Trespass in the Spam Cases

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Basic Communication on the Internet:
CHAPTER 6 REVIEW Let the Games Begin
Trespass to Chattels: eBay and Intel Richard Warner.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Foundations of Australian Law Fourth Edition Copyright © 2013 Tilde Publishing and Distribution Chapter 7 Defamation, nuisance & trespass.
I’ll sue!! TORT LAW Introduction TortTort is the French word for a “wrong.” Tort law protects a variety of injuries and provides remedies for them.
Surrey Public Library Electronic Classrooms Essentials.
§ 380(2) Where by the law of the place of wrong, the liability-creating character of the actor's conduct depends upon the application of a standard of.
Uintah School District Acceptable Use for Computer and Network Access.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Internet Legal Issues (Management 447) Professor Charles H. Smith Privacy (Chapter 9) Spring 2006.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
Spam and The Computer Fraud and Abuse Act Richard Warner.
Civil Liability Issues Chapter 7. Copyright © 2007 Thomson Delmar Learning Objectives Define –Intentional torts of battery, assault, false imprisonment,
Trademark II Infringement. Article 57 Infringement Article 57 Any of the following conduct shall be an infringement upon the right to exclusively use.
The Case for The Right to Prevent Access Richard Warner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
The Internet The advantages and disadvantages. What are the advantages of the Internet as a source of information?  It can be accessed from anywhere.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Spam - It’s YOUR Mailbox Costs Top 6 lies of spammers Spam law 101 What your ISP can do to reduce spam What you can do to fight or limit spam –Things not.
The law on Intermediary Liability in India
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Copyright © 2008 Pearson Education Canada6-1 Chapter 6: Formation of Contracts.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Trespass, Computers, and Networks. Scattered data Collected organized data Benefits at least some consumers The Generic Fact Pattern.
Governmental Immunity
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Information Systems Unit 3.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Copyright © 2005 Pearson Education Canada Inc. Business Law in Canada, 7/e, Chapter 5 Business Law in Canada, 7/e Chapter 5 Formation of Contracts 5-1.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
EBay and Intel. eBay v. Bidder’s Edge eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
29 - 1Copyright © 2004 by Prentice-Hall. All rights reserved. The Law of Agency The Law of Agency.
Intentional Torts Chapter 19. Types of Damages Compensatory Damages- money awarded to compensate for monetary loss and pain and suffering Nominal Damages-
Marion County Public Schools Acceptable Use Guidelines for Network Access.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
 In some circumstances, responsibility lies not only with the person undertaking (or failing to undertake) an action, but also with an individual responsible.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Attorney Lucy Michaud UConn Center for Real Estate
Chapter 15 Internet Law and E-Commerce
CHAPTER 7 Negligence And Strict Liability
What is Commercial law? Commercial law, also known as business law, is the body of law that applies to the rights, relations, and conduct of persons.
Internet Safety and Acceptable Use Policies.
What is it? Why do I keep getting from Barracuda? SPAM.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Chapter 13 Security and Ethical Challenges.
Student Accounts OFFICE 365 Student Accounts.
Class Name, Instructor Name
ethical issues in business
Intent of Torts: Trespass
Chapter 13 E-Commerce Contracts
Defences for Negligence
Presentation transcript:

Trespass in the Spam Email Cases

CompuServe v. Cyber Promotion User complaints “CompuServe has received many complaints from subscribers threatening to discontinue their subscription unless CompuServe prohibits electronic mass mailers from using its equipment to send unsolicited advertisements.” System overload “CompuServe asserts that the volume of messages generated by such mass mailings places a significant burden on its equipment which has finite processing and storage capacity.

Implied Consent When you connect a publicly accessible system to the Internet, you impliedly consent to access by the general public to that system. Did CompuServe consent in this way to receiving e-mails from Cyber Promotions? Connecting to the Internet does not constitute an invitation to commit hack into the system and delete data, for example.

Revocation Moreover: even if CompuServe did consent, can’t it revoke that consent? It certainly tried to do so. “CompuServe has notified defendants that they are prohibited from using its proprietary computer equipment to process and store unsolicited e-mail and has requested them to cease and desist from sending unsolicited e-mail to its subscribers.” Courts have held that ISPs can effectively revoke whatever consent they might have initially given to access by a spammer. Cyber Promotions continued to send e-mails after consent was revoked.

The CompuServe Fact Pattern This is typical of the spam cases: huge volumes of spam, Sent after revocation of consent, overload the processing capacity of the ISP, imposing costs on the ISP, and producing dissatisfied customers, on whom the spam also imposes costs.

What Is the Chattel? CompuServe’s computers. Cyber Promotions must send the necessary message data and computer code into CompuServe’s computers. Those computers follow the instructions in the code to deliver the message to the subscriber’s inbox.

Does Trespass To Chattels Apply? What is the chattel? CompuServe’s computers. Cyber Promotions must send the necessary message data and computer code into CompuServe’s computers. Those computers follow the instructions in the code to deliver the message to the subscriber’s inbox.

Trespass “Trespass to a chattel is committed by intentionally dispossessing another of the chattel or using or intermeddling with it.” Restatement (Second) of Torts, Section 217. Cyber Promotions does not dispossess CompuServe of its computers. They stay in CompuServe’s possession. Cyber Promotions merely uses some of the computer’s processing capacity, so . . .

“Using or Intermeddling” This is “using or intermeddling” with a chattel. To be a trespass, the use the use must invade the possessory rights of the owner. An unauthorized use does so. CompuServe, at 1024 (citing Restatement (Second) of Torts, Sections 252 and 892(5), 217, Comment f and Comment g).

Liability for Trespass to Chattels One is liable for trespass to chattels if one commits it, and impairs the value of the chattel, or harms a legally protected interest. Committing trespass to chattels creates a privilege in the owner to use self-help to protect the chattel. Impairing value or harming a protected interest creates liability for damages and/or an injunction.

Summary impairs its value, or harms a protected interest. One is liable for trespass to chattels if one intentionally, and without authorization, uses the property of another in a way that impairs its value, or harms a protected interest.

Value and Harm in CompuServe Does sending vast amounts of spam through the CompuServe computers impair their value or harm a protected interest? It impairs value by slowing down or shutting down the computers. It harms a protected interest by producing dissatisfied customers, some of whom terminate their accounts.

Remedies Monetary compensation for the harm done. An injunction against future access.

Effective? Trespass to chattels is not a particular effective tool against spammers. The enormous number of spammers makes it difficult for Internet service providers to track down the source of the spam. It can be difficult to prove damages as the number of different spammers bombarding an ISP can make it difficult to determine which spammer caused what damage.

Summary (3) and (4) argue for an impairment of value. Trespass to chattels first appears in this fct pattern: (1) huge volumes of spam, (2) Intentionally sent after revocation of consent, (3) Causing computers to slow down or shut down, (4) imposing costs on the ISP. (3) and (4) argue for an impairment of value.