-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In message , ox <an...@ox.co.za> writes

>Dealing with your first point, I do agree and you are imho, quite
>correct about the abuse from legacy resources.

no -- I was concerned about abuse OF legacy resources :(

>However, the current definition of Internet abuse is: --> use of a
>resource to infringe upon the usage rights of another resource
>
>So, this caters exactly for ALL resources, including legacy resources...
>
>Thank you for your feedback about, sanctioned, but it exists only to
>reflect 

you've missed my point

you define abuse as "non sanctioned" activity...  that is, activity for
which permission has not been granted.  Fair enough (so far as it goes)

you then define "sanctioned" as being infringement :-( rather than
setting out a definition which has something to do with the complexity
of what permission means.

- -- 
richard                                                   Richard Clayton

Those who would give up essential Liberty, to purchase a little temporary 
Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBV84s9Du8z1Kouez7EQI4KACgvPCyK4SimvypTL/bmW79vlB5MPMAnRjx
bzv3dryAeKzfhnlmOdXK1UL2
=9ogY
-----END PGP SIGNATURE-----

Reply via email to