首页    期刊浏览 2024年11月06日 星期三
登录注册

文章基本信息

  • 标题:Holding Internet Service Providers accountable: would indirect liability reduce costly cyberspace externalities?
  • 作者:Lichtman, Douglas
  • 期刊名称:Regulation
  • 印刷版ISSN:0147-0590
  • 出版年度:2004
  • 期号:December
  • 语种:English
  • 出版社:Cato Institute
  • 摘要:This is surprising. After all, while it surely would be unwise to punish 1sps for every bad act committed by their subscribers and it would be equally foolish to force service providers to play policeman in instances where the costs of doing so would overwhelm any plausible benefits, legal liability can take more modest forms. With respect to copyright infringement, for instance, why not require ISps to deliver warnings to accused subscribers? Infringers are anonymous Internet Protocol (IP) addresses to copyright holders, so copyright holders have a hard time delivering warnings themselves. But an ISP can easily match an accused IP address to a real-world name and billing address, and thus an tsp can easily deliver a warning that would remind an accused subscriber that piracy is illegal and that "the complaining copyright holder might take his evidence to court, where we will be forced to reveal your identity and provide further evidence of your alleged bad acts." Imagine the shiver that would go down an infringer's spine upon finding that note in his mailbox, complete with a specific accusation that he downloaded Madonna last Tuesday at midnight from his bedroom computer.
  • 关键词:Computer crimes;Internet service providers;Legal liability;Liability (Law)

Holding Internet Service Providers accountable: would indirect liability reduce costly cyberspace externalities?


Lichtman, Douglas


INTERNET SERVICE PROVIDERS (ISPS) ARE LARGELY immune from legal liability for the various forms of online malfeasance to which they contribute. America Online, for example, paid Matt Drudge $3,000 a month to write an online gossip column; but when Drudge used the column to accuse Clinton appointee Sidney Blumenthal of spousal abuse, a federal judge ruled that AOL bore no responsibility for the smear. Similarly, Verizon Communications today counts among its subscribers an untold number of peer-to-peer pirates, yet the firm faces no financial liability for copyright infringement online and, indeed, does almost nothing to help copyright holders defend their work.

This is surprising. After all, while it surely would be unwise to punish 1sps for every bad act committed by their subscribers and it would be equally foolish to force service providers to play policeman in instances where the costs of doing so would overwhelm any plausible benefits, legal liability can take more modest forms. With respect to copyright infringement, for instance, why not require ISps to deliver warnings to accused subscribers? Infringers are anonymous Internet Protocol (IP) addresses to copyright holders, so copyright holders have a hard time delivering warnings themselves. But an ISP can easily match an accused IP address to a real-world name and billing address, and thus an tsp can easily deliver a warning that would remind an accused subscriber that piracy is illegal and that "the complaining copyright holder might take his evidence to court, where we will be forced to reveal your identity and provide further evidence of your alleged bad acts." Imagine the shiver that would go down an infringer's spine upon finding that note in his mailbox, complete with a specific accusation that he downloaded Madonna last Tuesday at midnight from his bedroom computer.

The copyright and defamation immunities to which I allude have been in place for years and would be difficult to displace. I therefore want to focus instead on what is shaping up to be the next immunity battle: the recent push to immunize Internet service providers for their role in the propagation of worms, viruses, and other forms of malicious computer code. Drawing analogies to copyright and defamation, com'ts have in recent years read the relevant statutes and interpreted common law principles such that ISps are today almost entirely unaccountable for issues of cybersecurity. But, as I will argue here, immunity in this instance is hard to defend on policy grounds and it is sharply inconsistent with the conventional logic of indirect liability.

YOUR BROTHER'S KEEPER?

Indirect liability is said to attach in instances where the law holds one party liable for a wrong committed by another. A familiar setting is the employment relationship, where an employer can be held liable for torts committed on the job by his employees. But other examples abound. Bars are sometimes held liable when bartenders serve alcoholic beverages to patrons who later harm others while driving under the influence. A motor vehicle owner can be held to account if a driver to whom he loans his car ends up causing an accident. Landlords are sometimes on the hook if they take inadequate precautions against criminal activity that harms tenants. Even product liability law has this same basic structure: A buyer might use a dangerous product in a negligent manner and cause injury to a third party; if the victim can show that the accident would not have occurred had the manufacturer employed better product design, the victim might be able to recover from the manufacturer instead of (or in addition to) the buyer.

LIABILITY BY CONTRACT Conventional economic analysis suggests that an explicit rule imposing indirect liability is not necessary when two conditions are simultaneously met: first, the relevant direct actors are subject to the effective reach of the law, which is to say that the employees, drivers, and criminals discussed in the previous examples are easy to identify and have assets that are sufficient to pay for any harm caused; and, second, transaction costs are such that the direct actors can use contract law to shift responsibility to any party that might otherwise be an attractive target for indirect liability. The intuition is that, when those conditions are satisfied, the various parties can create indirect liability by contract and, albeit subject to some minor constraints, they will do so where that would be efficient.

To see this, consider the employment setting in more detail. If the driver of a delivery van is himself easy to identify and, further, the driver has adequate resources to pay for whatever harm he might cause in the event of an accident, then there is no strong argument for imposing liability on his associated retailer. No matter what the legal rule, the driver and the retailer will efficiently allocate liability through the employment contract. Thus, if the optimal rule would impose on the retailer the obligation to inspect every delivery van each morning or to test employees randomly for drug and alcohol abuse, the driver and retailer will agree by contract to those monitoring activities. Similarly, to the extent that driving the truck poses an unavoidable risk of injury to others, the driver will either shift that risk to the employer through an indemnity clause or assume that risk himself and demand higher wages in compensation. The legal rule in this situation is just a default; where transaction costs are low and employees have adequate resources, contracts allow private parties to shift and divide legal responsibility efficiently.

LIABILITY BY LEGAL RULE Things change when either of the conditions identified above fails to hold. For instance, where contracts are easily negotiated between the driver and the retailer but the driver lacks resources, the absence of indirect liability would tempt the retailer to leave tort liability on the shoulders of the driver, in essence using the driver's financial limitations as a cap on legal liability. Similarly, in a situation where contracts are possible but a negligent employee's identity cannot be ascertained--for example, witnesses report that a firm's van hit a pedestrian but no one saw the driver--again the absence of indirect liability would limit victim recovery, putting the driver and retailer in a position where, taken together, they would not take adequate care. Where the driver has adequate resources but the parties cannot contract effectively, the legal rule clearly matters as well, this time because the inability to contract would make it impossible for the parties to shift responsibility as needed.

The interesting cases are, therefore, those where either the relevant bad actors are beyond the reach of the law or transaction costs make reallocation by contract implausible. For those cases, economic analysis identifies two additional considerations: first, indirect liability might be attractive where one party is in a good position to detect or deter another's bad act; and, second, indirect liability might be attractive where liability would serve to encourage a party to internalize some significant negative externality unavoidably associated with its activities.

Start with the first consideration, that indirect liability might be attractive where the potentially liable party is in a good position to detect and deter bad acts. That is, for example, one of the main reasons why employers are responsible for torts committed by their employees. An employer can control his employees. He can monitor their behavior, screen them before entrusting them with dangerous equipment, develop compensation schemes that encourage them to exercise due care, and otherwise beneficially influence their on-the-job decisions. The prospect of indirect liability pressures employers to make use of those mechanisms and, in that way, to minimize the expected cost of accidents.

Turn now to the second consideration. Even where a retailer can do nothing more to ensure that the drivers of its delivery vans take appropriate care, it is likely efficient to have the retailer pay at least some fraction of the costs of any delivery accidents. The reason is that this forces the retailer to account for accidents when deciding the price and frequency of deliveries. If accidents are unavoidable, price will rise and quantity will fall, which is exactly what should happen given this unavoidable harm. This is referred to in the literature as an effect on "activity level," which emphasizes that the purpose of liability here is not to encourage precautions but instead to influence how often the harmful activity in question takes place.

These factors--call them "control" and "activity level"--help to identify cases where indirect liability might be attractive. The actual question of whether liability should be imposed, however, typically turns on other, often setting-specific, considerations. Thus, while the telephone company surely has the ability to deter crank phone calls by more carefully monitoring calling patterns, it is unlikely that indirect liability would be attractive, both because of obvious privacy concerns and because of worries that, in its attempts to address the problem of crank calls, the telephone company would inadvertently interfere with substantial legitimate telephone activity. To reject indirect liability in this situation is to announce that the costs of crank telephone calls are not sufficiently high compared to the costs of indirect prevention. Similarly, the mere fact that an airport provides a venue from which airlines generate pollution and noise does not itself justify imposing liability for that harm. The reason is that private parties who own property near the airport themselves make decisions that increase and decrease the importance of airport externalities; in a world where the airport absorbed the costs in full, neighbors might inefficiently decide to use their properties to raise livestock or care for the elderly, two uses so sensitive to noise and pollution that they likely should be disfavored given the proximity of the airport.

That said, the control and activity level factors do helpfully sketch the contours of efficient indirect liability rules. For instance, these factors make clear that employers should not typically be held accountable for torts committed by employees acting outside the scope of employment. The employer has no special advantage when it comes to stopping its employees from abusing their spouses or picking fights at bars. Moreover, neither activity is rightly understood as a consequence of the employer engaging in its core business. Whether the employer is in its current line of business or another, the employee is probably just as likely to commit those bad acts. Thus, except in exceptional circumstances, neither the control nor the activity level rationale fits, and liability for torts committed outside the scope of employment is therefore inappropriate.

INDIRECT LIABILITY APPLIED TO ISPS

The conventional economic account makes clear that private parties cannot create the optimal liability regime on their own in instances where the party directly responsible for the bad act is beyond the effective reach of the law, or in instances where transaction costs make contract negotiations implausible. The conventional account further stresses that liability should be considered in instances where one party has the ability to deter or detect the bad acts of another, and also where liability can serve to encourage a party to internalize some significant negative externality associated with its activities. As I will argue here, violations of cybersecurity take place in a setting where most or all of those conditions seem likely to hold.

BEYOND THE LAW'S REACH Individuals who originate malicious computer code are typically far beyond the reach of conventional law. For one thing, they are hard to identify. Sophisticated saboteurs use the Internet's topology to conceal their tracks by routing messages through a convoluted path that is difficult for authorities to uncover. Moreover, by the time a computer virus or worm is detected, the trail often is cold. Internet pests like worms and viruses are routinely programmed to sit idle for a period of time before triggering. That allows mischief-makers to time their attacks to coincide with important world moments--the start of the new millennium, for example--and also affords the troublemakers time to disappear. The fact that many hackers reside overseas only exacerbates the problem, introducing issues of jurisdiction and the need for international cooperation.

Even if caught, individuals who create malicious computer code rarely have sufficient assets to pay for the losses they impose. Prominent Internet worms and viruses impose billions of dollars worth of damage. Obviously, hackers will rarely have resources sufficient to pay up. Criminal liability could, in theory, substitute as a deterrent; however, where the risk of apprehension is sufficiently small and the magnitude of the loss is sufficiently large, criminal punishments often cannot be made high enough to deter adequately. Juries, after all, are reluctant to impose too large a sentence for non-violent crime and, besides, long-term incarceration is expensive to the state.

Interestingly, concerns about bad actors being beyond the reach of the law do not apply to the individuals and entities who, instead of creating an Internet pest, inadvertently propagate one. An example might be a firm whose server is run in such a way that an outside party can easily take it over, or an unsophisticated user who installs a malicious program when prompted to do so by an anonymous e-mail solicitation. There is no reason to believe that careless firms and users lack the resources necessary to pay for whatever share of the harm they cause; moreover, neither would likely be that hard to track down. Computer users who fail to exercise appropriate caution when opening e-mail attachments are hardly sophisticated enough to cover their tracks in the event of a problem. The only sense in which those bad actors are beyond the reach of law is the practical concern about the costs of identifying and suing them as compared to the fraction of the damages for which they might be held legally responsible. Beyond that, parties who propagate but do not create malicious code are not beyond the reach of the law; although, as will become clear below, there are other reasons why indirect liability might be warranted even in those sorts of cases.

CONTRACTS AND TRANSACTION COSTS A second consideration identified in the baseline analysis was the ability of the relevant parties to write contracts. Applied here, the point is that ISPs in theory can use contract law to create for themselves system-wide liability; each would agree to be liable to the others for any harm caused by its subscribers. So why are those obligations not in place, and why should the law respond by imposing them?

An intuitive answer is that there are so many ISPs in operation that the transaction costs of negotiating the necessary web of contracts would be prohibitive. But that explanation is only marginally satisfying, in that ISPS are already all part of a complicated and fully inclusive network of contracts, specifically the "peering" and "transit" agreements under which the various private owners of the Internet backbone agree to carry traffic one to another. A more satisfying explanation is that any network of contracts focusing on issues of cybersecurity would be perpetually out of date, and updating such a complicated web of interdependent security obligations would be all but impossible given the number of parties involved and the complicated questions any update would raise regarding the appropriate adjustments to the flow of payments.

Still, there are puzzles lurking. Microsoft has licensing agreements with a huge percentage of home computer users, and thus the firm seems to be in the perfect position to ensure that users take sensible precautions like updating their virus software and downloading system patches. Microsoft could even make those obligations self-executing by blocking Internet access for any computer whose software is (say) more than 10 days out of date. That would be a minimally intrusive way to ensure that users keep their precautions current, a bit like mandatory vaccinations for school children. Instead, Microsoft merely offers updates to its customers and allows each customer to decide whether the private benefits of a given update warrant the private costs in terms of time and inconvenience. The result might very well be a classic case of externalities leading to suboptimal behavior: Microsoft's customers as a group would be better off were each to update regularly but, without coordination, each customer opts to update less frequently. This suggests that there must be a bigger problem with contractual solutions--public relations? privacy concerns? security?--although in truth the explanation might be that Microsoft is at the moment in too precarious a position vis-a-vis worldwide antitrust authorities to do anything that might be perceived as the use of its market power to foist additional software on unwilling consumers.

DETECTION AND DETERRENCE Indirect liability is primarily attractive in cases where the indirectly liable party can detect, deter, or otherwise influence the had acts in question. ISPs seem to be a natural choice under this criterion. Consider, for example, an ISP through which a troublemaking user obtains access to the Internet. Such an ISP can detect criminal behavior by analyzing patterns of use, much as a bank can detect credit card theft by monitoring each customer's pattern of purchases. Easiest to catch would be patterns that are intrinsically suspicious, such as a continuous stream of communications from a home user or the repeated appearance of identical computer code attached to a large number of outgoing e-mail messages. But an ISP could also detect patterns that are suspicious because they represent a radical departure from the user's ordinary behavior. The ISP would need only maintain a profile that captures in broad strokes each subscriber's rough practices, and then evaluate recent activity against the historical backdrop. Again, credit card companies actually do this, and ISPS could do it too.

Another option might be to record a subscriber's data stream and store that information, ideally in encrypted form, for a period of time. Many offenders could be traced if ISPs were to record traffic in this manner. But ISPs do not routinely record traffic today, both because of privacy worries and because of the enormous volume of communications. Legal rules, however, could ease those concerns. For instance, the law could require that ISPs store the information securely and release it only to law enforcement officials, thus lessening the worry that stored information would leak out by accident or he used for impermissible purposes. The law could also require that ISPs record information about the data communication--size, duration, timing, and so on--but not its substance, thus protecting privacy and reducing volume. The law could even require ISPs to record information only when particular triggers raise suspicion, or perhaps only in response to specific government requests.

I could go on for some time with ideas along these lines. The goal for now, however, is not to describe the precise precautions that 1sps should or will take in response to liability, but instead to simply make clear that ISPs are in a good position to influence the number and severity of cyber-attacks. Indirect liability would pressure them to take that role seriously, thereby encouraging the people who have the proper technical expertise--not me--to first identify and then implement whatever turn out to be the most effective precautions.

ACTIVITY LEVELS In theory, indirect liability can be attractive independent of its role in encouraging detection and deterrence because it encourages the responsible party to account for negative externalities unavoidably associated with the relevant product or service. In practice, however, I doubt that I would favor ISP liability on this argument alone. My hesitation does not derive from any doubts over whether ISPs impose negative externalities as they enroll new customers and offer new services. Of course they do, given that any new subscriber can turn out to be a careless user, and any new service can quickly devolve into a portal for Internet contagion. My hesitation instead derives from the fact that there are drawbacks to imposing liability solely because of negative externalities, and those drawbacks are significant in this particular application.

One drawback associated with the activity level rationale is that it might distort behavior by forcing parties to internalize negative externalities while they ignore equally important positive ones. As applied here, the negative externality is the aforementioned concern that each new subscriber could materially reduce cybersecurity by engaging in unsafe practices or intentionally introducing an Internet pest. The comparable positive externality is that each subscriber can just as plausibly turn out to be a homemaker who makes significant purchases online or a college student who contributes to the development of open source software. Liability that encourages ISPs to take precautions is one thing; but a legal rule that relentlessly brings home negative externalities while completely failing to account for positive externalities has no claim at creating optimal incentives.

A second drawback to the activity level rationale is the concern that imposing liability on one party almost inevitably discourages another party from taking adequate precautions. Applied here, the worry is that imposing liability on ISPs might inefficiently reduce subscriber incentives to install virus protection software and maintain adequate backups. That is a concern associated with indirect liability no matter what the rationale; but the concern resonates with particular force in cases where indirect liability is being used solely as a means by which to influence the liable party's activity level. The reason: these are cases where (by assumption) the liable party cannot take additional cost-justified precautions, so reductions in the level of care taken by other parties warrant considerable weight.

A third argument against imposing strict liability solely because of activity level concerns is that activity levels in this setting are already sufficiently suppressed. Worms, viruses, and the like reduce the allure of Internet access and thus discourage Internet use no matter what the liability rule. This is a natural reduction in activity levels and, while there is no reason to believe that it leads to efficient levels of activity, the existence of this natural disincentive does combine with the concerns discussed above to make any additiona4 reduction seem not only less important, but also more difficult to calibrate.

All that said, activity level concerns can be important, and hence I harbor some uncertainty over where to draw the line. Consider Microsoft again. Even if the software giant cannot take additional precautions against Internet contagion, the price increase that would likely result from an increase in liability would itself have social benefits in that the resulting price would better reflect the relative value of the Windows operating system as compared to alternatives like Apple Computer's operating system, Mac OS. Many computer enthusiasts believe that Mac OS is more stable and secure than Windows. If so, that benefit is not today adequately captured in the products' relative prices. By increasing liability and hence disproportionately increasing the price of Windows software, however, an indirect liability rule would help to solve the problem, ultimately driving business toward the more secure and efficient alternative. More generally, in situations where several competing products are each capable of generating a comparable positive externality, it might be attractive to use indirect liability as a way of pressuring firms to select prices that accurately reflect each product's unique negative externalities.

OBJECTIONS

My argument thus far is that indirect liability is attractive primarily because ISPs are in a good position to deter the various acts associated with cyber-insecurity, and perhaps secondarily because liability would force ISPs to internalize some of the negative externalities they impose. Further, I have argued that any indirect liability regime needs to be created by law, rather than by contract, because many of the relevant direct bad actors are beyond the reach of law and because transaction costs are a serious obstacle to contractual solutions in any event.

Consider now the two primary objections to this analysis: first, that liability will cause ISPs to overreact and thus exclude subscribers who should be online; and second, that liability will inefficiently interfere with subscriber efforts at self-help.

OVERZEALOUS PROVIDERS The most common objection to ISP liability is that it would cause ISPs to raise prices, and--while those higher prices might better represent the real costs of Internet access--the higher prices would also drive marginal subscribers out of the market. That end result is inefficient, according to this argument, because advertisers, merchants, friends, and various other Internet entities might in the aggregate prefer that the marginal customers remain. The problem is thus just an externality: a mismatch between the private incentive to subscribe to Internet service and the social benefits made possible by each new subscription.

My first response is that this concern, while plausible, seems overdrawn. Many of what at first sound like externalities turn out to be influences that are already accounted for in a subscriber's decision of whether to subscribe. For instance, I certainly benefit from the fact that my mother is regularly online and hence available for easy e-mail correspondence, but that is not an externality because my mother and I have a rich relationship through which I can indicate to her how much I value her presence and, if necessary, contribute in cash or kind toward the monthly cost of her subscription. So, too, the online bookseller Amazon.com benefits from Mom's Internet access, but Amazon also has ways of helping her to internalize that effect, for instance by rewarding her with free shipping on her purchases. This is obviously not to say that all externalities are internalized, but only to suggest that the problem is not as stark as it might at first seem, and not all that different from a million other markets where incidental positive externalities slip through the decision-making cracks.

Second, even if there are non-trivial positive externalities at play, note that it would be counterproductive to respond to the problem by reducing ISP liability from its otherwise optimal level. Restaurants, for example, create positive externalities by drawing crowds that in turn patronize neighboring businesses and stimulate the local economy. Yet no one suggests that, in response, local authorities should stop enforcing the health code; that response would just drive customers away. Similarly, inventors produce devices that stimulate further innovation; society in return rewards them by granting valuable property rights called patents. Does anyone really believe that society should instead shield inventors from liability if their inventions cause harm? In short, positive externalities are not typically compensated by legal immunity, because even an entity that produces positive externalities should still take due care while engaged in its beneficial activities. There is nothing special in this respect about the Internet. There are many mechanisms that might sensibly be used to encourage ISPs to create positive externalities--tax breaks, infrastructure subsidies, and so on--but immunizing ISPs from indirect liability is unlikely to be one of them.

SUBSCRIBER SELF-HELP A second objection to ISP liability is that it will reduce subscriber incentives to buy antivirus software, install firewalls, and similarly engage in prudent self-help. That undoubtedly is true. However: the logical implication is not complete immunity for ISPs. Instead, liability should be tailored in light of this possibility, the goal being to encourage service providers to adopt the precautions that they can provide most efficiently while leaving any remaining precautions to subscribers and other market actors. This is a standard scenario. Pedestrians can exercise care in crossing the street. They can also stay at home rather than venturing near the roads, and they can wear unfashionably bright attire so as to increase the odds of being seen at night or during inclement weather. Yet no one suggests that, because pedestrians can engage in their own forms of precaution, automobile drivers should be immune from tort liability.

The same intuitions apply here. The fact that multiple parties can take precautions against malicious computer code might argue for some form of a balanced liability regime that leaves both subscribers and ISPs with some incentive to take care, but that fact does not in any way argue for complete immunity for ISPs. There are precautions in which ISPs can and should engage, and shifting the full costs of accidents to Internet subscribers would inefficiently reduce each ISP's incentive to do so.

CONCLUSION

I began with reference to the immunities that ISPs enjoy with respect to defamation and copyright infringement. Let me briefly conclude by identifying some differences between liability in those instances and the liability at issue here.

In the context of defamation, it is important to remember that judgments are unavoidably subjective and fact-specific, and thus it might be unreasonable to ask an ISP to identify defamation on its own. A malicious computer program, virus, or worm, by contrast, can be more readily and less intrusively identified. Besides, the social costs of a system where a few innocent programs are accidentally delayed by an overly cautious ISP seem much less onerous than the social costs associated with an equivalently imperfect filter that might delay socially important free speech.

As for copyright infringement, meanwhile, note that, while the possibility of worms and viruses reduces the average subscriber's interest in Internet service, the possibility of copyright infringement likely increases it. Indeed, in many ways, music piracy is the "killer app" that is today driving the deployment of broadband Internet service. Infringement therefore has a silver lining--it is a camouflaged subsidy to broadband--whereas malicious computer code has none. This might mean that policymakers ought to be more interested in imposing liability for cyber-insecurity than they are in imposing liability for music piracy. Or it might mean the opposite, as ISPs already have a strong incentive to improve cybersecurity (subscribers favor it) whereas ISPS face no similar incentive when it comes to fighting copyright infringement.

All that said, my own view is that ISPS should not be immune from liability in any of these three settings. AOL surely should have been called to account for the Drudge Report, just as the New York Times would have been had one of its columnists printed that very same slur. And Verizon should be required to take steps against online piracy, primarily because the firm can enforce copyright law at low cost and with high efficacy. But, as compared to those two, liability for malicious computer code represents the strongest case. There is room to disagree over the details of legal liability--whether it should sound in negligence or strict liability, whether it is best implemented by statute or via gradual common law development, and so on--but it is hard to understand how complete immunity could possibly be the right answer.

Douglas Lichtman is a professor of law at the University of Chicago. He may be contacted by e-mail at dgl@uchicago.edu.

This article is drawn from a paper co-authored with Eric Posner entitled "Holding Internet Service Providers Accountable" that is forthcoming in the Supreme Court Economic Review.
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有