Colorado Woman Sues To Hold Web Crawlers To Contracts - InformationWeek
IoT
IoT
Software // Information Management
News
3/16/2007
05:08 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Colorado Woman Sues To Hold Web Crawlers To Contracts

Web site owner Suzanne Shell's lawsuit against the Internet Archive poses a question: "Can software programs be held liable for their actions?"

Computers can enter into contracts on behalf of people. The Uniform Electronic Transactions Act (UETA) says that a "contract may be formed by the interaction of electronic agents of the parties, even if no individual was aware of or reviewed the electronic agents' actions or the resulting terms and agreements."

This presumes a prior agreement to do business electronically.

So what constitutes such an agreement? The Internet Archive, which spiders the Internet to copy Web sites for posterity (unless site owners opt out), is being sued by Colorado resident and Web site owner Suzanne Shell for conversion, civil theft, breach of contract, and violations of the Racketeering Influence and Corrupt Organizations act and the Colorado Organized Crime Control Act.

Shell's site states, "IF YOU COPY OR DISTRIBUTE ANYTHING ON THIS WEB SITE, YOU ARE ENTERING INTO A CONTRACT," at the bottom of the main page, and refers readers to a more detailed copyright notice and agreement. Her suit asserts that the Internet Archive's programmatic visitation of her site constitutes acceptance of her terms, despite the obvious inability of a Web crawler to understand those terms and the absence of a robots.txt file to warn crawlers away.

A court ruling last month granted the Internet Archive's motion to dismiss the charges, except for the breach of contract claim.

In a post on law professor Eric Goldman's Technology & Marketing Law blog, attorney John Ottaviani, a partner at Edwards & Angell in Providence, R.I., says the issue is "whether there was 'an adequate notice of the existence of the terms' and a 'meaningful opportunity to review' the terms."

If a notice such as Shell's is ultimately construed to represent just such a "meaningful opportunity" to an illiterate computer, the opt-out era on the Net may have to change. Sites that rely on automated content gathering like the Internet Archive, not to mention Google, will have to convince publishers to opt in before indexing or otherwise capturing their content. Either that or they'll have to teach their Web spiders how to read contracts.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll