메뉴 건너뛰기




Volumn 45, Issue 1, 2008, Pages 165-198

SPAM still pays: The failure of the CAN-SPAM Act of 2003 and proposed legal solutions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 41949114572     PISSN: 0017808X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (258)
  • 1
    • 41949117450 scopus 로고    scopus 로고
    • Controlling the Assault of Non-Solicited Pornography and Marketing Act, 15 U.S.C. § 7701 et seq, 2006
    • Controlling the Assault of Non-Solicited Pornography and Marketing Act, 15 U.S.C. § 7701 et seq. (2006).
  • 2
    • 41949089791 scopus 로고    scopus 로고
    • For a detailed definition of spam, see DOUGLAS DOWNING, DICTIONARY OF COMPUTER AND INTERNET TERMS 471 (9th ed. 2006) (Spam is unsolicited and unwelcome advertisements sent to people via e-mail or posted in newsgroups.).
    • For a detailed definition of spam, see DOUGLAS DOWNING, DICTIONARY OF COMPUTER AND INTERNET TERMS 471 (9th ed. 2006) ("Spam is unsolicited and unwelcome advertisements sent to people via e-mail or posted in newsgroups.").
  • 3
    • 41949096155 scopus 로고    scopus 로고
    • Spam apparently gets its name from a Monty Python skit. Monty Python's Flying Circus (BBC One television broadcast Sept. 1970), available at http://video.google.com/videoplay?docid=5627694446211716271&q=monty+ python+spam&hl=en.
    • Spam apparently gets its name from a Monty Python skit. Monty Python's Flying Circus (BBC One television broadcast Sept. 1970), available at http://video.google.com/videoplay?docid=5627694446211716271&q=monty+ python+spam&hl=en.
  • 6
    • 41949092273 scopus 로고    scopus 로고
    • See, e.g., Microsoft Adds New Spam Filtering Technology Across E-mail Platforms, http://www.microsoft.com/presspass/features/2003/nov03/11- 17spamfilter.mspx (last visited Oct. 20, 2007) (Recent reports also show that the of spam likely comprises more than 50 percent of total e-mail traffic today.);
    • See, e.g., Microsoft Adds New Spam Filtering Technology Across E-mail Platforms, http://www.microsoft.com/presspass/features/2003/nov03/11- 17spamfilter.mspx (last visited Oct. 20, 2007) ("Recent reports also show that the volume of spam likely comprises more than 50 percent of total e-mail traffic today.");
  • 7
    • 77649310330 scopus 로고    scopus 로고
    • note 4 noting that prior to the CAN-SPAM Act, spam comprised between 50% and 60% of all e-mail
    • Zeller, supra note 4 (noting that prior to the CAN-SPAM Act, spam comprised between 50% and 60% of all e-mail).
    • supra
    • Zeller1
  • 8
    • 41949118971 scopus 로고    scopus 로고
    • See Zeller, supra note 4;
    • See Zeller, supra note 4;
  • 9
    • 41949102245 scopus 로고    scopus 로고
    • MessageLabs, MessageLabs Intelligence, last visited Oct. 17
    • see also MessageLabs, MessageLabs Intelligence, http://www. messagelabs.co.uk/intelligence.aspx (last visited Oct. 17, 2007).
    • (2007) see also
  • 10
    • 41949126253 scopus 로고    scopus 로고
    • According to Australian IT, a technology news website, nine out of ten e-mails are spam. Britain Under Spam Siege, AUSTRALIAN IT, Nov. 28, 2006, http://australianit.news.com.au/articles/0,7204,20835469%5E15 318%5E%5Enbv%5E,00.html.
    • According to Australian IT, a technology news website, nine out of ten e-mails are spam. Britain Under Spam Siege, AUSTRALIAN IT, Nov. 28, 2006, http://australianit.news.com.au/articles/0,7204,20835469%5E15 318%5E%5Enbv%5E,00.html.
  • 11
    • 41949136022 scopus 로고    scopus 로고
    • How to Stop Junk E-mail: Charge for the Stamp
    • Feb. 13, at
    • Randall Stross, How to Stop Junk E-mail: Charge for the Stamp, N.Y. TIMES, Feb. 13, 2005, at C5.
    • (2005) N.Y. TIMES
    • Stross, R.1
  • 12
    • 41949107971 scopus 로고    scopus 로고
    • Stone, supra note 3 at Al.
    • Stone, supra note 3 at Al.
  • 13
    • 41949104739 scopus 로고    scopus 로고
    • See Timothy J. Muris, Chairman, Fed. Trade Comm'n, Prepared Remarks at the Aspen Summit: Cyberspace and the American Dream (Aug. 19, 2003), http://www.ftc.gov/speeches/muris/030819aspen.htm#N_97.
    • See Timothy J. Muris, Chairman, Fed. Trade Comm'n, Prepared Remarks at the Aspen Summit: Cyberspace and the American Dream (Aug. 19, 2003), http://www.ftc.gov/speeches/muris/030819aspen.htm#N_97.
  • 14
    • 41949102893 scopus 로고    scopus 로고
    • The panelists at the forum included representatives of ISPs, marketers, law enforcement, legislators, technologists, and bulk e-mailers. Id.
    • The panelists at the forum included representatives of ISPs, marketers, law enforcement, legislators, technologists, and bulk e-mailers. Id.
  • 15
    • 41949093028 scopus 로고    scopus 로고
    • Id
    • Id.
  • 16
    • 84956547845 scopus 로고    scopus 로고
    • § 7701 et seq, 2006
    • 15 U.S.C. § 7701 et seq. (2006).
    • 15 U.S.C
  • 17
    • 41949102576 scopus 로고    scopus 로고
    • The term rules of conduct is used in Dominique-Chantale Alepin,Opting-Out: A Technical, Legal and Practical Look at the CAN-SPAM Act of 2003, 28 COLUM. J.L. & ARTS 41, 44 (2004).
    • The term "rules of conduct" is used in Dominique-Chantale Alepin,"Opting-Out": A Technical, Legal and Practical Look at the CAN-SPAM Act of 2003, 28 COLUM. J.L. & ARTS 41, 44 (2004).
  • 18
    • 41949119254 scopus 로고    scopus 로고
    • § 7704a
    • § 7704(a).
  • 19
    • 41949139735 scopus 로고    scopus 로고
    • Id
    • Id.
  • 20
    • 41949134483 scopus 로고    scopus 로고
    • § 7707. For a more detailed discussion of the CAN-SPAM Act, see infra, Part III.B.
    • § 7707. For a more detailed discussion of the CAN-SPAM Act, see infra, Part III.B.
  • 21
    • 41949114045 scopus 로고    scopus 로고
    • DEBORAH FALLOWS, PEW INTERNET & AMERICAN LIFE PROJECT, SPAM: HOW IT IS HURTING EMAIL AND DEGRADING LIFE ON THE INTERNET 7 (2003), http://www.pewinternet. org/pdfs/PIP_Spam_Report.pdf (last visited Oct. 4, 2007).
    • DEBORAH FALLOWS, PEW INTERNET & AMERICAN LIFE PROJECT, SPAM: HOW IT IS HURTING EMAIL AND DEGRADING LIFE ON THE INTERNET 7 (2003), http://www.pewinternet. org/pdfs/PIP_Spam_Report.pdf (last visited Oct. 4, 2007).
  • 22
    • 41949105055 scopus 로고    scopus 로고
    • Estimates of the financial costs of spam vary wildly. Research firms peg the price per worker at anywhere from $50 per worker to $1,400 per year. Others estimate the annual cost to American business to be between $10 billion and $87 billion
    • "Estimates of the financial costs of spam vary wildly. Research firms peg the price per worker at anywhere from $50 per worker to $1,400 per year. Others estimate the annual cost to American business to be between $10 billion and $87 billion." Id.
  • 23
    • 41949133438 scopus 로고    scopus 로고
    • Meet the Kings of Spam, CBS NEWS, Aug. 5, 2002, http://www.cbsnews.com/stories/2002/08/05/tech/main517505. shtml [hereinafter Meet the Kings of Spam] ('It's the marketing medium of the future. You can't get around it,' said [Tom] Cowles, [head of a large spam business,] whose MassiveFX e-mailing software allows a client to send a billion or so messages per month.).
    • Meet the Kings of Spam, CBS NEWS, Aug. 5, 2002, http://www.cbsnews.com/stories/2002/08/05/tech/main517505. shtml [hereinafter Meet the Kings of Spam] ("'It's the marketing medium of the future. You can't get around it,' said [Tom] Cowles, [head of a large spam business,] whose MassiveFX e-mailing software allows a client to send a billion or so messages per month.").
  • 24
    • 41949116244 scopus 로고    scopus 로고
    • Spam is generally filtered by software and hardware designed specifically for the task. Spam may be filtered by the e-mail client (e.g., Microsoft Outlook), by the e-mail server, by a separate device, or by all of the above in concert. Common methods of filtering involve white/black lists that identify valid and invalid senders, spam definitions, and Bayesian techniques. See, e.g., DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 471.
    • Spam is generally filtered by software and hardware designed specifically for the task. Spam may be filtered by the e-mail client (e.g., Microsoft Outlook), by the e-mail server, by a separate device, or by all of the above in concert. Common methods of filtering involve white/black lists that identify valid and invalid senders, spam definitions, and Bayesian techniques. See, e.g., DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 471.
  • 25
    • 41949097708 scopus 로고    scopus 로고
    • Troubleshooting problems with the spam filters generally involves identifying false-positives-i.e., legitimate e-mails that the filters identify as spam. See, e.g., Sharon Gaudin, False Positives: Spam's Casualty of War Costing Billions, DATAMATION, http://itmanagement.earthweb. com/secu/article.php/2245991 (last visited Oct. 4, 2007) ('Of great importance to corporate is that 70 percent of people have not gotten e-mail that was expected.' ).
    • Troubleshooting problems with the spam filters generally involves identifying false-positives-i.e., legitimate e-mails that the filters identify as spam. See, e.g., Sharon Gaudin, False Positives: Spam's Casualty of War Costing Billions, DATAMATION, http://itmanagement.earthweb. com/secu/article.php/2245991 (last visited Oct. 4, 2007) ('"Of great importance to corporate is that 70 percent of people have not gotten e-mail that was expected.' ").
  • 26
    • 41949116538 scopus 로고    scopus 로고
    • Muris, supra note 9
    • Muris, supra note 9.
  • 28
    • 41949097402 scopus 로고    scopus 로고
    • DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 267 (An Internet Service Provider (access provider) is a company that provides its customers with access to the Internet, typically through DSL, a cable modem, or dial-up networking.).
    • DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 267 (An "Internet Service Provider (access provider) is a company that provides its customers with access to the Internet, typically through DSL, a cable modem, or dial-up networking.").
  • 30
    • 41949102244 scopus 로고    scopus 로고
    • See Muris, supra note 9, for an example of the extremely low response rate required to make spamming profitable-i.e., 0.0001%.
    • See Muris, supra note 9, for an example of the extremely low response rate required to make spamming profitable-i.e., 0.0001%.
  • 31
    • 41949134169 scopus 로고    scopus 로고
    • Whether legal or non-legal, any solution to the problem of spam e-mail will require technological relevance. However, the public and private entities that develop relevant technologies will be motivated by legal and economic risks and incentives. See John C. Klensin, Taking Another Look at the Spam Problem, INTERNET PROTOCOL J, Dec. 2005, at 15, available at http://www.cisco.com/web/about/ac123/ac147/archived_issues/ ipj_8-4/ipj_8-4.pdf In order to design effective technological countermeasures with predictable and acceptable side-effects, we must first understand what measures society is willing to take-what laws it is willing to pass and enforce to make spam a criminal or civilly-punishable act-to set an appropriate context and set of boundary conditions
    • Whether legal or non-legal, any solution to the problem of spam e-mail will require technological relevance. However, the public and private entities that develop relevant technologies will be motivated by legal and economic risks and incentives. See John C. Klensin, Taking Another Look at the Spam Problem, INTERNET PROTOCOL J., Dec. 2005, at 15, available at http://www.cisco.com/web/about/ac123/ac147/archived_issues/ ipj_8-4/ipj_8-4.pdf ("In order to design effective technological countermeasures with predictable and acceptable side-effects, we must first understand what measures society is willing to take-what laws it is willing to pass and enforce to make spam a criminal or civilly-punishable act-to set an appropriate context and set of boundary conditions.").
  • 32
    • 41949129469 scopus 로고    scopus 로고
    • See Alepin, supra note 12, at 44;
    • See Alepin, supra note 12, at 44;
  • 33
    • 41949101946 scopus 로고    scopus 로고
    • Gaudin, supra note 18
    • Gaudin, supra note 18.
  • 34
    • 41949105678 scopus 로고    scopus 로고
    • For details about spam filters, see DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 471-72.
    • For details about spam filters, see DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 471-72.
  • 35
    • 41949134170 scopus 로고    scopus 로고
    • See Gaudin, supra note 18;
    • See Gaudin, supra note 18;
  • 36
    • 41949118697 scopus 로고    scopus 로고
    • see also Stefanie Olsen, Canning Spam Without Eating Up Real Mail, CNET NEWS.COM, July 12, 2002, available at http://www.news.com/2100-1023-943337.html;
    • see also Stefanie Olsen, Canning Spam Without Eating Up Real Mail, CNET NEWS.COM, July 12, 2002, available at http://www.news.com/2100-1023-943337.html;
  • 38
    • 41949114041 scopus 로고    scopus 로고
    • See Muris, supra note 9
    • See Muris, supra note 9.
  • 39
    • 41949092269 scopus 로고    scopus 로고
    • For an excellent description of how e-mail systems work (and why a National Do Not E-mail Registry will not work), see FED. TRADE COMMN, NATIONAL DO NOT EMAIL REGISTRY: A REPORT TO CONGRESS (2004) [hereinafter 2004 FTC REPORT], available at http://www.ftc.gov/reports/ dneregistry/report.pdf.
    • For an excellent description of how e-mail systems work (and why a National Do Not E-mail Registry will not work), see FED. TRADE COMM"N, NATIONAL DO NOT EMAIL REGISTRY: A REPORT TO CONGRESS (2004) [hereinafter 2004 FTC REPORT], available at http://www.ftc.gov/reports/ dneregistry/report.pdf.
  • 40
    • 41949137268 scopus 로고    scopus 로고
    • Muris, supra note 9
    • Muris, supra note 9.
  • 41
    • 41949104440 scopus 로고    scopus 로고
    • See Meet the Kings of Spam, supra note 17
    • See Meet the Kings of Spam, supra note 17.
  • 42
    • 41949127105 scopus 로고    scopus 로고
    • See Part II for more details about current proposed non-legal solutions to the problem of spam
    • See infra Part II for more details about current proposed non-legal solutions to the problem of spam.
    • infra
  • 43
    • 41949115267 scopus 로고    scopus 로고
    • Id
    • Id.
  • 44
    • 41949099009 scopus 로고    scopus 로고
    • CNN.COM, Mar. 5
    • See Gates: Buy Stamps to Send E-mail, CNN.COM, Mar. 5, 2004, http://www.cnn.com/2004/TECH/internet/03/05/spam.charge.ap;
    • (2004) See Gates: Buy Stamps to Send E-mail
  • 45
    • 84943235829 scopus 로고    scopus 로고
    • Microsoft Research, The Penny Black Project, http://research.microsoft. com/research/sv/PennyBlack/(last visited Oct. 4, 2007) (In a nutshell, the idea is this: 'If I don't know you, and you want to send me mail, then you must prove to me that you have expended a certain amount of effort, just for me and just for this message.'). The idea behind the Penny Black project has been around for over a decade. See Cynthia Dwork & Moni Naor, Pricing via Processing or Combatting Junk Email, 740 LECTURE NOTES IN COMPUTER SCI. 139 (1993), available at http://research.microsoft.com/research/sv/PennyBlack/junk1 .pdf.
    • Microsoft Research, The Penny Black Project, http://research.microsoft. com/research/sv/PennyBlack/(last visited Oct. 4, 2007) ("In a nutshell, the idea is this: 'If I don't know you, and you want to send me mail, then you must prove to me that you have expended a certain amount of effort, just for me and just for this message.'"). The idea behind the Penny Black project has been around for over a decade. See Cynthia Dwork & Moni Naor, Pricing via Processing or Combatting Junk Email, 740 LECTURE NOTES IN COMPUTER SCI. 139 (1993), available at http://research.microsoft.com/research/sv/PennyBlack/junk1 .pdf.
  • 46
    • 41949109246 scopus 로고    scopus 로고
    • Id
    • Id.
  • 47
    • 41949095141 scopus 로고    scopus 로고
    • CertifiedEmail Program Description, http://postmaster.aol.com/whitelist/ certifiedemail. html#begin (last visited Oct. 20, 2007).
    • CertifiedEmail Program Description, http://postmaster.aol.com/whitelist/ certifiedemail. html#begin (last visited Oct. 20, 2007).
  • 48
    • 41949128382 scopus 로고    scopus 로고
    • Spam Mushrooms
    • See, e.g, Sept. 2, at
    • See, e.g., Verne Kopytoff, Spam Mushrooms, S.F. CHRON., Sept. 2, 2004, at C1;
    • (2004) S.F. CHRON
    • Kopytoff, V.1
  • 49
    • 41949091961 scopus 로고    scopus 로고
    • Want to Stop Spam? Multiple Techniques in Unison is the Answer, 24 COMPUTER
    • John Korsak, Want to Stop Spam? Multiple Techniques in Unison is the Answer, 24 COMPUTER TECH. REV. 1, 36 (2004);
    • (2004) TECH. REV , vol.1 , pp. 36
    • Korsak, J.1
  • 51
    • 41949142361 scopus 로고    scopus 로고
    • Mike Musgrove, Paid E-mail Seen as Sign of Culture Change, WASH. POST, Feb. 7, 2006, at D5 (With the accompanying seal, recipients can be confident that an e-mail came from, say, the American Red Cross-one early customer of the service-and not from some hacker in Russia trying to trick users out of their credit card numbers.).
    • Mike Musgrove, Paid E-mail Seen as Sign of Culture Change, WASH. POST, Feb. 7, 2006, at D5 ("With the accompanying seal, recipients can be confident that an e-mail came from, say, the American Red Cross-one early customer of the service-and not from some hacker in Russia trying to trick users out of their credit card numbers.").
  • 52
    • 41949090700 scopus 로고    scopus 로고
    • See Goodmail Systems, Who Accepts Certified Email?, http://www.goodmailsystems. com/partners/who_accepts.php (last visited Nov. 17, 2007).
    • See Goodmail Systems, Who Accepts Certified Email?, http://www.goodmailsystems. com/partners/who_accepts.php (last visited Nov. 17, 2007).
  • 53
    • 41949124653 scopus 로고    scopus 로고
    • Goodmail Systems, CertifiedEmail, http://web.archive.org/web/ 20060301005319/www. goodmailsystems.com/certifiedmail/(last visited Nov. 17, 2007).
    • Goodmail Systems, CertifiedEmail, http://web.archive.org/web/ 20060301005319/www. goodmailsystems.com/certifiedmail/(last visited Nov. 17, 2007).
  • 54
    • 41949101947 scopus 로고    scopus 로고
    • See Microsoft Research, supra note 35
    • See Microsoft Research, supra note 35.
  • 55
    • 41949119547 scopus 로고    scopus 로고
    • Cynthia Dwork & Andrew V. Goldberg, Common Misconceptions about Computational Spam-Fighting, http://research.microsoft.com/research/sv/ PennyBlack/spam-com.html (last visited Oct. 4, 2007).
    • Cynthia Dwork & Andrew V. Goldberg, Common Misconceptions about Computational Spam-Fighting, http://research.microsoft.com/research/sv/ PennyBlack/spam-com.html (last visited Oct. 4, 2007).
  • 56
    • 41949103823 scopus 로고    scopus 로고
    • See Gates: Buy Stamps to Send E-mail, supra note 35;
    • See Gates: Buy Stamps to Send E-mail, supra note 35;
  • 57
    • 41949113564 scopus 로고    scopus 로고
    • Microsoft Research, supra note 35
    • Microsoft Research, supra note 35.
  • 58
    • 41949087428 scopus 로고    scopus 로고
    • Dwork & Naor, supra note 35
    • Dwork & Naor, supra note 35.
  • 59
    • 41949121570 scopus 로고    scopus 로고
    • See Dwork & Goldberg, supra note 42
    • See Dwork & Goldberg, supra note 42.
  • 61
    • 41949106636 scopus 로고    scopus 로고
    • Jones notes that a further challenge to implementation is that there are problems with systems only being efficient on a large scale. As a result, they are hard to implement because they only make sense once they are widely adopted and they are difficult to implement widely. Taken together, in our opinion, it is difficult to come to market as a micropayment provider that must (1) simultaneously woo both consumers and digital content providers needed to (2) achieve early adoption traction before (3) someday achieving scale in order to (4) exploit a transaction cost advantage that is critical for (5) being financially viable. There are just too many inter-dependencies in this business model. Id
    • Jones notes that a further challenge to implementation is that there are problems with systems only being efficient on a large scale. As a result, they are hard to implement because they only make sense once they are widely adopted and they are difficult to implement widely. "Taken together, in our opinion, it is difficult to come to market as a micropayment provider that must (1) simultaneously woo both consumers and digital content providers needed to (2) achieve early adoption traction before (3) someday achieving scale in order to (4) exploit a transaction cost advantage that is critical for (5) being financially viable. There are just too many inter-dependencies in this business model." Id.
  • 62
    • 41949108591 scopus 로고    scopus 로고
    • Id
    • Id.
  • 63
    • 41949142703 scopus 로고    scopus 로고
    • Video: An Economic Response to Unsolicited Communication (Marshall Van Alstyne 2006), available at http://video.google.com/videoplay?docid= 1483515704800867685&q= spam+and+false-positives&hl=en.
    • Video: An Economic Response to Unsolicited Communication (Marshall Van Alstyne 2006), available at http://video.google.com/videoplay?docid= 1483515704800867685&q= spam+and+false-positives&hl=en.
  • 64
    • 33644881439 scopus 로고    scopus 로고
    • See also Theodore Loder et al., An Economic Response to Unsolicited Communication, 6 ADVANCES ECON. ANALYSIS & POL'Y (2006), available at http://www.bepress.com/bejeap/advances/vol6/iss1/art2.
    • See also Theodore Loder et al., An Economic Response to Unsolicited Communication, 6 ADVANCES ECON. ANALYSIS & POL'Y (2006), available at http://www.bepress.com/bejeap/advances/vol6/iss1/art2.
  • 65
    • 41949106959 scopus 로고    scopus 로고
    • See Loder et al, supra note 48
    • See Loder et al., supra note 48.
  • 66
    • 41949120919 scopus 로고    scopus 로고
    • Id
    • Id.
  • 67
    • 41949106294 scopus 로고    scopus 로고
    • See Jones, supra note 46
    • See Jones, supra note 46.
  • 68
    • 41949109545 scopus 로고    scopus 로고
    • Spam zombies, or spam bots, are computers that are part of a distributed network designed to send spam e-mail. These networks, or botnets, are created by infecting unwitting users' computers with malicious software designed specifically for the purpose of spamming. See, e.g., John Markoff, Attack of the Zombie Computers is a Growing Threat, N.Y. TIMES, Jan. 7, 2007, at Al.
    • "Spam zombies," or "spam bots," are computers that are part of a distributed network designed to send spam e-mail. These networks, or "botnets," are created by infecting unwitting users' computers with malicious software designed specifically for the purpose of spamming. See, e.g., John Markoff, Attack of the Zombie Computers is a Growing Threat, N.Y. TIMES, Jan. 7, 2007, at Al.
  • 69
    • 84963456897 scopus 로고    scopus 로고
    • note 46 and accompanying text
    • See supra note 46 and accompanying text.
    • See supra
  • 70
    • 41949118970 scopus 로고    scopus 로고
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
  • 71
    • 41949113270 scopus 로고    scopus 로고
    • See, e.g.. White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005).
    • See, e.g.. White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005).
  • 72
    • 41949107616 scopus 로고    scopus 로고
    • See Rowan v. U.S. Post Office Dep't, 397 U.S. 728 (1970) (postal mail);
    • See Rowan v. U.S. Post Office Dep't, 397 U.S. 728 (1970) (postal mail);
  • 73
    • 41949089496 scopus 로고    scopus 로고
    • FTC v. Main-stream Mktg. Servs., Inc., 358 F.3d 1228 (10th Cir. 2004) (phone calls);
    • FTC v. Main-stream Mktg. Servs., Inc., 358 F.3d 1228 (10th Cir. 2004) (phone calls);
  • 74
    • 41949105383 scopus 로고    scopus 로고
    • Missouri ex rel. Nixon v. Am. Blast Fax, Inc., 323 F.3d 649 (8th Cir. 2003), cert, denied, 540 U.S. 1104 (2004) (junk faxes).
    • Missouri ex rel. Nixon v. Am. Blast Fax, Inc., 323 F.3d 649 (8th Cir. 2003), cert, denied, 540 U.S. 1104 (2004) (junk faxes).
  • 75
    • 41949136023 scopus 로고    scopus 로고
    • These cases are reviewed in Alepin, supra note 12, at 49-53
    • These cases are reviewed in Alepin, supra note 12, at 49-53.
  • 76
    • 41949107970 scopus 로고    scopus 로고
    • 15 U.S.C § 7707(b) (2006).
    • 15 U.S.C § 7707(b) (2006).
  • 77
    • 41949105675 scopus 로고    scopus 로고
    • Communications Workers of America, 496
    • holding that whether speech is commercial depends on whether it 'proposes a commercial transaction' or promotes specific products or services For a definition of commercial speech, see
    • For a definition of commercial speech, see Aitken v. Communications Workers of America, 496 F. Supp 2d 653, 664 (2007) (holding that "whether speech is commercial depends on whether it 'proposes a commercial transaction' or promotes specific products or services")
    • (2007) F. Supp 2d , vol.653 , pp. 664
    • Aitken, V.1
  • 78
    • 41949137837 scopus 로고    scopus 로고
    • (citing Bd. of Trustees of State Univ. of N.Y. v. Fox, 492 U.S. 469, 473 (1989)
    • (citing Bd. of Trustees of State Univ. of N.Y. v. Fox, 492 U.S. 469, 473 (1989)
  • 79
    • 41949111095 scopus 로고    scopus 로고
    • and Vill. of Schaumburg v. Citizens for a Better Env't, 444 U.S. 620, 632 (1990)).
    • and Vill. of Schaumburg v. Citizens for a Better Env't, 444 U.S. 620, 632 (1990)).
  • 80
    • 41949124656 scopus 로고    scopus 로고
    • Rowan, 397 U.S. at 737. Those that determine what constitutes consumer privacy rely in part on common sense.
    • Rowan, 397 U.S. at 737. Those that determine what constitutes "consumer privacy" rely in part on common sense.
  • 81
    • 41949140778 scopus 로고    scopus 로고
    • Fraternal Order of Police v. Stenehjem, 287 F. Supp 2d 1023, 1027 (D.N.D. 2003), rev'd on other grounds, (Simple common sense dictates that an unwanted call from a telemarketer would be an invasion of privacy.).
    • Fraternal Order of Police v. Stenehjem, 287 F. Supp 2d 1023, 1027 (D.N.D. 2003), rev'd on other grounds, ("Simple common sense dictates that an unwanted call from a telemarketer would be an invasion of privacy.").
  • 82
    • 41949140779 scopus 로고    scopus 로고
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
  • 83
    • 41949129773 scopus 로고    scopus 로고
    • Id. at 562-63 (The Constitution therefore accords a lesser protection to commercial speech than to other constitutionally guaranteed expression.)
    • Id. at 562-63 ("The Constitution therefore accords a lesser protection to commercial speech than to other constitutionally guaranteed expression.")
  • 84
    • 41949096154 scopus 로고    scopus 로고
    • Id. at 564 (If the communication is neither misleading nor related to unlawful activity, the government's power is more circumscribed. The State must assert a substantial interest to be achieved by restrictions on commercial speech.).
    • Id. at 564 ("If the communication is neither misleading nor related to unlawful activity, the government's power is more circumscribed. The State must assert a substantial interest to be achieved by restrictions on commercial speech.").
  • 85
    • 41949107276 scopus 로고    scopus 로고
    • also Stenehjem, 287
    • at
    • See also Stenehjem, 287 F. Supp 2d at 1027.
    • F. Supp , vol.2 d , pp. 1027
  • 86
    • 41949093929 scopus 로고    scopus 로고
    • Stenehjem, 287 F. Supp 2d at 1026
    • Stenehjem, 287 F. Supp 2d at 1026
  • 87
    • 41949085152 scopus 로고    scopus 로고
    • S. at
    • (citing Central Hudson, 447 U.S. at 577).
    • Central Hudson , vol.447 , Issue.U , pp. 577
  • 88
    • 41949092271 scopus 로고    scopus 로고
    • See also Alepin, supra note 12, at 52
    • See also Alepin, supra note 12, at 52.
  • 89
    • 41949105053 scopus 로고    scopus 로고
    • See City of Cincinnati v. Discovery Networks, Inc., 507 U.S. 410, 417 (1993).
    • See City of Cincinnati v. Discovery Networks, Inc., 507 U.S. 410, 417 (1993).
  • 90
    • 41949091960 scopus 로고    scopus 로고
    • Missouri ex rel. Nixon v. American Blast Fax, Inc., 323 F.3d 649, 654 (8th Cir. 2003), (internal quotations omitted)
    • Missouri ex rel. Nixon v. American Blast Fax, Inc., 323 F.3d 649, 654 (8th Cir. 2003), (internal quotations omitted)
  • 91
    • 41949117145 scopus 로고    scopus 로고
    • (quoting Florida Bar v. Went For It, Inc., 515 U.S. 618, 628 (1995)).
    • (quoting Florida Bar v. Went For It, Inc., 515 U.S. 618, 628 (1995)).
  • 92
    • 41949107969 scopus 로고    scopus 로고
    • American Blast Fax, 323 F.3d at 652.
    • American Blast Fax, 323 F.3d at 652.
  • 93
    • 41949096762 scopus 로고    scopus 로고
    • See also Telephone Consumer Protection Act of 1991, 47 U.S.C. § 227 2006
    • See also Telephone Consumer Protection Act of 1991, 47 U.S.C. § 227 (2006).
  • 94
    • 41949125934 scopus 로고    scopus 로고
    • See Moser v. FCC, 46 F.3d 970, 972 (9th Cir. 1995).
    • See Moser v. FCC, 46 F.3d 970, 972 (9th Cir. 1995).
  • 95
    • 41949126252 scopus 로고    scopus 로고
    • Courts have also distinguished advertising from solicitation, with advertising having more protection under the First Amendment than solicitation. Silverman v. Walkup, 21 F. Supp 2d 775, 778 (E.D. Tenn. 1998).
    • Courts have also distinguished advertising from solicitation, with advertising having more protection under the First Amendment than solicitation. Silverman v. Walkup, 21 F. Supp 2d 775, 778 (E.D. Tenn. 1998).
  • 96
    • 41949142702 scopus 로고    scopus 로고
    • The Do Not Call Registry has been very effective at stopping telemarketing calls. See Press Release, Fed. Trade Comm'n, National Do Not Call Registry Celebrates One-Year Anniversary (June 14, 2004), http://www.ftc.gov/opa/2004/06/dncanny.shtm (The Do Not Call Registry has made dinnertime interruptions a thing of the past.).
    • The Do Not Call Registry has been very effective at stopping telemarketing calls. See Press Release, Fed. Trade Comm'n, National Do Not Call Registry Celebrates One-Year Anniversary (June 14, 2004), http://www.ftc.gov/opa/2004/06/dncanny.shtm ("The Do Not Call Registry has made dinnertime interruptions a thing of the past.").
  • 97
    • 41949131710 scopus 로고    scopus 로고
    • The Registry was upheld following a First Amendment content based restriction challenge in Mainstream Marketing Systems, Inc. v. FTC, 358 F.3d 1228, 1232-33 (10th Cir. 2004).
    • The Registry was upheld following a First Amendment "content based restriction" challenge in Mainstream Marketing Systems, Inc. v. FTC, 358 F.3d 1228, 1232-33 (10th Cir. 2004).
  • 98
    • 41949125933 scopus 로고    scopus 로고
    • Note that the FTC has determined that an opt-in e-mail registry would be counterproductive. See 2004 FTC REPORT, supra note 29.
    • Note that the FTC has determined that an opt-in e-mail registry would be counterproductive. See 2004 FTC REPORT, supra note 29.
  • 99
    • 41949097086 scopus 로고    scopus 로고
    • See, e.g., Bolger v. Youngs Drug Prods. Corp., 463 U.S. 60, 70 (1983) (quoting Consol. Edison Co. v. Pub. Serv. Comm'n, 447 U.S. 530, 542 (1980)).
    • See, e.g., Bolger v. Youngs Drug Prods. Corp., 463 U.S. 60, 70 (1983) (quoting Consol. Edison Co. v. Pub. Serv. Comm'n, 447 U.S. 530, 542 (1980)).
  • 100
    • 41949085764 scopus 로고    scopus 로고
    • 39 U.S.C § 3010 (2006).
    • 39 U.S.C § 3010 (2006).
  • 101
    • 41949134795 scopus 로고    scopus 로고
    • See, e.g., Destination Ventures, Ltd. v. FCC, 844 F. Supp. 632, 635 (D.Or. 1994) (In the case of fax advertising ... the recipient assumes both the cost of the associated with the use of the facsimile machine and, the cost of the expensive paper used to print out facsimile messages. It is important to note that these costs are borne by the recipient of the fax advertisement regardless of their interest in the product or service being advertised.).
    • See, e.g., Destination Ventures, Ltd. v. FCC, 844 F. Supp. 632, 635 (D.Or. 1994) ("In the case of fax advertising ... the recipient assumes both the cost of the associated with the use of the facsimile machine and, the cost of the expensive paper used to print out facsimile messages. It is important to note that these costs are borne by the recipient of the fax advertisement regardless of their interest in the product or service being advertised.").
  • 102
    • 41949084875 scopus 로고    scopus 로고
    • White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005).
    • White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005).
  • 103
    • 41949130439 scopus 로고    scopus 로고
    • Id. at 369
    • Id. at 369.
  • 104
    • 41949115266 scopus 로고    scopus 로고
    • See also Jameel Harb, White Buffalo Ventures, LLC v. University of Texas at Austin: 77ie CAN-SPAM Act & the Limitations of Legislative Spam Controls, 21 BERKELEY TECH. L.J. 531, 546 2006, Harb argues that legislation will not solve spam because the only effective solution-banning spam per se-will have a chilling effect on speech and thus violate the First Amendment. However, under the author's own analysis, spam is even more onerous than a junk fax or a prerecorded telemarketing call, both of which have been outlawed per se without the bans being ruled unconstitutional under the First Amendment. Applying the Fifth Circuit's reasoning in permitting the University of Texas to block all spam, it follows that Congress should be permitted to seek the same anti-spam result through federal legislation such as that proposed in Part IV
    • See also Jameel Harb, White Buffalo Ventures, LLC v. University of Texas at Austin: 77ie CAN-SPAM Act & the Limitations of Legislative Spam Controls, 21 BERKELEY TECH. L.J. 531, 546 (2006). Harb argues that legislation will not solve spam because the only effective solution-banning spam per se-will have a chilling effect on speech and thus violate the First Amendment. However, under the author's own analysis, spam is even more onerous than a junk fax or a prerecorded telemarketing call, both of which have been outlawed per se without the bans being ruled unconstitutional under the First Amendment. Applying the Fifth Circuit's reasoning in permitting the University of Texas to block all spam, it follows that Congress should be permitted to seek the same anti-spam result through federal legislation such as that proposed in Part IV.
  • 105
    • 41949096764 scopus 로고    scopus 로고
    • White Buffalo Ventures, 420 F.3d at 374.
    • White Buffalo Ventures, 420 F.3d at 374.
  • 106
    • 41949110145 scopus 로고    scopus 로고
    • Id. at 375
    • Id. at 375.
  • 107
    • 41949132494 scopus 로고    scopus 로고
    • See also id. at 377 ([D]eclaring server integrity to be a substantial interest without evidentiary substantiation might have unforeseen and undesirable ramifications in other online contexts.).
    • See also id. at 377 ("[D]eclaring server integrity to be a substantial interest without evidentiary substantiation might have unforeseen and undesirable ramifications in other online contexts.").
  • 108
    • 41949107615 scopus 로고    scopus 로고
    • Id. at 374-76
    • Id. at 374-76.
  • 109
    • 41949089495 scopus 로고    scopus 로고
    • Id. at 369
    • Id. at 369.
  • 110
    • 41949132192 scopus 로고    scopus 로고
    • Harb, supra note 73, at 542 ([B]ecause UT justified at least one of its substantial interests under the user efficiency rationale, the court held that UT's anti-spam policy survived First Amendment scrutiny and was constitutionally permissible under Central Hudson, irrespective of UT's failure to support its server efficiency argument.).
    • Harb, supra note 73, at 542 ("[B]ecause UT justified at least one of its substantial interests under the user efficiency rationale, the court held that UT's anti-spam policy survived First Amendment scrutiny and was constitutionally permissible under Central Hudson, irrespective of UT's failure to support its server efficiency argument.").
  • 111
    • 41949140056 scopus 로고    scopus 로고
    • White Buffalo Ventures, 420 F.3d at 378.
    • White Buffalo Ventures, 420 F.3d at 378.
  • 112
    • 41949083673 scopus 로고    scopus 로고
    • See, e.g., Shunning Spam, CBS NEWS, July 13, 2003, http://www.cbsnews.com/stories/2003/07/10/sunday/main562630.shtml ('The Can Spam act is basically about empowering the consumer, making sure that the consumer can say they don't want to receive this material, and then [imposing] stiff penalties for misrepresentation .... People have got to identify themselves and they can't use all these dodges and ruses to get around it.').
    • See, e.g., Shunning Spam, CBS NEWS, July 13, 2003, http://www.cbsnews.com/stories/2003/07/10/sunday/main562630.shtml ("'The Can Spam act is basically about empowering the consumer, making sure that the consumer can say they don't want to receive this material, and then [imposing] stiff penalties for misrepresentation .... People have got to identify themselves and they can't use all these dodges and ruses to get around it.'").
  • 113
    • 41949120917 scopus 로고    scopus 로고
    • Id
    • Id.
  • 114
    • 41949105676 scopus 로고    scopus 로고
    • Anti-Spam Bill Gains in Senate; Big Internet Firms Endorse Measure
    • June 20, at
    • Jonathan Krim, Anti-Spam Bill Gains in Senate; Big Internet Firms Endorse Measure, WASH. POST, June 20, 2003, at E5.
    • (2003) WASH. POST
    • Krim, J.1
  • 115
    • 41949096763 scopus 로고    scopus 로고
    • See also Press Release, Fed. Trade Comm'n, National Do Not Call Registry Celebrates One-Year Anniversary (June 24, 2004), http://www.ftc.gov/ opa/2004/06/dncanny.shtm (We set out to give consumers a choice about the calls coming into their homes, and the program is a resounding success.).
    • See also Press Release, Fed. Trade Comm'n, National Do Not Call Registry Celebrates One-Year Anniversary (June 24, 2004), http://www.ftc.gov/ opa/2004/06/dncanny.shtm ("We set out to give consumers a choice about the calls coming into their homes, and the program is a resounding success.").
  • 116
    • 41949132493 scopus 로고    scopus 로고
    • See Zeller, supra note 4
    • See Zeller, supra note 4.
  • 117
    • 41949139424 scopus 로고    scopus 로고
    • Id
    • Id.
  • 118
    • 41949095514 scopus 로고    scopus 로고
    • See also FED. TRADE COMM'N, THE CAN-SPAM ACT: REQUIREMENTS FOR COMMERCIAL EMAILERS (2004), http://www.ftc.gov/bcp/conline/ pubs/buspubs/canspam.htm.
    • See also FED. TRADE COMM'N, THE CAN-SPAM ACT: REQUIREMENTS FOR COMMERCIAL EMAILERS (2004), http://www.ftc.gov/bcp/conline/ pubs/buspubs/canspam.htm.
  • 119
    • 84956547845 scopus 로고    scopus 로고
    • § 7704(a)3, 2006
    • 15 U.S.C. § 7704(a)(3) (2006).
    • 15 U.S.C
  • 120
    • 41949100868 scopus 로고    scopus 로고
    • § 7704(a)5
    • § 7704(a)(5).
  • 121
    • 41949086126 scopus 로고    scopus 로고
    • § 7706c
    • § 7706(c).
  • 122
    • 41949131385 scopus 로고    scopus 로고
    • § 7706d
    • § 7706(d).
  • 123
    • 41949089790 scopus 로고    scopus 로고
    • § 7706(b)3
    • § 7706(b)(3).
  • 124
    • 41949109248 scopus 로고    scopus 로고
    • § 7706(b)10
    • § 7706(b)(10).
  • 125
    • 41949131992 scopus 로고    scopus 로고
    • § 7706(b)(1)B
    • § 7706(b)(1)(B).
  • 126
    • 41949128049 scopus 로고    scopus 로고
    • § 7706(b); § 7706(f); § 7706(g).
    • § 7706(b); § 7706(f); § 7706(g).
  • 127
    • 41949137836 scopus 로고    scopus 로고
    • § 7706(g)1, 3
    • § 7706(g)(1)-(3).
  • 128
    • 41949125267 scopus 로고    scopus 로고
    • This conclusion is held almost universally. See Stross, supra note 7 The law did not prohibit unsolicited commercial e-mail and has turned out to be worse than useless, Before Can-Spam, the legal status of spam was ambiguous, said Professor David E. Sorkin, an associate professor at the Center for Information Technology and Privacy Law at the John Marshall Law School in Chicago, Now, it's clear: it's regarded as legal
    • This conclusion is held almost universally. See Stross, supra note 7 ("The law did not prohibit unsolicited commercial e-mail and has turned out to be worse than useless. 'Before Can-Spam, the legal status of spam was ambiguous,' said Professor David E. Sorkin, an associate professor at the Center for Information Technology and Privacy Law at the John Marshall Law School in Chicago. 'Now, it's clear: it's regarded as legal.'").
  • 129
    • 41949099310 scopus 로고    scopus 로고
    • See also Harb, supra note 73, at 535 ([T]he CAN-SPAM Act has been viewed as less restrictive [than the patchwork of numerous conflicting state laws], and ultimately as less effective. ... As it stands now, neither state nor federal attempts appear to have had any meaningful effect on reducing the aggregate level of spam.).
    • See also Harb, supra note 73, at 535 ("[T]he CAN-SPAM Act has been viewed as less restrictive [than the patchwork of numerous conflicting state laws], and ultimately as less effective. ... As it stands now, neither state nor federal attempts appear to have had any meaningful effect on reducing the aggregate level of spam.").
  • 130
    • 41949136992 scopus 로고    scopus 로고
    • See generally Lily Zhang, The CAN-SPAM Act: An Insufficient Response to the Growing Spam Problem, 20 BERKELEY TECH. L.J. 301 (2005).
    • See generally Lily Zhang, The CAN-SPAM Act: An Insufficient Response to the Growing Spam Problem, 20 BERKELEY TECH. L.J. 301 (2005).
  • 131
    • 41949103820 scopus 로고    scopus 로고
    • See generally Klensin, supra note 24;
    • See generally Klensin, supra note 24;
  • 133
    • 41949116540 scopus 로고    scopus 로고
    • See Klensin, supra note 23
    • See Klensin, supra note 23.
  • 134
    • 84963456897 scopus 로고    scopus 로고
    • notes 11-15 and accompanying text
    • See supra notes 11-15 and accompanying text.
    • See supra
  • 135
    • 41949087108 scopus 로고    scopus 로고
    • Jared Strauss, The Do Not Call List's Big Hangup, 10 RICH. J.L. & TECH. 27, 28 (2004).
    • Jared Strauss, The Do Not Call List's Big Hangup, 10 RICH. J.L. & TECH. 27, 28 (2004).
  • 136
    • 84956547845 scopus 로고    scopus 로고
    • § 7704(a)5, 2006
    • 15 U.S.C. § 7704(a)(5) (2006).
    • 15 U.S.C
  • 137
    • 41949131383 scopus 로고    scopus 로고
    • See, e.g., The Spamhaus Project, Should You Send Removes Back to Spammers?, http://www.spamhaus.org/removeisformugs. html (last visited Oct. 18, 2007) (By sending back a 'remove me' opt-out request you are confirming to the spammer that your address is live, you are confirming that your ISP doesn't use spam filters, you are confirming that you actually open and read spams, and that you follow the spammer's instructions such as 'click this to be removed.' You are the perfect candidate for more spam.).
    • See, e.g., The Spamhaus Project, Should You Send "Removes" Back to Spammers?, http://www.spamhaus.org/removeisformugs. html (last visited Oct. 18, 2007) ("By sending back a 'remove me' opt-out request you are confirming to the spammer that your address is live, you are confirming that your ISP doesn't use spam filters, you are confirming that you actually open and read spams, and that you follow the spammer's instructions such as 'click this to be removed.' You are the perfect candidate for more spam.").
  • 138
    • 41949106004 scopus 로고    scopus 로고
    • See Do-Not-Call Implementation Act, 149 CONG. REC. H412 (daily ed. Feb. 12, 2003) (statement of Rep. Dingle).
    • See Do-Not-Call Implementation Act, 149 CONG. REC. H412 (daily ed. Feb. 12, 2003) (statement of Rep. Dingle).
  • 139
    • 41949133753 scopus 로고    scopus 로고
    • See also Strauss, supra note 97, at 28-30
    • See also Strauss, supra note 97, at 28-30.
  • 140
    • 41949121875 scopus 로고    scopus 로고
    • The ban on junk faxes has been updated by the Junk Fax Prevention Act of 2005, Pub. L. No. 109-21, § 2, 119 Stat. 359, 359 (codified as amended at 47 U.S.C. § 227(b)(1)C, 2006
    • The ban on junk faxes has been updated by the Junk Fax Prevention Act of 2005, Pub. L. No. 109-21, § 2, 119 Stat. 359, 359 (codified as amended at 47 U.S.C. § 227(b)(1)(C) (2006)).
  • 141
    • 41949083671 scopus 로고    scopus 로고
    • Initial FTC efforts to limit unsolicited telemarketing involved tasking the telemarketers themselves with maintaining do-not-call lists. This proved ineffective and so the National Do Not Call Registry was created. See FED. TRADE COMM'N, ANNUAL REPORT TO CONGRESS FOR FY 2005 2006, available at
    • Initial FTC efforts to limit unsolicited telemarketing involved tasking the telemarketers themselves with maintaining do-not-call lists. This proved ineffective and so the National Do Not Call Registry was created. See FED. TRADE COMM'N, ANNUAL REPORT TO CONGRESS FOR FY 2005 (2006), available at http://www.ftc.gov/os/2006/07/P034305HscalYear2005 NationalDoNotCallRegistryReport.pdf.
  • 142
    • 41949094517 scopus 로고    scopus 로고
    • The report stated: The National Do Not Call Registry is, by virtually every available measure, an effective consumer protection initiative. By the end of FY 2005, more than 107 million telephone numbers were registered, and the available data show that compliance with the National Do Not Call Registry provisions of the Amended Telemarketing Sales Rule ('TSR') is high and that, as a result, consumers are receiving fewer unwanted telemarketing calls. Id. (footnote omitted).
    • The report stated: The National Do Not Call Registry is, by virtually every available measure, an effective consumer protection initiative. By the end of FY 2005, more than 107 million telephone numbers were registered, and the available data show that compliance with the National Do Not Call Registry provisions of the Amended Telemarketing Sales Rule ('TSR') is high and that, as a result, consumers are receiving fewer unwanted telemarketing calls. Id. (footnote omitted).
  • 143
    • 41949087737 scopus 로고    scopus 로고
    • Strauss, supra note 97, at 28-30
    • Strauss, supra note 97, at 28-30.
  • 144
    • 41949092405 scopus 로고    scopus 로고
    • Missouri ex rel. Nixon v. Am. Blast Fax, Inc., 323 F.3d 649, 660 (8th Cir. 2003);
    • Missouri ex rel. Nixon v. Am. Blast Fax, Inc., 323 F.3d 649, 660 (8th Cir. 2003);
  • 145
    • 41949110143 scopus 로고    scopus 로고
    • Mainstream Mktg. Sys., Inc. v. FTC, 358 F.3d 1228, 1251 (10th Cir. 2004).
    • Mainstream Mktg. Sys., Inc. v. FTC, 358 F.3d 1228, 1251 (10th Cir. 2004).
  • 147
    • 41949114351 scopus 로고    scopus 로고
    • Interestingly, Congress evaluated twenty-eight proposed anti-spam laws before passing the CAN-SPAM Act of 2003. See, e.g., Anti-Phishing Act of 2005, S.472, 109th Cong. (2005). In this context, the CAN-SPAM Act should be viewed as only the first step in the legislative effort to solve the problem of spam.
    • Interestingly, Congress evaluated twenty-eight proposed anti-spam laws before passing the CAN-SPAM Act of 2003. See, e.g., Anti-Phishing Act of 2005, S.472, 109th Cong. (2005). In this context, the CAN-SPAM Act should be viewed as only the first step in the legislative effort to solve the problem of spam.
  • 148
    • 41949136991 scopus 로고    scopus 로고
    • Strictly speaking, the CAN-SPAM Act does not define illegal spam, but instead proscribes various types of e-mail with codes of conduct. See discussion supra Introduction and Part III.B. For a discussion of UCE by the FTC,
    • Strictly speaking, the CAN-SPAM Act does not define illegal spam, but instead proscribes various types of e-mail with codes of conduct. See discussion supra Introduction and Part III.B. For a discussion of UCE by the FTC,
  • 149
    • 41949127106 scopus 로고    scopus 로고
    • see Spamming: Hearing Before the Subcomm. on Communications of the S. Comm. on Commerce, Science, and Transportation, 107th Cong. 6-16 (2001) (prepared statement of Eileen Harrington, Associate Director of Marketing Practices, FTC Bureau of Consumer Protection), available at http://frwebgate.access.gpo.gov/cgibin/useftp.cgi?IPaddress=162.140.64. 182&filename=88536.pdf&directory=/diska/wais/data/107_senate_hea rings.
    • see Spamming: Hearing Before the Subcomm. on Communications of the S. Comm. on Commerce, Science, and Transportation, 107th Cong. 6-16 (2001) (prepared statement of Eileen Harrington, Associate Director of Marketing Practices, FTC Bureau of Consumer Protection), available at http://frwebgate.access.gpo.gov/cgibin/useftp.cgi?IPaddress=162.140.64. 182&filename=88536.pdf&directory=/diska/wais/data/107_senate_hearings.
  • 150
    • 41949111092 scopus 로고    scopus 로고
    • For a detailed discussion of the various codes of conduct found in the CAN-SPAM Act of 2003, see generally Alepin, supra note 12.
    • For a detailed discussion of the various codes of conduct found in the CAN-SPAM Act of 2003, see generally Alepin, supra note 12.
  • 151
    • 41949096761 scopus 로고    scopus 로고
    • Eileen Harrington, Fed. Trade Comm'n Bureau of Consumer Prot., Statement to the Senate Subcomm. on Commc'n: Unsolicited Commercial E-mail, (Apr. 26, 2001), available at http://www.ftc.gov/os/2001/04/unsolicommemail.htm.
    • Eileen Harrington, Fed. Trade Comm'n Bureau of Consumer Prot., Statement to the Senate Subcomm. on Commc'n: Unsolicited Commercial E-mail, (Apr. 26, 2001), available at http://www.ftc.gov/os/2001/04/unsolicommemail.htm.
  • 152
    • 41949114042 scopus 로고    scopus 로고
    • See also Spamming: The E-mail You Want to Can: Hearing before the Subcomm. on Communications of the S. Comm. on Commerce, Science, and Transportation, 106th Cong. 25 (1999) (prepared statement of Eileen Harrington, Associate Director of Marketing, FTC Bureau of Consumer Protection), available at http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi? IPaddress = 162.140.64.182&filename=610 40.pdf&directory=/data/wais/ data/106_house_hearings, (Unsolicited commercial e-mail-'UCE,' or 'spam,' in the online vernacular-is any commercial electronic mail message sent, often in bulk, to a consumer without the consumer's prior request or consent.).
    • See also Spamming: The E-mail You Want to Can: Hearing before the Subcomm. on Communications of the S. Comm. on Commerce, Science, and Transportation, 106th Cong. 25 (1999) (prepared statement of Eileen Harrington, Associate Director of Marketing, FTC Bureau of Consumer Protection), available at http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi? IPaddress = 162.140.64.182&filename=610 40.pdf&directory=/data/wais/ data/106_house_hearings, ("Unsolicited commercial e-mail-'UCE,' or 'spam,' in the online vernacular-is any commercial electronic mail message sent, often in bulk, to a consumer without the consumer's prior request or consent.").
  • 153
    • 41949103819 scopus 로고    scopus 로고
    • See the Introduction and Part III.B. for an overview of the codes of conduct found in the CAN-SPAM Act of 2003. See also Alepin, supra note 12.
    • See the Introduction and Part III.B. for an overview of the codes of conduct found in the CAN-SPAM Act of 2003. See also Alepin, supra note 12.
  • 154
    • 41949100557 scopus 로고    scopus 로고
    • Alepin, supra note 12
    • Alepin, supra note 12.
  • 155
    • 41949129156 scopus 로고    scopus 로고
    • See discussion infra Part IV.A.
    • See discussion infra Part IV.A.
  • 157
    • 41949127104 scopus 로고    scopus 로고
    • Press Release, The European Commission, Fighting Spam, Spy ware and Malicious Software: Member States Should Do Better, Says Commission (Nov. 27, 2006), available at http://europa.eu/rapid/pressReleasesAction.do? reference=ip/06/1629&format=HTML&aged =O&language= EN&guiLanguage=en.
    • Press Release, The European Commission, Fighting Spam, Spy ware and Malicious Software: Member States Should Do Better, Says Commission (Nov. 27, 2006), available at http://europa.eu/rapid/pressReleasesAction.do? reference=ip/06/1629&format=HTML&aged =O&language= EN&guiLanguage=en.
  • 158
    • 41949141110 scopus 로고    scopus 로고
    • Because an open relay is an e-mail server configured to accept and transfer e-mail on behalf of any user anywhere, including unrelated third parties, spammers can route their e-mail through servers of other organizations, disguising the origin of the e-mail. An open proxy is a mis-configured proxy server through which an unauthorized user can connect to the Internet. Spammers use open proxies to send spam from the computer network's ISP or to find an open relay. Timothy J. Muris, Chairman, Fed. Trade Comm'n, Remarks at the Progress and Freedom Foundation Aspen Summit on Cyberspace and the American Dream (Aug. 19, 2003), available at http://www.ftc.gov/speeches/muris/ 030819aspen.shtm.
    • "Because an open relay is an e-mail server configured to accept and transfer e-mail on behalf of any user anywhere, including unrelated third parties, spammers can route their e-mail through servers of other organizations, disguising the origin of the e-mail. An open proxy is a mis-configured proxy server through which an unauthorized user can connect to the Internet. Spammers use open proxies to send spam from the computer network's ISP or to find an open relay." Timothy J. Muris, Chairman, Fed. Trade Comm'n, Remarks at the Progress and Freedom Foundation Aspen Summit on Cyberspace and the American Dream (Aug. 19, 2003), available at http://www.ftc.gov/speeches/muris/ 030819aspen.shtm.
  • 159
    • 41949104441 scopus 로고    scopus 로고
    • Id
    • Id.
  • 160
    • 41949133754 scopus 로고    scopus 로고
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
    • Central Hudson Gas & Elec. Co. v. New York, 447 U.S. 557, 561-62 (1980).
  • 161
    • 41949121261 scopus 로고    scopus 로고
    • Id. at 564
    • Id. at 564.
  • 162
    • 41949109824 scopus 로고    scopus 로고
    • A content-based restriction is defined as follows: A restraint on the substance of a particular type of speech. This type of restriction are [sic] presumptively invalid but can survive a constitutional challenge if it is based on a compelling state interest and its measures are narrowly drawn to accomplish that end. BLACK'S LAW DICTIONARY 337 (8th ed. 2004).
    • A content-based restriction is defined as follows: "A restraint on the substance of a particular type of speech. This type of restriction are [sic] presumptively invalid but can survive a constitutional challenge if it is based on a compelling state interest and its measures are narrowly drawn to accomplish that end." BLACK'S LAW DICTIONARY 337 (8th ed. 2004).
  • 163
    • 41949100558 scopus 로고    scopus 로고
    • See also Boos v. Barry, 485 U.S. 312, 320-22 (1988).
    • See also Boos v. Barry, 485 U.S. 312, 320-22 (1988).
  • 164
    • 33947268364 scopus 로고    scopus 로고
    • S. at
    • Central Hudson, 447 U.S. at 566.
    • Central Hudson , vol.447 , Issue.U , pp. 566
  • 166
    • 41949085453 scopus 로고    scopus 로고
    • See generally Strauss, supra note 97
    • See generally Strauss, supra note 97.
  • 167
    • 41949139108 scopus 로고    scopus 로고
    • Mainstream Mktg. Servs., Inc., 358 F.3d 1228
    • FTC v. Mainstream Mktg. Servs., Inc., 358 F.3d 1228, 1232-33 (10th Cir. 2004).
    • (2004) 1232-33 (10th Cir
    • FTC, V.1
  • 168
    • 41949099638 scopus 로고    scopus 로고
    • 2004 FTC REPORT, supra note 29.
    • 2004 FTC REPORT, supra note 29.
  • 169
    • 41949135719 scopus 로고    scopus 로고
    • Id
    • Id.
  • 170
    • 41949107613 scopus 로고    scopus 로고
    • Id
    • Id.
  • 171
    • 41949129771 scopus 로고    scopus 로고
    • Id
    • Id.
  • 172
    • 41949119256 scopus 로고    scopus 로고
    • Id. at 14
    • Id. at 14.
  • 173
    • 41949093928 scopus 로고    scopus 로고
    • Id. at 15
    • Id. at 15.
  • 174
    • 41949126751 scopus 로고    scopus 로고
    • See Muris, supra note 113
    • See Muris, supra note 113.
  • 175
    • 41949096443 scopus 로고    scopus 로고
    • See FTC REPORT, note 29
    • See 2004 FTC REPORT, supra note 29.
    • (2004) supra
  • 176
    • 41949115921 scopus 로고    scopus 로고
    • Do Not E-mail Site a Scam, U.S. Officials Say, REUTERS, Feb. 13, 2004, available at http://www.usatoday.com/ news/nation/2004-02-13-no-spam-list-scam_x.htm.
    • "Do Not E-mail" Site a Scam, U.S. Officials Say, REUTERS, Feb. 13, 2004, available at http://www.usatoday.com/ news/nation/2004-02-13-no-spam-list-scam_x.htm.
  • 177
    • 41949093027 scopus 로고    scopus 로고
    • Id
    • Id.
  • 178
    • 41949139108 scopus 로고    scopus 로고
    • Mainstream Mktg. Servs., Inc., 358 F.3d 1228
    • FTC v. Mainstream Mktg. Servs., Inc., 358 F.3d 1228, 1233 (10th Cir. 2004).
    • (2004) 1233 (10th Cir
    • FTC, V.1
  • 179
    • 41949106005 scopus 로고    scopus 로고
    • See Spamhaus.org, Acceptable Use Policies (AUP), http://www.spamhaus.org/aups. html (last visited Oct. 3, 2007).
    • See Spamhaus.org, Acceptable Use Policies ("AUP"), http://www.spamhaus.org/aups. html (last visited Oct. 3, 2007).
  • 180
    • 41949131709 scopus 로고    scopus 로고
    • Message level authentication involves authenticating the content of the e-mail itself. For example, a technology called S/MIME uses public/private key cryptography to authenticate e-mail messages. See Webopedia Computer Dictionary, Definition of S/MIME, available at http://www.webopedia.eom/ TERM/S/S_MIME.htm (last visited Oct. 21, 2007).
    • Message level authentication involves authenticating the content of the e-mail itself. For example, a technology called S/MIME uses public/private key cryptography to authenticate e-mail messages. See Webopedia Computer Dictionary, Definition of S/MIME, available at http://www.webopedia.eom/ TERM/S/S_MIME.htm (last visited Oct. 21, 2007).
  • 181
    • 41949131991 scopus 로고    scopus 로고
    • Examples of user level authentication include Certified Server Validation (CSV), Sender Policy Framework (SPF'), and Sender-ID. See also Mark Brownlow, Email Authentication (2006), http://www.email-marketing- reports.com/emailauthentication.htm (last visited Oct. 3, 2007).
    • Examples of user level authentication include Certified Server Validation ("CSV"), Sender Policy Framework ("SPF'), and Sender-ID. See also Mark Brownlow, Email Authentication (2006), http://www.email-marketing- reports.com/emailauthentication.htm (last visited Oct. 3, 2007).
  • 182
    • 41949107612 scopus 로고    scopus 로고
    • An IP address is a number that uniquely identifies a network device. See Central Washington University Brooks Library, Glossary of Library & Computing Terms, last visited Oct. 3, 2007
    • An IP address is a number that uniquely identifies a network device. See Central Washington University Brooks Library, Glossary of Library & Computing Terms, http://www. lib.cwu.edu/research/help/cwuglos.html (last visited Oct. 3, 2007).
  • 183
    • 41949112316 scopus 로고    scopus 로고
    • To date, the most popular form of user level authentication is SPF. SPF verifies the envelope sender address against an SPF record in DNS. The SPF record is configured by the domain operator to include the IP address of legitimate e-mail senders for the domain. For example, the operator of du.edu might indicate in his or her SPF record that mail from du.edu should come from 130.253.1.75. See Sender Policy Framework, Introduction, http://www. openspf.org/Introduction (last visited Oct. 3, 2007).
    • To date, the most popular form of user level authentication is SPF. SPF verifies the envelope sender address against an SPF record in DNS. The SPF record is configured by the domain operator to include the IP address of legitimate e-mail senders for the domain. For example, the operator of du.edu might indicate in his or her SPF record that mail from du.edu should come from 130.253.1.75. See Sender Policy Framework, Introduction, http://www. openspf.org/Introduction (last visited Oct. 3, 2007).
  • 184
    • 34848845137 scopus 로고    scopus 로고
    • Craig Spiezl, The Urgent Need to Implement E-Mail Authentication, last visited Oct. 3
    • See also Craig Spiezl, The Urgent Need to Implement E-Mail Authentication, http://aotalliance.org/resources/why_email_authentication. pdf (last visited Oct. 3, 2007).
    • (2007) See also
  • 185
    • 41949101948 scopus 로고    scopus 로고
    • See Comcast, Frequently Asked Questions, http://www.comcast.net/ help/faq/index.jsp? faq=email 118405 (last visited Oct. 3, 2007).
    • See Comcast, Frequently Asked Questions, http://www.comcast.net/ help/faq/index.jsp? faq=email 118405 (last visited Oct. 3, 2007).
  • 186
    • 41949136990 scopus 로고    scopus 로고
    • CSV is a system that validates the IP address of the sending e-mail server. Mutual Internet Protocol Associates, Certified Server Verification, http://mipassoc.org/csv/(last visited Oct. 3, 2007). See also Dave Crocker, Challenges in Anti-Spam Efforts, INTERNET PROTOCOL J., Dec. 2005, at 2, 12, available at http://www.cisco.com/web/about/ac123/acl47/archived_issues/ipj_8-4/ipj_8 -4.pdf.
    • CSV is a system that validates the IP address of the sending e-mail server. Mutual Internet Protocol Associates, Certified Server Verification, http://mipassoc.org/csv/(last visited Oct. 3, 2007). See also Dave Crocker, Challenges in Anti-Spam Efforts, INTERNET PROTOCOL J., Dec. 2005, at 2, 12, available at http://www.cisco.com/web/about/ac123/acl47/archived_issues/ipj_8-4/ipj_8-4.pdf.
  • 187
    • 41949085763 scopus 로고    scopus 로고
    • Comcast requires that the IP address used by the sending e-mail server have a valid reverse DNS record. For example, when the Comcast e-mail system receives an e-mail from me@mydomain.com originating at IP address 4.4.4.4, it performs a reverse DNS lookup on that IP address. The resulting record must be valid according to Comcast's requirements. See Comcast, supra note 137.
    • Comcast requires that the IP address used by the sending e-mail server have a valid reverse DNS record. For example, when the Comcast e-mail system receives an e-mail from me@mydomain.com originating at IP address 4.4.4.4, it performs a reverse DNS lookup on that IP address. The resulting record must be valid according to Comcast's requirements. See Comcast, supra note 137.
  • 188
    • 41949126585 scopus 로고    scopus 로고
    • The administrator must have control over the DNS servers for the sending domain to create a PTR Record for the sending IP addresses
    • The administrator must have control over the DNS servers for the sending domain to create a PTR Record for the sending IP address(es).
  • 189
    • 41949112317 scopus 로고    scopus 로고
    • See Markoff, supra note 52, at A5
    • See Markoff, supra note 52, at A5.
  • 190
    • 41949102894 scopus 로고    scopus 로고
    • The main types of authentication for e-mail are sender authentication, content authentication, and hybrid authentication. Sender authentication includes CSV, SPF, and Sender-ID. Content authentication includes Secure MIME (S/MIME), Pretty Good Privacy (PGP), and PGP/MIME. An example of hybrid authentication is Domain Keys Identified E-mail (DKIM).
    • The main types of authentication for e-mail are sender authentication, content authentication, and hybrid authentication. Sender authentication includes CSV, SPF, and Sender-ID. Content authentication includes Secure MIME ("S/MIME"), Pretty Good Privacy ("PGP"), and PGP/MIME. An example of hybrid authentication is Domain Keys Identified E-mail ("DKIM").
  • 191
    • 41949112972 scopus 로고    scopus 로고
    • See Markoff, supra note 52, at A5 (Last month, for the first time ever, a single Internet service provider generated more than one billion spam e-mail messages in a 24-hour period, according to a ranking system maintained by Trend Micro, the computer security firm.).
    • See Markoff, supra note 52, at A5 ("Last month, for the first time ever, a single Internet service provider generated more than one billion spam e-mail messages in a 24-hour period, according to a ranking system maintained by Trend Micro, the computer security firm.").
  • 192
    • 33847278838 scopus 로고    scopus 로고
    • § 7705 2006
    • See 15 U.S.C. § 7705 (2006).
    • See 15 U.S.C
  • 193
    • 41949140055 scopus 로고    scopus 로고
    • Totaling Up the Bill For Spam
    • See, e.g, July 28, at
    • See, e.g., Saul Hansell, Totaling Up the Bill For Spam, N.Y. TIMES, July 28, 2003, at Cl.
    • (2003) N.Y. TIMES
    • Hansell, S.1
  • 194
    • 41949111724 scopus 로고    scopus 로고
    • Theodore Loder brought the location-of-the-filter argument to our attention. See Loder et al., supra note 48.
    • Theodore Loder brought the location-of-the-filter argument to our attention. See Loder et al., supra note 48.
  • 195
    • 41949086794 scopus 로고    scopus 로고
    • The possibility of using ISP trade associations is mentioned briefly in Alepin, supra note 12, at 63. However, the thrust of the suggestion is more toward how ISPs can protect themselves rather than how consumers and businesses can be protected by disincentivizing spam facilitation through the imposition of legal liability.
    • The possibility of using ISP trade associations is mentioned briefly in Alepin, supra note 12, at 63. However, the thrust of the suggestion is more toward how ISPs can protect themselves rather than how consumers and businesses can be protected by disincentivizing spam facilitation through the imposition of legal liability.
  • 196
    • 41949121874 scopus 로고    scopus 로고
    • CompuServe, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Ohio 1997).
    • CompuServe, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Ohio 1997).
  • 198
    • 41949130090 scopus 로고    scopus 로고
    • Id. at 1023
    • Id. at 1023.
  • 199
    • 41949131074 scopus 로고    scopus 로고
    • For a brief survey of pre-CAN-SPAM Act cases see Alepin, supra note 12, at 61-63
    • For a brief survey of pre-CAN-SPAM Act cases see Alepin, supra note 12, at 61-63.
  • 200
    • 41949135125 scopus 로고    scopus 로고
    • See also Classified Ventures, L.L.C v. Softcell Mktg., Inc., 109 F. Supp 2d 898 (E.D. Ill. 2000) (trademark infringement);
    • See also Classified Ventures, L.L.C v. Softcell Mktg., Inc., 109 F. Supp 2d 898 (E.D. Ill. 2000) (trademark infringement);
  • 201
    • 41949111091 scopus 로고    scopus 로고
    • Verizon Online Servs. v. Ralsky, 203 F. Supp 2d 601 (E.D. Va. 2002) (trespass to chattels).
    • Verizon Online Servs. v. Ralsky, 203 F. Supp 2d 601 (E.D. Va. 2002) (trespass to chattels).
  • 202
    • 41949099008 scopus 로고    scopus 로고
    • Alepin, supra note 12, at 62
    • Alepin, supra note 12, at 62.
  • 203
    • 84967701397 scopus 로고    scopus 로고
    • See generally David Clark, The Design Philosophy of the DARPA Internet Protocols, 18 ACM SIGCOMM COMPUTER COMM. REV. 106 (1988), available at http://nms.csail.mit.edu/6829- papers/darpa-internet.pdf.
    • See generally David Clark, The Design Philosophy of the DARPA Internet Protocols, 18 ACM SIGCOMM COMPUTER COMM. REV. 106 (1988), available at http://nms.csail.mit.edu/6829- papers/darpa-internet.pdf.
  • 204
    • 41949130079 scopus 로고    scopus 로고
    • See FTC REPORT, note 29
    • See 2004 FTC REPORT, supra note 29.
    • (2004) supra
  • 205
    • 41949096760 scopus 로고    scopus 로고
    • See DEFENSE ADVANCED RESEARCH PROJECTS AGENCY, DARPA'S STRATEGIC PLAN (2007), available at http://www.darpa.mil/body/pdf/ DARPA2007StrategicPlanfinalMarch14.pdf.
    • See DEFENSE ADVANCED RESEARCH PROJECTS AGENCY, DARPA'S STRATEGIC PLAN (2007), available at http://www.darpa.mil/body/pdf/ DARPA2007StrategicPlanfinalMarch14.pdf.
  • 206
    • 41949126750 scopus 로고    scopus 로고
    • BERNADETTE H. SCHELL & CLEMENS MARTIN, WEBSTER'S NEW WORLD HACKER DICTIONARY 290 (2006).
    • BERNADETTE H. SCHELL & CLEMENS MARTIN, WEBSTER'S NEW WORLD HACKER DICTIONARY 290 (2006).
  • 207
    • 41949100242 scopus 로고    scopus 로고
    • Clark, supra note 153, at 116
    • Clark, supra note 153, at 116.
  • 208
    • 41949128383 scopus 로고    scopus 로고
    • Id. at 107
    • Id. at 107.
  • 209
    • 41949083366 scopus 로고    scopus 로고
    • Id
    • Id.
  • 210
    • 41949138154 scopus 로고    scopus 로고
    • See Wikipedia, Telephone Exchange, http://en.wikipedia.org/wiki/ Telephone_exchange (last visited Oct. 21, 2007).
    • See Wikipedia, Telephone Exchange, http://en.wikipedia.org/wiki/ Telephone_exchange (last visited Oct. 21, 2007).
  • 211
    • 41949123702 scopus 로고    scopus 로고
    • An e-mail server is a computer that stores e-mail. Relaying involves sending an e-mail message to a server that then retransmits it toward the recipient e-mail server. For more detail, see SCHELL & MARTIN, supra note 156, at 287
    • An e-mail server is a computer that stores e-mail. "Relaying" involves sending an e-mail message to a server that then retransmits it toward the recipient e-mail server. For more detail, see SCHELL & MARTIN, supra note 156, at 287.
  • 212
    • 41949119844 scopus 로고    scopus 로고
    • See id. at 231.
    • See id. at 231.
  • 213
    • 41949091957 scopus 로고    scopus 로고
    • Technologist John C. Klensin has argued that without a clear legal standard defining what constitutes illegal spam as opposed to other forms of e-mail, any technological solution will be futile. Klensin, supra note 23. According to Klensin, to design effective technological countermeasures with predictable and acceptable side-effects, we must first understand what measures society is willing to take-what laws it is willing to pass and enforce to make spam a criminal or civilly-punishable act-to set an appropriate context and set of boundary conditions. Id.
    • Technologist John C. Klensin has argued that without a clear legal standard defining what constitutes illegal spam as opposed to other forms of e-mail, any technological solution will be futile. Klensin, supra note 23. According to Klensin, "to design effective technological countermeasures with predictable and acceptable side-effects, we must first understand what measures society is willing to take-what laws it is willing to pass and enforce to make spam a criminal or civilly-punishable act-to set an appropriate context and set of boundary conditions." Id.
  • 214
    • 41949096153 scopus 로고    scopus 로고
    • See Loder et al, supra note 48
    • See Loder et al., supra note 48.
  • 215
    • 41949122180 scopus 로고    scopus 로고
    • See id
    • See id.
  • 216
    • 0027758414 scopus 로고    scopus 로고
    • See Ross Anderson, Why Cryptosystems Fail, 1993 1ST ACM CONF. ON COMPUTER & COMMC'N. SECURITY 215, available at http://www.cl.cam.ac.uk/~rja14/Papers/wcf.pdf.
    • See Ross Anderson, Why Cryptosystems Fail, 1993 1ST ACM CONF. ON COMPUTER & COMMC'N. SECURITY 215, available at http://www.cl.cam.ac.uk/~rja14/Papers/wcf.pdf.
  • 217
    • 41949125266 scopus 로고    scopus 로고
    • Loder et al, supra note 48
    • Loder et al., supra note 48.
  • 218
    • 41949100867 scopus 로고    scopus 로고
    • Id
    • Id.
  • 219
    • 41949087736 scopus 로고    scopus 로고
    • CSV is a system that validates the IP address of the sending mail server. This is done by querying DNS to determine if the sending IP address is associated with the domain name in the HELO element of the e-mail envelope. Additionally, the system may also query an accreditation service to determine the relative trustworthiness of the sending server. See Crocker, supra note 138, at 12 (discussing CSV).
    • CSV is a system that validates the IP address of the sending mail server. This is done by querying DNS to determine if the sending IP address is associated with the domain name in the HELO element of the e-mail envelope. Additionally, the system may also query an accreditation service to determine the relative trustworthiness of the sending server. See Crocker, supra note 138, at 12 (discussing CSV).
  • 220
    • 41949106292 scopus 로고    scopus 로고
    • See Comcast, supra note 137
    • See Comcast, supra note 137.
  • 221
    • 41949137267 scopus 로고    scopus 로고
    • See White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005). The court noted that declaring server integrity to be a substantial interest without evidentiary substantiation might have unforeseen and undesirable ramifications in other online contexts.
    • See White Buffalo Ventures LLC v. Univ. of Tex. at Austin, 420 F.3d 366, 374 (2005). The court noted that "declaring server integrity to be a substantial interest without evidentiary substantiation might have unforeseen and undesirable ramifications in other online contexts."
  • 222
    • 41949112026 scopus 로고    scopus 로고
    • Id
    • Id.
  • 223
    • 41949106632 scopus 로고    scopus 로고
    • See Stross, supra note 7 (This month, MCI found itself criticized because a Web site that sells Send-Safe software gets Internet services from a company that's an MCI division customer. Send-Safe is spamware that offers bulk e-mail capability, claiming 'real anonymity'; it hijacks other machines that have been infected with a complementary virus. Anyone can try it out for $50 and spray 400,000 messages. MCI, for its part, argues that it has an exemplary record in shutting down spammers, but that the sale of bulk e-mail software is not, ipso facto, illegal.).
    • See Stross, supra note 7 ("This month, MCI found
  • 224
    • 41949121569 scopus 로고    scopus 로고
    • AOL, Phishing Protection - AOL Internet Security Central, http://safety.aol.com/isc/SiteSecurity (last visited Oct. 3, 2007).
    • AOL, Phishing Protection - AOL Internet Security Central, http://safety.aol.com/isc/SiteSecurity (last visited Oct. 3, 2007).
  • 225
    • 41949129467 scopus 로고    scopus 로고
    • Microsoft, Windows Live Hotmail, http://get.live.com/mail/features (last visited Oct. 3, 2007).
    • Microsoft, Windows Live Hotmail, http://get.live.com/mail/features (last visited Oct. 3, 2007).
  • 226
    • 41949111090 scopus 로고    scopus 로고
    • White Buffalo Ventures, 420 F.3d at 375.
    • White Buffalo Ventures, 420 F.3d at 375.
  • 227
    • 41949110142 scopus 로고    scopus 로고
    • But see COMPUSERVE, 962 F. Supp. at 1017 (granting a preliminary injunction against spammer Cyber Promotions, Inc., on the basis of a claim that advertising e-mails constituted trespass to chattels).
    • But see COMPUSERVE, 962 F. Supp. at 1017 (granting a preliminary injunction against spammer Cyber Promotions, Inc., on the basis of a claim that advertising e-mails constituted trespass to chattels).
  • 228
    • 41949098046 scopus 로고    scopus 로고
    • Hansell, supra note 145 at C1
    • Hansell, supra note 145 at C1.
  • 229
    • 41949089789 scopus 로고    scopus 로고
    • Specifically, the recipient's time is spent in filtering spam and unfiltering legitimate e-mail that was filtered as spam, and the recipient's money is spent on anti-spam software and services
    • Specifically, the recipient's time is spent in filtering spam and unfiltering legitimate e-mail that was filtered as spam, and the recipient's money is spent on anti-spam software and services.
  • 230
    • 41949111403 scopus 로고    scopus 로고
    • See CAL. BUS. & PROF. CODE §17538.4 (West Supp. 2004);
    • See CAL. BUS. & PROF. CODE §17538.4 (West Supp. 2004);
  • 231
    • 41949126250 scopus 로고    scopus 로고
    • DEL. CODE ANN. tit. 11, §§ 931, 937-38 (1999).
    • DEL. CODE ANN. tit. 11, §§ 931, 937-38 (1999).
  • 232
    • 41949115594 scopus 로고    scopus 로고
    • See Alepin, supra note 12, at 58; Kenneth C. Amaditz, Canning Spam in Virginia: Model Legislation to Control Junk E-mail, A VA. J.L. & TECH. 4, 74 (1999) (noting that general ISP reluctance to stop spam means that an anti-spam law would be incomplete without a cause of action for e-mail users).
    • See Alepin, supra note 12, at 58; Kenneth C. Amaditz, Canning "Spam" in Virginia: Model Legislation to Control Junk E-mail, A VA. J.L. & TECH. 4, 74 (1999) (noting that general ISP reluctance to stop spam means that "an anti-spam law would be incomplete without a cause of action for e-mail users").
  • 233
    • 41949091642 scopus 로고    scopus 로고
    • A honeypot is a computer system designed to detect unauthorized access and manipulation of information systems by attracting hackers and then monitoring what they do. See DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 244.
    • A "honeypot" is a computer system designed to detect unauthorized access and manipulation of information systems by attracting hackers and then monitoring what they do. See DICTIONARY OF COMPUTER AND INTERNET TERMS, supra note 2, at 244.
  • 234
    • 84956547845 scopus 로고    scopus 로고
    • §7707b, 2006
    • 15 U.S.C. §7707(b) (2006).
    • 15 U.S.C
  • 235
    • 41949111401 scopus 로고    scopus 로고
    • The statute provides in relevant part: A person or entity may, if otherwise permitted by the laws or rules of court of a State, bring in an appropriate court of that State - (A) an action based on a violation of this subsection or the regulations prescribed under this subsection to enjoin such violation, (B) an action to recover for actual monetary loss from such a violation, or to receive $500 in damages for each such violation, whichever is greater, or (C) both such actions. 47 U.S.C. §227(b)(3) (2000).
    • The statute provides in relevant part: A person or entity may, if otherwise permitted by the laws or rules of court of a State, bring in an appropriate court of that State - (A) an action based on a violation of this subsection or the regulations prescribed under this subsection to enjoin such violation, (B) an action to recover for actual monetary loss from such a violation, or to receive $500 in damages for each such violation, whichever is greater, or (C) both such actions. 47 U.S.C. §227(b)(3) (2000).
  • 236
    • 41949101159 scopus 로고    scopus 로고
    • At least one court has made reference to this rationale for implementing standing. See Int'l Sci. & Tech. Inst, Inc. v. Inacom Commc'n, Inc, 106 F.3d 1146, 1157 4th Cir. 1997
    • At least one court has made reference to this rationale for implementing standing. See Int'l Sci. & Tech. Inst., Inc. v. Inacom Commc'n, Inc., 106 F.3d 1146, 1157 (4th Cir. 1997).
  • 237
    • 41949107273 scopus 로고    scopus 로고
    • See supra note 179
    • See supra note 179.
  • 238
    • 41949096759 scopus 로고    scopus 로고
    • See also Jeffrey D. Zentner, State Regulation of Unsolicited Bulk Commercial E-mail and the Dormant Commerce Clause, 8 VAND. J. ENT. & TECH. L. 477, 488 (2006) (As soon as the Act was passed, however, one particular provision of the Act became a lightning rod for criticism. The provision at issue stated that the Act supersedes all state statutes, rules, and regulations that regulate the sending of commercial e-mail, except to the extent that any such regulation addresses falsification or deception in spam e-mails.).
    • See also Jeffrey D. Zentner, State Regulation of Unsolicited Bulk Commercial E-mail and the Dormant Commerce Clause, 8 VAND. J. ENT. & TECH. L. 477, 488 (2006) ("As soon as the Act was passed, however, one particular provision of the Act became a lightning rod for criticism. The provision at issue stated that the Act supersedes all state statutes, rules, and regulations that regulate the sending of commercial e-mail, except to the extent that any such regulation addresses falsification or deception in spam e-mails.").
  • 239
    • 41949101945 scopus 로고    scopus 로고
    • 15 U.S.C. §7701(a)(11) (2006) (Many States have enacted legislation intended to regulate or reduce unsolicited commercial electronic mail, but these statutes impose different standards and requirements. As a result, they do not appear to have been successful in addressing the problems associated with unsolicited commercial electronic mail, in part because, since an electronic mail address does not specify a geographic location, it can be extremely difficult for law-abiding businesses to know with which of these disparate statutes they are required to comply.).
    • 15 U.S.C. §7701(a)(11) (2006) ("Many States have enacted legislation intended to regulate or reduce unsolicited commercial electronic mail, but these statutes impose different standards and requirements. As a result, they do not appear to have been successful in addressing the problems associated with unsolicited commercial electronic mail, in part because, since an electronic mail address does not specify a geographic location, it can be extremely difficult for law-abiding businesses to know with which of these disparate statutes they are required to comply.").
  • 240
    • 41949134480 scopus 로고    scopus 로고
    • See supra Part III.
    • See supra Part III.
  • 241
    • 41949085151 scopus 로고    scopus 로고
    • Webchat Interview with Yael Weinman, Legal Counsel for Int'l Consumer Prot., U.S. Fed. Trade Comm'n Office of Int'l Affairs, and Michael Davis, Staff Attorney, U.S. Fed. Trade Comm'n Office of Int'l Affairs (Feb. 7, 2007), available at http://usinfo.state.gov/usinfo/Archive/2007/Feb/07-823804. html (noting that the FTC has brought 89 spam cases against 241 defendants since 1997, of which only 26 cases were brought after the passages of the CAN-SPAM Act).
    • Webchat Interview with Yael Weinman, Legal Counsel for Int'l Consumer Prot., U.S. Fed. Trade Comm'n Office of Int'l Affairs, and Michael Davis, Staff Attorney, U.S. Fed. Trade Comm'n Office of Int'l Affairs (Feb. 7, 2007), available at http://usinfo.state.gov/usinfo/Archive/2007/Feb/07-823804. html (noting that the FTC has brought 89 spam cases against 241 defendants since 1997, of which only 26 cases were brought after the passages of the CAN-SPAM Act).
  • 242
    • 41949107272 scopus 로고    scopus 로고
    • See generally Meyer Potashman, International Spam Regulation & Enforcement: Recommendations Following the World Summit on the Information Society, 29 B.C. INT''L & COMP. L. REV. 323 (2006) (reviewing measures intended to address the international nature of spam).
    • See generally Meyer Potashman, International Spam Regulation & Enforcement: Recommendations Following the World Summit on the Information Society, 29 B.C. INT''L & COMP. L. REV. 323 (2006) (reviewing measures intended to address the international nature of spam).
  • 243
    • 41949131706 scopus 로고    scopus 로고
    • Id. at 335
    • Id. at 335.
  • 244
    • 41949113867 scopus 로고    scopus 로고
    • See Alepin, supra note 12, at 70
    • See Alepin, supra note 12, at 70.
  • 245
    • 41949111402 scopus 로고    scopus 로고
    • Id. (Preliminary results from these efforts are encouraging-Nigeria has seemingly successfully combated the spam problem and Nigeria is no longer considered a 'safe haven' for spam.);
    • Id. ("Preliminary results from these efforts are encouraging-Nigeria has seemingly successfully combated the spam problem and Nigeria is no longer considered a 'safe haven' for spam.");
  • 246
    • 41949100240 scopus 로고    scopus 로고
    • Using Laws and Tools to Fight Spam
    • The point is to demonstrate that international spam fighting efforts can be effective, even though filtering spam at the ISP level is not an ideal solution because of the problem of false positives: legitimate e-mails filtered as spam. As discussed, user and content based authentication are better methods of fighting spam at the ISP level. see also, May 20, at
    • see also Chandra Devi, Using Laws and Tools to Fight Spam, NEW STRAITS TIMES (Malaysia), May 20, 2004, at 18. The point is to demonstrate that international spam fighting efforts can be effective, even though filtering spam at the ISP level is not an ideal solution because of the problem of false positives: legitimate e-mails filtered as spam. As discussed, user and content based authentication are better methods of fighting spam at the ISP level.
    • (2004) NEW STRAITS TIMES (Malaysia) , pp. 18
    • Devi, C.1
  • 247
    • 41949083951 scopus 로고    scopus 로고
    • See supra Part IV.B.
    • See supra Part IV.B.
  • 248
    • 41949136021 scopus 로고    scopus 로고
    • Undertaking Spam, Spyware, and Fraud With Enforcers Beyond Borders Act of 2006, S. 1608, 109th Cong. (2006).
    • Undertaking Spam, Spyware, and Fraud With Enforcers Beyond Borders Act of 2006, S. 1608, 109th Cong. (2006).
  • 249
    • 41949086123 scopus 로고    scopus 로고
    • According to a summary of the Act's provisions found on the FTC web site, the Act is designed to do the following: (1) broaden reciprocal information sharing; (2) expand investigative cooperation with international law enforcers; (3) provide for more information from foreign sources; (4) protect the confidentiality of FTC investigations; (5) allow information-sharing with federal financial and market regulators; (6) confirm the FTC's remedial authority in cross-border cases; (7) enhance cooperation between the FTC and DOJ in foreign litigation; (8) clarify FTC authority to make criminal referrals; (9) provide for foreign staff exchange programs; (10) authorize expenditure of funds on joint cross-border projects; (11) allow the FTC to accept reimbursements from foreign agencies for cross-border work performed. FED. TRADE COMM'N, SUMMARY OF THE US SAFE WEB ACT, las
    • According to a summary of the Act's provisions found on the FTC web site, the Act is designed to do the following: (1) broaden reciprocal information sharing; (2) expand investigative cooperation with international law enforcers; (3) provide for more information from foreign sources; (4) protect the confidentiality of FTC investigations; (5) allow information-sharing with federal financial and market regulators; (6) confirm the FTC's remedial authority in cross-border cases; (7) enhance cooperation between the FTC and DOJ in foreign litigation; (8) clarify FTC authority to make criminal referrals; (9) provide for foreign staff exchange programs; (10) authorize expenditure of funds on joint cross-border projects; (11) allow the FTC to accept reimbursements from foreign agencies for cross-border work performed. FED. TRADE COMM'N, SUMMARY OF THE US SAFE WEB ACT, http://www.ftc.gov/reports/ussafeweb/ Summary%20of%20US%20SAFE%20WEB%20Act.pdf (last visited Oct. 3, 2007).
  • 250
    • 41949099637 scopus 로고    scopus 로고
    • See Potashman, supra note 189, at 340
    • See Potashman, supra note 189, at 340.
  • 251
    • 41949114040 scopus 로고    scopus 로고
    • See supra Part IVA.
    • See supra Part IVA.
  • 252
    • 41949093025 scopus 로고    scopus 로고
    • See Finally, A Ban on Spam in the Netherlands, supra note 111
    • See Finally, A Ban on Spam in the Netherlands, supra note 111.
  • 254
    • 84963456897 scopus 로고    scopus 로고
    • note 113 and accompanying text
    • See supra note 113 and accompanying text.
    • See supra
  • 255
    • 41949105673 scopus 로고    scopus 로고
    • See Finally, A Ban on Spam in the Netherlands, supra note 111;
    • See Finally, A Ban on Spam in the Netherlands, supra note 111;
  • 256
    • 41949089002 scopus 로고    scopus 로고
    • The European Commission, supra note 112
    • The European Commission, supra note 112.
  • 257
    • 41949117749 scopus 로고    scopus 로고
    • For spam relaying rates by country, see Press Release, Sophos, Sophos Reveals Dirty Dozen Spam Relaying Countries (July 24, 2006), http://www.sophos.com/pressoffice/news/articles/2006/07/dirtydozjul06.ht ml. For an in-depth discussion of options and challenges to an international solution, see Potashman, supra note 189. International cooperation will be necessary to completely eliminate the spam problem, but the solution must start somewhere, and the world can benefit from proper law in the United States, which is currently the largest exporter of spam.
    • For spam relaying rates by country, see Press Release, Sophos, Sophos Reveals "Dirty Dozen" Spam Relaying Countries (July 24, 2006), http://www.sophos.com/pressoffice/news/articles/2006/07/dirtydozjul06.html. For an in-depth discussion of options and challenges to an international solution, see Potashman, supra note 189. International cooperation will be necessary to completely eliminate the spam problem, but the solution must start somewhere, and the world can benefit from proper law in the United States, which is currently the largest exporter of spam.
  • 258
    • 41949124965 scopus 로고    scopus 로고
    • See Stefanie Olsen, U.S. Cooks Up the Most Spam, CNET NEWS.COM, Aug. 24, 2004, http://news.com.com/U.S. +cooks+up+most+spam/2100-1024_3-5322803.html.
    • See Stefanie Olsen, U.S. Cooks Up the Most Spam, CNET NEWS.COM, Aug. 24, 2004, http://news.com.com/U.S. +cooks+up+most+spam/2100-1024_3-5322803.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.