-
1
-
-
84888798754
-
-
Corporate Info
-
According to Hormel Foods, the term 'spam' became synonymous with unsolicited commercial email due to Monty Python, whose skit of Vikings boisterously singing 'spam, spam, spam ... ' and drowning out all other conversation exemplified how such email threatens to drown out all email conversation. See further Hornel Foods' Corporate Info, 'SPAM and the Internet', www.spam.com/ci/ci_in.htm.
-
SPAM and the Internet
-
-
Foods, H.1
-
2
-
-
84888787044
-
US biggest source of spam and digital attacks - Un reports lists offenders
-
27 November
-
See 'US Biggest Source of Spam and Digital Attacks - UN reports lists offenders', 27 Inquirer, 27 November 2003, www.theinquirer.net/Particle = 12890.
-
(2003)
27 Inquirer
-
-
-
3
-
-
84888803309
-
The end user: EL' leads the spam fight
-
17 November
-
See also Shannon, 'The End User: EL' Leads the Spam Fight' International Herald Tribune. 17 November 2003, www.iht.com/articles/17855.html. reporting: 'Experts estimate that 85 percent of spam originates with people in the United States. 14 percent from Europe, and the rest from Asia and elsewhere.'
-
(2003)
International Herald Tribune
-
-
Shannon1
-
4
-
-
3242783108
-
Spam - How it is hurting email and degrading life on the internet
-
22 October
-
Fallows. 'Spam - How it is hurting email and degrading life on the internet', Pew Internet & American Life Project. 22 October 2003. p 7. www.pewinternet.org/pdfs/PIP_spam_Report.pdf.
-
(2003)
Pew Internet & American Life Project
, pp. 7
-
-
Fallows1
-
10
-
-
33845752194
-
-
See also 'Spam Could Cost Billions: UN', www.news.com.au/common/ story_page/0,4057,7933247%255E15306, 00.hml, estimating that spam could cost as much as US $20.5 billion.
-
Spam Could Cost Billions: UN
-
-
-
11
-
-
84888791908
-
-
note
-
Founded in 1917, the DMA is today the largest trade association for businesses interested in direct, database and interactive global marketing, with about 5,200 member companies from the US and 44 foreign nations on six continents.
-
-
-
-
13
-
-
32044447528
-
-
1 May released at FTC Spam Forum
-
Mailshell, 'SpamCatcher Attitude Survey'. 1 May 2003, released at FTC Spam Forum, www.ftc.gov/bcp/workshops/spam.
-
(2003)
SpamCatcher Attitude Survey
-
-
Mailshell1
-
14
-
-
32044436580
-
-
13 November
-
Wall Street Journal, 13 November 2002. In one case cited, a mailing of 3.5 million messages resulted in 81 sales in the first week, a rate of 0.0023%. Each sale was worth $19 to the marketing company, resulting in $1.500 in the first week. The cost to send the messages was minimal, probably less than $100 per million mail messages. The study estimated that by the time the marketing company had reached all of the 100 million addresses it had on file, it would probably have pocketed more than $25.000 on the project.
-
(2002)
Wall Street Journal
-
-
-
15
-
-
32044445590
-
-
1 December
-
Revenue generated by spammers in 2003 was expected to be around $130 million, while their profit during the year would range from $20 million to $30 million: Keizer, 'Fighting Spam Pays Better Than Sending It'. 1 December 2003, www.securitypipeline.com/network/16401249.
-
(2003)
Fighting Spam Pays Better Than Sending It
-
-
Keizer1
-
16
-
-
32044452033
-
Fighting spam pays better than sending it
-
1 December
-
Keizer, 'Fighting Spam Pays Better Than Sending It', InformationWeek, 1 December 2003, www.informationweek.com/story/showArticle.jhtml?articleID= 16401194. According to estimates by Ferris Research, which tracks the messaging market, revenue for vendors selling anti-spam products would be approximately $130 million in 2003 and would soar 200% in 2004 to a whopping $360 million. That is substantially more than the senders of spam see in revenue, much less profit.
-
(2003)
InformationWeek
-
-
Keizer1
-
18
-
-
32044460671
-
-
regarding events in
-
See also Festa and Hansen. 'Happy Spamiversary', www.zdnet.com.au/news/ security/0,2000061744,39144765,00.htm, regarding events in 1994.
-
(1994)
Happy Spamiversary
-
-
Festa1
Hansen2
-
20
-
-
84888778913
-
-
CNIL is an independent French authority dealing with data protection, www.cnil.fr. The definition may be different for countries adopting an opt-out approach.
-
-
-
-
21
-
-
84888816076
-
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, OJ L201 31.7
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, OJ L201 31.7.2002. p 37. http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/l_201/l_20120020731en00370047. pdf.
-
(2002)
, pp. 37
-
-
-
22
-
-
32044451356
-
The future of wireless spam
-
Spam activities are now also spreading to mobile phone multi-media messaging ('wireless spam') and instant messaging services ('spim'). See Cramer, 'The future of wireless spam' [2002] Duke L & Tech Rev 0021, www.law.duke.edu/joumals/dltr/articles/PDF/2002DLTR0021. pdf:
-
(2002)
Duke L & Tech Rev 0021
-
-
Cramer1
-
24
-
-
0344891911
-
Technical and legal approaches to unsolicited electronic mail
-
325 at 328 et seq, in particular 333-336
-
Nevertheless, s 4 of the US CAN-SPAM Act talks of 'multiple' commercial electronic mail messages, meaning 'more than 100 electronic mail messages during a 24-hour period, more than 1,000 electronic mail messages during a 30-day period, or more than 10,000 electronic mail messages during a 1-year period'. For a discussion on these notions, see Sorkin, 'Technical and Legal Approaches to Unsolicited Electronic Mail' (2001 ) 35 USF Law Review 325 at 328 et seq, in particular 333-336.
-
(2001)
35 USF Law Review
-
-
Sorkin1
-
25
-
-
32044437001
-
-
23 June
-
In June 2004, an AOL employee was arrested after having sold some 90 million email addresses of AOL customers: see 'AOL worker arrested in spam scheme', 23 June 2004, http://money.cnn.com/2004/06/23/technology/aol_spam/?cnn= yes.
-
(2004)
AOL Worker Arrested in Spam Scheme
-
-
-
26
-
-
33845769666
-
-
DSTI/ICCP(2003)10/Final, 22 January
-
In addition, spammers arc always discovering new techniques for sending spam without being traced. See the paragraph 'Security implications' in the OECD Directorate for Science, Technology and Industry. Committee for Information, Computer and Communications Policy, 'Background Paper for the OECD Workshop on Spam', DSTI/ICCP(2003)10/Final, 22 January 2004, p 16. It is estimated that 90% of viruses are passed through email.
-
(2004)
Background Paper for the OECD Workshop on Spam
, pp. 16
-
-
-
28
-
-
32044470322
-
-
23 August
-
See Blau, 'Big German banks hit by phishing attacks', 23 August 2004, www.computerworld.com/softwaretopics/software/groupware/story/0,10801,95429,00. html.
-
(2004)
Big German Banks Hit by Phishing Attacks
-
-
Blau1
-
30
-
-
32044455366
-
-
July
-
The word 'phishing' recalls the sound of fishing and well represents the activities of these scammers, using email lures to 'fish' for passwords and financial data from the sea of internet users. The particular spelling 'ph' is a common hacker replacement for 'f' and is a nod to the original form of hacking, known as 'phreaking'. Phishing is used to trick recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, and social security numbers by sending messages that direct them to legitimate-looking websites masquerading as the sites of a trusted financial institution or online merchant. The information is then used to access and drain money from their accounts. For detailed information, see Anti-phishing Working Group, 'Phishing Attack Trends Report', July 2004, www.antiphishing.org/ APWG_Phishing_Attack_Report-Jul2004.pdf.
-
(2004)
Phishing Attack Trends Report
-
-
-
31
-
-
84888778515
-
-
note
-
The most targeted businesses have typically been the web auction giant eBay and its PayPal payment services division, with the financial institution Citibank serving as another popular target.
-
-
-
-
32
-
-
32044437880
-
False claims on spam
-
30 April
-
US FTC Report, 'False Claims on Spam', 30 April 2003, www.ftc.gov/reports/spam/030429spamreport.pdf.
-
(2003)
US FTC Report
-
-
-
33
-
-
32044460670
-
-
For a detailed chart, see Salem, 'The Scope of the problem', p 3, www.itu.int/osg/spu/spam/presentations/SALEM_Session%201,pdf.
-
The Scope of the Problem
, pp. 3
-
-
Salem1
-
34
-
-
32044467411
-
-
Association for Interactive Marketing, 'Survey on the Commercial Use of Email', 2002, www.interactivehq.org/councils/CRE/valuesurvey.asp.
-
(2002)
Survey on the Commercial Use of Email
-
-
-
36
-
-
84888777239
-
-
note
-
Furthermore, the cost of increasing bandwidth and storage capacity to deal with spam is inevitably passed on to the consumer in the form of higher access fees.
-
-
-
-
37
-
-
33845775415
-
-
1 November
-
Other research indicates that the costs to service providers are 10% of the overhead cost of providing internet access: see Court and Atkinson. 'How to Can Spam', 1 November 1999, www.ppionline.org/ndol/print.cfm?contentid = 1349.
-
(1999)
How to Can Spam
-
-
-
38
-
-
0344029048
-
-
European Commission, January
-
Gauthronet and Drouard, 'Unsolicited Commercial Communications and Data Protection', European Commission, January 2001, http://europa.eu.int/comm/ internal_market/de/dataprot/studies/spam.htm.
-
(2001)
Unsolicited Commercial Communications and Data Protection
-
-
-
39
-
-
32044454267
-
-
Jupiter Media Corporation, 12 December
-
Assuming it takes three to four seconds to determine the nature of a message and delete it. Another survey conducted by InsightExpress suggests that 65% spent more than ten minutes each day dealing with spam, and 24% reported dealing with it for more than 20 minutes per day: Greenspan and Morrissey, 'Spam expected to outnumber non-spam', Jupiter Media Corporation, 12 December 2002, http://cyberatlas.internet.com/big_picture/applications/article/ 013231301 _155583100.html.
-
(2002)
Spam Expected to Outnumber Non-spam
-
-
Greenspan1
Morrissey2
-
40
-
-
32044450609
-
-
White Paper, Document Version 1.0 January
-
Based on the assumptions that 10% of total email is spam and that each employee spends 30 seconds per day deleting spam: Brightmail The State of spam - Impact and Solutions, White Paper, Document Version 1.0 January 2003, p 7.
-
(2003)
The State of Spam - Impact and Solutions
, pp. 7
-
-
-
41
-
-
33845773568
-
-
The Radicati Group, 'Anti-Spam Market Trends, 2003-2007', www.radicati.com/cgi-local/brochure.pl?pub_id=202&back_link=/single_report/.
-
Anti-spam Market Trends, 2003-2007
-
-
-
43
-
-
84888784172
-
-
For example, (a) Domain-Authorised SMTP Mail by David Green, http://ops.ietf.org/lists/namedroppers/namedroppers.2002/msg00656. html;
-
-
-
-
44
-
-
84888780609
-
-
(b) the RMX DNS RR and method for lightweight SMTP sender authorisation by Hadmut Danisch, www.danisch.de/work/security/txt/drafi-danisch-dns-rr-smtp- 03.txt;
-
-
-
-
45
-
-
84888816927
-
-
(c) Designated Mailer Protocol by Gordon Fecyk, www.pan-am.ca/dmp/drafl- fecyk-dmp-01.txt:
-
-
-
-
46
-
-
84888791087
-
-
(d) Caller ID for Email by Microsoft Caller ID for Email, www.microsoft.com/mscorp/twc/privacy/Spam_callerid.mspx;
-
-
-
-
47
-
-
84888801649
-
-
(e) Sender Policy Framework ('SPF') by Wong Meng Weng and Mark Lentczner, Sender Permitted Form, http://spf.pobox.com;
-
-
-
-
48
-
-
84888799280
-
-
(f) Domain Keys by Yahoo DomainKeys Internet Draft, www.ietf.org/ internet-drafts/draft-delany-domainkeys-base-00.txt.
-
-
-
-
49
-
-
84888777752
-
-
Including adoption by big players, such as AOL, Google and Earthlink
-
Including adoption by big players, such as AOL, Google and Earthlink.
-
-
-
-
51
-
-
84888776755
-
-
note
-
The following is an illustration of how such authentication mechanism is used to prevent forgery: (a) When the destination email server receives an email coming from a certain IP address, the email claims to be from a certain sender, but we need a way to find out if this is genuine. (b) The authentication system will provide one of three things: (i) the sender is good - the sender has previously announced that they do send mail from that IP address; (ii) the sender is bad - the purported sender has published a list of IP addresses they send mail from, and the incoming IP is not one of them; (iii) the sender is unknown - there is insufficient information to decide one way or the other. For the authentication system to answer the question, the domain owners will typically have to designate a list of IP addresses that they use to send mails from their domains.
-
-
-
-
52
-
-
32044462772
-
-
June
-
'MTA Authentication Records in DNS', June 2004, www.ietf.org/internet- drafts/draft-ietf-marid-core-01.txt.
-
(2004)
MTA Authentication Records in DNS
-
-
-
53
-
-
32044475440
-
-
25 June
-
See also 'IETF Releases Anti-Spam Sender ID Internet Draft Specification', 25 June 2004, http://xml.coverpages.org/ni2004-06-25-a.html. Under the merged proposal, organisations will publish information about their outgoing email services, such as their IP address. The Anti-Spam Technical Alliance, including AOL, British Telecom, Comcast, Earthlink, Microsoft and Yahoo! has recently expressed support for Sender ID.
-
(2004)
IETF Releases Anti-spam Sender ID Internet Draft Specification
-
-
-
54
-
-
84888777645
-
-
Such as (a) Mail Abuse Prevention System ('MAPS') Mail Abuse Prevention Real-time Black Hole List, http://mail-abuse.org/;
-
-
-
-
55
-
-
84888795796
-
-
(b) Open-Relay DataBase ('ORDB'), www.ordb.org;
-
-
-
-
56
-
-
84888806237
-
-
Spam Haus BlackHole List, www.Spamhaus.org.
-
-
-
-
57
-
-
84888789939
-
-
note
-
With the result that innocent parties that take over their old domain names and IP addresses find themselves mistakenly dealt with as spammers.
-
-
-
-
58
-
-
84888811986
-
-
note
-
For example, it could set a lower rate limit for servers that are black-listed, but they should not be totally ignored.
-
-
-
-
59
-
-
84888801986
-
-
note
-
Examples of such email attributes are: source of sender (email, mail server etc); subject title; date of email; text within the body of the email; number of intended recipients (derived from 'To' field, 'CC' field etc); type of email attachment (zip, doc etc); format of email (HTML or plain text).
-
-
-
-
60
-
-
84888808140
-
-
note
-
Some examples of filtering rules are as follows: (a) If (source_of_sender contains Spamyou@Spammer.net) MOVE incoming message to JUNK folder; (b) If (source_of_sender contains boss_email_address) MOVE incoming message to VIP folder; (c) If (subject_title contains 'sex' or 'porn') DELETE incoming message.
-
-
-
-
61
-
-
84888776883
-
-
The examples in footnote 47 above demonstrate such an approach to static filtering
-
The examples in footnote 47 above demonstrate such an approach to static filtering.
-
-
-
-
62
-
-
84888782982
-
-
As for example in the following rule: If (email_attachment contains Malicious Executable Program) MOVE incoming message to VIRUS.COLLECTION folder
-
As for example in the following rule: If (email_attachment contains Malicious Executable Program) MOVE incoming message to VIRUS.COLLECTION folder.
-
-
-
-
63
-
-
84888790196
-
-
For example, they will replace the letter 'o' with numeric '0' in the words they use, or they will hide their text within HTML lingo as illustrated in the following example: S E X . This word is not easily decipherable by a human or a non-HTML-enabled email client. However, with an HTML-enabled email client the word 'S E X' will appear correctly, because the client will be able to understand the HTML tag ' ' and know that it represents a blank space between the characters. This intelligent little trick that exploits the HTML rendering capability in modern email clients poses a great challenge to static filtering rules, because there are millions of ways of spelling the word 'SEX' by padding different HTML tags in between the letters. For a solution to this problem, see for example A Swatz's HTML to Text Script, www.aaronsw.com/2002/html2text/.
-
A Swatz's HTML to Text Script
-
-
-
64
-
-
84888780268
-
-
note
-
For example, if the end user keeps telling his or her email client that any incoming messages consisting of the phrase 'get rich fast' should be considered as spam, an adaptive system will be able to deduce the appropriate filtering rule and automatically block any future incoming messages with the phrase 'get rich fast'.
-
-
-
-
65
-
-
3242783893
-
-
August
-
See Graham, 'A Plan for Spam', August 2002, www.paulgraham.com/Spam.html;
-
(2002)
A Plan for Spam
-
-
Graham1
-
68
-
-
84888786443
-
-
Such as the Mozilla email client
-
Such as the Mozilla email client.
-
-
-
-
69
-
-
84888771335
-
-
note
-
One technique involves manipulating the font and background colours so that they are the same, rendering the bogus text invisible (eg white text on white background). Another shortfall is that Bayesian needs to be sufficiently trained before it becomes usable.
-
-
-
-
70
-
-
84888769731
-
-
note
-
Thus, when users move from one email client to another that has a different Bayesian implementation, they will most likely need to spend a few days or even weeks retraining their system from scratch. Furthermore, users tend to get complacent after making use of the Bayesian system for a period of time because the system is fairly good at classifying spam.
-
-
-
-
71
-
-
84888803505
-
-
note
-
For example, blocking email traffic from a spam-friendly site often means blocking a great deal of legitimate email. Closing down an open relay that has been used for sending spam as well as for legitimate purposes can be inconvenient for many users.
-
-
-
-
72
-
-
84888777724
-
-
note
-
Blacklist maintainers, for example, need not disclose the criteria they use nor afford due process to accused spammers. The market does provide a check on such activity, but incomplete information, complexity of the issues and concentration of market power all affect the extent to which blacklists and other anti-spam measures are likely to be held accountable (although see Cyber Promotions, Inc. v AOL, Inc., 948 F. Supp 456, 464 (E.D. Pa 1996) holding that AOL is not likely to be proven an 'essential facility' despite its substantial market share).
-
-
-
-
73
-
-
84979798853
-
Unsolicited Email - Does Europe allow Spam? The State of the Art of the European legislation with regard to unsolicited commercial communications
-
et seq
-
For a good overview before the enactment of the E-Privacy-Directive, see Schaub, 'Unsolicited Email - Does Europe allow Spam? The State of the Art of the European legislation with regard to unsolicited commercial communications' (2002) CLSR, Vol 18 No 2, 99 et seq.
-
(2002)
CLSR
, vol.18
, Issue.2
, pp. 99
-
-
Schaub1
-
74
-
-
84888785472
-
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L281 23.11
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L281 23.11.1995, p 31, http://europa.eu.int/eur-lex/lex/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046: EN:HTML.
-
(1995)
, pp. 31
-
-
-
75
-
-
84888771288
-
-
at 4
-
See also Schaub, supra n 59, at 4.
-
Supra
, Issue.59
-
-
Schaub1
-
76
-
-
84888811911
-
-
The Working Party consists of representatives of each Data Protection Authority in Europe
-
The Working Party consists of representatives of each Data Protection Authority in Europe.
-
-
-
-
78
-
-
84888817150
-
-
Supra n 17.
-
Supra
, Issue.17
-
-
-
79
-
-
84888789463
-
-
Directive 97/7/EC of the European Parliament and of the Council of 20 May 1997 on the protection of consumers in respect of distance contracts, OJ L144 4.6.
-
Directive 97/7/EC of the European Parliament and of the Council of 20 May 1997 on the protection of consumers in respect of distance contracts, OJ L144 4.6.1997, p 19, http://europa.eu.int/eur-lex/lex/LexUriServ/LexUriServ.do?uri= CELEX:31997L0007:EN:HTML.
-
(1997)
, pp. 19
-
-
-
80
-
-
84888786312
-
-
at 5
-
Schaub, supra n 59, at 5.
-
Supra
, Issue.59
-
-
Schaub1
-
81
-
-
84888816526
-
-
Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, OJ L024 30.1.
-
Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, OJ L024 30.1.1998, p 1, http://europa.eu.int/eur-lex/lex/LexUriServ/LexUriServ.do?uri=CELEX:31997L0066: EN:HTML.
-
(1998)
, pp. 1
-
-
-
82
-
-
32844454675
-
The law regulating unsolicited commercial email: An international perspective
-
May
-
Magee, "The law regulating unsolicited commercial email: An international perspective' (May 2003) 19 Santa Clara Computer & High Technology Law Journal 333, p 20.
-
(2003)
19 Santa Clara Computer & High Technology Law Journal
, vol.333
, pp. 20
-
-
Magee1
-
83
-
-
84888784154
-
-
Article 29 Data Protection Working Party, 'Opinion 2/2000 concerning the general review of the telecommunications legal framework', adopted on 3 February 2000, 5009/00/EN/FINAL WP 29, p 3
-
Article 29 Data Protection Working Party, 'Opinion 2/2000 concerning the general review of the telecommunications legal framework', adopted on 3 February 2000, 5009/00/EN/FINAL WP 29, p 3, http://europa.eu.int/comm/internal_market/ privacy/docs/wpdocs/2000/wp29en.pdf.
-
-
-
-
84
-
-
84888768534
-
-
Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market, OJ L178 17.7.
-
Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market, OJ L178 17.7.2000, p 1, http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/l_178/l _17820000717en00010016. pdf.
-
(2000)
, pp. 1
-
-
-
85
-
-
84888771734
-
-
note
-
Recital 30 of the E-Commerce Directive states: 'The sending of unsolicited commercial communications by electronic mail may be undesirable for consumers and information society service providers and may disrupt the smooth functioning of interactive networks; the question of consent by recipient of certain forms of unsolicited commercial communications is not addressed by this Directive, but has already been addressed, in particular, by Directive 97/7/EC and by Directive 97/66/EC; in Member States which authorise unsolicited commercial communications by electronic mail, the setting up of appropriate industry filtering initiatives should be encouraged and facilitated; in addition it is necessary that in any event unsolicited commercial communities are clearly identifiable as such in order to improve transparency and to facilitate the functioning of such industry initiatives; unsolicited commercial communications by electronic mail should not result in additional communication costs for the recipient.'
-
-
-
-
86
-
-
84888790231
-
-
at 6
-
This has been interpreted as the E-Commerce Directive leaving Member States the choice between opt-in and opt-out regimes, although Recital 30 specifically states that the question of consent is not addressed by the Directive: Schaub, supra n 59, at 6.
-
Supra
, Issue.59
-
-
Schaub1
-
88
-
-
84888779024
-
Email-Direktmarketing im neuen europäischen Recht und in der UWG-Reform
-
See also Leistner and Pothmann, 'Email-Direktmarketing im neuen europäischen Recht und in der UWG-Reform', WRP 2003, p 825;
-
WRP 2003
, pp. 825
-
-
Leistner1
Pothmann2
-
89
-
-
84888787414
-
Spamming - Wandel des europäischen Rechtsrahmens
-
Weiler, 'Spamming - Wandel des europäischen Rechtsrahmens', MMR 2003, p 228.
-
MMR 2003
, pp. 228
-
-
Weiler1
-
90
-
-
84888805935
-
-
For a summary of these laws, see Sorkin, www.Spamlaws.com/state/summary, html.
-
-
-
Sorkin1
-
91
-
-
84888816024
-
-
JILT, for an overview in tabular form of the single regulatory mechanisms of the different state laws
-
See also Khong, 'Spam Law for the Internet' (2001) JILT, Issue 3, for an overview in tabular form of the single regulatory mechanisms of the different state laws, http://elj.warwick.ac.uk/jilt/01-3/khong.html.
-
(2001)
Spam Law for the Internet
, Issue.3
-
-
Khong1
-
92
-
-
84888782619
-
-
California Business And Professional Code, Division 7. Part 3. Chapter 1. Art 1.8. 'Restrictions On Unsolicited Commercial Email Advertisers', Ca. Bus. & Prof. ss 17529 and 17538.45
-
California Business And Professional Code, Division 7. Part 3. Chapter 1. Art 1.8. 'Restrictions On Unsolicited Commercial Email Advertisers', Ca. Bus. & Prof. ss 17529 and 17538.45.
-
-
-
-
93
-
-
84888799509
-
-
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), Public Law 108-187, Dec 16, 2003, http://frwebgate.access. gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_public_laws&docid=f:publ187.108. pdf.
-
(2003)
-
-
-
94
-
-
84888792923
-
-
note
-
Recital 16 of the E-Privacy Directive adds to this: 'Information that is part of a broadcasting service provided over a public communications network is intended for a potentially unlimited audience and does not constitute a communication in the sense of this Directive.'
-
-
-
-
95
-
-
84888770246
-
-
Directive 2002/21/EC of the European Parliament and of the Council of 7 March 2002 on a common regulatory framework for electronic communications networks and services, OJ L108 24.4.
-
Directive 2002/21/EC of the European Parliament and of the Council of 7 March 2002 on a common regulatory framework for electronic communications networks and services, OJ L108 24.4.2002, p 33, http://europa.eu.int/ information_society/topics/telecoms/regulatory/new_rf/documents/ l_0820020424en00330050.pdf.
-
(2002)
, pp. 33
-
-
-
96
-
-
84888776507
-
-
note
-
According to Art 2(a) of the Framework Directive, an 'electronic communications network' means 'transmission systems and, where applicable, switching or routing equipment and other resources which permit the conveyance of signals by wire, by radio, by optical or by other electromagnetic means, including satellite networks, fixed (circuit- and packet-switched, including Internet) and mobile terrestrial networks, electricity cable systems (to the extent that they are used for the purpose of transmitting signals), networks used for radio and television broadcasting, and cable television networks, irrespective of the type of information conveyed'.
-
-
-
-
97
-
-
84888793552
-
-
note
-
According to Art 2(c) of the Framework Directive, an 'electronic communications service' means 'a service normally provided for remuneration which consists wholly or mainly in the conveyance of signals on electronic communications networks, including telecommunications services and transmission services in networks used for broadcasting, but excluding services providing, or exercising editorial control over, content transmitted using electronic communications networks and services; it does not include information society services, as defined in Article 1 of Directive 98/34/EC, which do not consist wholly or mainly in the conveyance of signals on electronic communications networks'.
-
-
-
-
98
-
-
32044447944
-
-
13 July FINAL A5-0270/2001 (COM(2000) 385), [emphasis added]
-
The original version of Art 2(h) of the E-Privacy Directive contained the phrase 'which is addressed directly or indirectly to one or more natural or legal persons', instead of 'until it is collected by the recipient'. By contrast, an earlier version of Art 13(1) stated: 'The use of automated calling systems without human intervention (automatic calling machines), facsimile machines (fax) or electronic mail and other personally addressed electronic communications for the purposes of direct marketing may only be allowed in respect of subscribers who have given their prior consent.': Committee on Citizens Freedoms and Rights, Justice and Home Affairs, 'Report on the proposal for a European Parliament and Council directive concerning the processing of personal data and the protection of privacy in the electronic communications sector', 13 July 2001, FINAL A5-0270/2001 (COM(2000) 385), p 58 [emphasis added].
-
(2001)
Report on the Proposal for a European Parliament and Council Directive Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector
, pp. 58
-
-
-
99
-
-
84888792579
-
-
note
-
The objective was to adapt the predecessor of the E-Privacy Directive, the Telecoms Privacy Directive, to developments in the markets and the technologies for electronic communications services in order to provide an equal level of protection of personal data and privacy for users of publicly available electronic communications services, regardless of the technologies used (E-Privacy Directive, Recital 4).
-
-
-
-
100
-
-
84888810655
-
-
note
-
According to Art 2(d) of the Framework Directive, 'public communications network' means 'an electronic communications network used wholly or mainly for the provision of publicly available electronic communications services'. The definition in Art 2(a) of an 'electronic communications network', supra n 80, specifically mentions the internet as a network. With regard to the other phrases: 'which can be stored in the network or on the recipient's terminal equipment' - anything can in principle be stored on terminal equipment, provided it has the appropriate functionality; 'until it is collected by the recipient' before an email user pulls email messages into the inbox of an email program on his computer, the email is stored on the mail-server and it is possible to leave email on the server to be able to use it as an archive when working with web mail, or to retrieve email from the server at different locations (eg at home and at work).
-
-
-
-
101
-
-
84888776481
-
-
note
-
Discussing the exclusion of electronic mail from the opt-in regime of Art 13(1) of the E-Privacy Directive, and the inclusion of SMS, the Council stated 'with protection of the subscriber and of technological neutrality in mind, the Council thought that the subscriber consent arrangements should embrace every use of electronic mail for the purposes of direct marketing purposes, and not just SMS'. The Commission commented on this by stating 'EP amendment 35 proposed to only single out SMS messages and include them in paragraph 1 of this article requiring prior consent of recipients while leaving the approach to other forms of email for the Member States to decide. The Council preferred a harmonised approach on the basis of prior consent for all forms of electronic mail.': Communication from the Commission to the European Parliament pursuant to the second subparagraph of Art 251(2) of the EC Treaty concerning the common position of the Council on the adoption of a Directive of the European Parliament and of the Council on processing of personal data and the protection of privacy in the electronic communications sector, SEC/2002/0124 final-COD 2000/0189, pp 1-2, 17 [emphasis added].
-
-
-
-
102
-
-
84888785220
-
-
note
-
It has also been considered that some service providers offer the translation of SMS into voice messages. If the message results from a manually assisted call and is not further stored as an electronic message, Art 13(3) of the E-Privacy Directive applies.
-
-
-
-
103
-
-
84888797699
-
-
'The proposed Directive is part of a package of five Directives and one Decision intended to reform the existing regulatory framework for electronic communications services and networks in the Community. One of the aims of this overall reform is to create rules which are technology neutral. The legal framework must try to ensure that services are regulated in an equivalent manner, irrespective of the technological means by which they are delivered.': Commission Communication, supra n 85, pp 1-2.
-
Supra
, Issue.85
, pp. 1-2
-
-
-
105
-
-
84888792803
-
-
Council Directive 84/450/EEC of 10 September 1984 relating to the approximation of the laws, regulations and administrative provisions of the Member States concerning misleading advertising, OJ L250, 19.09.1984 p 17
-
Council Directive 84/450/EEC of 10 September 1984 relating to the approximation of the laws, regulations and administrative provisions of the Member States concerning misleading advertising, OJ L250, 19.09.1984 p 17, http://europa.eu.int/eur-lex/lex/LexUriServ/LexUriServ.do?uri=CELEX:31984L0450: EN:HTML.
-
-
-
-
106
-
-
84888810486
-
-
note
-
The phrase 'directly or indirectly' can be interpreted either to include direct marketing in the category of commercial communications or to include communications with an indirect commercial aim such as communications by political parties or charities.
-
-
-
-
107
-
-
84888806303
-
-
note
-
Council of Europe, 'Recommendation No R (85) 20 of the Committee of Ministers to Member States on the protection of personal data used for the purposes of direct marketing', Appendix with Guidelines. 'Recommendation No R (95) 4 of the Committee of Ministers to Member States on the protection of personal data in the area of telecommunication services, with particular reference to telephone services' refers to this 1985 Recommendation.
-
-
-
-
109
-
-
84888802477
-
-
Article 29 Data Protection Working Party, 'Opinion 3/2003 on the European code of conduct of FEDMA for the use of personal data in direct marketing', adopted on 13 June 2003, 10066/03/EN/FINAL WP 77
-
Article 29 Data Protection Working Party, 'Opinion 3/2003 on the European code of conduct of FEDMA for the use of personal data in direct marketing', adopted on 13 June 2003, 10066/03/EN/FINAL WP 77, http://europa.eu.int/comm/ internal_market/privacy/docs/wpdocs/2003/wp77_en.pdf.
-
-
-
-
111
-
-
32044436121
-
The US tackles Spam
-
Westlaw numbering
-
See also Davidson, 'The US tackles Spam', (2005) CTLR 11(1), p 2 (Westlaw numbering), who suggests that it should be interpreted it as encompassing certain email communications not always thought of as commercial advertisements.
-
(2005)
CTLR
, vol.11
, Issue.1
, pp. 2
-
-
Davidson1
-
112
-
-
84888787390
-
-
note
-
As a comparison, the Australian Spam Act 2003 covers unsolicited commercial electronic messages that are sent using email, SMS, MMS and instant messaging. However, it does not cover non-electronic messages (messages sent by way of voice calls using the telephone are specifically excluded in s 5(5)). Furthermore, the Australian Spam Regulations 2004 No 56 exclude facsimile messages from the definition as well. Hence, in this respect they have a narrower application than the European legislation. The Korean Act on Promotion of Information and Communications and Communication Network Utilisation and Protection of 2001, like the EU E-Privacy Directive, was amended in June 2003 to define 'spamming media' as including telephone, fax and other electronic multimedia, as well as email. SMS and 'pop-up' windows are also caught by the Act. This broad application of the Korean Act, like the E-Privacy Directive, thus recognises the serious nuisance posed by various media apart from emails.
-
-
-
-
113
-
-
84888792493
-
-
See 15 U.S.C. ss 44 and 45
-
See 15 U.S.C. ss 44 and 45.
-
-
-
-
114
-
-
84888769215
-
-
Critical on this issue, Ramasastry, supra n 5.
-
Supra
, Issue.5
-
-
Ramasastry1
-
115
-
-
33845798847
-
Is the CAN-SPAM act the answer to the growing problem of spam?
-
See also Trussel, 'Is the CAN-SPAM Act the Answer to the Growing Problem of Spam?' (2004) 16 Loyola Consumer Law Review 175, p 4, www.law.washington.edu/ courses/winn/E539/Assignments/trussell%2 Ocan-Spam.pdf.
-
(2004)
16 Loyola Consumer Law Review
, vol.175
, pp. 4
-
-
Trussel1
-
116
-
-
84979800915
-
Recent international attempts to can Spam
-
on the Australian legislation
-
See Cheng, 'Recent international attempts to can Spam' (2004) CLSR, Vol 20 No 6, 472-479, on the Australian legislation.
-
(2004)
CLSR
, vol.20
, Issue.6
, pp. 472-479
-
-
Cheng1
-
117
-
-
84888809215
-
-
note
-
The Australian Act's wide reach is also explicit in its s 14, which states that the Act 'extends to acts, omissions, matters and things outside Australia'.
-
-
-
-
118
-
-
84888773204
-
-
Article 29 Data Protection Working Party, Document WP 43, adopted on 17 May . Reference could also be made to the first report on the implementation of the Data Protection Directive, (COM(2003) 265 final)
-
Article 29 Data Protection Working Party, Document WP 43, adopted on 17 May 2001. Reference could also be made to the first report on the implementation of the Data Protection Directive, (COM(2003) 265 final), p 18.
-
-
-
-
119
-
-
84888792423
-
-
note
-
Recital 17 of the E-Privacy Directive re-affirms this: 'Consent may be given by any appropriate method enabling a freely given specific and informed indication of the user's wishes, including by ticking a box when visiting an Internet website.'
-
-
-
-
120
-
-
84888792933
-
-
Article 29 Data Protection Working Party Opinion 5/2004, supra n 88, p 5.
-
Supra
, Issue.88
, pp. 5
-
-
-
121
-
-
84888796508
-
-
note
-
However, compare the broader approach of the DTI in the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2003/2426, implementing the Directive), speaking of 'the sale or negotiations for the sale' (reg 22(3)(a)) [emphasis added];
-
-
-
-
122
-
-
84979800898
-
Spam - The meat of the problem
-
and the comments by Butler in 'Spam - the meat of the problem' (2003) CLSR, Vol 19 No 5, 390.
-
(2003)
CLSR
, vol.19
, Issue.5
, pp. 390
-
-
Butler1
-
123
-
-
84888768796
-
-
See Recital 41 of the E-Privacy Directive
-
See Recital 41 of the E-Privacy Directive.
-
-
-
-
124
-
-
84888790892
-
-
Article 29 Data Protection Working Party Opinion, supra n 88, p 9.
-
Supra
, Issue.88
, pp. 9
-
-
-
125
-
-
84888814585
-
-
Article 29 Data Protection Working Party Opinion, supra n 88, p 9.
-
Supra
, Issue.88
, pp. 9
-
-
-
126
-
-
32044459122
-
New european directive 2002/58 on the processing of personal data and the protection of privacy in the electronic communications sector - Some initial remarks
-
Louveaux and Asinari, 'New European Directive 2002/58 on the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector - Some Initial Remarks' (2003) CTLR, Vol 9, No 5, 133-138.
-
(2003)
CTLR
, vol.9
, Issue.5
, pp. 133-138
-
-
Louveaux1
Asinari2
-
127
-
-
84873548196
-
Unsolicited commercial Email: Implementing the EU directive
-
Westlaw numbering
-
For a detailed analysis of the implementation of the exception in the UK, see Munir, 'Unsolicited Commercial Email: Implementing the EU Directive' (2004) CTLR 10(5), 4 (Westlaw numbering).
-
(2004)
CTLR
, vol.10
, Issue.5
, pp. 4
-
-
Munir1
-
128
-
-
84888777391
-
-
Directive 2002/65/EC of the European Parliament and of the Council of 23 September 2002 concerning the distance marketing of consumer financial services and amending Council Directive 90/619/EEC and Directives 97/7/EC and 98/27/EC, OJ L271, 9.10.
-
Directive 2002/65/EC of the European Parliament and of the Council of 23 September 2002 concerning the distance marketing of consumer financial services and amending Council Directive 90/619/EEC and Directives 97/7/EC and 98/27/EC, OJ L271, 9.10.2002, p 16, http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/l_271/ l_27120021009 en00160024.pdf.
-
(2002)
, pp. 16
-
-
-
130
-
-
84888787913
-
-
and Weiler, supra n 74, p 228.
-
Supra
, Issue.74
, pp. 228
-
-
Weiler1
-
131
-
-
32044466304
-
Spam canned through the land? Summary of the CAN-SPAM Act with Commentary
-
February
-
See Fingerman, 'Spam canned through the land? Summary of the CAN-SPAM Act With Commentary', (February 2004) Journal of Internet Law, Vol 7, Issue 8, p 10, in summary with a more optimistic view on the effects of the CAN-SPAM Act with regard to penalties.
-
(2004)
Journal of Internet Law
, vol.7
, Issue.8
, pp. 10
-
-
Fingerman1
-
132
-
-
84888811515
-
-
See also Trussel, supra n 98, p 5.
-
Supra
, Issue.98
, pp. 5
-
-
Trussel1
-
133
-
-
32044466305
-
-
17 July
-
For the completely opposing attitude towards spam, see Morissey, 'Poll: Spam Annoyance Leveling Off', 17 July 2003, www.clickz.com/news/article.php/ 2236631;
-
(2003)
Poll: Spam Annoyance Leveling Off
-
-
Morissey1
|