An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group

Slides:



Advertisements
Similar presentations
Spammers, Phishers and Other Assorted Crooks: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Advertisements

How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group
Latest Trends in the Legal Fight Against Spammers Spam Cambridge, MA January 16, 2004 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
A Litigators View of the Law on Message Abuse A Presentation to the Messaging Anti-Abuse Working Group Summit May 18, 2004 Jon Praed Internet Law Group.
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Taking the “F” Out of FBAR November 3-8, 2011 A Presentation by:
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Phishing Tales: Honestly, the problem is ‘this big’ Peter Black, Queensland University of Technology
Red Flags Rule & Municipal Utilities
CONSUMER CREDIT LEGISLATION Carl Johnson Financial Literacy Jenks High School.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Anonymity and SPAM The Good, the Bad and the Ugly!
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Contemporary issues: Cyberspace By Toby and Michael.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Competition-Enhancing Enforcement in Privacy: A Remedy for the Anti-Privacy Market Chris Jay Hoofnagle Director, Information Privacy Programs UC Berkeley.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Internet regulation National limits of Internet Content.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Compliance and Enforcement of the Privacy Rule. HHS/OCR February/March Compliance Date  April 14, 2003 – Compliance for all but small health plans.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
MIT Spam Conference 2006 How Spammers Deal with CAN-Spam: Costa Rica, “microbranding” & 18 USC §2257 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
Financial Exploitation Legal. § 108A ‑ 102. Duty to report; content of report; immunity. Legal Section (a) Any person having reasonable cause to believe.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
RECENT DEVELOPMENTS IN DIGITAL MEDIA ADVERTISING LAW : CANADIAN EDITION VALERIE WARNER DANIN, ESQ.
Cybercrime What is it, what does it cost, & how is it regulated?
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Law Enforcement Recommendations for RAA ammendment ICANN Brussels 2010 Protective Marking : Protect.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
CHAPTER 24 Laws of Debtor--Creditor Relations and Consumer Protection
Module 3 Consumer Privacy.
CHAPTER 33 Cyberlaw.
ethical issues in business
Compliance and Enforcement of the Privacy Rule
Presentation transcript:

An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group

Spam is Unsolicited Bulk Commercial Electronic Messages Electronic messages – anticipate convergence Commercial – not inherently illegal Bulk – substantially similar messages Unsolicited – intent of recipient is key

Spam Fighting Tools Shield -- Internet Architecture & Filters Sword -- Legal Enforcement

To Evade Filters, Spam = Fraud Source and hypertext links are anonymous, transient or falsified –Free accounts; anonymous credit cards; mail relays; obfuscated URLs; encrypted source code; DNS servers turned on/off; false domain name registrations (ICANN 9/02 action Verisign) Third Party Conspirators Provide Cover –Spam Houses make $10,000/month to host webpages and hide identities of spammers (“I terminated him and deleted his info”) –Affiliate Program Operators – in search of plausible deniability

Law’s Purposes General & Specific Deterrence Compensation of Victims Retribution Education

Legal Weapons Injunctions Money Judgments –non-dischargeable in bankruptcy –disgorge profits from spammers –fund anti-spam fight Imprisonment

A Hierarchy of Anti-Spam Rules AUPs – setting expectations to protect private property Common Law – trespass to chattels recognized in all 50 states State Statutes – 26 states and counting ( –codifying trespass with statutory damages –labeling requirements –outlawing fraudulent spam or requiring respect for do not lists Federal Statutes – –Computer Fraud & Abuse Act, 18 USC 1030 –Analogs: 47 USC 227 (unsolicited fax law); 18 USC 2257 (Adult Model Statute) –Pending Legislation ( Burns-Wyden CAN SPAM Act, SB 630 & others International Law – none? –How will this affect the impact of anticipated Federal fixes?

Goals of Federal Proposals Discourage use of fraud Encourage transparency in identity Ban spam, regardless of fraud Regulate spam through labeling Minimize impact on solicited marketers

A “Sunshine” Proposal for Federal Legislation Modeled after Custodian of Records Law requiring Proof of Age of Adult-Movie Performers (18 USC 2257) All commercial (including solicited) must disclose a “custodian of records” (US resident, address, phone, ) Failure to disclose = presumption of spam and high civil penalties (dollars per ) False disclosures = criminal penalties Disclosures subject to reasonable due diligence Truthful disclosures, but inadequate records = reduced statutory damages (fraction of penny per )

What the Law Needs From Internet Architecture IDENTITY –accurate records reflecting status of Internet structure (domain names, IP addresses) –details of transaction –intelligent record preservation GEOGRAPHY –provides notice to spammers of applicable laws –empowers Netizens to avoid lawless-parts of the Internet

Limits of the Law Dependence on technical information for identification Slow and Costly Legal Jurisdictions are Geographic-Based

Why We Will Defeat Spam Victory Doesn’t Require 100% Spam-Free –Banks survive bank robberies Spammers Struggle on Small Margins is Incredibly Resilient – thrives despite 40% spam rate Spam is the Parasite, is the Host –If spam kills , spam dies too Filters + Lawsuits Work, and Spammers Know It

Questions? An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group