GENERAL ECHOMAIL POLICY 1

February 1, 1989
PROLOGUE

This document  sets forth  policy governing  Echomail conferences
and their distribution.

This Policy applies to Zone One Backbone Echomail conferences and
to any other conferences for which the Moderator desires it to be
applicable.    Future changes to Echo Policy may be proposed only
by a  simple majority vote of the Regional Echomail Coordinators.
Those eligible to vote on any proposals made by the REC structure
will be  the ZEC, RECs, NECs, NCs, RCs and IC.  Only one vote per
person is  allowed.   Adoption of  changes will  require a simple
majority of those voting to pass.

In this  document, "a simple majority" means more than 50 percent
of those  voting.   A good faith attempt must be made to make all
potential  voters  aware  that  a  vote  is  occurring  and  make
available all necessary information.


I.  HISTORY

Echomail consists  of the sharing of message bases or conferences
between various  independent network  addresses.    The  Echomail
concept started  with a  series of  programs by Jeff Rush.  Since
the original  implementation, many  authors have written programs
improving on  the original  idea.   In spite  of worries that the
flow of Echomail would increase Netmail traffic to the point that
the Network  would collapse  under its  own weight,  Echomail has
been a  success.   To simplify  the distribution  of Echomail,  a
national Echomail  Backbone formed  whose primary  purpose is the
distribution  of  Echomail  at  a  national  level.    Of  recent
introduction  to  the  Backbone  system  has  been  the  generous
contribution of the Echomail Stars.  As a result of the growth of
Fidonet and the increase in the volume of Echomail, it has become
necessary to set forth a formal policy governing Echomail.


II.  DEFINITIONS

1.   ECHOMAIL:   The process  of sharing  message  bases  between
independent systems with unique net/node addresses.

2.   ECHOMAIL CONFERENCES:   An  Echomail conference is a message
base of  forum design  distributed under  a specified  conference
name dealing  with a  defined area of interest.  Notable examples
include TECH,  the National  Technical Conference  and COMM,  the
National Telecommunications Conference.

3.   MODERATED CONFERENCE:  A moderated conference is an Echomail
conference for  which a moderator has been appointed to supervise
the flow  and content of the conference.  All conferences carried
on the Backbone must be moderated.

4.   SYSOP-ONLY CONFERENCE:   A  Sysop-Only Conference  is one in
which the  Moderator has decided that the conference will be made
available only to Sysops and not to users.

5.     RESTRICTED  DISTRIBUTION   CONFERENCES:     A   restricted
distribution conference  is  one  which  is  restricted  only  to
eligible  recipients.    Notable  examples  include  REGCON,  the
Regional Coordinators  Conference, COORD,  the National  Echomail
Coordinators Conference,  and  MAGICK,  a  pre-register  Echomail
Conference.

6.    ZONE  ECHOMAIL  COORDINATOR  (ZEC):    This  individual  is
responsible for coordination of Echomail on a FidoNet Zone level.

7.   REGIONAL ECHOMAIL  COORDINATOR (REC):   This  individual  is
responsible for coordination of Echomail within his region.

8.     NET  ECHOMAIL  COORDINATOR  (NEC):    This  individual  is
responsible for coordination of Echomail at the Local Net level.

9.   ECHOMAIL  Backbone:    The  Echomail  Backbone  consists  of
voluntary members  who provide  services to  enhance the national
distribution of  Echomail.   The Backbone consists of nodes which
handle a  high volume of Echomail traffic and are responsible for
distribution of Echomail down to the regional level.

10.    NATIONAL  ECHOMAIL  LIST:    The  National  Echomail  List
identifies the  available national  conferences,  the  conference
moderator and  requirements of the specified conference.  The ZEC
will appoint the keeper of the National Echomail List.

11.   AUTOMATED CENSORSHIP:  The term Automated Censorship refers
to programs  which cause messages to be removed from the intended
conference or have their content altered.

12.   FIDONET POLICY:   The  document which  governs  Fidonet  as
adopted by  Fidonet.   The document as of this writing is Policy3
and is  subject to  change.   This policy is intended to become a
part of  general Fidonet  policy.   Until it is incorporated into
General Fidonet  policy, this  document  shall  serve  to  define
policy violations occurring in Echomail.

13.  OPEN ACCESS CONFERENCE:  This is a non-restricted conference
open to all users who are willing to follow the posted conference
rules.

14.  TERMINAL NODE:  A system which does not process echomail for
pickup by another system.


III.  DUTIES OF ECHOMAIL COORDINATORS

1.  GENERAL:   It is  the duty  of the  *ECs to make available to
any  Fidonet  Sysop,  any  conference  which  the  Sysop  is  not
prohibited from receiving by not meeting requirements as mandated
by the  conference moderator.  If for any reason the *EC does not
have access  via recognized  distribution channels  to a specific
conference, they  can not  be expected  to pass  it on.  If a *EC
fails  to  make  available  any  conference  to  qualified  lower
distribution levels,  this shall  be deemed  to have violated the
outlined duties  of the  position held.   Such violation is cause
for the  removal as  provided by  this document.  Nothing in this
provision requires  that a  *EC must import any conference to the
extent of  adverse economic  impact.  It is recommended that cost
sharing arrangements be employed.  Where financially feasible for
the  supplier  any  conference  on  the  Backbone  must  be  made
available (other than restricted conferences) when requested.

An exception  is when  a *EC  cuts a  link  to  end  unauthorized
distribution of  a conference.   In  this  case,  some  otherwise
authorized nodes may temporarily lose their link.


A *EC shall do everything in their power to insure that:

     1.   All downstream links are educated as to this policy.

     2.   Downstream  links   know  how  to  properly  link  into
          conferences.

     3.   Acceptable  and   unacceptable  behavior   in  echomail
          conferences is explained.

     4.   Downstream links  are not  engaging in  topologies that
          increase the risk of duplicate messages.


2.   DUTIES OF  ZONE ECHOMAIL COORDINATOR:  It is the duty of the
ZEC to  coordinate the  connections between the Echomail Backbone
on  both   an  inter-Zone   and  intra-Zone   level  as  well  as
coordination  of   inter-regional  connections.    The  ZEC  will
coordinate transmission  of Echomail   and to provide for routing
in a  manner  that  will  avoid  the  transmission  of  duplicate
messages within  the same conference.  It is also the duty of the
ZEC to monitor compliance with this policy on both a national and
international basis.


3.   DUTIES OF  REGIONAL ECHOMAIL COORDINATOR:  It is the duty of
the REC  to provide  for  regional  Echomail  distribution.    In
addition, the  REC  will  coordinate  any  inter-regional  cross-
linking of  conference feeds  with the  REC of  the participating
region with  the direct  knowledge of  the ZEC.    The  REC  will
provide for  transmission and  routing of Echomail within his/her
region in  a manner  to avoid  creation   of  duplicate  messages
within the same conference.  It is the duty of the REC to monitor
compliance with this policy at a regional level.


4.   DUTIES OF  NET ECHOMAIL  COORDINATOR:  It is the duty of the
NEC to  coordinate the  intra-net Echomail  and to cooperate with
the REC  and NECs  of other  nets to  arrange for  the  inter-net
transmittal of  echomail.  The REC may require the NEC to provide
links for independent (regional) nodes.  The NEC shall maintain a
list of  available Echomail Conferences within the net as well as
the requirements  of each  Conference area  as  supplied  by  the
conference moderator  (Echolist).   The NEC  shall  also  monitor
compliance with this policy at a net level.


5.   DUTIES OF  ECHOLIST COORDINATOR:   It  is the  duty  of  the
Echolist Coordinator  to compile  and make available a listing of
national and  international Echomail  conferences and optionally,
conferences at  various local  levels.  The content and format of
the Echomail  listing shall  be at  the sole  discretion  of  the
Echolist Coordinator,  but shall  include the conference name and
moderator for  each conference.   The  Echolist Coordinator shall
also maintain  a list  of requirements  applicable to each listed
conference.


6.   DUTIES OF  ECHOMAIL CONFERENCE  MODERATOR:   It shall be the
duty of  the Echomail  Conference Moderator to make in good faith
every reasonable  effort to  insure that the moderated conference
does not  distribute or promote illegal activities or information
as defined  below in  Section V Paragraph 2.  The Moderator shall
be responsible  for  insuring  that  messages  contained  in  the
conference corresponds  to the  conference theme.   The Moderator
shall report any violations of this policy to the proper Echomail
coordinators and  lodge  any  appropriate  policy  complaints  as
provided for  in  policy  documents  adopted  by  Fidonet.    The
Moderator shall  post the  conference rules  in the conference at
least once  a month.      The   Moderator  is  to  authorize  the
disconnection of  the conference  feed.   Any Sysop the moderator
believes is  violating policy  shall be reported to the offending
node's nearest  local echomail  coordinator (may be a NEC, REC or
in extreme  situations a  ZEC); and  the moderator shall formally
authorize the  feed to  the offending  node to  be  severed.  The
conference moderator  is the  sole judge - subject to review only
by the  ZEC (or  his delegates)  if a  complaint is  filed by the
banished party.  The Moderator may request in direct written form
(netmail) that  the *ECs  disconnect a  node from  the conference
when that  node refuses  to follow the published conference rules
after at least 3 warnings.  Knowingly feeding  a conference  to a
node that  has been  severed by  the Moderator  is  considered  a
violation of  this echomail  policy and is subject to suspension.
The length  of this   suspension  will be   determined by a joint
decision of  the conference  moderator and the nearest local echo
coordinator of  the node  illegally feeding the conference to the
original offending node or point.

Echo conference  complaints from  a Sysop  should be filed at the
net level  (NEC) or  if the  complaining party  is an independent
node then  with their  REC.   The NEC  or REC  receiving  such  a
complaint must  take action  in accordance with the provisions of
this echomail policy.

For severe or chronic infractions  the NEC, REC or ZEC  may  file
a complaint under general Fidonet policy for excessively annoying
behaviour.


IV.   APPOINTMENT  AND  ELECTION  OF  ECHOMAIL  COORDINATORS  AND
MODERATORS.

1.   GRANDFATHER CLAUSE:   Those Zone, Regional, and Net Echomail
Coordinators and  Echomail Coordinators  currently holding  these
positions as  of the  date of  acceptance of this Echomail Policy
shall continue  to service  in said capacity until resignation or
replacement under this policy.

2.   ELECTION OF  ZONE ECHOMAIL  COORDINATOR:   The ZEC  shall be
elected as follows:

     a) upon  resignation or replacement of the existing ZEC, the
     FidoNet Zone  Coordinator (ZC)  shall nominate at least five
     individuals to be voted upon.

     b) 10  days after  the nominees  are selected,  an  election
     shall be  held. The ZEC will be elected by a simple majority
     of IC,  ZC, RCs,  NCs, RECs, and NECs in their Fidonet zone.
     An individual  holding more  than one position can only cast
     one vote.  That is, if an individual is both a NC and a NEC,
     they may cast only one vote.

3.   ELECTION OF REGIONAL ECHOMAIL COORDINATOR:  The REC shall be
elected as follows:

     a) upon  resignation or  replacement of an existing REC, the
     ZEC shall nominate at least 3 individuals for election.

     b) 10  days after  the nominees  are selected,  an  election
     shall be  held. The REC will be elected by a simple majority
     of the  RC, NCs  and NECs  in  their  FidoNet  Region.    An
     individual holding  more than one position may only cast one
     vote.

4.   NET ECHOMAIL COORDINATOR:  The NEC shall be appointed by the
FidoNet Net  Coordinator (NC)  or in  such alternative  manner as
determined by  the NC.  If a NEC is not appointed within 30 days,
the REC will appoint the NEC.

5.   REMOVAL OF  A *EC:  A *EC may be removed from their position
by  a  simple  majority  of  those  allowed  to  vote  for  their
successor.   For a NEC, the members of the Net may vote by simple
majority to  remove the NEC.  The position directly above (in the
*EC structure)  will oversee  the recall  election  in  the  same
manner as prescribed for electing successors.

A *EC may only be subject to recall for failure to properly carry
out their  duties described  above, or  if they  are no  longer a
member of  Fidonet.   A promise  of 'free' echomail delivery from
another source  is *not*  considered  an  acceptable  reason  for
recall.

6.   RECOGNITION OF  CONFERENCES:  The *EC corresponding  to  the
appropriate leve recognizes a conference at his level.  Examples:
The NEC recognizes a conference as local.  The REC  recognizes  a
conference to be regional.   A ZEC recognizes a conference to  be
zonal.  The IC recognizes a conference to be inter-zonal.

7.   REMOVAL OF  AN ECHOMAIL  CONFERENCE MODERATOR:   An Echomail
Conference Moderator  may be  removed from  their position  by  a
three fourths  (3/4) vote of the *EC structure voting.  This vote
must be  carried out  in a fair and decent manner while giving at
least ten  (10) days  notice to  the entire  *EC structure of the
upcoming vote.   Notice  mediums acceptable are: Netmail from the
ZEC, usage  of international  postings  in  such  conferences  as
COORD.     Or  in  extreme  instances,  by  REC  to  NEC  written
notification.

An Echomail  Conference Moderator  may only  be subject to recall
for failure to properly carry out their duties described above or
continued pre-meditated  violation of  this documents  section V.
Statement of  Policies as  seen below.   Failing  to perform  the
above duties of a conference moderator for a period of 3 or more
months and/or  failing to  designate a proxy in his absence shall
be in  violation of this policy and be subject to recall.  A vote
may only be callable by the ZEC (or his delegate).  This delegate
should not  be from  the region or net of the affected conference
moderator.

Membership in  Fidonet need  not be  a paramount  issue,  but  is
highly recommended.



V.  STATEMENT OF POLICIES

1.   BASIC ECHOMAIL  POLICY:   The basic policy of Echomail is to
promote  communication  in  Echomail  Conferences  in  a  lawful,
friendly  manner   consistent  with  the  general  principles  of
FidoNet.

2.   PROHIBITION ON ILLEGAL ACTIVITIES:  Any Node which knowingly
distributes or allows to be entered into echomail conferences any
messages  containing   or   promoting   illegal   activities   or
information shall  be deemed  to have  violated  general  FidoNet
policy as being excessively annoying.  As used in this paragraph,
"illegal activities" includes activities which are a violation of
civil law  as well  as activities  which would result in criminal
prosecution.

3.  AUTOMATED CENSORSHIP:  The use of Automated Censorship in the
passing  or   distribution  of  echomail  will  be  considered  a
violation of  this policy and will not be tolerated. Disciplinary
action will  be as referred to in General Fidonet policy as being
excessively annoying.

An exception  to this  provision shall  be the  deletion and  not
censorship of  messages by  any Sysop  which may  lead  to  legal
action against that Sysop.

No  echomail   shall  be  modified  in  any  manner  which  could
potentially cause duplicates.

4.   INTER-NETWORK  CONFERENCES:    Inter-Net  conferences  shall
conform to  general Fidonet  policy as  well as the provisions of
this  policy  document  in  addition  to  any  foreign  network's
provisions.

5.   CHARGING FOR  DISTRIBUTION:  Any entity which makes a profit
from the distribution (passing from system to system) of echomail
shall be  deemed to  be excessively  annoying and in violation of
Fidonet policy  subject to  enforcement  under  existing  Fidonet
policy.   Profit as defined in this paragraph is the charging for
echomail distribution  that exceeds  actual cost  to  obtain  and
distribute the Echomail over a sustained period.  The cost of the
equipment used  to obtain  and distribute  echomail  may  not  be
recovered.   A Sysop  that charges  users for access to their BBS
shall NOT be in violation of this paragraph.

6.   RESTRICTED DISTRIBUTION  CONFERENCES:   Participating  Nodes
shall honor  and support  the restrictions placed upon restricted
distribution conferences.    Violation  of  this  restriction  by
individual nodes and points shall be a violation of this echomail
policy  and   result  in  suspension  of  the  violated  echo  in
accordance with  the above paragraph in Section III Duties of the
Echomail Conference Moderators.

A SYSOP  only conference  shall be  made available  only  to  the
Sysops or Co-Sysops of Fidonet or other nets with which inter-net
conferences exist.

A  violation   of  the   restrictions  placed   on  a  RESTRICTED
DISTRIBUTION CONFERENCE will be a violation of this policy if and
only if  the moderator  has posted and specified the restrictions
governing the conference.

7.   PATH REQUIRED:   The PATHline, originally implemented by SEA
in the  MGM package,  is required except for terminal nodes.   If
your current Echomail  scanner supports  the  pathline  you  must
enable it NOW.  If your current Echomail scanner does not support
the pathline, and  if  there  is  no  alternative  scanner,  then
enforcement  of  this paragraph  will  be deferred  for 60  days.
After that date, the *ECs may refuse to accept/supply echomail to
any node that is not supporting the pathline.

8.  SEEN-BY LINE:  Under the current technology and topology (the
routing structure  of echomail),  SEEN-BY lines play an important
part in  reducing duplicate  messages.  Tiny SEEN-BYs will not be
allowed until  the respective ZECs feel topology will allow their
use.   Nor will  the stripping of SEEN-BYs (except Zone-Gates and
Inter-Network EchoGates) be allowed unless approved by the ZEC.

Violation of  the above  shall be  excessively annoying  behavior
enforceable under  general Fidonet policy.  Zone-Gates and Inter-
Network EchoGates SHOULD strip the SEEN-BYs of the exporting Zone
or Network to reduce addressing conflicts.

9.   COUNTERFEIT MESSAGES:   Entering  or knowingly  distributing
counterfeit messages shall be considered excessively annoying and
a violation  of Fidonet  policy enforceable  under the  terms  of
Fidonet policy.  As used in this paragraph, a counterfeit message
is defined  as any  message entered  using another person's name,
handle or  node address with the intent of deceiving others about
the true  author of  the message.   No  handles shall  be used to
enter  messages   to  knowingly   provoke,  inflame,   or   upset
participants in a conference with the purpose of deceiving others
about the true identity of the author.

10.   SYSOP'S RESPONSIBILITY:   It  is the responsibility of each
Sysop to make every reasonable effort to assure that the users on
his board  conform to  the provisions of this policy document.  A
Sysop may  be held  responsible for  the acts of his users unless
the Sysop  can show that a reasonable attempt was made to conform
to this policy document.

11.   ECHOMAIL SOFTWARE:   EchoMail  exchanges may consist of any
type of  archival storage  format agreed  upon by  both  parties.
SEA's ARC 5.1 (non-Squashing) archival storage format will be the
"fallback" if  either party  is unable or unwilling to support an
alternate method.  The continued use of Echomail software without
prior agreement  of both  the sending  and receiving  nodes which
interferes with  the  distribution  of  echomail  shall  lead  to
disciplinary action  as described  previously in  this  document.
See Section  III.   Examples of prohibited software would include
the use  of  non-standard  echomail  packets  which  can  not  be
processed by  the receiving  system. Another example would be the
use  of   poorly  implemented  scanners  or  tossers  that  cause
duplicates or  fail to  forward messages  to downstream links.  A
further example  is the use of Tiny seenby options and the use of
^A hidden SEEN-BY lines.  Use of Echomail software which does not
conform to  the minimum  acceptable standards  as defined  by the
Fidonet  Technical  Standards  Committee  (FTSC)  shall  lead  to
disciplinary action  as described  previously in  this  document.
The Software Certification Committee is authorized  to  determine
whether software meets minimum standards for use on the net.

12.   HOST ROUTING OF ECHOMAIL:  Host routing of Echomail without
the prior  consent of  both the Sending and Receiving Hosts shall
lead to  disciplinary action  as  described  previously  in  this
document.  See Section III.

13.   SENDING OF ECHOMAIL DURING ZONE MAIL HOUR:  Transmission of
echomail during  Zone Mail  Hour as  defined  in  Fidonet  policy
without the  consent  of  the  receiving  system  shall  lead  to
disciplinary action  as described  previously in  this  document.
See Section III.

14.   INTER-NETWORK CONFERENCES:   It  is the  general policy  of
Fidonet   to   encourage   the   development   of   INTER-NETWORK
CONFERENCES.   It shall be the duty of those providing the INTER-
NETWORK CONFERENCE  links  to  remove  foreign  net  distribution
identifiers which  will adversely  effect the distribution of the
Echomail  Conference   while  in   Fidonet.    The  INTER-NETWORK
CONFERENCE links  maintained in  Fidonet shall  be operated  in a
manner not  to interfere  with the foreign network's distribution
of Echomail.

15.   DEFAMATORY POSTING:   The posting of any DEFAMATORY MESSAGE
other than in conferences dedicated to this purpose (i.e. FLAME)
shall lead to disciplinary action as described previously in this
document.   See Section III.   The posting of substantiated facts
shall not be considered a violation under this section.

16.   ADDING OR  REMOVING  CONFERENCES  FROM  THE  Backbone:    A
conference may  be added  to the  Backbone only by request of the
RECOGNIZED Conference  Moderator.   A conference  may be  removed
from the Backbone by lack of traffic. A committee composed of the
ZEC and  4 RECs shall review the status of backbone echos every 6
months.    At  which time those echos which have not maintained a
minimum 10  messages a  week over the preceeding 6 months will be
noted and  their Conference  moderators will be contacted.  These
conferences will  be given  3 months  to improve their traffic or
withdraw from  Fidonet backbone  distribution.    The  recognized
conference moderator may request removal of their conference from
the Fidonet backbone distribution at their discretion.

17.   TOPOLOGY and  DUPLICATE MESSAGES:    Cross  Regional  links
should be  avoided as  they increase the risk of improper linking
and generation  of duplicate  messages.  Cross Regional links may
be established  only with  the permission  of  the  REC  in  each
region.  Each REC will do their best to make available high speed
hubs, out  of state hubs, PC Pursuit hubs, etc, to facilitate the
low cost,  efficient movement  of mail  within  their  respective
Region.  If either REC has reason to believe duplicates are being
introduced into  the system, an existing Cross Regional link must
be immediately cut pending resolution.

Any Sysop  who willfully  and knowingly  establishes  links  that
either create  duplicate loops  (topology that  creates  circular
feeds), increase  the risk  of such loops or who refuses to break
those links  upon request  by their  NEC, REC  or  ZEC  shall  be
subject to  disciplinary action  as described  previously in this
document.  See Section III.

18.   MESSAGE STANDARDS:   Until  the adoption  of a  superceding
standard  by  the  Fidonet  Technical  Standards  Committee,  the
following Echomail message standards will apply:

     a)   Eight-bit characters  (ASCII 128-255)  and non-printing
     low-order codes (ASCII 2-31) are prohibited,  except the use
     of 8Dh(soft   character)  per FTS-0004.    This  is  not
     intended to  discourage participation  of foreign  zones  or
     networks, which  may permit  said characters.   Any echomail
     processor  should   pass  information   exactly  as  it  was
     received, without stripping any non-standard characters.

     b)   Origin lines are limited to 79 characters including the
     required  ending   of  a   proper  network   address   (i.e.
     Zone:Net/Node.Point with zone and point being optional).

     c)   Tear lines  are limited  to 35 characters including the
     required "---  " lead-in.   These may ONLY contain packer or
     editor program  identification.    Tear  lines  for  message
     editors are  discouraged.  If an editor adds a tear line, it
     should also add an origin line to avoid multiple tear lines.

     d)  "Extra"   origin  lines   (ZoneGating)  are  limited  to
     essential information  only.   This consists of the required
     lead-in plus  the network  name "Gateway" and optionally the
     software ID  followed by  a Zone:Net/Node address.
     Example:  " * Origin: FidoNet Gateway (TComm 88:372/666)"

     e)   SEEN-BY addresses  must be  in sorted  order.  Multiple
     AKA's are  not allowed in SEEN-BY lines unless you have more
     than one  address which  processes mail.  Or for  one  month
     during change of an existing address (to avoid duplicates to
     the previous  address).  Node 0 addresses should not be used
     for echomail distribution.

     f)  All current FTSC specifications should be followed.


VI.  ENFORCEMENT

Enforcement of this policy document shall be under the provisions
of  General  FidoNet  policy.    Complaints  concerning  Echomail
violations  defined  under  this  policy  may  be  filed  by  the
aggrieved individual, the conference moderator or by any level of
Echomail Coordinator.   All  complaints  made  pursuant  to  this
policy must  be made  within 60 days of the date of occurrence or
discovery.   Complaints shall  be filed  under the  provisions of
Fidonet Policy, with a copy to the respective *EC.

Enforcement is  immediate, with  any currently  existing software
allowed 60  days to  conform (from  the date  EchoPol1 goes  into
effect).   A 30-day  extension  may  be  granted  solely  at  the
discretion of  the ZEC  if efforts  to bring about compliance are
clear.   Continued use  of aberrant  software after  this  period
shall be deemed excessively annoying.


VII.  ADOPTION OF POLICY

1.     ADOPTION:     This  policy  shall  become  effective  upon
ratification by  a  simple  majority  of  those  voting.    Those
eligible to  vote shall be the IC, ZCs, RCs, NCs, ZECs, RECs, and
NECs.   Those individuals holding more than one position can cast
only one vote.

2.   GRANDFATHER CLAUSE:   Within  60 days  of adoption  of  this
policy, moderators  shall be  appointed for all existing Echomail
Conferences which  do not now have a moderator.  Moderators shall
be appointed  by the  ZEC from those volunteering as moderator or
if no  volunteer is  available then  the ZEC  shall  request  and
appoint a  moderator for  the conference.  In the case where more
than one  individual claims to be the conference moderator and no
agreement can  be reached,  the  ZEC  may  order  the  conference
retired and  ban the further use of the specific conference name.
Failure of the individuals to retire the conference name shall be
deemed excessively annoying behavior.


VI.  BACKBONE STRUCTURE

This section  is for information purposes only.  It gives a plain
English description of the current structure and operation of the
Backbone.   The ZEC  may change  this structure  without amending
this document.

At the  top of  the  Echomail  distribution  network,  there  are
systems  commonly  called  Stars.    These  systems  are  usually
dedicated  to  passing  Echomail.    The  stars  operate  at  the
discretion and direction of the ZEC.  At the time of this writing
there are  3 stars, each has a backup system/plan in the event of
a failure.   In  general, the  Stars link to one another and feed
the RECs.

The RECs  are then  responsible for  distribution of the echomail
within their  Region.   Normally, the  REC will  feed the NECs in
that region.

The NEC  is responsible  for  distribution  of  Echomail  to  the
individual Sysops within a net.

Note that  the RECs  and NECs  can appoint  Hubs to  help in  the
distribution of  Echomail.  That is, they do not have to directly
feed the lower level.

This is  the distribution  GOAL.  Because of less expensive phone
rates and other reasons, this distribution method is not followed
exactly.  Any change to the above requires agreement of the *EC's
involved.   All *ECs  will use  all the  tools at their disposal,
such as hubs, high speed modems, ROA, Wide Area Calling plans, PC
Pursuit, corporate sponsorship, etc., to provide fast, efficient,
and cost effective movement of echomail.

  Echopol Committee:
Mike Ratledge
Norm Henke
Rick McWilliams
Barry Shatswell