-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In message , ox <andre@ox.co.za> writes
Dealing with your first point, I do agree and you are imho, quite correct about the abuse from legacy resources.
no -- I was concerned about abuse OF legacy resources :(
However, the current definition of Internet abuse is: --> use of a resource to infringe upon the usage rights of another resource
So, this caters exactly for ALL resources, including legacy resources...
Thank you for your feedback about, sanctioned, but it exists only to reflect
you've missed my point you define abuse as "non sanctioned" activity... that is, activity for which permission has not been granted. Fair enough (so far as it goes) you then define "sanctioned" as being infringement :-( rather than setting out a definition which has something to do with the complexity of what permission means. - -- richard Richard Clayton Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin 11 Nov 1755 -----BEGIN PGP SIGNATURE----- Version: PGPsdk version 1.7.1 iQA/AwUBV84s9Du8z1Kouez7EQI4KACgvPCyK4SimvypTL/bmW79vlB5MPMAnRjx bzv3dryAeKzfhnlmOdXK1UL2 =9ogY -----END PGP SIGNATURE-----