Feeds

Scoot swoops on ‘anonymous’ bulletin board posters

III hands over customer details

  • alert
  • submit to reddit

High performance access to file storage

Update Hell hath no fury like a company scorned. Scoot.com has won a court order forcing Interactive Investor International (III) to reveal the identities of anonymous critics who posted critical comments about the firm.

And when it finds out who its bulletin board critics are, it plans to sue them for libel.

III, the UK's biggest financial Web site, will hand over "certain confidential contact details, the names of the contributors' Internet Service Providers and IP numbers" to Scoot, Sunday Business reveals.

And what would those certain confidential contact details be - like their address, telephone number, credit card details etc.?

Let's hope the anonymous posters used free ISPs to make their posted their allegedly libellous comments about Scoot; the free ISPs give users a different IP address every time they log in, Sunday Business says.

However, dynamic assignation is of little defence - if posts were made recently, as some our readers write:

"Even if using an ISP which dynamically assigns IP addresses, the ISP will keep logs of who had which IP address assigned. This is used by ISPs to trace who has been abusing the system (spamming, ping floods, cracking etc)," the splendidly named Gossi The Dog points out.

Matt Sherman, of Canada, adds: "Whether those guys are safe depends not on whether they used an ISP that dynamically assigns IPs, but whether Scoot acted quickly enough and on how long the particular ISP keeps logs for."

Now that is interesting - if the ISP keeps the log files for, say, a month only, then the posters could get away Scot-free.

Scooter

Scoot.com, the world's most boring Internet company, is Britain's answer to Infospace. Think Yellow Pages, think referral fees, think online. Over the years, this Jam Tomorrow company has lost vast amounts of money, while figuring out how to turn its database into a profitable business.

In recent months there have a been a slew of leaks about the company, blamed by Scoot.com chief executive Robert Bonnier on "malicious employees", both past and present, Sunday Business reports. Former employees who signed gagging orders could be sued for breach of contract.

Leaks include an internal survey, which show Scoot advertisers were dissatisfied with the service. Also, last week, copies of emails purporting to be between Bonnier and Scoot.com managing director Jon Molyneux (Apple's former country manager for UK and Ireland), were winging their way around the City, Sunday Business says.

Some advice for Bulletin Board posters

  • This is a libellous comment: "Scoot sounds like a rotten place to work". It makes the right thinking person think less of the company after reading it. But is it actionable? I am expressing an opinion, a value judgement, which is not subject to the law.
  • This is another libellous comment: "Drew Cullen is a rotten apple". This is actionable - it is saying that I am corrupt. As a company director with a fiduciary duty of care to my shareholders, such a claim would materially impugn my reputation.
  • Truth is a cast-iron defence against libel actions. But is it not enough to be telling the truth - you have to be able to prove you are telling the truth. And that can be hard.
  • Think carefully before you make damaging statements about a person or company, especially if you are in possession of inside information. Would you make those statements if your name was published? If not, resist the temptation. The Internet creates the ultimate audit trail, and ISPs and Web sites will co-operate with investigators, if told to by the courts.
  • Finally, if you have a big story about a company to tell - consider contacting a news organisation, such as Sunday Business, or The Register, even. It may be harder to get your tale in print, but the risk will - 999 times out of 1000- be transferred entirely from you to the publication. The one time is when a company, or person, goes gunning for the source of the story. This has nothing to do with libel, and everything to do with revenge. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.