SlideShare a Scribd company logo
Privacy Concerns in Marketing
and Commercial Communications



       Bennet Kelley   Liisa M. Thomas




                                  June 2, 2009
In the Beginning . . .




Pyramids of Giza, Egypt.
© Digital Vision/Getty Images
There was California . . .



   “We are saying that unsolicited e-mail cannot be sent
   and there are no loopholes . . . We don't differentiate
   between Disney and Viagra.
   If you go out and rent a list of e-mail addresses, by
   definition you are not a legitimate business. You are
   the person we are trying to stop.”
                         Former California State Senator Kevin Murray
                                                      Author of SB 186
84 days later . . .




President George W. Bush signing the CAN-SPAM Act (Dec. 16, 2003).



               Controlling the Assault of Non-Solicited Pornography And Marketing Act
                                           on-
CAN-SPAM Act of 2003
CAN-SPAM IS . . .                     CAN-SPAM DOES NOT . . .

•       anti-
    An anti-fraud and disclosure      •   “Can Spam” – except for wireless spam
    statute
                                      •   Include a “Do Not Email Registry”
•   Applies to an email where the
    “primary purpose” is commercial
    advertisement or promotion of a   •   Impose an “ADV” labeling requirement
    product or service
                                      •   Create a general private right of action
•   Applicable to bulk and single
    emails                            •   Generate stimulating cocktail party
                                          conversations
Regulatory Timeline
2004: FTC Final Rule on Adult Labeling
           FCC CAN-SPAM Rules

2005: FTC (1) Final Rule on Primary Purpose of Email; and
        (2) Proposed Discretionary Rules


2006:
2006

2007:

2008: FTC Final Discretionary Rules
Determining When
CAN-SPAM Applies
CAN-
CAN-SPAMENCLATURE
    SENDER    -- means a person who initiates a
    commercial e-mail and whose product, service,
    or Internet web site is advertised or promoted
    by the message.

    INITIATE -- means to originate or transmit, or
    procure the origination or transmission of, such
    an e-mail message.

    PROCURE -- means intentionally to pay or
    induce another person to initiate the message
    on one's behalf, while knowingly or consciously
    avoiding knowing the extent to which that
    person intends to comply with this Act.
CAN-SPAM Principal Requirements
From Line
 FTC: must give the recipient enough
  information to know who is sending the
  message

 Not deceptive to use multiple domains
  Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007).



 Not misleading to use non-corporate address
  where domain may be checked using “Who
  Is” Gordon v. Virtumundo, Inc. (W.D. Wash. 2007)
 Fake address can get you in the dog house.
Designated Sender Rule
                                               Must Be a Sender
• Name must be in the “From” Line                    CAN-
                                               Under CAN-SPAM

• Must be Responsible for CAN-SPAM             Cannot designate
  compliance                                   Non-
                                               Non-Sender


• Dropped requirement that Designated
  Sender be in control of the content or the
  mailing list used
12
Subject Lines
   • Senate Report
      – test is whether the person initiating the message knows
        that the subject heading would be likely to mislead a
        reasonable recipient about a material fact regarding the
        content or subject matter of the message

   • “New MySpace Phone” subject line misleads consumers
     by creating false sense of sponsorship by MySpace.
      –   MySpace, Inc. v. The Globe.com, Inc. (C.D. Cal. Feb. 27, 2007)




   • “Free Gift” subject lines violate CAN-SPAM
      –          Adteractive,      (C.D.
          FTC v. Adteractive, Inc. (C.D. Cal. 2007)
Opt-Out Mechanism

• Opt-Out Basics
  – May offer options, but total opt-out must be
              options,           opt-
    one of them

  – 10 days to remove

  – No further use of email address after opt-out
                                          opt-

  – Separate Business Units:
    Opt-                 opt-
    Opt-out for Saab not opt-out for all of GM

• Discretionary Regs
  – Cannot impose any conditions on opt-out
                                        opt-
             (e.g
              e.g,                information)
    requests (e.g, fee or provide information)
CAN-SPAM Plaintiffs
                No Consumer Private Right of Action

                FTC & State AGs

                Internet Access Service Provider (IASP)
                     Adversely Effected by Violation
                     Must demonstrate substantial harm

                Civil Penalties
                     $25 – $250 per email
                     $2 million maximum

                Damage Adjustments
                     Treble damages if willful
                     Reduction if violation occurred despite
                      commercially reasonable efforts to maintain
                      compliance”




                                                               15
CAN-SPAMIGATORS
            Faux ISPs
     Established to Prosecute
      CAN-SPAM Actions

 Small, free service can qualify
 Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)




 But must demonstrate substantial harm
 - e.g., bandwidth, hardware, connectivity,
 overhead, staffing or equipment costs
 Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
Sender Liability
 FTC unsuccessful in seeking strict
  liability

 Advertiser liable if “actual knowledge,
  or by consciously avoiding knowing”
  about affiliate violations
    Strict anti-spam policies and policing of affiliates
     defeated allegation of intent.
     Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)



   – No duty to investigate
      Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
CAN-SPAM PREEMPTS ALL
   STATE REGULATION OF
   EMAIL EXCEPT STATE LAWS

• Regulating falsity or deception in
  email

• Not specific to email, including
  State trespass, contract, or tort law;
  or

• Other State laws to the extent that
  those laws relate to acts of fraud or
  computer crime
Rulings On State Spam
       Regulation
• Misrepresentation must be
  material
  Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006).



• States cannot dictate form of
  from line
  Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007); Gordon v.
  Virtumundo, Inc.(W.D. Wash. 2007).



• Courts split on whether state
  regulation must be based on
  traditional notions of fraud
    •      Yes. ASIS Internet Service v. Optin Global, Inc. (N.D. Cal.
           2008); Hypertouch v. ValueClick, (LA Super. Ct. May 4, 2009).

    •      No. ASIS Internet Service v. Vista Print (N.D.Cal. 2009).



• First Amendment requires
  that it not impinge non-
  commercial email
   Virginia v. Jaynes (Va. 2008).
Preemption’s Back Door?
• Utah/Michigan
  Child Registry Laws
   – Makes sending prohibited email a “computer
     crime”
   – Free Speech Coalition, Inc. v. Shurtleff,
     Utah Federal Court refused to enjoin law finding it
     fell within exception for computer crime
       • DOJ filed brief supporting this position


• New Colorado Spam Law
   – Makes violation of CAN-SPAM a violation of
     state deceptive practices and computer fraud laws
   – Higher Penalties
   – Is this a backdoor to creating private right of
     action under CAN-SPAM?
Selected Cases: CAN-SPAM Act
                CAN-
             Advertiser Liability

                 ASIS Internet Services, v. Optin Global, Inc., 2008 WL
                                                           Inc.,
                  1902217 (N.D. Cal. March 27, 2008 )
                 Hypertouch v. Kennedy-Western University, 2006 WL
                                 Kennedy-           University,
                  648688 (N.D. Cal. 2006)
                 US v. Cyberheat, 2007 U.S. Dist. LEXIS 15448 (N.D. Ariz.
                        Cyberheat,
                  2007)
                 US v. Implulse Marketing, No. CV05-1285RSL (W.D.
                                 Marketing,      CV05-
                  Wash. June 8, 2007)

             From and Subject Lines

                 FTC v. Adteractive, Inc., No. Case No. CV-07-5940 SI
                          Adteractive, Inc.,             CV-07-
                  (C.D. Cal. 2007)
                 Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D.
                             Virtumundo, Inc.,          06-0204-
                  Wash. May 15, 2007)
                 Kleffman v. Vonage Holding Corp., Case No. CV 07-
                                                Corp.,              07-
                  2406GAFJWJX (C.D. Cal. May 23, 2007)
                 MySpace, Inc. v. The Globe.com, Inc. No. CV 06-3391-
                                                                06-3391-
                  RGK (JCx) (C.D. Cal. Feb. 27, 2007)
                        (JCx)
CAN-
CAN-SPAM Cases Pt 2
      Preemption

          Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal.
           March 27, 2008 )

          Asis Internet Services v. VistaPrint USA, Inc., No. C 08-5261-SBA (N.D.
           Cal. May 5, 2009)

          Free Speech Coalition, Inc. v. Shurtleff, No. 2:05CV949DAK, 2007 U.S.
           Dist LEXIS 21556 (D. Utah Mar. 23, 2007)

          Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Wash. May
           15, 2007)

          Hypertouch, Inc. v. ValueClick, Inc., L.A. Super. Ct. No. C081000 (May
           4, 2009).

          Kleffman v. Vonage Holding Corp., Case No. CV 07-2406GAFJWJX
           (C.D. Cal. May 23, 2007)

          Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th
           Cir. 2006)

          Virginia v. Jaynes, 666 S.E.2d 303 (Va. 2008).
Bennet Kelley

                                Bennet Kelley founded the Internet Law Center in 2007 after a
                                decade of activity in many of the hottest internet issues including
                                behavioral targeting, cyber squatting, internet marketing and
                                promotions, net neutrality, privacy, spam and spyware. Prior to
                                launching the Internet Law Center, Bennet worked in-house with
                                companies such as ETM Entertainment Network,
                                SpeedyClick.com, Hi-Speed Media and ValueClick.

                                Bennet is Co-Vice Chair of the California Bar's Cyberspace
bkelley@internetlawcenter.net   Committee and has been a regular contributor to the Journal of
                                Internet Law.

                                The Internet Law Center’s is based in Santa Monica but also has a
                                presence in Washington, D.C. and Columbia, S.C. The firm’s e-
                                newsletter, Monday Memo, was named one of the top 100 Internet
                                Law resources and has been nominated for the Los Angeles Press
                                Club’s Southern California Journalism Award for best in-house or
                                corporate publication.

More Related Content

What's hot

CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
Internet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
Internet Law Center
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
Internet Law Center
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
handsomelykeepe65
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
Internet Law Center
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Bennet Kelley
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
Internet Law Center
 
CED013014
CED013014CED013014
CED013014
Jeff Berman
 
Legal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate MarketingLegal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate Marketing
Affiliate Summit
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
Teichka Muñoz
 
CPI Comcast article April 2014
CPI Comcast article April 2014CPI Comcast article April 2014
CPI Comcast article April 2014
Anant Raut
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008
Jim Francis
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
Teresa Rothaar
 
Polinter10
Polinter10Polinter10
Polinter10
Jeffrey Hart
 
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam LawCASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
Now Dentons
 
What Freud Can Teach Us About box tv
What Freud Can Teach Us About box tvWhat Freud Can Teach Us About box tv
What Freud Can Teach Us About box tv
j4sxwvx485
 
Legal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slidesLegal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slides
Internet Law Center
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
 
CED092812
CED092812CED092812
CED092812
Jeff Berman
 

What's hot (20)

CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
 
CED013014
CED013014CED013014
CED013014
 
Legal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate MarketingLegal 2.0: Hot Topics in Affiliate Marketing
Legal 2.0: Hot Topics in Affiliate Marketing
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
 
CPI Comcast article April 2014
CPI Comcast article April 2014CPI Comcast article April 2014
CPI Comcast article April 2014
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
 
Polinter10
Polinter10Polinter10
Polinter10
 
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam LawCASL vs CAN-SPAM - Canada’s Anti‐Spam Law
CASL vs CAN-SPAM - Canada’s Anti‐Spam Law
 
What Freud Can Teach Us About box tv
What Freud Can Teach Us About box tvWhat Freud Can Teach Us About box tv
What Freud Can Teach Us About box tv
 
Legal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slidesLegal 2.0 affiliate summit slides
Legal 2.0 affiliate summit slides
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
CED092812
CED092812CED092812
CED092812
 

Similar to Privacy Concerns in Marketing and Commercial Communications

Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
Bradley Arant Boult Cummings LLP
 
CAN-SPAM at 4
CAN-SPAM at 4CAN-SPAM at 4
CAN-SPAM at 4
Internet Law Center
 
5 rules of reputation management for startups
5 rules of reputation management for startups5 rules of reputation management for startups
5 rules of reputation management for startups
Internet Law Center
 
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
felicidaddinwoodie
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
Shawn Tuma
 
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationSocial Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Internet Law Center
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
Brian Miller, Solicitor
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
smithad612
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Internet Law Center
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Internet Law Center
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
Internet Law Center
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
Affiliate Summit
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
Graeme Cross
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Shawn Tuma
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Affiliate Summit
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talk
bsookman
 
Reputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraReputation Management in the Social Commerce Era
Reputation Management in the Social Commerce Era
Internet Law Center
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Shawn Tuma
 

Similar to Privacy Concerns in Marketing and Commercial Communications (20)

Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
CAN-SPAM at 4
CAN-SPAM at 4CAN-SPAM at 4
CAN-SPAM at 4
 
5 rules of reputation management for startups
5 rules of reputation management for startups5 rules of reputation management for startups
5 rules of reputation management for startups
 
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx1Austin ButlerDr. William Matter Subject Name05 March 20.docx
1Austin ButlerDr. William Matter Subject Name05 March 20.docx
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online ReputationSocial Media Marketing Do’s and Don’ts and Managing Your Online Reputation
Social Media Marketing Do’s and Don’ts and Managing Your Online Reputation
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talk
 
Reputation Management in the Social Commerce Era
Reputation Management in the Social Commerce EraReputation Management in the Social Commerce Era
Reputation Management in the Social Commerce Era
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Internet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
Internet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
Internet Law Center
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
Internet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
Internet Law Center
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Internet Law Center
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
Internet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
Internet Law Center
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
Internet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
Internet Law Center
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
Internet Law Center
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
Internet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Internet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
Internet Law Center
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
Internet Law Center
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
Internet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
Internet Law Center
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Privacy Concerns in Marketing and Commercial Communications

  • 1. Privacy Concerns in Marketing and Commercial Communications Bennet Kelley Liisa M. Thomas June 2, 2009
  • 2. In the Beginning . . . Pyramids of Giza, Egypt. © Digital Vision/Getty Images
  • 3. There was California . . . “We are saying that unsolicited e-mail cannot be sent and there are no loopholes . . . We don't differentiate between Disney and Viagra. If you go out and rent a list of e-mail addresses, by definition you are not a legitimate business. You are the person we are trying to stop.” Former California State Senator Kevin Murray Author of SB 186
  • 4. 84 days later . . . President George W. Bush signing the CAN-SPAM Act (Dec. 16, 2003). Controlling the Assault of Non-Solicited Pornography And Marketing Act on-
  • 5. CAN-SPAM Act of 2003 CAN-SPAM IS . . . CAN-SPAM DOES NOT . . . • anti- An anti-fraud and disclosure • “Can Spam” – except for wireless spam statute • Include a “Do Not Email Registry” • Applies to an email where the “primary purpose” is commercial advertisement or promotion of a • Impose an “ADV” labeling requirement product or service • Create a general private right of action • Applicable to bulk and single emails • Generate stimulating cocktail party conversations
  • 6. Regulatory Timeline 2004: FTC Final Rule on Adult Labeling FCC CAN-SPAM Rules 2005: FTC (1) Final Rule on Primary Purpose of Email; and (2) Proposed Discretionary Rules 2006: 2006 2007: 2008: FTC Final Discretionary Rules
  • 8. CAN- CAN-SPAMENCLATURE SENDER -- means a person who initiates a commercial e-mail and whose product, service, or Internet web site is advertised or promoted by the message. INITIATE -- means to originate or transmit, or procure the origination or transmission of, such an e-mail message. PROCURE -- means intentionally to pay or induce another person to initiate the message on one's behalf, while knowingly or consciously avoiding knowing the extent to which that person intends to comply with this Act.
  • 10. From Line  FTC: must give the recipient enough information to know who is sending the message  Not deceptive to use multiple domains Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007).  Not misleading to use non-corporate address where domain may be checked using “Who Is” Gordon v. Virtumundo, Inc. (W.D. Wash. 2007)  Fake address can get you in the dog house.
  • 11. Designated Sender Rule Must Be a Sender • Name must be in the “From” Line CAN- Under CAN-SPAM • Must be Responsible for CAN-SPAM Cannot designate compliance Non- Non-Sender • Dropped requirement that Designated Sender be in control of the content or the mailing list used
  • 12. 12
  • 13. Subject Lines • Senate Report – test is whether the person initiating the message knows that the subject heading would be likely to mislead a reasonable recipient about a material fact regarding the content or subject matter of the message • “New MySpace Phone” subject line misleads consumers by creating false sense of sponsorship by MySpace. – MySpace, Inc. v. The Globe.com, Inc. (C.D. Cal. Feb. 27, 2007) • “Free Gift” subject lines violate CAN-SPAM – Adteractive, (C.D. FTC v. Adteractive, Inc. (C.D. Cal. 2007)
  • 14. Opt-Out Mechanism • Opt-Out Basics – May offer options, but total opt-out must be options, opt- one of them – 10 days to remove – No further use of email address after opt-out opt- – Separate Business Units: Opt- opt- Opt-out for Saab not opt-out for all of GM • Discretionary Regs – Cannot impose any conditions on opt-out opt- (e.g e.g, information) requests (e.g, fee or provide information)
  • 15. CAN-SPAM Plaintiffs  No Consumer Private Right of Action  FTC & State AGs  Internet Access Service Provider (IASP)  Adversely Effected by Violation  Must demonstrate substantial harm  Civil Penalties  $25 – $250 per email  $2 million maximum  Damage Adjustments  Treble damages if willful  Reduction if violation occurred despite commercially reasonable efforts to maintain compliance” 15
  • 16. CAN-SPAMIGATORS Faux ISPs Established to Prosecute CAN-SPAM Actions  Small, free service can qualify Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)  But must demonstrate substantial harm - e.g., bandwidth, hardware, connectivity, overhead, staffing or equipment costs Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
  • 17. Sender Liability  FTC unsuccessful in seeking strict liability  Advertiser liable if “actual knowledge, or by consciously avoiding knowing” about affiliate violations  Strict anti-spam policies and policing of affiliates defeated allegation of intent. Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006) – No duty to investigate Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
  • 18. CAN-SPAM PREEMPTS ALL STATE REGULATION OF EMAIL EXCEPT STATE LAWS • Regulating falsity or deception in email • Not specific to email, including State trespass, contract, or tort law; or • Other State laws to the extent that those laws relate to acts of fraud or computer crime
  • 19. Rulings On State Spam Regulation • Misrepresentation must be material Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006). • States cannot dictate form of from line Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007); Gordon v. Virtumundo, Inc.(W.D. Wash. 2007). • Courts split on whether state regulation must be based on traditional notions of fraud • Yes. ASIS Internet Service v. Optin Global, Inc. (N.D. Cal. 2008); Hypertouch v. ValueClick, (LA Super. Ct. May 4, 2009). • No. ASIS Internet Service v. Vista Print (N.D.Cal. 2009). • First Amendment requires that it not impinge non- commercial email Virginia v. Jaynes (Va. 2008).
  • 20. Preemption’s Back Door? • Utah/Michigan Child Registry Laws – Makes sending prohibited email a “computer crime” – Free Speech Coalition, Inc. v. Shurtleff, Utah Federal Court refused to enjoin law finding it fell within exception for computer crime • DOJ filed brief supporting this position • New Colorado Spam Law – Makes violation of CAN-SPAM a violation of state deceptive practices and computer fraud laws – Higher Penalties – Is this a backdoor to creating private right of action under CAN-SPAM?
  • 21. Selected Cases: CAN-SPAM Act CAN- Advertiser Liability  ASIS Internet Services, v. Optin Global, Inc., 2008 WL Inc., 1902217 (N.D. Cal. March 27, 2008 )  Hypertouch v. Kennedy-Western University, 2006 WL Kennedy- University, 648688 (N.D. Cal. 2006)  US v. Cyberheat, 2007 U.S. Dist. LEXIS 15448 (N.D. Ariz. Cyberheat, 2007)  US v. Implulse Marketing, No. CV05-1285RSL (W.D. Marketing, CV05- Wash. June 8, 2007) From and Subject Lines  FTC v. Adteractive, Inc., No. Case No. CV-07-5940 SI Adteractive, Inc., CV-07- (C.D. Cal. 2007)  Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Virtumundo, Inc., 06-0204- Wash. May 15, 2007)  Kleffman v. Vonage Holding Corp., Case No. CV 07- Corp., 07- 2406GAFJWJX (C.D. Cal. May 23, 2007)  MySpace, Inc. v. The Globe.com, Inc. No. CV 06-3391- 06-3391- RGK (JCx) (C.D. Cal. Feb. 27, 2007) (JCx)
  • 22. CAN- CAN-SPAM Cases Pt 2 Preemption  Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )  Asis Internet Services v. VistaPrint USA, Inc., No. C 08-5261-SBA (N.D. Cal. May 5, 2009)  Free Speech Coalition, Inc. v. Shurtleff, No. 2:05CV949DAK, 2007 U.S. Dist LEXIS 21556 (D. Utah Mar. 23, 2007)  Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Wash. May 15, 2007)  Hypertouch, Inc. v. ValueClick, Inc., L.A. Super. Ct. No. C081000 (May 4, 2009).  Kleffman v. Vonage Holding Corp., Case No. CV 07-2406GAFJWJX (C.D. Cal. May 23, 2007)  Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2006)  Virginia v. Jaynes, 666 S.E.2d 303 (Va. 2008).
  • 23. Bennet Kelley Bennet Kelley founded the Internet Law Center in 2007 after a decade of activity in many of the hottest internet issues including behavioral targeting, cyber squatting, internet marketing and promotions, net neutrality, privacy, spam and spyware. Prior to launching the Internet Law Center, Bennet worked in-house with companies such as ETM Entertainment Network, SpeedyClick.com, Hi-Speed Media and ValueClick. Bennet is Co-Vice Chair of the California Bar's Cyberspace bkelley@internetlawcenter.net Committee and has been a regular contributor to the Journal of Internet Law. The Internet Law Center’s is based in Santa Monica but also has a presence in Washington, D.C. and Columbia, S.C. The firm’s e- newsletter, Monday Memo, was named one of the top 100 Internet Law resources and has been nominated for the Los Angeles Press Club’s Southern California Journalism Award for best in-house or corporate publication.