Trespass in the Spam Email Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Basic Communication on the Internet:
CHAPTER 6 REVIEW Let the Games Begin
GApps for Students Introduction to your new GApps Account.
What You’ll Learn How to define negligence (p. 88)
Trespass to Chattels: eBay and Intel Richard Warner.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Foundations of Australian Law Fourth Edition Copyright © 2013 Tilde Publishing and Distribution Chapter 7 Defamation, nuisance & trespass.
Chapter 15 Intentional Torts Intentional Torts - When people deliberately cause harm or loss to another person Intent – the desire to commit an act for.
I’ll sue!! TORT LAW Introduction TortTort is the French word for a “wrong.” Tort law protects a variety of injuries and provides remedies for them.
Surrey Public Library Electronic Classrooms Essentials.
§ 380(2) Where by the law of the place of wrong, the liability-creating character of the actor's conduct depends upon the application of a standard of.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Internet Legal Issues (Management 447) Professor Charles H. Smith Privacy (Chapter 9) Spring 2006.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 5 Intentional Torts.
Spam and The Computer Fraud and Abuse Act Richard Warner.
Civil Liability Issues Chapter 7. Copyright © 2007 Thomson Delmar Learning Objectives Define –Intentional torts of battery, assault, false imprisonment,
Business Law. Your neighbor Shana is using a multipurpose woodcutting machine in her basement hobby shop. Suddenly, because of a defect in the two-year.
Trademark II Infringement. Article 57 Infringement Article 57 Any of the following conduct shall be an infringement upon the right to exclusively use.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
The Case for The Right to Prevent Access Richard Warner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
The law on Intermediary Liability in India
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Copyright © 2008 Pearson Education Canada6-1 Chapter 6: Formation of Contracts.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Trespass, Computers, and Networks. Scattered data Collected organized data Benefits at least some consumers The Generic Fact Pattern.
Governmental Immunity
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Information Systems Unit 3.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Defences to Intentional Torts Defences for Interference with Property.
Copyright © 2005 Pearson Education Canada Inc. Business Law in Canada, 7/e, Chapter 5 Business Law in Canada, 7/e Chapter 5 Formation of Contracts 5-1.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
EBay and Intel. eBay v. Bidder’s Edge eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
 In some circumstances, responsibility lies not only with the person undertaking (or failing to undertake) an action, but also with an individual responsible.
Understanding Business and Personal Law Negligence and Strict Liability Section 4.2 The Law of Torts A person can commit an unintentional tort, when he.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Attorney Lucy Michaud UConn Center for Real Estate
Fundamentals of business law, 10e
Trespass in the Spam Cases
What is it? Why do I keep getting from Barracuda? SPAM.
Chapter 13 Security and Ethical Challenges.
ethical issues in business
Intent of Torts: Trespass
Defences for Negligence
Presentation transcript:

Trespass in the Spam Cases

CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening to discontinue their subscription unless CompuServe prohibits electronic mass mailers from using its equipment to send unsolicited advertisements.” System overload  “CompuServe asserts that the volume of messages generated by such mass mailings places a significant burden on its equipment which has finite processing and storage capacity.

Implied Consent When you connect a publicly accessible system to the Internet, you impliedly consent to access by the general public to that system. Did CompuServe consent in this way to receiving s from Cyber Promotions? Connecting to the Internet does not constitute an invitation to commit hack into the system and delete data, for example.

Revocation Moreover: even if CompuServe did consent, can’t it revoke that consent? It certainly tried to do so.  “CompuServe has notified defendants that they are prohibited from using its proprietary computer equipment to process and store unsolicited and has requested them to cease and desist from sending unsolicited to its subscribers.” Courts have held that ISPs can effectively revoke whatever consent they might have initially given to access by a spammer.  Cyber Promotions continued to send s after consent was revoked.

The CompuServe Fact Pattern This is typical of the spam cases:  huge volumes of spam,  Sent after revocation of consent,  overload the processing capacity of the ISP,  imposing costs on the ISP, and  producing dissatisfied customers,  on whom the spam also imposes costs.

What Is the Chattel? CompuServe’s computers. Cyber Promotions must send the necessary message data and computer code into CompuServe’s computers. Those computers follow the instructions in the code to deliver the message to the subscriber’s inbox.

Does Trespass To Chattels Apply? What is the chattel? CompuServe’s computers. Cyber Promotions must send the necessary message data and computer code into CompuServe’s computers. Those computers follow the instructions in the code to deliver the message to the subscriber’s inbox.

Committing Trespass to Chattels “Trespass to a chattel is committed by intentionally dispossessing another of the chattel or using or intermeddling with it.” Restatement (Second) of Torts, Section 217. Cyber Promotions does not dispossess CompuServe of its computers. They stay in CompuServe’s possession.

Trespass “Trespass to a chattel is committed by intentionally dispossessing another of the chattel or using or intermeddling with it.” Restatement (Second) of Torts, Section 217. Cyber Promotions does not dispossess CompuServe of its computers. They stay in CompuServe’s possession. Cyber Promotions merely uses some of the computer’s processing capacity, so...

“Using or Intermeddling” This is “using or intermeddling” with a chattel. To be a trespass, the use the use must invade the possessory rights of the owner. An unauthorized use does so.  CompuServe, at 1024 (citing Restatement (Second) of Torts, Sections 252 and 892(5), 217, Comment f and Comment g).

Liability for Trespass to Chattels One is liable for trespass to chattels if one commits it, and  impairs the value of the chattel, or  harms a legally protected interest. Committing trespass to chattels creates a privilege in the owner to use self-help to protect the chattel. Impairing value or harming a protected interest creates liability for damages and/or an injunction.

Summary One is liable for trespass to chattels if one intentionally, and without authorization, uses the property of another in a way that  impairs its value,  or harms a protected interest.

Value and Harm in CompuServe Does sending vast amounts of spam through the CompuServe computers impair their value or harm a protected interest? It impairs value by slowing down or shutting down the computers. It harms a protected interest by producing dissatisfied customers, some of whom terminate their accounts.

Remedies Monetary compensation for the harm done. An injunction against future access.

Effective? Trespass to chattels is not a particular effective tool against spammers.  The enormous number of spammers makes it difficult for Internet service providers to track down the source of the spam.  It can be difficult to prove damages as the number of different spammers bombarding an ISP can make it difficult to determine which spammer caused what damage.