David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001).


Abstract

      Unsolicited electronic mail, also called "spam," is both a nuisance to Internet users and a threat to network security. Spam imposes substantial costs on Internet users and providers, who have undertaken a variety of actions in response--many of which have been counterproductive. Informal responses such as social pressure and industry self-regulation have been almost entirely ineffectual in battling spam. Technical responses have fared somewhat better, but often at a high cost. Efforts to filter or block spam, for example, frequently prevent legitimate messages from getting through. Other technical responses have done little to stem the tide of spam, and in some instances have led to expensive legal disputes.

      Lawsuits have been somewhat successful in addressing the most extreme instances of spamming, and a number of jurisdictions have enacted specific laws in an attempt to regulate spam. But legal approaches in general seem to have been no more successful than technical responses to the spam problem, and the primary result to date is a great deal of uncertainty surrounding spam. Ultimately, a consensus approach that coordinates legal and technical responses is likely to provide the only effective solution.


Go to the full text of this article (PDF)

This article is also available on Lexis and Westlaw.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
In 2003, more than 10 million Americans fell victim to identity theft.

Identity theft costs business and individuals $53 billion dollars annually

In 2003, Americans spent 300 million hours resolving issues related to identity theft.

70% of all identity theft cases are perpetrated by a co-worker or employee of an affiliated business.