann
Webb
Collinsis a doctoral candidatein
management
information systemsat the Curtis
/.. CarlsonSchoolof Management
at the University of Minnesota.
Hercurrentresearchinterests
center on the impactof information technology
on knowledge
workand on the legal and ethical
issues in computing.Shehas publishednumerous articles on the library andeducationalapplication of computers,
includingarticles in the
Journalof the American
Societyfor Information
Science,International Library Review,andthe
Journalof Research
on Computing
in Education.