|
Author |
Thread Statistics | Show CCP posts - 4 post(s) |

General Mujahideen Husseni
|
Posted - 2011.03.10 17:25:00 -
[1]
Edited by: General Mujahideen Husseni on 10/03/2011 17:26:24
Originally by: Malcanis IskBank have released a public statement asserting that the database is wholly fictitious. It would be difficult for them to also claim that they owned copyright
Your claim is that merely because something is labeled as fictitious by its creator, it cannot be held under copywrite? BRB, going to use licensed characters in my own fictional works and publish them.
Originally by: Malcanis or that the use of it in any way compromised them or their customers.
I also agree that it's not entirely compromising when I access a supermarket's database of customers and their information. Identitiy theft? Pffft. Doesn't exist.
|

General Mujahideen Husseni
|
Posted - 2011.03.10 18:02:00 -
[2]
Originally by: Malcanis [How can something be both fictitious and compromising?
Pretty easy, there's even legal jargon for it -- the appearance of impropriety. Once fictitious information has been planted concerning someone's behavior, it can be compromising of their image or standing in whatever organization or society would look down on the behavior they engaged in.
Originally by: Malcanis And IskBank aren't claiming that they made up this database but that the 'hacker' did. If anyone owns "copyright" to it, it's him, not them.
Even so, it'd be assumed proprietary material of that website.
|

General Mujahideen Husseni
|
Posted - 2011.03.10 18:20:00 -
[3]
Originally by: Tippia As for the impropriety, that's something the individual "customers" have to go after EN24 about ù IskBank and CCP are not involved in that particular scuffle.
I was only giving him an example of when information which is explicitly or implicitly fictitious can remain malicious.
|

General Mujahideen Husseni
|
Posted - 2011.03.10 18:24:00 -
[4]
Edited by: General Mujahideen Husseni on 10/03/2011 18:25:08 ^ I was being sarcastic.
Originally by: Ingvar Angst I get a kick out of these folks that think whether or not the list was obtained legally has any bearing at all on whether or not CCP can enforce their policy against engaging in RMT on their own computers.
You guys crack me up.

Uhhh, because in Western constitutional democracies there are protections against unlawful procurement of evidence i.e. wiretapping or hacking (unlawful access).
|

General Mujahideen Husseni
|
Posted - 2011.03.10 18:42:00 -
[5]
Originally by: Malcanis Nope, just in one, as it turns out. And in any case those protections only apply to the courts, not to private businesses.
I can't think it's really good business practice to make a judgment on third hand knowledge as well, when it involved the punishment of ******s who Pay Money For Internet Spaceships.
|

General Mujahideen Husseni
|
Posted - 2011.03.10 19:57:00 -
[6]
Originally by: Whitehound It is an anonymous source. Nothing more should be needed to be said here.
This.
This and lawyering about Internet Space Ships. lol
|
|
|
|