Skip to main content
Log in

Responsibility of and Trust in ISPs

  • Special Issue
  • Published:
Knowledge, Technology & Policy

Abstract

This discussion is about the neglected concepts of trust and social responsibility on the Internet. I will discuss and explain the concepts and their implications to people and society. I then address the issue of moral and social responsibilities of ISPs and web-hosting companies. I argue that ISPs and web-hosting companies should aspire to take responsibility for content and that they should respect and abide by their own terms of conduct.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. See Cohen-Almagor (2011a, 2011b)

  2. “Trust,” Oxford Advanced Learner’s Dictionary of Current English.

  3. Dutton and Shepherd (2005). See also (Dutton and Shepherd 2006).

  4. De Laat (2005: 170). See also (Pettit 2004).

  5. This problem has spawned a number of identity verification services. These services provide a verification-chain framework to both parties, while protecting sensitive information. See http://www.readwriteweb.com/archives/nobody_knows_youre_a_dog.php

  6. http://plato.stanford.edu/

  7. Ebay.com

  8. Mansell and Collins (2005). Internet expert Brian Marcus argues that the Internet is based on trust. Most of its users act within the law. Therefore, in the USA, there are far more protections on free expression than restrictions on speech. We should not punish most users because of the small numbers who exploit the Internet to violate the law, and we should not allow a small number of abusers to dictate the rules of the game. Interview with Marcus, Washington DC (June 5, 2008).

  9. CSR as applied in this article, not to be confused with Corporate Social Responsibility.

  10. Compare to the responsibilities of the press; see (McQuail 2003).

  11. Web site hosting can give rise to liability for trademark infringement and copyright infringement but generally will not give rise to liability for defamation. The leading legal American precedents on Internet offensive speech are Cubby, Inc. v. CompuServe, 776 F. Supp. 135 (S.D.N.Y. 1991); Stratton Oakmont, Inc. v. Prodigy Services Co., 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995); Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998); Zeran v. AOL, 129 F.3d 327 (4th Cir. 1997), cert. denied, U.S., 118 S. Ct. 2341 (1998); Doe v. America Online 25 Media Law Rep. (BNA) 2112; 1997 WL 374223 (Fla. Circ. Ct. June 26, 1997); Case No. 97-2587 (Fourth District Court of Appeal, Fla., October 14, 1998). At present, American courts tend to hold that ISPs are not liable for content posted on their servers, this under Section 230(1) of the Communications Decency Act (1996) which reads: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” 47 U.S.C. 230. For analysis, see (Siderits 1996; Boehm 1998; Kane 1999; Goldstein 2000; Friedman and Buono 2000; Voelzke 2003).

  12. Floridi explains that the binary system of data encoding has noteworthy advantages. First, bits can equally well be represented semantically (meaning True/False), logico-mathematically (standing for 1/0) and physically (transistor=On/Off; switch=Open/Closed; electric circuit=High/Low voltage; disk or tape=Magnetized/Unmagnetized; CD=presence/absence of pits, etc.) and hence provide the common ground where semantics, mathematical logic, and the physics and engineering of circuits and information theory can converge. Second, this means that it is possible to construct machines that can recognize bits physically, behave logically on the basis of such recognition, and, therefore, manipulate data in ways which we find meaningful. Third, since digital data normally have only two states, such discrete variation means that a computer will hardly ever get confused about what needs to be processed, unlike an analog machine, which can often perform unsatisfactorily or imprecisely. See (Floridi 2010).

  13. Mathiason (2009). See also (Cohen-Almagor 2007).

  14. A botnet (also known as a Zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie—in effect, a computer “robot” or “bot” that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. See http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1030284,00.html

  15. Federal Trade Commission v Pricewert LLC (United States District Court Northern District of California San Jose Division) (June 2 2009); “FTC Shuts Down Notorious Rogue Internet Service Provider, 3FN Service Specializes in Hosting Spam-Spewing Botnets, Phishing Web sites, Child Pornography, and Other Illegal, Malicious Web Content,” Federal Trade Commission (June 4, 2009), http://www.ftc.gov/opa/2009/06/3fn.shtm

  16. http://whois.domaintools.com/pricewert.com

  17. http://legal.web.aol.com/aol/aolpol/comguide.html.

  18. http://uk.docs.yahoo.com/info/terms.html.

  19. http://www.datapipe.com/Acceptable_Use_Policy.aspx.

  20. http://www.datapipe.com/Social_Responsibility.aspx

  21. http://www.biac.org/members/iccp/mtg/2008-06-seoul-min/DSTI-ICCP-IE(2005)3-FINAL.pdf; see also (Price and Verhulst 2000).

  22. http://powerballplace.blogspot.com/2005/03/how-to-kill-your-wife-and-get-away.html

  23. http://vampirefreaks.com/termsofservice.php. See also (Agrell and Cherry 2006)

  24. http://vampirefreaks.com/termsofservice.php

  25. Discussion with a research specialist, George Washington University, Washington DC (June 12, 2008). See (Silberman 2002).

  26. Interview with Marc Rotenberg, President of the Electronic Privacy Information Center, Washington DC (May 2, 2008).

  27. http://www.checkpoint.com/products/enterprise/

  28. http://www.symantec.com/avcenter/security/Content/Product/Product_SGS.html; http://www.symantec.com/business/products/allproducts.jsp

  29. http://www.allot.com/index.php?option=com_content&task=view&id=2&Itemid=4

  30. http://www.packeteer.com/solutions/visibility.cfm

  31. http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_cong_bills&docid=f:s1738enr.txt.pdf

  32. Reporting of child pornography by electronic communication service providers, 42 USC 13032, http://vlex.com/vid/19244635

  33. Reuters, “France to block child pornography websites” (June 10, 2008).

  34. See an English communiqué—http://www.afa-france.com/p_20040113.anglais.html

  35. http://www.philstar.com/Article.aspx?articleId=441984&publicationSubCategoryId=200; http://www.computerweekly.com/Articles/2009/02/20/234945/facebook-removes-5500-sex-offenders.htm; News agencies, “Facebook blocked some 5,500 sex criminals,” Haaretz (February 20, 2009) (Hebrew).

  36. http://socialmediaportal.com/PressReleases/2008/01/-MySpace-and-Attorneys-General-Announce-Joint-Effo.aspx

  37. Aristotle (2008). See also Adkins (1984); Kraut (2002).

  38. Interview with a senior security officer, Washington DC (March 25, 2008).

References

  • Adkins, A. W. H. (1984). The connection between Aristotle’s Ethics and Politics. Political Theory, 12, 29–49.

    Article  Google Scholar 

  • Agrell, S. (2006a). Troubled kids ‘gravitating’ to vampire site: several violent crimes in Canada tied to network. National Post (September 15), A6.

  • Agrell, S. (2006b). ‘Vampire’ meets ‘teen’ in graveyard. UPI (April 28).

  • Agrell, S., & Cherry, P. (2006). Blogs reveal a deteriorating mind, police say. National Post (September 16), A9.

  • Aristotle (2008). Works (MobileReference, 2008), at http://www.mobilereference.com/BS_Philosophy/index.htm#ari.

  • Barrett, N. (2005). Criminal IT: Should you trust the internet? Silicon.com (January 27, 2005), http://www.silicon.com/technology/security/2005/01/27/criminal-it-should-you-trust-the-internet-39127375/.

  • Berkman Center for Internet and Society. (2008). Final Report of the Internet Safety Technical Task Force, Enhancing Child Safety and Online Technologies. Boston: Berkman Center for Internet and Society, at http://cyber.law.harvard.edu/research/isttf#.

  • Boehm, S. B. (1998). Note, a brave new world of free speech: should interactive computer service providers be held liable for the material they disseminate? Richmond Journal of Law & Technology, 5, 7, Winter, at http://jolt.richmond.edu/v5i2/boehm.html.

  • Bunton, K. (1998). Social responsibility in covering community: a narrative case study. Journal of Mass Media Ethics, 13(4), 232–246.

    Article  Google Scholar 

  • Christians, C., & Nordenstreng, K. (2004). Social responsibility worldwide. Journal of Mass Media Ethics, 19(1), 3–28.

    Article  Google Scholar 

  • Cohen-Almagor, R. (2007). The scope of tolerance. London: Routledge.

    Google Scholar 

  • Cohen-Almagor, R. (2011a). Content net neutrality—a critic (forthcoming).

  • Cohen-Almagor, R. (2011b). Responsibility of net users. In M. Fackler & R. S. Fortner (Eds.), Global communication and media ethics. Oxford: Wiley‐Blackwell.

  • Cohen-Almagor, R., & Haleva-Amir, S. (2008). Bloody wednesday in Dawson College—the story of Kimveer Gill, or why should we monitor certain websites to prevent murder. Studies in Ethics, Law and Technology, 2(3), Article 1.

  • De Laat, P. B. (2005). Trusting virtual trust. Ethics and Information Technology, 7, 167–180.

    Article  Google Scholar 

  • Deutsch, L. (2008). Woman indicted in Missouri MySpace suicide case. Associated Press Online.

  • Dutton, W. H., & Shepherd, A. (2005). Confidence and risk on the internet. In R. Mansell & B. S. Collins (Eds.), Trust and crime in information societies. Cheltenham: Edward Elgar.

    Google Scholar 

  • Dutton, W. H., & Shepherd, A. (2006). Trust in the internet as an experience technology. Information, Communication & Society, 9, 433–451.

    Article  Google Scholar 

  • Elia, J. (2009). Transparency rights, technology and trust. Ethics and Information Technology, 11(2), 145–153.

    Article  Google Scholar 

  • Evans, E. (2004). From the cluetrain to the panopticon: ISP activity characterization and control of internet communications. Michigan Telecommunications and Technology Law Review, 10, 445–499.

    Google Scholar 

  • Federal Trade Commission (2009). FTC Shuts Down Notorious Rogue Internet Service Provider: 3FN service specializes in hosting spam-spewing botnets, phishing web sites, child pornography, and other illegal, malicious web content. Federal Trade Commission, http://www.ftc.gov/opa/2009/06/3fn.shtm.

  • Floridi, L. (2007). A look into the future impact of ICT on our lives. The Information Society, 23(1), 59–64.

    Article  Google Scholar 

  • Floridi, L. (2010). Information—a very short introduction. Oxford: Oxford University.

    Google Scholar 

  • Floridi, L., & Sanders, J. W. (2001). Artificial evil and the foundation of computer ethics. Ethics and Information Technology, 3(1), 55–66.

    Article  Google Scholar 

  • Friedman, J. A., & Buono, F. M. (2000). Limiting tort liability for online third-party content under section 230 of the communications act. Federal Communication Law Journal.

  • Goldstein, M. P. (2000). Service provider liability for acts committed by users: what you don’t know can hurt you. Marshall Journal Computer and Infomation Law, 18, 591. Spring.

    Google Scholar 

  • Gralla, P. (2007). How the internet works (8th ed.). Indianapolis: Que.

    Google Scholar 

  • Kaliski, B. S. (Ed.). (2001). Encyclopedia of business and finance. New York: Macmillan.

    Google Scholar 

  • Kane, M. J. (1999). Internet service provider liability: Blumenthal v. Drudge. Berkeley Technology Law Journal, 14, 483.

    Google Scholar 

  • Kohn, M. (2008). Self-interest and the common good. New York: Oxford University.

    Google Scholar 

  • Kraut, R. (2002). Aristotle political philosophy. New York: Oxford University.

    Google Scholar 

  • MacLeod, I. (2006). Vampire culture gets another black mark after shooting: website linked to Medicine Hat slayings. The Calgary Herald (September 15), A3.

  • Mandel, M. (2006). Out for blood. The Toronto Sun (September 24), 5.

  • Mansell, R., & Collins, B. S. (Eds.) (2005). Trust and crime in information societies. Cheltenham: Edward Elgar.

  • Marshall, M. L. (1994). Ensuring social responsibility. Thrust for Educational Leadership, 23(4).

  • Mathiason, J. (2009). Internet governance (p. 7). Abingdon: Routledge.

    Google Scholar 

  • McQuail, D. (2003). Media accountability and freedom of publication (p. 191). New York: Oxford University.

    Google Scholar 

  • Messmer, E. (2009). ISP pricewert protests shutdown. PCWorld.com (June 6).

  • Myskja, B. K. (2008). The categorical imperative and the ethics of trust. Ethics and Information Technology, 10(4), 213–220.

    Article  Google Scholar 

  • News agencies (2009). Facebook blocked some 5,500 sex criminals. Haaretz, (Hebrew) (February 20).

  • Nissenbaum, H. (2001). Securing trust online: wisdom or oxymoron. Boston University Law Review, 81(3), 107–131.

    Google Scholar 

  • Novak, M. (1996). Business as a calling: Work and the examined life. New York: Free Press.

    Google Scholar 

  • Pettit, P. (2004). Trust, reliance and the internet. Analyse & Kritik, 26, 108–121.

    Google Scholar 

  • Pona, N. (2006). Net violence unchecked. Toronto Sun (September 15), 4.

  • Price, M. E., & Verhulst, S. G. (2000). The concept of self-regulation and the internet. In J. Waltermann & M. Machill (Eds.), Protecting our children on the internet: Towards a new culture of responsibility. Gütersloh: Bertelsmann Foundation.

    Google Scholar 

  • Reporting of child pornography by electronic communication service providers, 42 USC 13032, http://vlex.com/vid/19244635.

  • Reuters (2008). France to block child pornography websites (June 10).

  • Rivers, W. L., Schramm, W., & Christian, C. G. (1980). Responsibility in mass communication. New York: Harper and Row.

    Google Scholar 

  • Robertson, L. (2006). Web links to shooting. CTV Television (September 14).

  • Siderits, M. C. (1996). Comment: defamation in cyberspace: reconciling Cubby, Inc. v. Compuserve, Inc. and Stratton Oakmont v. Prodigy Services Co. Marquette Law Review, 79, 1065–1081.

    Google Scholar 

  • Silberman, S. (2002). The United States of America v. Adam Vaughn. Wired, http://www.wired.com/wired/archive/10.10/kidporn.html.

  • TeliaSonera (2008). Launches service that prevents distribution of material depicting child sexual abuse. A press release (September 4).

  • Trevino, L. K., & Nelson, K. A. (1999). Managing business ethics: Straight talk about how to do it right. New York: Wiley.

    Google Scholar 

  • Uslaner, E. M. (2004). Trust, civic engagement, and the internet. Political Communication, 21(2), 223–242.

    Article  Google Scholar 

  • Voelzke, J. (2003). Don’t shoot: i’m just the web site host! The Computer & Internet Lawyer, 20(5), 4.

    Google Scholar 

  • Whoriskey, P. (2008). Internet providers agree to block child pornography. Washington Post (June 11), A01.

  • Williams, C. (2009). “Small ISPs reject call to filter out child abuse sites,” The Register (February 25, 2009), at http://www.theregister.co.uk/2009/02/25/iwf_small_isps/.

  • Zogby, J. (2009). Why do people trust the internet more? Forbes.com (June 18).

Court Judgments

  • Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998)

  • Cubby, Inc. v. CompuServe, 776 F. Supp. 135 (S.D.N.Y. 1991).

  • Doe v. America Online 25 Media Law Rep. (BNA) 2112; 1997 WL 374223 (Fla. Circ. Ct. June 26, 1997), Case No. 97-2587 (Fourth District Court of Appeal, Fla., October 14, 1998)

  • Federal Trade Commission v Pricewert LLC (United States District Court Northern District of California San Jose Division) (June 2, 2009)

  • Rice v. Paladin Enterprises Inc., No. 96-2412, 128 F.3d 233 (November 10, 1997).

  • Stratton Oakmont, Inc. v. Prodigy Services Co., 1995 WL 323710 (N.Y. Sup. Ct. May 24, 1995)

  • Zeran v. AOL, 129 F.3d 327 (4th Cir. 1997), cert. denied, U.S., 118 S. Ct. 2341 (1998).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raphael Cohen-Almagor.

Additional information

I thank Janet Spikes for her excellent research assistance. All websites were accessed on January 18–21, 2010.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cohen-Almagor, R. Responsibility of and Trust in ISPs. Know Techn Pol 23, 381–397 (2010). https://doi.org/10.1007/s12130-010-9119-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12130-010-9119-3

Keywords

Navigation